Sample records for female computer users

  1. Worksheets for computing recommended notebook computer and workstation adjustments.

    PubMed

    Nanthavanij, Suebsak; Udomratana, Chatkate; Hansawad, Saowalak; Thepkanjana, Jayaporn; Tantasuwan, Wanchalerm

    2013-01-01

    This paper discusses the design and development of worksheets for helping notebook computer (NBC) users to compute NBC and workstation adjustments so as to assume an appropriate seated posture. The worksheets (one for male users, the other for female ones) require the following information: body height, NBC screen size, work surface height, and seat height. The worksheets contain tables for estimating recommended NBC base angle, NBC screen angle, body-NBC distance, work surface height, and seat height. Additionally, they include flow charts to help NBC users to determine necessary adjustment accessories and their settings.

  2. Attitudinal Study of User and Non-User Teachers' towards ICT in Relation to Their School Teaching Subjects

    ERIC Educational Resources Information Center

    Lal, Chhavi

    2014-01-01

    The present study aimed to know the attitude towards ICT of user and non-user teachers of ICT. The data were collected from 40 (20 male and 20 Female) user and non-user of ICT secondary school teachers from Agra city. Attitude towards ICT was measured by Computer Attitude Scale (CAS), originally developed by Loyd and Gressard (1984). Data were…

  3. He Votes or She Votes? Female and Male Discursive Strategies in Twitter Political Hashtags

    PubMed Central

    Cunha, Evandro; Magno, Gabriel; Gonçalves, Marcos André; Cambraia, César; Almeida, Virgilio

    2014-01-01

    In this paper, we conduct a study about differences between female and male discursive strategies when posting in the microblogging service Twitter, with a particular focus on the hashtag designation process during political debate. The fact that men and women use language in distinct ways, reverberating practices linked to their expected roles in the social groups, is a linguistic phenomenon known to happen in several cultures and that can now be studied on the Web and on online social networks in a large scale enabled by computing power. Here, for instance, after analyzing tweets with political content posted during Brazilian presidential campaign,we found out that male Twitter users, when expressing their attitude toward a given candidate, are more prone to use imperative verbal forms in hashtags, while female users tend to employ declarative forms. This difference can be interpreted as a sign of distinct approaches in relation to other network members: for example, if political hashtags are seen as strategies of persuasion in Twitter, imperative tags could be understood as more overt ways of persuading and declarative tags as more indirect ones. Our findings help to understand human gendered behavior in social networks and contribute to research on the new fields of computer-enabled Internet linguistics and social computing, besides being useful for several computational tasks such as developing tag recommendation systems based on users' collective preferences and tailoring targeted advertising strategies, among others. PMID:24489832

  4. Distinct patterns of Internet and smartphone-related problems among adolescents by gender: Latent class analysis.

    PubMed

    Lee, Seung-Yup; Lee, Donghwan; Nam, Cho Rong; Kim, Da Yea; Park, Sera; Kwon, Jun-Gun; Kweon, Yong-Sil; Lee, Youngjo; Kim, Dai Jin; Choi, Jung-Seok

    2018-05-23

    Background and objectives The ubiquitous Internet connections by smartphones weakened the traditional boundaries between computers and mobile phones. We sought to explore whether smartphone-related problems differ from those of computer use according to gender using latent class analysis (LCA). Methods After informed consents, 555 Korean middle-school students completed surveys on gaming, Internet use, and smartphone usage patterns. They also completed various psychosocial instruments. LCA was performed for the whole group and by gender. In addition to ANOVA and χ 2 tests, post-hoc tests were conducted to examine differences among the LCA subgroups. Results In the whole group (n = 555), four subtypes were identified: dual-problem users (49.5%), problematic Internet users (7.7%), problematic smartphone users (32.1%), and "healthy" users (10.6%). Dual-problem users scored highest for addictive behaviors and other psychopathologies. The gender-stratified LCA revealed three subtypes for each gender. With dual-problem and healthy subgroup as common, problematic Internet subgroup was classified in the males, whereas problematic smartphone subgroup was classified in the females in the gender-stratified LCA. Thus, distinct patterns were observed according to gender with higher proportion of dual-problem present in males. While gaming was associated with problematic Internet use in males, aggression and impulsivity demonstrated associations with problematic smartphone use in females. Conclusions An increase in the number of digital media-related problems was associated with worse outcomes in various psychosocial scales. Gaming may play a crucial role in males solely displaying Internet-related problems. The heightened impulsivity and aggression seen in our female problematic smartphone users requires further research.

  5. Gender-specific differences in high-risk sexual behaviors among methamphetamine users in Myanmar-China border city, Muse, Myanmar: who is at risk?

    PubMed

    Saw, Yu Mon; Saw, Thu Nandar; Chan, Nyein; Cho, Su Myat; Jimba, Masamine

    2018-02-01

    Methamphetamine (MA) use is a significant public health concern due to its negative effects on health. However, to date, no epidemiological research has examined high-risk sexual behaviors (inconsistent condom use, having multiple sexual partners and having a history of sexually transmitted infections) among MA users. This topic is particularly important in Myanmar, which is recognized as one of the key MA production countries in the Southeast Asia region. Therefore, this study examined factors associated with high-risk sexual behaviors among MA users in Muse city, Myanmar. A community-based cross-sectional study was conducted from January to March 2013 in Muse city, Northern Shan State, Myanmar. In total, 1183 MA users (772 male; 411 female) were recruited using respondent-driven sampling and a computer assisted self-interviewing method. Generalized estimating equation models were used to examine factors associated with high-risk sexual behaviors. A large proportion of MA users engaged in high-risk sexual behaviors (inconsistent condom use: males, 90.7%, females, 85.2%; multiple sexual partners: males, 94.2%, females, 47.2%; and history of STIs: males, 55.7%, females, 56.0%). Among males, being a multiple stimulants drug user (adjusted odds ratio [AOR] =1.77; 95% confidence interval [CI] =1.30-2.41) and being a client of sex workers (AOR = 1.41; 95% CI = 1.08-1.83) were risk factors for engaging in high-risk sexual behaviors. Among females, being a migrant worker (AOR = 2.70; 95% CI = 1.86-3.93) and being employed (AOR = 1.57; 95% CI = 1.13-2.18) were risk factors for engaging in high-risk sexual behaviors as well. High-risk sexual behaviors were particularly pronounced among both male and female MA users. MA prevention programs that reflect gender considerations should be developed to pay more attention to vulnerable populations such as migrants, clients of sex workers, and less educated female MA users.

  6. Race, gender, and information technology use: the new digital divide.

    PubMed

    Jackson, Linda A; Zhao, Yong; Kolenic, Anthony; Fitzgerald, Hiram E; Harold, Rena; Von Eye, Alexander

    2008-08-01

    This research examined race and gender differences in the intensity and nature of IT use and whether IT use predicted academic performance. A sample of 515 children (172 African Americans and 343 Caucasian Americans), average age 12 years old, completed surveys as part of their participation in the Children and Technology Project. Findings indicated race and gender differences in the intensity of IT use; African American males were the least intense users of computers and the Internet, and African American females were the most intense users of the Internet. Males, regardless of race, were the most intense videogame players, and females, regardless of race, were the most intense cell phone users. IT use predicted children's academic performance. Length of time using computers and the Internet was a positive predictor of academic performance, whereas amount of time spent playing videogames was a negative predictor. Implications of the findings for bringing IT to African American males and bringing African American males to IT are discussed.

  7. Evaluating biomechanics of user-selected sitting and standing computer workstation.

    PubMed

    Lin, Michael Y; Barbir, Ana; Dennerlein, Jack T

    2017-11-01

    A standing computer workstation has now become a popular modern work place intervention to reduce sedentary behavior at work. However, user's interaction related to a standing computer workstation and its differences with a sitting workstation need to be understood to assist in developing recommendations for use and set up. The study compared the differences in upper extremity posture and muscle activity between user-selected sitting and standing workstation setups. Twenty participants (10 females, 10 males) volunteered for the study. 3-D posture, surface electromyography, and user-reported discomfort were measured while completing simulated tasks with each participant's self-selected workstation setups. Sitting computer workstation associated with more non-neutral shoulder postures and greater shoulder muscle activity, while standing computer workstation induced greater wrist adduction angle and greater extensor carpi radialis muscle activity. Sitting computer workstation also associated with greater shoulder abduction postural variation (90th-10th percentile) while standing computer workstation associated with greater variation for should rotation and wrist extension. Users reported similar overall discomfort levels within the first 10 min of work but had more than twice as much discomfort while standing than sitting after 45 min; with most discomfort reported in the low back for standing and shoulder for sitting. These different measures provide understanding in users' different interactions with sitting and standing and by alternating between the two configurations in short bouts may be a way of changing the loading pattern on the upper extremity. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Differential effects of gender on entropy perception

    NASA Astrophysics Data System (ADS)

    Satcharoen, Kleddao

    2017-12-01

    The purpose of this research is to examine differences in perception of entropy (color intensity) between male and female computer users. The objectives include identifying gender-based differences in entropy intention and exploring the potential effects of these differences (if any) on user interface design. The research is an effort to contribute to an emerging field of interest in gender as it relates to science, engineering and technology (SET), particularly user interface design. Currently, there is limited evidence on the role of gender in user interface design and in use of technology generally, with most efforts at gender-differentiated or customized design based on stereotypes and assumptions about female use of technology or the assumption of a default position based on male preferences. Image entropy was selected as a potential characteristic where gender could be a factor in perception because of known differences in color perception acuity between male and female individuals, even where there is no known color perception abnormality (which is more common with males). Although the literature review suggested that training could offset differences in color perception and identification, tests in untrained subject groups routinely show that females are more able to identify, match, and differentiate colors, and that there is a stronger emotional and psychosocial association of color for females. Since image entropy is associated with information content and image salience, the ability to identify areas of high entropy could make a difference in user perception and technological capabilities.

  9. Gender difference in early initiation of methamphetamine use among current methamphetamine users in Muse, Northern Shan State, Myanmar.

    PubMed

    Saw, Yu Mon; Saw, Thu Nandar; Yasuoka, Junko; Chan, Nyein; Kham, Nang Pann Ei; Khine, Wint; Cho, Su Myat; Jimba, Masamine

    2017-05-08

    Globally, methamphetamine (MA) use is a significant public health concern due to unprecedented health effects of its use. However, gender similarities and differences in early age of MA initiation and its risk factors among current MA users have been understudied in a developing country setting. A community-based, cross-sectional study was conducted using a computer assisted self-interviewing program from January to March 2013 in Muse, Northern Shan State, Myanmar. A total of 1362 (775 male and 587 female) self-reported current MA users aged between 18 and 35 years were recruited using respondent-driven sampling. Two gender-stratified multiple logistic regression models (models I and II) were done for analysis. For similarities, 73.0% of males and 60.5% of females initiated MA before their 18th birthday. The early age of MA initiation was positively associated with the reasons and places of the first time MA use among both genders. For differences, males [hazard ratio 1.35; 95% confidence interval, 1.18-1.54] had a significantly higher risk than females to initiate MA at earlier age. Among male users, participants who had bisexual/homosexual preferences were more likely to initiate MA use earlier. In contrast, female users who exchanged sex for money and/or drugs were more likely to initiate MA in earlier age. More than 60.0% of male and female participants initiated MA use early; however, males initiated use earlier than females. Although similarities were found among both genders, differences found in key risk factors for early age MA initiation suggest that gender-specific, MA prevention programs are urgently needed in Myanmar.

  10. Ergonomic intervention for improving work postures during notebook computer operation.

    PubMed

    Jamjumrus, Nuchrawee; Nanthavanij, Suebsak

    2008-06-01

    This paper discusses the application of analytical algorithms to determine necessary adjustments for operating notebook computers (NBCs) and workstations so that NBC users can assume correct work postures during NBC operation. Twenty-two NBC users (eleven males and eleven females) were asked to operate their NBCs according to their normal work practice. Photographs of their work postures were taken and analyzed using the Rapid Upper Limb Assessment (RULA) technique. The algorithms were then employed to determine recommended adjustments for their NBCs and workstations. After implementing the necessary adjustments, the NBC users were then re-seated at their workstations, and photographs of their work postures were re-taken, to perform the posture analysis. The results show that the NBC users' work postures are improved when their NBCs and workstations are adjusted according to the recommendations. The effectiveness of ergonomic intervention is verified both visually and objectively.

  11. Women are Warmer but No Less Assertive than Men: Gender and Language on Facebook.

    PubMed

    Park, Gregory; Yaden, David Bryce; Schwartz, H Andrew; Kern, Margaret L; Eichstaedt, Johannes C; Kosinski, Michael; Stillwell, David; Ungar, Lyle H; Seligman, Martin E P

    2016-01-01

    Using a large social media dataset and open-vocabulary methods from computational linguistics, we explored differences in language use across gender, affiliation, and assertiveness. In Study 1, we analyzed topics (groups of semantically similar words) across 10 million messages from over 52,000 Facebook users. Most language differed little across gender. However, topics most associated with self-identified female participants included friends, family, and social life, whereas topics most associated with self-identified male participants included swearing, anger, discussion of objects instead of people, and the use of argumentative language. In Study 2, we plotted male- and female-linked language topics along two interpersonal dimensions prevalent in gender research: affiliation and assertiveness. In a sample of over 15,000 Facebook users, we found substantial gender differences in the use of affiliative language and slight differences in assertive language. Language used more by self-identified females was interpersonally warmer, more compassionate, polite, and-contrary to previous findings-slightly more assertive in their language use, whereas language used more by self-identified males was colder, more hostile, and impersonal. Computational linguistic analysis combined with methods to automatically label topics offer means for testing psychological theories unobtrusively at large scale.

  12. Women are Warmer but No Less Assertive than Men: Gender and Language on Facebook

    PubMed Central

    Park, Gregory; Schwartz, H. Andrew; Kern, Margaret L.; Eichstaedt, Johannes C.; Kosinski, Michael; Stillwell, David; Ungar, Lyle H.; Seligman, Martin E. P.

    2016-01-01

    Using a large social media dataset and open-vocabulary methods from computational linguistics, we explored differences in language use across gender, affiliation, and assertiveness. In Study 1, we analyzed topics (groups of semantically similar words) across 10 million messages from over 52,000 Facebook users. Most language differed little across gender. However, topics most associated with self-identified female participants included friends, family, and social life, whereas topics most associated with self-identified male participants included swearing, anger, discussion of objects instead of people, and the use of argumentative language. In Study 2, we plotted male- and female-linked language topics along two interpersonal dimensions prevalent in gender research: affiliation and assertiveness. In a sample of over 15,000 Facebook users, we found substantial gender differences in the use of affiliative language and slight differences in assertive language. Language used more by self-identified females was interpersonally warmer, more compassionate, polite, and—contrary to previous findings—slightly more assertive in their language use, whereas language used more by self-identified males was colder, more hostile, and impersonal. Computational linguistic analysis combined with methods to automatically label topics offer means for testing psychological theories unobtrusively at large scale. PMID:27223607

  13. FGMReview: design of a knowledge management tool on female genital mutilation.

    PubMed

    Martínez Pérez, Guillermo; Turetsky, Risa

    2015-11-01

    Web-based literature search engines may not be user-friendly for some readers searching for information on female genital mutilation. This is a traditional practice that has no health benefits, and about 140 million girls and women worldwide have undergone it. In 2012, the website FGMReview was created with the aim to offer a user-friendly, accessible, scalable, and innovative knowledge management tool specialized in female genital mutilation. The design of this website was guided by a conceptual model based on the use of benchmarking techniques and requirements engineering, an area of knowledge from the computer informatics field, influenced by the Transcultural Nursing model. The purpose of this article is to describe this conceptual model. Nurses and other health care providers can use this conceptual model to guide their methodological approach to design and launch other eHealth projects. © The Author(s) 2014.

  14. E-cigarette use among Serbian adults: prevalence and user characteristics.

    PubMed

    Kilibarda, Biljana; Mravcik, Viktor; Martens, Marcus Sebastian

    2016-03-01

    The objective was to report the prevalence and characteristics of electronic cigarette (e-cigarette) users in order to inform an appropriate response to this emerging challenge in tobacco control. Data were drawn from a cross-sectional survey conducted in 2014 that used computer-assisted interviewing in a representative sample of 5385 Serbian adults age 18-64 years. Lifetime e-cigarette use and current use was reported by 9.6 and 2 % of adults, respectively. Younger adults had a higher prevalence of both lifetime and current use. Females were more likely to be current e-cigarette users than males. The majority of ever and current e-cigarette users were current or past cigarette smokers, but lifetime use was reported by non-smokers as well. Electronic cigarettes are popular in Serbia; one in ten adults had tried them at least once. Because females and young adults were more likely to use e-cigarettes, a targeted response in these specific groups is needed. A standardised methodology for monitoring e-cigarette use should be established and surveys exploring motives for and attitudes towards e-cigarettes use should be conducted.

  15. Effects of Dual Monitor Computer Work Versus Laptop Work on Cervical Muscular and Proprioceptive Characteristics of Males and Females.

    PubMed

    Farias Zuniga, Amanda M; Côté, Julie N

    2017-06-01

    The effects of performing a 90-minute computer task with a laptop versus a dual monitor desktop workstation were investigated in healthy young male and female adults. Work-related musculoskeletal disorders are common among computer (especially female) users. Laptops have surpassed desktop computer sales, and working with multiple monitors has also become popular. However, few studies have provided objective evidence on how they affect the musculoskeletal system in both genders. Twenty-seven healthy participants (mean age = 24.6 years; 13 males) completed a 90-minute computer task while using a laptop or dual monitor (DualMon) desktop. Electromyography (EMG) from eight upper body muscles and visual strain were measured throughout the task. Neck proprioception was tested before and after the computer task using a head-repositioning test. EMG amplitude (root mean square [RMS]), variability (coefficients of variation [CV]), and normalized mutual information (NMI) were computed. Visual strain ( p < .01) and right upper trapezius RMS ( p = .03) increased significantly over time regardless of workstation. Right cervical erector spinae RMS and cervical NMI were smaller, while degrees of overshoot (mean = 4.15°) and end position error (mean = 1.26°) were larger in DualMon regardless of time. Effects on muscle activity were more pronounced in males, whereas effects on proprioception were more pronounced in females. Results suggest that compared to laptop, DualMon work is effective in reducing cervical muscle activity, dissociating cervical connectivity, and maintaining more typical neck repositioning patterns, suggesting some health-protective effects. This evidence could be considered when deciding on computer workstation designs.

  16. Upper extremity musculoskeletal discomfort among occupational notebook personal computer users: work interference, associations with risk factors and the use of notebook computer stand and docking station.

    PubMed

    Erdinc, Oguzhan

    2011-01-01

    This study explored the prevalence and work interference (WI) of upper extremity musculoskeletal discomfort (UEMSD) and investigated the associations of individual and work-related risk factors and using a notebook stand or docking station with UEMSD among symptomatic occupational notebook personal computer (PC) users. The participant group included 45 Turkish occupational notebook PC users. The study used self-reports of participants. The Turkish version of the Cornell Musculoskeletal Discomfort Questionnaire (T-CMDQ) was used to collect symptom data. UEMSD prevailed mostly in the neck, the upper back, and the lower back with prevalence rates of 77.8%, 73.3%, and 60.0% respectively, and with WI rates of 28.9%, 24.4%, and 26.7% respectively. Aggregated results showed that 44% of participants reported WI due to UEMSD in at least one body region. Significant risk factors were: being female, being aged <31 years, having computer work experience <10 years, and physical discomfort during computer use. UEMSD prevalence and WI rates were considerable in the neck, the upper back, and the lower back. Significant associations between certain risk factors and UEMSD were identified, but no association was found between using notebook stand and docking station and UEMSD among participants.

  17. Gender, technology and jobs.

    PubMed

    Brynin, Malcolm

    2006-09-01

    Men have traditionally gained more than women from access to technologies at work which bring prestige, job security, more satisfying work and higher pay. Typically female jobs have centred on technologies, if they have at all, which tend towards routine and possibly deskilled work. Typing is a prime example. It is possible that this is changing through computerization, which is extensive but also equally distributed by gender. Does the wage premium, which use of a computer has been found to confer on users, benefit women sufficiently to suggest some sort of equalization through technology, or possibly even a female advantage? This is tested using data from four European countries. There is no across-the-board benefit from the use of computers. For both men and women it depends on the nature of their occupation. Some, more routine usages of computers are associated with a negative outcome. However, this occupational balance itself varies by gender.

  18. [Hand motor dysfunctions in computer users].

    PubMed

    Shavlovskaia, O A; Shvarkov, S B; Posokhov, S I

    2010-01-01

    It were studied 239 female typists aged from 16 to 62 years (mean age 20,1±7,8 years) using author's questionnaire for computer typists to assess hand function and develop preventive measures of disturbances revealed. Indirect signs of tunnel hand neuropathy (27,2%), focal hand dystonia (21,4%) and muscular-tonic syndromes of different localization (18%) have been found. Typists are a risk group of fine hand motor dysfunctions. As preventive measures, authors recommend to use computer auxiliary devices, to change a motor stereotype during the day, to make hand "motor holidays", to organize working place.

  19. An ounce of discretion is worth a pound of wit--ergonomics is a healthy choice.

    PubMed

    Rehman, Rehana; Khan, Rakhshaan; Surti, Ambreen; Khan, Hira

    2013-01-01

    The objective of the study was to identify the occurrence and outcome of low back ache amongst computer users and their relation to age, gender, occupation and duration of computer use. A self reported questionnaire tailored from Occupational Health and Safety Act of the Ministry of Labor, Ontario, Canada was used. 416 participants 55.5% males and 45% females using computers for a minimum of five years with age range 22 to 59 years belonged to different occupational groups. Consecutive hours of computer work was found to be associated with work related backache or discomfort in 27.4% (n = 114) participants (16.1% male, 11.3% female). Frequent short breaks improved backache (p value <0.001) in 93 (22.4%) participants (13.2% male, 9.2% female). No significant relation was observed with the duration of computer usage or usage per day; between the two genders or occupational groups. Backache had no significance within age groups. Our study identifies the occurrence of low back pain among those who are using computer for consecutive hours without breaks and the results suggest the need to create health awareness especially use of short breaks to minimize the risk and occurrence of low back pain. The result of this study can also be used to improve ergonomic design and standards.

  20. The Effects of Sex Differences and Hormonal Contraception on Outcomes after Collegiate Sports-Related Concussion.

    PubMed

    Gallagher, Virginia; Kramer, Natalie; Abbott, Kristin; Alexander, John; Breiter, Hans; Herrold, Amy; Lindley, Tory; Mjaanes, Jeffrey; Reilly, James

    2018-06-01

    There is conflicting evidence regarding whether females are more adversely affected after concussion than males. Further, recent research suggests that hormonal contraceptive (HC) use may affect symptom severity and duration post-concussion. The objective of this study was to examine the effects of sex and HC use on outcomes following concussion among collegiate varsity athletes. We hypothesized that females would have longer length of recovery (LOR), and that peak symptom severity would be associated with longer LOR in both males and females. Among females, we hypothesized that non-HC users would have longer LOR and higher peak symptom severity than HC users. Ninety collegiate student-athletes were included in this study (40 males, 50 females; 24 HC users, 25 non-HC users). Demographic, injury, and recovery information was abstracted via retrospective record review. LOR was defined as days between injury and clearance for full return to play by team physician. Peak symptom severity score (Sport Concussion Assessment Tool [SCAT] 2 or 3) was used in analyses. Study results revealed that males had shorter LOR than females (F[1, 86] = 5.021, p < 0.05, d = 0.49), but had comparable symptom severity scores. Symptom severity was strongly related to LOR for males (r = 0.513, p < 0.01) but not females (r = -0.003, p > 0.05). Among females, non-HC users demonstrated higher symptom severity than HC users (F[1,47] = 5.142, p < 0.05, d = 0.70). No significant differences between female HC users and non-HC users on LOR were observed. This study provides evidence for differential concussion outcomes between male and female collegiate athletes and between HC users and nonusers among females.

  1. A comparison of male and female smokeless tobacco use.

    PubMed

    Cohen-Smith, D; Severson, H H

    1999-09-01

    This study explored the factors associated with female smokeless tobacco (ST) use and examined gender differences in factors related to use. Interviews were conducted either in person or by telephone with 51 female and 59 male users from the Pacific Northwest. The interview included both quantitative and qualitative items assessing personal, social, and substance use variables. Male and female users were found to be similar in a variety of areas, such as reasons for initiating use, use of ST in response to different mood states, and high rates of experimentation with other drugs. However, female users reported using ST for weight control more extensively, identified a greater influence by other female users, and reported fewer friends knowing about their use. Male users reported using ST more often during sports activities and in the workplace than did female users, and were almost three times more likely to be highly addicted to ST. The implications of the study for the development of prevention and cessation programs are discussed.

  2. Women and anabolic steroids: an analysis of a dozen users.

    PubMed

    Ip, Eric J; Barnett, Mitchell J; Tenerowicz, Michael J; Kim, Jennifer A; Wei, Hong; Perry, Paul J

    2010-11-01

    To provide an in-depth analysis of 12 female self-reported anabolic-androgenic steroid (AAS) users. Web-based survey. A Web-based survey was posted on 38 discussion boards of various fitness, bodybuilding, weightlifting, and steroid Web sites between February and June 2009. Participants completed a survey regarding demographics and use of AAS and other performance-enhancing agents (PEAs). A cohort of 1519 strength-trained subjects fully completed and submitted a valid survey. Five hundred eighteen subjects were self-reported AAS users consisting of 12 women and 506 men. One thousand one subjects were non-AAS users consisting of 230 women and 771 men. Demographic data and use of AAS and other PEAs. The female AAS users reported using an average of 8.8 PEAs in their routine. Compared with male AAS users and female non-AAS users, respectively, female AAS users were more likely to have met criteria for substance-dependence disorder (58.3% vs 23.4%; P = 0.01; 58.3% vs 9.1%; P < 0.001), have been diagnosed with a psychiatric illness (50.0% vs 17.4%; P = 0.01; 50.0% vs 22.2%; P = 0.04), and have reported a history of sexual abuse (41.7% vs 6.1%; P < 0.001; 41.7% vs 15.3%; P = 0.03). Female AAS users practice polypharmacy. Female AAS users are more likely to have qualified for substance-dependence disorder, have been diagnosed with a psychiatric illness, and have a history of sexual abuse than both male AAS users and female non-AAS users.

  3. Do Australian Adolescent Female Fake Tan (Sunless Tan) Users Practice Better Sun-Protection Behaviours than Non-Users?

    ERIC Educational Resources Information Center

    Williams, Melinda; Jones, Sandra C.; Caputi, Peter; Iverson, Don

    2012-01-01

    Objective: To determine differences in sun-protection behaviours, and incidence of sunburn, between Australian adolescent female fake tan users and non-users. Design: Cross sectional survey. Method: 398 adolescent females aged 12 to 18 years participated in a survey at public venues, schools, and online. The main outcome measures were…

  4. Altered subjective reward valuation among female heavy marijuana users.

    PubMed

    Hefner, Kathryn R; Starr, Mark J

    2017-02-01

    Maladaptive decision-making is a cardinal feature of drug use, contributing to ongoing use, and reflecting alterations in how drug users assess uncertain reward value. Accumulating evidence indicates the consequences of heavy marijuana use are worse for female versus male animals and humans, but research assessing sex differences in reward-related decision-making among marijuana users remains scarce. We examined sex differences in the subjective valuation of certain and uncertain rewards among heavy marijuana users (52; 26 male and 26 female) and controls (52; 26 male and 26 female). We offered male and female heavy marijuana users and controls monetary rewards of certain and uncertain (probabilistic) values. We measured how preferences for uncertain rewards varied by the objective value of those rewards, moderators of reward uncertainty, Marijuana Group and Sex. Men were more sensitive to changes in the objective value of uncertain rewards than women. However, this effect of Sex differed by Marijuana Group. Female heavy marijuana users were more sensitive to changes in uncertain reward value, particularly when the "stakes" were high (i.e., greater difference between potential uncertain rewards), than female controls. Female heavy marijuana users' sensitivity to changes in the value of high stakes uncertain rewards was comparable to male marijuana users and controls. In contrast, male marijuana users' sensitivity to changes in the value of high stakes uncertain rewards did not differ from male controls. These results suggest sex differences in sensitivity to high risk rewards may be one pathway contributing to severer consequences of heavy marijuana use among women. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  5. Greater sexual risk-taking in female and male recreational MDMA/ecstasy users compared with alcohol drinkers: a questionnaire study.

    PubMed

    May, Aimee L; Parrott, Andrew C

    2015-07-01

    Previous studies have shown increased sexual risk-taking in experienced MDMA/ecstasy users. The main objectives of this study were to compare levels of sexual risk-taking between a young student sample of predominantly heterosexual MDMA users and alcohol-drinker controls and investigate potential gender differences. Recreational drug use and sexual risk questionnaires were completed by 20 MDMA users (10 females, 10 males) and 20 non-user controls (10 females, 10 males). They were predominantly university students, aged between 20-22 years, mainly heterosexual (n = 37), with three bisexual participants. MDMA users displayed significantly greater levels of sexual risk-taking than the alcohol-drinker controls. It involved significantly higher rates of casual sex, non-condom use during sex, and penetrative sexual risks. This increase in sexual riskiness occurred to a similar extent in males and females. These findings indicate that both female and male ecstasy/MDMA users reported more risky sexual behaviours, than the non-user controls. Further research into the sexual behaviour and sexual risk-taking of heterosexual MDMA users should be conducted because much of the past literature has focused on homosexual participants. Copyright © 2015 John Wiley & Sons, Ltd.

  6. Computer and online health information literacy among Belgrade citizens aged 66-89 years.

    PubMed

    Gazibara, Tatjana; Kurtagic, Ilma; Kisic-Tepavcevic, Darija; Nurkovic, Selmina; Kovacevic, Nikolina; Gazibara, Teodora; Pekmezovic, Tatjana

    2016-06-01

    Computer users over 65 years of age in Serbia are rare. The purpose of this study was to (i) describe main demographic characteristics of computer users older than 65; (ii) evaluate their online health information literacy and (iii) assess factors associated with computer use in this population. Persons above 65 years of age were recruited at the Community Health Center 'Vračar' in Belgrade from November 2012 to January 2013. Data were collected after medical checkups using a questionnaire. Of 480 persons who were invited to participate 354 (73.7%) agreed to participate, while 346 filled in the questionnaire (72.1%). A total of 70 (20.2%) older persons were computer users (23.4% males vs. 17.7% females). Of those, 23.7% explored health-related web sites. The majority of older persons who do not use computers reported that they do not have a reason to use a computer (76.5%), while every third senior (30.4%) did not own a computer. Predictors of computer use were being younger [odds ratio (OR) = 2.14, 95% confidence interval (CI) 1.30-4.04; p = 0.019], having less members of household (OR = 2.97, 95% CI 1.45-6.08; p = 0.003), being more educated (OR = 3.53, 95% CI 1.88-6.63; p = 0.001), having higher income (OR = 2.31, 95% CI 1.17-4.58; p = 0.016) as well as fewer comorbidities (OR = 0.42, 95% CI 0.23-0.79; p = 0.007). Being male was independent predictor of online health information use at the level of marginal significance (OR = 4.43, 95% CI 1.93-21.00; p = 0.061). Frequency of computer and Internet use among older adults in Belgrade is similar to other populations. Patterns of Internet use as well as non-use demonstrate particular socio-cultural characteristics. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. Economic evaluation of alternative crossbreeding systems involving four breeds of swine. I. The simulation model.

    PubMed

    McLaren, D G; Buchanan, D S; Williams, J E

    1987-10-01

    A static, deterministic computer model, programmed in Microsoft Basic for IBM PC and Apple Macintosh computers, was developed to calculate production efficiency (cost per kg of product) for nine alternative types of crossbreeding system involving four breeds of swine. The model simulates efficiencies for four purebred and 60 alternative two-, three- and four-breed rotation, rotaterminal, backcross and static cross systems. Crossbreeding systems were defined as including all purebred, crossbred and commercial matings necessary to maintain a total of 10,000 farrowings. Driving variables for the model are mean conception rate at first service and for an 8-wk breeding season, litter size born, preweaning survival rate, postweaning average daily gain, feed-to-gain ratio and carcass backfat. Predictions are computed using breed direct genetic and maternal effects for the four breeds, plus individual, maternal and paternal specific heterosis values, input by the user. Inputs required to calculate the number of females farrowing in each sub-system include the proportion of males and females replaced each breeding cycle in purebred and crossbred populations, the proportion of male and female offspring in seedstock herds that become breeding animals, and the number of females per boar. Inputs required to calculate the efficiency of terminal production (cost-to-product ratio) for each sub-system include breeding herd feed intake, gilt development costs, feed costs and labor and overhead costs. Crossbreeding system efficiency is calculated as the weighted average of sub-system cost-to-product ratio values, weighting by the number of females farrowing in each sub-system.

  8. Differential patterns of laptop use and associated musculoskeletal discomfort in male and female college students.

    PubMed

    Bubric, Katherine; Hedge, Alan

    2016-11-22

    Laptop computers have surpassed desktop computers in popularity, especially among college student users. The portability of these devices raises concerns regarding healthy usage patterns in different settings and there is a need to investigate the postures with which these devices are being used and associated reports of musculoskeletal discomfort. This study investigated the configurations in which laptops are used and the prevalence of musculoskeletal discomfort associated with laptop use in a survey of college students. The purpose of this was to identify differences in discomfort and/or postural choice between males and females. A sample of 90 male and 96 female college students completed an online questionnaire consisting of demographic questions, musculoskeletal discomfort indicators and questions regarding configurations of laptop use. Over 53% of participants reported experiencing musculoskeletal discomfort while using a laptop computer, with females reporting a higher prevalence of neck discomfort (p = 0.05) and shoulder discomfort (p = 0.006) than males. Participants reported using a laptop most commonly in positions at a  desk and on a bed. Females were more likely than males to use a laptop on a bed with the computer positioned on their lap or with their legs crossed (p < 0.05). Males were more likely than females to work in positions necessitating a large trunk deviation to operate the laptop (p < 0.05), such as "sitting on a  sofa with your feet on the floor (knees at 90°), bending over to use laptop that is resting on a  coffee table or ottoman in front of you". A significant proportion of college students report experiencing musculoskeletal discomfort associated with laptop computer use. Sex differences exist in both choice of configurations and musculoskeletal discomfort associated with laptop use. Due to the portability of laptop computers, they are used in a variety of configurations and environments. This study identifies a number of different ways that laptop computers are used that have not been considered in previous research. These patterns of laptop use can be used to inform future work on the impact of technology use on discomfort.

  9. Exploring sex differences in drug use, health and service use characteristics among young urban crack users in Brazil.

    PubMed

    Bertoni, Neilane; Burnett, Chantal; Cruz, Marcelo Santos; Andrade, Tarcisio; Bastos, Francisco I; Leal, Erotildes; Fischer, Benedikt

    2014-08-28

    Studies have shown important gender differences among drug (including crack) users related to: drug use patterns; health risks and consequences; criminal involvement; and service needs/use. Crack use is prevalent in Brazil; however, few comparative data by sex exist. We examined and compared by sex key drug use, health, socio-economic indicators and service use in a bi-city sample of young (18-24 years), regular and marginalized crack users in Brazil. Study participants (total n = 159; n = 124 males and n = 35 females) were recruited by community-based methods from impoverished neighborhoods in Rio de Janeiro and Salvador. Assessments occurred by an anonymous interviewer-administered questionnaire and serum collection for blood-borne virus testing between November 2010 and June 2011. Descriptive statistics and differences for key variables by sex were computed; in addition, a 'chi-squared automatic interaction detector' ('CHAID') analysis explored potential primary factors differentiating male and female participants. Most participants were non-white, and had low education and multiple income sources. More women had unstable housing and income from sex work and/or panhandling/begging, whereas more men were employed. Both groups indicated multi-year histories of and frequent daily crack use, but virtually no drug injection histories. Men reported more co-use of other drugs. More women were: involved in sex-for-drug exchanges; blood-borne virus (BBV) tested and HIV+. Both groups reported similar physical and mental health patterns; however women more commonly utilized social or health services. The CHAID analysis identified sex work; paid work; begging/panhandling; as well as physical and mental health status (all at p < 0.05) as primary differentiating factors by sex. Crack users in our study showed notable differences by sex, including socio-economic indicators, drug co-use patterns, sex risks/work, BBV testing and status, and service utilization. Results emphasize the need for targeted special interventions and services for males and female crack users in Brazil.

  10. Perceived competence in computer use as a moderator of musculoskeletal strain in VDU work: an ergonomics intervention case.

    PubMed

    Tuomivaara, S; Ketola, R; Huuhtanen, P; Toivonen, R

    2008-02-01

    Musculoskeletal strain and other symptoms are common in visual display unit (VDU) work. Psychosocial factors are closely related to the outcome and experience of musculoskeletal strain. The user-computer relationship from the viewpoint of the quality of perceived competence in computer use was assessed as a psychosocial stress indicator. It was assumed that the perceived competence in computer use moderates the experience of musculoskeletal strain and the success of the ergonomics intervention. The participants (n = 124, female 58%, male 42%) worked with VDU for more than 4 h per week. They took part in an ergonomics intervention and were allocated into three groups: intensive; education; and reference group. Musculoskeletal strain, the level of ergonomics of the workstation assessed by the experts in ergonomics and amount of VDU work were estimated at the baseline and at the 10-month follow-up. Age, gender and the perceived competence in computer use were assessed at the baseline. The perceived competence in computer use predicted strain in the upper and the lower part of the body at the follow-up. The interaction effect shows that the intensive ergonomics intervention procedure was the most effective among participants with high perceived competence. The interpretation of the results was that an anxiety-provoking and stressful user-computer relationship prevented the participants from being motivated and from learning in the ergonomics intervention. In the intervention it is important to increase the computer competence along with the improvements of physical workstation and work organization.

  11. Altered subjective reward valuation among female heavy marijuana users

    PubMed Central

    Hefner, Kathryn R.; Starr, Mark. J.

    2016-01-01

    Maladaptive decision-making is a cardinal feature of drug use, contributing to ongoing use, and reflecting alterations in how drug users assess uncertain reward value. Accumulating evidence indicates the consequences of heavy marijuana use are worse for female versus male animals and humans, but research assessing sex differences in reward-related decision-making among marijuana users remains scarce. We examined sex differences in the subjective valuation of certain and uncertain rewards among heavy marijuana users (52; 26 male and 26 female) and controls (52; 26 male and 26 female). We offered male and female heavy marijuana users and controls monetary rewards of certain and uncertain (probabilistic) values. We measured how preferences for uncertain rewards varied by the objective value of those rewards, moderators of reward uncertainty, marijuana use, and sex. Men were more sensitive to changes in the objective value of uncertain rewards than women. However, this effect of sex differed by marijuana group. Female heavy marijuana users were more sensitive to changes in uncertain reward value, particularly when the ‘stakes’ were high (i.e., greater difference between potential uncertain rewards), than female controls. Female heavy marijuana users’ sensitivity to changes in the value of high stakes uncertain rewards was comparable to male marijuana users and controls. In contrast, male marijuana users’ sensitivity to changes in the value of high stakes uncertain rewards did not differ from male controls. These results suggest sex differences in sensitivity to high risk rewards may be one pathway contributing to severer consequences of heavy marijuana use among women. PMID:27936816

  12. Patterns of User Engagement With the Mobile App, Manage My Pain: Results of a Data Mining Investigation

    PubMed Central

    Rahman, Quazi Abidur; Pirbaglou, Meysam; Ritvo, Paul; Heffernan, Jane M; Clarke, Hance; Katz, Joel

    2017-01-01

    Background Pain is one of the most prevalent health-related concerns and is among the top 3 most common reasons for seeking medical help. Scientific publications of data collected from pain tracking and monitoring apps are important to help consumers and healthcare professionals select the right app for their use. Objective The main objectives of this paper were to (1) discover user engagement patterns of the pain management app, Manage My Pain, using data mining methods; and (2) identify the association between several attributes characterizing individual users and their levels of engagement. Methods User engagement was defined by 2 key features of the app: longevity (number of days between the first and last pain record) and number of records. Users were divided into 5 user engagement clusters employing the k-means clustering algorithm. Each cluster was characterized by 6 attributes: gender, age, number of pain conditions, number of medications, pain severity, and opioid use. Z tests and chi-square tests were used for analyzing categorical attributes. Effects of gender and cluster on numerical attributes were analyzed using 2-way analysis of variances (ANOVAs) followed up by pairwise comparisons using Tukey honest significant difference (HSD). Results The clustering process produced 5 clusters representing different levels of user engagement. The proportion of males and females was significantly different in 4 of the 5 clusters (all P ≤.03). The proportion of males was higher than females in users with relatively high longevity. Mean ages of users in 2 clusters with high longevity were higher than users from other 3 clusters (all P <.001). Overall, males were significantly older than females (P <.001). Across clusters, females reported more pain conditions than males (all P <.001). Users from highly engaged clusters reported taking more medication than less engaged users (all P <.001). Females reported taking a greater number of medications than males (P =.04). In 4 of 5 clusters, the percentage of males taking an opioid was significantly greater (all P ≤.05) than that of females. The proportion of males with mild pain was significantly higher than that of females in 3 clusters (all P ≤.008). Conclusions Although most users of the app reported being female, male users were more likely to be highly engaged in the app. Users in the most engaged clusters self-reported a higher number of pain conditions, a higher number of current medications, and a higher incidence of opioid usage. The high engagement by males in these clusters does not appear to be driven by pain severity which may, in part, be the case for females. Use of a mobile pain app may be relatively more attractive to highly-engaged males than highly-engaged females, and to those with relatively more complex chronic pain problems. PMID:28701291

  13. Patterns of User Engagement With the Mobile App, Manage My Pain: Results of a Data Mining Investigation.

    PubMed

    Rahman, Quazi Abidur; Janmohamed, Tahir; Pirbaglou, Meysam; Ritvo, Paul; Heffernan, Jane M; Clarke, Hance; Katz, Joel

    2017-07-12

    Pain is one of the most prevalent health-related concerns and is among the top 3 most common reasons for seeking medical help. Scientific publications of data collected from pain tracking and monitoring apps are important to help consumers and healthcare professionals select the right app for their use. The main objectives of this paper were to (1) discover user engagement patterns of the pain management app, Manage My Pain, using data mining methods; and (2) identify the association between several attributes characterizing individual users and their levels of engagement. User engagement was defined by 2 key features of the app: longevity (number of days between the first and last pain record) and number of records. Users were divided into 5 user engagement clusters employing the k-means clustering algorithm. Each cluster was characterized by 6 attributes: gender, age, number of pain conditions, number of medications, pain severity, and opioid use. Z tests and chi-square tests were used for analyzing categorical attributes. Effects of gender and cluster on numerical attributes were analyzed using 2-way analysis of variances (ANOVAs) followed up by pairwise comparisons using Tukey honest significant difference (HSD). The clustering process produced 5 clusters representing different levels of user engagement. The proportion of males and females was significantly different in 4 of the 5 clusters (all P ≤.03). The proportion of males was higher than females in users with relatively high longevity. Mean ages of users in 2 clusters with high longevity were higher than users from other 3 clusters (all P <.001). Overall, males were significantly older than females (P <.001). Across clusters, females reported more pain conditions than males (all P <.001). Users from highly engaged clusters reported taking more medication than less engaged users (all P <.001). Females reported taking a greater number of medications than males (P =.04). In 4 of 5 clusters, the percentage of males taking an opioid was significantly greater (all P ≤.05) than that of females. The proportion of males with mild pain was significantly higher than that of females in 3 clusters (all P ≤.008). Although most users of the app reported being female, male users were more likely to be highly engaged in the app. Users in the most engaged clusters self-reported a higher number of pain conditions, a higher number of current medications, and a higher incidence of opioid usage. The high engagement by males in these clusters does not appear to be driven by pain severity which may, in part, be the case for females. Use of a mobile pain app may be relatively more attractive to highly-engaged males than highly-engaged females, and to those with relatively more complex chronic pain problems. ©Quazi Abidur Rahman, Tahir Janmohamed, Meysam Pirbaglou, Paul Ritvo, Jane M Heffernan, Hance Clarke, Joel Katz. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 12.07.2017.

  14. Methods for Improving the User-Computer Interface. Technical Report.

    ERIC Educational Resources Information Center

    McCann, Patrick H.

    This summary of methods for improving the user-computer interface is based on a review of the pertinent literature. Requirements of the personal computer user are identified and contrasted with computer designer perspectives towards the user. The user's psychological needs are described, so that the design of the user-computer interface may be…

  15. High-Performance Computing User Facility | Computational Science | NREL

    Science.gov Websites

    User Facility High-Performance Computing User Facility The High-Performance Computing User Facility technologies. Photo of the Peregrine supercomputer The High Performance Computing (HPC) User Facility provides Gyrfalcon Mass Storage System. Access Our HPC User Facility Learn more about these systems and how to access

  16. Designing for multiple global user populations: increasing resource allocation efficiency for greater sustainability.

    PubMed

    Nadadur, G; Parkinson, M B

    2012-01-01

    This paper proposes a method to identify opportunities for increasing the efficiency of raw material allocation decisions for products that are simultaneously targeted at multiple user populations around the world. The values of 24 body measures at certain key percentiles were used to estimate the best-fitting anthropometric distributions for female and male adults in nine national populations, which were selected to represent the diverse target markets multinational companies must design for. These distributions were then used to synthesize body measure data for combined populations with a 1:1 female:male ratio. An anthropometric range metric (ARM) was proposed for assessing the variation of these body measures across the populations. At any percentile, ARM values were calculated as the percentage difference between the highest and lowest anthropometric values across the considered user populations. Based on their magnitudes, plots of ARM values computed between the 1st and 99 th percentiles for each body measure were grouped into low, medium, and high categories. This classification of body measures was proposed as a means of selecting the most suitable strategies for designing raw material-efficient products. The findings in this study and the contributions of subsequent work along these lines are expected to help achieve greater efficiencies in resource allocation in global product development.

  17. Effects of transnational migration on drug use: an ethnographic study of Nepali female heroin users in Hong Kong.

    PubMed

    Tang, Wai-Man

    2015-01-01

    Past studies of female drug users in South Asia tend to focus on their plights, for instance, how they have been driven to drug use and encounter more problems than their male counterparts, such as HIV/AIDS and sexual abuse. Few studies focus on their active role--how they actively make use of resources in the external environment to construct their desired femininity through drug consumption. Furthermore, little is known about the situation of female South Asian drug users who are living overseas. This paper is a study of transnational migration, drug use and gender--how transnational migration influences the drug use of female transnational migrants. An 18-month ethnography has been carried out in a Nepali community in Hong Kong and 13 informants were interviewed. Data were coded and analyzed by using the grounded-theory approach. Themes related to the drug use of the female Nepali heroin users were identified. The findings show that there are three important themes that significantly affect the drug use of female Nepali heroin users, which include (1) their relationships with intimate partners, (2) their means of support, and (3) their legal status in migration. The findings are consistent with the concept of post-structuralism in gender and transnationalism theories. Female Nepali heroin users in Hong Kong are neither active agents nor passive victims; their active/passive role is largely dependent on their reconfigured opportunities and constraints in transnational migration. Thus, transnationalism should be taken as an important perspective to study the situation of female drug users in a globalized context. Copyright © 2014 Elsevier B.V. All rights reserved.

  18. The Effect of Computer Usage in Internet Café on Cigarette Smoking and Alcohol Use among Chinese Adolescents and Youth: A Longitudinal Study

    PubMed Central

    Wu, Liyun; Delva, Jorge

    2012-01-01

    We used longitudinal data to investigate the relationship between computer use in internet cafés and smoking/drinking behavior among Chinese adolescents and young adults. Data are from two waves of the China Health and Nutrition Survey (2004 and 2006). Fixed effects models were used to examine if changes in internet café use were associated with changes in cigarette smoking and drinking of alcohol. Male café users spent on average 17.3 hours in front of the computer/week. This was associated with an increase in the probability of being a current smoker by 13.3% and with smoking 1.7 more cigarettes. Female café users spent on average 11 hours on the computer/week. This was associated with an increase in the probability of drinking wine and/or liquor by 14.74% and was not associated with smoking. Internet cafés are an important venue by which adolescent and young adults in China are exposed to smoking and drinking. Multi-component interventions are needed ranging from policies regulating cigarette and alcohol availability in these venues to anti-tobacco campaigns aimed at the general population but also at individuals who frequent these establishments. PMID:22470305

  19. The effect of computer usage in internet café on cigarette smoking and alcohol use among chinese adolescents and youth: a longitudinal study.

    PubMed

    Wu, Liyun; Delva, Jorge

    2012-02-01

    We used longitudinal data to investigate the relationship between computer use in internet cafés and smoking/drinking behavior among Chinese adolescents and young adults. Data are from two waves of the China Health and Nutrition Survey (2004 and 2006). Fixed effects models were used to examine if changes in internet café use were associated with changes in cigarette smoking and drinking of alcohol. Male café users spent on average 17.3 hours in front of the computer/week. This was associated with an increase in the probability of being a current smoker by 13.3% and with smoking 1.7 more cigarettes. Female café users spent on average 11 hours on the computer/week. This was associated with an increase in the probability of drinking wine and/or liquor by 14.74% and was not associated with smoking. Internet cafés are an important venue by which adolescent and young adults in China are exposed to smoking and drinking. Multi-component interventions are needed ranging from policies regulating cigarette and alcohol availability in these venues to anti-tobacco campaigns aimed at the general population but also at individuals who frequent these establishments.

  20. Research on gender differences in online health communities.

    PubMed

    Liu, Xuan; Sun, Min; Li, Jia

    2018-03-01

    With the growing concern about health issues and the emergence of online communities based on user-generated content (UGC), more and more people are participating in online health communities (OHCs) to exchange opinions and health information. This paper aims to examine whether and how male and female users behave differently in OHCs. Using data from a leading diabetes community in China (Tianmijiayuan), we incorporate three different techniques: topic modeling analysis, sentiment analysis and friendship network analysis to investigate gender differences in chronic online health communities. The results indicated that (1) Male users' posting content was usually more professional and included more medical terms. Comparatively speaking, female users were more inclined to seek emotional support in the health communities. (2) Female users expressed more negative emotions than male users did, especially anxiety and sadness. (3) In addition, male users were more centered and influential in the friendship network than were women. Through these analyses, our research revealed the behavioral characteristics and needs for different gender users in online health communities. Gaining a deeper understanding of gender differences in OHCs can serve as guidance to better meet the information needs, emotional needs and relationship needs of male and female patients. Copyright © 2018 Elsevier B.V. All rights reserved.

  1. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  2. Internet use among Turkish adolescents.

    PubMed

    Tahiroglu, Aysegul Yolga; Celik, Gonca G; Uzel, Mehtap; Ozcan, Neslihan; Avci, Ayse

    2008-10-01

    The aim of this study was to investigate Internet use habits and problematic Internet use (PIU) in Turkish adolescents. Participants were 3,975 undergraduate students, 7.6% of whom used the Internet for more than 12 hours weekly. The Online Cognition Scale (OCS) was used. The most common purpose for using the Internet was playing games, followed by general information search. Female users mostly preferred searching for general information; male users preferred playing games (p < 0.001, gamma = 995.205). The most preferred type of game was violent games. While preference for strategy and fantasy role-play (FRP) games increased with age, preference for other games decreased (p < 0.0001, gamma = 283.767). Participants who used the Internet mostly for general information searches and school-related searches had lower OCS scores (p < 0.0001). The highest OCS scores were related to violent games, followed by FRP, strategy, and sports and motor racing games. Computers and the Internet are useful, important inventions, but like other inventions, if used improperly, they may be harmful. Risk of harm raises concerns about who should use the Internet and computers, and where, when, and why the Internet and computers should be used.

  3. Female methamphetamine users: social characteristics and sexual risk behavior.

    PubMed

    Semple, Shirley J; Grant, Igor; Patterson, Thomas L

    2004-01-01

    The primary objective of this research was to expand our knowledge regarding the personal and social characteristics of female methamphetamine (meth) users, their motivations for using meth, patterns of meth use, medical and social problems associated with meth use, and the relationship between meth use and sexual risk behaviors. The sample consisted of 98 HIV-negative, heterosexually-identified, meth-using females residing in San Diego, California. Female meth users were characterized by personal and social disadvantage, high rates of psychiatric symptomatology, and high levels of sexual risk behavior, including multiple partners, risky partner types (e.g., anonymous sex partners), and high rates of unprotected vaginal and oral sex. Meth use was also associated with the subjective positive experience of sex. These finding suggest that behavioral interventions should be tailored to the social characteristics of female meth users, and program content should reflect the intertwining of women's sexual experience and meth use.

  4. Use of dietary supplements by elite figure skaters.

    PubMed

    Ziegler, Paula J; Nelson, Judy A; Jonnalagadda, Satya S

    2003-09-01

    The present study examined the prevalence of dietary supplement use among elite figure skaters, gender differences in supplement use, and differences in nutrient intake of supplement users versus non-users. Male (n = 46) and female (n = 59) figure skaters completed a supplement survey and 3-day food records. Descriptive analysis, chi-square test, and independent t tests were used to analyze the data. Sixty-five percent of male (n = 30) and 76% of female (n = 45) figure skaters reported use of supplements. Forty-seven percent of males and 55% of females reported daily use of supplements. Multivitamin-mineral supplements were the most popular dietary supplements consumed by figure skaters. Significant gender differences were observed in the use of multivitamin-mineral supplements (61% males vs. 83% females, p < .05). Echinacea and ginseng were popular herbal supplements used by these skaters. The 3 main reasons given by male figure skaters for taking supplements were: to provide more energy (41%), to prevent illness or disease (34%), and to enhance performance (21%). Among female figure skaters, the 3 main reasons given were: to prevent illness or disease (61%), to provide more energy (39%), and to make up for an inadequate diet (28%). Significant differences (p < .05) were observed in protein, total fat, saturated fat, polyunsaturated fat intakes, and % energy from carbohydrate and total fat of male supplement users versus non-users, with supplement users having higher intakes except for percent energy from carbohydrate. Sodium was the only nutrient significantly different (p < .05) among female supplement users versus non-users, with supplement users having lower intakes. Given the popularity of dietary supplements, it is important to understand the factors influencing athletes' use of supplements, their knowledge and attitudes regarding supplements, dosage of supplements used, and the effectiveness of these dietary supplements in meeting the goals of the athletes.

  5. Top-down methodology for human factors research

    NASA Technical Reports Server (NTRS)

    Sibert, J.

    1983-01-01

    User computer interaction as a conversation is discussed. The design of user interfaces which depends on viewing communications between a user and the computer as a conversion is presented. This conversation includes inputs to the computer (outputs from the user), outputs from the computer (inputs to the user), and the sequencing in both time and space of those outputs and inputs. The conversation is viewed from the user's side of the conversation. Two languages are modeled: the one with which the user communicates with the computer and the language where communication flows from the computer to the user. Both languages exist on three levels; the semantic, syntactic and lexical. It is suggested that natural languages can also be considered in these terms.

  6. Musculoskeletal symptoms and associated risk factors among office workers with high workload computer use.

    PubMed

    Cho, Chiung-Yu; Hwang, Yea-Shwu; Cherng, Rong-Ju

    2012-09-01

    Although the prevalence of reported discomfort by computer workers is high, the impact of high computer workload on musculoskeletal symptoms remains unclear. The purpose of this study was to investigate the prevalence of musculoskeletal symptoms for office workers with high computer workload. The association between risk factors and musculoskeletal symptoms was also assessed. Two questionnaires were posted on the Web sites of 3 companies and 1 university to recruit computer users in Tainan, Taiwan, during May to July 2009. The 12-item Chinese Health Questionnaire and Musculoskeletal Symptom Questionnaire were chosen as the evaluation tools for musculoskeletal symptoms and its associated risk factors. Chinese Health Questionnaire greater than 5 and computer usage greater than 7 h/d were used to as the cutoff line to divide groups. Descriptive statistics were computed for mean values and frequencies. χ(2) Analysis was used to determine significant differences between groups. A 0.05 level of significance of was used for statistical comparisons. A total of 254 subjects returned the questionnaire, of which 203 met the inclusion criteria. The 3 leading regions of musculoskeletal symptoms among the computer users were the shoulder (73%), neck (71%), and upper back (60%) areas. Similarly, the 3 leading regions of musculoskeletal symptoms among the computer users with high workload were shoulder (77.3%), neck (75.6%), and upper back (63.9%) regions. High psychologic distress was significantly associated with shoulder and upper back complaints (odds ratio [OR], 3.46; OR, 2.24), whereas a high workload was significantly associated with lower back complaints (OR, 1.89). Females were more likely to report shoulder complaints (OR, 2.25). This study found that high psychologic distress was significantly associated with shoulder and upper back pain, whereas high workload was associated with lower back pain. Women tended to have a greater risk of shoulder complaints than men. Developing an intervention that addresses both physical and psychologic problems is important for future studies. Copyright © 2012 National University of Health Sciences. Published by Mosby, Inc. All rights reserved.

  7. Conjunctival impression cytology in computer users.

    PubMed

    Kumar, S; Bansal, R; Khare, A; Malik, K P S; Malik, V K; Jain, K; Jain, C

    2013-01-01

    It is known that the computer users develop the features of dry eye. To study the cytological changes in the conjunctiva using conjunctival impression cytology in computer users and a control group. Fifteen eyes of computer users who had used computers for more than one year and ten eyes of an age-and-sex matched control group (those who had not used computers) were studied by conjunctival impression cytology. Conjunctival impression cytology (CIC) results in the control group were of stage 0 and stage I while the computer user group showed CIC results between stages II to stage IV. Among the computer users, the majority ( > 90 %) showed stage III and stage IV changes. We found that those who used computers daily for long hours developed more CIC changes than those who worked at the computer for a shorter daily duration. © NEPjOPH.

  8. Computer Assistance in Information Work. Part I: Conceptual Framework for Improving the Computer/User Interface in Information Work. Part II: Catalog of Acceleration, Augmentation, and Delegation Functions in Information Work.

