Okamoto, E; Shimanaka, M; Suzuki, S; Baba, K; Mitamura, Y
1999-01-01
The usefulness of a remote monitoring system that uses a personal handy phone for artificial heart implanted patients was investigated. The type of handy phone used in this study was a personal handy phone system (PHS), which is a system developed in Japan that uses the NTT (Nippon Telephone and Telegraph, Inc.) telephone network service. The PHS has several advantages: high-speed data transmission, low power output, little electromagnetic interference with medical devices, and easy locating of patients. In our system, patients have a mobile computer (Toshiba, Libretto 50, Kawasaki, Japan) for data transmission control between an implanted controller and a host computer (NEC, PC-9821V16) in the hospital. Information on the motor rotational angle (8 bits) and motor current (8 bits) of the implanted motor driven heart is fed into the mobile computer from the implanted controller (Hitachi, H8/532, Yokohama, Japan) according to 32-bit command codes from the host computer. Motor current and motor rotational angle data from inside the body are framed together by a control code (frame number and parity) for data error checking and correcting at the receiving site, and the data are sent through the PHS connection to the mobile computer. The host computer calculates pump outflow and arterial pressure from the motor rotational angle and motor current values and displays the data in real-time waveforms. The results of this study showed that accurate data on motor rotational angle and current could be transmitted from the subjects while they were walking or driving a car to the host computer at a data transmission rate of 9600 bps. This system is useful for remote monitoring of patients with an implanted artificial heart.
Active optical control system design of the SONG-China Telescope
NASA Astrophysics Data System (ADS)
Ye, Yu; Kou, Songfeng; Niu, Dongsheng; Li, Cheng; Wang, Guomin
2012-09-01
The standard SONG node structure of control system is presented. The active optical control system of the project is a distributed system, and a host computer and a slave intelligent controller are included. The host control computer collects the information from wave front sensor and sends commands to the slave computer to realize a closed loop model. For intelligent controller, a programmable logic controller (PLC) system is used. This system combines with industrial personal computer (IPC) and PLC to make up a control system with powerful and reliable.
Systems and methods for performing wireless financial transactions
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCown, Steven Harvey
2012-07-03
A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature tomore » the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction.« less
USDA-ARS?s Scientific Manuscript database
Service oriented architectures allow modelling engines to be hosted over the Internet abstracting physical hardware configuration and software deployments from model users. Many existing environmental models are deployed as desktop applications running on user's personal computers (PCs). Migration ...
Microcontroller interface for diode array spectrometry
NASA Astrophysics Data System (ADS)
Aguo, L.; Williams, R. R.
An alternative to bus-based computer interfacing is presented using diode array spectrometry as a typical application. The new interface consists of an embedded single-chip microcomputer, known as a microcontroller, which provides all necessary digital I/O and analog-to-digital conversion (ADC) along with an unprecedented amount of intelligence. Communication with a host computer system is accomplished by a standard serial interface so this type of interfacing is applicable to a wide range of personal and minicomputers and can be easily networked. Data are acquired asynchronousty and sent to the host on command. New operating modes which have no traditional counterparts are presented.
NASA Technical Reports Server (NTRS)
Hua, Chanh V.; D'Ambrose, John J.; Jaworski, Richard C.; Halula, Elaine M.; Thornton, David N.; Heligman, Robert L.; Turner, Michael R.
1990-01-01
Small Computer System Interface (SCSI) communication test bus provides high-data-rate, standard interconnection enabling communication among International Business Machines (IBM) Personal System/2 Micro Channel, other devices connected to Micro Channel, test equipment, and host computer. Serves primarily as nonintrusive input/output attachment to PS/2 Micro Channel bus, providing rapid communication for debugger. Opens up possibility of using debugger in real-time applications.
Demarcating Advanced Learning Approaches from Methodological and Technological Perspectives
ERIC Educational Resources Information Center
Horvath, Imre; Peck, David; Verlinden, Jouke
2009-01-01
In the field of design and engineering education, the fast and expansive evolution of information and communication technologies is steadily converting traditional learning approaches into more advanced ones. Facilitated by Broadband (high bandwidth) personal computers, distance learning has developed into web-hosted electronic learning. The…
1984-12-01
3Com Corporation ....... A-18 Ethernet Controller Support . . . . . . A-19 Host Systems Support . . . . . . . . . A-20 Personal Computers Support...A-23 VAX EtherSeries Software 0 * A-23 Network Research Corporation . o o o . o A-24 File Transfer Service . . . . o A-25 Virtual Terminal Service 0...Control office is planning to acquire a Digital Equipment Corporation VAX 11/780 mainframe computer with the Unix Berkeley 4.2BSD operating system. They
ERIC Educational Resources Information Center
Hawkins, Donald T.; Levy, Louise R.