    ERIC Educational Resources Information Center

    Paisley, William; Butler, Matilda

    This study of the computer/user interface investigated the role of the computer in performing information tasks that users now perform without computer assistance. Users' perceptual/cognitive processes are to be accelerated or augmented by the computer; a long term goal is to delegate information tasks entirely to the computer. Cybernetic and…

  9. Male and female ecstasy users: differences in patterns of use, sleep quality and mental health outcomes.

    PubMed

    Ogeil, Rowan P; Rajaratnam, Shantha M W; Broadbear, Jillian H

    2013-09-01

    Ecstasy users report a number of adverse effects following use including mood and sleep disturbances. The present study examined differences in characteristics of ecstasy use (amount, frequency of use, reported harm resulting from use) between males and females and assessed relationships between ecstasy use, sleep quality and mental health outcomes. An online survey of 268 ecstasy users (54.1% male, 45.9% female) was conducted. Validated sleep instruments assessing sleep quality and excessive daytime sleepiness, as well as questionnaires regarding physical and mental health (measured using the short-form health survey 12 (SF-12) and details of drug use were included. Male ecstasy users reported taking larger amounts of ecstasy, but were not more frequent users compared to females. Female ecstasy users were more likely to report increased harm following ecstasy including: feelings of guilt and remorse; failing to do what was normally expected of them; and having been told by others to cut down their ecstasy use. There were interactions between amount and gender and frequency and gender in predicting use of sleep medication and daytime dysfunction. There was a positive correlation between poorer sleep quality and negative mood, although this relationship was not moderated by sex. There is a significant association between sleep quality and mood disturbance in ecstasy users suggesting that these negative outcomes are co-morbid. These findings have implications for the treatment and advice given to ecstasy users who are experiencing sleep and/or mood related complaints. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  10. ABSENTEE COMPUTATIONS IN A MULTIPLE-ACCESS COMPUTER SYSTEM.

    DTIC Science & Technology

    require user interaction, and the user may therefore want to run these computations ’ absentee ’ (or, user not present). A mechanism is presented which...provides for the handling of absentee computations in a multiple-access computer system. The design is intended to be implementation-independent...Some novel features of the system’s design are: a user can switch computations from interactive to absentee (and vice versa), the system can

  11. Evaluation of forearm support provided by the Workplace Board on perceived tension, comfort and productivity in pregnant and non-pregnant computer users.

    PubMed

    Slot, Tegan; Charpentier, Karine; Dumas, Geneviève; Delisle, Alain; Leger, Andy; Plamondon, André

    2009-01-01

    The aim of the study was to evaluate the effect of forearm support provided by the Workplace Board on perceived tension, comfort and productivity among pregnant and non-pregnant female computer workers. Ten pregnant and 18 non-pregnant women participated in the study. Participants completed three sets of tension/discomfort questionnaires at two week intervals. The first set was completed prior to any workstation intervention; the second set was completed after two weeks working with an ergonomically adjusted workstation; the third set was completed after two weeks working with the Workplace Board integrated into the office workstation. With the Workplace Board, decreased perceived tension was reported in the left shoulder, wrist and low back in non-pregnant women only. The Board was generally liked by all participants, and increased comfort and productivity in all areas, with the exception of a negative effect on productivity of general office tasks. The board is suitable for integration in most office workstations and for most users, but has no special benefits for pregnant women.

  12. A data mining technique for discovering distinct patterns of hand signs: implications in user training and computer interface design.

    PubMed

    Ye, Nong; Li, Xiangyang; Farley, Toni

    2003-01-15

    Hand signs are considered as one of the important ways to enter information into computers for certain tasks. Computers receive sensor data of hand signs for recognition. When using hand signs as computer inputs, we need to (1) train computer users in the sign language so that their hand signs can be easily recognized by computers, and (2) design the computer interface to avoid the use of confusing signs for improving user input performance and user satisfaction. For user training and computer interface design, it is important to have a knowledge of which signs can be easily recognized by computers and which signs are not distinguishable by computers. This paper presents a data mining technique to discover distinct patterns of hand signs from sensor data. Based on these patterns, we derive a group of indistinguishable signs by computers. Such information can in turn assist in user training and computer interface design.

  13. 78 FR 18353 - Guidance for Industry: Blood Establishment Computer System Validation in the User's Facility...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-26

    ...; (Formerly FDA-2007D-0393)] Guidance for Industry: Blood Establishment Computer System Validation in the User... Industry: Blood Establishment Computer System Validation in the User's Facility'' dated April 2013. The... document entitled ``Guidance for Industry: Blood Establishment Computer System Validation in the User's...

  14. Sex differences in impulsivity and brain morphometry in methamphetamine users

    PubMed Central

    Kogachi, Shannon; Chang, Linda; Alicata, Daniel; Cunningham, Eric; Ernst, Thomas

    2016-01-01

    Methamphetamine (METH) is an addictive stimulant, and METH users have abnormal brain structures and function. The aims of this study were to investigate the relationships between impulsivity, brain structures, and possible sex-specific differences between METH users and non-drug using Controls. Structural MRI and the Barratt Impulsiveness Scale (BIS) questionnaire were completed in 124 subjects: 62 METH (ages 41.2 ± 1.4 years, 34 males) and 62 Controls (ages 43.3 ± 2.3 years, 36 males). Independent and interactive effects of METH use status and sex were evaluated. Relationships between METH usage characteristics, brain morphometry, and impulsivity scores were examined. METH users had higher impulsivity scores, on both the Cognitive and Behavioral Factors from the BIS (p < 0.0001–0.0001). Compared with same-sex Controls, male METH users had larger, while female METH users had smaller, right superior frontal cortex (interaction-p = 0.0005). The male METH users with larger frontal volumes and female METH users with smaller or thinner frontal cortices had greater Cognitive impulsivity (interaction-p ≤ 0.05). Only female METH users showed relatively larger nucleus accumbens (interaction-p = 0.03). Greater impulsivity and thinner frontal cortices in METH users are validated. Larger superior frontal cortex in male METH users with greater cognitive impulsivity suggest decreased dendritic pruning during adolescence might have contributed to their impulsive and drug use behaviors. In the female METH users, smaller frontal cortices and the associated greater impulsivity suggest greater neurotoxicity to these brain regions, while their relatively larger nucleus accumbens suggest an estrogen-mediated neuroprotective glial response. Men and women may be affected differently by METH use. PMID:27095357

  15. Sex differences in impulsivity and brain morphometry in methamphetamine users.

    PubMed

    Kogachi, Shannon; Chang, Linda; Alicata, Daniel; Cunningham, Eric; Ernst, Thomas

    2017-01-01

    Methamphetamine (METH) is an addictive stimulant, and METH users have abnormal brain structures and function. The aims of this study were to investigate the relationships between impulsivity, brain structures, and possible sex-specific differences between METH users and non-drug using Controls. Structural MRI and the Barratt Impulsiveness Scale (BIS) questionnaire were completed in 124 subjects: 62 METH (ages 41.2 ± 1.4 years, 34 males) and 62 Controls (ages 43.3 ± 2.3 years, 36 males). Independent and interactive effects of METH use status and sex were evaluated. Relationships between METH usage characteristics, brain morphometry, and impulsivity scores were examined. METH users had higher impulsivity scores, on both the Cognitive and Behavioral Factors from the BIS (p < 0.0001-0.0001). Compared with same-sex Controls, male METH users had larger, while female METH users had smaller, right superior frontal cortex (interaction-p = 0.0005). The male METH users with larger frontal volumes and female METH users with smaller or thinner frontal cortices had greater Cognitive impulsivity (interaction-p ≤ 0.05). Only female METH users showed relatively larger nucleus accumbens (interaction-p = 0.03). Greater impulsivity and thinner frontal cortices in METH users are validated. Larger superior frontal cortex in male METH users with greater cognitive impulsivity suggest decreased dendritic pruning during adolescence might have contributed to their impulsive and drug use behaviors. In the female METH users, smaller frontal cortices and the associated greater impulsivity suggest greater neurotoxicity to these brain regions, while their relatively larger nucleus accumbens suggest an estrogen-mediated neuroprotective glial response. Men and women may be affected differently by METH use.

  16. Use of information and communication technology among dental students at the University of Jordan.

    PubMed

    Rajab, Lamis D; Baqain, Zaid H

    2005-03-01

    The aim of this study was to investigate the current knowledge, skills, and opinions of undergraduate dental students at the University of Jordan with respect to information communication technology (ICT). Dental students from the second, third, fourth, and fifth years were asked to complete a questionnaire presented in a lecture at the end of the second semester in the 2002-03 academic year. The response rate was 81 percent. Besides free and unlimited access to computers at the school of dentistry, 74 percent of the students had access to computers at home. However, 44 percent did not use a computer regularly. Male students were more regular and longer users of computers than females (p<0.001). A significant number of students (70 percent) judged themselves competent in information technology (IT) skills. More males felt competent in basic IT skills than did females (p<0.05). More than two-thirds acquired their computer skills through sources other than at the university. The main educational use of computers was accessing the Internet, word processing, multimedia, presentations, Medline search, and data management. More clinical students felt competent in word-processing skills (p<0.05) and many more used word processing for their studies (p<0.001) than did preclinical students. More males used word processing for their studies than females (p<0.001). Students used computers for personal activities more frequently than for academic reasons. More males used computers for both academic (p<0.01) and personal activities (p<0.001) than did females. All students had access to the Internet at the university, and 54 percent had access at home. A high percentage of students (94 percent) indicated they were comfortable using the Internet, 75 percent said they were confident in the accuracy, and 80 percent said they were confident in the relevance of information obtained from the Internet. Most students (90 percent) used email. Most students (83 percent) supported the idea of placing lectures on the web, and 61.2 percent indicated that this would not influence lecture attendance. Students used the Internet more for personal reasons than for the study of dentistry. More clinical students used the Internet for dentistry than preclinical students (p<0.001). More males than females used the Internet for dentistry (p<0.01) as well as for pleasure (p<0.01). Time and availability were the main obstacles to Internet use. Dental students at the University of Jordan have access to substantial IT resources and demonstrated attitudes toward the computer and Internet technology and use that were similar to other students in other nations. However, the educational use of ICT among Jordanian students remains low.

  17. Exploring functions of the lost seeking devices for people with dementia.

    PubMed

    Chen, Yung-Ching; Leung, Cherng-Yee

    2012-01-01

    This paper utilized a user-centered design approach as the foundation for technology in dementia care in order to improve the quality of telemedicine service. A status-quo analysis and questionnaire survey were conducted to explore the actual needs of the elders in using the lost seeking devices and the problems they encountered. In total, 37 caregivers for people with dementia were surveyed (20 female, 17 male, M = 50.08, SD = 15.47). The dementia-patients: 16 are male, 21 female (M = 72.75, SD = 10.23). Through analysis and induction, 3 problems were identified: poor information transmission, low user acceptance, individual material security anxiety. 2-4 improvement proposals are suggested for each problem. Most care-givers hope technological products would increase the efficiency and safety, but they also think it's too expensive and lack of computer skills. This result demonstrates the choice of seeking methods depends on the education level of the caregivers and most of them are elders. The concern of data leakage is also related to today's fraud issue, which may be the reason limiting the promotion of electronic products and biometrics. Further research is required, suggesting researchers should pursue improvements in lost seeking design devices in dementia for caregivers.

  18. Design and development of an automated, portable and handheld tablet personal computer-based data acquisition system for monitoring electromyography signals during rehabilitation.

    PubMed

    Ahamed, Nizam U; Sundaraj, Kenneth; Poo, Tarn S

    2013-03-01

    This article describes the design of a robust, inexpensive, easy-to-use, small, and portable online electromyography acquisition system for monitoring electromyography signals during rehabilitation. This single-channel (one-muscle) system was connected via the universal serial bus port to a programmable Windows operating system handheld tablet personal computer for storage and analysis of the data by the end user. The raw electromyography signals were amplified in order to convert them to an observable scale. The inherent noise of 50 Hz (Malaysia) from power lines electromagnetic interference was then eliminated using a single-hybrid IC notch filter. These signals were sampled by a signal processing module and converted into 24-bit digital data. An algorithm was developed and programmed to transmit the digital data to the computer, where it was reassembled and displayed in the computer using software. Finally, the following device was furnished with the graphical user interface to display the online muscle strength streaming signal in a handheld tablet personal computer. This battery-operated system was tested on the biceps brachii muscles of 20 healthy subjects, and the results were compared to those obtained with a commercial single-channel (one-muscle) electromyography acquisition system. The results obtained using the developed device when compared to those obtained from a commercially available physiological signal monitoring system for activities involving muscle contractions were found to be comparable (the comparison of various statistical parameters) between male and female subjects. In addition, the key advantage of this developed system over the conventional desktop personal computer-based acquisition systems is its portability due to the use of a tablet personal computer in which the results are accessible graphically as well as stored in text (comma-separated value) form.

  19. QUEST Hanford Site Computer Users - What do they do?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    WITHERSPOON, T.T.

    2000-03-02

    The Fluor Hanford Chief Information Office requested that a computer-user survey be conducted to determine the user's dependence on the computer and its importance to their ability to accomplish their work. Daily use trends and future needs of Hanford Site personal computer (PC) users was also to be defined. A primary objective was to use the data to determine how budgets should be focused toward providing those services that are truly needed by the users.

  20. Exploring Factors That Affect Adoption of Computer Security Practices among College Students

    ERIC Educational Resources Information Center

    Alqarni, Amani

    2017-01-01

    Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…

  1. Motivating Contributions for Home Computer Security

    ERIC Educational Resources Information Center

    Wash, Richard L.

    2009-01-01

    Recently, malicious computer users have been compromising computers en masse and combining them to form coordinated botnets. The rise of botnets has brought the problem of home computers to the forefront of security. Home computer users commonly have insecure systems; these users do not have the knowledge, experience, and skills necessary to…

  2. Interactive effects from self-reported physical and psychosocial factors in the workplace on neck pain and disability in female office workers.

    PubMed

    Johnston, V; Jull, G; Souvlis, T; Jimmieson, N L

    2010-04-01

    This study explored the interaction between physical and psychosocial factors in the workplace on neck pain and disability in female computer users. A self-report survey was used to collect data on physical risk factors (monitor location, duration of time spent using the keyboard and mouse) and psychosocial domains (as assessed by the Job Content Questionnaire). The neck disability index was the outcome measure. Interactions among the physical and psychosocial factors were examined in analysis of covariance. High supervisor support, decision authority and skill discretion protect against the negative impact of (1) time spent on computer-based tasks, (2) non-optimal placement of the computer monitor and (3) long duration of mouse use. Office workers with greater neck pain experience a combination of high physical and low psychosocial stressors at work. Prevention and intervention strategies that target both sets of risk factors are likely to be more successful than single intervention programmes. STATEMENT OF RELEVANCE: The results of this study demonstrate that the interaction of physical and psychosocial factors in the workplace has a stronger association with neck pain and disability than the presence of either factor alone. This finding has important implications for strategies aimed at the prevention of musculoskeletal problems in office workers.

  3. What Affects Reintegration of Female Drug Users after Prison Release? Results of a European Follow-Up Study

    ERIC Educational Resources Information Center

    Zurhold, Heike; Moskalewicz, Jacek; Sanclemente, Cristina; Schmied, Gabriele; Shewan, David; Verthein, Uwe

    2011-01-01

    The main objective of this follow-up study is to explore factors influencing the success or failure of women in reintegrating after their release from prison. Female drug users in five European cities were tracked after being released from prison. Out of 234 female prisoners contacted in prisons, 59 were included in the follow-up study. Structured…

  4. User-Centered Computer Aided Language Learning

    ERIC Educational Resources Information Center

    Zaphiris, Panayiotis, Ed.; Zacharia, Giorgos, Ed.

    2006-01-01

    In the field of computer aided language learning (CALL), there is a need for emphasizing the importance of the user. "User-Centered Computer Aided Language Learning" presents methodologies, strategies, and design approaches for building interfaces for a user-centered CALL environment, creating a deeper understanding of the opportunities and…

  5. Superior Gain in Knowledge by Podcasts Versus Text-Based Learning in Teaching Orthopedics: A Randomized Controlled Trial.

    PubMed

    Back, David Alexander; von Malotky, Jennifer; Sostmann, Kai; Hube, Robert; Peters, Harm; Hoff, Eike

    Digital learning (e-learning) has become a firm part of surgical undergraduate education. However, there is still a lack in analyzing e-learning tools in experimental settings without potentially biasing curricular influences. This study should compare students' learning outcome with podcasts versus book texts under laboratory conditions in the field of orthopedics. Voluntary medical students were randomly assigned for learning either with a book chapter or a podcast about common orthopedic diseases in an isolated computer room. Before and after intervention, students answered multiple-choice tests and questionnaires about their attitudes and satisfaction. The study was conducted from November 2012 to February 2013. Totally, 130 students were included (55 text users and 75 podcast users, 52 males and 78 females). There was a significant increase in the overall knowledge for both groups (p < 0.001). Podcast users scored significantly better in the posttests (p < 0.021) and achieved a significantly higher gain of knowledge compared to text users (p < 0.001). The evaluation also showed a significantly higher approval of podcasts regarding comprehensibility, teaching efficacy, or fun learning with it (p < 0.05). Females gained significantly more knowledge by the use of texts than males did (p = 0.04), without any sex difference when using podcasts. This study showed a significantly higher gain of knowledge and higher satisfaction from learning with podcasts compared to book texts among students. Podcasts seem to be beneficial when teaching defined orthopedic topics to medical students. Sex plays an additional independent role in the impact of e-learning tools on students' learning outcome. Copyright © 2016 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  6. Graphical User Interface Programming in Introductory Computer Science.

    ERIC Educational Resources Information Center

    Skolnick, Michael M.; Spooner, David L.

    Modern computing systems exploit graphical user interfaces for interaction with users; as a result, introductory computer science courses must begin to teach the principles underlying such interfaces. This paper presents an approach to graphical user interface (GUI) implementation that is simple enough for beginning students to understand, yet…

  7. Gender and Age Effects on the Trajectory of Depression in Opioid Users during Methadone Maintenance Treatment.

    PubMed

    Wang, Peng-Wei; Lin, Huang-Chi; Yang, Yi-Hsin Connie; Hsu, Chih-Yao; Chung, Kuan-Sheng; Wu, Hung-Chi; Yen, Cheng-Fang

    2017-01-01

    Both heroin use and depression are significant health problems. Methadone maintenance treatment (MMT) can be of great benefit to heroin users. However, changes in the level of depression in heroin users during MMT are not clear. Gender and age are also important factors in the development of depression, and whether gender and age moderate changes in depression in heroin users during MMT warrants further study. This study aimed to explore: (1) the trajectory of depression in opioid users during MMT and (2) the moderating effects of gender and age on the trajectory of depression in opioid users receiving MMT. A total of 294 intravenous heroin users were recruited into this 9-month observational study. The level of depression was measured at the intake interview and at follow-up interviews every 3 months. A latent growth model was used to analyze the trajectory of the level of depression among the participants. Depression improved rapidly during the first 3 months of MMT and slowly after the first 3 months in both the female and male heroin users. There was no gender difference in the level of depression at each follow-up point. The level of depression in the female heroin users decreased faster than that in the male heroin users. In addition, the level of depression in the younger heroin users decreased faster than that in the older subjects. Depression in female and younger heroin users improved more rapidly than in male and older subjects, respectively.

  8. Home Computer and Internet User Security

    DTIC Science & Technology

    2005-01-01

    Information Security Model © 2005 Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security...Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security Version 1.0.4 – slide 50 Contact Information Lawrence R. Rogers • Email: cert@cert.org CERT website: http://www.cert.org/ ...U.S. Patent and Trademark Office Home Computer and Internet User Security Report Documentation Page Form ApprovedOMB

  9. PAGANI Toolkit: Parallel graph-theoretical analysis package for brain network big data.

    PubMed

    Du, Haixiao; Xia, Mingrui; Zhao, Kang; Liao, Xuhong; Yang, Huazhong; Wang, Yu; He, Yong

    2018-05-01

    The recent collection of unprecedented quantities of neuroimaging data with high spatial resolution has led to brain network big data. However, a toolkit for fast and scalable computational solutions is still lacking. Here, we developed the PArallel Graph-theoretical ANalysIs (PAGANI) Toolkit based on a hybrid central processing unit-graphics processing unit (CPU-GPU) framework with a graphical user interface to facilitate the mapping and characterization of high-resolution brain networks. Specifically, the toolkit provides flexible parameters for users to customize computations of graph metrics in brain network analyses. As an empirical example, the PAGANI Toolkit was applied to individual voxel-based brain networks with ∼200,000 nodes that were derived from a resting-state fMRI dataset of 624 healthy young adults from the Human Connectome Project. Using a personal computer, this toolbox completed all computations in ∼27 h for one subject, which is markedly less than the 118 h required with a single-thread implementation. The voxel-based functional brain networks exhibited prominent small-world characteristics and densely connected hubs, which were mainly located in the medial and lateral fronto-parietal cortices. Moreover, the female group had significantly higher modularity and nodal betweenness centrality mainly in the medial/lateral fronto-parietal and occipital cortices than the male group. Significant correlations between the intelligence quotient and nodal metrics were also observed in several frontal regions. Collectively, the PAGANI Toolkit shows high computational performance and good scalability for analyzing connectome big data and provides a friendly interface without the complicated configuration of computing environments, thereby facilitating high-resolution connectomics research in health and disease. © 2018 Wiley Periodicals, Inc.

  10. Centralized Authorization Using a Direct Service, Part II

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wachsmann, A

    Authorization is the process of deciding if entity X is allowed to have access to resource Y. Determining the identity of X is the job of the authentication process. One task of authorization in computer networks is to define and determine which user has access to which computers in the network. On Linux, the tendency exists to create a local account for each single user who should be allowed to logon to a computer. This is typically the case because a user not only needs login privileges to a computer but also additional resources like a home directory to actuallymore » do some work. Creating a local account on every computer takes care of all this. The problem with this approach is that these local accounts can be inconsistent with each other. The same user name could have a different user ID and/or group ID on different computers. Even more problematic is when two different accounts share the same user ID and group ID on different computers: User joe on computer1 could have user ID 1234 and group ID 56 and user jane on computer2 could have the same user ID 1234 and group ID 56. This is a big security risk in case shared resources like NFS are used. These two different accounts are the same for an NFS server so that these users can wipe out each other's files. The solution to this inconsistency problem is to have only one central, authoritative data source for this kind of information and a means of providing all your computers with access to this central source. This is what a ''Directory Service'' is. The two directory services most widely used for centralizing authorization data are the Network Information Service (NIS, formerly known as Yellow Pages or YP) and Lightweight Directory Access Protocol (LDAP).« less

  11. Profile of Executive and Memory Function Associated with Amphetamine and Opiate Dependence

    PubMed Central

    Ersche, Karen D; Clark, Luke; London, Mervyn; Robbins, Trevor W; Sahakian, Barbara J

    2007-01-01

    Cognitive function was assessed in chronic drug users on neurocognitive measures of executive and memory function. Current amphetamine users were contrasted with current opiate users, and these two groups were compared with former users of these substances (abstinent for at least one year). Four groups of participants were recruited: amphetamine-dependent individuals, opiate-dependent individuals, former users of amphetamines, and/or opiates and healthy non-drug taking controls. Participants were administered the Tower of London (TOL) planning task and the 3D-IDED attentional set-shifting task to assess executive function, and Paired Associates Learning and Delayed Pattern Recognition Memory tasks to assess visual memory function. The three groups of substance users showed significant impairments on TOL planning, Pattern Recognition Memory and Paired Associates Learning. Current amphetamine users displayed a greater degree of impairment than current opiate users. Consistent with previous research showing that healthy men are performing better on visuo-spatial tests than women, our male controls remembered significantly more paired associates than their female counterparts. This relationship was reversed in drug users. While performance of female drug users was normal, male drug users showed significant impairment compared to both their female counterparts and male controls. There was no difference in performance between current and former drug users. Neither years of drug abuse nor years of drug abstinence were associated with performance. Chronic drug users display pronounced neuropsychological impairment in the domains of executive and memory function. Impairment persists after several years of drug abstinence and may reflect neuropathology in frontal and temporal cortices. PMID:16160707

  12. Prescriptive contraceptive use among isotretinoin users in the Netherlands in comparison with non-users: a drug utilisation study.

    PubMed

    Crijns, Hubertina J M J; van Rein, Nienke; Gispen-de Wied, Christine C; Straus, Sabine M; de Jong-van den Berg, Lolkje T W

    2012-10-01

    To assess the compliance with the isotretinoin Pregnancy Prevention Programme (PPP) by evaluating the use of prescribed contraceptives among isotretinoin users. The PPP contains a requirement for the use of contraceptive methods for women of childbearing potential. A drug utilisation study was performed using data from a drug prescription database (containing Dutch community pharmacy data) covering a population of 500 000 patients. Contraceptive use in female isotretinoin users and in a reference group of female non-isotretinoin users (aged 15-49 years) was compared using data from 1999 until 2006 in 2-year periods. Descriptive statistics were used. Of the female isotretinoin users (n = 651), 52%-54% filled prescriptions on contraceptives in strict accordance to the PPP, used before, during, and after discontinuation of isotretinoin, compared with 39%-46% in the reference group. A more liberal approach of a minimum of one prescription for a contraceptive method showed 61%-64% use of contraceptives among isotretinoin users. Similar patterns were seen when data were broken down in age groups. Furthermore, a higher proportion of female patients using isotretinoin prescribed by general practitioners used prescribed contraceptives compared with those receiving isotretinoin by specialists. Compliance with the contraceptive use according to a PPP for a teratogenic drug such as isotretinoin is 52%-64%, which is lower than anticipated. Reasons for the low compliance will need to be clarified before further measures can be taken. Copyright © 2012 John Wiley & Sons, Ltd.

  13. The Effects of Twitter Users' Gender and Weight on Viral Behavioral Intentions Toward Obesity-Related News.

    PubMed

    Almutairi, Nasser; Alhabash, Saleem; Hellmueller, Lea; Willis, Erin

    2018-01-01

    In this study, male and female participants were exposed to identical news stories covering obesity topics paired with tweets from Twitter users. Our study aimed at understanding how obesity-related news combined with user-generated social media posts (i.e., tweets) affect consumers' evaluations of online content and viral behavioral intentions (the intentions to like, share, and comment). An experiment (N = 316) explored how gender and weight of a Twitter user (tweeter) affect participants' evaluations and viral behavioral intentions toward news stories. Participants differed in their evaluations of and viral behavioral intentions for news stories as a function of Twitter users' gender and weight, as well as participants' gender. While participants expressed more favorable attitudes toward news stories paired with tweets by overweight than healthy females (with the opposite true for tweets by male users), participants expressed greater viral behavioral intentions for news stories paired with tweets by healthy weight than overweight user. These effects were more pronounced among male than female participants. Findings are discussed within the context of social media posts and their persuasive effects in relation to attitude and behavior changes.

  14. Computer use changes generalization of movement learning.

    PubMed

    Wei, Kunlin; Yan, Xiang; Kong, Gaiqing; Yin, Cong; Zhang, Fan; Wang, Qining; Kording, Konrad Paul

    2014-01-06

    Over the past few decades, one of the most salient lifestyle changes for us has been the use of computers. For many of us, manual interaction with a computer occupies a large portion of our working time. Through neural plasticity, this extensive movement training should change our representation of movements (e.g., [1-3]), just like search engines affect memory [4]. However, how computer use affects motor learning is largely understudied. Additionally, as virtually all participants in studies of perception and actions are computer users, a legitimate question is whether insights from these studies bear the signature of computer-use experience. We compared non-computer users with age- and education-matched computer users in standard motor learning experiments. We found that people learned equally fast but that non-computer users generalized significantly less across space, a difference negated by two weeks of intensive computer training. Our findings suggest that computer-use experience shaped our basic sensorimotor behaviors, and this influence should be considered whenever computer users are recruited as study participants. Copyright © 2014 Elsevier Ltd. All rights reserved.

  15. Formative evaluation of a multimedia self-administered computerized hearing loss prevention program.

    PubMed

    Saunders, Gabrielle H; Vachhani, Jay J; Galvez, Gino; Griest, Susan E

    2015-04-01

    To determine which features make a computer-based hearing health education intervention effective, easy to use, and enjoyable. The study examined which features of a multimedia self-administered computerized hearing loss prevention program, developed by the National Center for Rehabilitative Auditory Research (referred to as the NCRAR-HLPP), users liked and disliked, and the reasons why. A formative evaluation was conducted in which participants completed a questionnaire to assess knowledge and attitudes towards hearing and hearing loss prevention, used the NCRAR-HLPP, completed the questionnaire for a second time, and were interviewed to learn their opinions about the NCRAR-HLPP. Twenty-five male and four female Veterans recruited from the Portland VA Medical Center who were aged between 25 and 65 years. Participants reported that using the NCRAR-HLPP was a positive experience. Ease of use, multimedia content, personal relevance, and use of emotion were positive features of the program. The questionnaire showed increased knowledge and improved attitude scores following use of the program. This formative evaluation showed changes designed to target user preferences and improve user instructions will be made in future versions of the program.

  16. Gender differences in self-reported anxiety, depression, and somatization among ecstasy/MDMA polydrug users, alcohol/tobacco users, and nondrug users.

    PubMed

    Milani, Raffaella M; Parrott, Andy C; Turner, John J D; Fox, Helen C

    2004-07-01

    Previous research has found gender differences in both psychological and physiological responses to drugs. The present investigation explores gender variability in patterns of drug use in relation to self-reported depression, anxiety, and somatization. The current study confirms that heavy illegal drug users are represented by a preponderance of males than females. However, within each drug group category, females generally reported higher psychopathology scores than males. This was significant for all three subscales in the alcohol/tobacco group, for depression scores in the alcohol/tobacco, cannabis/alcohol, and light Ecstasy users group, and for depression scores for the alcohol group. Interestingly, in the male sample, drug users reported higher symptom ratings than nondrug users, whereas women's scores remained constant across drug groups. Copyright 2004 Elsevier Ltd.

  17. Controlling Laboratory Processes From A Personal Computer

    NASA Technical Reports Server (NTRS)

    Will, H.; Mackin, M. A.

    1991-01-01

    Computer program provides natural-language process control from IBM PC or compatible computer. Sets up process-control system that either runs without operator or run by workers who have limited programming skills. Includes three smaller programs. Two of them, written in FORTRAN 77, record data and control research processes. Third program, written in Pascal, generates FORTRAN subroutines used by other two programs to identify user commands with device-driving routines written by user. Also includes set of input data allowing user to define user commands to be executed by computer. Requires personal computer operating under MS-DOS with suitable hardware interfaces to all controlled devices. Also requires FORTRAN 77 compiler and device drivers written by user.

  18. Assigning unique identification numbers to new user accounts and groups in a computing environment with multiple registries

    DOEpatents

    DeRobertis, Christopher V.; Lu, Yantian T.

    2010-02-23

    A method, system, and program storage device for creating a new user account or user group with a unique identification number in a computing environment having multiple user registries is provided. In response to receiving a command to create a new user account or user group, an operating system of a clustered computing environment automatically checks multiple registries configured for the operating system to determine whether a candidate identification number for the new user account or user group has been assigned already to one or more existing user accounts or groups, respectively. The operating system automatically assigns the candidate identification number to the new user account or user group created in a target user registry if the checking indicates that the candidate identification number has not been assigned already to any of the existing user accounts or user groups, respectively.

  19. Automated Help System For A Supercomputer

    NASA Technical Reports Server (NTRS)

    Callas, George P.; Schulbach, Catherine H.; Younkin, Michael

    1994-01-01

    Expert-system software developed to provide automated system of user-helping displays in supercomputer system at Ames Research Center Advanced Computer Facility. Users located at remote computer terminals connected to supercomputer and each other via gateway computers, local-area networks, telephone lines, and satellite links. Automated help system answers routine user inquiries about how to use services of computer system. Available 24 hours per day and reduces burden on human experts, freeing them to concentrate on helping users with complicated problems.

  20. Vocal release time: a quantification of vocal offset.

    PubMed

    Watson, Ben C; Roark, Rick M; Baken, R J

    2012-11-01

    To determine the vocal release time (VRT) for linguistically unconstrained voice offsets in a healthy young adult population. Sound pressure (SP) and electroglottographic (EGG) recordings were obtained for 57 female and 55 male subjects while producing multiple tokens of three tasks (sustained /ɑ:/, "always," and "hallways") at comfortable pitch and loudness. SP and EGG signals were digitally time reversed and generalized sinusoidal models of the SP and EGG signals were obtained to compare rates of amplitude change. VRT was computed from the time lag of the cross-correlation function. Adjusted mean VRT values were significantly greater for females than for males. There was no systematic effect of age on VRT. However, 25-29-year old and >40 year old females showed shorter VRT values than the youngest female age group. Normative data are presented for a new measure of the duration of vocal offset, VRT. Acquisition of this measure requires little user intervention, thereby minimizing effects of subjective decision making. Comparison with previously reported vocal attack time (VAT) values for the same population suggests phenomenological differences between linguistically and physiologically constrained voice onsets and unconstrained voice offsets. Copyright © 2012 The Voice Foundation. Published by Mosby, Inc. All rights reserved.

  1. An Empirical Study of User Experience on Touch Mice

    ERIC Educational Resources Information Center

    Chou, Jyh Rong

    2016-01-01

    The touch mouse is a new type of computer mouse that provides users with a new way of touch-based environment to interact with computers. For more than a decade, user experience (UX) has grown into a core concept of human-computer interaction (HCI), describing a user's perceptions and responses that result from the use of a product in a particular…

  2. Understanding health care communication preferences of veteran primary care users.

    PubMed

    LaVela, Sherri L; Schectman, Gordon; Gering, Jeffrey; Locatelli, Sara M; Gawron, Andrew; Weaver, Frances M

    2012-09-01

    To assess veterans' health communication preferences (in-person, telephone, or electronic) for primary care needs and the impact of computer use on preferences. Structured patient interviews (n=448). Bivariate analyses examined preferences for primary care by 'infrequent' vs. 'regular' computer users. Only 54% were regular computer users, nearly all of whom had ever used the internet. 'Telephone' was preferred for 6 of 10 reasons (general medical questions, medication questions and refills, preventive care reminders, scheduling, and test results); although telephone was preferred by markedly fewer regular computer users. 'In-person' was preferred for new/ongoing conditions/symptoms, treatment instructions, and next care steps; these preferences were unaffected by computer use frequency. Among regular computer users, 1/3 preferred 'electronic' for preventive reminders (37%), test results (34%), and refills (32%). For most primary care needs, telephone communication was preferred, although by a greater proportion of infrequent vs. regular computer users. In-person communication was preferred for reasons that may require an exam or visual instructions. About 1/3 of regular computer users prefer electronic communication for routine needs, e.g., preventive reminders, test results, and refills. These findings can be used to plan patient-centered care that is aligned with veterans' preferred health communication methods. Published by Elsevier Ireland Ltd.

  3. Gender differences in the use of computers, programming, and peer interactions in computer science classrooms

    NASA Astrophysics Data System (ADS)

    Stoilescu, Dorian; Egodawatte, Gunawardena

    2010-12-01

    Research shows that female and male students in undergraduate computer science programs view computer culture differently. Female students are interested more in the use of computers than in doing programming, whereas male students see computer science mainly as a programming activity. The overall purpose of our research was not to find new definitions for computer science culture but to see how male and female students see themselves involved in computer science practices, how they see computer science as a successful career, and what they like and dislike about current computer science practices. The study took place in a mid-sized university in Ontario. Sixteen students and two instructors were interviewed to get their views. We found that male and female views are different on computer use, programming, and the pattern of student interactions. Female and male students did not have any major issues in using computers. In computing programming, female students were not so involved in computing activities whereas male students were heavily involved. As for the opinions about successful computer science professionals, both female and male students emphasized hard working, detailed oriented approaches, and enjoying playing with computers. The myth of the geek as a typical profile of successful computer science students was not found to be true.

  4. Organizational Strategies for End-User Computing Support.

    ERIC Educational Resources Information Center

    Blackmun, Robert R.; And Others

    1988-01-01

    Effective support for end users of computers has been an important issue in higher education from the first applications of general purpose mainframe computers through minicomputers, microcomputers, and supercomputers. The development of end user support is reviewed and organizational models are examined. (Author/MLW)

  5. Differences in behavioral health disorders and unmet treatment needs between medical marijuana users and recreational marijuana users: Results from a national adult sample.

    PubMed

    Park, Ji-Yeun; Wu, Li-Tzy

    2017-11-01

    Available data suggest that medical marijuana users may have more mental health problems than recreational marijuana users. There is limited information about differences in behavioral health disorders and unmet treatment needs between medical and recreational marijuana users. We compared past-year prevalence of behavioral health disorders and unmet treatment needs across three marijuana subgroups (recreational use only, medical use only, and both). Sex-stratified logistic regression was performed to determine their associations with marijuana use status. We analyzed data from adults (≥18 years) who used marijuana in the past year (N=15,440) from 2013 to 2014 National Surveys on Drug Use and Health. Among 15,440 past-year marijuana users, 90.2% used recreational marijuana only, 6.2% used medical marijuana only, and 3.6% used both. Both users had the highest prevalence of behavioral health disorders and unmet treatment needs overall, with no significant sex differences. In the sex-specific logistic regression analysis, medical only users and both users showed somewhat different patterns of associations (reference group=recreational only users). Medical only users had decreased odds of alcohol or drug use disorders, and unmet need for alcohol or drug treatment among males and females. Additionally, female medical only users had decreased odds of opioid use disorder. Both users had increased odds of major depressive episode, hallucinogen use disorder, and unmet need for mental health services among males, and cocaine use disorder among females. Different approaches tailored to individuals' sex and motives for marijuana use is needed for the prevention and treatment of behavioral health problems. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. What keeps female problematic Internet users busy online?

    PubMed

    Piguet, Claire; Berchtold, André; Akre, Christina; Suris, Joan-Carles

    2015-08-01

    While problematic Internet use is recognized to be predominant among male adolescents, a female trend is gradually becoming apparent. Our study aimed at investigating the characteristics of female Internet users and distinguishing between the online activities of problematic and regular Internet users' on school days. Data were retrieved from a cross-sectional survey of a representative sample of 3067 8th graders in the canton of Vaud, Switzerland, that completed an online questionnaire in 2012. Only females were included. Based on the Internet addiction test, the sample was divided into regular (RUs) (IAT < 50, n = 1339) and problematic users (PIUs) (IAT ≥ 50, n = 201). Groups were compared regarding sociodemographic variables, online activities, devices used to access the Internet, substance use, and physical activity. Significant variables were included in a backward logistic regression. At the multivariate level, PIUs were more prone to spend time online for leisure activities (odds ratio [OR] 2.38) and to access the Internet through a smartphone (OR 1.79) or tablet (OR 1.84). PIUs were less likely to be physically active (OR 0.86) and more likely to present poor emotional well-being (OR 2.67) and to smoke (OR 1.88). A sizeable percentage of female adolescents are problematic Internet users. When performing a comprehensive biopsychosocial assessment, teenagers owning numerous devices to access the Internet, presenting other health-compromising behaviors or poor emotional well-being should be specifically targeted.

  7. An assessment of primary care attributes from the perspective of female healthcare users1

    PubMed Central

    Lima, Eliane de Fátima Almeida; Sousa, Ana Inês; Primo, Cândida Caniçali; Leite, Francielie Marabotti Costa; Lima, Rita de Cassia Duarte; Maciel, Ethel Leonor Nóia

    2015-01-01

    OBJECTIVE: this study sought to assess the quality of the Family Health Strategy (FHS) and investigated the association between primary care attributes (PCAs) and the sociodemographic characteristics of users. METHOD: a total of 215 female FHS users were interviewed for this descriptive and cross-sectional study. The Primary Care Assessment Tool (PCATool), Adult Edition was used, and the results were analyzed using Fisher's exact tests, Pearson's chi-square tests and logistic regressions. RESULTS: the lowest average score corresponded to the dimension "accessibility" (1.80), and the highest score corresponded to "access" (8.76). The results corresponding to the attributes "longitudinality", "coordination", "comprehensiveness", and "orientation" were not significant. No association was found between the participants' sociodemographic characteristics and the essential, derivative, and general attributes (p>0.05). CONCLUSION: several attributes must be improved across all the investigated services from the perspective of female FHS users. PMID:26155006

  8. A security mechanism based on evolutionary game in fog computing.

    PubMed

    Sun, Yan; Lin, Fuhong; Zhang, Nan

    2018-02-01

    Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively.

  9. Determining Cannabis Use Status From a Photograph: An Assessment of the "Jay-dar" in Neuropsychologists.

    PubMed

    Hirst, Rayna B; Teague, Anna M; Sodos, Louise M; Wickham, Robert E; Whittington, L Taighlor; Mills, Brent M; Earleywine, Mitch

    2017-02-23

    Few studies examining the cognitive effects of chronic cannabis use utilize research designs where examiners are blind to user status. Even in those that do, researchers may be able to guess the user status of participants, leaving these studies vulnerable to the expectancy effect confound. The present study examined the ability of neuropsychologists (those who would conduct research on the cognitive effects of cannabis) to differentiate cannabis users and nonusers based on physical appearance from photographs. We recruited 84 participants from an international neuropsychology listserv. The sample was 59.5% female and 95.2% Caucasian, with a mean age of 41.39 years (range 26-65). Each neuropsychologist rated 25 target faces (12 cannabis users, 13 nonusers) on a Marijuana Use Likelihood Index based upon individuals' photographs. Results indicate a main effect of user group, as neuropsychologists ascribed higher ratings to cannabis users on the Marijuana Use Likelihood Index, suggesting they perceive them as more likely to be users, relative to nonusers. Results also demonstrated a main effect of gender, as males received higher user ratings than females, and a significant main effect of rater gender, as female raters were more likely to rate individuals as cannabis users relative to male raters. Conclusions/Importance: The results demonstrate the importance of assessing researchers' expectations when studying the effects of chronic cannabis use, as even those designs that keep examiners blind to participant user status may be vulnerable to expectancy effects if examiners are able to guess user status based upon appearance alone.

  10. Serotonergic 5HTTLPR/rs25531 s-allele homozygosity associates with violent suicides in male citalopram users.

    PubMed

    Rahikainen, Anna-Liina; Majaharju, Salla; Haukka, Jari; Palo, Jukka U; Sajantila, Antti

    2017-10-01

    Depressive disorders are involved as a background factor in over 50% of suicide cases. The most widely used antidepressants today are serotonin selective reuptake inhibitors (SSRIs). However, not all users benefit from SSRI medication. Although the overall number of suicides in Finland have decreased notably during the last decade, the annual rate is still relatively high, particularly in male population. In this study, we tested the hypothesis that the genetic variants associated with decreased citalopram efficiency, 5HTTLPR/rs25531, and increased impulsive behavior, MAOA-uVNTR and HTR2B Q20*, are more frequent among citalopram users committing suicide than among the citalopram users in general. Also the effect of alcohol was evaluated. The study population comprised 349 suicide victims (184 males and 165 females). Based on the suicide method used, cases were divided into two groups; violent (88 males and 49 females) and non-violent (96 males and 116 females). The control group (284; 159 males and 125 females) consisted of citalopram users who died of causes other than suicide. We found that male citalopram users with low functioning s/s genotype of 5HTTLPR/rs25531 were in increased risk to commit violent suicide (OR 2.50, 95%CI 1.15-5.42, p = 0.020). Surprisingly, high blood alcohol concentration was observed to be a risk factor only in non-violent suicides (both males and females), but not in violent ones. No association between suicides and MAOA-uVNTR and HTR2B Q20*, which have been previously connected to violent and impulsive behavior, was detected. © 2017 Wiley Periodicals, Inc.

  11. Heavy users of non-steroidal anti-inflammatory drugs: a nationwide prescription database study in Finland.

    PubMed

    Helin-Salmivaara, Arja; Klaukka, Timo; Huupponen, Risto

    2003-09-01

    To describe characteristics of non-steroidal anti-inflammatory drugs (NSAIDs; Anatomical Therapeutic Chemical code M01A) users in Finland, with emphasis on intensity of use. Nationwide prescription database study over years 1997-2000 using a random sample of 500,000 persons. Low use was defined as 30 or fewer defined daily doses (DDDs) per year, moderate between 31 and 181 DDDs, and heavy 182 or more DDDs. Persons with rheumatoid arthritis (RA) were identified and analysed separately from non-RA patients. The total NSAID consumption was 61.2 and reimbursed prescription NSAID use 31.2 DDD/1000 inhabitants per day in 2000. The annual prevalence of use varied between 17.1% and 18.8% throughout 1997-2000, and that of low, moderate and heavy use was 7.6%, 8.0% and 1.5%, respectively, in 2000. Females used more NSAIDs than men in all adult non-RA age groups, and of non-RA patients 58.4% were females. The share of females among the non-RA users increased with the intensity of use, as did the share of female patients 65 years or older. Among RA patients, the intensity of use was independent of age and gender, and 70% of RA patients were females. Of the heavy users in 2000, 27.7% ( n=2117) had continuously used 182 or more DDDs per year throughout the years 1997-2000. Non-RA users accounted for 78.4% of the annual heavy and 64.2% of the continuous heavy users. Exposure of patients to long-term use of NSAIDs and upper gastrointestinal bleeding should be reduced by regular analysis of patient's pain and consideration of other treatment options.

  12. Cloud Computing for the Grid: GridControl: A Software Platform to Support the Smart Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    GENI Project: Cornell University is creating a new software platform for grid operators called GridControl that will utilize cloud computing to more efficiently control the grid. In a cloud computing system, there are minimal hardware and software demands on users. The user can tap into a network of computers that is housed elsewhere (the cloud) and the network runs computer applications for the user. The user only needs interface software to access all of the cloud’s data resources, which can be as simple as a web browser. Cloud computing can reduce costs, facilitate innovation through sharing, empower users, and improvemore » the overall reliability of a dispersed system. Cornell’s GridControl will focus on 4 elements: delivering the state of the grid to users quickly and reliably; building networked, scalable grid-control software; tailoring services to emerging smart grid uses; and simulating smart grid behavior under various conditions.« less

  13. Characteristics of Internet use in relation to game genre in Korean adolescents.

    PubMed

    Lee, Moon-Soo; Ko, Young-Hoon; Song, Hyoung-Seok; Kwon, Ku-Hyung; Lee, Hyeon-Soo; Nam, Min; Jung, In-Kwa

    2007-04-01

    As the number of internet users increases, a new game genre using the internet as a networking tool is emerging. Some game genres are regarded as having greater addiction potentials than others. Games and the internet are closely related. We investigated games frequently used by adolescents and classified each of them with the help of game professionals. We also examined internet use patterns to identify relationships between game genre and internet use patterns. 627 middle school and high school students (male 488, female 139) completed questionnaires concerning computer and game use patterns and Korean internet addiction scales. Game genres were divided into eight criteria (simulation, role playing game, web board, community, action, adventure, shooting, and sports). Using Korean internet addiction scales, 627 participants were divided into a normal group (474), a potential risk group (128), and a high-risk group (25). Each group showed significant differences in total internet addiction scores. We classified players into specific game users based upon the game types they most prefer. Role playing game users showed significantly higher internet addiction scores than web board and sports game users. Game and internet addictions are also connected with interpersonal relationship patterns. We suggest that users of some game genre have unique psychological addiction potentials that are different from others and that this influences both game selection and internet use.

  14. Computer systems and methods for the query and visualization of multidimensional databases

    DOEpatents

    Stolte, Chris; Tang, Diane L; Hanrahan, Patrick

    2014-04-29

    In response to a user request, a computer generates a graphical user interface on a computer display. A schema information region of the graphical user interface includes multiple operand names, each operand name associated with one or more fields of a multi-dimensional database. A data visualization region of the graphical user interface includes multiple shelves. Upon detecting a user selection of the operand names and a user request to associate each user-selected operand name with a respective shelf in the data visualization region, the computer generates a visual table in the data visualization region in accordance with the associations between the operand names and the corresponding shelves. The visual table includes a plurality of panes, each pane having at least one axis defined based on data for the fields associated with a respective operand name.

  15. Computer systems and methods for the query and visualization of multidimensional databases

    DOEpatents

    Stolte, Chris [Palo Alto, CA; Tang, Diane L [Palo Alto, CA; Hanrahan, Patrick [Portola Valley, CA

    2011-02-01

    In response to a user request, a computer generates a graphical user interface on a computer display. A schema information region of the graphical user interface includes multiple operand names, each operand name associated with one or more fields of a multi-dimensional database. A data visualization region of the graphical user interface includes multiple shelves. Upon detecting a user selection of the operand names and a user request to associate each user-selected operand name with a respective shelf in the data visualization region, the computer generates a visual table in the data visualization region in accordance with the associations between the operand names and the corresponding shelves. The visual table includes a plurality of panes, each pane having at least one axis defined based on data for the fields associated with a respective operand name.

  16. Computer systems and methods for the query and visualization of multidimensional databases

    DOEpatents

    Stolte, Chris [Palo Alto, CA; Tang, Diane L [Palo Alto, CA; Hanrahan, Patrick [Portola Valley, CA

    2012-03-20

    In response to a user request, a computer generates a graphical user interface on a computer display. A schema information region of the graphical user interface includes multiple operand names, each operand name associated with one or more fields of a multi-dimensional database. A data visualization region of the graphical user interface includes multiple shelves. Upon detecting a user selection of the operand names and a user request to associate each user-selected operand name with a respective shelf in the data visualization region, the computer generates a visual table in the data visualization region in accordance with the associations between the operand names and the corresponding shelves. The visual table includes a plurality of panes, each pane having at least one axis defined based on data for the fields associated with a respective operand name.

  17. Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users

    ERIC Educational Resources Information Center

    Edwards, Keith

    2015-01-01

    Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…

  18. Designing User-Computer Dialogues: Basic Principles and Guidelines.

    ERIC Educational Resources Information Center

    Harrell, Thomas H.

    This discussion of the design of computerized psychological assessment or testing instruments stresses the importance of the well-designed computer-user interface. The principles underlying the three main functional elements of computer-user dialogue--data entry, data display, and sequential control--are discussed, and basic guidelines derived…

  19. Criminality among Female Drug Users Following an HIV Risk-Reduction Intervention

    ERIC Educational Resources Information Center

    Theall, Katherine P.; Elifson, Kirk W.; Sterk, Claire E.; Stewart, Eric A.

    2007-01-01

    The main objectives of this article are to determine the prevalence of criminality among a sample of female African American drug users and to examine change in criminality over time, including the correlates associated with this change. Data were collected from 336 adult women who participated in an HIV risk-reduction intervention focused on the…

  20. The Effects of 16 Hour Long Marathon Groups on the Ways that Female Drug Users Perceive Women.

    ERIC Educational Resources Information Center

    Page, Richard C.

    1984-01-01

    Evaluated the effectiveness of three 16-hour-long unstructured marathon groups composed of female illicit drug users in a woman's prison (N=78), using evaluative adjective pairs of the semantic differential concept Women. Marathon groups rated women as more successful and more pleasurable than did controls. (JAC)

  1. The Impacts of Attitudes and Engagement on Electronic Word of Mouth (eWOM) of Mobile Sensor Computing Applications.

    PubMed

    Zhao, Yu; Liu, Yide; Lai, Ivan K W; Zhang, Hongfeng; Zhang, Yi

    2016-03-18

    As one of the latest revolutions in networking technology, social networks allow users to keep connected and exchange information. Driven by the rapid wireless technology development and diffusion of mobile devices, social networks experienced a tremendous change based on mobile sensor computing. More and more mobile sensor network applications have appeared with the emergence of a huge amount of users. Therefore, an in-depth discussion on the human-computer interaction (HCI) issues of mobile sensor computing is required. The target of this study is to extend the discussions on HCI by examining the relationships of users' compound attitudes (i.e., affective attitudes, cognitive attitude), engagement and electronic word of mouth (eWOM) behaviors in the context of mobile sensor computing. A conceptual model is developed, based on which, 313 valid questionnaires are collected. The research discusses the level of impact on the eWOM of mobile sensor computing by considering user-technology issues, including the compound attitude and engagement, which can bring valuable discussions on the HCI of mobile sensor computing in further study. Besides, we find that user engagement plays a mediating role between the user's compound attitudes and eWOM. The research result can also help the mobile sensor computing industry to develop effective strategies and build strong consumer user-product (brand) relationships.

  2. Unaffiliated Users' Access to Academic Libraries: A Survey.

    ERIC Educational Resources Information Center

    Courtney, Nancy

    2003-01-01

    Most of 814 academic libraries surveyed allow onsite access to unaffiliated users, and many give borrowing privileges to certain categories of users. Use of library computers to access library resources and other computer applications is commonly allowed although authentication on library computers is increasing. Five tables show statistics.…

  3. A User Assessment of Workspaces in Selected Music Education Computer Laboratories.

    ERIC Educational Resources Information Center

    Badolato, Michael Jeremy

    A study of 120 students selected from the user populations of four music education computer laboratories was conducted to determine the applicability of current ergonomic and environmental design guidelines in satisfying the needs of users of educational computing workspaces. Eleven categories of workspace factors were organized into a…

  4. Managing End User Computing in the Federal Government.

    ERIC Educational Resources Information Center

    General Services Administration, Washington, DC.

    This report presents an initial approach developed by the General Services Administration for the management of end user computing in federal government agencies. Defined as technology used directly by individuals in need of information products, end user computing represents a new field encompassing such technologies as word processing, personal…

  5. System and method for controlling power consumption in a computer system based on user satisfaction

    DOEpatents

    Yang, Lei; Dick, Robert P; Chen, Xi; Memik, Gokhan; Dinda, Peter A; Shy, Alex; Ozisikyilmaz, Berkin; Mallik, Arindam; Choudhary, Alok

    2014-04-22

    Systems and methods for controlling power consumption in a computer system. For each of a plurality of interactive applications, the method changes a frequency at which a processor of the computer system runs, receives an indication of user satisfaction, determines a relationship between the changed frequency and the user satisfaction of the interactive application, and stores the determined relationship information. The determined relationship can distinguish between different users and different interactive applications. A frequency may be selected from the discrete frequencies at which the processor of the computer system runs based on the determined relationship information for a particular user and a particular interactive application running on the processor of the computer system. The processor may be adapted to run at the selected frequency.

  6. An Object-Oriented Graphical User Interface for a Reusable Rocket Engine Intelligent Control System

    NASA Technical Reports Server (NTRS)

    Litt, Jonathan S.; Musgrave, Jeffrey L.; Guo, Ten-Huei; Paxson, Daniel E.; Wong, Edmond; Saus, Joseph R.; Merrill, Walter C.

    1994-01-01

    An intelligent control system for reusable rocket engines under development at NASA Lewis Research Center requires a graphical user interface to allow observation of the closed-loop system in operation. The simulation testbed consists of a real-time engine simulation computer, a controls computer, and several auxiliary computers for diagnostics and coordination. The system is set up so that the simulation computer could be replaced by the real engine and the change would be transparent to the control system. Because of the hard real-time requirement of the control computer, putting a graphical user interface on it was not an option. Thus, a separate computer used strictly for the graphical user interface was warranted. An object-oriented LISP-based graphical user interface has been developed on a Texas Instruments Explorer 2+ to indicate the condition of the engine to the observer through plots, animation, interactive graphics, and text.

  7. A semi-automatic framework of measuring pulmonary arterial metrics at anatomic airway locations using CT imaging

    NASA Astrophysics Data System (ADS)

    Jin, Dakai; Guo, Junfeng; Dougherty, Timothy M.; Iyer, Krishna S.; Hoffman, Eric A.; Saha, Punam K.

    2016-03-01

    Pulmonary vascular dysfunction has been implicated in smoking-related susceptibility to emphysema. With the growing interest in characterizing arterial morphology for early evaluation of the vascular role in pulmonary diseases, there is an increasing need for the standardization of a framework for arterial morphological assessment at airway segmental levels. In this paper, we present an effective and robust semi-automatic framework to segment pulmonary arteries at different anatomic airway branches and measure their cross-sectional area (CSA). The method starts with user-specified endpoints of a target arterial segment through a custom-built graphical user interface. It then automatically detect the centerline joining the endpoints, determines the local structure orientation and computes the CSA along the centerline after filtering out the adjacent pulmonary structures, such as veins or airway walls. Several new techniques are presented, including collision-impact based cost function for centerline detection, radial sample-line based CSA computation, and outlier analysis of radial distance to subtract adjacent neighboring structures in the CSA measurement. The method was applied to repeat-scan pulmonary multirow detector CT (MDCT) images from ten healthy subjects (age: 21-48 Yrs, mean: 28.5 Yrs; 7 female) at functional residual capacity (FRC). The reproducibility of computed arterial CSA from four airway segmental regions in middle and lower lobes was analyzed. The overall repeat-scan intra-class correlation (ICC) of the computed CSA from all four airway regions in ten subjects was 96% with maximum ICC found at LB10 and RB4 regions.

  8. An assessment of future computer system needs for large-scale computation

    NASA Technical Reports Server (NTRS)

    Lykos, P.; White, J.

    1980-01-01

    Data ranging from specific computer capability requirements to opinions about the desirability of a national computer facility are summarized. It is concluded that considerable attention should be given to improving the user-machine interface. Otherwise, increased computer power may not improve the overall effectiveness of the machine user. Significant improvement in throughput requires highly concurrent systems plus the willingness of the user community to develop problem solutions for that kind of architecture. An unanticipated result was the expression of need for an on-going cross-disciplinary users group/forum in order to share experiences and to more effectively communicate needs to the manufacturers.

  9. Identity-Based Authentication for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao

    Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.

  10. Cannabis, alcohol use, psychological distress, and decision-making style.

    PubMed

    Phillips, James G; Ogeil, Rowan P

    2017-09-01

    There have been suggestions of hypofrontality in cannabis users. To understand cannabis-related differences in decisional processes, Janis and Mann's conflict model of decision making was applied to recreational cannabis smokers who varied in their alcohol use and level of psychological distress. An online sample of recreational substance users (114 male, 119 female) completed the Melbourne Decision Making Questionnaire, the Alcohol Use Disorders Identification Test (AUDIT), Kessler's Psychological Distress Scale (K10), and the Severity of Dependence Scale (SDS) for cannabis. Multivariate analysis of variance examined self-reported decision-making styles as a function of gender, recent cannabis use, risky alcohol consumption, and levels of psychological distress. Psychological distress was associated with lower decisional self-esteem and higher levels of procrastination and buck-passing. There were gender differences associated with cannabis use. Female cannabis users reported higher levels of hypervigilance, while male cannabis users reported lower levels of buck-passing. Although there was little indication of an avoidant decisional style in cannabis users, the results suggest that cannabis affects decisional processes, contributing to panic in females and impulsivity in males.

  11. High prevalence of tobacco use, alcohol use and overweight in a rural population in Tamil Nadu, India.

    PubMed

    Kaur, P; Rao, S R; Radhakrishnan, E; Ramachandran, R; Venkatachalam, R; Gupte, M D

    2011-01-01

    Cardiovascular diseases are one of the leading causes of death in India. There is high prevalence of cardiovascular risk factors in urban Tamil Nadu. There are limited data on the prevalence of behavioral risk factors and overweight in rural Tamil Nadu. We estimated prevalence of behavioral risk factors, overweight and central obesity in a rural population in Tamil Nadu, India. We conducted a cross-sectional survey in 11 villages in Kancheepuram/Thiruvallur districts, Tamil Nadu. Study population included 10,500 subjects aged 25-64 years. We collected data on behavioral risk factors and anthropometric measurements. Body mass index (BMI) was categorized using the classification recommended for Asians. Central obesity was defined as waist circumference ≥90 cm for men and ≥80 cm for women. We computed proportions for all risk factors and used trend chi-square to examine trend. Among the 10,500 subjects, 4927 (47%) were males. Among males, 1852 (37.6%) were current smokers and 3073 (62.4%) were current alcohol users. Among females, 840 (15.1%) were smokeless tobacco users. BMI was ≥23.0 kg/m 2 for 1618 (32.8%) males and 2126 (38.2%) females. 867 (17.6%) males and 1323 (23.7%) females were centrally obese. Most commonly used edible oil was palm oil followed by sunflower oil and groundnut oil. We observed high prevalence of tobacco use, alcohol use and central obesity in the rural population in Tamil Nadu. There is need for health promotion programs to encourage adoption of healthy lifestyle and policy interventions to create enabling environment.

  12. Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

    PubMed Central

    Wen, Qiaoyan; Zhang, Hua; Jin, Zhengping; Li, Wenmin

    2014-01-01

    We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function. PMID:24982949

  13. Two-cloud-servers-assisted secure outsourcing multiparty computation.

    PubMed

    Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Zhang, Hua; Jin, Zhengping; Li, Wenmin

    2014-01-01

    We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function.

  14. Has the incidence of brain cancer risen in Australia since the introduction of mobile phones 29 years ago?

    PubMed

    Chapman, Simon; Azizi, Lamiae; Luo, Qingwei; Sitas, Freddy

    2016-06-01

    Mobile phone use in Australia has increased rapidly since its introduction in 1987 with whole population usage being 94% by 2014. We explored the popularly hypothesised association between brain cancer incidence and mobile phone use. Using national cancer registration data, we examined age and gender specific incidence rates of 19,858 male and 14,222 females diagnosed with brain cancer in Australia between 1982 and 2012, and mobile phone usage data from 1987 to 2012. We modelled expected age specific rates (20-39, 40-59, 60-69, 70-84 years), based on published reports of relative risks (RR) of 1.5 in ever-users of mobile phones, and RR of 2.5 in a proportion of 'heavy users' (19% of all users), assuming a 10-year lag period between use and incidence. Age adjusted brain cancer incidence rates (20-84 years, per 100,000) have risen slightly in males (p<0.05) but were stable over 30 years in females (p>0.05) and are higher in males 8.7 (CI=8.1-9.3) than in females, 5.8 (CI=5.3-6.3). Assuming a causal RR of 1.5 and 10-year lag period, the expected incidence rate in males in 2012 would be 11.7 (11-12.4) and in females 7.7 (CI=7.2-8.3), both p<0.01; 1434 cases observed in 2012, vs. 1867 expected. Significant increases in brain cancer incidence were observed (in keeping with modelled rates) only in those aged ≥70 years (both sexes), but the increase in incidence in this age group began from 1982, before the introduction of mobile phones. Modelled expected incidence rates were higher in all age groups in comparison to what was observed. Assuming a causal RR of 2.5 among 'heavy users' gave 2038 expected cases in all age groups. This is an ecological trends analysis, with no data on individual mobile phone use and outcome. The observed stability of brain cancer incidence in Australia between 1982 and 2012 in all age groups except in those over 70 years compared to increasing modelled expected estimates, suggests that the observed increases in brain cancer incidence in the older age group are unlikely to be related to mobile phone use. Rather, we hypothesize that the observed increases in brain cancer incidence in Australia are related to the advent of improved diagnostic procedures when computed tomography and related imaging technologies were introduced in the early 1980s. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Getting the point across: exploring the effects of dynamic virtual humans in an interactive museum exhibit on user perceptions.

    PubMed

    Rivera-Gutierrez, Diego; Ferdig, Rick; Li, Jian; Lok, Benjamin

    2014-04-01

    We have created “You, M.D.”, an interactive museum exhibit in which users learn about topics in public health literacy while interacting with virtual humans. You, M.D. is equipped with a weight sensor, a height sensor and a Microsoft Kinect that gather basic user information. Conceptually, You, M.D. could use this user information to dynamically select the appearance of the virtual humans in the interaction attempting to improve learning outcomes and user perception for each particular user. For this concept to be possible, a better understanding of how different elements of the visual appearance of a virtual human affects user perceptions is required. In this paper, we present the results of an initial user study with a large sample size (n =333) ran using You, M.D. The study measured users’ reactions based on the user’s gender and body-mass index (BMI) when facing virtual humans with BMI either concordant or discordant from the user’s BMI. The results of the study indicate that concordance between the users’ BMI and the virtual human’s BMI affects male and female users differently. The results also show that female users rate virtual humans as more knowledgeable than male users rate the same virtual humans.

  16. Distributed user interfaces for clinical ubiquitous computing applications.

    PubMed

    Bång, Magnus; Larsson, Anders; Berglund, Erik; Eriksson, Henrik

    2005-08-01

    Ubiquitous computing with multiple interaction devices requires new interface models that support user-specific modifications to applications and facilitate the fast development of active workspaces. We have developed NOSTOS, a computer-augmented work environment for clinical personnel to explore new user interface paradigms for ubiquitous computing. NOSTOS uses several devices such as digital pens, an active desk, and walk-up displays that allow the system to track documents and activities in the workplace. We present the distributed user interface (DUI) model that allows standalone applications to distribute their user interface components to several devices dynamically at run-time. This mechanism permit clinicians to develop their own user interfaces and forms to clinical information systems to match their specific needs. We discuss the underlying technical concepts of DUIs and show how service discovery, component distribution, events and layout management are dealt with in the NOSTOS system. Our results suggest that DUIs--and similar network-based user interfaces--will be a prerequisite of future mobile user interfaces and essential to develop clinical multi-device environments.

  17. Preliminary ISIS users manual

    NASA Technical Reports Server (NTRS)

    Grantham, C.

    1979-01-01

    The Interactive Software Invocation (ISIS), an interactive data management system, was developed to act as a buffer between the user and host computer system. The user is provided by ISIS with a powerful system for developing software or systems in the interactive environment. The user is protected from the idiosyncracies of the host computer system by providing such a complete range of capabilities that the user should have no need for direct access to the host computer. These capabilities are divided into four areas: desk top calculator, data editor, file manager, and tool invoker.

  18. Alcohol and condom use among HIV-positive and HIV-negative female sex workers in Nagaland, India.

    PubMed

    Nuken, Amenla; Kermode, Michelle; Saggurti, Niranjan; Armstrong, Greg; Medhi, Gajendra Kumar

    2013-09-01

    This study examines the relationship between alcohol use, HIV status, and condom use among female sex workers in Nagaland, India. We analyzed data from a cross-sectional survey undertaken in 2009, using descriptive and multivariate statistics. Out of 417 female sex workers, one-fifth used alcohol daily and one-tenth were HIV-positive. HIV-positive female sex workers were more likely than HIV-negative female sex workers to consume alcohol daily (30.2% vs. 18.0%). HIV-positive daily alcohol users reported lower condom use at last sex with regular clients compared to HIV-positive non-daily alcohol users (46.2% vs. 79.3%), a relationship not evident among HIV-negative female sex workers. There is a need to promote awareness of synergies between alcohol use and HIV, and to screen for problematic alcohol use among female sex workers in order to reduce the spread of HIV.

  19. Computational Science News | Computational Science | NREL

    Science.gov Websites

    -Cooled High-Performance Computing Technology at the ESIF February 28, 2018 NREL Launches New Website for High-Performance Computing System Users The National Renewable Energy Laboratory (NREL) Computational Science Center has launched a revamped website for users of the lab's high-performance computing (HPC

  20. An Implemented Strategy for Campus Connectivity and Cooperative Computing.

    ERIC Educational Resources Information Center

    Halaris, Antony S.; Sloan, Lynda W.

    1989-01-01

    ConnectPac, a software package developed at Iona College to allow a computer user to access all services from a single personal computer, is described. ConnectPac uses mainframe computing to support a campus computing network, integrating personal and centralized computing into a menu-driven user environment. (Author/MLW)

  1. Near Retirement Age (≥55 Years) Self-Reported Physical Symptoms and Use of Computers/Mobile Phones at Work and at Leisure

    PubMed Central

    Gobba, Fabriziomaria

    2017-01-01

    The aim of this research is to study the symptoms and use of computers/mobile phones of individuals nearing retirement age (≥55 years). A questionnaire was sent to 15,000 Finns (aged 18–65). People who were ≥55 years of age were compared to the rest of the population. Six thousand one hundred and twenty-one persons responded to the questionnaire; 1226 of them were ≥55 years of age. Twenty-four percent of the ≥55-year-old respondents used desktop computers daily for leisure; 47.8% of them frequently experienced symptoms in the neck, and 38.5% in the shoulders. Workers aged ≥55 years had many more physical symptoms than younger people, except with respect to symptoms of the neck. Female daily occupational users of desktop computers had more physical symptoms in the neck. It is essential to take into account that, for people aged ≥55 years, the use of technology can be a sign of wellness. However, physical symptoms in the neck can be associated with the use of computers. PMID:28991182

  2. Proceedings of the Association Supporting Computer Users in Education (ASCUE) Annual Conference (50th, Myrtle Beach, South Carolina, June 11-15, 2017)

    ERIC Educational Resources Information Center

    Association Supporting Computer Users in Education, 2017

    2017-01-01

    The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…

  3. Women are underrepresented in computational biology: An analysis of the scholarly literature in biology, computer science and computational biology.

    PubMed

    Bonham, Kevin S; Stefan, Melanie I

    2017-10-01

    While women are generally underrepresented in STEM fields, there are noticeable differences between fields. For instance, the gender ratio in biology is more balanced than in computer science. We were interested in how this difference is reflected in the interdisciplinary field of computational/quantitative biology. To this end, we examined the proportion of female authors in publications from the PubMed and arXiv databases. There are fewer female authors on research papers in computational biology, as compared to biology in general. This is true across authorship position, year, and journal impact factor. A comparison with arXiv shows that quantitative biology papers have a higher ratio of female authors than computer science papers, placing computational biology in between its two parent fields in terms of gender representation. Both in biology and in computational biology, a female last author increases the probability of other authors on the paper being female, pointing to a potential role of female PIs in influencing the gender balance.

  4. Eye-gaze and intent: Application in 3D interface control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schryver, J.C.; Goldberg, J.H.

    1993-06-01

    Computer interface control is typically accomplished with an input ``device`` such as keyboard, mouse, trackball, etc. An input device translates a users input actions, such as mouse clicks and key presses, into appropriate computer commands. To control the interface, the user must first convert intent into the syntax of the input device. A more natural means of computer control is possible when the computer can directly infer user intent, without need of intervening input devices. We describe an application of eye-gaze-contingent control of an interactive three-dimensional (3D) user interface. A salient feature of the user interface is natural input, withmore » a heightened impression of controlling the computer directly by the mind. With this interface, input of rotation and translation are intuitive, whereas other abstract features, such as zoom, are more problematic to match with user intent. This paper describes successes with implementation to date, and ongoing efforts to develop a more sophisticated intent inferencing methodology.« less

  5. Eye-gaze and intent: Application in 3D interface control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schryver, J.C.; Goldberg, J.H.

    1993-01-01

    Computer interface control is typically accomplished with an input device'' such as keyboard, mouse, trackball, etc. An input device translates a users input actions, such as mouse clicks and key presses, into appropriate computer commands. To control the interface, the user must first convert intent into the syntax of the input device. A more natural means of computer control is possible when the computer can directly infer user intent, without need of intervening input devices. We describe an application of eye-gaze-contingent control of an interactive three-dimensional (3D) user interface. A salient feature of the user interface is natural input, withmore » a heightened impression of controlling the computer directly by the mind. With this interface, input of rotation and translation are intuitive, whereas other abstract features, such as zoom, are more problematic to match with user intent. This paper describes successes with implementation to date, and ongoing efforts to develop a more sophisticated intent inferencing methodology.« less

  6. The DFVLR main department for central data processing, 1976 - 1983

    NASA Technical Reports Server (NTRS)

    1983-01-01

    Data processing, equipment and systems operation, operative and user systems, user services, computer networks and communications, text processing, computer graphics, and high power computers are discussed.

  7. Optimizing Targeting of Intrusion Detection Systems in Social Networks

    NASA Astrophysics Data System (ADS)

    Puzis, Rami; Tubi, Meytal; Elovici, Yuval

    Internet users communicate with each other in various ways: by Emails, instant messaging, social networking, accessing Web sites, etc. In the course of communicating, users may unintentionally copy files contaminated with computer viruses and worms [1, 2] to their computers and spread them to other users [3]. (Hereafter we will use the term "threats", rather than computer viruses and computer worms). The Internet is the chief source of these threats [4].

  8. Polydrug use typologies and childhood maltreatment in a nationally representative survey of Danish young adults.

    PubMed

    Armour, Cherie; Shorter, Gillian W; Elhai, Jon D; Elklit, Ask; Christoffersen, Mogens N

    2014-01-01

    Substance use and childhood maltreatment experience are linked, but little is known about the association with polydrug use patterns. Latent class analyses (LCA) were performed on eight illicit drugs in a random population sample of young Danes separated by sex (males: n = 1,555; females: n = 1,425). Logistic regressions explored associations of polydrug use patterns and childhood maltreatment. A three-class solution best described patterns of polydrug use in both the male and female samples. Across all LCA models, Class 1 was characterized by individuals who represented wide-range polydrug users, endorsing many of the drug types (males = 8%; females = 2%). Class 2 was characterized by amphetamine, cannabis, cocaine, and amyl nitrate users (males = 18%; females = 7%). Class 3 was characterized by individuals who endorsed either low-level use of cannabis only or no drug use (males = 74%; females = 91 %). For males, having been a child-protection case was associated with Classes 1 and 2 and for females with Class 2, compared with Class 3. Alcohol problems were associated with Classes 1 and 2 for both sexes. Sexual abuse was associated with Classes 1 and 2 for females but not males, whereas physical abuse was associated with Classes 1 and 2 for males but not females, as compared with Class 3. Separate sex analyses are important; although patterns of polydrug use are broadly similar, females are less frequently polydrug users. In addition, different relationships exist for the sexes, such that polydrug use patterns are associated with sexual abuse in females, whereas such patterns are associated with physical abuse in young males.

  9. User Centered System Design: Papers for the CHI '83 Conference on Human Factors in Computer Systems.

    ERIC Educational Resources Information Center

    California Univ., San Diego. Center for Human Information Processing.

    Four papers from the University of California at San Diego (UCSD) Project on Human-Computer Interfaces are presented in this report. "Evaluation and Analysis of User's Activity Organization," by Liam Bannon, Allen Cypher, Steven Greenspan, and Melissa Monty, analyzes the activities performed by users of computer systems, develops a…

  10. Psychosocial impact of wheelchair usage on individuals with mobility disability in Ibadan, Nigeria.

    PubMed

    Hamzat, T K; Olaleye, O A; Agbomeji, O T

    2015-03-01

    Wheelchairs provide individuals with mobility impairments opportunity for independent living within their environment. However, using this device may have psychosocial impacts with consequent influence on the quality of life of the users. The psychosocial impact of wheelchair usage among individuals with mobility disability in a Nigerian community was investigated. The study is a descriptive cross-sectional survey. People who have been independent users of wheelchair for a minimum of six months prior to the study were recruited from centres for people with disabilities in Ibadan, Nigeria into the study. A profile of their use of the device was documented and the psychosocial impact of wheelchair was assessed using the Psychosocial Impact ofAssistive Devices Scale. Data were analysed using descriptive and inferential statistics at p = 0.05. Sixty consenting individuals with mobility disability participated in this study. Their mean age was 38.7 +/- 14.1 years. Majority (90%) were manual wheelchair users and two-thirds (63.3%) had been using the wheelchair for < or = five years. Approximately a third of the participants use their wheelchairs occasionally. There was no significant difference (p=0.26) in the psychosocial impact of wheelchair usage between male and female users. The psychosocial impact of wheelchair was similar between male and female users. However, the impact was higher on the self-esteem of male than female users and lower on their competence than that of their female counterparts. This may be due to stigmatization or a culturally-related unwillingness of men in our environment to be dependent on others.

  11. Optimizing virtual reality for all users through gaze-contingent and adaptive focus displays.

    PubMed

    Padmanaban, Nitish; Konrad, Robert; Stramer, Tal; Cooper, Emily A; Wetzstein, Gordon

    2017-02-28

    From the desktop to the laptop to the mobile device, personal computing platforms evolve over time. Moving forward, wearable computing is widely expected to be integral to consumer electronics and beyond. The primary interface between a wearable computer and a user is often a near-eye display. However, current generation near-eye displays suffer from multiple limitations: they are unable to provide fully natural visual cues and comfortable viewing experiences for all users. At their core, many of the issues with near-eye displays are caused by limitations in conventional optics. Current displays cannot reproduce the changes in focus that accompany natural vision, and they cannot support users with uncorrected refractive errors. With two prototype near-eye displays, we show how these issues can be overcome using display modes that adapt to the user via computational optics. By using focus-tunable lenses, mechanically actuated displays, and mobile gaze-tracking technology, these displays can be tailored to correct common refractive errors and provide natural focus cues by dynamically updating the system based on where a user looks in a virtual scene. Indeed, the opportunities afforded by recent advances in computational optics open up the possibility of creating a computing platform in which some users may experience better quality vision in the virtual world than in the real one.

  12. Optimizing virtual reality for all users through gaze-contingent and adaptive focus displays

    NASA Astrophysics Data System (ADS)

    Padmanaban, Nitish; Konrad, Robert; Stramer, Tal; Cooper, Emily A.; Wetzstein, Gordon

    2017-02-01

    From the desktop to the laptop to the mobile device, personal computing platforms evolve over time. Moving forward, wearable computing is widely expected to be integral to consumer electronics and beyond. The primary interface between a wearable computer and a user is often a near-eye display. However, current generation near-eye displays suffer from multiple limitations: they are unable to provide fully natural visual cues and comfortable viewing experiences for all users. At their core, many of the issues with near-eye displays are caused by limitations in conventional optics. Current displays cannot reproduce the changes in focus that accompany natural vision, and they cannot support users with uncorrected refractive errors. With two prototype near-eye displays, we show how these issues can be overcome using display modes that adapt to the user via computational optics. By using focus-tunable lenses, mechanically actuated displays, and mobile gaze-tracking technology, these displays can be tailored to correct common refractive errors and provide natural focus cues by dynamically updating the system based on where a user looks in a virtual scene. Indeed, the opportunities afforded by recent advances in computational optics open up the possibility of creating a computing platform in which some users may experience better quality vision in the virtual world than in the real one.

  13. Seismic waveform modeling over cloud

    NASA Astrophysics Data System (ADS)

    Luo, Cong; Friederich, Wolfgang

    2016-04-01

    With the fast growing computational technologies, numerical simulation of seismic wave propagation achieved huge successes. Obtaining the synthetic waveforms through numerical simulation receives an increasing amount of attention from seismologists. However, computational seismology is a data-intensive research field, and the numerical packages usually come with a steep learning curve. Users are expected to master considerable amount of computer knowledge and data processing skills. Training users to use the numerical packages, correctly access and utilize the computational resources is a troubled task. In addition to that, accessing to HPC is also a common difficulty for many users. To solve these problems, a cloud based solution dedicated on shallow seismic waveform modeling has been developed with the state-of-the-art web technologies. It is a web platform integrating both software and hardware with multilayer architecture: a well designed SQL database serves as the data layer, HPC and dedicated pipeline for it is the business layer. Through this platform, users will no longer need to compile and manipulate various packages on the local machine within local network to perform a simulation. By providing users professional access to the computational code through its interfaces and delivering our computational resources to the users over cloud, users can customize the simulation at expert-level, submit and run the job through it.

  14. Self-Reported and Judged Personality, Value, and Attitudinal Patterns: A Comparison of Users and Non Users of LSD-25.

    ERIC Educational Resources Information Center

    Jones, Allan P.

    This study is designed to assess the benefits of LSD use as well as to examine personality, value, and attitudinal variables in order to characterize users and non users. The main assessment tool used was the in-depth interview. Subjects were 31 male and 8 female users and a non user group matched for education and age. The user was characterized…

  15. Motivational and mindfulness intervention for young adult female marijuana users

    PubMed Central

    de Dios, Marcel A.; Herman, Debra S.; Britton, Willoughby B.; Hagerty, Claire E.; Anderson, Bradley J.; Stein, Michael D.

    2011-01-01

    This pilot study tested the efficacy of a brief intervention using motivational interviewing (MI) plus mindfulness meditation (MM) to reduce marijuana use among young adult female. Thirty-four female marijuana users between the ages of 18–29 were randomized to either the intervention group (n = 22), consisting of 2 sessions of MI-MM or an assessment-only control group (n = 12). Participants’ marijuana use was assessed at baseline, 1, 2, and 3 months post-treatment. Fixed-effects regression modeling was used to analyze treatment effects. Participants randomized to the intervention group were found to use marijuana on 6.15 (z = −2.42, p=.015), 7.81 (z = −2.78, p=.005), and 6.83 (z = −2.23, p=.026) fewer days at months 1, 2, and 3, respectively, than controls. Findings from this pilot study provide preliminary evidence for the feasibility and effectiveness of a brief MI-MM for young adult female marijuana users. PMID:21940136

  16. Effects of hormonal contraceptive use on HIV acquisition and transmission among HIV-discordant couples.

    PubMed

    Lutalo, Tom; Musoke, Richard; Kong, Xiangrong; Makumbi, Fred; Serwadda, David; Nalugoda, Fred; Kigozi, Godfrey; Sewankambo, Nelson; Sekasanvu, Joseph; Wawer, Maria; Gray, Ronald

    2013-10-01

    The risk of HIV associated with hormonal contraceptives is controversial. We assessed hormonal contraceptive use and HIV incidence in HIV-discordant couples in Rakai, Uganda. HIV-discordant couples were retrospectively identified from a cohort between 1999 and 2009. Hormonal contraception included oral contraception, depomedroxyprogesterone acetate (DMPA), and implants (Norplant). Poisson regression estimated adjusted incidence rate ratios (adjIRRs) associated with hormonal contraceptive methods. A case-control subanalysis estimated odds ratios (ORs) of HIV associated with hormonal contraceptive, adjusted for viral load and age. We identified 190 male HIV-positive/female HIV-negative (M+F-) and 159 male HIV- negative/female HIV-positive (M-F+) couples not using antiretroviral therapy or condoms. Female HIV incidence was 5.8/100 person-years (py) among nonhormonal contraceptive users, 12.0/100 py among oral contraceptive users [adjIRR 2.65, 95% confidence interval (CI) 0.82-8.60], 4.5 among Norplant users (adjIRR: 0.89, 95% CI 0.11-7.10), and 7.5/100 py among DMPA users (adjIRR 1.42, 95% CI 0.60-3.36). Male HIV incidence was 7.4/100 py during nonhormonal contraceptive use, 16.5/100 py during female oral contraceptive use (adjIRR 2.52, 95% CI 0.49-12.95), and 4.9/100 py with DMPA use (adjIRR 0.57, 95% CI 0.19-1.70). The number of female seroconverters was three among oral contraceptive users, one among Norplant users, and seven among DMPA users. Male seroconverters were two during female oral contraceptive use, none with Norplant use, and three with DMPA use. In a nested case-control analysis after adjustment for HIV viral load, the adjOR associated with oral contraceptive use was 1.59 (95% CI 0.32-97.85) for M+F- and 2.11 (95% CI 0.18-25.26) for M-F+ couples. For DMPA use, the adjOR was 1.44 (95% CI 0.46-4.51) for M+F- and 1.40 (95% CI 0.30-6.49) for M-F+ couples. We did not observe significant risk of HIV acquisition or transmission with oral contraceptives or DMPA use in HIV discordant couples, but several point estimates were above 1.0 and statistical power was limited.

  17. Addition of flexible body option to the TOLA computer program. Part 2: User and programmer documentation

    NASA Technical Reports Server (NTRS)

    Dick, J. W.; Benda, B. J.

    1975-01-01

    User and programmer oriented documentation for the flexible body option of the Takeoff and Landing Analysis (TOLA) computer program are provided. The user information provides sufficient knowledge of the development and use of the option to enable the engineering user to successfully operate the modified program and understand the results. The programmer's information describes the option structure and logic enabling a programmer to make major revisions to this part of the TOLA computer program.

  18. User Account Passwords | High-Performance Computing | NREL

    Science.gov Websites

    Account Passwords User Account Passwords For NREL's high-performance computing (HPC) systems, learn about user account password requirements and how to set up, log in, and change passwords. Password Logging In the First Time After you request an HPC user account, you'll receive a temporary password. Set

  19. Purple Computational Environment With Mappings to ACE Requirements for the General Availability User Environment Capabilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barney, B; Shuler, J

    2006-08-21

    Purple is an Advanced Simulation and Computing (ASC) funded massively parallel supercomputer located at Lawrence Livermore National Laboratory (LLNL). The Purple Computational Environment documents the capabilities and the environment provided for the FY06 LLNL Level 1 General Availability Milestone. This document describes specific capabilities, tools, and procedures to support both local and remote users. The model is focused on the needs of the ASC user working in the secure computing environments at Los Alamos National Laboratory, Lawrence Livermore National Laboratory, and Sandia National Laboratories, but also documents needs of the LLNL and Alliance users working in the unclassified environment. Additionally,more » the Purple Computational Environment maps the provided capabilities to the Trilab ASC Computing Environment (ACE) Version 8.0 requirements. The ACE requirements reflect the high performance computing requirements for the General Availability user environment capabilities of the ASC community. Appendix A lists these requirements and includes a description of ACE requirements met and those requirements that are not met for each section of this document. The Purple Computing Environment, along with the ACE mappings, has been issued and reviewed throughout the Tri-lab community.« less

  20. Evidence of Gender Disparity in Children's Computer Use and Activities.

    ERIC Educational Resources Information Center

    Land, M. J.

    This multi-method study examines the differences in male and female computer use in the home of children ages 9-14. Long interviews, observations, and surveys with children show males spend more time on the computer, but not on-line, than females. Males and females engage in different computer activities. They play computer games about the same…

  1. Risk factors for severe Meibomian gland atrophy in a young adult population: A cross-sectional study

    PubMed Central

    2017-01-01

    Purpose Assess potential risk factors for severe Meibomian gland atrophy (SMGA) in a young adult population. Methods Cross-sectional study using medical history and ocular surface examination to evaluate relationships with study outcomes: SMGA, tear lipid layer (TLL) thickness, non-invasive (NITBUT) and fluorescein (FTBUT) tear breakup times, and symptoms using the Standard Patient Evaluation of Eye Dryness (SPEED) questionnaire. Results One hundred one participants (101; 202 eyes; Age: mean±SD = 22.3±4.0 years) completed the study. Hormonal birth control (HBC) use was the only significant risk factor for SMGA (p = 0.028). Female HBC users had 4.8 times greater odds of having SMGA compared to female HBC non-users (p = 0.028), but the odds of having SMGA was similar between female HBC non-users and males (p = 0.885). Multivariable analysis suggested that the relationship between SMGA and TLL thickness was dependent on HBC use. Compared to female HBC non-users without SMGA, TLL thickness for HBC users was estimated to be 10 nm thinner if SMGA was absent (p = 0.007) and 21 nm thinner if SMGA was present (p<0.001). SMGA status had no significant impact on TLL thickness among female HBC non-users (p = 0.552). The effect of TLL thickness on FTBUT was small but significant (p = 0.026). TLL thickness was not significantly associated with NITBUT (p = 0.349). Neither FTBUT nor NITBUT was significantly associated with the SPEED score. Conclusion HBC use may be associated with SMGA, supporting the hypothesis that SMGA could lead to thinner TLL. However, less evidence was present to support that thin TLL could lead to clinically detectable tear film instability and subsequently to increased ocular dryness symptoms. Further investigation with a larger sample size is warranted to confirm these findings. PMID:28957399

  2. Is the GUI approach to Computer Development (For Example, Mac, and Windows Technology) a Threat to Computer Users Who Are Blind?

    ERIC Educational Resources Information Center

    Melrose, S.; And Others

    1995-01-01

    In this point/counterpoint feature, S. Melrose contends that complex graphical user interfaces (GUIs) threaten the independence and equal employment of individuals with blindness. D. Wakefield then points out that access to the Windows software program for blind computer users is extremely unpredictable, and J. Gill describes a major European…

  3. Micromorphological changes in cardiac tissue of drug-related deaths with emphasis on chronic illicit opioid abuse

    PubMed Central

    Seltenhammer, Monika H; Marchart, Katharina; Paula, Pia; Kordina, Nicole; Klupp, Nikolaus; Schneider, Barbara; Fitzl, Christine; Risser, Daniele U

    2013-01-01

    Aims The main intention of this retrospective study was to investigate whether chronic illicit drug abuse, especially the intravenous use of opioids (heroin), could potentially trigger the development of myocardial fibrosis in drug addicts. Design A retrospective case–control study was performed using myocardial tissue samples from both drug-related deaths (DRD) with verifiable opioid abuse and non-drug-related deaths in the same age group. Setting Department of Forensic Medicine, Medical University of Vienna, Austria (1993–94). Participants Myocardial specimens were retrieved from 76 deceased intravenous opioid users and compared to those of 23 deceased non-drug users. Measurements Drug quantification was carried out using the enzyme-multiplied immunoassay technique (EMIT), followed by [gas chromatography–mass spectrometry (GC–MS), MAT 112®], and analysed using the Integrator 3390A by Hewlett Packard® and LABCOM.1 computer (MSS-G.G.). The amount of fibrous connective tissue (FCT) in the myocardium was determined by using the morphometric software LUCIA Net version 1.16.2©, Laboratory Imaging, with NIS Elements 3.0®. Findings Drug analysis revealed that 67.11% were polydrug users and the same proportion was classified as heroin addicts (6-monoacetylmorphine, 6-MAM)—32.89% were users of pure heroin. In 76.32% of DRD cases, codeine was detected. Only 2.63% consumed cocaine. The mean morphine concentrations were 389.03 ng/g in the cerebellum and 275.52 ng/g in the medulla oblongata, respectively. Morphometric analysis exhibited a strong correlation between DRD and myocardial fibrosis. The mean proportion of FCT content in the drug group was 7.6 ± 2.9% (females: 6.30 ± 2.19%; males: 7.91 ± 3.01%) in contrast to 5.2 ± 1.7% (females: 4.45 ± 1.23%; males: 5.50 ± 1.78%) in the control group, indicating a significant difference (P = 0.0012), and a significant difference in the amount of FCT between females and males (P = 0.0383). There was no significant interaction of age and FCT (P = 0.8472). Conclusions There is a long-term risk of cardiac dysfunction following chronic illicit drug abuse with opioids as a principal component. Regular cardiological examination of patients receiving substitution treatment with morphine is strongly recommended. PMID:23297783

  4. Gender and stereotypes in motivation to study computer programming for careers in multimedia

    NASA Astrophysics Data System (ADS)

    Doubé, Wendy; Lang, Catherine

    2012-03-01

    A multimedia university programme with relatively equal numbers of male and female students in elective programming subjects provided a rare opportunity to investigate female motivation to study and pursue computer programming in a career. The MSLQ was used to survey 85 participants. In common with research into deterrence of females from STEM domains, females displayed significantly lower self-efficacy and expectancy for success. In contrast to research into deterrence of females from STEM domains, both genders placed similar high values on computer programming and shared high extrinsic and intrinsic goal orientation. The authors propose that the stereotype associated with a creative multimedia career could attract female participation in computer programming whereas the stereotype associated with computer science could be a deterrent.

  5. Use of dual protection among female sex workers in Swaziland.

    PubMed

    Yam, Eileen A; Mnisi, Zandile; Mabuza, Xolile; Kennedy, Caitlin; Kerrigan, Deanna; Tsui, Amy; Baral, Stefan

    2013-06-01

    Female sex workers are at heightened risk of both HIV infection and unwanted pregnancy. Nonbarrier modern contraceptives are highly effective at preventing pregnancy, but offer no HIV protection. A better understanding of sex workers' use of condoms and nonbarrier methods is needed to help them meet their contraceptive and STI protection needs. A 2011 respondent-driven sampling survey collected reproductive health and contraceptive use data from 325 female sex workers in Swaziland. Multinomial logistic regression analysis was used to identify associations between selected characteristics and four outcomes of contraceptive use over the past month: consistent condom use alone; nonbarrier modern contraceptive use (either alone or with inconsistent condom use); dual method use; and inconsistent condom use, other method use or nonuse. Adjusted predicted probabilities were also calculated to determine patterns of association. After adjustments were made for background and behavioral factors, 16% of female sex workers were found to be consistent users of condoms alone; 39% used nonbarrier modern methods (without consistent condom use); 8% were dual method users; and 38% were inconsistent condom users or used other methods or none. Women who reported recent condom failure were less likely than others to be consistent condom users (6% vs. 22%). Consistent use of condoms alone was more common among women who had had no noncommercial partners in the past month than among those who reported two or more such partners (39% vs. 3%). In addition, respondents who had children were more likely than their nulliparous counterparts to report use of nonbarrier methods alone (65% vs. 14%). Inconsistent or no condom use among nonbarrier contraceptive users underscores the need to incorporate HIV prevention into family planning interventions, particularly among female sex workers who have children and noncommercial partners.

  6. Women are underrepresented in computational biology: An analysis of the scholarly literature in biology, computer science and computational biology

    PubMed Central

    2017-01-01

    While women are generally underrepresented in STEM fields, there are noticeable differences between fields. For instance, the gender ratio in biology is more balanced than in computer science. We were interested in how this difference is reflected in the interdisciplinary field of computational/quantitative biology. To this end, we examined the proportion of female authors in publications from the PubMed and arXiv databases. There are fewer female authors on research papers in computational biology, as compared to biology in general. This is true across authorship position, year, and journal impact factor. A comparison with arXiv shows that quantitative biology papers have a higher ratio of female authors than computer science papers, placing computational biology in between its two parent fields in terms of gender representation. Both in biology and in computational biology, a female last author increases the probability of other authors on the paper being female, pointing to a potential role of female PIs in influencing the gender balance. PMID:29023441

  7. Social networking patterns/hazards among teenagers.

    PubMed

    Machold, C; Judge, G; Mavrinac, A; Elliott, J; Murphy, A M; Roche, E

    2012-05-01

    Social Networking Sites (SNSs) have grown substantially, posing new hazards to teenagers. This study aimed to determine general patterns of Internet usage among Irish teenagers aged 11-16 years, and to identify potential hazards, including; bullying, inappropriate contact, overuse, addiction and invasion of users' privacy. A cross-sectional study design was employed to survey students at three Irish secondary schools, with a sample of 474 completing a questionnaire. 202 (44%) (n = 460) accessed the Internet using a shared home computer. Two hours or less were spent online daily by 285(62%), of whom 450 (98%) were unsupervised. 306 (72%) (n = 425) reported frequent usage of SNSs, 403 (95%) of whom were Facebook users. 42 (10%) males and 51 (12%) females experienced bullying online, while 114 (27%) reported inappropriate contact from others. Concerning overuse and the risk of addiction, 140 (33%) felt they accessed SNSs too often. These patterns among Irish teenagers suggest that SNS usage poses significant dangers, which are going largely unaddressed.

  8. Estradiol does not influence strategy choice but place strategy choice is associated with increased cell proliferation in the hippocampus of female rats.

    PubMed

    Rummel, Julia; Epp, Jonathan R; Galea, Liisa A M

    2010-09-01

    Adult neurogenesis occurs in the hippocampus of most mammals. While the function of adult hippocampal neurogenesis is not known, there is a relationship between neurogenesis and hippocampus-dependent learning and memory. Ovarian hormones can influence learning and memory and strategy choice. In competitive memory tasks, higher levels of estradiol shift female rats towards the use of the place strategy. Previous studies using a cue-competition paradigm find that 36% of male rats will use a hippocampus-dependent place strategy and place strategy users had lower levels of cell proliferation in the hippocampus. Here, we used the same paradigm to test whether endogenous or exogenous ovarian hormones influence strategy choice in the cue-competition paradigm and whether cell proliferation was related to strategy choice. We tested ovariectomized estradiol-treated (10 microg of estradiol benzoate) or sham-operated female rats on alternating blocks of hippocampus-dependent and hippocampus-independent versions of the Morris water task. Rats were then given a probe session with the platform visible and in a novel location. Preferred strategy was classified as place strategy (hippocampus-dependent) if they swam to the old platform location or cue strategy (hippocampus-independent) if they swam to the visible platform. All groups showed a preference for the cue strategy. However, proestrous rats were more likely to be place strategy users than rats not in proestrus. Female place strategy users had increased cell proliferation in the dentate gyrus compared to cue strategy users. Our study suggests that 78% of female rats chose the cue strategy instead of the place strategy. In summary the present results suggest that estradiol does not shift strategy use in this paradigm and that cell proliferation is related to strategy use with greater cell proliferation seen in place strategy users in female rats. Copyright (c) 2010 Elsevier Inc. All rights reserved.

  9. Cooperative processing user interfaces for AdaNET

    NASA Technical Reports Server (NTRS)

    Gutzmann, Kurt M.

    1991-01-01

    A cooperative processing user interface (CUI) system shares the task of graphical display generation and presentation between the user's computer and a remote host. The communications link between the two computers is typically a modem or Ethernet. The two main purposes of a CUI are reduction of the amount of data transmitted between user and host machines, and provision of a graphical user interface system to make the system easier to use.

  10. Training leads to increased auditory brain-computer interface performance of end-users with motor impairments.

    PubMed

    Halder, S; Käthner, I; Kübler, A

    2016-02-01

    Auditory brain-computer interfaces are an assistive technology that can restore communication for motor impaired end-users. Such non-visual brain-computer interface paradigms are of particular importance for end-users that may lose or have lost gaze control. We attempted to show that motor impaired end-users can learn to control an auditory speller on the basis of event-related potentials. Five end-users with motor impairments, two of whom with additional visual impairments, participated in five sessions. We applied a newly developed auditory brain-computer interface paradigm with natural sounds and directional cues. Three of five end-users learned to select symbols using this method. Averaged over all five end-users the information transfer rate increased by more than 1800% from the first session (0.17 bits/min) to the last session (3.08 bits/min). The two best end-users achieved information transfer rates of 5.78 bits/min and accuracies of 92%. Our results show that an auditory BCI with a combination of natural sounds and directional cues, can be controlled by end-users with motor impairment. Training improves the performance of end-users to the level of healthy controls. To our knowledge, this is the first time end-users with motor impairments controlled an auditory brain-computer interface speller with such high accuracy and information transfer rates. Further, our results demonstrate that operating a BCI with event-related potentials benefits from training and specifically end-users may require more than one session to develop their full potential. Copyright © 2015 International Federation of Clinical Neurophysiology. Published by Elsevier Ireland Ltd. All rights reserved.

  11. Identifying Programmatic Gaps: Inequities in Harm Reduction Service Utilization among Male and Female Drug Users in Dar es Salaam, Tanzania

    PubMed Central

    Lambdin, Barrot H.; Bruce, R. Douglas; Chang, Olivia; Nyandindi, Cassian; Sabuni, Norman; Zamudio-Haas, Sophia; McCurdy, Sheryl; Masao, Frank; Ivo, Yovin; Msami, Amani; Ubuguy, Omar; Mbwambo, Jessie

    2013-01-01

    Introduction Current estimates suggest an HIV prevalence of 42% among people who inject drugs (PWIDs) in Dar es Salaam, while HIV prevalence is estimated to be 8.8% among the general population in the city. To address the HIV epidemic in this population, the government of Tanzania began establishing HIV prevention, treatment and care services including outreach and medication assisted treatment (MAT) for PWIDs in 2010. We assessed gender inequities in utilization of outreach and MAT services and evaluated differences in HIV risk behaviors between female and male PWIDs. Materials and Methods Routine outreach data between December 2010 to mid-August 2012 and baseline data on clients enrolling in methadone from February 2011 to August 2012 were utilized. Binomial regression was used to estimate adjusted relative risk estimates comparing females to males. Results From December 2010 to August 2012, 8,578 contacts were made to drug users; among them 1,898 were injectors. A total of 453 injectors were eligible and referred to MAT, of which, 443 enrolled in treatment. However, regarding total outreach contacts, outreach to PWID, referral to MAT and enrollment in MAT, 8% or less of drug users accessing services were women. In contrast, weighted estimations from surveys suggest that 34% of PWIDs are female, and this approximation is similar to recent population size estimations. Overall, 43% of traditional outreach workers conducting outreach with drug users were female. Though reporting higher levels of condom usage, female PWID were more likely to report multiple sex partners, anal sex, commercial sex work and struggle under a higher burden of addiction, mental disorders and abuse. Conclusions Services have not been mobilized adequately to address the clear needs of females who inject drugs. A clear and urgent need exists for women-centered strategies that effectively engage female PWID into HIV prevention services. PMID:23825620

  12. Characteristics of Female College Student Drug Use.

    ERIC Educational Resources Information Center

    Traub, Stuart H.

    1983-01-01

    Examined female college students' (N=466) drug use, marihuana use in particular. Results indicated that the gap in marihuana usage patterns between females and males has substantially narrowed. Female marihuana users used other drugs quite extensively and had friends who use marihuana. Peer influence was a major factor in drug use. (JAC)

  13. ARES (Automated Residential Energy Standard) 1.2: User`s guide, in support of proposed interim energy conservation voluntary performance standards for new non-federal residential buildings: Volume 1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    The ARES (Automated Residential Energy Standard) User`s Guide is designed to the user successfully operate the ARES computer program. This guide assumes that the user is familiar with basic PC skills such as using a keyboard and loading a disk drive. The ARES computer program was designed to assist building code officials in creating a residential energy standard based on local climate and costs.

  14. Association between Adverse Life Events and Addictive Behaviors among Male and Female Adolescents

    PubMed Central

    Lee, Grace P.; Storr, Carla L.; Ialongo, Nicholas S.; Martins, Silvia S.

    2012-01-01

    Background Adverse life events have been associated with gambling and substance use as they can serve as forms of escapism. Involvement in gambling and substance use can also place individuals in adversely stressful situations. Objectives To explore potential male-female differences in the association between addictive behavior and adverse life events among an urban cohort of adolescents. Methods The study sample comprised of 515 adolescent participants in a randomized prevention trial. With self-reported data, four addictive behavior groups were created: Non-Substance Users and Non-Gamblers, Substance Users Only, Gamblers Only, and Substance Users and Gamblers. Multinomial logistic regression analyses with interaction terms of sex and adverse life events were conducted. Results Adverse life events and engaging in at least one addictive behavior were common for both sexes. Substance Users and Gamblers had more than twice the likelihood of Non-Substance Users and Non-Gamblers to experience any event as well as events of various domains (i.e., relationship, violence, and instability). Neither relationship nor instability events’ associations with the co-occurrence of substance use and gambling significantly differed between sexes. Conversely, females exposed to violence events were significantly more likely than similarly exposed males to report the co-occurrence of substance use and gambling. Conclusion Findings from the current study prompt future studies to devote more attention to the development of effective programs that teach adaptive coping strategies to adolescents, particularly to females upon exposure to violence. PMID:23082829

  15. Association between adverse life events and addictive behaviors among male and female adolescents.

    PubMed

    Lee, Grace P; Storr, Carla L; Ialongo, Nicholas S; Martins, Silvia S

    2012-01-01

    Adverse life events have been associated with gambling and substance use as they can serve as forms of escapism. Involvement in gambling and substance use can also place individuals in adversely stressful situations. To explore potential male-female differences in the association between addictive behavior and adverse life events among an urban cohort of adolescents. The study sample comprised of 515 adolescent participants in a randomized prevention trial. With self-reported data, four addictive behavior groups were created: nonsubstance users and nongamblers, substance users only, gamblers only, and substance users and gamblers. Multinomial logistic regression analyses with interaction terms of sex and adverse life events were conducted. Adverse life events and engaging in at least one addictive behavior were common for both sexes. Substance users and gamblers had more than twice the likelihood of nonsubstance users and nongamblers to experience any event as well as events of various domains (ie, relationship, violence, and instability). Neither relationship nor instability events' associations with the co-occurrence of substance use and gambling significantly differed between sexes. Conversely, females exposed to violence events were significantly more likely than similarly exposed males to report the co-occurrence of substance use and gambling. Findings from the current study prompt future studies to devote more attention to the development of effective programs that teach adaptive coping strategies to adolescents, particularly to females upon exposure to violence. Copyright © American Academy of Addiction Psychiatry.

  16. Research on Influence of Cloud Environment on Traditional Network Security

    NASA Astrophysics Data System (ADS)

    Ming, Xiaobo; Guo, Jinhua

    2018-02-01

    Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.

  17. Optimizing virtual reality for all users through gaze-contingent and adaptive focus displays

    PubMed Central

    Padmanaban, Nitish; Konrad, Robert; Stramer, Tal; Wetzstein, Gordon

    2017-01-01

    From the desktop to the laptop to the mobile device, personal computing platforms evolve over time. Moving forward, wearable computing is widely expected to be integral to consumer electronics and beyond. The primary interface between a wearable computer and a user is often a near-eye display. However, current generation near-eye displays suffer from multiple limitations: they are unable to provide fully natural visual cues and comfortable viewing experiences for all users. At their core, many of the issues with near-eye displays are caused by limitations in conventional optics. Current displays cannot reproduce the changes in focus that accompany natural vision, and they cannot support users with uncorrected refractive errors. With two prototype near-eye displays, we show how these issues can be overcome using display modes that adapt to the user via computational optics. By using focus-tunable lenses, mechanically actuated displays, and mobile gaze-tracking technology, these displays can be tailored to correct common refractive errors and provide natural focus cues by dynamically updating the system based on where a user looks in a virtual scene. Indeed, the opportunities afforded by recent advances in computational optics open up the possibility of creating a computing platform in which some users may experience better quality vision in the virtual world than in the real one. PMID:28193871

  18. A Distributed User Information System

    DTIC Science & Technology

    1990-03-01

    NOE08 Department of Computer Science NOVO 8 1990 University of Maryland S College Park, MD 20742 D Abstract Current user information database technology ...Transactions on Computer Systems, May 1988. [So189] K. Sollins. A plan for internet directory services. Technical report, DDN Network Information Center...2424 A Distributed User Information System DTiC Steven D. Miller, Scott Carson, and Leo Mark DELECTE Institute for Advanced Computer Studies and

  19. Self-Assessment and Student Improvement in an Introductory Computer Course at the Community College Level

    ERIC Educational Resources Information Center

    Spicer-Sutton, Jama; Lampley, James; Good, Donald W.

    2014-01-01

    The purpose of this study was to determine a student's computer knowledge upon course entry and if there was a difference in college students' improvement scores as measured by the difference in pretest and post-test scores of new or novice users, moderate users, and expert users at the end of a college level introductory computing class. This…

  20. Multiple-User, Multitasking, Virtual-Memory Computer System

    NASA Technical Reports Server (NTRS)

    Generazio, Edward R.; Roth, Don J.; Stang, David B.

    1993-01-01

    Computer system designed and programmed to serve multiple users in research laboratory. Provides for computer control and monitoring of laboratory instruments, acquisition and anlaysis of data from those instruments, and interaction with users via remote terminals. System provides fast access to shared central processing units and associated large (from megabytes to gigabytes) memories. Underlying concept of system also applicable to monitoring and control of industrial processes.

  1. Self-Assessment and Student Improvement in an Introductory Computer Course at the Community College-Level

    ERIC Educational Resources Information Center

    Spicer-Sutton, Jama

    2013-01-01

    The purpose of this study was to determine a student's computer knowledge upon course entry and if there was a difference in college students' improvement scores as measured by the difference in pretest and posttest scores of new or novice users, moderate users, and expert users at the end of a college-level introductory computing class. This…

  2. Exploratory Mixed-Method Study of End-User Computing within an Information Technology Infrastructure Library U.S. Army Service Delivery Environment

    ERIC Educational Resources Information Center

    Manzano, Sancho J., Jr.

    2012-01-01

    Empirical studies have been conducted on what is known as end-user computing from as early as the 1980s to present-day IT employees. There have been many studies on using quantitative instruments by Cotterman and Kumar (1989) and Rockart and Flannery (1983). Qualitative studies on end-user computing classifications have been conducted by…

  3. Embedded Process Modeling, Analogy-Based Option Generation and Analytical Graphic Interaction for Enhanced User-Computer Interaction: An Interactive Storyboard of Next Generation User-Computer Interface Technology. Phase 1

    DTIC Science & Technology

    1988-03-01

    structure of the interface is a mapping from the physical world [for example, the use of icons, which S have inherent meaning to users but represent...design alternatives. Mechanisms for linking the user to the computer include physical devices (keyboards), actions taken with the devices (keystrokes...VALUATION AIDES TEMLATEI IITCOM1I LATOR IACTICAL KNOWLEDGE ACGIUISITION MICNnII t 1 Fig. 9. INTACVAL. * OtJiCTs ARE PHYSICAL ENTITIES OR CONCEPTUAL EN

  4. Sex and strategy use matters for pattern separation, adult neurogenesis, and immediate early gene expression in the hippocampus.

    PubMed

    Yagi, Shunya; Chow, Carmen; Lieblich, Stephanie E; Galea, Liisa A M

    2016-01-01

    Adult neurogenesis in the dentate gyrus (DG) plays a crucial role for pattern separation, and there are sex differences in the regulation of neurogenesis. Although sex differences, favoring males, in spatial navigation have been reported, it is not known whether there are sex differences in pattern separation. The current study was designed to determine whether there are sex differences in the ability for separating similar or distinct patterns, learning strategy choice, adult neurogenesis, and immediate early gene (IEG) expression in the DG in response to pattern separation training. Male and female Sprague-Dawley rats received a single injection of the DNA synthesis marker, bromodeoxyuridine (BrdU), and were tested for the ability of separating spatial patterns in a spatial pattern separation version of delayed nonmatching to place task using the eight-arm radial arm maze. Twenty-seven days following BrdU injection, rats received a probe trial to determine whether they were idiothetic or spatial strategy users. We found that male spatial strategy users outperformed female spatial strategy users only when separating similar, but not distinct, patterns. Furthermore, male spatial strategy users had greater neurogenesis in response to pattern separation training than all other groups. Interestingly, neurogenesis was positively correlated with performance on similar pattern trials during pattern separation in female spatial strategy users but negatively correlated with performance in male idiothetic strategy users. These results suggest that the survival of new neurons may play an important positive role for pattern separation of similar patterns in females. Furthermore, we found sex and strategy differences in IEG expression in the CA1 and CA3 regions in response to pattern separation. These findings emphasize the importance of studying biological sex on hippocampal function and neural plasticity. © 2015 Wiley Periodicals, Inc.

  5. Why Females Do Not Choose Computing? A Lesson Learned from China

    ERIC Educational Resources Information Center

    Laosethakul, Kittipong; Leingpibul, Thaweephan

    2010-01-01

    Purpose: The declining participation of young American females in computing fields negatively impacts diversity in the computing-related workforce. While computing in China is also dominated by men, career prospects are positively perceived by Chinese women. The purpose of this paper is to investigate both countries' female gender perceptions…

  6. Fog computing job scheduling optimization based on bees swarm

    NASA Astrophysics Data System (ADS)

    Bitam, Salim; Zeadally, Sherali; Mellouk, Abdelhamid

    2018-04-01

    Fog computing is a new computing architecture, composed of a set of near-user edge devices called fog nodes, which collaborate together in order to perform computational services such as running applications, storing an important amount of data, and transmitting messages. Fog computing extends cloud computing by deploying digital resources at the premise of mobile users. In this new paradigm, management and operating functions, such as job scheduling aim at providing high-performance, cost-effective services requested by mobile users and executed by fog nodes. We propose a new bio-inspired optimization approach called Bees Life Algorithm (BLA) aimed at addressing the job scheduling problem in the fog computing environment. Our proposed approach is based on the optimized distribution of a set of tasks among all the fog computing nodes. The objective is to find an optimal tradeoff between CPU execution time and allocated memory required by fog computing services established by mobile users. Our empirical performance evaluation results demonstrate that the proposal outperforms the traditional particle swarm optimization and genetic algorithm in terms of CPU execution time and allocated memory.

  7. Field observations of display placement requirements and character size for presbyopic and prepresbyopic computer users.

    PubMed

    Bartha, Michael C; Allie, Paul; Kokot, Douglas; Roe, Cynthia Purvis

    2015-01-01

    Computer users continue to report eye and upper body discomfort even as workstation flexibility has improved. Research shows a relationship between character size, viewing distance, and reading performance. Few reports exist regarding text height viewed under normal office work conditions and eye discomfort. This paper reports self-selected computer display placement, text characteristics, and subjective comfort for older and younger computer workers under real-world conditions. Computer workers were provided with monitors and adjustable display support(s). In Study 1, older workers wearing progressive-addition lenses (PALs) were observed. In study 2, older workers wearing multifocal lenses and younger workers were observed. Workers wearing PALs experienced less eye and body discomfort with adjustable displays, and less eye and neck discomfort for text visual angles near or greater than ergonomic recommendations. Older workers wearing multifocal correction positioned displays much lower than younger workers. In general, computer users did not adjust character size to ensure that fovial images of text fell within the recommended range. Ergonomic display placement recommendations should be different for computer users wearing multifocal correction for presbyopia. Ergonomic training should emphasize adjusting text size for user comfort.

  8. Subjective Report of Side Effects of Prescribed and Nonprescribed Psychostimulant Use in Young Adults.

    PubMed

    Smith, Tess E; Martel, Michelle M; DeSantis, Alan D

    2017-03-21

    Side effects of prescribed and nonprescribed psychostimulant use are understudied. The study examined side effects of prescribed and nonprescribed psychostimulant use in a college sample with attention to possible gender differences. 2716 undergraduates (1448 male) between the ages of 17 and 57 years (M = 19.43 years, SD = 1.7 years) completed an online survey that included questions about the subjective side effects of prescribed and nonprescribed psychostimulant use. Results suggested that prescribed users more frequently reported side effects, compared to nonprescribed users. For prescribed users, females more frequently reported appetite, somatic, and anxiety-related side effects compared to males. For nonprescribed users, while females reported more somatic and anxiety-related side effects, males more frequently reported loss of sex drive and sweating as side effects. Conclusions/Importance: These findings suggest prescribed users of psychostimulants more frequently report side effects with prominent gender differences in line with gender roles.

  9. Sexual behavior, psychosocial and knowledge differences between consistent, inconsistent and non-users of condoms: a study of female bar and hotel workers in Moshi, Tanzania.

    PubMed

    Tassiopoulos, Katherine K; Seage, George R; Sam, Noel E; Ao, Trong T H; Masenga, Elisante J; Hughes, Michael D; Kapiga, Saidi H

    2006-07-01

    Understanding psychosocial, sexual behavior and knowledge differences between never, inconsistent and consistent condom users can improve interventions to increase condom use in resource-poor countries, but they have not been adequately studied. We examined these differences in a cohort of 961 female hotel and bar workers in Moshi, Tanzania. Forty-nine percent of women reported no condom use; 39% reported inconsistent use, and 12% reported consistent use. Women with multiple sexual partners in the past five years were less likely to be consistent rather than inconsistent users as were women who had ever exchanged sex for gifts or money. Inconsistent users had higher condom knowledge and higher perceived acceptability of condom use than did never users, but they did not differ from consistent users by these factors. There are important differences between women by level of condom use. These findings can help inform interventions to increase condom use.

  10. Problematics of different technical maintenance for computers

    NASA Technical Reports Server (NTRS)

    Dostalek, Z.

    1977-01-01

    Two modes of operations are used in the technical maintenance of computers: servicing provided by the equipment supplier, and that done by specially trained computer users. The advantages and disadvantages of both modes are discussed. Maintenance downtime is tabulated for two computers serviced by user employees over an eight year period.

  11. The diagnostic value and accuracy of conjunctival impression cytology, dry eye symptomatology, and routine tear function tests in computer users.