1985-01-01
This initial article in series of three discusses barriers inhibiting use of current online retrieval systems by novice users and notes reasons for front end and gateway online retrieval systems. Definitions, front end features, user interface, location (personal computer, host mainframe), evaluation, and strengths and weaknesses are covered. (16…
FITSManager: Management of Personal Astronomical Data
NASA Astrophysics Data System (ADS)
Cui, Chenzhou; Fan, Dongwei; Zhao, Yongheng; Kembhavi, Ajit; He, Boliang; Cao, Zihuang; Li, Jian; Nandrekar, Deoyani
2011-07-01
With the increase of personal storage capacity, it is easy to find hundreds to thousands of FITS files in the personal computer of an astrophysicist. Because Flexible Image Transport System (FITS) is a professional data format initiated by astronomers and used mainly in the small community, data management toolkits for FITS files are very few. Astronomers need a powerful tool to help them manage their local astronomical data. Although Virtual Observatory (VO) is a network oriented astronomical research environment, its applications and related technologies provide useful solutions to enhance the management and utilization of astronomical data hosted in an astronomer's personal computer. FITSManager is such a tool to provide astronomers an efficient management and utilization of their local data, bringing VO to astronomers in a seamless and transparent way. FITSManager provides fruitful functions for FITS file management, like thumbnail, preview, type dependent icons, header keyword indexing and search, collaborated working with other tools and online services, and so on. The development of the FITSManager is an effort to fill the gap between management and analysis of astronomical data.
Network Penetration Testing and Research
NASA Technical Reports Server (NTRS)
Murphy, Brandon F.
2013-01-01
This paper will focus the on research and testing done on penetrating a network for security purposes. This research will provide the IT security office new methods of attacks across and against a company's network as well as introduce them to new platforms and software that can be used to better assist with protecting against such attacks. Throughout this paper testing and research has been done on two different Linux based operating systems, for attacking and compromising a Windows based host computer. Backtrack 5 and BlackBuntu (Linux based penetration testing operating systems) are two different "attacker'' computers that will attempt to plant viruses and or NASA USRP - Internship Final Report exploits on a host Windows 7 operating system, as well as try to retrieve information from the host. On each Linux OS (Backtrack 5 and BlackBuntu) there is penetration testing software which provides the necessary tools to create exploits that can compromise a windows system as well as other operating systems. This paper will focus on two main methods of deploying exploits 1 onto a host computer in order to retrieve information from a compromised system. One method of deployment for an exploit that was tested is known as a "social engineering" exploit. This type of method requires interaction from unsuspecting user. With this user interaction, a deployed exploit may allow a malicious user to gain access to the unsuspecting user's computer as well as the network that such computer is connected to. Due to more advance security setting and antivirus protection and detection, this method is easily identified and defended against. The second method of exploit deployment is the method mainly focused upon within this paper. This method required extensive research on the best way to compromise a security enabled protected network. Once a network has been compromised, then any and all devices connected to such network has the potential to be compromised as well. With a compromised network, computers and devices can be penetrated through deployed exploits. This paper will illustrate the research done to test ability to penetrate a network without user interaction, in order to retrieve personal information from a targeted host.
Operational Based Vision Assessment
2014-02-01
formulated or supplied the drawings, specifications, or other data does not license the holder or any other person or corporation or convey any...expensive than other developers’ software. The sources for the GPUs ( Nvidia ) and the host computer (Concurrent’s iHawk) were identified. The...boundaries, which is a distracting artifact when performing visual tests. The problem has been isolated by the OBVA team to the Nvidia GPUs. The OBVA system
A minimal SATA III Host Controller based on FPGA
NASA Astrophysics Data System (ADS)
Liu, Hailiang
2018-03-01
SATA (Serial Advanced Technology Attachment) is an advanced serial bus which has a outstanding performance in transmitting high speed real-time data applied in Personal Computers, Financial Industry, astronautics and aeronautics, etc. In this express, a minimal SATA III Host Controller based on Xilinx Kintex 7 serial FPGA is designed and implemented. Compared to the state-of-art, registers utilization are reduced 25.3% and LUTs utilization are reduced 65.9%. According to the experimental results, the controller works precisely and steady with the reading bandwidth of up to 536 MB per second and the writing bandwidth of up to 512 MB per second, both of which are close to the maximum bandwidth of the SSD(Solid State Disk) device. The host controller is very suitable for high speed data transmission and mass data storage.
Fusing MRI and Mechanical Imaging for Improved Prostate Cancer Diagnosis
2016-10-01
Western Reserve University. - PI is participating weekly Prostate Imaging Reporting and Data System meeting in the Department of Radiology, Case Medical...Literary Guild (LG) seminar, Case Western Reserve University. Hosted by PI’s mentor. - PI is participating the majority of Imaging Hour meeting...Ernest Feleppa4, Dean Barratt2, Lee Ponsky5, Anant Madabhushi1 1 Center for Computational Imaging and Personalized Diagnostics, Case Western Reserve
Zao, John K.; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping
2014-01-01
EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system. PMID:24917804
Zao, John K; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping
2014-01-01
EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system.