    PubMed

    Bhargava, Rahul; Kumar, Prachi; Kaur, Avinash; Kumar, Manjushri; Mishra, Anurag

    2014-07-01

    To compare the diagnostic value and accuracy of dry eye scoring system (DESS), conjunctival impression cytology (CIC), tear film breakup time (TBUT), and Schirmer's test in computer users. A case-control study was done at two referral eye centers. Eyes of 344 computer users were compared to 371 eyes of age and sex matched controls. Dry eye questionnaire (DESS) was administered to both groups and they further underwent measurement of TBUT, Schirmer's, and CIC. Correlation analysis was performed between DESS, CIC, TBUT, and Schirmer's test scores. A Pearson's coefficient of the linear expression (R (2)) of 0.5 or more was statistically significant. The mean age in cases (26.05 ± 4.06 years) was comparable to controls (25.67 ± 3.65 years) (P = 0.465). The mean symptom score in computer users was significantly higher as compared to controls (P < 0.001). Mean TBUT, Schirmer's test values, and goblet cell density were significantly reduced in computer users (P < 0.001). TBUT, Schirmer's, and CIC were abnormal in 48.5%, 29.1%, and 38.4% symptomatic computer users respectively as compared to 8%, 6.7%, and 7.3% symptomatic controls respectively. On correlation analysis, there was a significant (inverse) association of dry eye symptoms (DESS) with TBUT and CIC scores (R (2) > 0.5), in contrast to Schirmer's scores (R(2) < 0.5). Duration of computer usage had a significant effect on dry eye symptoms severity, TBUT, and CIC scores as compared to Schirmer's test. DESS should be used in combination with TBUT and CIC for dry eye evaluation in computer users.

  12. Cielo Computational Environment Usage Model With Mappings to ACE Requirements for the General Availability User Environment Capabilities Release Version 1.1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vigil,Benny Manuel; Ballance, Robert; Haskell, Karen

    Cielo is a massively parallel supercomputer funded by the DOE/NNSA Advanced Simulation and Computing (ASC) program, and operated by the Alliance for Computing at Extreme Scale (ACES), a partnership between Los Alamos National Laboratory (LANL) and Sandia National Laboratories (SNL). The primary Cielo compute platform is physically located at Los Alamos National Laboratory. This Cielo Computational Environment Usage Model documents the capabilities and the environment to be provided for the Q1 FY12 Level 2 Cielo Capability Computing (CCC) Platform Production Readiness Milestone. This document describes specific capabilities, tools, and procedures to support both local and remote users. The model ismore » focused on the needs of the ASC user working in the secure computing environments at Lawrence Livermore National Laboratory (LLNL), Los Alamos National Laboratory, or Sandia National Laboratories, but also addresses the needs of users working in the unclassified environment. The Cielo Computational Environment Usage Model maps the provided capabilities to the tri-Lab ASC Computing Environment (ACE) Version 8.0 requirements. The ACE requirements reflect the high performance computing requirements for the Production Readiness Milestone user environment capabilities of the ASC community. A description of ACE requirements met, and those requirements that are not met, are included in each section of this document. The Cielo Computing Environment, along with the ACE mappings, has been issued and reviewed throughout the tri-Lab community.« less

  13. CARE+ user study: usability and attitudes towards a tablet pc computer counseling tool for HIV+ men and women.

    PubMed

    Skeels, Meredith M; Kurth, Ann; Clausen, Marc; Severynen, Anneleen; Garcia-Smith, Hal

    2006-01-01

    CARE+ is a tablet PC-based computer counseling tool designed to support medication adherence and secondary HIV prevention for people living with HIV. Thirty HIV+ men and women participated in our user study to assess usability and attitudes towards CARE+. We observed them using CARE+ for the first time and conducted a semi-structured interview afterwards. Our findings suggest computer counseling may reduce social bias and encourage participants to answer questions honestly. Participants felt that discussing sensitive subjects with a computer instead of a person reduced feelings of embarrassment and being judged, and promoted privacy. Results also confirm that potential users think computers can provide helpful counseling, and that many also want human counseling interaction. Our study also revealed that tablet PC-based applications are usable by our population of mixed experience computer users. Computer counseling holds great potential for providing assessment and health promotion to individuals with chronic conditions such as HIV.

  14. User's manual: Computer-aided design programs for inductor-energy-storage dc-to-dc electronic power converters

    NASA Technical Reports Server (NTRS)

    Huffman, S.

    1977-01-01

    Detailed instructions on the use of two computer-aided-design programs for designing the energy storage inductor for single winding and two winding dc to dc converters are provided. Step by step procedures are given to illustrate the formatting of user input data. The procedures are illustrated by eight sample design problems which include the user input and the computer program output.

  15. A five-layer users' need hierarchy of computer input device selection: a contextual observation survey of computer users with cervical spinal injuries (CSI).

    PubMed

    Tsai, Tsai-Hsuan; Nash, Robert J; Tseng, Kevin C

    2009-05-01

    This article presents how the researcher goes about answering the research question, 'how assistive technology impacts computer use among individuals with cervical spinal cord injury?' through an in-depth investigation into the real-life situations among computer operators with cervical spinal cord injuries (CSI). An in-depth survey was carried out to provide an insight into the function abilities and limitation, habitual practice and preference, choices and utilisation of input devices, personal and/or technical assistance, environmental set-up and arrangements and special requirements among 20 experienced computer users with cervical spinal cord injuries. Following the survey findings, a five-layer CSI users' needs hierarchy of input device selection and use was proposed. These needs were ranked in order: beginning with the most basic criterion at the bottom of the pyramid; lower-level criteria must be met before one moves onto the higher level. The users' needs hierarchy for CSI computer users, which had not been applied by previous research work and which has established a rationale for the development of alternative input devices. If an input device achieves the criteria set up in the needs hierarchy, then a good match of person and technology will be achieved.

  16. Pruning a decision tree for selecting computer-related assistive devices for people with disabilities.

    PubMed

    Chi, Chia-Fen; Tseng, Li-Kai; Jang, Yuh

    2012-07-01

    Many disabled individuals lack extensive knowledge about assistive technology, which could help them use computers. In 1997, Denis Anson developed a decision tree of 49 evaluative questions designed to evaluate the functional capabilities of the disabled user and choose an appropriate combination of assistive devices, from a selection of 26, that enable the individual to use a computer. In general, occupational therapists guide the disabled users through this process. They often have to go over repetitive questions in order to find an appropriate device. A disabled user may require an alphanumeric entry device, a pointing device, an output device, a performance enhancement device, or some combination of these. Therefore, the current research eliminates redundant questions and divides Anson's decision tree into multiple independent subtrees to meet the actual demand of computer users with disabilities. The modified decision tree was tested by six disabled users to prove it can determine a complete set of assistive devices with a smaller number of evaluative questions. The means to insert new categories of computer-related assistive devices was included to ensure the decision tree can be expanded and updated. The current decision tree can help the disabled users and assistive technology practitioners to find appropriate computer-related assistive devices that meet with clients' individual needs in an efficient manner.

  17. The Graphical User Interface: Crisis, Danger, and Opportunity.

    ERIC Educational Resources Information Center

    Boyd, L. H.; And Others

    1990-01-01

    This article describes differences between the graphical user interface and traditional character-based interface systems, identifies potential problems posed by graphic computing environments for blind computer users, and describes some programs and strategies that are being developed to provide access to those environments. (Author/JDD)

  18. Male and Female Stimulant Use Among Rural Kentuckians: The Contribution of Spirituality and Religiosity

    PubMed Central

    Staton-Tindall, Michele; Oser, Carrie B.; Duvall, Jamieson L.; Havens, Jennifer R.; Webster, J. Matthew; Leukefeld, Carl; Booth, Brenda M.

    2017-01-01

    This study describes gender-specific patterns of drug use among active rural stimulant users and examines religiosity and spirituality as factors that may be related to stimulant use among males and females. The study includes a sample of 225 active rural stimulant users from Kentucky who were recruited using respondent driven sampling and completed face-to-face interviews. Findings suggest gender specific patterns among active rural stimulant users, with females reporting more amphetamine use. In addition, bivariate findings indicate that there is an inverse relationship between spirituality, religiosity, and stimulant use (specifically methamphetamine and amphetamine use), particularly for males. However, when further examining this relationship in multivariate models controlling for age and race, few significant findings were noted for spirituality and religiosity in predicting gender-specific stimulant use patterns. These findings suggest that treatment interventions that incorporate spirituality and religiosity should not only be gender specific, but should also target clients differentially. Findings on the degree of reported spirituality and religiosity also suggest that religious and/or faithbased organizations could be utilized for drug use interventions for rural stimulant users. PMID:29104311

  19. Nuclear changes in oral mucosa of alcoholics and crack cocaine users.

    PubMed

    Webber, L P; Pellicioli, A C A; Magnusson, A S; Danilevicz, C K; Bueno, C C; Sant'Ana Filho, M; Rados, P V; Carrard, V C

    2016-02-01

    The effects of drugs of abuse on oral mucosa are only partly understood. The aims of the present study were to: (1) evaluate the frequency of nuclear changes in normal-appearing oral mucosa of alcoholics and crack cocaine users and (2) assess their association with cell proliferation rate. Oral smears were obtained from the border of the tongue and floor of the mouth of 26 crack cocaine users (24 males and 2 females), 29 alcoholics (17 males and 12 females), and 35 controls (17 males and 18 females). Histological slides were submitted to Feulgen staining to assess the frequency of micronuclei (MN), binucleated cells (BN), broken eggs (BE), and karyorrhexis (KR). A significant increase in the frequency of MN was observed in cells exfoliated from the tongue of crack cocaine users (p = 0.01), and alcoholics showed a higher frequency of KR in cells obtained from the floor of the mouth (p = 0.01). Our findings suggest that the use of crack cocaine induces clastogenic effects, whereas alcoholism is associated with higher degrees of keratinization in the floor of the mouth. © The Author(s) 2015.

  20. Sunbeds and sunlamps: who used them and their risk for melanoma

    PubMed Central

    Fears, Thomas R.; Sagebiel, Richard W.; Halpern, Allan; Elder, David E.; Holly, Elizabeth A.; Guerry, DuPont; Tucker, Margaret A.

    2011-01-01

    Summary Sunbed/sunlamp use was recently classified as carcinogenic. This report considers characteristics of those who use sunbeds/sunlamps and the effect of sunbed/sunlamp use on their risk for melanoma within a large case-control study carried out in 1991–2. Females were more likely than males to have used sunbeds/sunlamps. Use by females increased strongly and significantly with younger ages and with the perceived ability to tan. For females the individual risk for melanoma increased with typical session time and frequency of sessions. Use before age 20, current use and years of use were not significant. The use patterns of occasional and frequent users were very different. We estimate that typical 5 minute sessions would increase the risk for melanoma by 19% for frequent users (10+ sessions) and by 3% for occasional users (1–9 sessions). Body sites that are not generally exposed to sunlight were more common sites of primary melanomas for frequent sunbed/sunlamp users. For males, measures of sunbed/sunlamp use were not significantly associated with melanoma risk. PMID:21362155

  1. The roles of 'subjective computer training' and management support in the use of computers in community health centres.

    PubMed

    Yaghmaie, Farideh; Jayasuriya, Rohan

    2004-01-01

    There have been many changes made to information systems in the last decade. Changes in information systems require users constantly to update their computer knowledge and skills. Computer training is a critical issue for any user because it offers them considerable new skills. The purpose of this study was to measure the effects of 'subjective computer training' and management support on attitudes to computers, computer anxiety and subjective norms to use computers. The data were collected from community health centre staff. The results of the study showed that health staff trained in computer use had more favourable attitudes to computers, less computer anxiety and more awareness of others' expectations about computer use than untrained users. However, there was no relationship between management support and computer attitude, computer anxiety or subjective norms. Lack of computer training for the majority of healthcare staff confirmed the need for more attention to this issue, particularly in health centres.

  2. When in doubt, ask the audience: potential users' perceptions of Internet-delivered cognitive behavioural therapy for chronic pain.

    PubMed

    Schneider, Luke H; Hadjistavropoulos, Heather D

    2014-01-01

    Although research has demonstrated that Internet-delivered cognitive behavioural therapy (ICBT) for chronic pain helps with adjustment to pain, it remains unclear how this treatment option would initially be perceived by individuals with chronic pain. To explore initial perceptions of ICBT and to examine variables that correlate with an expressed interest in ICBT as a treatment option among individuals with chronic pain. A total of 129 individuals with chronic pain completed a survey assessing perceptions of ICBT and individual difference variables that could be correlated with expressed interest in ICBT (eg, demographic characteristics, pain, computer self-efficacy). Results showed that most participants perceived ICBT as a potentially valuable service with multiple benefits. Being female, having greater pain severity and interference, and having greater computer self-efficacy and lower computer anxiety were positively correlated with interest in receiving ICBT. Combined with previous research on treatment efficacy of ICBT for chronic pain, the results should serve to stimulate further research on integrating ICBT within existing health care services.

  3. Computer Science Research at Langley

    NASA Technical Reports Server (NTRS)

    Voigt, S. J. (Editor)

    1982-01-01

    A workshop was held at Langley Research Center, November 2-5, 1981, to highlight ongoing computer science research at Langley and to identify additional areas of research based upon the computer user requirements. A panel discussion was held in each of nine application areas, and these are summarized in the proceedings. Slides presented by the invited speakers are also included. A survey of scientific, business, data reduction, and microprocessor computer users helped identify areas of focus for the workshop. Several areas of computer science which are of most concern to the Langley computer users were identified during the workshop discussions. These include graphics, distributed processing, programmer support systems and tools, database management, and numerical methods.

  4. Error correcting code with chip kill capability and power saving enhancement

    DOEpatents

    Gara, Alan G [Mount Kisco, NY; Chen, Dong [Croton On Husdon, NY; Coteus, Paul W [Yorktown Heights, NY; Flynn, William T [Rochester, MN; Marcella, James A [Rochester, MN; Takken, Todd [Brewster, NY; Trager, Barry M [Yorktown Heights, NY; Winograd, Shmuel [Scarsdale, NY

    2011-08-30

    A method and system are disclosed for detecting memory chip failure in a computer memory system. The method comprises the steps of accessing user data from a set of user data chips, and testing the user data for errors using data from a set of system data chips. This testing is done by generating a sequence of check symbols from the user data, grouping the user data into a sequence of data symbols, and computing a specified sequence of syndromes. If all the syndromes are zero, the user data has no errors. If one of the syndromes is non-zero, then a set of discriminator expressions are computed, and used to determine whether a single or double symbol error has occurred. In the preferred embodiment, less than two full system data chips are used for testing and correcting the user data.

  5. Computer programs: Information retrieval and data analysis, a compilation

    NASA Technical Reports Server (NTRS)

    1972-01-01

    The items presented in this compilation are divided into two sections. Section one treats of computer usage devoted to the retrieval of information that affords the user rapid entry into voluminous collections of data on a selective basis. Section two is a more generalized collection of computer options for the user who needs to take such data and reduce it to an analytical study within a specific discipline. These programs, routines, and subroutines should prove useful to users who do not have access to more sophisticated and expensive computer software.

  6. Capturing and analyzing wheelchair maneuvering patterns with mobile cloud computing.

    PubMed

    Fu, Jicheng; Hao, Wei; White, Travis; Yan, Yuqing; Jones, Maria; Jan, Yih-Kuen

    2013-01-01

    Power wheelchairs have been widely used to provide independent mobility to people with disabilities. Despite great advancements in power wheelchair technology, research shows that wheelchair related accidents occur frequently. To ensure safe maneuverability, capturing wheelchair maneuvering patterns is fundamental to enable other research, such as safe robotic assistance for wheelchair users. In this study, we propose to record, store, and analyze wheelchair maneuvering data by means of mobile cloud computing. Specifically, the accelerometer and gyroscope sensors in smart phones are used to record wheelchair maneuvering data in real-time. Then, the recorded data are periodically transmitted to the cloud for storage and analysis. The analyzed results are then made available to various types of users, such as mobile phone users, traditional desktop users, etc. The combination of mobile computing and cloud computing leverages the advantages of both techniques and extends the smart phone's capabilities of computing and data storage via the Internet. We performed a case study to implement the mobile cloud computing framework using Android smart phones and Google App Engine, a popular cloud computing platform. Experimental results demonstrated the feasibility of the proposed mobile cloud computing framework.

  7. Acceptance of Cloud Services in Face-to-Face Computer-Supported Collaborative Learning: A Comparison between Single-User Mode and Multi-User Mode

    ERIC Educational Resources Information Center

    Wang, Chia-Sui; Huang, Yong-Ming

    2016-01-01

    Face-to-face computer-supported collaborative learning (CSCL) was used extensively to facilitate learning in classrooms. Cloud services not only allow a single user to edit a document, but they also enable multiple users to simultaneously edit a shared document. However, few researchers have compared student acceptance of such services in…

  8. Enabling Disabled Persons to Gain Access to Digital Media

    NASA Technical Reports Server (NTRS)

    Beach, Glenn; OGrady, Ryan

    2011-01-01

    A report describes the first phase in an effort to enhance the NaviGaze software to enable profoundly disabled persons to operate computers. (Running on a Windows-based computer equipped with a video camera aimed at the user s head, the original NaviGaze software processes the user's head movements and eye blinks into cursor movements and mouse clicks to enable hands-free control of the computer.) To accommodate large variations in movement capabilities among disabled individuals, one of the enhancements was the addition of a graphical user interface for selection of parameters that affect the way the software interacts with the computer and tracks the user s movements. Tracking algorithms were improved to reduce sensitivity to rotations and reduce the likelihood of tracking the wrong features. Visual feedback to the user was improved to provide an indication of the state of the computer system. It was found that users can quickly learn to use the enhanced software, performing single clicks, double clicks, and drags within minutes of first use. Available programs that could increase the usability of NaviGaze were identified. One of these enables entry of text by using NaviGaze as a mouse to select keys on a virtual keyboard.

  9. Users matter : multi-agent systems model of high performance computing cluster users.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    North, M. J.; Hood, C. S.; Decision and Information Sciences

    2005-01-01

    High performance computing clusters have been a critical resource for computational science for over a decade and have more recently become integral to large-scale industrial analysis. Despite their well-specified components, the aggregate behavior of clusters is poorly understood. The difficulties arise from complicated interactions between cluster components during operation. These interactions have been studied by many researchers, some of whom have identified the need for holistic multi-scale modeling that simultaneously includes network level, operating system level, process level, and user level behaviors. Each of these levels presents its own modeling challenges, but the user level is the most complex duemore » to the adaptability of human beings. In this vein, there are several major user modeling goals, namely descriptive modeling, predictive modeling and automated weakness discovery. This study shows how multi-agent techniques were used to simulate a large-scale computing cluster at each of these levels.« less

  10. Gender Differences and Correlated Factors of Heroin Use Among Heroin Users.

    PubMed

    Zhou, Xiaobo; Yi, Zhihua; Yang, Xiaorong; Wang, Zhuo; Lyu, Xianxiang; Li, Jing

    2017-01-02

    Gender differences in illicit drug use are becoming increasingly recognized. However, there are few studies concerning differences between male and female heroin users in China. The study aimed to explore gender differences in terms of socio-demographic characteristics, drug-related behaviors, and treatment history among a heroin-using population in China. A cross-sectional study was conducted in four cities in December 2013. A total of 788 participants were recruited from several types of sites in each city: compulsory detoxification centers, methadone maintenance treatment clinics, and detention facilities. The data were collected via a self-administered questionnaire. Analysis of variance, chi-square test, and multivariate logistic regression analyses were conducted to examine gender differences in socio-demographic characteristics, drug-related behaviors, and treatment history. Female heroin users were more likely to be unemployed, have more education, and use heroin with their spouse/companion (p <.05). Male heroin users were more likely to be in detention facilities and MMT clinics, and relapse when they felt hopeless (p <.05). Conclusions/Importance: Although there were some similarities between male and female heroin users, significant gender differences do exist in some aspects of socio-demographic characteristics and heroin use. The data provide evidence that interventions aimed at preventing the initiation of heroin use and reducing relapse should take gender into account.

  11. Students' perceptions of constructivist Internet learning environments by a physics virtual laboratory: the gap between ideal and reality and gender differences.

    PubMed

    Chuang, Shih-Chyueh; Hwang, Fu-Kwun; Tsai, Chin-Chung

    2008-04-01

    The purpose of this study was to investigate the perceptions of Internet users of a physics virtual laboratory, Demolab, in Taiwan. Learners' perceptions of Internet-based learning environments were explored and the role of gender was examined by using preferred and actual forms of a revised Constructivist Internet-based Learning Environment Survey (CILES). The students expressed a clear gap between ideal and reality, and they showed higher preferences for many features of constructivist Internet-based learning environments than for features they had actually learned in Demolab. The results further suggested that male users prefer to be involved in the process of discussion and to show critical judgments. In addition, male users indicated they enjoyed the process of negotiation and discussion with others and were able to engage in reflective thoughts while learning in Demolab. In light of these findings, male users seemed to demonstrate better adaptability to the constructivist Internet-based learning approach than female users did. Although this study indicated certain differences between males and females in their responses to Internet-based learning environments, they also shared numerous similarities. A well-established constructivist Internet-based learning environment may encourage more female learners to participate in the science community.

  12. The differential effects of gender, anthropometry, and prior hormonal state on frontal plane knee joint stiffness

    PubMed Central

    Cammarata, Martha L.; Dhaher, Yasin Y.

    2012-01-01

    Background Gender differences in passive frontal plane knee stiffness may contribute to the increased anterior cruciate ligament injury rate in females. Gender-based stiffness differences have been attributed to anthropometric variations, but little data exist describing this relationship. Furthermore, sex hormone levels appear to influence joint stiffness, but the differential effects of instantaneous and prior hormonal concentrations remain unknown. This study sought to explore the effect of gender, prior hormonal status, and anthropometry on passive frontal plane knee joint stiffness. Methods Twelve males and 31 females participated. Females were grouped by hormonal contraceptive use (non users [n=11], monophasic contraceptive users [n=11], and triphasic contraceptive users [n=9]) and tested at the same point in the menstrual cycle. Subjects’ right knee was passively stretched ±7° in the frontal plane at 3°/s. Stiffness was estimated at three loading levels and normalized by body size to minimize anthropometric biases. A 4 (group) × 3 (load) repeated measures analysis of variance was performed for both raw and normalized stiffness. Linear regression analyses were preformed between stiffness estimates and knee diameter and quadriceps femoris angle. Findings Males displayed significantly greater (P<0.05) frontal plane stiffness than females. When normalized, males displayed significantly greater stiffness in valgus (P<0.05), but not varus (P>0.05) than females. No significant effect (P>0.05) of prior hormonal state was found; however, when normalized, varus stiffness was significantly less for triphasic contraceptive users than the other female groups (P<0.05). Quadriceps femoris angle was negatively correlated and knee diameter was positively correlated to knee stiffness. Interpretation Consistent with earlier in vitro findings, our data may indicate that ligament material properties are gender specific. A deficit in passive knee joint stiffness may place a larger burden on the neuromuscular system to resist frontal plane loading in females. PMID:18479791

  13. Impact of gender on decisions to participate in faecal immunochemical test-based colorectal cancer screening: a qualitative study.

    PubMed

    Clarke, Nicholas; Gallagher, Pamela; Kearney, Patricia M; McNamara, Deirdre; Sharp, Linda

    2016-12-01

    Faecal immunochemical tests (FITs) are increasingly being used in population-based colorectal cancer-screening programmes. Uptake of FIT is lower in men than women; however, the reasons for this are not well understood. We aimed to explore gender differences in influences on decisions to participate in FIT screening. This is a qualitative study using in-depth face-to-face interviews of four groups of screening invitees (male and female screening users and male and female screening non-users), purposively sampled from the database of a population-based FIT screening programme. Recruitment continued until saturation was reached. Interviews were audio recorded and transcribed verbatim. Thematic analysis using the framework approach was employed with the theoretical domains framework guiding analysis. Forty-seven screening invitees were interviewed. Six theoretical domains influenced screening uptake: 'environmental context and resources', 'beliefs about capabilities', 'beliefs about consequences', 'emotions', 'social influences' and 'knowledge'. Male non-users were often fatalistic, less knowledgeable and misinformed about cancer and FIT screening compared with other groups. Female non-users expressed negative attitudes, beliefs and emotions towards FIT screening, cancer, social influences and the medical profession and were over-confident about their health. Negative attitudes and emotions to screening dominated non-user decision-making but differed by gender. Opportunities to improve uptake in men and women exist. Greater national discussions on the benefits of FIT screening, and development of screening materials tackling negative attitudes and beliefs while recognising male/female differences, may improve screening uptake. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  14. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  15. Managing the Risks Associated with End-User Computing.

    ERIC Educational Resources Information Center

    Alavi, Maryam; Weiss, Ira R.

    1986-01-01

    Identifies organizational risks of end-user computing (EUC) associated with different stages of the end-user applications life cycle (analysis, design, implementation). Generic controls are identified that address each of the risks enumerated in a manner that allows EUC management to select those most appropriate to their EUC environment. (5…

  16. Interfacing HTCondor-CE with OpenStack

    NASA Astrophysics Data System (ADS)

    Bockelman, B.; Caballero Bejar, J.; Hover, J.

    2017-10-01

    Over the past few years, Grid Computing technologies have reached a high level of maturity. One key aspect of this success has been the development and adoption of newer Compute Elements to interface the external Grid users with local batch systems. These new Compute Elements allow for better handling of jobs requirements and a more precise management of diverse local resources. However, despite this level of maturity, the Grid Computing world is lacking diversity in local execution platforms. As Grid Computing technologies have historically been driven by the needs of the High Energy Physics community, most resource providers run the platform (operating system version and architecture) that best suits the needs of their particular users. In parallel, the development of virtualization and cloud technologies has accelerated recently, making available a variety of solutions, both commercial and academic, proprietary and open source. Virtualization facilitates performing computational tasks on platforms not available at most computing sites. This work attempts to join the technologies, allowing users to interact with computing sites through one of the standard Computing Elements, HTCondor-CE, but running their jobs within VMs on a local cloud platform, OpenStack, when needed. The system will re-route, in a transparent way, end user jobs into dynamically-launched VM worker nodes when they have requirements that cannot be satisfied by the static local batch system nodes. Also, once the automated mechanisms are in place, it becomes straightforward to allow an end user to invoke a custom Virtual Machine at the site. This will allow cloud resources to be used without requiring the user to establish a separate account. Both scenarios are described in this work.

  17. An enhanced mobile-healthcare emergency system based on extended chaotic maps.

    PubMed

    Lee, Cheng-Chi; Hsu, Che-Wei; Lai, Yan-Ming; Vasilakos, Athanasios

    2013-10-01

    Mobile Healthcare (m-Healthcare) systems, namely smartphone applications of pervasive computing that utilize wireless body sensor networks (BSNs), have recently been proposed to provide smartphone users with health monitoring services and received great attentions. An m-Healthcare system with flaws, however, may leak out the smartphone user's personal information and cause security, privacy preservation, or user anonymity problems. In 2012, Lu et al. proposed a secure and privacy-preserving opportunistic computing (SPOC) framework for mobile-Healthcare emergency. The brilliant SPOC framework can opportunistically gather resources on the smartphone such as computing power and energy to process the computing-intensive personal health information (PHI) in case of an m-Healthcare emergency with minimal privacy disclosure. To balance between the hazard of PHI privacy disclosure and the necessity of PHI processing and transmission in m-Healthcare emergency, in their SPOC framework, Lu et al. introduced an efficient user-centric privacy access control system which they built on the basis of an attribute-based access control mechanism and a new privacy-preserving scalar product computation (PPSPC) technique. However, we found out that Lu et al.'s protocol still has some secure flaws such as user anonymity and mutual authentication. To fix those problems and further enhance the computation efficiency of Lu et al.'s protocol, in this article, the authors will present an improved mobile-Healthcare emergency system based on extended chaotic maps. The new system is capable of not only providing flawless user anonymity and mutual authentication but also reducing the computation cost.

  18. Program For Generating Interactive Displays

    NASA Technical Reports Server (NTRS)

    Costenbader, Jay; Moleski, Walt; Szczur, Martha; Howell, David; Engelberg, Norm; Li, Tin P.; Misra, Dharitri; Miller, Philip; Neve, Leif; Wolf, Karl; hide

    1991-01-01

    Sun/Unix version of Transportable Applications Environment Plus (TAE+) computer program provides integrated, portable software environment for developing and running interactive window, text, and graphical-object-based application software systems. Enables programmer or nonprogrammer to construct easily custom software interface between user and application program and to move resulting interface program and its application program to different computers. Plus viewed as productivity tool for application developers and application end users, who benefit from resultant consistent and well-designed user interface sheltering them from intricacies of computer. Available in form suitable for following six different groups of computers: DEC VAX station and other VMS VAX computers, Macintosh II computers running AUX, Apollo Domain Series 3000, DEC VAX and reduced-instruction-set-computer workstations running Ultrix, Sun 3- and 4-series workstations running Sun OS and IBM RT/PC and PS/2 compute

  19. Computer Health Score

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The algorithm develops a single health score for office computers, today just Windows, but we plan to extend this to Apple computers. The score is derived from various parameters, including: CPU Utilization; Memory Utilization; Various Error logs; Disk Problems; and Disk write queue length. It then uses a weighting scheme to balance these parameters and provide an overall health score. By using these parameters, we are not just assessing the theoretical performance of the components of the computer, rather we are using actual performance metrics that are selected to be a more realistic representation of the experience of the personmore » using the computer. This includes compensating for the nature of their use. If there are two identical computers and the user of one places heavy demands on their computer compared with the user of the second computer, the former will have a lower health score. This allows us to provide a 'fit for purpose' score tailored to the assigned user. This is very helpful data to inform the mangers when individual computers need to be replaced. Additionally it provides specific information that can facilitate the fixing of the computer, to extend it's useful lifetime. This presents direct financial savings, time savings for users transferring from one computer to the next, and better environmental stewardship.« less

  20. P43-S Computational Biology Applications Suite for High-Performance Computing (BioHPC.net)

    PubMed Central

    Pillardy, J.

    2007-01-01

    One of the challenges of high-performance computing (HPC) is user accessibility. At the Cornell University Computational Biology Service Unit, which is also a Microsoft HPC institute, we have developed a computational biology application suite that allows researchers from biological laboratories to submit their jobs to the parallel cluster through an easy-to-use Web interface. Through this system, we are providing users with popular bioinformatics tools including BLAST, HMMER, InterproScan, and MrBayes. The system is flexible and can be easily customized to include other software. It is also scalable; the installation on our servers currently processes approximately 8500 job submissions per year, many of them requiring massively parallel computations. It also has a built-in user management system, which can limit software and/or database access to specified users. TAIR, the major database of the plant model organism Arabidopsis, and SGN, the international tomato genome database, are both using our system for storage and data analysis. The system consists of a Web server running the interface (ASP.NET C#), Microsoft SQL server (ADO.NET), compute cluster running Microsoft Windows, ftp server, and file server. Users can interact with their jobs and data via a Web browser, ftp, or e-mail. The interface is accessible at http://cbsuapps.tc.cornell.edu/.

  1. A framework supporting the development of a Grid portal for analysis based on ROI.

    PubMed

    Ichikawa, K; Date, S; Kaishima, T; Shimojo, S

    2005-01-01

    In our research on brain function analysis, users require two different simultaneous types of processing: interactive processing to a specific part of data and high-performance batch processing to an entire dataset. The difference between these two types of processing is in whether or not the analysis is for data in the region of interest (ROI). In this study, we propose a Grid portal that has a mechanism to freely assign computing resources to the users on a Grid environment according to the users' two different types of processing requirements. We constructed a Grid portal which integrates interactive processing and batch processing by the following two mechanisms. First, a job steering mechanism controls job execution based on user-tagged priority among organizations with heterogeneous computing resources. Interactive jobs are processed in preference to batch jobs by this mechanism. Second, a priority-based result delivery mechanism that administrates a rank of data significance. The portal ensures a turn-around time of interactive processing by the priority-based job controlling mechanism, and provides the users with quality of services (QoS) for interactive processing. The users can access the analysis results of interactive jobs in preference to the analysis results of batch jobs. The Grid portal has also achieved high-performance computation of MEG analysis with batch processing on the Grid environment. The priority-based job controlling mechanism has been realized to freely assign computing resources to the users' requirements. Furthermore the achievement of high-performance computation contributes greatly to the overall progress of brain science. The portal has thus made it possible for the users to flexibly include the large computational power in what they want to analyze.

  2. Computational high-resolution heart phantoms for medical imaging and dosimetry simulations

    NASA Astrophysics Data System (ADS)

    Gu, Songxiang; Gupta, Rajiv; Kyprianou, Iacovos

    2011-09-01

    Cardiovascular disease in general and coronary artery disease (CAD) in particular, are the leading cause of death worldwide. They are principally diagnosed using either invasive percutaneous transluminal coronary angiograms or non-invasive computed tomography angiograms (CTA). Minimally invasive therapies for CAD such as angioplasty and stenting are rendered under fluoroscopic guidance. Both invasive and non-invasive imaging modalities employ ionizing radiation and there is concern for deterministic and stochastic effects of radiation. Accurate simulation to optimize image quality with minimal radiation dose requires detailed, gender-specific anthropomorphic phantoms with anatomically correct heart and associated vasculature. Such phantoms are currently unavailable. This paper describes an open source heart phantom development platform based on a graphical user interface. Using this platform, we have developed seven high-resolution cardiac/coronary artery phantoms for imaging and dosimetry from seven high-quality CTA datasets. To extract a phantom from a coronary CTA, the relationship between the intensity distribution of the myocardium, the ventricles and the coronary arteries is identified via histogram analysis of the CTA images. By further refining the segmentation using anatomy-specific criteria such as vesselness, connectivity criteria required by the coronary tree and image operations such as active contours, we are able to capture excellent detail within our phantoms. For example, in one of the female heart phantoms, as many as 100 coronary artery branches could be identified. Triangular meshes are fitted to segmented high-resolution CTA data. We have also developed a visualization tool for adding stenotic lesions to the coronaries. The male and female heart phantoms generated so far have been cross-registered and entered in the mesh-based Virtual Family of phantoms with matched age/gender information. Any phantom in this family, along with user-defined stenoses, can be used to obtain clinically realistic projection images with the Monte Carlo code penMesh for optimizing imaging and dosimetry.

  3. HEPLIB `91: International users meeting on the support and environments of high energy physics computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnstad, H.

    The purpose of this meeting is to discuss the current and future HEP computing support and environments from the perspective of new horizons in accelerator, physics, and computing technologies. Topics of interest to the Meeting include (but are limited to): the forming of the HEPLIB world user group for High Energy Physic computing; mandate, desirables, coordination, organization, funding; user experience, international collaboration; the roles of national labs, universities, and industry; range of software, Monte Carlo, mathematics, physics, interactive analysis, text processors, editors, graphics, data base systems, code management tools; program libraries, frequency of updates, distribution; distributed and interactive computing, datamore » base systems, user interface, UNIX operating systems, networking, compilers, Xlib, X-Graphics; documentation, updates, availability, distribution; code management in large collaborations, keeping track of program versions; and quality assurance, testing, conventions, standards.« less

  4. HEPLIB 91: International users meeting on the support and environments of high energy physics computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnstad, H.

    The purpose of this meeting is to discuss the current and future HEP computing support and environments from the perspective of new horizons in accelerator, physics, and computing technologies. Topics of interest to the Meeting include (but are limited to): the forming of the HEPLIB world user group for High Energy Physic computing; mandate, desirables, coordination, organization, funding; user experience, international collaboration; the roles of national labs, universities, and industry; range of software, Monte Carlo, mathematics, physics, interactive analysis, text processors, editors, graphics, data base systems, code management tools; program libraries, frequency of updates, distribution; distributed and interactive computing, datamore » base systems, user interface, UNIX operating systems, networking, compilers, Xlib, X-Graphics; documentation, updates, availability, distribution; code management in large collaborations, keeping track of program versions; and quality assurance, testing, conventions, standards.« less

  5. Analysis of Delays in Transmitting Time Code Using an Automated Computer Time Distribution System

    DTIC Science & Technology

    1999-12-01

    jlevine@clock. bldrdoc.gov Abstract An automated computer time distribution system broadcasts standard tune to users using computers and modems via...contributed to &lays - sofhareplatform (50% of the delay), transmission speed of time- codes (25OA), telephone network (lS%), modem and others (10’4). The... modems , and telephone lines. Users dial the ACTS server to receive time traceable to the national time scale of Singapore, UTC(PSB). The users can in

  6. From Evidence-Based Research to Practice-Based Evidence: Disseminating a Web-Based Computer-Tailored Workplace Sitting Intervention through a Health Promotion Organisation.

    PubMed

    Cocker, Katrien De; Cardon, Greet; Bennie, Jason A; Kolbe-Alexander, Tracy; Meester, Femke De; Vandelanotte, Corneel

    2018-05-22

    Prolonged sitting has been linked to adverse health outcomes; therefore, we developed and examined a web-based, computer-tailored workplace sitting intervention. As we had previously shown good effectiveness, the next stage was to conduct a dissemination study. This study reports on the dissemination efforts of a health promotion organisation, associated costs, reach achieved, and attributes of the website users. The organisation systematically registered all the time and resources invested to promote the intervention. Website usage statistics (reach) and descriptive statistics (website users' attributes) were also assessed. Online strategies (promotion on their homepage; sending e-mails, newsletters, Twitter, Facebook and LinkedIn posts to professional partners) were the main dissemination methods. The total time investment was 25.6 h, which cost approximately 845 EUR in salaries. After sixteen months, 1599 adults had visited the website and 1500 (93.8%) completed the survey to receive personalized sitting advice. This sample was 38.3 ± 11.0 years, mainly female (76.9%), college/university educated (89.0%), highly sedentary (88.5% sat >8 h/day) and intending to change (93.0%) their sitting. Given the small time and money investment, these outcomes are positive and indicate the potential for wide-scale dissemination. However, more efforts are needed to reach men, non-college/university educated employees, and those not intending behavioural change.

  7. Gender Digital Divide and Challenges in Undergraduate Computer Science Programs

    ERIC Educational Resources Information Center

    Stoilescu, Dorian; McDougall, Douglas

    2011-01-01

    Previous research revealed a reduced number of female students registered in computer science studies. In addition, the female students feel isolated, have reduced confidence, and underperform. This article explores differences between female and male students in undergraduate computer science programs in a mid-size university in Ontario. Based on…

  8. SU-F-T-111: Investigation of the Attila Deterministic Solver as a Supplement to Monte Carlo for Calculating Out-Of-Field Radiotherapy Dose

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mille, M; Lee, C; Failla, G

    Purpose: To use the Attila deterministic solver as a supplement to Monte Carlo for calculating out-of-field organ dose in support of epidemiological studies looking at the risks of second cancers. Supplemental dosimetry tools are needed to speed up dose calculations for studies involving large-scale patient cohorts. Methods: Attila is a multi-group discrete ordinates code which can solve the 3D photon-electron coupled linear Boltzmann radiation transport equation on a finite-element mesh. Dose is computed by multiplying the calculated particle flux in each mesh element by a medium-specific energy deposition cross-section. The out-of-field dosimetry capability of Attila is investigated by comparing averagemore » organ dose to that which is calculated by Monte Carlo simulation. The test scenario consists of a 6 MV external beam treatment of a female patient with a tumor in the left breast. The patient is simulated by a whole-body adult reference female computational phantom. Monte Carlo simulations were performed using MCNP6 and XVMC. Attila can export a tetrahedral mesh for MCNP6, allowing for a direct comparison between the two codes. The Attila and Monte Carlo methods were also compared in terms of calculation speed and complexity of simulation setup. A key perquisite for this work was the modeling of a Varian Clinac 2100 linear accelerator. Results: The solid mesh of the torso part of the adult female phantom for the Attila calculation was prepared using the CAD software SpaceClaim. Preliminary calculations suggest that Attila is a user-friendly software which shows great promise for our intended application. Computational performance is related to the number of tetrahedral elements included in the Attila calculation. Conclusion: Attila is being explored as a supplement to the conventional Monte Carlo radiation transport approach for performing retrospective patient dosimetry. The goal is for the dosimetry to be sufficiently accurate for use in retrospective epidemiological investigations.« less

  9. Human factors aspects of control room design

    NASA Technical Reports Server (NTRS)

    Jenkins, J. P.

    1983-01-01

    A plan for the design and analysis of a multistation control room is reviewed. It is found that acceptance of the computer based information system by the uses in the control room is mandatory for mission and system success. Criteria to improve computer/user interface include: match of system input/output with user; reliability, compatibility and maintainability; easy to learn and little training needed; self descriptive system; system under user control; transparent language, format and organization; corresponds to user expectations; adaptable to user experience level; fault tolerant; dialog capability user communications needs reflected in flexibility, complexity, power and information load; integrated system; and documentation.

  10. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  11. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359

  12. End-user satisfaction of a patient education tool manual versus computer-generated tool.

    PubMed

    Tronni, C; Welebob, E

    1996-01-01

    This article reports a nonexperimental comparative study of end-user satisfaction before and after implementation of a vendor supplied computerized system (Micromedex, Inc) for providing up-to-date patient instructions regarding diseases, injuries, procedures, and medications. The purpose of this research was to measure the satisfaction of nurses who directly interact with a specific patient educational software application and to compare user satisfaction with manual versus computer generated materials. A computing satisfaction questionnaire that uses a scale of 1 to 5 (1 being the lowest) was used to measure end-user computing satisfaction in five constructs: content, accuracy, format, ease of use, and timeliness. Summary statistics were used to calculate mean ratings for each of the questionnaire's 12 items and for each of the five constructs. Mean differences between the ratings before and after implementation of the five constructs were significant by paired t test. Total user satisfaction improved with the computerized system, and the computer generated materials were given a higher rating than were the manual materials. Implications of these findings are discussed.

  13. Computer and video game addiction-a comparison between game users and non-game users.

    PubMed

    Weinstein, Aviv Malkiel

    2010-09-01

    Computer game addiction is excessive or compulsive use of computer and video games that may interfere with daily life. It is not clear whether video game playing meets diagnostic criteria for Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (DSM-IV). First objective is to review the literature on computer and video game addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Second objective is to describe a brain imaging study measuring dopamine release during computer game playing. Article search of 15 published articles between 2000 and 2009 in Medline and PubMed on computer and video game addiction. Nine abstinent "ecstasy" users and 8 control subjects were scanned at baseline and after performing on a motorbike riding computer game while imaging dopamine release in vivo with [123I] IBZM and single photon emission computed tomography (SPECT). Psycho-physiological mechanisms underlying computer game addiction are mainly stress coping mechanisms, emotional reactions, sensitization, and reward. Computer game playing may lead to long-term changes in the reward circuitry that resemble the effects of substance dependence. The brain imaging study showed that healthy control subjects had reduced dopamine D2 receptor occupancy of 10.5% in the caudate after playing a motorbike riding computer game compared with baseline levels of binding consistent with increased release and binding to its receptors. Ex-chronic "ecstasy" users showed no change in levels of dopamine D2 receptor occupancy after playing this game. This evidence supports the notion that psycho-stimulant users have decreased sensitivity to natural reward. Computer game addicts or gamblers may show reduced dopamine response to stimuli associated with their addiction presumably due to sensitization.

  14. Let's Be Blunt: Consumption Methods Matter Among Black Marijuana Smokers.

    PubMed

    Montgomery, LaTrice; Bagot, Kara

    2016-05-01

    Despite the high prevalence of blunt (i.e., hollowed-out cigars that are filled with marijuana) use among Black marijuana smokers, few studies have examined if and how blunt users differ from traditional joint users. The current study compared the prevalence and patterns of use for those who smoked blunts in the past month (i.e., blunt users) with those who used marijuana through other methods (i.e., other marijuana users). The sample included 935 Black past-month marijuana smokers participating in the 2013 National Survey on Drug Use and Health. Among past-month marijuana smokers, 73.2% were blunt users and 26.8% were other marijuana users. Overall, blunt users initiated marijuana use at an earlier age (15.9 vs. 17.3 years, p < .01) and reported more days of marijuana use in the past month (16 vs. 8 days, p < .01) than did other marijuana users. There were also differences by gender. Among females, blunt users reported a higher odds of past-year marijuana abuse or dependence (23.8%) than other marijuana users (11.2%) (adjusted odds ratio = 1.23, 95% CI [1.12, 3.17], p < .01). However, blunt-using males reported similar odds of past-year marijuana abuse or dependence (approximately 25%) as other marijuana-using males. These findings highlight the need for targeted interventions for blunt users as a subgroup of marijuana users, especially among Black females, who may be at increased risk for developing a marijuana use disorder as a result of blunt smoking.

  15. USER'S GUIDE TO THE PERSONAL COMPUTER VERSION OF THE BIOGENIC EMISSIONS INVENTORY SYSTEM (PC-BEIS2)

    EPA Science Inventory

    The document is a user's guide for an updated Personal Computer version of the Biogenic Emissions Inventory System (PC-BEIS2), allowing users to estimate hourly emissions of biogenic volatile organic compounds (BVOCs) and soil nitrogen oxide emissions for any county in the contig...

  16. Balancing Computer Resources with Institutional Needs. AIR Forum Paper 1978.

    ERIC Educational Resources Information Center

    McLaughlin, Gerald W.; And Others

    To estimate computer needs at a higher education institution, the major types of users and their future needs should be determined. In a large or complex university, three major groups of users are typically instructional, research, and administrative. After collecting information on the needs of these users, the needs can be translated into…

  17. User's guide to the SEPHIS computer code for calculating the Thorex solvent extraction system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Watson, S.B.; Rainey, R.H.

    1979-05-01

    The SEPHIS computer program was developed to simulate the countercurrent solvent extraction process. The code has now been adapted to model the Acid Thorex flow sheet. This report represents a practical user's guide to SEPHIS - Thorex containing a program description, user information, program listing, and sample input and output.

  18. User's Guide for SKETCH

    NASA Technical Reports Server (NTRS)

    Hedgley, David R., Jr.

    2000-01-01

    A user's guide for the computer program SKETCH is presented on this disk. SKETCH solves a popular problem in computer graphics-the removal of hidden lines from images of solid objects. Examples and illustrations are included in the guide. Also included is the SKETCH program, so a user can incorporate the information into a particular software system.

  19. User's guide to SILVAH

    Treesearch

    Peter D. Knopp; Susan L. Stout

    2014-01-01

    This user's guide for the SILVAH computer program, version 6.2, supersedes the 1992 user's guide (Gen. Tech. Rep. NE-162). Designed for stand-alone Windows-based personal computers, SILVAH recommends a silvicultural prescription for a forest stand based on a summary and analysis of field inventory data. The program also includes a simulator that can be used...

  20. Musculoskeletal pain among undergraduate laptop users in a Nigerian University.

    PubMed

    Obembe, Adebimpe Olayinka; Johnson, Olubusola Esther; Tanimowo, Tolulope Odunayo; Onigbinde, Ayodele Teslim; Emechete, Anne Anthonette

    2013-01-01

    Musculoskeletal disorder is a significant health problem affecting adults and young people alike. The prevalence of musculoskeletal pain resulting from musculoskeletal disorders is on the increase especially with increased use of laptops. This study determined the prevalence of musculoskeletal pain among undergraduate students of Obafemi Awolowo University (OAU), Ile-Ife who use laptops. This was a cross-sectional study and participants were selected using the non-probability sampling technique. The Boston University Computer and Health Survey questionnaire was self-administered to 400 undergraduate laptop users. Data were analyzed using descriptive statistics of frequency and percentage. Three hundred and seventy six out of 400 copies of administered questionnaires were amenable to data analysis representing a response rate of 94%. Pain in the shoulder was the most reported musculoskeletal complaint from 268 (75.7%) participants. Elbow pain was the least common complaint from 132 (37.3%) participants. The prevalence of musculoskeletal pain was slightly higher among female students 93 (50.3%) of 185 and highest among students aged between 24 and 26 years: 60 (37.5%). In addition, the prevalence of musculoskeletal complaints was highest among those who used single-strap laptop bags 176 (94.1%). There is a high prevalence of musculoskeletal pain among undergraduate laptop users in OAU and shoulder pain was the most commonly reported.

  1. Predicting Smartphone Operating System from Personality and Individual Differences.

    PubMed

    Shaw, Heather; Ellis, David A; Kendrick, Libby-Rae; Ziegler, Fenja; Wiseman, Richard

    2016-12-01

    Android and iPhone devices account for over 90 percent of all smartphones sold worldwide. Despite being very similar in functionality, current discourse and marketing campaigns suggest that key individual differences exist between users of these two devices; however, this has never been investigated empirically. This is surprising, as smartphones continue to gain momentum across a variety of research disciplines. In this article, we consider if individual differences exist between these two distinct groups. In comparison to Android users, we found that iPhone owners are more likely to be female, younger, and increasingly concerned about their smartphone being viewed as a status object. Key differences in personality were also observed with iPhone users displaying lower levels of Honesty-Humility and higher levels of emotionality. Following this analysis, we were also able to build and test a model that predicted smartphone ownership at above chance level based on these individual differences. In line with extended self-theory, the type of smartphone owned provides some valuable information about its owner. These findings have implications for the increasing use of smartphones within research particularly for those working within Computational Social Science and PsychoInformatics, where data are typically collected from devices and applications running a single smartphone operating system.

  2. Development of a Radiation Dose Reporting Software for X-ray Computed Tomography (CT)

    NASA Astrophysics Data System (ADS)

    Ding, Aiping

    X-ray computed tomography (CT) has experienced tremendous technological advances in recent years and has established itself as one of the most popular diagnostic imaging tools. While CT imaging clearly plays an invaluable role in modern medicine, its rapid adoption has resulted in a dramatic increase in the average medical radiation exposure to the worldwide and United States populations. Existing software tools for CT dose estimation and reporting are mostly based on patient phantoms that contain overly simplified anatomies insufficient in meeting the current and future needs. This dissertation describes the development of an easy-to-use software platform, “VirtualDose”, as a service to estimate and report the organ dose and effective dose values for patients undergoing the CT examinations. “VirtualDose” incorporates advanced models for the adult male and female, pregnant women, and children. To cover a large portion of the ignored obese patients that frequents the radiology clinics, a new set of obese male and female phantoms are also developed and applied to study the effects of the fat tissues on the CT radiation dose. Multi-detector CT scanners (MDCT) and clinical protocols, as well as the most recent effective dose algorithms from the International Commission on Radiological Protection (ICRP) Publication 103 are adopted in “VirtualDose” to keep pace with the MDCT development and regulatory requirements. A new MDCT scanner model with both body and head bowtie filter is developed to cover both the head and body scanning modes. This model was validated through the clinical measurements. A comprehensive slice-by-slice database is established by deriving the data from a larger number of single axial scans simulated on the patient phantoms using different CT bowtie filters, beam thicknesses, and different tube voltages in the Monte Carlo N-Particle Extended (MCNPX) code. When compared to the existing CT dose software packages, organ dose data in this software provides a better CT dose assessment by using anatomically realistic patient phantoms. All the related organ doses are incorporated into a standardized database compiled using Microsoft Structured Query Language (SQL) server 2008. Organ doses from contiguous axial or helical scans defined by a specific protocol can be rapidly obtained from the database. A next-generation software architecture and Active Server Pages (ASP) .NET framework are adopted to create a browser-hosted application to improve the user interactivity and reporting functionality including scanning parameter selection and organ dose reporting. “VirtualDose” has been developed as a web-based CT dose reporting platform to facilitate several important features including: (1) easy access via Internet; (2) no need for installation on the local computer; (3) a user-friendly, dynamic, browser-hosted graphical user interface; (4) use of advanced patient models for the adult male and female, pregnant women, children, and obese patient models; (5) adoption of modern CT scanners and protocols, as well as the most recent ICRP 103 effective dose algorithms; and (6) flexibility to manage and easily upgrade without impacting user’s usage.

  3. How to Create, Modify, and Interface Aspen In-House and User Databanks for System Configuration 1:

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Camp, D W

    2000-10-27

    The goal of this document is to provide detailed instructions to create, modify, interface, and test Aspen User and In-House databanks with minimal frustration. The level of instructions are aimed at a novice Aspen Plus simulation user who is neither a programming nor computer-system expert. The instructions are tailored to Version 10.1 of Aspen Plus and the specific computing configuration summarized in the Title of this document and detailed in Section 2. Many details of setting up databanks depend on the computing environment specifics, such as the machines, operating systems, command languages, directory structures, inter-computer communications software, the version ofmore » the Aspen Engine and Graphical User Interface (GUI), and the directory structure of how these were installed.« less

  4. User Participation and Participatory Design: Topics in Computing Education.

    ERIC Educational Resources Information Center

    Kautz, Karlheinz

    1996-01-01

    Discusses user participation and participatory design in the context of formal education for computing professionals. Topics include the current curriculum debate; mathematical- and engineering-based education; traditional system-development training; and an example of a course program that includes computers and society, and prototyping. (53…

  5. 75 FR 32915 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-10

    ... used to authenticate authorized desktop and laptop computer users. Computer servers are scanned monthly... data is also used for management and statistical reports and studies. Routine uses of records... duties. The computer files are password protected with access restricted to authorized users. Records are...

  6. Transfer of computer software technology through workshops: The case of fish bioenergetics modeling

    USGS Publications Warehouse

    Johnson, B.L.

    1992-01-01

    A three-part program is proposed to promote the availability and use of computer software packages to fishery managers and researchers. The approach consists of journal articles that announce new technologies, technical reports that serve as user's guides, and hands-on workshops that provide direct instruction to new users. Workshops, which allow experienced users to directly instruct novices in software operation and application are important, but often neglected. The author's experience with organizing and conducting bioenergetics modeling workshops suggests the optimal workshop would take 2 days, have 10-15 participants, one computer for every two users, and one instructor for every 5-6 people.

  7. Crime and Violence among MDMA Users in the United States

    PubMed Central

    Vaughn, Michael G.; Salas-Wright, Christopher P.; DeLisi, Matt; Perron, Brian E.; Cordova, David

    2015-01-01

    The question of whether MDMA use is associated with increased crime and violence has not been adequately explored especially in nationally representative samples. This study used data from the National Epidemiologic Survey on Alcohol and Related Conditions (NESARC) to assess the association between MDMA use and violent and non-violent antisocial behavior while controlling for sociodemographic variables, lifetime psychiatric, alcohol and drug use disorders, and family history of antisocial behavior. MDMA users, both male and female, were involved in a number of crimes in acts of violence including drunk driving, shoplifting, theft, intimate partner violence, and fighting. Notably, female MDMA users were more antisocial than male non-MDMA users. Although adjusting the results for numerous confounds attenuated the relationships, MDMA users were still at significantly greater odds of engaging in violent and nonviolent crime than non-MDMA users. Although MDMA has been considered a facilitator of empathy and closeness, the current study suggests a dark side as MDMA is associated with a broad array of crimes and transgressions. Additional tests of the MDMA-crime link are needed to properly inform policy. PMID:29546096

  8. Female-initiated barrier methods for the prevention of STI/HIV: where are we now? Where should we go?

    PubMed

    Latka, M

    2001-12-01

    The female condom has been on the US market for over 8 years and was hailed as a method that would allow women greater control in protecting themselves against unwanted pregnancy and sexually transmitted infections. However, since its launch, promotion of the female condom has met with challenges that vary from provider bias against the device, concerns about efficacy, and doubts about whether it will be used. While daunting, many of these challenges are not unique to the female condom. In fact, they parallel those of the tampon when it was first promoted in the US for menstrual hygiene in the early 1930s. Many providers were initially opposed to the tampon; early users found the tampon inadequate. Ten years after the introduction of the tampon and despite mass marketing, acceptability was mixed and use was modest (25% prevalence in a 26-city survey). Similar to female condom use observed in current-day prospective studies, users did not use the tampon exclusively or even predominantly. The story of the tampon demonstrates that a method does not have to be adopted by all users immediately to play an important role, and that even initially controversial methods can become widely accepted as mainstream. The early history of the tampon sheds perspective, and hope, on where we stand with the female condom. While much-needed work is under way to develop microbicides, we should take advantage of the fact that the female condom is already available and promote it to those in need now.

  9. Expression of "Kawaii" ("Cute"): Gender Reinforcement of Young Japanese Female School Children

    ERIC Educational Resources Information Center

    Asano-Cavanagh, Yuko

    2012-01-01

    This paper examines the Japanese word "kawaii" "cute". Teachers frequently use "kawaii" to show positive feelings toward objects in the classroom. Female children also are primary users of the word, which suggests that they are acquiring "kawaii" as an index of female gender identity. From a linguistic…

  10. Processes and Outcomes of Developing a Continuity of Care Document for Use as a Personal Health Record by People Living with HIV/AIDS in New York City

    PubMed Central

    Gordon, Peter; Camhi, Eli; Hesse, Ron; Odlum, Michelle; Schnall, Rebecca; Rodriguez, Martha; Valdez, Esmerlin; Bakken, Suzanne

    2015-01-01

    Purpose To describe the processes and outcomes of developing and implementing a Continuity of Care Document (CCD), My Health Profile, as personal health record for persons living with HIV (PLWH) in an HIV/AIDS Special Needs Plan (SNP) in New York City. Methods Multiple qualitative and quantitative data sources were used to describe the processes and outcomes of implementing My Health Profile including focus groups, Audio Computer Assisted Self Interview (ACASI) surveys, administrative databases, chart abstraction, usage logs, and project management records. Qualitative data were thematically analyzed. Quantitative data analytic methods included descriptive and multivariate statistics. Data were triangulated and synthesized using the Reach, Efficacy/Effectiveness, Adoption, Implementation, Maintenance (RE-AIM) Framework. Results Reach SNP members are predominantly African American or Hispanic/Latino and about one third are female. A larger proportion of African Americans and smaller proportions of Hispanics/Latinos and Whites were trained to use My Health Profile. Efficacy/Effectiveness CCDs were produced for 8,249 unique members and updated on a monthly basis, 509 members were trained to use My Health Profile. Total number of member logins for 112 active users was 1,808 and the longest duration of use was 1,008 days. There were no significant differences between users and non-users of My Health Profile in clinical outcomes, perceptions of the quality of medical care, or health service utilization. Adoption My Health Profile was well-matched to organizational mission, values, and priorities related to coordination of care for a high-risk population of PLWH. Implementation Pre-implementation focus group participants identified potential barriers to use of My Health Profile including functional and computer literacy, privacy and confidentiality concerns, potential reluctance to use technology, and cognitive challenges. Key strategies for addressing barriers included a dedicated bilingual coach for recruitment, training, and support; basic computer and My Health Profile training; transparent audit trail revealing clinician and case manager access of My Health Profile, time-limited passwords for sharing My Health Profile with others at the point of need, and emergency access mechanism. Maintenance My Health Profile was integrated into routine operational activities and its sustainability is facilitated by its foundation on standards for Health Information Exchange (HIE). Conclusions Although potential barriers exist to the use of PHRs such as My Health Profile, PLWH with complex medical needs, low socioeconomic status, and limited computer experience will use such tools when a sufficient level of user support is provided and privacy and confidentiality concerns are addressed. PMID:22841825

  11. Effects of Sex Work on the Prevalence of Syphilis Among Injection Drug Users in 3 Russian Cities

    PubMed Central

    Platt, Lucy; Rhodes, Tim; Judd, Ali; Koshkina, Evgeniya; Maksimova, Svetlana; Latishevskaya, Natalia; Renton, Adrian; McDonald, Tamara; Parry, John V.

    2007-01-01

    Objectives. We examined risk factors for syphilis infection among injection drug users in 3 Russian Federation cities, focusing particular attention on the potential roles of gender and sex work. Methods. We conducted a cross-sectional survey of injection drug users in Moscow, Volgograd, and Barnaul, collecting behavioral data and testing for antibodies to Treponema pallidum. Associations between presence of antibodies to T pallidum and covariates were explored. Results. Overall, the prevalence of antibodies to T pallidum was 11% (95% confidence interval=9.7%, 13.1%). Syphilis was associated with involvement in sex work and with gender in Moscow and Barnaul but not in Volgograd. Female injection drug users not involved in sex work were more likely than men to be younger and to have recently begun to inject; female injection drug users involved in sex work were more likely than those not involved in sex work to inject daily. Conclusions. Syphilis transmission dynamics varied by region. Sex work can increase syphilis risk among injection drug users, potentially feeding the momentum of sexually transmitted HIV and syphilis among noninjectors. Targeted interventions are needed to reduce both sexual and injection risk behaviors among injection drug users. PMID:17018827

  12. Switched on or switched off? A survey of mobile, computer and Internet use in a community mental health rehabilitation sample.

    PubMed

    Tobitt, Simon; Percival, Robert

    2017-07-04

    UK society is undergoing a technological revolution, including meeting health needs through technology. Government policy is shifting towards a "digital by default" position. Studies have trialled health technology interventions for those experiencing psychosis and shown them to be useful. To gauge levels of engagement with mobile phones (Internet-enabled or cell phone), computers and the Internet in the specific population of community mental health rehabilitation. Two surveys were conducted: with service-users on use/non-use of technologies, and interest in technology interventions and support; and with placements on facilities and support available to service-users. Levels of engagement in this population were substantially less than those recorded in the general UK and other clinical populations: 40.2% regularly use mobiles, 17.5% computers, and 14.4% the Internet. Users of all three technologies were significantly younger than non-users. Users of mobiles and computers were significantly more likely to live in lower support/higher independence placements. Of surveyed placements, 35.5% provide a communal computer and 38.7% IT skills sessions. Community mental health rehabilitation service-users risk finding themselves excluded by a "digital divide". Action is needed to ensure equal access to online opportunities, including healthcare innovations. Clinical and policy implications are discussed.

  13. Network support for system initiated checkpoints

    DOEpatents

    Chen, Dong; Heidelberger, Philip

    2013-01-29

    A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

  14. HIV infection in females dependent on drugs.

    PubMed

    Wai, B H; Singh, S; Varma, S L

    1996-03-01

    One hundred and seventy-one drug-dependent females in a drug rehabilitation centre were studied to estimate the prevalence of HIV infection among them. Twenty-four (14%) were positive on the Western Blot test. The presence of HIV infection was significantly correlated with syphilis (p < 0.03) and age (p < 0.001); 83% of those who were HIV positive were intravenous drug users. The need for harm reduction programmes to prevent spread of HIV infection among injecting drug users is stressed.

  15. Academic computer science and gender: A naturalistic study investigating the causes of attrition

    NASA Astrophysics Data System (ADS)

    Declue, Timothy Hall

    Far fewer women than men take computer science classes in high school, enroll in computer science programs in college, or complete advanced degrees in computer science. The computer science pipeline begins to shrink for women even before entering college, but it is at the college level that the "brain drain" is the most evident numerically, especially in the first class taken by most computer science majors called "Computer Science 1" or CS-I. The result, for both academia and industry, is a pronounced technological gender disparity in academic and industrial computer science. The study revealed the existence of several factors influencing success in CS-I. First, and most clearly, the effect of attribution processes seemed to be quite strong. These processes tend to work against success for females and in favor of success for males. Likewise, evidence was discovered which strengthens theories related to prior experience and the perception that computer science has a culture which is hostile to females. Two unanticipated themes related to the motivation and persistence of successful computer science majors. The findings did not support the belief that females have greater logistical problems in computer science than males, or that females tend to have a different programming style than males which adversely affects the females' ability to succeed in CS-I.

  16. Coordinating Technological Resources in a Non-Technical Profession: The Administrative Computer User Group.

    ERIC Educational Resources Information Center

    Rollo, J. Michael; Marmarchev, Helen L.

    1999-01-01

    The explosion of computer applications in the modern workplace has required student affairs professionals to keep pace with technological advances for office productivity. This article recommends establishing an administrative computer user groups, utilizing coordinated web site development, and enhancing working relationships as ways of dealing…

  17. Defining Information Needs of Computer Users: A Human Communication Problem.

    ERIC Educational Resources Information Center

    Kimbrough, Kenneth L.

    This exploratory investigation of the process of defining the information needs of computer users and the impact of that process on information retrieval focuses on communication problems. Six sites were visited that used computers to process data or to provide information, including the California Department of Transportation, the California…

  18. The Impact of User Interface on Young Children's Computational Thinking

    ERIC Educational Resources Information Center

    Pugnali, Alex; Sullivan, Amanda; Bers, Marina Umaschi

    2017-01-01

    Aim/Purpose: Over the past few years, new approaches to introducing young children to computational thinking have grown in popularity. This paper examines the role that user interfaces have on children's mastery of computational thinking concepts and positive interpersonal behaviors. Background: There is a growing pressure to begin teaching…

  19. Understanding the Internet.

    ERIC Educational Resources Information Center

    Oblinger, Diana

    The Internet is an international network linking hundreds of smaller computer networks in North America, Europe, and Asia. Using the Internet, computer users can connect to a variety of computers with little effort or expense. The potential for use by college faculty is enormous. The largest problem faced by most users is understanding what such…

  20. Computer Viruses and Related Threats: A Management Guide.

    ERIC Educational Resources Information Center

    Wack, John P.; Carnahan, Lisa J.

    This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…

  1. Establishing a group of endpoints in a parallel computer

    DOEpatents

    Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.; Xue, Hanhong

    2016-02-02

    A parallel computer executes a number of tasks, each task includes a number of endpoints and the endpoints are configured to support collective operations. In such a parallel computer, establishing a group of endpoints receiving a user specification of a set of endpoints included in a global collection of endpoints, where the user specification defines the set in accordance with a predefined virtual representation of the endpoints, the predefined virtual representation is a data structure setting forth an organization of tasks and endpoints included in the global collection of endpoints and the user specification defines the set of endpoints without a user specification of a particular endpoint; and defining a group of endpoints in dependence upon the predefined virtual representation of the endpoints and the user specification.

  2. Accounting utility for determining individual usage of production level software systems

    NASA Technical Reports Server (NTRS)

    Garber, S. C.

    1984-01-01

    An accounting package was developed which determines the computer resources utilized by a user during the execution of a particular program and updates a file containing accumulated resource totals. The accounting package is divided into two separate programs. The first program determines the total amount of computer resources utilized by a user during the execution of a particular program. The second program uses these totals to update a file containing accumulated totals of computer resources utilized by a user for a particular program. This package is useful to those persons who have several other users continually accessing and running programs from their accounts. The package provides the ability to determine which users are accessing and running specified programs along with their total level of usage.

  3. Spatial issues in user interface design from a graphic design perspective

    NASA Technical Reports Server (NTRS)

    Marcus, Aaron

    1989-01-01

    The user interface of a computer system is a visual display that provides information about the status of operations on data within the computer and control options to the user that enable adjustments to these operations. From the very beginning of computer technology the user interface was a spatial display, although its spatial features were not necessarily complex or explicitly recognized by the users. All text and nonverbal signs appeared in a virtual space generally thought of as a single flat plane of symbols. Current technology of high performance workstations permits any element of the display to appear as dynamic, multicolor, 3-D signs in a virtual 3-D space. The complexity of appearance and the user's interaction with the display provide significant challenges to the graphic designer of current and future user interfaces. In particular, spatial depiction provides many opportunities for effective communication of objects, structures, processes, navigation, selection, and manipulation. Issues are presented that are relevant to the graphic designer seeking to optimize the user interface's spatial attributes for effective visual communication.

  4. The Helicopter Antenna Radiation Prediction Code (HARP)

    NASA Technical Reports Server (NTRS)

    Klevenow, F. T.; Lynch, B. G.; Newman, E. H.; Rojas, R. G.; Scheick, J. T.; Shamansky, H. T.; Sze, K. Y.

    1990-01-01

    The first nine months effort in the development of a user oriented computer code, referred to as the HARP code, for analyzing the radiation from helicopter antennas is described. The HARP code uses modern computer graphics to aid in the description and display of the helicopter geometry. At low frequencies the helicopter is modeled by polygonal plates, and the method of moments is used to compute the desired patterns. At high frequencies the helicopter is modeled by a composite ellipsoid and flat plates, and computations are made using the geometrical theory of diffraction. The HARP code will provide a user friendly interface, employing modern computer graphics, to aid the user to describe the helicopter geometry, select the method of computation, construct the desired high or low frequency model, and display the results.

  5. Computer and Internet Utilization among the Medical Students in Qassim University, Saudi Arabia.

    PubMed

    Aldebasi, Yousef Homood; Ahmed, Mohamed Issa

    2013-06-01

    Computer-based training (CBT) and internet-based training (IBT) have become a vital part of the Medical Education. A cross-sectional study was carried out in Qassim University-Kingdom of Saudi Arabia (KSA), with the objective of assessing the pattern of the computer and Internet utilization among both male and female medical students. A total of 500 medical students from 4 different medical colleges of Qassim University participated in this study. A semi-structured, pre-tested questionnaire was used to collect the data and the data analysis was done by using SPSS, Version 17. Forty two percent female and twenty four percent male students used computers to get general information, 80% of the students reported using computers for academic activities and 52% females and 22% males used computers for entertainment. Most of the females preferred using computers at home (84%), while 54% males used computers at cyber cafés. For the information retrieval, 84% males used the internet, followed by journals/library (36%) and textbooks (35%), while the females preferred textbooks (75%) and the internet (14%). Google was found to be most commonly used search engine. The internet creates an educational delivery system; it is highly needed to increase the credit hours for the university requirement courses in computer application and the internet use for both among the male and female students.

  6. Computer and Internet Utilization among the Medical Students in Qassim University, Saudi Arabia

    PubMed Central

    Aldebasi, Yousef Homood; Ahmed, Mohamed Issa

    2013-01-01

    Background: Computer-based training (CBT) and internet-based training (IBT) have become a vital part of the Medical Education. A cross-sectional study was carried out in Qassim University-Kingdom of Saudi Arabia (KSA), with the objective of assessing the pattern of the computer and Internet utilization among both male and female medical students. Methods: A total of 500 medical students from 4 different medical colleges of Qassim University participated in this study. A semi-structured, pre-tested questionnaire was used to collect the data and the data analysis was done by using SPSS, Version 17. Results: Forty two percent female and twenty four percent male students used computers to get general information, 80% of the students reported using computers for academic activities and 52% females and 22% males used computers for entertainment. Most of the females preferred using computers at home (84%), while 54% males used computers at cyber cafés. For the information retrieval, 84% males used the internet, followed by journals/library (36%) and textbooks (35%), while the females preferred textbooks (75%) and the internet (14%). Google was found to be most commonly used search engine. Conclusion: The internet creates an educational delivery system; it is highly needed to increase the credit hours for the university requirement courses in computer application and the internet use for both among the male and female students. PMID:23905114

  7. Reach of mass media among tobacco users in India: a preliminary report.

    PubMed

    Rooban, T; Madan Kumar, P D; Ranganathan, K

    2010-07-01

    Tobacco use is a health hazard and its use is attributed to a lack of knowledge regarding the ill effects of tobacco. To identify the exposure of different mass media among a representative cohort population in the Indian subcontinent and compare the reach of the different mass media among tobacco users and nonusers using the "reach of HIV information" as a model. Secondary Data Analysis of Indian National Family Health Survey-3. Any tobacco use, gender, source of HIV information. Use of mass media. Of the study group, 27% of males and 54.4% of females never read newspaper or magazine; 29.3% of males and 52.6% of females never heard radio; 12.4% of males and 25% of females never see television; and 79.3% of males and 93.46% of females did not see a movie at least once a month. The most common source of information of HIV was television among males (71.8%) and females (81%), whereas the least common source was leaders among males (0.8%) and females (0.2%). Television is the single largest media used by both genders and was a major source of HIV information dissemination. A well-designed tobacco control program similar to HIV awareness program will help to curb tobacco use. The reach of different media among Indian tobacco users is presented and HIV model of information dissemination may prove to be effective in tobacco control.

  8. Computer-Game Construction: A Gender-Neutral Attractor to Computing Science

    ERIC Educational Resources Information Center

    Carbonaro, Mike; Szafron, Duane; Cutumisu, Maria; Schaeffer, Jonathan

    2010-01-01

    Enrollment in Computing Science university programs is at a dangerously low level. A major reason for this is the general lack of interest in Computing Science by females. In this paper, we discuss our experience with using a computer game construction environment as a vehicle to encourage female participation in Computing Science. Experiments…

  9. Stigma- and non-stigma-related treatment barriers to mental healthcare reported by service users and caregivers.

    PubMed

    Dockery, Lisa; Jeffery, Debra; Schauman, Oliver; Williams, Paul; Farrelly, Simone; Bonnington, Oliver; Gabbidon, Jheanell; Lassman, Francesca; Szmukler, George; Thornicroft, Graham; Clement, Sarah

    2015-08-30

    Delayed treatment seeking for people experiencing symptoms of mental illness is common despite available mental healthcare. Poor outcomes are associated with untreated mental illness and caregivers may eventually need to seek help on the service user's behalf. More attention has recently focused on the role of stigma in delayed treatment seeking. This study aimed to establish the frequency of stigma- and non-stigma-related treatment barriers reported by 202 service users and 80 caregivers; to compare treatment barriers reported by service users and caregivers; and to investigate demographic predictors of reporting stigma-related treatment barriers. The profile of treatment barriers differed between service users and caregivers. Service users were more likely to report stigma-related treatment barriers than caregivers across all stigma-related items. Service users who were female, had a diagnosis of schizophrenia or with GCSEs (UK qualifications usually obtained at age 16) were significantly more likely to report stigma-related treatment barriers. Caregivers who were female or of Black ethnicities were significantly more likely to report stigma-related treatment barriers. Multifaceted approaches are needed to reduce barriers to treatment seeking for both service users and caregivers, with anti-stigma interventions being of particular importance for the former group. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  10. Massive Open Online Course for Health Informatics Education

    PubMed Central

    2014-01-01

    Objectives This paper outlines a new method of teaching health informatics to large numbers of students from around the world through a Massive Open Online Course (MOOC). Methods The Health Informatics Forum is one of examples of MOOCs through a social networking site for educating health informatics students and professionals. It is running a MOOC for students from around the world that uses creative commons licenced content funded by the US government and developed by five US universities. The content is delivered through narrated lectures with slides that can be viewed online with discussion threads on the forum for class interactions. Students can maintain a professional profile, upload photos and files, write their own blog posts and post discussion threads on the forum. Results The Health Informatics Forum MOOC has been accessed by 11,316 unique users from 127 countries from August 2, 2012 to January 24, 2014. Most users accessed the MOOC via a desktop computer, followed by tablets and mobile devices and 55% of users were female. Over 400,000 unique users have now accessed the wider Health Informatics Forum since it was established in 2008. Conclusions Advances in health informatics and educational technology have both created a demand for online learning material in health informatics and a solution for providing it. By using a MOOC delivered through a social networking platform it is hoped that high quality health informatics education will be able to be delivered to a large global audience of future health informaticians without cost. PMID:24872906

  11. Gender and Sex Trading Among Active Methamphetamine Users in Cape Town, South Africa.

    PubMed

    Lion, Ryan R; Watt, Melissa H; Wechsberg, Wendee M; Meade, Christina S

    2017-05-12

    South Africa has experienced a tremendous rise in methamphetamine use since the year 2000. Sex trading is a global phenomenon that has been observed in active drug users and has been associated with risks for HIV infection and violence. This paper describes and examines the correlates of sex trading among active methamphetamine users in Cape Town, South Africa. Through peer referral, 360 (201 male; 159 female) active methamphetamine users were recruited in a peri-urban township. Demographics, sex trading, drug use, trauma, and mental health were assessed by a structured clinical interview and computer survey. Logistic regression models were used to examine predictors of sex trading for men and women. In the past 3 months, 40% of men and 33% of women endorsed trading sex for methamphetamine or money. Among these, they reported trading with same sex partners (33%), high rates of inconsistent condom use (73%), and incidences of physical (23%) and sexual (27%) assault when sex trading. Increased drug use severity was correlated with sex trading. Women with experiences of violence and trauma were also more likely to trade sex. Conclusions/importance: The results stress a need for linkage to drug treatment, as addiction may be fueling sex trading. Targeted interventions geared towards safe sex practices may reduce risky sexual behaviors. Women need interventions that are attuned to their specific vulnerabilities. More research is needed to explore the experiences of men who have sex with men given their particularly high rates of sex trading behavior.

  12. Massive open online course for health informatics education.

    PubMed

    Paton, Chris

    2014-04-01

    This paper outlines a new method of teaching health informatics to large numbers of students from around the world through a Massive Open Online Course (MOOC). The Health Informatics Forum is a social networking site for educating health informatics students and professionals [corrected]. It is running a MOOC for students from around the world that uses creative commons licenced content funded by the US government and developed by five US universities. The content is delivered through narrated lectures with slides that can be viewed online with discussion threads on the forum for class interactions. Students can maintain a professional profile, upload photos and files, write their own blog posts and post discussion threads on the forum. The Health Informatics Forum MOOC has been accessed by 11,316 unique users from 127 countries from August 2, 2012 to January 24, 2014. Most users accessed the MOOC via a desktop computer, followed by tablets and mobile devices and 55% of users were female. Over 400,000 unique users have now accessed the wider Health Informatics Forum since it was established in 2008. Advances in health informatics and educational technology have both created a demand for online learning material in health informatics and a solution for providing it. By using a MOOC delivered through a social networking platform it is hoped that high quality health informatics education will be able to be delivered to a large global audience of future health informaticians without cost.

  13. Spherical roller bearing analysis. SKF computer program SPHERBEAN. Volume 2: User's manual

    NASA Technical Reports Server (NTRS)

    Kleckner, R. J.; Dyba, G. J.

    1980-01-01

    The user's guide for the SPHERBEAN computer program for prediction of the thermomechanical performance characteristics of high speed lubricated double row spherical roller bearings is presented. The material presented is structured to guide the user in the practical and correct implementation of SPHERBEAN. Input and output, guidelines for program use, and sample executions are detailed.

  14. Usage of Thin-Client/Server Architecture in Computer Aided Education

    ERIC Educational Resources Information Center

    Cimen, Caghan; Kavurucu, Yusuf; Aydin, Halit

    2014-01-01

    With the advances of technology, thin-client/server architecture has become popular in multi-user/single network environments. Thin-client is a user terminal in which the user can login to a domain and run programs by connecting to a remote server. Recent developments in network and hardware technologies (cloud computing, virtualization, etc.)…

  15. Suicidal behaviours in male and female users of illicit drugs recruited in drug treatment facilities.

    PubMed

    Arribas-Ibar, Elisabet; Suelves, Josep Maria; Sanchez-Niubò, Albert; Domingo-Salvany, Antònia; T Brugal, M

    We assessed prevalence of suicidal ideation and plans among illicit drug users and their association with contextual factors, by gender. Cross-sectional study. In a sample of 511 illicit drug users recruited during spring 2012 in drug treatment and prevention facilities in Catalonia (Spain), the prevalence of suicidal ideation/plans in the last 12 months was assessed. Poisson regression was used to examine associations between suicidal ideation/plans and various factors (socio-demographic, psychological, illegal drug market activities and marginal income generation activities, which included any reported sex work, stealing, peddling, begging or borrowing on credit from a dealer). The average age was 37.9 years (standard deviation: 8.62); 76.3% were men. Suicidal ideation/plans were reported by 30.8% of men and 38.8% of women, with no significant differences by age or gender. Recent aggression (male prevalence ratio [PR]=2.2; female PR=1.4), psychological treatment (male PR=1.2; female PR=1.3) and illegal/marginal income generation activities (male PR=1.5; female PR=1.1) were associated with suicidal ideation/plans. Men who trafficked were more likely to have suicidal ideation/plans (PR=1.3), while prison history was positive for women (PR=1.8) and negative for men (PR=0.7). Prevalence of suicidal ideation/plans was high among illicit drug users recruited from healthcare facilities. Besides psychological variables, participation in illegal market activities and crime ought to be considered in drug users' suicidal prevention. Suicide risk needs to be evaluated in drug treatment facilities and psychological status and context contemplated. Copyright © 2017 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  16. Quality user support: Supporting quality users

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woolley, T.C.

    1994-12-31

    During the past decade, fundamental changes have occurred in technical computing in the oil industry. Technical computing systems have moved from local, fragmented quantity, to global, integrated, quality. The compute power available to the average geoscientist at his desktop has grown exponentially. Technical computing applications have increased in integration and complexity. At the same time, there has been a significant change in the work force due to the pressures of restructuring, and the increased focus on international opportunities. The profile of the user of technical computing resources has changed. Users are generally more mature, knowledgeable, and team oriented than theirmore » predecessors. In the 1990s, computer literacy is a requirement. This paper describes the steps taken by Oryx Energy Company to address the problems and opportunities created by the explosive growth in computing power and needs, coupled with the contraction of the business. A successful user support strategy will be described. Characteristics of the program include: (1) Client driven support; (2) Empowerment of highly skilled professionals to fill the support role; (3) Routine and ongoing modification to the support plan; (4) Utilization of the support assignment to create highly trained advocates on the line; (5) Integration of the support role to the reservoir management team. Results of the plan include a highly trained work force, stakeholder teams that include support personnel, and global support from a centralized support organization.« less

  17. The emergence of Zipf's law - Spontaneous encoding optimization by users of a command language

    NASA Technical Reports Server (NTRS)

    Ellis, S. R.; Hitchcock, R. J.

    1986-01-01

    The distribution of commands issued by experienced users of a computer operating system allowing command customization tends to conform to Zipf's law. This result documents the emergence of a statistical property of natural language as users master an artificial language. Analysis of Zipf's law by Mandelbrot and Cherry shows that its emergence in the computer interaction of experienced users may be interpreted as evidence that these users optimize their encoding of commands. Accordingly, the extent to which users of a command language exhibit Zipf's law can provide a metric of the naturalness and efficiency with which that language is used.

  18. Software for Sharing and Management of Information

    NASA Technical Reports Server (NTRS)

    Chen, James R.; Wolfe, Shawn R.; Wragg, Stephen D.

    2003-01-01

    DIAMS is a set of computer programs that implements a system of collaborative agents that serve multiple, geographically distributed users communicating via the Internet. DIAMS provides a user interface as a Java applet that runs on each user s computer and that works within the context of the user s Internet-browser software. DIAMS helps all its users to manage, gain access to, share, and exchange information in databases that they maintain on their computers. One of the DIAMS agents is a personal agent that helps its owner find information most relevant to current needs. It provides software tools and utilities for users to manage their information repositories with dynamic organization and virtual views. Capabilities for generating flexible hierarchical displays are integrated with capabilities for indexed- query searching to support effective access to information. Automatic indexing methods are employed to support users queries and communication between agents. The catalog of a repository is kept in object-oriented storage to facilitate sharing of information. Collaboration between users is aided by matchmaker agents and by automated exchange of information. The matchmaker agents are designed to establish connections between users who have similar interests and expertise.

  19. Effectively identifying user profiles in network and host metrics

    NASA Astrophysics Data System (ADS)

    Murphy, John P.; Berk, Vincent H.; Gregorio-de Souza, Ian

    2010-04-01

    This work presents a collection of methods that is used to effectively identify users of computers systems based on their particular usage of the software and the network. Not only are we able to identify individual computer users by their behavioral patterns, we are also able to detect significant deviations in their typical computer usage over time, or compared to a group of their peers. For instance, most people have a small, and relatively unique selection of regularly visited websites, certain email services, daily work hours, and typical preferred applications for mandated tasks. We argue that these habitual patterns are sufficiently specific to identify fully anonymized network users. We demonstrate that with only a modest data collection capability, profiles of individual computer users can be constructed so as to uniquely identify a profiled user from among their peers. As time progresses and habits or circumstances change, the methods presented update each profile so that changes in user behavior can be reliably detected over both abrupt and gradual time frames, without losing the ability to identify the profiled user. The primary benefit of our methodology allows one to efficiently detect deviant behaviors, such as subverted user accounts, or organizational policy violations. Thanks to the relative robustness, these techniques can be used in scenarios with very diverse data collection capabilities, and data privacy requirements. In addition to behavioral change detection, the generated profiles can also be compared against pre-defined examples of known adversarial patterns.

  20. Gender stereotypes in psychosocial care for female crack and powder cocaine users.

    PubMed

    Silva, Érika Barbosa de Oliveira; Pereira, Adriana Lenho de Figueiredo; Penna, Lúcia Helena Garcia

    2018-05-10

    The study analyzed health professionals' conceptions toward female users of crack and powder cocaine currently receiving psychosocial care, based on a gender perspective. Seventeen health professionals were interviewed, and systematic observations were made of the spaces for collective care in a Center for Psychosocial Care specializing in alcohol and drug addiction in Greater Metropolitan Rio de Janeiro, Brazil. Analysis of the interviews and field diaries using the hermeneutic-dialectic method revealed three categories: frailty as a constitutive attribute of women's condition, the women's emotional addiction to crack and powder cocaine use, and gender stereotypes during psychosocial care. The health professionals voiced a traditional view of the heterosexual, docile, and maternal woman and reproduced stereotypical concepts when addressing female crack and cocaine users as sensitive, frail individuals, emotionally dependent on men and more involved in the home and family. These professionals need a more refined understanding of gender issues in the mental health-disease process in order to allow overcoming preconceived notions and reductionist health care practices.

  1. Practical experience with graphical user interfaces and object-oriented design in the clinical laboratory.

    PubMed

    Wells, I G; Cartwright, R Y; Farnan, L P

    1993-12-15

    The computing strategy in our laboratories evolved from research in Artificial Intelligence, and is based on powerful software tools running on high performance desktop computers with a graphical user interface. This allows most tasks to be regarded as design problems rather than implementation projects, and both rapid prototyping and an object-oriented approach to be employed during the in-house development and enhancement of the laboratory information systems. The practical application of this strategy is discussed, with particular reference to the system designer, the laboratory user and the laboratory customer. Routine operation covers five departments, and the systems are stable, flexible and well accepted by the users. Client-server computing, currently undergoing final trials, is seen as the key to further development, and this approach to Pathology computing has considerable potential for the future.

  2. Parent use of touchscreen computer kiosks for child health promotion in community settings.

    PubMed

    Thompson, Darcy A; Lozano, Paula; Christakis, Dimitri A

    2007-03-01

    The goals were to evaluate the use of touchscreen computer kiosks, containing only child health-promoting information, in urban, low-income, community settings and to characterize the users of these kiosks. Three user-driven touchscreen computer kiosks were placed in low-income urban locations in Seattle, Washington, from March 2005 to October 2005. The locations included a public library, a Department of Motor Vehicles office, and a McDonald's restaurant. Users selected age-appropriate modules with prevention information and screening tools. Users entered the age of the child and were presented with age-appropriate modules. On exiting, users were asked to rate their experience and to provide basic demographic data. In total, there were 1846 kiosk sessions. Almost one half occurred at McDonald's. Seventy-eight percent of users identified themselves as first-time users. Users sought information for children of all ages. Sixty-one percent of first-time users explored 1 module. First-time users were most interested in television/media use (16%), smoke exposure (14%), attention-deficit/hyperactivity disorder screening (12%), and asthma assessment (11%). At-risk children were identified in 52% of sessions. Eighty-seven percent of first-time users who completed the asthma assessment had children whose asthma was uncontrolled. Twenty-eight percent of users responded to > or = 1 question on the exit survey. Of those, 48% had less than a high school education, and 26% had never used the Internet. Approximately one half found the kiosk easy to use (57%) and the information easy to understand (55%); 66% said there was at least some new information. Fifty-five percent planned to try some of the things they had learned, and 49% intended to talk to their child's doctor about what they had learned. User-driven computer kiosks were used in community settings to obtain child health information. Users found the kiosks easy to use. Additional study on improving use and understanding the impact is needed.

  3. Human-computer interface

    DOEpatents

    Anderson, Thomas G.

    2004-12-21

    The present invention provides a method of human-computer interfacing. Force feedback allows intuitive navigation and control near a boundary between regions in a computer-represented space. For example, the method allows a user to interact with a virtual craft, then push through the windshield of the craft to interact with the virtual world surrounding the craft. As another example, the method allows a user to feel transitions between different control domains of a computer representation of a space. The method can provide for force feedback that increases as a user's locus of interaction moves near a boundary, then perceptibly changes (e.g., abruptly drops or changes direction) when the boundary is traversed.

  4. People with Profound and Multiple Intellectual Disabilities Using Symbols to Control a Computer: Exploration of User Engagement and Supporter Facilitation

    ERIC Educational Resources Information Center

    Bunning, Karen; Kwiatkowska, Gosia; Weldin, Nick

    2012-01-01

    Computer usage features in everyday life for the majority of people in developed countries. Access is a problem for many users with intellectual disability. Action-research was conducted to develop and explore the potential of specially adapted, computer readable symbols for choosing and accessing media on a computer. Five people with profound and…

  5. Gender, Lies and Video Games: the Truth about Females and Computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Klawe, Maria M.

    2006-02-22

    This talk explores how girls and women differ from boys and men in their uses of and attitudes towards computers and computing. From playing computer games to pursuing computing careers, the participation of females tends to be very low compared to that of males. Why is this? Opinions range from girls wanting to avoid the math and/or the geek image of programming to girls having better things to do with their lives. We discuss research findings on this issue, as well as initiatives designed to increase the participation of females in computing.

  6. Gender, Lies and Video Games: the Truth about Females and Computing

    ScienceCinema

    Klawe, Maria M. [Princeton University, Princeton, New Jersey, United States

    2017-12-09

    This talk explores how girls and women differ from boys and men in their uses of and attitudes towards computers and computing. From playing computer games to pursuing computing careers, the participation of females tends to be very low compared to that of males. Why is this? Opinions range from girls wanting to avoid the math and/or the geek image of programming to girls having better things to do with their lives. We discuss research findings on this issue, as well as initiatives designed to increase the participation of females in computing.

  7. Drug use and HIV risk in Trinidad and Tobago: qualitative study.

    PubMed

    Djumalieva, D; Imamshah, W; Wagner, U; Razum, O

    2002-09-01

    Crack use is an important risk factor for HIV infection because of its association with unsafe sexual practices. We investigated factors promoting the initiation of crack cocaine use; the sexual behaviour of crack users; and their rehabilitation care seeking behaviour in Trinidad and Tobago. We conducted 40 in-depth interviews with drug users. Respondents frequently reported a history of parental desertion, alcohol abuse, and physical abuse within the family. They perceived peer pressure and drug use in the family as important factors promoting first drug use. Exchanging sex for drugs was common, and practising oral sex was considered safe. Female drug users rarely seek rehabilitative care because of stigmatization and lack of care for their children. In Trinidad, attitudes towards drugs in society and families need to be changed. Campaigns promoting safer sex should emphasize the risk of oral sex. Rehabilitation facilities caring for female drug users should offer child care.

  8. Computer-Based Tools for Evaluating Graphical User Interfaces

    NASA Technical Reports Server (NTRS)

    Moore, Loretta A.

    1997-01-01

    The user interface is the component of a software system that connects two very complex system: humans and computers. Each of these two systems impose certain requirements on the final product. The user is the judge of the usability and utility of the system; the computer software and hardware are the tools with which the interface is constructed. Mistakes are sometimes made in designing and developing user interfaces because the designers and developers have limited knowledge about human performance (e.g., problem solving, decision making, planning, and reasoning). Even those trained in user interface design make mistakes because they are unable to address all of the known requirements and constraints on design. Evaluation of the user inter-face is therefore a critical phase of the user interface development process. Evaluation should not be considered the final phase of design; but it should be part of an iterative design cycle with the output of evaluation being feed back into design. The goal of this research was to develop a set of computer-based tools for objectively evaluating graphical user interfaces. The research was organized into three phases. The first phase resulted in the development of an embedded evaluation tool which evaluates the usability of a graphical user interface based on a user's performance. An expert system to assist in the design and evaluation of user interfaces based upon rules and guidelines was developed during the second phase. During the final phase of the research an automatic layout tool to be used in the initial design of graphical inter- faces was developed. The research was coordinated with NASA Marshall Space Flight Center's Mission Operations Laboratory's efforts in developing onboard payload display specifications for the Space Station.

  9. The use of Chinese herbal products and its influence on tamoxifen induced endometrial cancer risk among female breast cancer patients: a population-based study.

    PubMed

    Tsai, Yueh-Ting; Lai, Jung-Nien; Wu, Chien-Tung

    2014-09-11

    The increased practice of traditional Chinese medicine (TCM) worldwide has raised concerns regarding herb-drug interactions. The purpose of our study was to analyze the use of Chinese herbal products (CHPs) and to estimate the influence of the use of CHP on tamoxifen induced endometrial cancer risk among female breast cancer patients in Taiwan. All patients newly diagnosed with invasive breast cancer receiving tamoxifen treatment from January 1, 1998 to December 31, 2008 were selected from the National Health Insurance Research Database. The usage, frequency of service, and CHPs prescribed among the 20,466 tamoxifen-treated female breast cancer patients were analyzed. The logistic regression method was employed to estimate the odds ratios (ORs) for utilization of CHPs. Cox proportional hazard regression was performed to calculate the hazard ratios (HRs) for subsequent endometrial cancer for CHP non-users and CHP users among female breast cancer patients who had undergone tamoxifen treatment. More than half of the subjects had ever used a CHP. Jia-Wei-Xiao-Yao-San (Augmented Rambling Powder) and Shu-Jing-Huo-Xue-Tang (Channel-Coursing Blood-Quickening Decoction) were the two most commonly used CHPs. The HR for the development of endometrial cancer among CHP users was 0.50-fold (95% CI=0.38-0.64) compared to that of CHP non-users. More than half of the study subjects had ever used a CHP. Jia-Wei-Xiao-Yao-San was the most commonly used CHP. Among female breast cancer patients who had undergone tamoxifen therapy, CHP consumption decreased the risk of subsequent endometrial cancer. Exploring potential Chinese herb-tamoxifen interactions and integrating both healthcare approaches are beneficial to the overall health outcomes of tamoxifen-treated female breast cancer patients. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  10. Computational aerodynamics requirements: The future role of the computer and the needs of the aerospace industry

    NASA Technical Reports Server (NTRS)

    Rubbert, P. E.

    1978-01-01

    The commercial airplane builder's viewpoint on the important issues involved in the development of improved computational aerodynamics tools such as powerful computers optimized for fluid flow problems is presented. The primary user of computational aerodynamics in a commercial aircraft company is the design engineer who is concerned with solving practical engineering problems. From his viewpoint, the development of program interfaces and pre-and post-processing capability for new computational methods is just as important as the algorithms and machine architecture. As more and more details of the entire flow field are computed, the visibility of the output data becomes a major problem which is then doubled when a design capability is added. The user must be able to see, understand, and interpret the results calculated. Enormous costs are expanded because of the need to work with programs having only primitive user interfaces.

  11. Gender Differences in the Use of Computers, Programming, and Peer Interactions in Computer Science Classrooms

    ERIC Educational Resources Information Center

    Stoilescu, Dorian; Egodawatte, Gunawardena

    2010-01-01

    Research shows that female and male students in undergraduate computer science programs view computer culture differently. Female students are interested more in the use of computers than in doing programming, whereas male students see computer science mainly as a programming activity. The overall purpose of our research was not to find new…

  12. Computer program user's manual for advanced general aviation propeller study

    NASA Technical Reports Server (NTRS)

    Worobel, R.

    1972-01-01

    A user's manual is presented for a computer program for predicting the performance (static, flight, and reverse), noise, weight and cost of propellers for advanced general aviation aircraft of the 1980 time period. Complete listings of this computer program with detailed instructions and samples of input and output are included.

  13. Parental Perceptions and Recommendations of Computing Majors: A Technology Acceptance Model Approach

    ERIC Educational Resources Information Center

    Powell, Loreen; Wimmer, Hayden

    2017-01-01

    Currently, there are more technology related jobs then there are graduates in supply. The need to understand user acceptance of computing degrees is the first step in increasing enrollment in computing fields. Additionally, valid measurement scales for predicting user acceptance of Information Technology degree programs are required. The majority…

  14. Comprehensive Outlook for Managed Pines Using Simulated Treatment Experiments-Planted Loblolly Pine (COMPUTE_P-LOB): A User's Guide

    Treesearch

    R.B. Ferguson; V. Clark Baldwin

    1987-01-01

    Complete instructions for user operation of COMPUTE_P-LOB to include detailed examples of computer input and output, of a growth and yield prediction system providing volume and weight yields in stand and stock table format.A complete program listing is provided.

  15. Getting Help: Finding an Answer to a Specific Problem is Almost Impossible These Days.

    ERIC Educational Resources Information Center

    Levy, Steven

    1984-01-01

    Discusses the very limited information sources currently available to microcomputer users, including computer salespersons, user support groups, and computer books, and suggests that the newly emerging hotline-style computer advisory services may be able to provide the accurate answers and expert advice not easily available elsewhere. (MBR)

  16. The state of ergonomics for mobile computing technology.

    PubMed

    Dennerlein, Jack T

    2015-01-01

    Because mobile computing technologies, such as notebook computers, smart mobile phones, and tablet computers afford users many different configurations through their intended mobility, there is concern about their effects on musculoskeletal pain and a need for usage recommendations. Therefore the main goal of this paper to determine which best practices surrounding the use of mobile computing devices can be gleaned from current field and laboratory studies of mobile computing devices. An expert review was completed. Field studies have documented various user configurations, which often include non-neutral postures, that users adopt when using mobile technology, along with some evidence suggesting that longer duration of use is associated with more discomfort. It is therefore prudent for users to take advantage of their mobility and not get stuck in any given posture for too long. The use of accessories such as appropriate cases or riser stands, as well as external keyboards and pointing devices, can also improve postures and comfort. Overall, the state of ergonomics for mobile technology is a work in progress and there are more research questions to be addressed.

  17. [Dutch computer domestication, 1975-1990].

    PubMed

    Veraart, Frank

    2008-01-01

    A computer seems an indispensable tool among twenty-first century households. Computers however, did not come as manna from heaven. The domestication and appropriation of computers in Dutch households was a result of activities by various intermediary actors. Computers became household commodities only gradually. Technophile computer hobbyists imported the first computers into the Netherlands from the USA, and started small businesses from 1975 onwards. They developed a social network in which computer technology was made available for use by individuals. This network extended itself via shops, clubs, magazines, and other means of acquiring and exchanging computer hard- and software. Hobbyist culture established the software-copying habits of private computer users as well as their ambivalence to commercial software. They also made the computer into a game machine. Under the impulse of a national policy that aimed at transforming society into an 'Information Society', clubs and other actors extended their activities and tailored them to this new agenda. Hobby clubs presented themselves as consumer organizations and transformed into intermediary actors that filled the gap between suppliers and a growing group of users. They worked hard to give meaning to (proper) use of computers. A second impulse to the increasing use of computers in the household came from so-called 'private-PC' projects in the late 1980s. In these projects employers financially aided employees in purchasing their own private PCs'. The initially important intermediary actors such as hobby clubs lost control and the agenda for personal computers was shifted to interoperability with office equipment. IBM compatible PC's flooded the households. In the household the new equipment blended with the established uses, such as gaming. The copying habits together with the PC standard created a risky combination in which computer viruses could spread easily. New roles arose for intermediary actors in guiding and educating computer users. The activities of intermediaries had a lasting influence on contemporary computer use and user preferences. Technical choices and the nature of Dutch computer use in households can be explained by analyzing the historical developments of intermediaries and users.

  18. A service based adaptive U-learning system using UX.

    PubMed

    Jeong, Hwa-Young; Yi, Gangman

    2014-01-01

    In recent years, traditional development techniques for e-learning systems have been changing to become more convenient and efficient. One new technology in the development of application systems includes both cloud and ubiquitous computing. Cloud computing can support learning system processes by using services while ubiquitous computing can provide system operation and management via a high performance technical process and network. In the cloud computing environment, a learning service application can provide a business module or process to the user via the internet. This research focuses on providing the learning material and processes of courses by learning units using the services in a ubiquitous computing environment. And we also investigate functions that support users' tailored materials according to their learning style. That is, we analyzed the user's data and their characteristics in accordance with their user experience. We subsequently applied the learning process to fit on their learning performance and preferences. Finally, we demonstrate how the proposed system outperforms learning effects to learners better than existing techniques.

  19. A Service Based Adaptive U-Learning System Using UX

    PubMed Central

    Jeong, Hwa-Young

    2014-01-01

    In recent years, traditional development techniques for e-learning systems have been changing to become more convenient and efficient. One new technology in the development of application systems includes both cloud and ubiquitous computing. Cloud computing can support learning system processes by using services while ubiquitous computing can provide system operation and management via a high performance technical process and network. In the cloud computing environment, a learning service application can provide a business module or process to the user via the internet. This research focuses on providing the learning material and processes of courses by learning units using the services in a ubiquitous computing environment. And we also investigate functions that support users' tailored materials according to their learning style. That is, we analyzed the user's data and their characteristics in accordance with their user experience. We subsequently applied the learning process to fit on their learning performance and preferences. Finally, we demonstrate how the proposed system outperforms learning effects to learners better than existing techniques. PMID:25147832

  20. Embedded systems for supporting computer accessibility.

    PubMed

    Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.

  1. Virtual hand: a 3D tactile interface to virtual environments

    NASA Astrophysics Data System (ADS)

    Rogowitz, Bernice E.; Borrel, Paul

    2008-02-01

    We introduce a novel system that allows users to experience the sensation of touch in a computer graphics environment. In this system, the user places his/her hand on an array of pins, which is moved about space on a 6 degree-of-freedom robot arm. The surface of the pins defines a surface in the virtual world. This "virtual hand" can move about the virtual world. When the virtual hand encounters an object in the virtual world, the heights of the pins are adjusted so that they represent the object's shape, surface, and texture. A control system integrates pin and robot arm motions to transmit information about objects in the computer graphics world to the user. It also allows the user to edit, change and move the virtual objects, shapes and textures. This system provides a general framework for touching, manipulating, and modifying objects in a 3-D computer graphics environment, which may be useful in a wide range of applications, including computer games, computer aided design systems, and immersive virtual worlds.

  2. Human perceptual deficits as factors in computer interface test and evaluation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bowser, S.E.

    1992-06-01

    Issues related to testing and evaluating human computer interfaces are usually based on the machine rather than on the human portion of the computer interface. Perceptual characteristics of the expected user are rarely investigated, and interface designers ignore known population perceptual limitations. For these reasons, environmental impacts on the equipment will more likely be defined than will user perceptual characteristics. The investigation of user population characteristics is most often directed toward intellectual abilities and anthropometry. This problem is compounded by the fact that some deficits capabilities tend to be found in higher-than-overall population distribution in some user groups. The testmore » and evaluation community can address the issue from two primary aspects. First, assessing user characteristics should be extended to include tests of perceptual capability. Secondly, interface designs should use multimode information coding.« less

  3. System Access | High-Performance Computing | NREL

    Science.gov Websites

    ) systems. Photo of man looking at a large computer monitor with a colorful, visual display of data. System secure shell gateway (SSH) or virtual private network (VPN). User Accounts Request a user account

  4. Ubiquitous Accessibility for People with Visual Impairments: Are We There Yet?

    PubMed Central

    Billah, Syed Masum; Ashok, Vikas; Porter, Donald E.; Ramakrishnan, IV

    2017-01-01

    Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of personal computing, users with visual impairments required special-purpose, assistive technologies, such as screen readers, to interact with computers. This paper investigates whether technologies like screen readers have kept pace with, or have created a barrier to, the trend toward ubiquitous access, with a specific focus on desktop computing as this is still the primary way computers are used in education and employment. Towards that, the paper presents a user study with 21 visually-impaired participants, specifically involving the switching of screen readers within and across different computing platforms, and the use of screen readers in remote access scenarios. Among the findings, the study shows that, even for remote desktop access—an early forerunner of true ubiquitous access—screen readers are too limited, if not unusable. The study also identifies several accessibility needs, such as uniformity of navigational experience across devices, and recommends potential solutions. In summary, assistive technologies have not made the jump into the era of ubiquitous access, and multiple, inconsistent screen readers create new practical problems for users with visual impairments. PMID:28782061

  5. Ubiquitous Accessibility for People with Visual Impairments: Are We There Yet?

    PubMed

    Billah, Syed Masum; Ashok, Vikas; Porter, Donald E; Ramakrishnan, I V

    2017-05-01

    Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of personal computing, users with visual impairments required special-purpose, assistive technologies, such as screen readers, to interact with computers. This paper investigates whether technologies like screen readers have kept pace with, or have created a barrier to, the trend toward ubiquitous access, with a specific focus on desktop computing as this is still the primary way computers are used in education and employment. Towards that, the paper presents a user study with 21 visually-impaired participants, specifically involving the switching of screen readers within and across different computing platforms, and the use of screen readers in remote access scenarios. Among the findings, the study shows that, even for remote desktop access-an early forerunner of true ubiquitous access-screen readers are too limited, if not unusable. The study also identifies several accessibility needs, such as uniformity of navigational experience across devices, and recommends potential solutions. In summary, assistive technologies have not made the jump into the era of ubiquitous access, and multiple, inconsistent screen readers create new practical problems for users with visual impairments.

  6. Gender differences in the prevalence and determinants of tobacco use among school-aged adolescents (11-17 years) in Sudan and South Sudan.

    PubMed

    Atari, Dominic Odwa

    2014-01-01

    Tobacco use is one of the leading and preventable causes of global morbidities and premature mortalities. The study explores gender differences in the prevalence and determinants of tobacco use among school-aged adolescents (11-17 years) in Sudan and South Sudan. The study utilized the national Global Youth Tobacco Survey (GYTS) data collected in 2005 for Sudan (4,277 unweighted; 131,631 weighted). Univariate and bivariate analyses were conducted to examine the associations between the dependent (tobacco use status) and independent variables. Logistic regression analyses were performed to identify the key factors which influence tobacco consumption among adolescents in the 2 Sudans for ever cigarette users, current cigarette users, and users of noncigarette tobacco products. There were significant gender differences in the prevalence of ever cigarette users (21.8%; male=13.1%, female=6.5%, p<0.05) and current cigarette users (6.9%; male=4.9%, female = 1.3%, p<0.05) but not among users of noncigarette tobacco products (14.7%; male=6.8%, female=6.1%). Adolescent tobacco use was significantly associated with availability of monthly income or allowance, exposure to tobacco industry promotions, and tobacco-use behavior of familial relations. Knowledge about the harmful effects of secondhand smoke was related with decreased likelihood of tobacco use. School programs that focus on health messages alone may not work for the adolescent population. Legislations that ban all types of tobacco advertisements, promotions, and sponsorships among adolescents are needed in the 2 countries.

  7. Gender differences in the prevalence and determinants of tobacco use among school-aged adolescents (11 – 17 years) in Sudan and South Sudan

    PubMed Central

    Atari, Dominic Odwa

    2014-01-01

    Introduction Tobacco use is one of the leading and preventable causes of global morbidities and premature mortalities. The study explores gender differences in the prevalence and determinants of tobacco use among school-aged adolescents (11-17years) in Sudan and South Sudan. Methods The study utilized the national Global Youth Tobacco Survey (GYTS) data collected in 2005 for Sudan (4,277 unweighted; 131,631 weighted). Univariate and bivariate analyses were conducted to examine the associations between the dependent (tobacco use status) and independent variables. Logistic regression analyses were performed to identify the key factors which influence tobacco consumption among adolescents in the 2 Sudans for ever cigarette users, current cigarette users, and users of noncigarette tobacco products. Results There were significant gender differences in the prevalence of ever cigarette users (21.8%; male=13.1%, female=6.5%, p<0.05) and current cigarette users (6.9%; male=4.9%, female = 1.3%, p<0.05) but not among users of noncigarette tobacco products (14.7%; male=6.8%, female=6.1%). Adolescent tobacco use was significantly associated with availability of monthly income or allowance, exposure to tobacco industry promotions, and tobacco-use behavior of familial relations. Knowledge about the harmful effects of secondhand smoke was related with decreased likelihood of tobacco use. Conclusion School programs that focus on health messages alone may not work for the adolescent population. Legislations that ban all types of tobacco advertisements, promotions, and sponsorships among adolescents are needed in the 2 countries. PMID:25404978

  8. A "Black-and-White Box" Approach to User Empowerment with Component Computing

    ERIC Educational Resources Information Center

    Kynigos, C.

    2004-01-01

    The paper discusses three aspects central to the 10 year-old process of design, development and use of E-slate, a construction kit for educational software. These are: (1) the design of computational media for user empowerment, (2) the socially-grounded approach to the building of user communities and (3) the issue of long-term sustainability as…

  9. Systems Analysis, Machineable Circulation Data and Library Users and Non-Users.

    ERIC Educational Resources Information Center

    Lubans, John, Jr.

    A study to be made with computer-based circulation data of the non-use and use of a large academic library is discussed. A search of the literature reveals that computer-based circulation systems can be, but have not been, utilized to provide data bases for systematic analyses of library users and resources. The data gathered in the circulation…

  10. Internet Passport: NorthWestNet's Guide to Our World Online. Fourth Edition.

    ERIC Educational Resources Information Center

    Kochmer, Jonathan

    The purpose of this guide is to help computer network users get over the hurdle of new technologies. Every Internet user is different, but most network activities depend on the mastery of three basic skills: using electronic mail (e-mail) to communicate with other Internet users; logging in to remote computers with a service called Telnet, and…

  11. Computer User's Guide to the Protection of Information Resources. NIST Special Publication 500-171.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    Computers have changed the way information resources are handled. Large amounts of information are stored in one central place and can be accessed from remote locations. Users have a personal responsibility for the security of the system and the data stored in it. This document outlines the user's responsibilities and provides security and control…

  12. Encoder-Decoder Optimization for Brain-Computer Interfaces

    PubMed Central

    Merel, Josh; Pianto, Donald M.; Cunningham, John P.; Paninski, Liam

    2015-01-01

    Neuroprosthetic brain-computer interfaces are systems that decode neural activity into useful control signals for effectors, such as a cursor on a computer screen. It has long been recognized that both the user and decoding system can adapt to increase the accuracy of the end effector. Co-adaptation is the process whereby a user learns to control the system in conjunction with the decoder adapting to learn the user's neural patterns. We provide a mathematical framework for co-adaptation and relate co-adaptation to the joint optimization of the user's control scheme ("encoding model") and the decoding algorithm's parameters. When the assumptions of that framework are respected, co-adaptation cannot yield better performance than that obtainable by an optimal initial choice of fixed decoder, coupled with optimal user learning. For a specific case, we provide numerical methods to obtain such an optimized decoder. We demonstrate our approach in a model brain-computer interface system using an online prosthesis simulator, a simple human-in-the-loop pyschophysics setup which provides a non-invasive simulation of the BCI setting. These experiments support two claims: that users can learn encoders matched to fixed, optimal decoders and that, once learned, our approach yields expected performance advantages. PMID:26029919

  13. Encoder-decoder optimization for brain-computer interfaces.

    PubMed

    Merel, Josh; Pianto, Donald M; Cunningham, John P; Paninski, Liam

    2015-06-01

    Neuroprosthetic brain-computer interfaces are systems that decode neural activity into useful control signals for effectors, such as a cursor on a computer screen. It has long been recognized that both the user and decoding system can adapt to increase the accuracy of the end effector. Co-adaptation is the process whereby a user learns to control the system in conjunction with the decoder adapting to learn the user's neural patterns. We provide a mathematical framework for co-adaptation and relate co-adaptation to the joint optimization of the user's control scheme ("encoding model") and the decoding algorithm's parameters. When the assumptions of that framework are respected, co-adaptation cannot yield better performance than that obtainable by an optimal initial choice of fixed decoder, coupled with optimal user learning. For a specific case, we provide numerical methods to obtain such an optimized decoder. We demonstrate our approach in a model brain-computer interface system using an online prosthesis simulator, a simple human-in-the-loop pyschophysics setup which provides a non-invasive simulation of the BCI setting. These experiments support two claims: that users can learn encoders matched to fixed, optimal decoders and that, once learned, our approach yields expected performance advantages.

  14. Smart learning services based on smart cloud computing.

    PubMed

    Kim, Svetlana; Song, Su-Mi; Yoon, Yong-Ik

    2011-01-01

    Context-aware technologies can make e-learning services smarter and more efficient since context-aware services are based on the user's behavior. To add those technologies into existing e-learning services, a service architecture model is needed to transform the existing e-learning environment, which is situation-aware, into the environment that understands context as well. The context-awareness in e-learning may include the awareness of user profile and terminal context. In this paper, we propose a new notion of service that provides context-awareness to smart learning content in a cloud computing environment. We suggest the elastic four smarts (E4S)--smart pull, smart prospect, smart content, and smart push--concept to the cloud services so smart learning services are possible. The E4S focuses on meeting the users' needs by collecting and analyzing users' behavior, prospecting future services, building corresponding contents, and delivering the contents through cloud computing environment. Users' behavior can be collected through mobile devices such as smart phones that have built-in sensors. As results, the proposed smart e-learning model in cloud computing environment provides personalized and customized learning services to its users.

  15. State of the Art of Network Security Perspectives in Cloud Computing

    NASA Astrophysics Data System (ADS)

    Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang-Roh; Lee, Heejo; Choi, Hyunsang

    Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

  16. SoftLab: A Soft-Computing Software for Experimental Research with Commercialization Aspects

    NASA Technical Reports Server (NTRS)

    Akbarzadeh-T, M.-R.; Shaikh, T. S.; Ren, J.; Hubbell, Rob; Kumbla, K. K.; Jamshidi, M

    1998-01-01

    SoftLab is a software environment for research and development in intelligent modeling/control using soft-computing paradigms such as fuzzy logic, neural networks, genetic algorithms, and genetic programs. SoftLab addresses the inadequacies of the existing soft-computing software by supporting comprehensive multidisciplinary functionalities from management tools to engineering systems. Furthermore, the built-in features help the user process/analyze information more efficiently by a friendly yet powerful interface, and will allow the user to specify user-specific processing modules, hence adding to the standard configuration of the software environment.

  17. Graphics Software For VT Terminals

    NASA Technical Reports Server (NTRS)

    Wang, Caroline

    1991-01-01

    VTGRAPH graphics software tool for DEC/VT computer terminal or terminals compatible with it, widely used by government and industry. Callable in FORTRAN or C language, library program enabling user to cope with many computer environments in which VT terminals used for window management and graphic systems. Provides PLOT10-like package plus color or shade capability for VT240, VT241, and VT300 terminals. User can easily design more-friendly user-interface programs and design PLOT10 programs on VT terminals with different computer systems. Requires ReGis graphics set terminal and FORTRAN compiler.

  18. Proceedings of the Association Supporting Computer Users in Education (ASCUE) Annual Conference (47th, Myrtle Beach, South Carolina, June 8-12, 2014)

    ERIC Educational Resources Information Center

    Smith, Peter, Ed.

    2014-01-01

    The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…

  19. Proceedings of the Association Supporting Computer Users in Education (ASCUE) Annual Conference (48th, Myrtle Beach, South Carolina, June 14-18, 2015)

    ERIC Educational Resources Information Center

    Smith, Peter, Ed.

    2015-01-01

    The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…

  20. The association between computer literacy and training on clinical productivity and user satisfaction in using the electronic medical record in Saudi Arabia.

    PubMed

    Alasmary, May; El Metwally, Ashraf; Househ, Mowafa

    2014-08-01

    The association of computer literacy, training on clinical productivity and satisfaction of a recently implemented Electronic Medical Record (EMR) system in Prince Sultan Medical Military City ((PSMMC)) was investigated. The scope of this study was to explore the association between age, occupation and computer literacy and clinical productivity and users' satisfaction of the newly implemented EMR at PSMMC as well as the association of user satisfaction with age and position. A self-administrated questionnaire was distributed to all doctors and nurses working in Alwazarat Family and Community Center (a Health center in PSMMC). A convenience sample size of 112 healthcare providers (65 Nurses and 47 physicians) completed the questionnaire. A combination of correlation, One Way ANOVA and t-tests were used to answer the research questions. Participants had high levels of self-reported literacy on computers and satisfaction of the system. Both levels were higher among physicians than among nurses. A moderate but significant (at p < 0.01 level) correlation was found between computer literacy and users' satisfaction towards the system (R = 0.343). Age was weakly, but significantly (at p < 0.05), positively correlated with satisfaction with the system (R = 0.29). Self-reported system productivity and satisfaction was statistically correlated at p < 0.01 (R = 0.509). High level of satisfaction with training on using the system was not positively correlated with overall satisfaction of using the system. This study demonstrated that EMR users with high computer literacy skills were more satisfied with using the EMR than users with low computer literacy skills.