Naver: a PC-cluster-based VR system
NASA Astrophysics Data System (ADS)
Park, ChangHoon; Ko, HeeDong; Kim, TaiYun
2003-04-01
In this paper, we present a new framework NAVER for virtual reality application. The NAVER is based on a cluster of low-cost personal computers. The goal of NAVER is to provide flexible, extensible, scalable and re-configurable framework for the virtual environments defined as the integration of 3D virtual space and external modules. External modules are various input or output devices and applications on the remote hosts. From the view of system, personal computers are divided into three servers according to its specific functions: Render Server, Device Server and Control Server. While Device Server contains external modules requiring event-based communication for the integration, Control Server contains external modules requiring synchronous communication every frame. And, the Render Server consists of 5 managers: Scenario Manager, Event Manager, Command Manager, Interaction Manager and Sync Manager. These managers support the declaration and operation of virtual environment and the integration with external modules on remote servers.
A performance analysis of advanced I/O architectures for PC-based network file servers
NASA Astrophysics Data System (ADS)
Huynh, K. D.; Khoshgoftaar, T. M.
1994-12-01
In the personal computing and workstation environments, more and more I/O adapters are becoming complete functional subsystems that are intelligent enough to handle I/O operations on their own without much intervention from the host processor. The IBM Subsystem Control Block (SCB) architecture has been defined to enhance the potential of these intelligent adapters by defining services and conventions that deliver command information and data to and from the adapters. In recent years, a new storage architecture, the Redundant Array of Independent Disks (RAID), has been quickly gaining acceptance in the world of computing. In this paper, we would like to discuss critical system design issues that are important to the performance of a network file server. We then present a performance analysis of the SCB architecture and disk array technology in typical network file server environments based on personal computers (PCs). One of the key issues investigated in this paper is whether a disk array can outperform a group of disks (of same type, same data capacity, and same cost) operating independently, not in parallel as in a disk array.
Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference
... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...
Designing a wearable navigation system for image-guided cancer resection surgery
Shao, Pengfei; Ding, Houzhu; Wang, Jinkun; Liu, Peng; Ling, Qiang; Chen, Jiayu; Xu, Junbin; Zhang, Shiwu; Xu, Ronald
2015-01-01
A wearable surgical navigation system is developed for intraoperative imaging of surgical margin in cancer resection surgery. The system consists of an excitation light source, a monochromatic CCD camera, a host computer, and a wearable headset unit in either of the following two modes: head-mounted display (HMD) and Google glass. In the HMD mode, a CMOS camera is installed on a personal cinema system to capture the surgical scene in real-time and transmit the image to the host computer through a USB port. In the Google glass mode, a wireless connection is established between the glass and the host computer for image acquisition and data transport tasks. A software program is written in Python to call OpenCV functions for image calibration, co-registration, fusion, and display with augmented reality. The imaging performance of the surgical navigation system is characterized in a tumor simulating phantom. Image-guided surgical resection is demonstrated in an ex vivo tissue model. Surgical margins identified by the wearable navigation system are co-incident with those acquired by a standard small animal imaging system, indicating the technical feasibility for intraoperative surgical margin detection. The proposed surgical navigation system combines the sensitivity and specificity of a fluorescence imaging system and the mobility of a wearable goggle. It can be potentially used by a surgeon to identify the residual tumor foci and reduce the risk of recurrent diseases without interfering with the regular resection procedure. PMID:24980159
Designing a wearable navigation system for image-guided cancer resection surgery.
Shao, Pengfei; Ding, Houzhu; Wang, Jinkun; Liu, Peng; Ling, Qiang; Chen, Jiayu; Xu, Junbin; Zhang, Shiwu; Xu, Ronald
2014-11-01
A wearable surgical navigation system is developed for intraoperative imaging of surgical margin in cancer resection surgery. The system consists of an excitation light source, a monochromatic CCD camera, a host computer, and a wearable headset unit in either of the following two modes: head-mounted display (HMD) and Google glass. In the HMD mode, a CMOS camera is installed on a personal cinema system to capture the surgical scene in real-time and transmit the image to the host computer through a USB port. In the Google glass mode, a wireless connection is established between the glass and the host computer for image acquisition and data transport tasks. A software program is written in Python to call OpenCV functions for image calibration, co-registration, fusion, and display with augmented reality. The imaging performance of the surgical navigation system is characterized in a tumor simulating phantom. Image-guided surgical resection is demonstrated in an ex vivo tissue model. Surgical margins identified by the wearable navigation system are co-incident with those acquired by a standard small animal imaging system, indicating the technical feasibility for intraoperative surgical margin detection. The proposed surgical navigation system combines the sensitivity and specificity of a fluorescence imaging system and the mobility of a wearable goggle. It can be potentially used by a surgeon to identify the residual tumor foci and reduce the risk of recurrent diseases without interfering with the regular resection procedure.
Toward information management in corporations (11)
NASA Astrophysics Data System (ADS)
Yamanaka, Yoshiaki
PC/WS's proleferation on to the despk top of endusers result in high level of computer literacies to them, networking between host/departmental/personal equipments also prevails entire organizations. In these circumstance, information architecture and environments will rapidly change in 1990's. Information manager's roles would change in these informated organization. Their roles and responsibilities will shifts to similer ones as other managers roles like human/asset/purchase/financial resources management. Sprit responsibilities between Cief Information Officer and MIS manager also will be seen in 1990's.
NASA Technical Reports Server (NTRS)
Peri, Frank, Jr.
1992-01-01
A flight digital data acquisition system that uses the MIL-STD-1553B bus for transmission of data to a host computer for control law processing is described. The instrument, the Remote Interface Unit (RIU), can accommodate up to 16 input channels and eight output channels. The RIU employs a digital signal processor to perform local digital filtering before sending data to the host. The system allows flexible sensor and actuator data organization to facilitate quick control law computations on the host computer. The instrument can also run simple control laws autonomously without host intervention. The RIU and host computer together have replaced a similar larger, ground minicomputer system with favorable results.
Thorogood, Rose; Davies, Nicholas B.
2016-01-01
Individuals often vary defences in response to local predation or parasitism risk. But how should they assess threat levels when it pays their enemies to hide? For common cuckoo hosts, assessing parasitism risk is challenging: cuckoo eggs are mimetic and adult cuckoos are secretive and resemble hawks. Here, we show that egg rejection by reed warblers depends on combining personal and social information of local risk. We presented model cuckoos or controls at a pair’s own nest (personal information of an intruder) and/or on a neighbouring territory, to which they were attracted by broadcasts of alarm calls (social information). Rejection of an experimental egg was stimulated only when hosts were alerted by both social and personal information of cuckoos. However, pairs that rejected eggs were not more likely to mob a cuckoo. Therefore, while hosts can assess risk from the sight of a cuckoo, a cuckoo cannot gauge if her egg will be accepted from host mobbing. Our results reveal how hosts respond rapidly to local variation in parasitism, and why it pays cuckoos to be secretive, both to avoid alerting their targets and to limit the spread of social information in the local host neighbourhood. PMID:26794435
Real-time software-based end-to-end wireless visual communications simulation platform
NASA Astrophysics Data System (ADS)
Chen, Ting-Chung; Chang, Li-Fung; Wong, Andria H.; Sun, Ming-Ting; Hsing, T. Russell
1995-04-01
Wireless channel impairments pose many challenges to real-time visual communications. In this paper, we describe a real-time software based wireless visual communications simulation platform which can be used for performance evaluation in real-time. This simulation platform consists of two personal computers serving as hosts. Major components of each PC host include a real-time programmable video code, a wireless channel simulator, and a network interface for data transport between the two hosts. The three major components are interfaced in real-time to show the interaction of various wireless channels and video coding algorithms. The programmable features in the above components allow users to do performance evaluation of user-controlled wireless channel effects without physically carrying out these experiments which are limited in scope, time-consuming, and costly. Using this simulation platform as a testbed, we have experimented with several wireless channel effects including Rayleigh fading, antenna diversity, channel filtering, symbol timing, modulation, and packet loss.
Electronic collection system for spacelab mission timeline requirements
NASA Technical Reports Server (NTRS)
Lindberg, James P.; Piner, John R.; Huang, Allen K. H.
1995-01-01
This paper describes the Functional Objective Requirements Collection System (FORCS) software tool that has been developed for use by Principal Investigators (PI's) and Payload Element Developers (PED's) on their own personal computers to develop on-orbit timelining requirements for their payloads. The FORCS tool can be used either in a totally stand-alone mode, storing the information in a local file on the user's personal computer hard disk or in a remote mode where the user's computer is linked to a host computer containing the integrated database of the timeline requirements for all of the payloads on a mission. There are a number of features incorporated in the FORCS software to assist the user. The user may move freely back and forth between the various forms for inputting the data. Several methods are used to input the information, depending on the type of the information. These methods range from filling in text boxes, using check boxes and radio buttons, to inputting information into a spreadsheet format. There are automated features provided to assist in developing the proper format for the data, ranging from limit checking on some of the parameters to automatic conversion of different formats of time data inputs to the one standard format used for the timeline scheduling software.