  1. HIV risk, health, and social characteristics of sexual minority female injection drug users in Baltimore

    PubMed Central

    German, Danielle; Latkin, Carl A.

    2015-01-01

    Female injection drug users {IDU} who report sex with women are at increased risk for HIV and social instability, but it is important to assess whether these disparities also exist according to sexual minority identity rather than behaviorally defined categories. Within a sample of current IDU in Baltimore, about 17% of female study participants (n=307) identified as gay/lesbian/bisexual. In controlled models, sexual minorities were three times as likely to report sex exchange behavior and four times as likely to report a recent STI. Injection risk did not differ significantly, but sexual minority women reported higher prevalence of socio-economic instability, negative health indicators, and fewer network financial, material, and health support resources. There is a need to identify and address socio-economic marginalization, social support, and health issues among female IDUs who identify as lesbian or bisexual. PMID:25504312

  2. Internet use and attitudes towards illicit internet use behavior in a sample of Russian college students.

    PubMed

    Palesh, Oxana; Saltzman, Kasey; Koopman, Cheryl

    2004-10-01

    This study assessed Internet use and attitudes toward illicit use of the Internet in a sample of Russian college students. A sample comprised of 198 students was recruited from a university in Moscow. Each participant completed a survey assessing demographic characteristics, Internet use, and attitudes towards engaging in illicit behaviors over the Internet. About half of the students reported that they used the Internet at least several times a year, with 8% reporting daily use of the Internet. Among Internet users, most reported having Internet access either at home or at a friends' home, and 16 % reported having Internet access from work, school, or a computer center. Among Internet users, the main purpose was for school-related activities (60%), followed by e-mail (55%), entertainment (50%), chatting (24%), and searching for pornography (6%). Although most students thought it was inappropriate to read someone else's e-mail, use someone else's password or credit card information without their permission, or break into someone's computer, many students did endorse those illicit behaviors. Over a fifth of the students reported that they knew hackers. Forty three percent of students agreed that people make too much fuss about watching videos, movies or downloading music on the Internet without paying. Males were more likely than females to report using the Internet for entertainment purposes (p = 0.006) and were more likely to agree that it was okay to break into someone's computer (p = 0.04). The results of this study suggest that these Russian college students predominately use the Internet to help with their schoolwork, to communicate with others, and for entertainment. These results also suggest that interventions may be useful to change attitudes endorsing illicit uses of the Internet.

  3. User's Manual for FEMOM3DR. Version 1.0

    NASA Technical Reports Server (NTRS)

    Reddy, C. J.

    1998-01-01

    FEMoM3DR is a computer code written in FORTRAN 77 to compute radiation characteristics of antennas on 3D body using combined Finite Element Method (FEM)/Method of Moments (MoM) technique. The code is written to handle different feeding structures like coaxial line, rectangular waveguide, and circular waveguide. This code uses the tetrahedral elements, with vector edge basis functions for FEM and triangular elements with roof-top basis functions for MoM. By virtue of FEM, this code can handle any arbitrary shaped three dimensional bodies with inhomogeneous lossy materials; and due to MoM the computational domain can be terminated in any arbitrary shape. The User's Manual is written to make the user acquainted with the operation of the code. The user is assumed to be familiar with the FORTRAN 77 language and the operating environment of the computers on which the code is intended to run.

  4. Computer systems and methods for the query and visualization of multidimensional databases

    DOEpatents

    Stolte, Chris; Tang, Diane L; Hanrahan, Patrick

    2015-03-03

    A computer displays a graphical user interface on its display. The graphical user interface includes a schema information region and a data visualization region. The schema information region includes multiple operand names, each operand corresponding to one or more fields of a multi-dimensional database that includes at least one data hierarchy. The data visualization region includes a columns shelf and a rows shelf. The computer detects user actions to associate one or more first operands with the columns shelf and to associate one or more second operands with the rows shelf. The computer generates a visual table in the data visualization region in accordance with the user actions. The visual table includes one or more panes. Each pane has an x-axis defined based on data for the one or more first operands, and each pane has a y-axis defined based on data for the one or more second operands.

  5. A Novel Resource Management Method of Providing Operating System as a Service for Mobile Transparent Computing

    PubMed Central

    Huang, Suzhen; Wu, Min; Zhang, Yaoxue; She, Jinhua

    2014-01-01

    This paper presents a framework for mobile transparent computing. It extends the PC transparent computing to mobile terminals. Since resources contain different kinds of operating systems and user data that are stored in a remote server, how to manage the network resources is essential. In this paper, we apply the technologies of quick emulator (QEMU) virtualization and mobile agent for mobile transparent computing (MTC) to devise a method of managing shared resources and services management (SRSM). It has three layers: a user layer, a manage layer, and a resource layer. A mobile virtual terminal in the user layer and virtual resource management in the manage layer cooperate to maintain the SRSM function accurately according to the user's requirements. An example of SRSM is used to validate this method. Experiment results show that the strategy is effective and stable. PMID:24883353

  6. A novel resource management method of providing operating system as a service for mobile transparent computing.

    PubMed

    Xiong, Yonghua; Huang, Suzhen; Wu, Min; Zhang, Yaoxue; She, Jinhua

    2014-01-01

    This paper presents a framework for mobile transparent computing. It extends the PC transparent computing to mobile terminals. Since resources contain different kinds of operating systems and user data that are stored in a remote server, how to manage the network resources is essential. In this paper, we apply the technologies of quick emulator (QEMU) virtualization and mobile agent for mobile transparent computing (MTC) to devise a method of managing shared resources and services management (SRSM). It has three layers: a user layer, a manage layer, and a resource layer. A mobile virtual terminal in the user layer and virtual resource management in the manage layer cooperate to maintain the SRSM function accurately according to the user's requirements. An example of SRSM is used to validate this method. Experiment results show that the strategy is effective and stable.

  7. Computer systems and methods for the query and visualization of multidimensional databases

    DOEpatents

    Stolte, Chris; Tang, Diane L.; Hanrahan, Patrick

    2015-11-10

    A computer displays a graphical user interface on its display. The graphical user interface includes a schema information region and a data visualization region. The schema information region includes a plurality of fields of a multi-dimensional database that includes at least one data hierarchy. The data visualization region includes a columns shelf and a rows shelf. The computer detects user actions to associate one or more first fields with the columns shelf and to associate one or more second fields with the rows shelf. The computer generates a visual table in the data visualization region in accordance with the user actions. The visual table includes one or more panes. Each pane has an x-axis defined based on data for the one or more first fields, and each pane has a y-axis defined based on data for the one or more second fields.

  8. Probabilistic Structural Analysis Methods (PSAM) for select space propulsion system components, part 2

    NASA Technical Reports Server (NTRS)

    1991-01-01

    The technical effort and computer code enhancements performed during the sixth year of the Probabilistic Structural Analysis Methods program are summarized. Various capabilities are described to probabilistically combine structural response and structural resistance to compute component reliability. A library of structural resistance models is implemented in the Numerical Evaluations of Stochastic Structures Under Stress (NESSUS) code that included fatigue, fracture, creep, multi-factor interaction, and other important effects. In addition, a user interface was developed for user-defined resistance models. An accurate and efficient reliability method was developed and was successfully implemented in the NESSUS code to compute component reliability based on user-selected response and resistance models. A risk module was developed to compute component risk with respect to cost, performance, or user-defined criteria. The new component risk assessment capabilities were validated and demonstrated using several examples. Various supporting methodologies were also developed in support of component risk assessment.

  9. Computer Plotting Data Points in the Engine Research Building

    NASA Image and Video Library

    1956-09-21

    A female computer plotting compressor data in the Engine Research Building at the NACA’s Lewis Flight Propulsion Laboratory. The Computing Section was introduced during World War II to relieve short-handed research engineers of some of the tedious data-taking work. The computers made the initial computations and plotted the data graphically. The researcher then analyzed the data and either summarized the findings in a report or made modifications or ran the test again. With the introduction of mechanical computer systems in the 1950s the female computers learned how to encode the punch cards. As the data processing capabilities increased, fewer female computers were needed. Many left on their own to start families, while others earned mathematical degrees and moved into advanced positions.

  10. PPC750 Performance Monitor

    NASA Technical Reports Server (NTRS)

    Meyer, Donald; Uchenik, Igor

    2007-01-01

    The PPC750 Performance Monitor (Perfmon) is a computer program that helps the user to assess the performance characteristics of application programs running under the Wind River VxWorks real-time operating system on a PPC750 computer. Perfmon generates a user-friendly interface and collects performance data by use of performance registers provided by the PPC750 architecture. It processes and presents run-time statistics on a per-task basis over a repeating time interval (typically, several seconds or minutes) specified by the user. When the Perfmon software module is loaded with the user s software modules, it is available for use through Perfmon commands, without any modification of the user s code and at negligible performance penalty. Per-task run-time performance data made available by Perfmon include percentage time, number of instructions executed per unit time, dispatch ratio, stack high water mark, and level-1 instruction and data cache miss rates. The performance data are written to a file specified by the user or to the serial port of the computer

  11. Bringing Federated Identity to Grid Computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Teheran, Jeny

    The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access formore » users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.« less

  12. Functional near-infrared spectroscopy for adaptive human-computer interfaces

    NASA Astrophysics Data System (ADS)

    Yuksel, Beste F.; Peck, Evan M.; Afergan, Daniel; Hincks, Samuel W.; Shibata, Tomoki; Kainerstorfer, Jana; Tgavalekos, Kristen; Sassaroli, Angelo; Fantini, Sergio; Jacob, Robert J. K.

    2015-03-01

    We present a brain-computer interface (BCI) that detects, analyzes and responds to user cognitive state in real-time using machine learning classifications of functional near-infrared spectroscopy (fNIRS) data. Our work is aimed at increasing the narrow communication bandwidth between the human and computer by implicitly measuring users' cognitive state without any additional effort on the part of the user. Traditionally, BCIs have been designed to explicitly send signals as the primary input. However, such systems are usually designed for people with severe motor disabilities and are too slow and inaccurate for the general population. In this paper, we demonstrate with previous work1 that a BCI that implicitly measures cognitive workload can improve user performance and awareness compared to a control condition by adapting to user cognitive state in real-time. We also discuss some of the other applications we have used in this field to measure and respond to cognitive states such as cognitive workload, multitasking, and user preference.

  13. Human computer interface guide, revision A

    NASA Technical Reports Server (NTRS)

    1993-01-01

    The Human Computer Interface Guide, SSP 30540, is a reference document for the information systems within the Space Station Freedom Program (SSFP). The Human Computer Interface Guide (HCIG) provides guidelines for the design of computer software that affects human performance, specifically, the human-computer interface. This document contains an introduction and subparagraphs on SSFP computer systems, users, and tasks; guidelines for interactions between users and the SSFP computer systems; human factors evaluation and testing of the user interface system; and example specifications. The contents of this document are intended to be consistent with the tasks and products to be prepared by NASA Work Package Centers and SSFP participants as defined in SSP 30000, Space Station Program Definition and Requirements Document. The Human Computer Interface Guide shall be implemented on all new SSFP contractual and internal activities and shall be included in any existing contracts through contract changes. This document is under the control of the Space Station Control Board, and any changes or revisions will be approved by the deputy director.

  14. Protecting the patient by promoting end-user competence in health informatics systems-moves towards a generic health computer user "driving license".

    PubMed

    Rigby, Michael

    2004-03-18

    The effectiveness and quality of health informatics systems' support to healthcare delivery are largely determined by two factors-the suitability of the system installed, and the competence of the users. However, the profile of users of large-scale clinical health systems is significantly different from the profile of end-users in other enterprises such as the finance sector, insurance, travel or retail sales. Work with a mental health provider in Ireland, who was introducing a customized electronic patient record (EPR) system, identified the strong legal and ethical importance of adequately skills for the health professionals and others, who would be the system users. The experience identified the need for a clear and comprehensive generic user qualification at a basic but robust level. The European computer driving license (ECDL) has gained wide recognition as a basic generic qualification for users of computer systems. However, health systems and data have a series of characteristics that differentiate them from other data systems. The logical conclusion was the recognition of a need for an additional domain-specific qualification-an "ECDL Health Supplement". Development of this is now being progressed.

  15. The Identification, Implementation, and Evaluation of Critical User Interface Design Features of Computer-Assisted Instruction Programs in Mathematics for Students with Learning Disabilities

    ERIC Educational Resources Information Center

    Seo, You-Jin; Woo, Honguk

    2010-01-01

    Critical user interface design features of computer-assisted instruction programs in mathematics for students with learning disabilities and corresponding implementation guidelines were identified in this study. Based on the identified features and guidelines, a multimedia computer-assisted instruction program, "Math Explorer", which delivers…

  16. Assessing the Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills toward Computer Misuse Intention at Government Agencies

    ERIC Educational Resources Information Center

    Choi, Min Suk

    2013-01-01

    Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Cybersecurity criminals are stealing more than one billion dollars from banks every year by exploiting vulnerabilities caused by bank users' computer misuse. Cybersecurity breaches are threatening the common…

  17. Theory and Programs for Dynamic Modeling of Tree Rings from Climate

    Treesearch

    Paul C. van Deusen; Jennifer Koretz

    1988-01-01

    Computer programs written in GAUSS(TM) for IBM compatible personal computers are described that perform dynamic tree ring modeling with climate data; the underlying theory is also described. The programs and a separate users manual are available from the authors, although users must have the GAUSS software package on their personal computer. An example application of...

  18. Task-Relevant Sound and User Experience in Computer-Mediated Firefighter Training

    ERIC Educational Resources Information Center

    Houtkamp, Joske M.; Toet, Alexander; Bos, Frank A.

    2012-01-01

    The authors added task-relevant sounds to a computer-mediated instructor in-the-loop virtual training for firefighter commanders in an attempt to raise the engagement and arousal of the users. Computer-mediated training for crew commanders should provide a sensory experience that is sufficiently intense to make the training viable and effective.…

  19. NFDRSPC: The National Fire-Danger Rating System on a Personal Computer

    Treesearch

    Bryan G. Donaldson; James T. Paul

    1990-01-01

    This user's guide is an introductory manual for using the 1988 version (Burgan 1988) of the National Fire-Danger Rating System on an IBM PC or compatible computer. NFDRSPC is a window-oriented, interactive computer program that processes observed and forecast weather with fuels data to produce NFDRS indices. Other program features include user-designed display...

  20. Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures

    ERIC Educational Resources Information Center

    Balas, Janet

    2005-01-01

    This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…

  1. End User Computing at a South African Technikon: Enabling Disadvantaged Students To Meet Employers' Requirements.

    ERIC Educational Resources Information Center

    Marsh, Cecille

    A two-phase study examined the skills required of competent end-users of computers in the workplace and assessed the computing awareness and technological environment of first-year students entering historically disadvantaged technikons in South Africa. First, a DACUM (Developing a Curriculum) panel of nine representatives of local business and…

  2. Flow Ambiguity: A Path Towards Classically Driven Blind Quantum Computation

    NASA Astrophysics Data System (ADS)

    Mantri, Atul; Demarie, Tommaso F.; Menicucci, Nicolas C.; Fitzsimons, Joseph F.

    2017-07-01

    Blind quantum computation protocols allow a user to delegate a computation to a remote quantum computer in such a way that the privacy of their computation is preserved, even from the device implementing the computation. To date, such protocols are only known for settings involving at least two quantum devices: either a user with some quantum capabilities and a remote quantum server or two or more entangled but noncommunicating servers. In this work, we take the first step towards the construction of a blind quantum computing protocol with a completely classical client and single quantum server. Specifically, we show how a classical client can exploit the ambiguity in the flow of information in measurement-based quantum computing to construct a protocol for hiding critical aspects of a computation delegated to a remote quantum computer. This ambiguity arises due to the fact that, for a fixed graph, there exist multiple choices of the input and output vertex sets that result in deterministic measurement patterns consistent with the same fixed total ordering of vertices. This allows a classical user, computing only measurement angles, to drive a measurement-based computation performed on a remote device while hiding critical aspects of the computation.

  3. Improving User Notification on Frequently Changing HPC Environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fuson, Christopher B; Renaud, William A

    2016-01-01

    Today s HPC centers user environments can be very complex. Centers often contain multiple large complicated computational systems each with their own user environment. Changes to a system s environment can be very impactful; however, a center s user environment is, in one-way or another, frequently changing. Because of this, it is vital for centers to notify users of change. For users, untracked changes can be costly, resulting in unnecessary debug time as well as wasting valuable compute allocations and research time. Communicating frequent change to diverse user communities is a common and ongoing task for HPC centers. This papermore » will cover the OLCF s current processes and methods used to communicate change to users of the center s large Cray systems and supporting resources. The paper will share lessons learned and goals as well as practices, tools, and methods used to continually improve and reach members of the OLCF user community.« less

  4. User Behavior Analytics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turcotte, Melissa; Moore, Juston Shane

    User Behaviour Analytics is the tracking, collecting and assessing of user data and activities. The goal is to detect misuse of user credentials by developing models for the normal behaviour of user credentials within a computer network and detect outliers with respect to their baseline.

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Song

    CFD (Computational Fluid Dynamics) is a widely used technique in engineering design field. It uses mathematical methods to simulate and predict flow characteristics in a certain physical space. Since the numerical result of CFD computation is very hard to understand, VR (virtual reality) and data visualization techniques are introduced into CFD post-processing to improve the understandability and functionality of CFD computation. In many cases CFD datasets are very large (multi-gigabytes), and more and more interactions between user and the datasets are required. For the traditional VR application, the limitation of computing power is a major factor to prevent visualizing largemore » dataset effectively. This thesis presents a new system designing to speed up the traditional VR application by using parallel computing and distributed computing, and the idea of using hand held device to enhance the interaction between a user and VR CFD application as well. Techniques in different research areas including scientific visualization, parallel computing, distributed computing and graphical user interface designing are used in the development of the final system. As the result, the new system can flexibly be built on heterogeneous computing environment, dramatically shorten the computation time.« less

  6. GNAP (Graphic Normative Analysis Program)

    USGS Publications Warehouse

    Bowen, Roger W.; Odell, John

    1979-01-01

    A user-oriented command language is developed to provide direct control over the computation and output of the standard CIPW norm. A user-supplied input format for the oxide values may be given or a standard CIPW Rock Analysis format may be used. Once the oxide values have been read by the computer, these values may be manipulated by the user and the 'norm' recalculated on the basis of the manipulated or 'adjusted' values. Additional output capabilities include tabular listing of computed values, summary listings suitable for publication, x-y plots, and ternary diagrams. As many as 20 rock analysis cards may be processed as a group. Any number of such groups may be processed in any one computer run.

  7. Paper simulation techniques in user requirements analysis for interactive computer systems

    NASA Technical Reports Server (NTRS)

    Ramsey, H. R.; Atwood, M. E.; Willoughby, J. K.

    1979-01-01

    This paper describes the use of a technique called 'paper simulation' in the analysis of user requirements for interactive computer systems. In a paper simulation, the user solves problems with the aid of a 'computer', as in normal man-in-the-loop simulation. In this procedure, though, the computer does not exist, but is simulated by the experimenters. This allows simulated problem solving early in the design effort, and allows the properties and degree of structure of the system and its dialogue to be varied. The technique, and a method of analyzing the results, are illustrated with examples from a recent paper simulation exercise involving a Space Shuttle flight design task

  8. Prevalence and correlates of co-ingestion of prescription tranquilizers and other psychoactive substances by U.S. high school seniors: Results from a national survey.

    PubMed

    Schepis, Ty S; West, Brady T; Teter, Christian J; McCabe, Sean Esteban

    2016-01-01

    Nonmedical tranquilizer use (NMTU) is a concerning and understudied phenomenon in adolescents, despite being the second most prevalent form of nonmedical use in this population. Thus, this work aimed to examine the sociodemographic and substance use correlates of past-year co-ingestion of a prescription tranquilizer and another substance among adolescents. Data were from the Monitoring the Future study, a nationally representative survey of U.S. high school students. Data from 11,444 seniors (12th graders) completing form 1 of the survey were used. The participants represented a population that was 52.7% female, 61.8% White, and had a modal age of 18. Weighted frequencies and Rao-Scott chi-square analyses were computed to describe the target population and examine associations of interest. An estimated 5.3% of the population engaged in past-year NMTU during this time period, with an estimated 72.6% of those users engaged in past-year co-ingestion of a tranquilizer and another substance. Marijuana and alcohol were the most commonly co-ingested substances. Those engaged in co-ingestion were more likely than past-year nonmedical users without co-ingestion to be engaged in other substance or nonmedical use (including past year nonmedical Xanax® (alprazolam) use), have an earlier onset of NMTU, and endorse recreational motives. Adolescent nonmedical tranquilizer users engaged in co-ingestion may be a particularly vulnerable population, with higher rates of other substance use, other nonmedical use and problematic NMTU characteristics than nonmedical users without co-ingestion. Identification of and intervention with adolescent co-ingestion users are important avenues for future research and clinical practice. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. "Why Has It Only become an Issue Now?": Young Drug Users' Perceptions of Drug Driving in Melbourne, Victoria

    ERIC Educational Resources Information Center

    Wilson, Laura Ann; Wilson, Dean

    2010-01-01

    Preliminary research into drug-user perceptions of drug driving was undertaken with a sample group of drug users aged 18 to 24 from Melbourne, Victoria. Eleven males and nine females participated in semi-structured interviews and completed self-report surveys. Participants discussed their drug driving and their perceptions of the likelihood of…

  10. Methamphetamine Users in a Community-Based Drug Court: Does Gender Matter?

    ERIC Educational Resources Information Center

    Hartman, Jennifer L.; Listwan, Shelley Johnson; Shaffer, Deborah Koetzle

    2007-01-01

    This paper examines men and women methamphetamine (meth) users who participated in a community-based drug court. The treatment of female drug users is a particularly salient issue because of the concerns with relapse and recidivism. For the current study, we studied the impact of the drug court by gender on a group of high-risk/high-need meth…

  11. [IDEAS For Equitable Computer Learning.

    ERIC Educational Resources Information Center

    Schubert, Jane G.; And Others

    Designed to assist educators in improving computer learning opportunities for students, this packet of materials presents practical strategies that address 12 barriers to equitable instruction: (1) lack of encouragement for females and minority students to use computers; (2) potential value of computer learning more apparent to males than females;…

  12. Temporal and visual source memory deficits among ecstasy/polydrug users.

    PubMed

    Fisk, John E; Gallagher, Denis T; Hadjiefthyvoulou, Florentia; Montgomery, Catharine

    2014-03-01

    We wished to investigate whether source memory judgements are adversely affected by recreational illicit drug use. Sixty-two ecstasy/polydrug users and 75 non ecstasy users completed a source memory task, in which they tried to determine whether or not a word had been previously presented and if so, attempted to recall the format, location and temporal position in which the word had occurred. While not differing in terms of the number of hits and false positive responses, ecstasy/polydrug users adopted a more liberal decision criterion when judging if a word had been presented previously. With regard to source memory, users were less able to determine the format in which words had been presented (upper versus lower case). Female users did worse than female nonusers in determining which list (first or second) a word was from. Unexpectedly, the current frequency of cocaine use was negative associated with list and case source memory performance. Given the role that source memory plays in everyday cognition, those who use cocaine more frequently might have more difficulty in everyday tasks such as recalling the sources of crucial information or making use of contextual information as an aid to learning.

  13. MCloud: Secure Provenance for Mobile Cloud Users

    DTIC Science & Technology

    2016-10-03

    Feasibility of Smartphone Clouds , 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). 04-MAY- 15, Shenzhen, China...final decision. MCloud: Secure Provenance for Mobile Cloud Users Final Report Bogdan Carbunar Florida International University Computing and...Release; Distribution Unlimited UU UU UU UU 03-10-2016 31-May-2013 30-May-2016 Final Report: MCloud: Secure Provenance for Mobile Cloud Users The views

  14. Graphical Requirements for Force Level Planning. Volume 2

    DTIC Science & Technology

    1991-09-01

    technology review includes graphics algorithms, computer hardware, computer software, and design methodologies. The technology can either exist today or...level graphics language. 7.4 User Interface Design Tools As user interfaces have become more sophisticated, they have become harder to develop. Xl...Setphen M. Pizer, editors. Proceedings 1986 Workshop on Interactive 31) Graphics , October 1986. 18 J. S. Dumas. Designing User Interface Software. Prentice

  15. A user`s guide to LUGSAN II. A computer program to calculate and archive lug and sway brace loads for aircraft-carried stores

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dunn, W.N.

    1998-03-01

    LUG and Sway brace ANalysis (LUGSAN) II is an analysis and database computer program that is designed to calculate store lug and sway brace loads for aircraft captive carriage. LUGSAN II combines the rigid body dynamics code, SWAY85, with a Macintosh Hypercard database to function both as an analysis and archival system. This report describes the LUGSAN II application program, which operates on the Macintosh System (Hypercard 2.2 or later) and includes function descriptions, layout examples, and sample sessions. Although this report is primarily a user`s manual, a brief overview of the LUGSAN II computer code is included with suggestedmore » resources for programmers.« less

  16. The relationship between computer games and quality of life in adolescents.

    PubMed

    Dolatabadi, Nayereh Kasiri; Eslami, Ahmad Ali; Mostafavi, Firooze; Hassanzade, Akbar; Moradi, Azam

    2013-01-01

    Term of doing computer games among teenagers is growing rapidly. This popular phenomenon can cause physical and psychosocial issues in them. Therefore, this study examined the relationship between computer games and quality of life domains in adolescents aging 12-15 years. In a cross-sectional study using the 2-stage stratified cluster sampling method, 444 male and female students in Borkhar were selected. The data collection tool consisted of 1) World Health Organization Quality Of Life - BREF questionnaire and 2) personal information questionnaire. The data were analyzed by Pearson correlation, Spearman correlation, chi-square, independent t-tests and analysis of covariance. The total mean score of quality of life in students was 67.11±13.34. The results showed a significant relationship between the age of starting to play games and the overall quality of life score and its fourdomains (range r=-0.13 to -0.18). The mean of overall quality of life score in computer game users was 68.27±13.03 while it was 64.81±13.69 among those who did not play computer games and the difference was significant (P=0.01). There were significant differences in environmental and mental health domains between the two groups (P<0.05). However, there was no significant relationship between BMI with the time spent and the type of computer games. Playing computer games for a short time under parental supervision can have positive effects on quality of life in adolescents. However, spending long hours for playing computer games may have negative long-term effects.

  17. Trafficking in Meth: An Analysis of the Differences between Male and Female Dealers

    ERIC Educational Resources Information Center

    Senjo, Scott R.

    2005-01-01

    Male and female meth dealers exhibit numerous common characteristics and patterns. For example, both can be relatively heavy users and both have similar (long) criminal records. However, both groups show important distinctions in their drug dealing patterns. This exploratory study compares 34 male and 26 female meth dealers (N = 60) who were…

  18. LTCP 2D Graphical User Interface. Application Description and User's Guide

    NASA Technical Reports Server (NTRS)

    Ball, Robert; Navaz, Homayun K.

    1996-01-01

    A graphical user interface (GUI) written for NASA's LTCP (Liquid Thrust Chamber Performance) 2 dimensional computational fluid dynamic code is described. The GUI is written in C++ for a desktop personal computer running under a Microsoft Windows operating environment. Through the use of common and familiar dialog boxes, features, and tools, the user can easily and quickly create and modify input files for the LTCP code. In addition, old input files used with the LTCP code can be opened and modified using the GUI. The application is written in C++ for a desktop personal computer running under a Microsoft Windows operating environment. The program and its capabilities are presented, followed by a detailed description of each menu selection and the method of creating an input file for LTCP. A cross reference is included to help experienced users quickly find the variables which commonly need changes. Finally, the system requirements and installation instructions are provided.

  19. Increased synthetic drug abuse and trends in HIV and syphilis prevalence among female drug users from 2010-2014 from Beijing, China.

    PubMed

    Sun, Yanming; Guo, Wei; Li, Guiying; He, Shufang; Lu, Hongyan

    2018-01-01

    The objective of this study was to monitor the trend of addiction drug use and its relationship with sexually transmitted infections (STIs) among female drug users (FDUs). Serial cross-sectional surveys were conducted during 2010-2014 among FDUs in Beijing to collect information on addiction drug usage, sexual behaviors, and STI prevalence. Characteristics were analyzed and compared between traditional and synthetic drug users among FDUs by logistic regression method. A total of 3859 FDUs were surveyed during 2010-2014, with the median age being 32.7 years old. The proportion of synthetic drug users among FDUs increased from 43.7% in 2010 to 70.7% in 2014. Compared with traditional drug users, synthetic drug users were younger (P < 0.001), lacked education (P < 0.001), were unmarried (P < 0.001), and were non-local residents (P < 0.001). No significant difference was found with condom usage during sexual activity between traditional and synthetic drug FDUs. However, the engagement of commercial sexual activities (P < 0.001) and syphilis prevalence (P < 0.001) among synthetic drug users were significantly higher than traditional drug users. Synthetic drug abuse appears to be correlated with commercial sex behavior and higher syphilis prevalence among FDUs. Tailored strategies on health education to curb the prevalence of synthetic drug abuse are urgently needed in Beijing.

  20. Altered Serum Lipoprotein Profiles in Male and Female Power Lifters Ingesting Anabolic Steroids.

    ERIC Educational Resources Information Center

    Cohen, Jonathan C.; And Others

    1986-01-01

    Serum lipoprotein profiles were measured in nine male and three female weightlifters who were taking anabolic steroids. The profiles suggest that steriod users may face an increased risk of coronary artery disease. (Author/MT)

  1. Mechanistic experimental pain assessment in computer users with and without chronic musculoskeletal pain.

    PubMed

    Ge, Hong-You; Vangsgaard, Steffen; Omland, Øyvind; Madeleine, Pascal; Arendt-Nielsen, Lars

    2014-12-06

    Musculoskeletal pain from the upper extremity and shoulder region is commonly reported by computer users. However, the functional status of central pain mechanisms, i.e., central sensitization and conditioned pain modulation (CPM), has not been investigated in this population. The aim was to evaluate sensitization and CPM in computer users with and without chronic musculoskeletal pain. Pressure pain threshold (PPT) mapping in the neck-shoulder (15 points) and the elbow (12 points) was assessed together with PPT measurement at mid-point in the tibialis anterior (TA) muscle among 47 computer users with chronic pain in the upper extremity and/or neck-shoulder pain (pain group) and 17 pain-free computer users (control group). Induced pain intensities and profiles over time were recorded using a 0-10 cm electronic visual analogue scale (VAS) in response to different levels of pressure stimuli on the forearm with a new technique of dynamic pressure algometry. The efficiency of CPM was assessed using cuff-induced pain as conditioning pain stimulus and PPT at TA as test stimulus. The demographics, job seniority and number of working hours/week using a computer were similar between groups. The PPTs measured at all 15 points in the neck-shoulder region were not significantly different between groups. There were no significant differences between groups neither in PPTs nor pain intensity induced by dynamic pressure algometry. No significant difference in PPT was observed in TA between groups. During CPM, a significant increase in PPT at TA was observed in both groups (P < 0.05) without significant differences between groups. For the chronic pain group, higher clinical pain intensity, lower PPT values from the neck-shoulder and higher pain intensity evoked by the roller were all correlated with less efficient descending pain modulation (P < 0.05). This suggests that the excitability of the central pain system is normal in a large group of computer users with low pain intensity chronic upper extremity and/or neck-shoulder pain and that increased excitability of the pain system cannot explain the reported pain. However, computer users with higher pain intensity and lower PPTs were found to have decreased efficiency in descending pain modulation.

  2. User's manual for MacPASCO

    NASA Technical Reports Server (NTRS)

    Lucas, S. H.; Davis, R. C.

    1992-01-01

    A user's manual is presented for MacPASCO, which is an interactive, graphic, preprocessor for panel design. MacPASCO creates input for PASCO, an existing computer code for structural analysis and sizing of longitudinally stiffened composite panels. MacPASCO provides a graphical user interface which simplifies the specification of panel geometry and reduces user input errors. The user draws the initial structural geometry and reduces user input errors. The user draws the initial structural geometry on the computer screen, then uses a combination of graphic and text inputs to: refine the structural geometry; specify information required for analysis such as panel load and boundary conditions; and define design variables and constraints for minimum mass optimization. Only the use of MacPASCO is described, since the use of PASCO has been documented elsewhere.

  3. Image-Processing Software For A Hypercube Computer

    NASA Technical Reports Server (NTRS)

    Lee, Meemong; Mazer, Alan S.; Groom, Steven L.; Williams, Winifred I.

    1992-01-01

    Concurrent Image Processing Executive (CIPE) is software system intended to develop and use image-processing application programs on concurrent computing environment. Designed to shield programmer from complexities of concurrent-system architecture, it provides interactive image-processing environment for end user. CIPE utilizes architectural characteristics of particular concurrent system to maximize efficiency while preserving architectural independence from user and programmer. CIPE runs on Mark-IIIfp 8-node hypercube computer and associated SUN-4 host computer.

  4. Unobtrusive monitoring of computer interactions to detect cognitive status in elders.

    PubMed

    Jimison, Holly; Pavel, Misha; McKanna, James; Pavel, Jesse

    2004-09-01

    The U.S. has experienced a rapid growth in the use of computers by elders. E-mail, Web browsing, and computer games are among the most common routine activities for this group of users. In this paper, we describe techniques for unobtrusively monitoring naturally occurring computer interactions to detect sustained changes in cognitive performance. Researchers have demonstrated the importance of the early detection of cognitive decline. Users over the age of 75 are at risk for medically related cognitive problems and confusion, and early detection allows for more effective clinical intervention. In this paper, we present algorithms for inferring a user's cognitive performance using monitoring data from computer games and psychomotor measurements associated with keyboard entry and mouse movement. The inferences are then used to classify significant performance changes, and additionally, to adapt computer interfaces with tailored hints and assistance when needed. These methods were tested in a group of elders in a residential facility.

  5. Data management and its role in delivering science at DOE BES user facilities - Past, Present, and Future

    NASA Astrophysics Data System (ADS)

    Miller, Stephen D.; Herwig, Kenneth W.; Ren, Shelly; Vazhkudai, Sudharshan S.; Jemian, Pete R.; Luitz, Steffen; Salnikov, Andrei A.; Gaponenko, Igor; Proffen, Thomas; Lewis, Paul; Green, Mark L.

    2009-07-01

    The primary mission of user facilities operated by Basic Energy Sciences under the Department of Energy is to produce data for users in support of open science and basic research [1]. We trace back almost 30 years of history across selected user facilities illustrating the evolution of facility data management practices and how these practices have related to performing scientific research. The facilities cover multiple techniques such as X-ray and neutron scattering, imaging and tomography sciences. Over time, detector and data acquisition technologies have dramatically increased the ability to produce prolific volumes of data challenging the traditional paradigm of users taking data home upon completion of their experiments to process and publish their results. During this time, computing capacity has also increased dramatically, though the size of the data has grown significantly faster than the capacity of one's laptop to manage and process this new facility produced data. Trends indicate that this will continue to be the case for yet some time. Thus users face a quandary for how to manage today's data complexity and size as these may exceed the computing resources users have available to themselves. This same quandary can also stifle collaboration and sharing. Realizing this, some facilities are already providing web portal access to data and computing thereby providing users access to resources they need [2]. Portal based computing is now driving researchers to think about how to use the data collected at multiple facilities in an integrated way to perform their research, and also how to collaborate and share data. In the future, inter-facility data management systems will enable next tier cross-instrument-cross facility scientific research fuelled by smart applications residing upon user computer resources. We can learn from the medical imaging community that has been working since the early 1990's to integrate data from across multiple modalities to achieve better diagnoses [3] - similarly, data fusion across BES facilities will lead to new scientific discoveries.

  6. Finding Waldo: Learning about Users from their Interactions.

    PubMed

    Brown, Eli T; Ottley, Alvitta; Zhao, Helen; Quan Lin; Souvenir, Richard; Endert, Alex; Chang, Remco

    2014-12-01

    Visual analytics is inherently a collaboration between human and computer. However, in current visual analytics systems, the computer has limited means of knowing about its users and their analysis processes. While existing research has shown that a user's interactions with a system reflect a large amount of the user's reasoning process, there has been limited advancement in developing automated, real-time techniques that mine interactions to learn about the user. In this paper, we demonstrate that we can accurately predict a user's task performance and infer some user personality traits by using machine learning techniques to analyze interaction data. Specifically, we conduct an experiment in which participants perform a visual search task, and apply well-known machine learning algorithms to three encodings of the users' interaction data. We achieve, depending on algorithm and encoding, between 62% and 83% accuracy at predicting whether each user will be fast or slow at completing the task. Beyond predicting performance, we demonstrate that using the same techniques, we can infer aspects of the user's personality factors, including locus of control, extraversion, and neuroticism. Further analyses show that strong results can be attained with limited observation time: in one case 95% of the final accuracy is gained after a quarter of the average task completion time. Overall, our findings show that interactions can provide information to the computer about its human collaborator, and establish a foundation for realizing mixed-initiative visual analytics systems.

  7. [Usage patterns of internet and computer games : Results of an observational study of Tyrolean adolescents].

    PubMed

    Riedl, David; Stöckl, Andrea; Nussbaumer, Charlotte; Rumpold, Gerhard; Sevecke, Kathrin; Fuchs, Martin

    2016-12-01

    The use of digital media such as the Internet and Computer games has greatly increased. In the western world, almost all young people regularly use these relevant technologies. Against this background, forms of use with possible negative consequences for young people have been recognized and scientifically examined. The aim of our study was therefore to investigate the prevalence of pathological use of these technologies in a sample of young Tyrolean people. 398 students (average age 15.2 years, SD ± 2.3 years, 34.2% female) were interviewed by means of the structured questionnaires CIUS (Internet), CSV-S (Computer games) and SWE (Self efficacy). Additionally, socio demographic data were collected. In line with previous studies, 7.7% of the adolescents of our sample showed criteria for problematic internet use, 3.3% for pathological internet use. 5.4% of the sample reported pathological computer game usage. The most important aspect to influence our results was the gender of the subjects. Intensive users in the field of Internet and Computer games were more often young men, young women, however, showed significantly less signs of pathological computer game use. A significant percentage of Tyrolean adolescents showed difficulties in the development of competent media use, indicating the growing significance of prevention measures such as media education. In a follow-up project, a sample of adolescents with mental disorders will be examined concerning their media use and be compared with our school-sample.

  8. Older Adults Perceptions of Technology and Barriers to Interacting with Tablet Computers: A Focus Group Study.

    PubMed

    Vaportzis, Eleftheria; Clausen, Maria Giatsi; Gow, Alan J

    2017-10-04

    New technologies provide opportunities for the delivery of broad, flexible interventions with older adults. Focus groups were conducted to: (1) understand older adults' familiarity with, and barriers to, interacting with new technologies and tablets; and (2) utilize user-engagement in refining an intervention protocol. Eighteen older adults (65-76 years old; 83.3% female) who were novice tablet users participated in discussions about their perceptions of and barriers to interacting with tablets. We conducted three separate focus groups and used a generic qualitative design applying thematic analysis to analyse the data. The focus groups explored attitudes toward tablets and technology in general. We also explored the perceived advantages and disadvantages of using tablets, familiarity with, and barriers to interacting with tablets. In two of the focus groups, participants had previous computing experience (e.g., desktop), while in the other, participants had no previous computing experience. None of the participants had any previous experience with tablet computers. The themes that emerged were related to barriers (i.e., lack of instructions and guidance, lack of knowledge and confidence, health-related barriers, cost); disadvantages and concerns (i.e., too much and too complex technology, feelings of inadequacy, and comparison with younger generations, lack of social interaction and communication, negative features of tablets); advantages (i.e., positive features of tablets, accessing information, willingness to adopt technology); and skepticism about using tablets and technology in general. After brief exposure to tablets, participants emphasized the likelihood of using a tablet in the future. Our findings suggest that most of our participants were eager to adopt new technology and willing to learn using a tablet. However, they voiced apprehension about lack of, or lack of clarity in, instructions and support. Understanding older adults' perceptions of technology is important to assist with introducing it to this population and maximize the potential of technology to facilitate independent living.

  9. Older Adults Perceptions of Technology and Barriers to Interacting with Tablet Computers: A Focus Group Study

    PubMed Central

    Vaportzis, Eleftheria; Giatsi Clausen, Maria; Gow, Alan J.

    2017-01-01

    Background: New technologies provide opportunities for the delivery of broad, flexible interventions with older adults. Focus groups were conducted to: (1) understand older adults' familiarity with, and barriers to, interacting with new technologies and tablets; and (2) utilize user-engagement in refining an intervention protocol. Methods: Eighteen older adults (65–76 years old; 83.3% female) who were novice tablet users participated in discussions about their perceptions of and barriers to interacting with tablets. We conducted three separate focus groups and used a generic qualitative design applying thematic analysis to analyse the data. The focus groups explored attitudes toward tablets and technology in general. We also explored the perceived advantages and disadvantages of using tablets, familiarity with, and barriers to interacting with tablets. In two of the focus groups, participants had previous computing experience (e.g., desktop), while in the other, participants had no previous computing experience. None of the participants had any previous experience with tablet computers. Results: The themes that emerged were related to barriers (i.e., lack of instructions and guidance, lack of knowledge and confidence, health-related barriers, cost); disadvantages and concerns (i.e., too much and too complex technology, feelings of inadequacy, and comparison with younger generations, lack of social interaction and communication, negative features of tablets); advantages (i.e., positive features of tablets, accessing information, willingness to adopt technology); and skepticism about using tablets and technology in general. After brief exposure to tablets, participants emphasized the likelihood of using a tablet in the future. Conclusions: Our findings suggest that most of our participants were eager to adopt new technology and willing to learn using a tablet. However, they voiced apprehension about lack of, or lack of clarity in, instructions and support. Understanding older adults' perceptions of technology is important to assist with introducing it to this population and maximize the potential of technology to facilitate independent living. PMID:29071004

  10. Socioeconomic factors influencing cosmetic usage patterns.

    PubMed

    Park, Gyeong-Hun; Nam, Chanhee; Hong, Seungphil; Park, Byungcheol; Kim, Hakrim; Lee, Taewon; Kim, Kyubong; Lee, Jong Hee; Kim, Myung Hwa

    2018-05-01

    Despite daily exposure to chemicals in cosmetic products, there are few studies on the exposure levels to cosmetics particularly in Asians. We sought to investigate the usage pattern of cosmetics, including eye makeup products, fragrances, color makeups, and hair and nail care products, in Koreans. An online survey of 1,800 participants (908 males and 892 females, aged 15-59 years) from 5 Metropolitan cities (Seoul, Incheon, Daejeon, Daegu, and Busan) in Korea was conducted. For overall types of cosmetics, the proportion of users was 7.1% (range: 0.0-46.3%) in males and 30.7% (range: 1.0-82.8%) in females. The most prevalently used product was perfume (46.3%) in males and lipstick (82.8%) in females. In addition, the mean number of application for overall types of cosmetics was 22.7 (range: 4.6-49.4) times per month in male users and 24.8 (range: 4.2-62.0) in female users. The usage pattern was significantly altered according to demographic and socioeconomic factors, including age group, occupation, and income. This work estimated the prevalences and frequencies of use of a wide collection of cosmetics from a large number of Koreans and found that the usage pattern was significantly associated with demographic and socioeconomic factors.

  11. Effect of Gender on Computer Use and Attitudes of College Seniors

    NASA Astrophysics Data System (ADS)

    McCoy, Leah P.; Heafner, Tina L.

    Male and female students have historically had different computer attitudes and levels of computer use. These equity issues are of interest to researchers and practitioners who seek to understand why a digital divide exists between men and women. In this study, these questions were examined in an intensive computing environment in which all students at one university were issued identical laptop computers and used them extensively for 4 years. Self-reported computer use was examined for effects of gender. Attitudes toward computers were also assessed and compared for male and female students. The results indicated that when the technological environment was institutionally equalized for male and female students, many traditional findings of gender differences were not evident.

  12. The economics of time shared computing: Congestion, user costs and capacity

    NASA Technical Reports Server (NTRS)

    Agnew, C. E.

    1982-01-01

    Time shared systems permit the fixed costs of computing resources to be spread over large numbers of users. However, bottleneck results in the theory of closed queueing networks can be used to show that this economy of scale will be offset by the increased congestion that results as more users are added to the system. If one considers the total costs, including the congestion cost, there is an optimal number of users for a system which equals the saturation value usually used to define system capacity.

  13. Human-Computer Interaction in Tactical Operations: Designing for Effective Human-Computer Dialogue

    DTIC Science & Technology

    1990-09-01

    developing re-usable interface software. Furthermore, steps can be taken toward standardization, and the specifier may be able to take on an increased...The semantic level deals with the meaning of the dialogue to the user. The user has a "point of view" or a " mental model" which provides a context for...information may not occur. As shown in Figure 3-4, the user’s mental model is termed the USER MODEL (Norman and Draper, 1986, p. 47). The programmer’s

  14. Who are the users of a traditional Chinese sanfu acupoint herbal patching therapy in China?: A cross-sectional survey.

    PubMed

    Zhou, Fen; Wu, Hong-Jun; Zhai, Jun-Ping; Zhang, Gui-Yan; Shao, Yan; Tian, Xia; Xia, Ru-Yu; Jia, Li-Yan; Li, Wen-Yuan; Liang, Ning; Yan, Xiao-Yi; Wu, Ruo-Han; Zhang, Kang; Li, Xin-Lin; Wang, Cong-Cong; Liu, Jian-Ping

    2016-12-01

    Sanfu acupoint herbal patching (SAHP) is a unique traditional Chinese medicine therapy, which has become popular for preventing acute attack of respiratory diseases such as asthma and chronic obstructive pulmonary disease, in many regions of mainland China. However, the knowledge about its users is lacking, especially the characteristics of the users and their experience and perspectives.To investigate the demographics of users, conditions for its use and the previous experience of SAHP, as well as users' perspectives to provide baseline information for its practice.A cross-sectional consecutive-sample survey was conducted at outpatient departments from 3 traditional Chinese medicine hospitals in northern China. Each participant completed a questionnaire, after informed consent. Data description and analyses were done using SPSS 20.0.Among 949 SAHP users from 3 hospitals, female was predominant (n = 592; 62.4%), aged from 2 to 96 years (median = 52 years). 64.7% (380/587) of regular users have applied consecutively for 3 years or over, and the self-perceived satisfaction rates of respiratory diseases were from 45.9% to 77.7%. Positive attitude toward traditional Chinese medicine was the top reason for choosing SAHP. 42.4% of users held a motivation of being cured by SAHP and with great outcome expectancy on SAHP (70.8%).SAHP users were mainly female adults or elderly population; more than half were regular users, who predominantly used SAHP for various chronic respiratory diseases during their stable stage. The majority of users expressed satisfaction to previous SAHP for their respiratory diseases. 42.4% of users held a motivation of being cured by SAHP and with great outcome expectancy on SAHP (70.8%). The findings from this survey deserve further clinical trials for their clinical effectiveness.

  15. ARTVAL user guide : user guide for the ARTerial eVALuation computational engine.

    DOT National Transportation Integrated Search

    2015-06-01

    This document provides guidance on the use of the ARTVAL (Arterial Evaluation) computational : engine. The engine implements the Quick Estimation Method for Urban Streets (QEM-US) : described in Highway Capacity Manual (HCM2010) as the core computati...

  16. Recommended Computer End-User Skills for Business Students by Inc. 500 Executives and Office Systems Educators.

    ERIC Educational Resources Information Center

    Zhao, Jensen J.; Ray, Charles M.; Dye, Lee J.; Davis, Rodney

    1998-01-01

    Executives (n=63) and office-systems educators (n=88) recommended for workers the following categories of computer end-user skills: hardware, operating systems, word processing, spreadsheets, database, desktop publishing, and presentation. (SK)

  17. Software For Computer-Aided Design Of Control Systems

    NASA Technical Reports Server (NTRS)

    Wette, Matthew

    1994-01-01

    Computer Aided Engineering System (CAESY) software developed to provide means to evaluate methods for dealing with users' needs in computer-aided design of control systems. Interpreter program for performing engineering calculations. Incorporates features of both Ada and MATLAB. Designed to be flexible and powerful. Includes internally defined functions, procedures and provides for definition of functions and procedures by user. Written in C language.

  18. Presentation of computer code SPIRALI for incompressible, turbulent, plane and spiral grooved cylindrical and face seals

    NASA Technical Reports Server (NTRS)

    Walowit, Jed A.

    1994-01-01

    A viewgraph presentation is made showing the capabilities of the computer code SPIRALI. Overall capabilities of SPIRALI include: computes rotor dynamic coefficients, flow, and power loss for cylindrical and face seals; treats turbulent, laminar, Couette, and Poiseuille dominated flows; fluid inertia effects are included; rotor dynamic coefficients in three (face) or four (cylindrical) degrees of freedom; includes effects of spiral grooves; user definable transverse film geometry including circular steps and grooves; independent user definable friction factor models for rotor and stator; and user definable loss coefficients for sudden expansions and contractions.

  19. GADRAS-DRF 18.6 User's Manual

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Horne, Steve M.; Thoreson, Greg G.; Theisen, Lisa A.

    2016-05-01

    The Gamma Detector Response and Analysis Software–Detector Response Function (GADRAS-DRF) application computes the response of gamma-ray and neutron detectors to incoming radiation. This manual provides step-by-step procedures to acquaint new users with the use of the application. The capabilities include characterization of detector response parameters, plotting and viewing measured and computed spectra, analyzing spectra to identify isotopes, and estimating source energy distributions from measured spectra. GADRAS-DRF can compute and provide detector responses quickly and accurately, giving users the ability to obtain usable results in a timely manner (a matter of seconds or minutes).

  20. Neural-Network Simulator

    NASA Technical Reports Server (NTRS)

    Mitchell, Paul H.

    1991-01-01

    F77NNS (FORTRAN 77 Neural Network Simulator) computer program simulates popular back-error-propagation neural network. Designed to take advantage of vectorization when used on computers having this capability, also used on any computer equipped with ANSI-77 FORTRAN Compiler. Problems involving matching of patterns or mathematical modeling of systems fit class of problems F77NNS designed to solve. Program has restart capability so neural network solved in stages suitable to user's resources and desires. Enables user to customize patterns of connections between layers of network. Size of neural network F77NNS applied to limited only by amount of random-access memory available to user.

  1. Computer-assisted instruction and diagnosis of radiographic findings.

    PubMed

    Harper, D; Butler, C; Hodder, R; Allman, R; Woods, J; Riordan, D

    1984-04-01

    Recent advances in computer technology, including high bit-density storage, digital imaging, and the ability to interface microprocessors with videodisk, create enormous opportunities in the field of medical education. This program, utilizing a personal computer, videodisk, BASIC language, a linked textfile system, and a triangulation approach to the interpretation of radiographs developed by Dr. W. L. Thompson, can enable the user to engage in a user-friendly, dynamic teaching program in radiology, applicable to various levels of expertise. Advantages include a relatively more compact and inexpensive system with rapid access and ease of revision which requires little instruction to the user.

  2. Application of AI techniques to a voice-actuated computer system for reconstructing and displaying magnetic resonance imaging data

    NASA Astrophysics Data System (ADS)

    Sherley, Patrick L.; Pujol, Alfonso, Jr.; Meadow, John S.

    1990-07-01

    To provide a means of rendering complex computer architectures languages and input/output modalities transparent to experienced and inexperienced users research is being conducted to develop a voice driven/voice response computer graphics imaging system. The system will be used for reconstructing and displaying computed tomography and magnetic resonance imaging scan data. In conjunction with this study an artificial intelligence (Al) control strategy was developed to interface the voice components and support software to the computer graphics functions implemented on the Sun Microsystems 4/280 color graphics workstation. Based on generated text and converted renditions of verbal utterances by the user the Al control strategy determines the user''s intent and develops and validates a plan. The program type and parameters within the plan are used as input to the graphics system for reconstructing and displaying medical image data corresponding to that perceived intent. If the plan is not valid the control strategy queries the user for additional information. The control strategy operates in a conversation mode and vocally provides system status reports. A detailed examination of the various AT techniques is presented with major emphasis being placed on their specific roles within the total control strategy structure. 1.

  3. MacDoctor: The Macintosh diagnoser

    NASA Technical Reports Server (NTRS)

    Lavery, David B.; Brooks, William D.

    1990-01-01

    When the Macintosh computer was first released, the primary user was a computer hobbyist who typically had a significant technical background and was highly motivated to understand the internal structure and operational intricacies of the computer. In recent years the Macintosh computer has become a widely-accepted general purpose computer which is being used by an ever-increasing non-technical audience. This has lead to a large base of users which has neither the interest nor the background to understand what is happening 'behind the scenes' when the Macintosh is put to use - or what should be happening when something goes wrong. Additionally, the Macintosh itself has evolved from a simple closed design to a complete family of processor platforms and peripherals with a tremendous number of possible configurations. With the increasing popularity of the Macintosh series, software and hardware developers are producing a product for every user's need. As the complexity of configuration possibilities grows, the need for experienced or even expert knowledge is required to diagnose problems. This presents a problem to uneducated or casual users. This problem indicates a new Macintosh consumer need; that is, a diagnostic tool able to determine the problem for the user. As the volume of Macintosh products has increased, this need has also increased.

  4. Franklin: User Experiences

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    National Energy Research Supercomputing Center; He, Yun; Kramer, William T.C.

    2008-05-07

    The newest workhorse of the National Energy Research Scientific Computing Center is a Cray XT4 with 9,736 dual core nodes. This paper summarizes Franklin user experiences from friendly early user period to production period. Selected successful user stories along with top issues affecting user experiences are presented.

  5. Association between illegal drugs and weapon carrying in young people in Scotland: schools' survey

    PubMed Central

    McKeganey, Neil; Norrie, John

    2000-01-01

    Objectives To identify the type and extent of weapons being carried among young people in Scotland, and to determine the relation between use of illegal drugs and weapon carrying. Design Questionnaire school survey. Setting Independent schools in central Scotland and schools in Lanarkshire and Perth and Kinross. Participants 3121 students aged 11 to 16 in 20 schools. Main outcome measures Self completion questionnaire reporting history of drug use and weapon carrying. Results Overall, 34.1% of males and 8.6% of females reported having carried a weapon (P<0.0001), ranging from 29.2% of boys aged 11-13 (classes S1 to S2) to 39.3% of boys aged 13-15 (S3 to S4). These values are higher than those in a recent survey of young people in England. Weapon carrying in Lanarkshire was 70% higher for males than in the rural area of Perth and Kinross. Both males and females who had taken drugs were more likely to carry weapons (63.5% of male drug users versus 20.5% of non-users and 22.8% of female drug users versus 3.7% of non-users; both P<0.0001). The proportions of males carrying weapons who used none, one, two, three or four, or five or more illegal drugs were 21%, 52%, 68%, 74%, and 92% respectively. A similar trend was found among females. Conclusions Better information is needed on the nature and extent of weapon carrying by young people in the United Kingdom, and better educational campaigns are needed warning of the dangers of carrying weapons. PMID:10753152

  6. Cybersex addiction in heterosexual female users of internet pornography can be explained by gratification hypothesis.

    PubMed

    Laier, Christian; Pekal, Jaro; Brand, Matthias

    2014-08-01

    In the context of Internet addiction, cybersex is considered to be an Internet application in which users are at risk for developing addictive usage behavior. Regarding males, experimental research has shown that indicators of sexual arousal and craving in response to Internet pornographic cues are related to severity of cybersex addiction in Internet pornography users (IPU). Since comparable investigations on females do not exist, the aim of this study is to investigate predictors of cybersex addiction in heterosexual women. We examined 51 female IPU and 51 female non-Internet pornography users (NIPU). Using questionnaires, we assessed the severity of cybersex addiction in general, as well as propensity for sexual excitation, general problematic sexual behavior, and severity of psychological symptoms. Additionally, an experimental paradigm, including a subjective arousal rating of 100 pornographic pictures, as well as indicators of craving, was conducted. Results indicated that IPU rated pornographic pictures as more arousing and reported greater craving due to pornographic picture presentation compared with NIPU. Moreover, craving, sexual arousal rating of pictures, sensitivity to sexual excitation, problematic sexual behavior, and severity of psychological symptoms predicted tendencies toward cybersex addiction in IPU. Being in a relationship, number of sexual contacts, satisfaction with sexual contacts, and use of interactive cybersex were not associated with cybersex addiction. These results are in line with those reported for heterosexual males in previous studies. Findings regarding the reinforcing nature of sexual arousal, the mechanisms of learning, and the role of cue reactivity and craving in the development of cybersex addiction in IPU need to be discussed.

  7. CARE 3 user-friendly interface user's guide

    NASA Technical Reports Server (NTRS)

    Martensen, A. L.

    1987-01-01

    CARE 3 predicts the unreliability of highly reliable reconfigurable fault-tolerant systems that include redundant computers or computer systems. CARE3MENU is a user-friendly interface used to create an input for the CARE 3 program. The CARE3MENU interface has been designed to minimize user input errors. Although a CARE3MENU session may be successfully completed and all parameters may be within specified limits or ranges, the CARE 3 program is not guaranteed to produce meaningful results if the user incorrectly interprets the CARE 3 stochastic model. The CARE3MENU User Guide provides complete information on how to create a CARE 3 model with the interface. The CARE3MENU interface runs under the VAX/VMS operating system.

  8. CERESVis: A QC Tool for CERES that Leverages Browser Technology for Data Validation

    NASA Astrophysics Data System (ADS)

    Chu, C.; Sun-Mack, S.; Heckert, E.; Chen, Y.; Doelling, D.

    2015-12-01

    In this poster, we are going to present three user interfaces that CERES team uses to validate pixel-level data. Besides our home grown tools, we will aslo present the browser technology that we use to provide interactive interfaces, such as jquery, HighCharts and Google Earth. We pass data to the users' browsers and use the browsers to do some simple computations. The three user interfaces are: Thumbnails -- it displays hundrends images to allow users to browse 24-hour data files in few seconds. Multiple-synchronized cursors -- it allows users to compare multiple images side by side. Bounding Boxes and Histograms -- it allows users to draw multiple bounding boxes on an image and the browser computes/display the histograms.

  9. Virtual button interface

    DOEpatents

    Jones, Jake S.

    1999-01-01

    An apparatus and method of issuing commands to a computer by a user interfacing with a virtual reality environment. To issue a command, the user directs gaze at a virtual button within the virtual reality environment, causing a perceptible change in the virtual button, which then sends a command corresponding to the virtual button to the computer, optionally after a confirming action is performed by the user, such as depressing a thumb switch.

  10. Authentication of Smartphone User Using RSSI Geolocation

    DTIC Science & Technology

    2014-03-01

    of verifying a set of credentials to validate an authorized user. In computer security , three general factors are used for authentication...Department of Computer Science iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT This thesis attempts to authenticate a smartphone user by pattern...this study , RSSI data will be used because of its ability to provide geolocation indoors. The RSSI data of a user’s daily activity from a

  11. Mental disorder diagnoses among children and adolescents who use antipsychotic drugs.

    PubMed

    Nesvåg, Ragnar; Hartz, Ingeborg; Bramness, Jørgen G; Hjellvik, Vidar; Handal, Marte; Skurtveit, Svetlana

    2016-09-01

    Antipsychotic drugs are used increasingly by children and adolescents and there is concern about off-label use. We aimed to study which substances, and for which mental disorder diagnoses, antipsychotic drugs were prescribed to 0-18-year-old boys and girls in Norway. Linked data from the national health registry for prescription drugs in 2010 and mental disorder diagnoses in 2008-2012 were used to study the prevalence of antipsychotic drug use, the type of antipsychotic drug substances used, mental disorder diagnoses in users and distribution of drugs per diagnostic category across gender. In total, 0.18% of Norwegian children and adolescents were prescribed antipsychotic drugs during 2010, of which there were more boys (0.23%) than girls (0.13%). Risperidone was the most frequently used substance among boys (57.4%) and girls (32.3%), followed by aripiprazole (19.4%) in boys and quetiapine (27.4%) in girls. The most common mental disorder diagnoses among male users were hyperkinetic (49.9%) and autism spectrum disorder (27.1%), while anxiety disorders (41.5%) and depressive illness (33.6%) were most common among female users. A schizophrenia-like psychosis diagnosis was given to 11.1% of the male and 18.2% of the female users. A hyperkinetic disorder was diagnosed among 56.9% and 52.4% of the male risperidone and aripiprazole users, respectively. Among female quetiapine users, 57.1% were diagnosed with anxiety disorders and 52.4% with depressive illness. These results demonstrate that children and adolescents who use antipsychotic drugs are predominantly diagnosed with non-psychotic mental disorders such as hyperkinetic disorder among boys and anxiety disorder or depressive illness among girls. Copyright © 2016 Elsevier B.V. and ECNP. All rights reserved.

  12. Children of female sex workers and drug users: a review of vulnerability, resilience and family-centred models of care.

    PubMed

    Beard, Jennifer; Biemba, Godfrey; Brooks, Mohamad I; Costello, Jill; Ommerborn, Mark; Bresnahan, Megan; Flynn, David; Simon, Jonathon L

    2010-06-23

    Injection drug users and female sex workers are two of the populations most at risk for becoming infected with HIV in countries with concentrated epidemics. Many of the adults who fall into these categories are also parents, but little is known about the vulnerabilities faced by their children, their children's sources of resilience, or programmes providing services to these often fragile families. This review synthesizes evidence from disparate sources describing the vulnerabilities and resilience of the children of female sex workers and drug users, and documents some models of care that have been put in place to assist them. A large literature assessing the vulnerability and resilience of children of drug users and alcoholics in developed countries was found. Research on the situation of the children of sex workers is extremely limited. Children of drug users and sex workers can face unique risks, stigma and discrimination, but both child vulnerability and resilience are associated in the drug use literature with the physical and mental health of parents and family context. Family-centred interventions have been implemented in low- and middle-income contexts, but they tend to be small, piecemeal and struggling to meet demand; they are poorly documented, and most have not been formally evaluated. We present preliminary descriptive data from an organization working with pregnant and new mothers who are drug users in Ukraine and from an organization providing services to sex workers and their families in Zambia. Because parents' drug use or sex work is often illegal and hidden, identifying their children can be difficult and may increase children's vulnerability and marginalization. Researchers and service providers, therefore, need to proceed with caution when attempting to reach these populations, but documentation and evaluation of current programmes should be prioritized.

  13. A study on user authentication methodology using numeric password and fingerprint biometric information.

    PubMed

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  14. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    PubMed Central

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  15. An item response theory analysis of DSM-IV criteria for hallucinogen abuse and dependence in adolescents

    PubMed Central

    Wu, Li-Tzy; Pan, Jeng-Jong; Yang, Chongming; Reeve, Bryce B.; Blazer, Dan G.

    2009-01-01

    Aim This study applied both item response theory (IRT) and multiple indicators–multiple causes (MIMIC) methods to evaluate item-level psychometric properties of diagnostic questions for hallucinogen use disorders (HUDs), differential item functioning (DIF), and predictors of latent HUD. Methods Data were drawn from 2004–2006 National Surveys on Drug Use and Health. Analyses were based on 1548 past-year hallucinogen users aged 12–17 years. Substance use and symptoms were assessed by audio computer-assisted self-interviewing methods. Results Abuse and dependence criteria empirically were arrayed along a single continuum of severity. All abuse criteria indicated middle-to-high severity on the IRT-defined HUD continuum, while dependence criteria captured a wider range from the lowest (tolerance and time spent) to the highest (taking larger amounts and inability to cut down) severity levels. There was indication of DIF by hallucinogen users’ age, gender, race/ethnicity, and ecstasy use status. Adjusting for DIF, ecstasy users (vs. non-ecstasy hallucinogen users), females (vs. males), and whites (vs. Hispanics) exhibited increased odds of HUD. Conclusions Symptoms of hallucinogen abuse and dependence empirically do not reflect two discrete conditions in adolescents. Trends and problems related to hallucinogen use among girls and whites should be examined further to inform the designs of effective gender-appropriate and culturally sensitive prevention programs. PMID:19896773

  16. A telemonitoring tool based on serious games addressing money management skills for people with intellectual disability.

    PubMed

    Lopez-Basterretxea, Asier; Mendez-Zorrilla, Amaia; Garcia-Zapirain, Begonya

    2014-02-25

    This article presents a telemonitoring tool based on computer games, aimed at money management skill improvement for people with Intellectual Disabilities (ID). The presented tool is divided into two parts: on one hand, some training activities related to payments and currency discrimination based on Serious Games are proposed to the user using a multitouch device. On the other hand, the psychologists and specialist who work with them, can access to the Serious Games results using an online application in order to evaluate their evolution. The results are measured according to the number of errors they have during the proposed activities, the time they need to complete them and the score. The article show the results of an experiment made with a clinical sample of 12 users with ID between 12 and 15 years, taking into account that all of them are capable of correct oral communication and they do not have severe physical coordination problems. Only two users completed all the games without errors. Males obtained a mean of 28.25 errors, whereas females obtained a mean of 17.75. The results show significant difference between the selection of games 1, 2 or 3, because all of them prefer the game 1 related with "Payments" probably because it permits more interaction using the multitouch device. The authors also made a qualitative evaluation and the results have been very promising and satisfactory.

  17. A Computer Code for Swirling Turbulent Axisymmetric Recirculating Flows in Practical Isothermal Combustor Geometries

    NASA Technical Reports Server (NTRS)

    Lilley, D. G.; Rhode, D. L.

    1982-01-01

    A primitive pressure-velocity variable finite difference computer code was developed to predict swirling recirculating inert turbulent flows in axisymmetric combustors in general, and for application to a specific idealized combustion chamber with sudden or gradual expansion. The technique involves a staggered grid system for axial and radial velocities, a line relaxation procedure for efficient solution of the equations, a two-equation k-epsilon turbulence model, a stairstep boundary representation of the expansion flow, and realistic accommodation of swirl effects. A user's manual, dealing with the computational problem, showing how the mathematical basis and computational scheme may be translated into a computer program is presented. A flow chart, FORTRAN IV listing, notes about various subroutines and a user's guide are supplied as an aid to prospective users of the code.

  18. Patterns of benzylpiperazine/trifluoromethylphenylpiperazine party pill use and adverse effects in a population sample in New Zealand.

    PubMed

    Wilkins, Chris; Sweetsur, Paul; Girling, Melissa

    2008-11-01

    A large legal market for party pills containing benzylpiperazine (BZP) and trifluoromethylphenylpiperazine (TFMPP) developed in New Zealand after 2004. The use of these party pills has been associated with adverse health effects. The purpose of this paper was to assess a general population sample of party pill users to investigate the relationship between (1) patterns of use of BZP/TFMPP party pills and concurrent use of other drug types, and (2) adverse side effects from BZP/TFMPP party pill use. A national household survey of the use of BZP/TFMPP party pills was conducted using a computer-assisted telephone interviewing (CATI) facility. The quantity of BZP and TFMPP in each brand of party pill was obtained from the National Poisons Centre. Multiple logistic regression analysis was used to identify independent predictors of having experienced adverse side effects from party pills. The mean quantity of BZP/TFMPP taken on an occasion of greatest use was 533 mg (median 400 mg, range 43-2500 mg). Being female, using cannabis and other drugs concurrently with BZP/TFMPP party pills, taking large quantities of party pills in a single session and taking 5-hydroxytryptophan (5-HTP) recovery pills at the same time as party pills were independent predictors of having experienced an adverse problem from party pills. Females may be at greater risk of experiencing problems from BZP/TFMPP party pills due to their smaller physical size. Taking 5-HTP 'recovery' pills with party pills may increase the risk of adverse effects as both substances increase users' levels of serotonin.

  19. Scaling Task Management in Space and Time: Reducing User Overhead in Ubiquitous-Computing Environments

    DTIC Science & Technology

    2005-03-28

    consequently users are torn between taking advantage of increasingly pervasive computing systems, and the price (in attention and skill) that they have to... advantage of the surrounding computing environments; and (c) that it is usable by non-experts. Second, from a software architect’s perspective, we...take full advantage of the computing systems accessible to them, much as they take advantage of the furniture in each physical space. In the example

  20. The Impacts of Attitudes and Engagement on Electronic Word of Mouth (eWOM) of Mobile Sensor Computing Applications

    PubMed Central

    Zhao, Yu; Liu, Yide; Lai, Ivan K. W.; Zhang, Hongfeng; Zhang, Yi

    2016-01-01

    As one of the latest revolutions in networking technology, social networks allow users to keep connected and exchange information. Driven by the rapid wireless technology development and diffusion of mobile devices, social networks experienced a tremendous change based on mobile sensor computing. More and more mobile sensor network applications have appeared with the emergence of a huge amount of users. Therefore, an in-depth discussion on the human–computer interaction (HCI) issues of mobile sensor computing is required. The target of this study is to extend the discussions on HCI by examining the relationships of users’ compound attitudes (i.e., affective attitudes, cognitive attitude), engagement and electronic word of mouth (eWOM) behaviors in the context of mobile sensor computing. A conceptual model is developed, based on which, 313 valid questionnaires are collected. The research discusses the level of impact on the eWOM of mobile sensor computing by considering user-technology issues, including the compound attitude and engagement, which can bring valuable discussions on the HCI of mobile sensor computing in further study. Besides, we find that user engagement plays a mediating role between the user’s compound attitudes and eWOM. The research result can also help the mobile sensor computing industry to develop effective strategies and build strong consumer user—product (brand) relationships. PMID:26999155

  1. The creation of the expected Aboriginal woman drug offender in Canada: Exploring relations between victimization, punishment, and cultural identity

    PubMed Central

    Dell, Colleen Anne; Kilty, Jennifer M.

    2013-01-01

    This article illustrates how the Aboriginal female drug user is responded to as an expected offender based on the intersection of her gender, race, and class. Drawing on the findings of a national Canadian study documenting the lived experiences of First Nations, Métis, and Inuit female drug users, we argue that the strengthening of cultural identity can potentially disrupt this expected status at both the individual and social system levels. Within the framework of critical victimology, the challenge then becomes to translate this understanding into praxis. In response, we suggest advancing women’s agency at the individual level in the face of disempowering images and practices related to the offender, the victim, and Aboriginality. For change at the system level, we return to Christie’s notion of the need to dismantle the stereotypical construction of the Aboriginal female drug user. We illustrate both levels of change with an innovative form of knowledge sharing, which aims to evoke transformation with respect to individual and socially constructed conceptualizations of identity. PMID:24795492

  2. Computer users' ergonomics and quality of life - evidence from a developing country.

    PubMed

    Ahmed, Ishfaq; Shaukat, Muhammad Zeeshan

    2018-06-01

    This study is aimed at investigating the quality of workplace ergonomics at various Pakistani organizations and quality of life of computer users working in these organizations. Two hundred and thirty-five computer users (only those employees who have to do most of their job tasks on computer or laptop, and at their office) responded by filling the questionnaire covering questions on workplace ergonomics and quality of life. Findings of the study revealed the ergonomics at those organizations was poor and unfavourable. The quality of life (both physical and mental health of the employees) of respondents was poor for employees who had unfavourable ergonomic environment. The findings thus highlight an important issue prevalent at Pakistani work settings.

  3. Virtual reality based experiential cognitive treatment of anorexia nervosa.

    PubMed

    Riva, G; Bacchetta, M; Baruffi, M; Rinaldi, S; Molinari, E

    1999-09-01

    The treatment of a 22-year old female university student diagnosed with Anorexia Nervosa is described. In the study the Experiential Cognitive Therapy (ECT) was used: a relatively short-term, integrated, patient oriented approach that focuses on individual discovery. Main characteristic of this approach is the use of Virtual Reality, a new technology that allows the user to be immersed in a computer-generated virtual world. At the end of the in-patient treatment, the subject increased her bodily awareness joined to a reduction in her level of body dissatisfaction. Moreover, the patient presented a high degree of motivation to change. The results are discussed with regard to Vitousek, Watson and Wilson (1998, Clinical Psychology Review, 18(4), 391-420) proposal of using the Socratic Method to face denial and resistance of anorectic patients.

  4. User Instructions for the Systems Assessment Capability, Rev. 1, Computer Codes Volume 3: Utility Codes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eslinger, Paul W.; Aaberg, Rosanne L.; Lopresti, Charles A.

    2004-09-14

    This document contains detailed user instructions for a suite of utility codes developed for Rev. 1 of the Systems Assessment Capability. The suite of computer codes for Rev. 1 of Systems Assessment Capability performs many functions.

  5. Individual and work-related risk factors for musculoskeletal pain: a cross-sectional study among Estonian computer users.

    PubMed

    Oha, Kristel; Animägi, Liina; Pääsuke, Mati; Coggon, David; Merisalu, Eda

    2014-05-28

    Occupational use of computers has increased rapidly over recent decades, and has been linked with various musculoskeletal disorders, which are now the most commonly diagnosed occupational diseases in Estonia. The aim of this study was to assess the prevalence of musculoskeletal pain (MSP) by anatomical region during the past 12 months and to investigate its association with personal characteristics and work-related risk factors among Estonian office workers using computers. In a cross-sectional survey, the questionnaires were sent to the 415 computer users. Data were collected by self-administered questionnaire from 202 computer users at two universities in Estonia. The questionnaire asked about MSP at different anatomical sites, and potential individual and work related risk factors. Associations with risk factors were assessed by logistic regression. Most respondents (77%) reported MSP in at least one anatomical region during the past 12 months. Most prevalent was pain in the neck (51%), followed by low back pain (42%), wrist/hand pain (35%) and shoulder pain (30%). Older age, right-handedness, not currently smoking, emotional exhaustion, belief that musculoskeletal problems are commonly caused by work, and low job security were the statistically significant risk factors for MSP in different anatomical sites. A high prevalence of MSP in the neck, low back, wrist/arm and shoulder was observed among Estonian computer users. Psychosocial risk factors were broadly consistent with those reported from elsewhere. While computer users should be aware of ergonomic techniques that can make their work easier and more comfortable, presenting computer use as a serious health hazard may modify health beliefs in a way that is unhelpful.

  6. Ethics and the 7 `P`s` of computer use policies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scott, T.J.; Voss, R.B.

    1994-12-31

    A Computer Use Policy (CUP) defines who can use the computer facilities for what. The CUP is the institution`s official position on the ethical use of computer facilities. The authors believe that writing a CUP provides an ideal platform to develop a group ethic for computer users. In prior research, the authors have developed a seven phase model for writing CUPs, entitled the 7 P`s of Computer Use Policies. The purpose of this paper is to present the model and discuss how the 7 P`s can be used to identify and communicate a group ethic for the institution`s computer users.

  7. Sex, shoulder pain, and range of motion in manual wheelchair users.

    PubMed

    Wessels, Karla K; Brown, Jennifer L; Ebersole, Kyle T; Sosnoff, Jacob J

    2013-01-01

    Upwards of 70% of manual wheelchair users (MWUs) experience shoulder pain. Pain is more prevalent among females than males. The causes of this sex discrepancy are not understood. Decreased range of motion (ROM) has been suggested as a major contributor, but the interaction of sex, ROM, and shoulder pain has not been investigated, thus the purpose of this investigation. We divided 30 MWUs (18 males, 12 females; 21.93 +/- 3.77 yr) into two groups based on self-reported shoulder pain: pain group (n = 14; 9 males, 5 females) and no pain group (n = 16; 9 males, 7 females). We used a digital goniometer to assess ROM. Participants' shoulder active and passive ROMs were tested bilaterally on the following joint motions: flexion, extension, abduction, adduction, internal rotation, and external rotation. We used a visual analog scale to assess shoulder pain. Of the participants, 47% reported shoulder pain. Overall, the no pain group had greater ROM than the pain group, with further analysis revealing this association was only significant in females during extension (p < 0.05). ROM impairments were only present in extension in females with shoulder pain. The mechanism underlying this sex difference is not clear.

  8. Girls in computer science: A female only introduction class in high school

    NASA Astrophysics Data System (ADS)

    Drobnis, Ann W.

    This study examined the impact of an all girls' classroom environment in a high school introductory computer science class on the student's attitudes towards computer science and their thoughts on future involvement with computer science. It was determined that an all girls' introductory class could impact the declining female enrollment and female students' efficacy towards computer science. This research was conducted in a summer school program through a regional magnet school for science and technology which these students attend during the school year. Three different groupings of students were examined for the research: female students in an all girls' class, female students in mixed-gender classes and male students in mixed-gender classes. A survey, Attitudes about Computers and Computer Science (ACCS), was designed to obtain an understanding of the students' thoughts, preconceptions, attitude, knowledge of computer science, and future intentions around computer science, both in education and career. Students in all three groups were administered the ACCS prior to taking the class and upon completion of the class. In addition, students in the all girls' class wrote in a journal throughout the course, and some of those students were also interviewed upon completion of the course. The data was analyzed using quantitative and qualitative techniques. While there were no major differences found in the quantitative data, it was determined that girls in the all girls' class were truly excited by what they had learned and were more open to the idea of computer science being a part of their future.

  9. Design and Implementation of Context-Aware Musuem Guide Agents

    NASA Astrophysics Data System (ADS)

    Satoh, Ichiro

    This paper presents an agent-based system for building and operating context-aware services in public spaces, including museums. The system provides users with agents and detects the locations of users and deploys location-aware user-assistant agents at computers near the their current locations by using active RFID-tags. When a visitor moves between exhibits in a museum, this dynamically deploys his/her agent at the computers close to the exhibits by using mobile agent technology. It annotates the exhibits in his/her personalized form and navigate him/her user to the next exhibits along his/her routes. It also introduces user movement as a natural approach to interacting between users and agents. To demonstrate the utility and effectiveness of the system, we constructed location/user-aware visitor-guide services and experimented them for two weeks in a public museum.

  10. Gender and Sex Trading Among Active Methamphetamine Users in Cape Town, South Africa

    PubMed Central

    Watt, Melissa H.; Wechsberg, Wendee M.; Meade, Christina S.

    2017-01-01

    Background South Africa has experienced a tremendous rise in methamphetamine use since the year 2000. Sex trading is a global phenomenon that has been observed in active drug users and has been associated with risks for HIV infection and violence. Objectives This paper describes and examines the correlates of sex trading among active methamphetamine users in Cape Town, South Africa. Methods Through peer referral, 360 (201 male; 159 female) active methamphetamine users were recruited in a peri-urban township. Demographics, sex trading, drug use, trauma, and mental health were assessed by a structured clinical interview and computer survey. Logistic regression models were used to examine predictors of sex trading for men and women. Results In the past 3 months, 40% of men and 33% of women endorsed trading sex for methamphetamine or money. Among these, they reported trading with same sex partners (33%), high rates of inconsistent condom use (73%), and incidences of physical (23%) and sexual (27%) assault when sex trading. Increased drug use severity was correlated with sex trading. Women with experiences of violence and trauma were also more likely to trade sex. Conclusions/importance The results stress a need for linkage to drug treatment, as addiction may be fueling sex trading. Targeted interventions geared towards safe sex practices may reduce risky sexual behaviors. Women need interventions that are attuned to their specific vulnerabilities. More research is needed to explore the experiences of men who have sex with men given their particularly high rates of sex trading behavior. PMID:28379107

  11. Intelligent Context-Aware and Adaptive Interface for Mobile LBS

    PubMed Central

    Liu, Yanhong

    2015-01-01

    Context-aware user interface plays an important role in many human-computer Interaction tasks of location based services. Although spatial models for context-aware systems have been studied extensively, how to locate specific spatial information for users is still not well resolved, which is important in the mobile environment where location based services users are impeded by device limitations. Better context-aware human-computer interaction models of mobile location based services are needed not just to predict performance outcomes, such as whether people will be able to find the information needed to complete a human-computer interaction task, but to understand human processes that interact in spatial query, which will in turn inform the detailed design of better user interfaces in mobile location based services. In this study, a context-aware adaptive model for mobile location based services interface is proposed, which contains three major sections: purpose, adjustment, and adaptation. Based on this model we try to describe the process of user operation and interface adaptation clearly through the dynamic interaction between users and the interface. Then we show how the model applies users' demands in a complicated environment and suggested the feasibility by the experimental results. PMID:26457077

  12. Provenance based data integrity checking and verification in cloud environments.

    PubMed

    Imran, Muhammad; Hlavacs, Helmut; Haq, Inam Ul; Jan, Bilal; Khan, Fakhri Alam; Ahmad, Awais

    2017-01-01

    Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-held devices into large scale processing hubs and data centers respectively. It has been proposed as an effective solution for data outsourcing and on demand computing to control the rising cost of IT setups and management in enterprises. However, with Cloud platforms user's data is moved into remotely located storages such that users lose control over their data. This unique feature of the Cloud is facing many security and privacy challenges which need to be clearly understood and resolved. One of the important concerns that needs to be addressed is to provide the proof of data integrity, i.e., correctness of the user's data stored in the Cloud storage. The data in Clouds is physically not accessible to the users. Therefore, a mechanism is required where users can check if the integrity of their valuable data is maintained or compromised. For this purpose some methods are proposed like mirroring, checksumming and using third party auditors amongst others. However, these methods use extra storage space by maintaining multiple copies of data or the presence of a third party verifier is required. In this paper, we address the problem of proving data integrity in Cloud computing by proposing a scheme through which users are able to check the integrity of their data stored in Clouds. In addition, users can track the violation of data integrity if occurred. For this purpose, we utilize a relatively new concept in the Cloud computing called "Data Provenance". Our scheme is capable to reduce the need of any third party services, additional hardware support and the replication of data items on client side for integrity checking.

  13. Advanced display object selection methods for enhancing user-computer productivity

    NASA Technical Reports Server (NTRS)

    Osga, Glenn A.

    1993-01-01

    The User-Interface Technology Branch at NCCOSC RDT&E Division has been conducting a series of studies to address the suitability of commercial off-the-shelf (COTS) graphic user-interface (GUI) methods for efficiency and performance in critical naval combat systems. This paper presents an advanced selection algorithm and method developed to increase user performance when making selections on tactical displays. The method has also been applied with considerable success to a variety of cursor and pointing tasks. Typical GUI's allow user selection by: (1) moving a cursor with a pointing device such as a mouse, trackball, joystick, touchscreen; and (2) placing the cursor on the object. Examples of GUI objects are the buttons, icons, folders, scroll bars, etc. used in many personal computer and workstation applications. This paper presents an improved method of selection and the theoretical basis for the significant performance gains achieved with various input devices tested. The method is applicable to all GUI styles and display sizes, and is particularly useful for selections on small screens such as notebook computers. Considering the amount of work-hours spent pointing and clicking across all styles of available graphic user-interfaces, the cost/benefit in applying this method to graphic user-interfaces is substantial, with the potential for increasing productivity across thousands of users and applications.

  14. mGrid: A load-balanced distributed computing environment for the remote execution of the user-defined Matlab code

    PubMed Central

    Karpievitch, Yuliya V; Almeida, Jonas S

    2006-01-01

    Background Matlab, a powerful and productive language that allows for rapid prototyping, modeling and simulation, is widely used in computational biology. Modeling and simulation of large biological systems often require more computational resources then are available on a single computer. Existing distributed computing environments like the Distributed Computing Toolbox, MatlabMPI, Matlab*G and others allow for the remote (and possibly parallel) execution of Matlab commands with varying support for features like an easy-to-use application programming interface, load-balanced utilization of resources, extensibility over the wide area network, and minimal system administration skill requirements. However, all of these environments require some level of access to participating machines to manually distribute the user-defined libraries that the remote call may invoke. Results mGrid augments the usual process distribution seen in other similar distributed systems by adding facilities for user code distribution. mGrid's client-side interface is an easy-to-use native Matlab toolbox that transparently executes user-defined code on remote machines (i.e. the user is unaware that the code is executing somewhere else). Run-time variables are automatically packed and distributed with the user-defined code and automated load-balancing of remote resources enables smooth concurrent execution. mGrid is an open source environment. Apart from the programming language itself, all other components are also open source, freely available tools: light-weight PHP scripts and the Apache web server. Conclusion Transparent, load-balanced distribution of user-defined Matlab toolboxes and rapid prototyping of many simple parallel applications can now be done with a single easy-to-use Matlab command. Because mGrid utilizes only Matlab, light-weight PHP scripts and the Apache web server, installation and configuration are very simple. Moreover, the web-based infrastructure of mGrid allows for it to be easily extensible over the Internet. PMID:16539707

  15. mGrid: a load-balanced distributed computing environment for the remote execution of the user-defined Matlab code.

    PubMed

    Karpievitch, Yuliya V; Almeida, Jonas S

    2006-03-15

    Matlab, a powerful and productive language that allows for rapid prototyping, modeling and simulation, is widely used in computational biology. Modeling and simulation of large biological systems often require more computational resources then are available on a single computer. Existing distributed computing environments like the Distributed Computing Toolbox, MatlabMPI, Matlab*G and others allow for the remote (and possibly parallel) execution of Matlab commands with varying support for features like an easy-to-use application programming interface, load-balanced utilization of resources, extensibility over the wide area network, and minimal system administration skill requirements. However, all of these environments require some level of access to participating machines to manually distribute the user-defined libraries that the remote call may invoke. mGrid augments the usual process distribution seen in other similar distributed systems by adding facilities for user code distribution. mGrid's client-side interface is an easy-to-use native Matlab toolbox that transparently executes user-defined code on remote machines (i.e. the user is unaware that the code is executing somewhere else). Run-time variables are automatically packed and distributed with the user-defined code and automated load-balancing of remote resources enables smooth concurrent execution. mGrid is an open source environment. Apart from the programming language itself, all other components are also open source, freely available tools: light-weight PHP scripts and the Apache web server. Transparent, load-balanced distribution of user-defined Matlab toolboxes and rapid prototyping of many simple parallel applications can now be done with a single easy-to-use Matlab command. Because mGrid utilizes only Matlab, light-weight PHP scripts and the Apache web server, installation and configuration are very simple. Moreover, the web-based infrastructure of mGrid allows for it to be easily extensible over the Internet.

  16. Information Technology: The Revolution Continues. Proceedings of the Annual College and University Computer Users Conference (38th, San Antonio, Texas, May 9-12, 1993).

    ERIC Educational Resources Information Center

    College and Univ. Computer Users Association, Columbia, SC.

    The 36 papers contained in this collection from the College and University Computer Users Conference (CUMREC '93) are grouped under six topic areas. The main subject areas and examples of the topics covered are: (1) computer-based student support systems, including telecounseling and recruiting, a student advising system, the assignment of…

  17. "Discover New Worlds with Technology". Proceedings of the Annual College and University Computer Users Conference (37th, Miami, Florida, May 3-6, 1992).

    ERIC Educational Resources Information Center

    Miami-Dade Community Coll., FL.

    This book contains 37 papers on computer use in higher education originally presented at a May, 1992, conference of college and university computer users. Most of the papers describe programs or systems implemented at particular institutions and cover the following: systems for career planning, automating purchasing and financial commitments,…

  18. DataPlus™ - a revolutionary applications generator for DOS hand-held computers

    Treesearch

    David Dean; Linda Dean

    2000-01-01

    DataPlus allows the user to easily design data collection templates for DOS-based hand-held computers that mimic clipboard data sheets. The user designs and tests the application on the desktop PC and then transfers it to a DOS field computer. Other features include: error checking, missing data checks, and sensor input from RS-232 devices such as bar code wands,...

  19. Viscous wing theory development. Volume 2: GRUMWING computer program user's manual

    NASA Technical Reports Server (NTRS)

    Chow, R. R.; Ogilvie, P. L.

    1986-01-01

    This report is a user's manual which describes the operation of the computer program, GRUMWING. The program computes the viscous transonic flow over three-dimensional wings using a boundary layer type viscid-inviscid interaction approach. The inviscid solution is obtained by an approximate factorization (AFZ)method for the full potential equation. The boundary layer solution is based on integral entrainment methods.

  20. Proceedings of the Association of Small Computer Users in Education (ASCUE) Annual Conference (42nd, North Myrtle Beach, South Carolina, June 14-18, 2009)

    ERIC Educational Resources Information Center

    Smith, Peter, Ed.

    2009-01-01

    The Association of Small Computer Users in Education (ASCUE) is a dynamic organization for people interested in small college technology issues. Its members include information technology professionals, instructional technologists, and faculty members from all over the world who use computers and technology to support teaching and learning. The…

  1. Measurement of user performance and attitudes assists the initial design of a computer user display and orientation method.

    PubMed

    Chase, C R; Ashikaga, T; Mazuzan, J E

    1994-07-01

    The objective of our study was to assess the acceptability of a proposed user interface to visually interfaced computer-assisted anesthesia record (VISI-CAARE), before the application was begun. The user interface was defined as the user display and its user orientation methods. We designed methods to measure user performance and attitude toward two different anesthesia record procedures: (1) the traditional pen and paper anesthetic record procedure of our hospital, and (2) VISI-CAARE. Performance measurements included the reaction speed (identifying the type and time of an event) and completion speed (describing the event). Performance also included accuracy of the recorded time of the event and accuracy of the description. User attitude was measured by (1) the physician's rating on a scale of 0 to 9 of the potential usefulness of computers in anesthesia care; (2) willingness to use the future application in the clinical environment; and (3) user suggestions for change. These measurements were used in a randomized trial of 21 physicians, of which data from 20 were available. After exposure to VISI-CAARE, the experimental subjects' ranking of computer usefulness in anesthesia care improved significantly (4.2 +/- 1.1 to 7.6 +/- 1.5, p = 0.0001), as did controls' (5.2 +/- 2.6 to 8 +/- 1.5, p = 0.0019). All the volunteers were willing to try the proposed prototype clinically, when it was ready. VISI-CAARE exposure was associated with faster and more accurate reaction to events over the traditional pen and paper machine, and slower and more accurate description of events in an artificial mock setting. VISI-CAARE 1.1 demonstrated significant improvements in both reaction speed and completion speed over VISI-CAARE 1.0, after changes were made to the user display and orientation methods. With graphic user interface prototyping environments, one can obtain preliminary user attitude and performance data, even before application programming is begun. This may be helpful in revising initial display and orientation methods, while obtaining user interest and commitment before actual programming and clinical testing.

  2. Data Transfer Study HPSS Archiving

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wynne, James; Parete-Koon, Suzanne T; Mitchell, Quinn

    2015-01-01

    The movement of the large amounts of data produced by codes run in a High Performance Computing (HPC) environment can be a bottleneck for project workflows. To balance filesystem capacity and performance requirements, HPC centers enforce data management policies to purge old files to make room for new computation and analysis results. Users at Oak Ridge Leadership Computing Facility (OLCF) and many other HPC user facilities must archive data to avoid data loss during purges, therefore the time associated with data movement for archiving is something that all users must consider. This study observed the difference in transfer speed frommore » the originating location on the Lustre filesystem to the more permanent High Performance Storage System (HPSS). The tests were done with a number of different transfer methods for files that spanned a variety of sizes and compositions that reflect OLCF user data. This data will be used to help users of Titan and other Cray supercomputers plan their workflow and data transfers so that they are most efficient for their project. We will also discuss best practice for maintaining data at shared user facilities.« less

  3. Machine learning for a Toolkit for Image Mining

    NASA Technical Reports Server (NTRS)

    Delanoy, Richard L.

    1995-01-01

    A prototype user environment is described that enables a user with very limited computer skills to collaborate with a computer algorithm to develop search tools (agents) that can be used for image analysis, creating metadata for tagging images, searching for images in an image database on the basis of image content, or as a component of computer vision algorithms. Agents are learned in an ongoing, two-way dialogue between the user and the algorithm. The user points to mistakes made in classification. The algorithm, in response, attempts to discover which image attributes are discriminating between objects of interest and clutter. It then builds a candidate agent and applies it to an input image, producing an 'interest' image highlighting features that are consistent with the set of objects and clutter indicated by the user. The dialogue repeats until the user is satisfied. The prototype environment, called the Toolkit for Image Mining (TIM) is currently capable of learning spectral and textural patterns. Learning exhibits rapid convergence to reasonable levels of performance and, when thoroughly trained, Fo appears to be competitive in discrimination accuracy with other classification techniques.

  4. Virtual pools for interactive analysis and software development through an integrated Cloud environment

    NASA Astrophysics Data System (ADS)

    Grandi, C.; Italiano, A.; Salomoni, D.; Calabrese Melcarne, A. K.

    2011-12-01

    WNoDeS, an acronym for Worker Nodes on Demand Service, is software developed at CNAF-Tier1, the National Computing Centre of the Italian Institute for Nuclear Physics (INFN) located in Bologna. WNoDeS provides on demand, integrated access to both Grid and Cloud resources through virtualization technologies. Besides the traditional use of computing resources in batch mode, users need to have interactive and local access to a number of systems. WNoDeS can dynamically select these computers instantiating Virtual Machines, according to the requirements (computing, storage and network resources) of users through either the Open Cloud Computing Interface API, or through a web console. An interactive use is usually limited to activities in user space, i.e. where the machine configuration is not modified. In some other instances the activity concerns development and testing of services and thus implies the modification of the system configuration (and, therefore, root-access to the resource). The former use case is a simple extension of the WNoDeS approach, where the resource is provided in interactive mode. The latter implies saving the virtual image at the end of each user session so that it can be presented to the user at subsequent requests. This work describes how the LHC experiments at INFN-Bologna are testing and making use of these dynamically created ad-hoc machines via WNoDeS to support flexible, interactive analysis and software development at the INFN Tier-1 Computing Centre.

  5. The Effort to Reduce a Muscle Fatigue Through Gymnastics Relaxation and Ergonomic Approach for Computer Users in Central Building State University of Medan

    NASA Astrophysics Data System (ADS)

    Gultom, Syamsul; Darma Sitepu, Indra; Hasibuan, Nurman

    2018-03-01

    Fatigue due to long and continuous computer usage can lead to problems of dominant fatigue associated with decreased performance and work motivation. Specific targets in the first phase have been achieved in this research such as: (1) Identified complaints on workers using computers, using the Bourdon Wiersma test kit. (2) Finding the right relaxation & work posture draft for a solution to reduce muscle fatigue in computer-based workers. The type of research used in this study is research and development method which aims to produce the products or refine existing products. The final product is a prototype of back-holder, monitoring filter and arranging a relaxation exercise as well as the manual book how to do this while in front of the computer to lower the fatigue level for computer users in Unimed’s Administration Center. In the first phase, observations and interviews have been conducted and identified the level of fatigue on the employees of computer users at Uniemd’s Administration Center using Bourdon Wiersma test and has obtained the following results: (1) The average velocity time of respondents in BAUK, BAAK and BAPSI after working with the value of interpretation of the speed obtained value of 8.4, WS 13 was in a good enough category, (2) The average of accuracy of respondents in BAUK, in BAAK and in BAPSI after working with interpretation value accuracy obtained Value of 5.5, WS 8 was in doubt-category. This result shows that computer users experienced a significant tiredness at the Unimed Administration Center, (3) the consistency of the average of the result in measuring tiredness level on computer users in Unimed’s Administration Center after working with values in consistency of interpretation obtained Value of 5.5 with WS 8 was put in a doubt-category, which means computer user in The Unimed Administration Center suffered an extreme fatigue. In phase II, based on the results of the first phase in this research, the researcher offers solutions such as the prototype of Back-Holder, monitoring filter, and design a proper relaxation exercise to reduce the fatigue level. Furthermore, in in order to maximize the exercise itself, a manual book will be given to employees whom regularly work in front of computers at Unimed’s Administration Center

  6. Starting Over: Current Issues in Online Catalog User Interface Design.

    ERIC Educational Resources Information Center

    Crawford, Walt

    1992-01-01

    Discussion of online catalogs focuses on issues in interface design. Issues addressed include understanding the user base; common user access (CUA) with personal computers; common command language (CCL); hyperlinks; screen design issues; differences from card catalogs; indexes; graphic user interfaces (GUIs); color; online help; and remote users.…

  7. National Energy Research Scientific Computing Center

    Science.gov Websites

    Overview NERSC Mission Contact us Staff Org Chart NERSC History NERSC Stakeholders Usage and User HPC Requirements Reviews NERSC HPC Achievement Awards User Submitted Research Citations NERSC User data archive NERSC Resources Table For Users Live Status User Announcements My NERSC Getting Started

  8. Virtual button interface

    DOEpatents

    Jones, J.S.

    1999-01-12

    An apparatus and method of issuing commands to a computer by a user interfacing with a virtual reality environment are disclosed. To issue a command, the user directs gaze at a virtual button within the virtual reality environment, causing a perceptible change in the virtual button, which then sends a command corresponding to the virtual button to the computer, optionally after a confirming action is performed by the user, such as depressing a thumb switch. 4 figs.

  9. INHYD: Computer code for intraply hybrid composite design. A users manual

    NASA Technical Reports Server (NTRS)

    Chamis, C. C.; Sinclair, J. H.

    1983-01-01

    A computer program (INHYD) was developed for intraply hybrid composite design. A users manual for INHYD is presented. In INHYD embodies several composite micromechanics theories, intraply hybrid composite theories, and an integrated hygrothermomechanical theory. The INHYD can be run in both interactive and batch modes. It has considerable flexibility and capability, which the user can exercise through several options. These options are demonstrated through appropriate INHYD runs in the manual.

  10. Local area networking: Ames centerwide network

    NASA Technical Reports Server (NTRS)

    Price, Edwin

    1988-01-01

    A computer network can benefit the user by making his/her work quicker and easier. A computer network is made up of seven different layers with the lowest being the hardware, the top being the user, and the middle being the software. These layers are discussed.

  11. Student Preferences toward Microcomputer User Interfaces.

    ERIC Educational Resources Information Center

    Hazari, Sunil I.; Reaves, Rita R.

    1994-01-01

    Describes a study of undergraduates that was conducted to determine students' preferences toward Graphical User Interface versus Command Line Interface during computer-assisted instruction. Previous experience, comfort level, performance scores, and student attitudes are examined and compared, and the computer use survey is appended. (Contains 13…

  12. Modelling parallel programs and multiprocessor architectures with AXE

    NASA Technical Reports Server (NTRS)

    Yan, Jerry C.; Fineman, Charles E.

    1991-01-01

    AXE, An Experimental Environment for Parallel Systems, was designed to model and simulate for parallel systems at the process level. It provides an integrated environment for specifying computation models, multiprocessor architectures, data collection, and performance visualization. AXE is being used at NASA-Ames for developing resource management strategies, parallel problem formulation, multiprocessor architectures, and operating system issues related to the High Performance Computing and Communications Program. AXE's simple, structured user-interface enables the user to model parallel programs and machines precisely and efficiently. Its quick turn-around time keeps the user interested and productive. AXE models multicomputers. The user may easily modify various architectural parameters including the number of sites, connection topologies, and overhead for operating system activities. Parallel computations in AXE are represented as collections of autonomous computing objects known as players. Their use and behavior is described. Performance data of the multiprocessor model can be observed on a color screen. These include CPU and message routing bottlenecks, and the dynamic status of the software.

  13. Identifying online user reputation of user-object bipartite networks

    NASA Astrophysics Data System (ADS)

    Liu, Xiao-Lu; Liu, Jian-Guo; Yang, Kai; Guo, Qiang; Han, Jing-Ti

    2017-02-01

    Identifying online user reputation based on the rating information of the user-object bipartite networks is important for understanding online user collective behaviors. Based on the Bayesian analysis, we present a parameter-free algorithm for ranking online user reputation, where the user reputation is calculated based on the probability that their ratings are consistent with the main part of all user opinions. The experimental results show that the AUC values of the presented algorithm could reach 0.8929 and 0.8483 for the MovieLens and Netflix data sets, respectively, which is better than the results generated by the CR and IARR methods. Furthermore, the experimental results for different user groups indicate that the presented algorithm outperforms the iterative ranking methods in both ranking accuracy and computation complexity. Moreover, the results for the synthetic networks show that the computation complexity of the presented algorithm is a linear function of the network size, which suggests that the presented algorithm is very effective and efficient for the large scale dynamic online systems.

  14. [Physiological mechanisms of the etiology of visual fatigue during work involving visual stress].

    PubMed

    Korniushina, T A

    2000-01-01

    Physiological parameters of vision were studied in three professional groups (a total of 1204 subjects): microscope operators, subjects working with magnifying glasses, and computer users. General and specific features of visual system fatigue formation were identified. Because of complete (in microscope operators) or partial (in subjects working with magnifying glasses and display users) "deprivation" of accommodation, these subjects develop early presbyopia (at the age of 30-35 years). In microscope operators long strain of accommodation system leads to professional myopia, while display users develop pseudomyopia. The highest overstrain is observed after 4 years of work in microscope operators, after 5 years in magnifying glass users, and after 6 years in computer users.

  15. Processes and outcomes of developing a continuity of care document for use as a personal health record by people living with HIV/AIDS in New York City.

    PubMed

    Gordon, Peter; Camhi, Eli; Hesse, Ron; Odlum, Michelle; Schnall, Rebecca; Rodriguez, Martha; Valdez, Esmerlin; Bakken, Suzanne

    2012-10-01

    To describe the processes and outcomes of developing and implementing a Continuity of Care Document (CCD), My Health Profile, as a personal health record for persons living with HIV (PLWH) in an HIV/AIDS Special Needs Plan in New York City. Multiple qualitative and quantitative data sources were used to describe the processes and outcomes of implementing My Health Profile including focus groups, Audio Computer Assisted Self Interview (ACASI) surveys, administrative databases, chart abstraction, usage logs, and project management records. Qualitative data were thematically analyzed. Quantitative data analytic methods included descriptive and multivariate statistics. Data were triangulated and synthesized using the Reach, Efficacy/Effectiveness, Adoption, Implementation, Maintenance (RE-AIM) Framework. Reach - SNP members are predominantly African American or Hispanic/Latino and about one-third are female. A larger proportion of African Americans and smaller proportions of Hispanics/Latinos and Whites were trained to use My Health Profile.Efficacy/Effectiveness - CCDs were produced for 8249 unique members and updated on a monthly basis, 509 members were trained to use My Health Profile. Total number of member logins for 112 active users was 1808 and the longest duration of use was 1008 days. There were no significant differences between users and non-users of My Health Profile in clinical outcomes, perceptions of the quality of medical care, or health service utilization. Adoption -My Health Profile was well-matched to organizational mission, values, and priorities related to coordination of care for a high-risk population of PLWH. Implementation - Pre-implementation focus group participants identified potential barriers to use of My Health Profile including functional and computer literacy, privacy and confidentiality concerns, potential reluctance to use technology, and cognitive challenges. Key strategies for addressing barriers included a dedicated bilingual coach for recruitment, training, and support; basic computer and My Health Profile training; transparent audit trail revealing clinician and case manager access of My Health Profile, time-limited passwords for sharing My Health Profile with others at the point of need, and emergency access mechanism. Maintenance -My Health Profile was integrated into routine operational activities and its sustainability is facilitated by its foundation on standards for Health Information Exchange (HIE). Although potential barriers exist to the use of personal health records (PHRs) such as My Health Profile, PLWH with complex medical needs, low socioeconomic status, and limited computer experience will use such tools when a sufficient level of user support is provided and privacy and confidentiality concerns are addressed. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  16. Space shuttle solid rocket booster recovery system definition. Volume 3: SRB water impact loads computer program, user's manual

    NASA Technical Reports Server (NTRS)

    1973-01-01

    This user's manual describes the FORTRAN IV computer program developed to compute the total vertical load, normal concentrated pressure loads, and the center of pressure of typical SRB water impact slapdown pressure distributions specified in the baseline configuration. The program prepares the concentrated pressure load information in punched card format suitable for input to the STAGS computer program. In addition, the program prepares for STAGS input the inertia reacting loads to the slapdown pressure distributions.

  17. DoD High Performance Computing Modernization Program Users Group Conference (HPCMP UGC 2011) Held in Portland, Oregon on June 20-23, 2011

    DTIC Science & Technology

    2011-06-01

    4. Conclusion The Web -based AGeS system described in this paper is a computationally-efficient and scalable system for high- throughput genome...method for protecting web services involves making them more resilient to attack using autonomic computing techniques. This paper presents our initial...20–23, 2011 2011 DoD High Performance Computing Modernzation Program Users Group Conference HPCMP UGC 2011 The papers in this book comprise the

  18. A study on strategic provisioning of cloud computing services.

    PubMed

    Whaiduzzaman, Md; Haque, Mohammad Nazmul; Rejaul Karim Chowdhury, Md; Gani, Abdullah

    2014-01-01

    Cloud computing is currently emerging as an ever-changing, growing paradigm that models "everything-as-a-service." Virtualised physical resources, infrastructure, and applications are supplied by service provisioning in the cloud. The evolution in the adoption of cloud computing is driven by clear and distinct promising features for both cloud users and cloud providers. However, the increasing number of cloud providers and the variety of service offerings have made it difficult for the customers to choose the best services. By employing successful service provisioning, the essential services required by customers, such as agility and availability, pricing, security and trust, and user metrics can be guaranteed by service provisioning. Hence, continuous service provisioning that satisfies the user requirements is a mandatory feature for the cloud user and vitally important in cloud computing service offerings. Therefore, we aim to review the state-of-the-art service provisioning objectives, essential services, topologies, user requirements, necessary metrics, and pricing mechanisms. We synthesize and summarize different provision techniques, approaches, and models through a comprehensive literature review. A thematic taxonomy of cloud service provisioning is presented after the systematic review. Finally, future research directions and open research issues are identified.

  19. Utilizing computerized entertainment education in the development of decision aids for lower literate and naïve computer users.

    PubMed

    Jibaja-Weiss, Maria L; Volk, Robert J

    2007-01-01

    Decision aids have been developed by using various delivery methods, including interactive computer programs. Such programs, however, still rely heavily on written information, health and digital literacy, and reading ease. We describe an approach to overcome these potential barriers for low-literate, underserved populations by making design considerations for poor readers and naïve computer users and by using concepts from entertainment education to engage the user and to contextualize the content for the user. The system design goals are to make the program both didactic and entertaining and the navigation and graphical user interface as simple as possible. One entertainment education strategy, the soap opera, is linked seamlessly to interactive learning modules to enhance the content of the soap opera episodes. The edutainment decision aid model (EDAM) guides developers through the design process. Although designing patient decision aids that are educational, entertaining, and targeted toward poor readers and those with limited computer skills is a complex task, it is a promising strategy for aiding this population. Entertainment education may be a highly effective approach to promoting informed decision making for patients with low health literacy.

  20. A Study on Strategic Provisioning of Cloud Computing Services

    PubMed Central

    Rejaul Karim Chowdhury, Md

    2014-01-01

    Cloud computing is currently emerging as an ever-changing, growing paradigm that models “everything-as-a-service.” Virtualised physical resources, infrastructure, and applications are supplied by service provisioning in the cloud. The evolution in the adoption of cloud computing is driven by clear and distinct promising features for both cloud users and cloud providers. However, the increasing number of cloud providers and the variety of service offerings have made it difficult for the customers to choose the best services. By employing successful service provisioning, the essential services required by customers, such as agility and availability, pricing, security and trust, and user metrics can be guaranteed by service provisioning. Hence, continuous service provisioning that satisfies the user requirements is a mandatory feature for the cloud user and vitally important in cloud computing service offerings. Therefore, we aim to review the state-of-the-art service provisioning objectives, essential services, topologies, user requirements, necessary metrics, and pricing mechanisms. We synthesize and summarize different provision techniques, approaches, and models through a comprehensive literature review. A thematic taxonomy of cloud service provisioning is presented after the systematic review. Finally, future research directions and open research issues are identified. PMID:25032243

  1. The effect of acute tryptophan depletion on mood and impulsivity in polydrug ecstasy users.

    PubMed

    Young, Simon N; Regoli, Martine; Leyton, Marco; Pihl, Robert O; Benkelfat, Chawki

    2014-02-01

    Several studies suggest users of 3,4-methylenedioxymethamphetamine (ecstasy) have low levels of serotonin. Low serotonin may make them susceptible to lowered mood. This work aims to study the acute effects on mood and impulsivity of lowering serotonin levels with acute tryptophan depletion in polydrug ecstasy users and to determine whether effects were different in men and women. In a double-blind cross-over study, participants who had used ecstasy at least 25 times (n = 13) and nonuser controls (n = 17) received a tryptophan-deficient amino acid mixture and a control amino acid mixture containing tryptophan, at least 1 week apart. Mood was measured using the profile of mood states, and impulsivity was measured with the Go/No-Go task. The main result shows that a lowering of mood after acute tryptophan depletion occurred only in female polydrug ecstasy users (n = 7), relative to controls (n = 9). Results from the Go/No-Go task suggested that impulsivity was not increased by acute tryptophan depletion in polydrug ecstasy users. The group sizes were small, when males and females were considered separately. Women polydrug ecstasy users appear to be more susceptible than men to the effects of lowered serotonin levels. If use of ecstasy alone or in conjunction with other drugs causes progressive damage of serotonin neurons, women polydrug ecstasy users may become susceptible to clinical depression.

  2. User interface support

    NASA Technical Reports Server (NTRS)

    Lewis, Clayton; Wilde, Nick

    1989-01-01

    Space construction will require heavy investment in the development of a wide variety of user interfaces for the computer-based tools that will be involved at every stage of construction operations. Using today's technology, user interface development is very expensive for two reasons: (1) specialized and scarce programming skills are required to implement the necessary graphical representations and complex control regimes for high-quality interfaces; (2) iteration on prototypes is required to meet user and task requirements, since these are difficult to anticipate with current (and foreseeable) design knowledge. We are attacking this problem by building a user interface development tool based on extensions to the spreadsheet model of computation. The tool provides high-level support for graphical user interfaces and permits dynamic modification of interfaces, without requiring conventional programming concepts and skills.

  3. NASCAP user's manual, 1978

    NASA Technical Reports Server (NTRS)

    Cassidy, J. J., III

    1978-01-01

    NASCAP simulates the charging process for a complex object in either tenuous plasma (geosynchronous orbit) or ground test (electron gun source) environment. Program control words, the structure of user input files, and various user options available are described in this computer programmer's user manual.

  4. Computer and internet use in vascular outpatients--ready for interactive applications?

    PubMed

    Richter, J G; Schneider, M; Klein-Weigel, P

    2009-11-01

    Exploring patients' computer and internet use, their expectations and attitudes is mandatory for successful introduction of interactive online health-care applications in Angiology. We included 165 outpatients suffering from peripheral arterial disease (PAD; n = 62) and chronic venous and / or lymphatic disease (CVLD; n = 103) in a cross-sectional-study. Patients answered a paper-based questionnaire. Patients were predominantly female (54.5%). 142 (86.1%) reported regular computer use for 9.7 +/- 5.8 years and 134 (81.2 %) used the internet for 6.2 +/- 3.6 years. CVLD-patients and internet-user were younger and higher educated, resulting in a significant difference in computer and internet use between the disease groups (p < 0.01 for both). Time spent online summed up to 4.3 +/- 2.2 days per week and 1.44 +/- 1.2 hours per day for all internet users without significant differences between the groups. The topics retrieved from the internet covered a wide spectrum and searches for health information were mentioned by 41.2 %. Although confidence in the internet (3.3 +/- 1.1 on a 1-6 Likert scale) and reliability in information retrieved from the internet (3.1 +/- 1.1) were relatively low, health-related issues were of high actual and future interest. 42.8% of the patients were even interested in interactive applications like health educational programs, 37.4% in self-reported assessments and outcome questionnaires and 26.9% in chatforums; 50% demanded access to their medical data on an Internetserver. Compared to older participants those < 50 yrs. used the internet more often for shopping, chatting, and e-mailing, but not for health information retrieval and interactive applications. Computers are commonly used and the internet has been adopted as an important source of information by patients suffering from PAD and CVLD. Besides, the internet offers great potentials and new opportunities for interactive disease (self-)management in angiology. To increase confidence and reliability in the medium a careful introduction and evaluation of these new online applications is mandatory.

  5. Feminine Stereotype and the Use of Contraceptives

    ERIC Educational Resources Information Center

    Angell, Myra L.; And Others

    1975-01-01

    A sex-role stereotype questionnaire was administered to 67 females who were either (a) consistent users of contraceptives, (b) inconsistent users, (c) nonusers, or (d) virgins. No differences were found between the four groups for the feminine items; however, significant differences were obtained for the masculine items. (Author)

  6. A human centered GeoVisualization framework to facilitate visual exploration of telehealth data: a case study.

    PubMed

    Joshi, Ashish; de Araujo Novaes, Magdala; Machiavelli, Josiane; Iyengar, Sriram; Vogler, Robert; Johnson, Craig; Zhang, Jiajie; Hsu, Chiehwen E

    2012-01-01

    Public health data is typically organized by geospatial units. Routine geographic monitoring of health data enables an understanding of the spatial patterns of events in terms of causes and controls. GeoVisualization (GeoVis) allows users to see information hidden both visually and explicitly on a map. Despite the applicability of GeoVis in public health, it is still underused for visualizing public health data. The objective of this study is to examine the perception of telehealth users' to utilize GeoVis as a proof of concept to facilitate visual exploration of telehealth data in Brazil using principles of human centered approach and cognitive fit theory. A mixed methods approach combining qualitative and quantitative assessments was utilized in this cross sectional study conducted at the Telehealth Center of the Federal University of Pernambuco (NUTE-UFPE), Recife, Brazil. A convenient sample of 20 participants currently involved in NUTES was drawn during a period of Sep-Oct 2011. Data was gathered using previously tested questionnaire surveys and in-person interviews. Socio-demographic Information such as age, gender, prior education, familiarity with the use of computer and GeoVis was gathered. Other information gathered included participants' prior spatial analysis skills, level of motivation and use of GeoVis in telehealth. Audio recording was done for all interviews conducted in both English and Portuguese, and transcription of the audio content to English was done by a certified translator. Univariate analysis was performed and means and standard deviations were reported for the continuous variables and frequency distributions for the categorical variables. For the open-ended questions, we utilized a grounded theory to identify themes and their relationship as they emerge from the data. Analysis of the quantitative data was performed using SAS V9.1 and qualitative data was performed using NVivo9. The average age of participants was 28 years (SD=7), a majority of them were females and 100% were professionals with graduate degrees. The users had diverse backgrounds including nursing, computer science, biomedical informatics, statistics, dentistry, administration and engineering. The users had varied roles and responsibilities, used computers frequently but only 5% of them were familiar with GeoVis. Google maps were the most common GeoVis application that the users were familiar with. Despite having minimal spatial skills, there was a strong motivation and relevance among the telehealth users to use GeoVis to facilitate visual exploration of telehealth data for better informed decision making. Results also showed that of the 60% participants with no GeoVis familiarity; 33% had moderate to large data exploratory role, 83% had no spatial skills but 58% preferred analyzing both spatial and temporal dimensions of the data. Majority of the participants agreed to have maps as the first choice to represent the data as it will be able to display the events both in place and time. The results demonstrate a potentially growing need for the use of GeoVis applications to evaluate telehealth data. Understanding of user needs is essential to ensure that the technology is appropriately functional and will be useful to complete the tasks.

  7. High altitude chemically reacting gas particle mixtures. Volume 3: Computer code user's and applications manual. [rocket nozzle and orbital plume flow fields

    NASA Technical Reports Server (NTRS)

    Smith, S. D.

    1984-01-01

    A users manual for the RAMP2 computer code is provided. The RAMP2 code can be used to model the dominant phenomena which affect the prediction of liquid and solid rocket nozzle and orbital plume flow fields. The general structure and operation of RAMP2 are discussed. A user input/output guide for the modified TRAN72 computer code and the RAMP2F code is given. The application and use of the BLIMPJ module are considered. Sample problems involving the space shuttle main engine and motor are included.

  8. An analysis for high speed propeller-nacelle aerodynamic performance prediction. Volume 2: User's manual

    NASA Technical Reports Server (NTRS)

    Egolf, T. Alan; Anderson, Olof L.; Edwards, David E.; Landgrebe, Anton J.