Watching elderly and disabled person's physical condition by remotely controlled monorail robot
NASA Astrophysics Data System (ADS)
Nagasaka, Yasunori; Matsumoto, Yoshinori; Fukaya, Yasutoshi; Takahashi, Tomoichi; Takeshita, Toru
2001-10-01
We are developing a nursing system using robots and cameras. The cameras are mounted on a remote controlled monorail robot which moves inside a room and watches the elderly. It is necessary to pay attention to the elderly at home or nursing homes all time. This requires staffs to pay attention to them at every time. The purpose of our system is to help those staffs. This study intends to improve such situation. A host computer controls a monorail robot to go in front of the elderly using the images taken by cameras on the ceiling. A CCD camera is mounted on the monorail robot to take pictures of their facial expression or movements. The robot sends the images to a host computer that checks them whether something unusual happens or not. We propose a simple calibration method for positioning the monorail robots to track the moves of the elderly for keeping their faces at center of camera view. We built a small experiment system, and evaluated our camera calibration method and image processing algorithm.
NASA Technical Reports Server (NTRS)
Rorvig, Mark E.
1991-01-01
Vector-product information retrieval (IR) systems produce retrieval results superior to all other searching methods but presently have no commercial implementations beyond the personal computer environment. The NASA Electronic Library Systems (NELS) provides a ranked list of the most likely relevant objects in collections in response to a natural language query. Additionally, the system is constructed using standards and tools (Unix, X-Windows, Notif, and TCP/IP) that permit its operation in organizations that possess many different hosts, workstations, and platforms. There are no known commercial equivalents to this product at this time. The product has applications in all corporate management environments, particularly those that are information intensive, such as finance, manufacturing, biotechnology, and research and development.
Summary of talks and papers at ISCB-Asia/SCCG 2012
2013-01-01
The second ISCB-Asia conference of the International Society for Computational Biology took place December 17-19, 2012, in Shenzhen, China. The conference was co-hosted by BGI as the first Shenzhen Conference on Computational Genomics (SCCG). 45 talks were presented at ISCB-Asia/SCCG 2012. The topics covered included software tools, reproducible computing, next-generation sequencing data analysis, transcription and mRNA regulation, protein structure and function, cancer genomics and personalized medicine. Nine of the proceedings track talks are included as full papers in this supplement. In this report we first give a short overview of the conference by listing some statistics and visualizing the talk abstracts as word clouds. Then we group the talks by topic and briefly summarize each one, providing references to related publications whenever possible. Finally, we close with a few comments on the success of this conference.
NASA Technical Reports Server (NTRS)
Fijany, Amir (Inventor); Bejczy, Antal K. (Inventor)
1993-01-01
This is a real-time robotic controller and simulator which is a MIMD-SIMD parallel architecture for interfacing with an external host computer and providing a high degree of parallelism in computations for robotic control and simulation. It includes a host processor for receiving instructions from the external host computer and for transmitting answers to the external host computer. There are a plurality of SIMD microprocessors, each SIMD processor being a SIMD parallel processor capable of exploiting fine grain parallelism and further being able to operate asynchronously to form a MIMD architecture. Each SIMD processor comprises a SIMD architecture capable of performing two matrix-vector operations in parallel while fully exploiting parallelism in each operation. There is a system bus connecting the host processor to the plurality of SIMD microprocessors and a common clock providing a continuous sequence of clock pulses. There is also a ring structure interconnecting the plurality of SIMD microprocessors and connected to the clock for providing the clock pulses to the SIMD microprocessors and for providing a path for the flow of data and instructions between the SIMD microprocessors. The host processor includes logic for controlling the RRCS by interpreting instructions sent by the external host computer, decomposing the instructions into a series of computations to be performed by the SIMD microprocessors, using the system bus to distribute associated data among the SIMD microprocessors, and initiating activity of the SIMD microprocessors to perform the computations on the data by procedure call.
Documentary of MFENET, a national computer network
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shuttleworth, B.O.
1977-06-01
The national Magnetic Fusion Energy Computer Network (MFENET) is a newly operational star network of geographically separated heterogeneous hosts and a communications subnetwork of PDP-11 processors. Host processors interfaced to the subnetwork currently include a CDC 7600 at the Central Computer Center (CCC) and several DECsystem-10's at User Service Centers (USC's). The network was funded by a U.S. government agency (ERDA) to provide in an economical manner the needed computational resources to magnetic confinement fusion researchers. Phase I operation of MFENET distributed the processing power of the CDC 7600 among the USC's through the provision of file transport between anymore » two hosts and remote job entry to the 7600. Extending the capabilities of Phase I, MFENET Phase II provided interactive terminal access to the CDC 7600 from the USC's. A file management system is maintained at the CCC for all network users. The history and development of MFENET are discussed, with emphasis on the protocols used to link the host computers and the USC software. Comparisons are made of MFENET versus ARPANET (Advanced Research Projects Agency Computer Network) and DECNET (Digital Distributed Network Architecture). DECNET and MFENET host-to host, host-to-CCP, and link protocols are discussed in detail. The USC--CCP interface is described briefly. 43 figures, 2 tables.« less
Microcomputer software development facilities
NASA Technical Reports Server (NTRS)
Gorman, J. S.; Mathiasen, C.