    1988-01-01

    A user's manual for the computer program developed for the prediction of propeller-nacelle aerodynamic performance reported in, An Analysis for High Speed Propeller-Nacelle Aerodynamic Performance Prediction: Volume 1 -- Theory and Application, is presented. The manual describes the computer program mode of operation requirements, input structure, input data requirements and the program output. In addition, it provides the user with documentation of the internal program structure and the software used in the computer program as it relates to the theory presented in Volume 1. Sample input data setups are provided along with selected printout of the program output for one of the sample setups.

  9. Dashboard Task Monitor for Managing ATLAS User Analysis on the Grid

    NASA Astrophysics Data System (ADS)

    Sargsyan, L.; Andreeva, J.; Jha, M.; Karavakis, E.; Kokoszkiewicz, L.; Saiz, P.; Schovancova, J.; Tuckett, D.; Atlas Collaboration

    2014-06-01

    The organization of the distributed user analysis on the Worldwide LHC Computing Grid (WLCG) infrastructure is one of the most challenging tasks among the computing activities at the Large Hadron Collider. The Experiment Dashboard offers a solution that not only monitors but also manages (kill, resubmit) user tasks and jobs via a web interface. The ATLAS Dashboard Task Monitor provides analysis users with a tool that is independent of the operating system and Grid environment. This contribution describes the functionality of the application and its implementation details, in particular authentication, authorization and audit of the management operations.

  10. Integration of analytical instruments with computer scripting.

    PubMed

    Carvalho, Matheus C

    2013-08-01

    Automation of laboratory routines aided by computer software enables high productivity and is the norm nowadays. However, the integration of different instruments made by different suppliers is still difficult, because to accomplish it, the user must have knowledge of electronics and/or low-level programming. An alternative approach is to control different instruments without an electronic connection between them, relying only on their software interface on a computer. This can be achieved through scripting, which is the emulation of user operations (mouse clicks and keyboard inputs) on the computer. The main advantages of this approach are its simplicity, which enables people with minimal knowledge of computer programming to employ it, and its universality, which enables the integration of instruments made by different suppliers, meaning that the user is totally free to choose the devices to be integrated. Therefore, scripting can be a useful, accessible, and economic solution for laboratory automation.

  11. SPREADSHEET-BASED PROGRAM FOR ERGONOMIC ADJUSTMENT OF NOTEBOOK COMPUTER AND WORKSTATION SETTINGS.

    PubMed

    Nanthavanij, Suebsak; Prae-Arporn, Kanlayanee; Chanjirawittaya, Sorajak; Paripoonyo, Satirajit; Rodloy, Somsak

    2015-06-01

    This paper discusses a computer program, ErgoNBC, which provides suggestions regarding the ergonomic settings of a notebook computer (NBC), workstation components, and selected accessories in order to help computer users to assume an appropriate work posture during the NBC work. From the users' body height, NBC and workstation component data, ErgoNBC computes the recommended tilt angle of NBC base unit, NBC screen angle, distance between the user and NBC, seat height and work surface height. If necessary, the NBC base support, seat cushion and footrest, including their settings, are recommended. An experiment involving twenty-four university students was conducted to evaluate the recommendations provided by ErgoNBC. The Rapid Upper Limb Assessment (RULA) technique was used to analyze their work postures both before and after implementing the Ergo NBC's recommendations. The results clearly showed that ErgoNBC could significantly help to improve the subjects' work postures.

  12. cisPath: an R/Bioconductor package for cloud users for visualization and management of functional protein interaction networks.

    PubMed

    Wang, Likun; Yang, Luhe; Peng, Zuohan; Lu, Dan; Jin, Yan; McNutt, Michael; Yin, Yuxin

    2015-01-01

    With the burgeoning development of cloud technology and services, there are an increasing number of users who prefer cloud to run their applications. All software and associated data are hosted on the cloud, allowing users to access them via a web browser from any computer, anywhere. This paper presents cisPath, an R/Bioconductor package deployed on cloud servers for client users to visualize, manage, and share functional protein interaction networks. With this R package, users can easily integrate downloaded protein-protein interaction information from different online databases with private data to construct new and personalized interaction networks. Additional functions allow users to generate specific networks based on private databases. Since the results produced with the use of this package are in the form of web pages, cloud users can easily view and edit the network graphs via the browser, using a mouse or touch screen, without the need to download them to a local computer. This package can also be installed and run on a local desktop computer. Depending on user preference, results can be publicized or shared by uploading to a web server or cloud driver, allowing other users to directly access results via a web browser. This package can be installed and run on a variety of platforms. Since all network views are shown in web pages, such package is particularly useful for cloud users. The easy installation and operation is an attractive quality for R beginners and users with no previous experience with cloud services.

  13. cisPath: an R/Bioconductor package for cloud users for visualization and management of functional protein interaction networks

    PubMed Central

    2015-01-01

    Background With the burgeoning development of cloud technology and services, there are an increasing number of users who prefer cloud to run their applications. All software and associated data are hosted on the cloud, allowing users to access them via a web browser from any computer, anywhere. This paper presents cisPath, an R/Bioconductor package deployed on cloud servers for client users to visualize, manage, and share functional protein interaction networks. Results With this R package, users can easily integrate downloaded protein-protein interaction information from different online databases with private data to construct new and personalized interaction networks. Additional functions allow users to generate specific networks based on private databases. Since the results produced with the use of this package are in the form of web pages, cloud users can easily view and edit the network graphs via the browser, using a mouse or touch screen, without the need to download them to a local computer. This package can also be installed and run on a local desktop computer. Depending on user preference, results can be publicized or shared by uploading to a web server or cloud driver, allowing other users to directly access results via a web browser. Conclusions This package can be installed and run on a variety of platforms. Since all network views are shown in web pages, such package is particularly useful for cloud users. The easy installation and operation is an attractive quality for R beginners and users with no previous experience with cloud services. PMID:25708840

  14. Analytical modeling of operating characteristics of premixing-prevaporizing fuel-air mixing passages. Volume 2: User's manual

    NASA Technical Reports Server (NTRS)

    Anderson, O. L.; Chiappetta, L. M.; Edwards, D. E.; Mcvey, J. B.

    1982-01-01

    A user's manual describing the operation of three computer codes (ADD code, PTRAK code, and VAPDIF code) is presented. The general features of the computer codes, the input/output formats, run streams, and sample input cases are described.

  15. The cloud services innovation platform- enabling service-based environmental modelling using infrastructure-as-a-service cloud computing

    USDA-ARS?s Scientific Manuscript database

    Service oriented architectures allow modelling engines to be hosted over the Internet abstracting physical hardware configuration and software deployments from model users. Many existing environmental models are deployed as desktop applications running on user's personal computers (PCs). Migration ...

  16. The Scoop on Good Humor.

    ERIC Educational Resources Information Center

    Pieper, Gail W.

    1987-01-01

    Recommends teaching about the uses of humor in technical writing classes by using computer user manuals. Suggests that humor has a place in technical communication, particularly in computer manuals, where new users' apprehension must be reduced, heavy technical points need clarification, and warnings and cautions should be reinforced. (SKC)

  17. Underuse of proton-pump inhibitors in older patients newly starting NSAID treatment.

    PubMed

    Hoffmann, F; Glaeske, G; Schmiemann, G

    2015-07-01

    Proton pump inhibitors (PPIs) are recommended for the prevention of traditional non-steroidal anti-inflammatory drugs (tNSAIDs)-related ulcer complications in high-risk patients. We aimed to study to which extent older persons initiating tNSAIDs with and without oral corticosteroids receive PPIs and whether sex and age influence treatment. We analysed claims data of the German health insurance company BARMER GEK, covering about 9 million persons. A cohort of new users of tNSAIDs aged 65 years and older starting treatment from 1 January 2011, through 1 December 2012 was included. Concurrent use of oral corticosteroids was assessed within the 28 days before the index date. Persons were categorised as users of PPIs if they filled a prescription within 28 days before or after the index prescription. A total of 83,326 persons met the inclusion criteria (64.1% females; mean age: 74.7 years). Of these new users of tNSAID, 27.8% received PPIs within 28 days before or after the index date (females: 29.4% and males: 25.0%). Of the 2857 persons with concurrent prescriptions of oral corticosteroids, 42.8% also received PPIs (females: 43.4% and males: 41.8%). An increase in prescribing of PPIs with age was found in all new users as well as in those concurrently receiving oral corticosteroids. We found that gastroprotective agents are not prescribed to older new users of tNSAIDs as recommended. When compared with earlier studies, adherence to guidelines still remains low. © 2015 John Wiley & Sons Ltd.

  18. Satellite on-board processing for earth resources data

    NASA Technical Reports Server (NTRS)

    Bodenheimer, R. E.; Gonzalez, R. C.; Gupta, J. N.; Hwang, K.; Rochelle, R. W.; Wilson, J. B.; Wintz, P. A.

    1975-01-01

    Results of a survey of earth resources user applications and their data requirements, earth resources multispectral scanner sensor technology, and preprocessing algorithms for correcting the sensor outputs and for data bulk reduction are presented along with a candidate data format. Computational requirements required to implement the data analysis algorithms are included along with a review of computer architectures and organizations. Computer architectures capable of handling the algorithm computational requirements are suggested and the environmental effects of an on-board processor discussed. By relating performance parameters to the system requirements of each of the user requirements the feasibility of on-board processing is determined for each user. A tradeoff analysis is performed to determine the sensitivity of results to each of the system parameters. Significant results and conclusions are discussed, and recommendations are presented.

  19. An interactive program for pharmacokinetic modeling.

    PubMed

    Lu, D R; Mao, F

    1993-05-01

    A computer program, PharmK, was developed for pharmacokinetic modeling of experimental data. The program was written in C computer language based on the high-level user-interface Macintosh operating system. The intention was to provide a user-friendly tool for users of Macintosh computers. An interactive algorithm based on the exponential stripping method is used for the initial parameter estimation. Nonlinear pharmacokinetic model fitting is based on the maximum likelihood estimation method and is performed by the Levenberg-Marquardt method based on chi 2 criterion. Several methods are available to aid the evaluation of the fitting results. Pharmacokinetic data sets have been examined with the PharmK program, and the results are comparable with those obtained with other programs that are currently available for IBM PC-compatible and other types of computers.

  20. Attitudes of Female Faculty toward the Use of Computer Technologies and the Barriers that Limit Their Use of Technologies in Girls' Colleges in Saudi Arabia

    ERIC Educational Resources Information Center

    Almuqayteeb, Taghreed Abdulaziz

    2009-01-01

    The purpose of this study was to examine female faculty members' use of computer technologies, their attitudes toward computers, the factors that best predict their attitudes toward computers, and the barriers that limit their use of computer technologies in girls' colleges in Dammam and Jubail, Saudi Arabia. Also, this study examined how female…

  1. Ubiquitous computing to support co-located clinical teams: using the semiotics of physical objects in system design.

    PubMed

    Bang, Magnus; Timpka, Toomas

    2007-06-01

    Co-located teams often use material objects to communicate messages in collaboration. Modern desktop computing systems with abstract graphical user interface (GUIs) fail to support this material dimension of inter-personal communication. The aim of this study is to investigate how tangible user interfaces can be used in computer systems to better support collaborative routines among co-located clinical teams. The semiotics of physical objects used in team collaboration was analyzed from data collected during 1 month of observations at an emergency room. The resulting set of communication patterns was used as a framework when designing an experimental system. Following the principles of augmented reality, physical objects were mapped into a physical user interface with the goal of maintaining the symbolic value of those objects. NOSTOS is an experimental ubiquitous computing environment that takes advantage of interaction devices integrated into the traditional clinical environment, including digital pens, walk-up displays, and a digital desk. The design uses familiar workplace tools to function as user interfaces to the computer in order to exploit established cognitive and collaborative routines. Paper-based tangible user interfaces and digital desks are promising technologies for co-located clinical teams. A key issue that needs to be solved before employing such solutions in practice is associated with limited feedback from the passive paper interfaces.

  2. User's Manual for FEMOM3DS. Version 1.0

    NASA Technical Reports Server (NTRS)

    Reddy, C.J.; Deshpande, M. D.

    1997-01-01

    FEMOM3DS is a computer code written in FORTRAN 77 to compute electromagnetic(EM) scattering characteristics of a three dimensional object with complex materials using combined Finite Element Method (FEM)/Method of Moments (MoM) technique. This code uses the tetrahedral elements, with vector edge basis functions for FEM in the volume of the cavity and the triangular elements with the basis functions similar to that described for MoM at the outer boundary. By virtue of FEM, this code can handle any arbitrarily shaped three-dimensional cavities filled with inhomogeneous lossy materials. The User's Manual is written to make the user acquainted with the operation of the code. The user is assumed to be familiar with the FORTRAN 77 language and the operating environment of the computers on which the code is intended to run.

  3. Design guidelines for the use of audio cues in computer interfaces

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sumikawa, D.A.; Blattner, M.M.; Joy, K.I.

    1985-07-01

    A logical next step in the evolution of the computer-user interface is the incorporation of sound thereby using our senses of ''hearing'' in our communication with the computer. This allows our visual and auditory capacities to work in unison leading to a more effective and efficient interpretation of information received from the computer than by sight alone. In this paper we examine earcons, which are audio cues, used in the computer-user interface to provide information and feedback to the user about computer entities (these include messages and functions, as well as states and labels). The material in this paper ismore » part of a larger study that recommends guidelines for the design and use of audio cues in the computer-user interface. The complete work examines the disciplines of music, psychology, communication theory, advertising, and psychoacoustics to discover how sound is utilized and analyzed in those areas. The resulting information is organized according to the theory of semiotics, the theory of signs, into the syntax, semantics, and pragmatics of communication by sound. Here we present design guidelines for the syntax of earcons. Earcons are constructed from motives, short sequences of notes with a specific rhythm and pitch, embellished by timbre, dynamics, and register. Compound earcons and family earcons are introduced. These are related motives that serve to identify a family of related cues. Examples of earcons are given.« less

  4. CPE--A New Perspective: The Impact of the Technology Revolution. Proceedings of the Computer Performance Evaluation Users Group Meeting (19th, San Francisco, California, October 25-28, 1983). Final Report. Reports on Computer Science and Technology.

    ERIC Educational Resources Information Center

    Mobray, Deborah, Ed.

    Papers on local area networks (LANs), modelling techniques, software improvement, capacity planning, software engineering, microcomputers and end user computing, cost accounting and chargeback, configuration and performance management, and benchmarking presented at this conference include: (1) "Theoretical Performance Analysis of Virtual…

  5. Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods, and Results for a User Study

    DTIC Science & Technology

    2016-11-01

    Display Design, Methods , and Results for a User Study by Christopher J Garneau and Robert F Erbacher Approved for public...NOV 2016 US Army Research Laboratory Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods ...January 2013–September 2015 4. TITLE AND SUBTITLE Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods

  6. Computer Program User’s Manual for FIREFINDER Digital Topographic Data Verification Library Dubbing System,

    DTIC Science & Technology

    1981-11-30

    COMPUTER PROGRAM USER’S MANUAL FOR FIREFINDER DIGITAL TOPOGRAPHIC DATA VERIFICATION LIBRARY DUBBING SYSTEM 30 NOVEMBER 1981 by: Marie Ceres Leslie R...Library .............................. 1-2 1.2.3 Dubbing .......................... 1-2 1.3 Library Process Overview ..................... 1-3 2 LIBRARY...RPOSE AND SCOPE This manual describes the computer programs for the FIREFINDER Digital Topographic Data Veri fication-Library- Dubbing System (FFDTDVLDS

  7. Documentation--INFO: A Small Computer Data Base Management System for School Applications. The Illinois Series on Educational Application of Computers, No. 24e.

    ERIC Educational Resources Information Center

    Cox, John

    This paper documents the program used in the application of the INFO system for data storage and retrieval in schools, from the viewpoints of both the unsophisticated user and the experienced programmer interested in using the INFO system or modifying it for use within an existing school's computer system. The opening user's guide presents simple…

  8. Quality in End User Documentation.

    ERIC Educational Resources Information Center

    Morrison, Ronald

    1994-01-01

    Discusses quality in end-user documentation for computer applications and explains four approaches to improving quality in end-user documents. Highlights include online help, usability testing, technical writing elements, statistical approaches, and concepts relating to software quality that are also applicable to user manuals. (LRW)

  9. Airport Performance Model : Volume 2 - User's Manual and Program Documentation

    DOT National Transportation Integrated Search

    1978-10-01

    Volume II contains a User's manual and program documentation for the Airport Performance Model. This computer-based model is written in FORTRAN IV for the DEC-10. The user's manual describes the user inputs to the interactive program and gives sample...

  10. A computational system for aerodynamic design and analysis of supersonic aircraft. Part 2: User's manual

    NASA Technical Reports Server (NTRS)

    Middleton, W. D.; Lundry, J. L.; Coleman, R. G.

    1976-01-01

    An integrated system of computer programs was developed for the design and analysis of supersonic configurations. The system uses linearized theory methods for the calculation of surface pressures and supersonic area rule concepts in combination with linearized theory for calculation of aerodynamic force coefficients. Interactive graphics are optional at the user's request. This user's manual contains a description of the system, an explanation of its usage, the input definition, and example output.

  11. Study on the application of mobile internet cloud computing platform

    NASA Astrophysics Data System (ADS)

    Gong, Songchun; Fu, Songyin; Chen, Zheng

    2012-04-01

    The innovative development of computer technology promotes the application of the cloud computing platform, which actually is the substitution and exchange of a sort of resource service models and meets the needs of users on the utilization of different resources after changes and adjustments of multiple aspects. "Cloud computing" owns advantages in many aspects which not merely reduce the difficulties to apply the operating system and also make it easy for users to search, acquire and process the resources. In accordance with this point, the author takes the management of digital libraries as the research focus in this paper, and analyzes the key technologies of the mobile internet cloud computing platform in the operation process. The popularization and promotion of computer technology drive people to create the digital library models, and its core idea is to strengthen the optimal management of the library resource information through computers and construct an inquiry and search platform with high performance, allowing the users to access to the necessary information resources at any time. However, the cloud computing is able to promote the computations within the computers to distribute in a large number of distributed computers, and hence implement the connection service of multiple computers. The digital libraries, as a typical representative of the applications of the cloud computing, can be used to carry out an analysis on the key technologies of the cloud computing.

  12. Modeling of Causes of Sina Weibo Continuance Intention with Mediation of Gender Effects

    PubMed Central

    Wang, Lingyu; Zhao, Wenguo; Sun, Xianghong; Zheng, Rui; Qu, Weina

    2016-01-01

    Sina Weibo is a Twitter-like social networking site and one of the most popular microblogging services in China. This study aims to examine the factors that influence the intentions of users to continue using this site. This paper synthesizes the expectation confirmation model, constructs of habit and perceived critical mass, and the gender effect to construct a theoretical model to explain and predict these user intentions. The model is then tested via an online survey of 498 Sina Weibo users and partial least squares (PLS) modeling. The results indicate that the continuance intention of users is directly predicted by their perceived usefulness of the service (β = 0.299), their satisfaction (β = 0.208), and their habits (β = 0.389), which jointly explain 65.9% of the variance in intention. In addition to the effects of these predictors on the continuance intentions of Sina Weibo users, an assessment of the moderating effect of gender suggests that habit plays a more important role for females than for males in continuance intention, but perceived usefulness seems to be more important for males than for females. The implications of these findings are then discussed. PMID:27199850

  13. Modeling of Causes of Sina Weibo Continuance Intention with Mediation of Gender Effects.

    PubMed

    Wang, Lingyu; Zhao, Wenguo; Sun, Xianghong; Zheng, Rui; Qu, Weina

    2016-01-01

    Sina Weibo is a Twitter-like social networking site and one of the most popular microblogging services in China. This study aims to examine the factors that influence the intentions of users to continue using this site. This paper synthesizes the expectation confirmation model, constructs of habit and perceived critical mass, and the gender effect to construct a theoretical model to explain and predict these user intentions. The model is then tested via an online survey of 498 Sina Weibo users and partial least squares (PLS) modeling. The results indicate that the continuance intention of users is directly predicted by their perceived usefulness of the service (β = 0.299), their satisfaction (β = 0.208), and their habits (β = 0.389), which jointly explain 65.9% of the variance in intention. In addition to the effects of these predictors on the continuance intentions of Sina Weibo users, an assessment of the moderating effect of gender suggests that habit plays a more important role for females than for males in continuance intention, but perceived usefulness seems to be more important for males than for females. The implications of these findings are then discussed.

  14. al3c: high-performance software for parameter inference using Approximate Bayesian Computation.

    PubMed

    Stram, Alexander H; Marjoram, Paul; Chen, Gary K

    2015-11-01

    The development of Approximate Bayesian Computation (ABC) algorithms for parameter inference which are both computationally efficient and scalable in parallel computing environments is an important area of research. Monte Carlo rejection sampling, a fundamental component of ABC algorithms, is trivial to distribute over multiple processors but is inherently inefficient. While development of algorithms such as ABC Sequential Monte Carlo (ABC-SMC) help address the inherent inefficiencies of rejection sampling, such approaches are not as easily scaled on multiple processors. As a result, current Bayesian inference software offerings that use ABC-SMC lack the ability to scale in parallel computing environments. We present al3c, a C++ framework for implementing ABC-SMC in parallel. By requiring only that users define essential functions such as the simulation model and prior distribution function, al3c abstracts the user from both the complexities of parallel programming and the details of the ABC-SMC algorithm. By using the al3c framework, the user is able to scale the ABC-SMC algorithm in parallel computing environments for his or her specific application, with minimal programming overhead. al3c is offered as a static binary for Linux and OS-X computing environments. The user completes an XML configuration file and C++ plug-in template for the specific application, which are used by al3c to obtain the desired results. Users can download the static binaries, source code, reference documentation and examples (including those in this article) by visiting https://github.com/ahstram/al3c. astram@usc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  15. PREDICTING ATTENUATION OF VIRUSES DURING PERCOLATION IN SOILS: 2. USER'S GUIDE TO THE VIRULO 1.0 COMPUTER MODEL

    EPA Science Inventory

    In the EPA document Predicting Attenuation of Viruses During Percolation in Soils 1. Probabilistic Model the conceptual, theoretical, and mathematical foundations for a predictive screening model were presented. In this current volume we present a User's Guide for the computer mo...

  16. Add-Ons: The Ultimate Guide to Peripherals for the Blind Computer User.

    ERIC Educational Resources Information Center

    Croft, Diane L., Ed.

    Detailed product information on peripherals for the blind computer user is provided and applications, availability, reliability, price, and selection considerations are described. Chapters address the following topics and product categories: (1) scanners (optical character readers, Kurzweil Reading Machine); (2) a buyer's guide to modems; (3)…

  17. Computer program documentation: CYBER to Univac binary conversion user's guide

    NASA Technical Reports Server (NTRS)

    Martin, E. W.

    1980-01-01

    A user's guide for a computer program which will convert SINDA temperature history data from CDC (Cyber) binary format to UNIVAC 1100 binary format is presented. The various options available, the required input, the optional output, file assignments, and the restrictions of the program are discussed.

  18. Personal Computing and Academic Library Design.

    ERIC Educational Resources Information Center

    Bazillion, Richard J.

    1992-01-01

    Notebook computers of increasing power and portability offer unique advantages to library users. Connecting easily to a campus data network, they are small silent work stations capable of drawing information from a variety of sources. Designers of new library buildings may assume that users in growing numbers will carry these multipurpose…

  19. KAPEAN: Understanding Affective States of Children with ADHD

    ERIC Educational Resources Information Center

    Martínez, Fernando; Barraza, Claudia; González, Nimrod; González, Juan

    2016-01-01

    Affective computing seeks to create computational systems that adapt content and resources according to the affective states of the users. However, the detection of the user's affection such as motivation and emotion is challenging especially when an attention problem is present. An approach to convey learning resources to children with learning…

  20. The relationship between computer games and quality of life in adolescents

    PubMed Central

    Dolatabadi, Nayereh Kasiri; Eslami, Ahmad Ali; Mostafavi, Firooze; Hassanzade, Akbar; Moradi, Azam

    2013-01-01

    Background: Term of doing computer games among teenagers is growing rapidly. This popular phenomenon can cause physical and psychosocial issues in them. Therefore, this study examined the relationship between computer games and quality of life domains in adolescents aging 12-15 years. Materials and Methods: In a cross-sectional study using the 2-stage stratified cluster sampling method, 444 male and female students in Borkhar were selected. The data collection tool consisted of 1) World Health Organization Quality Of Life – BREF questionnaire and 2) personal information questionnaire. The data were analyzed by Pearson correlation, Spearman correlation, chi-square, independent t-tests and analysis of covariance. Findings: The total mean score of quality of life in students was 67.11±13.34. The results showed a significant relationship between the age of starting to play games and the overall quality of life score and its fourdomains (range r=–0.13 to –0.18). The mean of overall quality of life score in computer game users was 68.27±13.03 while it was 64.81±13.69 among those who did not play computer games and the difference was significant (P=0.01). There were significant differences in environmental and mental health domains between the two groups (P<0.05). However, there was no significant relationship between BMI with the time spent and the type of computer games. Conclusion: Playing computer games for a short time under parental supervision can have positive effects on quality of life in adolescents. However, spending long hours for playing computer games may have negative long-term effects. PMID:24083270

  1. Female Students' Experiences of Computer Technology in Single- versus Mixed-Gender School Settings

    ERIC Educational Resources Information Center

    Burke, Lee-Ann; Murphy, Elizabeth

    2006-01-01

    This study explores how female students compare learning computer technology in a single- versus a mixed- gender school setting. Twelve females participated, all of whom were enrolled in a grade 12 course in Communications' Technology. Data collection included a questionnaire, a semi-structured interview and focus groups. Participants described…

  2. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

    PubMed

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-05-17

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

  3. An Intelligent Terminal for Access to a Medical Database

    PubMed Central

    Womble, M. E.; Wilson, S. D.; Keiser, H. N.; Tworek, M. L.

    1978-01-01

    Very powerful data base management systems (DBMS) now exist which allow medical personnel access to patient record data bases. DBMS's make it easy to retrieve either complete or abbreviated records of patients with similar characteristics. In addition, statistics on data base records are immediately accessible. However, the price of this power is a large computer with the inherent problems of access, response time, and reliability. If a general purpose, time-shared computer is used to get this power, the response time to a request can be either rapid or slow, depending upon loading by other users. Furthermore, if the computer is accessed via dial-up telephone lines, there is competition with other users for telephone ports. If either the DBMS or the host machine is replaced, the medical users, who are typically not sophisticated in computer usage, are forced to learn the new system. Microcomputers, because of their low cost and adaptability, lend themselves to a solution of these problems. A microprocessor-based intelligent terminal has been designed and implemented at the USAF School of Aerospace Medicine to provide a transparent interface between the user and his data base. The intelligent terminal system includes multiple microprocessors, floppy disks, a CRT terminal, and a printer. Users interact with the system at the CRT terminal using menu selection (framing). The system translates the menu selection into the query language of the DBMS and handles all actual communication with the DBMS and its host computer, including telephone dialing and sign on procedures, as well as the actual data base query and response. Retrieved information is stored locally for CRT display, hard copy production, and/or permanent retention. Microprocessor-based communication units provide security for sensitive medical data through encryption/decryption algorithms and high reliability error detection transmission schemes. Highly modular software design permits adapation to a different DBMS and/or host computer with only minor localized software changes. Importantly, this portability is completely transparent to system users. Although the terminal system is independent of the host computer and its DBMS, it has been linked to a UNIVAC 1108 computer supporting MRI's SYSTEM 2000 DBMS.

  4. Pattern of Drug Use and Associated Behaviors Among Female Injecting Drug Users From Northeast India: A Multi-Centric, Cross-Sectional, Comparative Study.

    PubMed

    Ambekar, Atul; Rao, Ravindra; Agrawal, Alok; Goyal, Shrigopal; Mishra, Ashwani; Kishore, Kunal; Mukherjee, Debashis; Albertin, Cristina

    2015-01-01

    Studies from developed countries document the presence of injecting drug use among females and significantly higher vulnerabilities and risks as compared with male injecting drug users (IDUs). Studies comparing vulnerabilities and drug use patterns between female and male IDUs are not available for developing countries. The aim of the study was to assess the drug use pattern and related HIV vulnerabilities among female IDUs and compare these findings with those from male IDUs from four states of Northeast India. The study used data collected as part of a nationwide study of drug use pattern and related HIV vulnerabilities among IDUs. Ninety-eight female and 202 male IDUs accessing services from harm reduction sites across the four states of Northeast region of India were chosen through random sampling methodology. Drug use pattern, injecting practices, and knowledge of HIV were assessed using a structured questionnaire. Significantly higher proportion of female IDUs was uneducated, unemployed, reported their occupation as sex workers, and switched to injecting drug use faster as compared with male IDUs. Female IDUs practicing sex work differed significantly from those who did not with respect to frequency of daily injections, choice of drugs injected, and concomitant use of non-injecting drugs. More than half of female IDUs initiated sharing within the first month of injecting. The study demonstrates that female IDUs differ from male IDUs in their drug use pattern, initiation into injection as well as injecting behavior, which would be an important consideration during designing of female-specific interventions.

  5. An interactive program to display user-generated or file-based maps on a personal computer monitor

    USGS Publications Warehouse

    Langer, W.H.; Stephens, R.W.

    1987-01-01

    PC MAP-MAKER is an ADVANCED BASIC program written to provide users of IBM XT, IBM AT, and compatible computers with a straight-forward, flexible method to display geographical data on a color or monochrome PC (personal computer) monitor. Data can be political boundaries such as State and county boundaries; natural curvilinear features such as rivers, drainage areas, and geological contacts; and points such as well locations and mineral localities. Essentially any point defined by a latitude and longitude and any line defined by a series of latitude and longitude values can be displayed using the program. PC MAP MAKER allows users to view tabular data from U.S. Geological Survey files such as WATSTORE (National Water Data Storage and Retrieval System) in a map format in a time much shorter than required by sending the data to a line plotter. The screen image can be saved to disk for recall at a later date, and hard copies can be printed with a dot matrix printer. The program is user-friendly, using menus or prompts to guide user input. It is fully documented and structured to allow the user to tailor the program to the user 's specific needs. The documentation includes a tutorial designed to introduce users to the capabilities of the program using the State of Colorado as a demonstration map area. (Author 's abstract)

  6. Evaluation of automated decisionmaking methodologies and development of an integrated robotic system simulation. Appendix A: ROBSIM user's guide

    NASA Technical Reports Server (NTRS)

    Haley, D. C.; Almand, B. J.; Thomas, M. M.; Krauze, L. D.; Gremban, K. D.; Sanborn, J. C.; Kelley, J. H.; Depkovich, T. M.; Wolfe, W. J.; Nguyen, T.

    1986-01-01

    The purpose of the Robotics Simulation Program is to provide a broad range of computer capabilities to assist in the design, verification, simulation, and study of robotics systems. ROBSIM is program in FORTRAN 77 for use on a VAX 11/750 computer under the VMS operating system. This user's guide describes the capabilities of the ROBSIM programs, including the system definition function, the analysis tools function and the postprocessor function. The options a user may encounter with each of these executables are explained in detail and the different program prompts appearing to the user are included. Some useful suggestions concerning the appropriate answers to be given by the user are provided. An example user interactive run in enclosed for each of the main program services, and some of the capabilities are illustrated.

  7. User-Driven Sampling Strategies in Image Exploitation

    DOE PAGES

    Harvey, Neal R.; Porter, Reid B.

    2013-12-23

    Visual analytics and interactive machine learning both try to leverage the complementary strengths of humans and machines to solve complex data exploitation tasks. These fields overlap most significantly when training is involved: the visualization or machine learning tool improves over time by exploiting observations of the human-computer interaction. This paper focuses on one aspect of the human-computer interaction that we call user-driven sampling strategies. Unlike relevance feedback and active learning sampling strategies, where the computer selects which data to label at each iteration, we investigate situations where the user selects which data is to be labeled at each iteration. User-drivenmore » sampling strategies can emerge in many visual analytics applications but they have not been fully developed in machine learning. We discovered that in user-driven sampling strategies suggest new theoretical and practical research questions for both visualization science and machine learning. In this paper we identify and quantify the potential benefits of these strategies in a practical image analysis application. We find user-driven sampling strategies can sometimes provide significant performance gains by steering tools towards local minima that have lower error than tools trained with all of the data. Furthermore, in preliminary experiments we find these performance gains are particularly pronounced when the user is experienced with the tool and application domain.« less

  8. User-driven sampling strategies in image exploitation

    NASA Astrophysics Data System (ADS)

    Harvey, Neal; Porter, Reid

    2013-12-01

    Visual analytics and interactive machine learning both try to leverage the complementary strengths of humans and machines to solve complex data exploitation tasks. These fields overlap most significantly when training is involved: the visualization or machine learning tool improves over time by exploiting observations of the human-computer interaction. This paper focuses on one aspect of the human-computer interaction that we call user-driven sampling strategies. Unlike relevance feedback and active learning sampling strategies, where the computer selects which data to label at each iteration, we investigate situations where the user selects which data is to be labeled at each iteration. User-driven sampling strategies can emerge in many visual analytics applications but they have not been fully developed in machine learning. User-driven sampling strategies suggest new theoretical and practical research questions for both visualization science and machine learning. In this paper we identify and quantify the potential benefits of these strategies in a practical image analysis application. We find user-driven sampling strategies can sometimes provide significant performance gains by steering tools towards local minima that have lower error than tools trained with all of the data. In preliminary experiments we find these performance gains are particularly pronounced when the user is experienced with the tool and application domain.

  9. NACA Computer at the Lewis Flight Propulsion Laboratory

    NASA Image and Video Library

    1951-02-21

    A female computer at the National Advisory Committee for Aeronautics (NACA) Lewis Flight Propulsion Laboratory with a slide rule and Friden adding machine to make computations. The computer staff was introduced during World War II to relieve short-handed research engineers of some of the tedious computational work. The Computing Section was staffed by “computers,” young female employees, who often worked overnight when most of the tests were run. The computers obtained test data from the manometers and other instruments, made the initial computations, and plotted the data graphically. Researchers then analyzed the data and summarized the findings in a report or made modifications and ran the test again. There were over 400 female employees at the laboratory in 1944, including 100 computers. The use of computers was originally planned only for the duration of the war. The system was so successful that it was extended into the 1960s. The computers and analysts were located in the Altitude Wind Tunnel Shop and Office Building office wing during the 1940s and transferred to the new 8- by 6-Foot Supersonic Wind Tunnel in 1948.

  10. Facilitating mathematics learning for students with upper extremity disabilities using touch-input system.

    PubMed

    Choi, Kup-Sze; Chan, Tak-Yin

    2015-03-01

    To investigate the feasibility of using tablet device as user interface for students with upper extremity disabilities to input mathematics efficiently into computer. A touch-input system using tablet device as user interface was proposed to assist these students to write mathematics. User-switchable and context-specific keyboard layouts were designed to streamline the input process. The system could be integrated with conventional computer systems only with minor software setup. A two-week pre-post test study involving five participants was conducted to evaluate the performance of the system and collect user feedback. The mathematics input efficiency of the participants was found to improve during the experiment sessions. In particular, their performance in entering trigonometric expressions by using the touch-input system was significantly better than that by using conventional mathematics editing software with keyboard and mouse. The participants rated the touch-input system positively and were confident that they could operate at ease with more practice. The proposed touch-input system provides a convenient way for the students with hand impairment to write mathematics and has the potential to facilitate their mathematics learning. Implications for Rehabilitation Students with upper extremity disabilities often face barriers to learning mathematics which is largely based on handwriting. Conventional computer user interfaces are inefficient for them to input mathematics into computer. A touch-input system with context-specific and user-switchable keyboard layouts was designed to improve the efficiency of mathematics input. Experimental results and user feedback suggested that the system has the potential to facilitate mathematics learning for the students.

  11. FORCEnet Net Centric Architecture - A Standards View

    DTIC Science & Technology

    2006-06-01

    SHARED SERVICES NETWORKING/COMMUNICATIONS STORAGE COMPUTING PLATFORM DATA INTERCHANGE/INTEGRATION DATA MANAGEMENT APPLICATION...R V I C E P L A T F O R M S E R V I C E F R A M E W O R K USER-FACING SERVICES SHARED SERVICES NETWORKING/COMMUNICATIONS STORAGE COMPUTING PLATFORM...E F R A M E W O R K USER-FACING SERVICES SHARED SERVICES NETWORKING/COMMUNICATIONS STORAGE COMPUTING PLATFORM DATA INTERCHANGE/INTEGRATION

  12. Method of fan sound mode structure determination computer program user's manual: Microphone location program

    NASA Technical Reports Server (NTRS)

    Pickett, G. F.; Wells, R. A.; Love, R. A.

    1977-01-01

    A computer user's manual describing the operation and the essential features of the microphone location program is presented. The Microphone Location Program determines microphone locations that ensure accurate and stable results from the equation system used to calculate modal structures. As part of the computational procedure for the Microphone Location Program, a first-order measure of the stability of the equation system was indicated by a matrix 'conditioning' number.

  13. Scalable Computing of the Mesh Size Effect on Modeling Damage Mechanics in Woven Armor Composites

    DTIC Science & Technology

    2008-12-01

    manner of a user defined material subroutine to provide overall stress increments to, the parallel LS-DYNA3D a Lagrangian explicit code used in...finite element code, as a user defined material subroutine . The ability of this subroutine to model the effect of the progressions of a select number...is added as a user defined material subroutine to parallel LS-DYNA3D. The computations of the global mesh are handled by LS-DYNA3D and are spread

  14. User's guide to resin infusion simulation program in the FORTRAN language

    NASA Technical Reports Server (NTRS)

    Weideman, Mark H.; Hammond, Vince H.; Loos, Alfred C.

    1992-01-01

    RTMCL is a user friendly computer code which simulates the manufacture of fabric composites by the resin infusion process. The computer code is based on the process simulation model described in reference 1. Included in the user's guide is a detailed step by step description of how to run the program and enter and modify the input data set. Sample input and output files are included along with an explanation of the results. Finally, a complete listing of the program is provided.

  15. The Department of Defense and the Power of Cloud Computing: Weighing Acceptable Cost Versus Acceptable Risk

    DTIC Science & Technology

    2016-04-01

    the DOD will put DOD systems and data at a risk level comparable to that of their neighbors in the cloud. Just as a user browses a Web page on the...proxy servers for controlling user access to Web pages, and large-scale storage for data management. Each of these devices allows access to the...user to develop applications. Acunetics.com describes Web applications as “computer programs allowing Website visitors to submit and retrieve data

  16. A Menu-Driven Interface to Unix-Based Resources

    PubMed Central

    Evans, Elizabeth A.

    1989-01-01

    Unix has often been overlooked in the past as a viable operating system for anyone other than computer scientists. Its terseness, non-mnemonic nature of the commands, and the lack of user-friendly software to run under it are but a few of the user-related reasons which have been cited. It is, nevertheless, the operating system of choice in many cases. This paper describes a menu-driven interface to Unix which provides user-friendlier access to the software resources available on the computers running under Unix.

  17. Computer code for controller partitioning with IFPC application: A user's manual

    NASA Technical Reports Server (NTRS)

    Schmidt, Phillip H.; Yarkhan, Asim

    1994-01-01

    A user's manual for the computer code for partitioning a centralized controller into decentralized subcontrollers with applicability to Integrated Flight/Propulsion Control (IFPC) is presented. Partitioning of a centralized controller into two subcontrollers is described and the algorithm on which the code is based is discussed. The algorithm uses parameter optimization of a cost function which is described. The major data structures and functions are described. Specific instructions are given. The user is led through an example of an IFCP application.

  18. Research on phone contacts online status based on mobile cloud computing

    NASA Astrophysics Data System (ADS)

    Wang, Wen-jinga; Ge, Weib

    2013-03-01

    Because the limited ability of storage space, CPU processing on mobile phone, it is difficult to realize complex applications on mobile phones, but along with the development of cloud computing, we can place the computing and storage in the clouds, provide users with rich cloud services, helping users complete various function through the browser has become the trend for future mobile communication. This article is taking the mobile phone contacts online status as an example to analysis the development and application of mobile cloud computing.

  19. Software Description for the O’Hare Runway Configuration Management System. Volume I. Technical Description,

    DTIC Science & Technology

    1982-10-01

    spent in preparing this document. 00. EXECUTIVE SUMMARY The O’Hare Runway Configuration Management System (CMS) is an interactive multi-user computer ...MITRE Washington’s Computer Center. Currently, CMS is housed in an IBM 4341 computer with VM/SP operating system. CMS employs the IBM’s Display...iV 0O, o 0 .r4L /~ wA 0U 00 00 0 w vi O’Hare, it will operate on a dedicated mini- computer which permits multi-tasking (that is, multiple users

  20. Factors leading to the computer vision syndrome: an issue at the contemporary workplace.

    PubMed

    Izquierdo, Juan C; García, Maribel; Buxó, Carmen; Izquierdo, Natalio J

    2007-01-01

    Vision and eye related problems are common among computer users, and have been collectively called the Computer Vision Syndrome (CVS). An observational study in order to identify the risk factors leading to the CVS was done. Twenty-eight participants answered a validated questionnaire, and had their workstations examined. The questionnaire evaluated personal, environmental, ergonomic factors, and physiologic response of computer users. The distance from the eye to the computers' monitor (A), the computers' monitor height (B), and visual axis height (C) were measured. The difference between B and C was calculated and labeled as D. Angles of gaze to the computer monitor were calculated using the formula: angle=tan-1(D/A). Angles were divided into two groups: participants with angles of gaze ranging from 0 degree to 13.9 degrees were included in Group 1; and participants gazing at angles larger than 14 degrees were included in Group 2. Statistical analysis of the evaluated variables was made. Computer users in both groups used more tear supplements (as part of the syndrome) than expected. This association was statistically significant (p < 0.10). Participants in Group 1 reported more pain than participants in Group 2. Associations between the CVS and other personal or ergonomic variables were not statistically significant. Our findings show that the most important factor leading to the syndrome is the angle of gaze at the computer monitor. Pain in computer users is diminished when gazing downwards at angles of 14 degrees or more. The CVS remains an under estimated and poorly understood issue at the workplace. The general public, health professionals, the government, and private industries need to be educated about the CVS.

  1. Factors leading to the Computer Vision Syndrome: an issue at the contemporary workplace.

    PubMed

    Izquierdo, Juan C; García, Maribel; Buxó, Carmen; Izquierdo, Natalio J

    2004-01-01

    Vision and eye related problems are common among computer users, and have been collectively called the Computer Vision Syndrome (CVS). An observational study in order to identify the risk factors leading to the CVS was done. Twenty-eight participants answered a validated questionnaire, and had their workstations examined. The questionnaire evaluated personal, environmental, ergonomic factors, and physiologic response of computer users. The distance from the eye to the computers' monitor (A), the computers' monitor height (B), and visual axis height (C) were measured. The difference between B and C was calculated and labeled as D. Angles of gaze to the computer monitor were calculated using the formula: angle=tan(-1)(D/ A). Angles were divided into two groups: participants with angles of gaze ranging from 0 degrees to 13.9 degrees were included in Group 1; and participants gazing at angles larger than 14 degrees were included in Group 2. Statistical analysis of the evaluated variables was made. Computer users in both groups used more tear supplements (as part of the syndrome) than expected. This association was statistically significant (p<0.10). Participants in Group 1 reported more pain than participants in Group 2. Associations between the CVS and other personal or ergonomic variables were not statistically significant. Our findings show that most important factor leading to the syndrome is the angle of gaze at the computer monitor. Pain in computer users is diminished when gazing downwards at angles of 14 degrees or more. The CVS remains an under estimated and poorly understood issue at the workplace. The general public, health professionals, the government, and private industries need to be educated about the CVS.

  2. User interface issues in supporting human-computer integrated scheduling

    NASA Technical Reports Server (NTRS)

    Cooper, Lynne P.; Biefeld, Eric W.

    1991-01-01

    The topics are presented in view graph form and include the following: characteristics of Operations Mission Planner (OMP) schedule domain; OMP architecture; definition of a schedule; user interface dimensions; functional distribution; types of users; interpreting user interaction; dynamic overlays; reactive scheduling; and transitioning the interface.

  3. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment

    PubMed Central

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved. PMID:24078906

  4. TOAD Editor

    NASA Technical Reports Server (NTRS)

    Bingle, Bradford D.; Shea, Anne L.; Hofler, Alicia S.

    1993-01-01

    Transferable Output ASCII Data (TOAD) computer program (LAR-13755), implements format designed to facilitate transfer of data across communication networks and dissimilar host computer systems. Any data file conforming to TOAD format standard called TOAD file. TOAD Editor is interactive software tool for manipulating contents of TOAD files. Commonly used to extract filtered subsets of data for visualization of results of computation. Also offers such user-oriented features as on-line help, clear English error messages, startup file, macroinstructions defined by user, command history, user variables, UNDO features, and full complement of mathematical statistical, and conversion functions. Companion program, TOAD Gateway (LAR-14484), converts data files from variety of other file formats to that of TOAD. TOAD Editor written in FORTRAN 77.

  5. Secure encapsulation and publication of biological services in the cloud computing environment.

    PubMed

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  6. Non-volatile memory for checkpoint storage

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blumrich, Matthias A.; Chen, Dong; Cipolla, Thomas M.

    A system, method and computer program product for supporting system initiated checkpoints in high performance parallel computing systems and storing of checkpoint data to a non-volatile memory storage device. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity. In one embodiment, themore » non-volatile memory is a pluggable flash memory card.« less

  7. Prototyping manufacturing in the cloud

    NASA Astrophysics Data System (ADS)

    Ciortea, E. M.

    2017-08-01

    This paper attempts a theoretical approach to cloud systems with impacts on production systems. I call systems as cloud computing because form a relatively new concept in the field of informatics, representing an overall distributed computing services, applications, access to information and data storage without the user to know the physical location and configuration of systems. The advantages of this approach are especially computing speed and storage capacity without investment in additional configurations, synchronizing user data, data processing using web applications. The disadvantage is that it wants to identify a solution for data security, leading to mistrust users. The case study is applied to a module of the system of production, because the system is complex.

  8. A proactive password checker

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1990-01-01

    Password selection has long been a difficult issue; traditionally, passwords are either assigned by the computer or chosen by the user. When the computer does the assignment, the passwords are often hard to remember; when the user makes the selection, the passwords are often easy to guess. This paper describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. The technique is site, user, and group compatible, and allows rapid changing of constraints imposed upon the password. Although experience with this technique is limited, it appears to have much promise.

  9. A novel device for head gesture measurement system in combination with eye-controlled human machine interface

    NASA Astrophysics Data System (ADS)

    Lin, Chern-Sheng; Ho, Chien-Wa; Chang, Kai-Chieh; Hung, San-Shan; Shei, Hung-Jung; Yeh, Mau-Shiun

    2006-06-01

    This study describes the design and combination of an eye-controlled and a head-controlled human-machine interface system. This system is a highly effective human-machine interface, detecting head movement by changing positions and numbers of light sources on the head. When the users utilize the head-mounted display to browse a computer screen, the system will catch the images of the user's eyes with CCD cameras, which can also measure the angle and position of the light sources. In the eye-tracking system, the program in the computer will locate each center point of the pupils in the images, and record the information on moving traces and pupil diameters. In the head gesture measurement system, the user wears a double-source eyeglass frame, so the system catches images of the user's head by using a CCD camera in front of the user. The computer program will locate the center point of the head, transferring it to the screen coordinates, and then the user can control the cursor by head motions. We combine the eye-controlled and head-controlled human-machine interface system for the virtual reality applications.

  10. User's manual for CBS3DS, version 1.0

    NASA Astrophysics Data System (ADS)

    Reddy, C. J.; Deshpande, M. D.

    1995-10-01

    CBS3DS is a computer code written in FORTRAN 77 to compute the backscattering radar cross section of cavity backed apertures in infinite ground plane and slots in thick infinite ground plane. CBS3DS implements the hybrid Finite Element Method (FEM) and Method of Moments (MoM) techniques. This code uses the tetrahedral elements, with vector edge basis functions for FEM in the volume of the cavity/slot and the triangular elements with the basis functions for MoM at the apertures. By virtue of FEM, this code can handle any arbitrarily shaped three-dimensional cavities filled with inhomogeneous lossy materials; due to MoM, the apertures can be of any arbitrary shape. The User's Manual is written to make the user acquainted with the operation of the code. The user is assumed to be familiar with the FORTRAN 77 language and the operating environment of the computer the code is intended to run.

  11. Modifications to the streamtube curvature program. Volume 1: Program modifications and user's manual. [user manuals (computer programs) for transonic flow of nacelles and intake systems of turbofan engines

    NASA Technical Reports Server (NTRS)

    Ferguson, D. R.; Keith, J. S.

    1975-01-01

    The improvements which have been incorporated in the Streamtube Curvature Program to enhance both its computational and diagnostic capabilities are described. Detailed descriptions are given of the revisions incorporated to more reliably handle the jet stream-external flow interaction at trailing edges. Also presented are the augmented boundary layer procedures and a variety of other program changes relating to program diagnostics and extended solution capabilities. An updated User's Manual, that includes information on the computer program operation, usage, and logical structure, is presented. User documentation includes an outline of the general logical flow of the program and detailed instructions for program usage and operation. From the standpoint of the programmer, the overlay structure is described. The input data, output formats, and diagnostic printouts are covered in detail and illustrated with three typical test cases.

  12. A novel graphical user interface for ultrasound-guided shoulder arthroscopic surgery

    NASA Astrophysics Data System (ADS)

    Tyryshkin, K.; Mousavi, P.; Beek, M.; Pichora, D.; Abolmaesumi, P.

    2007-03-01

    This paper presents a novel graphical user interface developed for a navigation system for ultrasound-guided computer-assisted shoulder arthroscopic surgery. The envisioned purpose of the interface is to assist the surgeon in determining the position and orientation of the arthroscopic camera and other surgical tools within the anatomy of the patient. The user interface features real time position tracking of the arthroscopic instruments with an optical tracking system, and visualization of their graphical representations relative to a three-dimensional shoulder surface model of the patient, created from computed tomography images. In addition, the developed graphical interface facilitates fast and user-friendly intra-operative calibration of the arthroscope and the arthroscopic burr, capture and segmentation of ultrasound images, and intra-operative registration. A pilot study simulating the computer-aided shoulder arthroscopic procedure on a shoulder phantom demonstrated the speed, efficiency and ease-of-use of the system.

  13. TADS: A CFD-based turbomachinery and analysis design system with GUI. Volume 2: User's manual

    NASA Technical Reports Server (NTRS)

    Myers, R. A.; Topp, D. A.; Delaney, R. A.

    1995-01-01

    The primary objective of this study was the development of a computational fluid dynamics (CFD) based turbomachinery airfoil analysis and design system, controlled by a graphical user interface (GUI). The computer codes resulting from this effort are referred to as the Turbomachinery Analysis and Design System (TADS). This document is intended to serve as a user's manual for the computer programs which comprise the TADS system. TADS couples a throughflow solver (ADPAC) with a quasi-3D blade-to-blade solver (RVCQ3D) in an interactive package. Throughflow analysis capability was developed in ADPAC through the addition of blade force and blockage terms to the governing equations. A GUI was developed to simplify user input and automate the many tasks required to perform turbomachinery analysis and design. The coupling of various programs was done in a way that alternative solvers or grid generators could be easily incorporated into the TADS framework.

  14. Detecting Mental States by Machine Learning Techniques: The Berlin Brain-Computer Interface

    NASA Astrophysics Data System (ADS)

    Blankertz, Benjamin; Tangermann, Michael; Vidaurre, Carmen; Dickhaus, Thorsten; Sannelli, Claudia; Popescu, Florin; Fazli, Siamac; Danóczy, Márton; Curio, Gabriel; Müller, Klaus-Robert

    The Berlin Brain-Computer Interface Brain-Computer Interface (BBCI) uses a machine learning approach to extract user-specific patterns from high-dimensional EEG-features optimized for revealing the user's mental state. Classical BCI applications are brain actuated tools for patients such as prostheses (see Section 4.1) or mental text entry systems ([1] and see [2-5] for an overview on BCI). In these applications, the BBCI uses natural motor skills of the users and specifically tailored pattern recognition algorithms for detecting the user's intent. But beyond rehabilitation, there is a wide range of possible applications in which BCI technology is used to monitor other mental states, often even covert ones (see also [6] in the fMRI realm). While this field is still largely unexplored, two examples from our studies are exemplified in Sections 4.3 and 4.4.

  15. Affective assessment of computer users based on processing the pupil diameter signal.

    PubMed

    Ren, Peng; Barreto, Armando; Gao, Ying; Adjouadi, Malek

    2011-01-01

    Detecting affective changes of computer users is a current challenge in human-computer interaction which is being addressed with the help of biomedical engineering concepts. This article presents a new approach to recognize the affective state ("relaxation" vs. "stress") of a computer user from analysis of his/her pupil diameter variations caused by sympathetic activation. Wavelet denoising and Kalman filtering methods are first used to remove abrupt changes in the raw Pupil Diameter (PD) signal. Then three features are extracted from the preprocessed PD signal for the affective state classification. Finally, a random tree classifier is implemented, achieving an accuracy of 86.78%. In these experiments the Eye Blink Frequency (EBF), is also recorded and used for affective state classification, but the results show that the PD is a more promising physiological signal for affective assessment.

  16. The Georgetown University Library Information System (LIS): a minicomputer-based integrated library system.

    PubMed Central

    Broering, N C

    1983-01-01

    Georgetown University's Library Information System (LIS), an integrated library system designed and implemented at the Dahlgren Memorial Library, is broadly described from an administrative point of view. LIS' functional components consist of eight "user-friendly" modules: catalog, circulation, serials, bibliographic management (including Mini-MEDLINE), acquisitions, accounting, networking, and computer-assisted instruction. This article touches on emerging library services, user education, and computer information services, which are also changing the role of staff librarians. The computer's networking capability brings the library directly to users through personal or institutional computers at remote sites. The proposed Integrated Medical Center Information System at Georgetown University will include interface with LIS through a network mechanism. LIS is being replicated at other libraries, and a microcomputer version is being tested for use in a hospital setting. PMID:6688749

  17. User interface user's guide for HYPGEN

    NASA Technical Reports Server (NTRS)

    Chiu, Ing-Tsau

    1992-01-01

    The user interface (UI) of HYPGEN is developed using Panel Library to shorten the learning curve for new users and provide easier ways to run HYPGEN for casual users as well as for advanced users. Menus, buttons, sliders, and type-in fields are used extensively in UI to allow users to point and click with a mouse to choose various available options or to change values of parameters. On-line help is provided to give users information on using UI without consulting the manual. Default values are set for most parameters and boundary conditions are determined by UI to further reduce the effort needed to run HYPGEN; however, users are free to make any changes and save it in a file for later use. A hook to PLOT3D is built in to allow graphics manipulation. The viewpoint and min/max box for PLOT3D windows are computed by UI and saved in a PLOT3D journal file. For large grids which take a long time to generate on workstations, the grid generator (HYPGEN) can be run on faster computers such as Crays, while UI stays at the workstation.

  18. Gender and Stereotypes in Motivation to Study Computer Programming for Careers in Multimedia

    ERIC Educational Resources Information Center

    Doube, Wendy; Lang, Catherine

    2012-01-01

    A multimedia university programme with relatively equal numbers of male and female students in elective programming subjects provided a rare opportunity to investigate female motivation to study and pursue computer programming in a career. The MSLQ was used to survey 85 participants. In common with research into deterrence of females from STEM…

  19. An intelligent and secure system for predicting and preventing Zika virus outbreak using Fog computing

    NASA Astrophysics Data System (ADS)

    Sareen, Sanjay; Gupta, Sunil Kumar; Sood, Sandeep K.

    2017-10-01

    Zika virus is a mosquito-borne disease that spreads very quickly in different parts of the world. In this article, we proposed a system to prevent and control the spread of Zika virus disease using integration of Fog computing, cloud computing, mobile phones and the Internet of things (IoT)-based sensor devices. Fog computing is used as an intermediary layer between the cloud and end users to reduce the latency time and extra communication cost that is usually found high in cloud-based systems. A fuzzy k-nearest neighbour is used to diagnose the possibly infected users, and Google map web service is used to provide the geographic positioning system (GPS)-based risk assessment to prevent the outbreak. It is used to represent each Zika virus (ZikaV)-infected user, mosquito-dense sites and breeding sites on the Google map that help the government healthcare authorities to control such risk-prone areas effectively and efficiently. The proposed system is deployed on Amazon EC2 cloud to evaluate its performance and accuracy using data set for 2 million users. Our system provides high accuracy of 94.5% for initial diagnosis of different users according to their symptoms and appropriate GPS-based risk assessment.

  20. Towards passive brain-computer interfaces: applying brain-computer interface technology to human-machine systems in general.

    PubMed

    Zander, Thorsten O; Kothe, Christian

    2011-04-01

    Cognitive monitoring is an approach utilizing realtime brain signal decoding (RBSD) for gaining information on the ongoing cognitive user state. In recent decades this approach has brought valuable insight into the cognition of an interacting human. Automated RBSD can be used to set up a brain-computer interface (BCI) providing a novel input modality for technical systems solely based on brain activity. In BCIs the user usually sends voluntary and directed commands to control the connected computer system or to communicate through it. In this paper we propose an extension of this approach by fusing BCI technology with cognitive monitoring, providing valuable information about the users' intentions, situational interpretations and emotional states to the technical system. We call this approach passive BCI. In the following we give an overview of studies which utilize passive BCI, as well as other novel types of applications resulting from BCI technology. We especially focus on applications for healthy users, and the specific requirements and demands of this user group. Since the presented approach of combining cognitive monitoring with BCI technology is very similar to the concept of BCIs itself we propose a unifying categorization of BCI-based applications, including the novel approach of passive BCI.

Top