1980-01-01
A more efficient and cost effective method for developing microcomputer software is to utilize a host computer with high-speed peripheral support. Application programs such as cross assemblers, loaders, and simulators are implemented in the host computer for each of the microcomputers for which software development is a requirement. The host computer is configured to operate in a time share mode for multiusers. The remote terminals, printers, and down loading capabilities provided are based on user requirements. With this configuration a user, either local or remote, can use the host computer for microcomputer software development. Once the software is developed (through the code and modular debug stage) it can be downloaded to the development system or emulator in a test area where hardware/software integration functions can proceed. The microcomputer software program sources reside in the host computer and can be edited, assembled, loaded, and then downloaded as required until the software development project has been completed.
Single-chip pulse programmer for magnetic resonance imaging using a 32-bit microcontroller.
Handa, Shinya; Domalain, Thierry; Kose, Katsumi
2007-08-01
A magnetic resonance imaging (MRI) pulse programmer has been developed using a single-chip microcontroller (ADmicroC7026). The microcontroller includes all the components required for the MRI pulse programmer: a 32-bit RISC CPU core, 62 kbytes of flash memory, 8 kbytes of SRAM, two 32-bit timers, four 12-bit DA converters, and 40 bits of general purpose I/O. An evaluation board for the microcontroller was connected to a host personal computer (PC), an MRI transceiver, and a gradient driver using interface circuitry. Target (embedded) and host PC programs were developed to enable MRI pulse sequence generation by the microcontroller. The pulse programmer achieved a (nominal) time resolution of approximately 100 ns and a minimum time delay between successive events of approximately 9 micros. Imaging experiments using the pulse programmer demonstrated the effectiveness of our approach.
Single-chip pulse programmer for magnetic resonance imaging using a 32-bit microcontroller
NASA Astrophysics Data System (ADS)
Handa, Shinya; Domalain, Thierry; Kose, Katsumi
2007-08-01
A magnetic resonance imaging (MRI) pulse programmer has been developed using a single-chip microcontroller (ADμC7026). The microcontroller includes all the components required for the MRI pulse programmer: a 32-bit RISC CPU core, 62kbytes of flash memory, 8kbytes of SRAM, two 32-bit timers, four 12-bit DA converters, and 40bits of general purpose I/O. An evaluation board for the microcontroller was connected to a host personal computer (PC), an MRI transceiver, and a gradient driver using interface circuitry. Target (embedded) and host PC programs were developed to enable MRI pulse sequence generation by the microcontroller. The pulse programmer achieved a (nominal) time resolution of approximately 100ns and a minimum time delay between successive events of approximately 9μs. Imaging experiments using the pulse programmer demonstrated the effectiveness of our approach.
An automated procedure for developing hybrid computer simulations of turbofan engines
NASA Technical Reports Server (NTRS)
Szuch, J. R.; Krosel, S. M.
1980-01-01
A systematic, computer-aided, self-documenting methodology for developing hybrid computer simulations of turbofan engines is presented. The methodology makes use of a host program that can run on a large digital computer and a machine-dependent target (hybrid) program. The host program performs all of the calculations and date manipulations needed to transform user-supplied engine design information to a form suitable for the hybrid computer. The host program also trims the self contained engine model to match specified design point information. A test case is described and comparisons between hybrid simulation and specified engine performance data are presented.
Scattering Properties of Heterogeneous Mineral Particles with Absorbing Inclusions
NASA Technical Reports Server (NTRS)
Dlugach, Janna M.; Mishchenko, Michael I.
2015-01-01
We analyze the results of numerically exact computer modeling of scattering and absorption properties of randomly oriented poly-disperse heterogeneous particles obtained by placing microscopic absorbing grains randomly on the surfaces of much larger spherical mineral hosts or by imbedding them randomly inside the hosts. These computations are paralleled by those for heterogeneous particles obtained by fully encapsulating fractal-like absorbing clusters in the mineral hosts. All computations are performed using the superposition T-matrix method. In the case of randomly distributed inclusions, the results are compared with the outcome of Lorenz-Mie computations for an external mixture of the mineral hosts and absorbing grains. We conclude that internal aggregation can affect strongly both the integral radiometric and differential scattering characteristics of the heterogeneous particle mixtures.
Podcasting: contemporary patient education.
Abreu, Daniel V; Tamura, Thomas K; Sipp, J Andrew; Keamy, Donald G; Eavey, Roland D
2008-04-01
Portable video technology is a widely available new tool with potential to be used by pediatric otolaryngology practices for patient and family education. Podcasts are media broadcasts that employ this new technology. They can be accessed via the Internet and viewed either on a personal computer or on a handheld device, such as an iPod or an MP3 player. We wished to examine the feasibility of establishing a podcast-hosting Web site. We digitally recorded pediatric otologic procedures in the operating room and saved the digital files to DVDs. We then edited the DVDs at home with video-editing software on a personal computer. Next, spoken narrative was recorded with audio-recording software and combined with the edited video clips. The final products were converted into the M4V file format, and the final versions were uploaded onto our hospital's Web site. We then downloaded the podcasts onto a high-quality portable media player so that we could evaluate their quality. All of the podcasts are now on the hospital Web site, where they can be downloaded by patients and families at no cost. The site includes instructions on how to download the appropriate free software for viewing the podcasts on a portable media player or on a computer. Using this technology for patient education expands the audience and permits portability of information. We conclude that a home computer can be used to inexpensively create informative surgery demonstrations that can be accessed via a Web site and transferred to portable viewing devices with excellent quality.
Measurement system for nitrous oxide based on amperometric gas sensor
NASA Astrophysics Data System (ADS)
Siswoyo, S.; Persaud, K. C.; Phillips, V. R.; Sneath, R.
2017-03-01
It has been well known that nitrous oxide is an important greenhouse gas, so monitoring and control of its concentration and emission is very important. In this work a nitrous oxide measurement system has been developed consisting of an amperometric sensor and an appropriate lab-made potentiostat that capable measuring picoampere current ranges. The sensor was constructed using a gold microelectrode as working electrode surrounded by a silver wire as quasi reference electrode, with tetraethyl ammonium perchlorate and dimethylsulphoxide as supporting electrolyte and solvent respectively. The lab-made potentiostat was built incorporating a transimpedance amplifier capable of picoampere measurements. This also incorporated a microcontroller based data acquisition system, controlled by a host personal computer using a dedicated computer program. The system was capable of detecting N2O concentrations down to 0.07 % v/v.
NASA Astrophysics Data System (ADS)
Kong, D.; Donnellan, A.; Pierce, M. E.
2012-12-01
QuakeSim is an online computational framework focused on using remotely sensed geodetic imaging data to model and understand earthquakes. With the rise in online social networking over the last decade, many tools and concepts have been developed that are useful to research groups. In particular, QuakeSim is interested in the ability for researchers to post, share, and annotate files generated by modeling tools in order to facilitate collaboration. To accomplish this, features were added to the preexisting QuakeSim site that include single sign-on, automated saving of output from modeling tools, and a personal user space to manage sharing permissions on these saved files. These features implement OpenID and Lightweight Data Access Protocol (LDAP) technologies to manage files across several different servers, including a web server running Drupal and other servers hosting the computational tools themselves.
The role of the host in a cooperating mainframe and workstation environment, volumes 1 and 2
NASA Technical Reports Server (NTRS)
Kusmanoff, Antone; Martin, Nancy L.
1989-01-01
In recent years, advancements made in computer systems have prompted a move from centralized computing based on timesharing a large mainframe computer to distributed computing based on a connected set of engineering workstations. A major factor in this advancement is the increased performance and lower cost of engineering workstations. The shift to distributed computing from centralized computing has led to challenges associated with the residency of application programs within the system. In a combined system of multiple engineering workstations attached to a mainframe host, the question arises as to how does a system designer assign applications between the larger mainframe host and the smaller, yet powerful, workstation. The concepts related to real time data processing are analyzed and systems are displayed which use a host mainframe and a number of engineering workstations interconnected by a local area network. In most cases, distributed systems can be classified as having a single function or multiple functions and as executing programs in real time or nonreal time. In a system of multiple computers, the degree of autonomy of the computers is important; a system with one master control computer generally differs in reliability, performance, and complexity from a system in which all computers share the control. This research is concerned with generating general criteria principles for software residency decisions (host or workstation) for a diverse yet coupled group of users (the clustered workstations) which may need the use of a shared resource (the mainframe) to perform their functions.
2012-01-01
Background Bioinformatics services have been traditionally provided in the form of a web-server that is hosted at institutional infrastructure and serves multiple users. This model, however, is not flexible enough to cope with the increasing number of users, increasing data size, and new requirements in terms of speed and availability of service. The advent of cloud computing suggests a new service model that provides an efficient solution to these problems, based on the concepts of "resources-on-demand" and "pay-as-you-go". However, cloud computing has not yet been introduced within bioinformatics servers due to the lack of usage scenarios and software layers that address the requirements of the bioinformatics domain. Results In this paper, we provide different use case scenarios for providing cloud computing based services, considering both the technical and financial aspects of the cloud computing service model. These scenarios are for individual users seeking computational power as well as bioinformatics service providers aiming at provision of personalized bioinformatics services to their users. We also present elasticHPC, a software package and a library that facilitates the use of high performance cloud computing resources in general and the implementation of the suggested bioinformatics scenarios in particular. Concrete examples that demonstrate the suggested use case scenarios with whole bioinformatics servers and major sequence analysis tools like BLAST are presented. Experimental results with large datasets are also included to show the advantages of the cloud model. Conclusions Our use case scenarios and the elasticHPC package are steps towards the provision of cloud based bioinformatics services, which would help in overcoming the data challenge of recent biological research. All resources related to elasticHPC and its web-interface are available at http://www.elasticHPC.org. PMID:23281941
El-Kalioby, Mohamed; Abouelhoda, Mohamed; Krüger, Jan; Giegerich, Robert; Sczyrba, Alexander; Wall, Dennis P; Tonellato, Peter
2012-01-01
Bioinformatics services have been traditionally provided in the form of a web-server that is hosted at institutional infrastructure and serves multiple users. This model, however, is not flexible enough to cope with the increasing number of users, increasing data size, and new requirements in terms of speed and availability of service. The advent of cloud computing suggests a new service model that provides an efficient solution to these problems, based on the concepts of "resources-on-demand" and "pay-as-you-go". However, cloud computing has not yet been introduced within bioinformatics servers due to the lack of usage scenarios and software layers that address the requirements of the bioinformatics domain. In this paper, we provide different use case scenarios for providing cloud computing based services, considering both the technical and financial aspects of the cloud computing service model. These scenarios are for individual users seeking computational power as well as bioinformatics service providers aiming at provision of personalized bioinformatics services to their users. We also present elasticHPC, a software package and a library that facilitates the use of high performance cloud computing resources in general and the implementation of the suggested bioinformatics scenarios in particular. Concrete examples that demonstrate the suggested use case scenarios with whole bioinformatics servers and major sequence analysis tools like BLAST are presented. Experimental results with large datasets are also included to show the advantages of the cloud model. Our use case scenarios and the elasticHPC package are steps towards the provision of cloud based bioinformatics services, which would help in overcoming the data challenge of recent biological research. All resources related to elasticHPC and its web-interface are available at http://www.elasticHPC.org.
Aukema, Kelly G; Escalante, Diego E; Maltby, Meghan M; Bera, Asim K; Aksan, Alptekin; Wackett, Lawrence P
2017-01-17
Emerging contaminants are principally personal care products not readily removed by conventional wastewater treatment and, with an increasing reliance on water recycling, become disseminated in drinking water supplies. Carbamazepine, a widely used neuroactive pharmaceutical, increasingly escapes wastewater treatment and is found in potable water. In this study, a mechanism is proposed by which carbamazepine resists biodegradation, and a previously unknown microbial biodegradation was predicted computationally. The prediction identified biphenyl dioxygenase from Paraburkholderia xenovorans LB400 as the best candidate enzyme for metabolizing carbamazepine. The rate of degradation described here is 40 times greater than the best reported rates. The metabolites cis-10,11-dihydroxy-10,11-dihydrocarbamazepine and cis-2,3-dihydroxy-2,3-dihydrocarbamazepine were demonstrated with the native organism and a recombinant host. The metabolites are considered nonharmful and mitigate the generation of carcinogenic acridine products known to form when advanced oxidation methods are used in water treatment. Other recalcitrant personal care products were subjected to prediction by the Pathway Prediction System and tested experimentally with P. xenovorans LB400. It was shown to biodegrade structurally diverse compounds. Predictions indicated hydrolase or oxygenase enzymes catalyzed the initial reactions. This study highlights the potential for using the growing body of enzyme-structural and genomic information with computational methods to rapidly identify enzymes and microorganisms that biodegrade emerging contaminants.
Evaluating virtual hosted desktops for graphics-intensive astronomy
NASA Astrophysics Data System (ADS)
Meade, B. F.; Fluke, C. J.
2018-04-01
Visualisation of data is critical to understanding astronomical phenomena. Today, many instruments produce datasets that are too big to be downloaded to a local computer, yet many of the visualisation tools used by astronomers are deployed only on desktop computers. Cloud computing is increasingly used to provide a computation and simulation platform in astronomy, but it also offers great potential as a visualisation platform. Virtual hosted desktops, with graphics processing unit (GPU) acceleration, allow interactive, graphics-intensive desktop applications to operate co-located with astronomy datasets stored in remote data centres. By combining benchmarking and user experience testing, with a cohort of 20 astronomers, we investigate the viability of replacing physical desktop computers with virtual hosted desktops. In our work, we compare two Apple MacBook computers (one old and one new, representing hardware and opposite ends of the useful lifetime) with two virtual hosted desktops: one commercial (Amazon Web Services) and one in a private research cloud (the Australian NeCTAR Research Cloud). For two-dimensional image-based tasks and graphics-intensive three-dimensional operations - typical of astronomy visualisation workflows - we found that benchmarks do not necessarily provide the best indication of performance. When compared to typical laptop computers, virtual hosted desktops can provide a better user experience, even with lower performing graphics cards. We also found that virtual hosted desktops are equally simple to use, provide greater flexibility in choice of configuration, and may actually be a more cost-effective option for typical usage profiles.
Computational approaches to predict bacteriophage–host relationships
Edwards, Robert A.; McNair, Katelyn; Faust, Karoline; Raes, Jeroen; Dutilh, Bas E.
2015-01-01
Metagenomics has changed the face of virus discovery by enabling the accurate identification of viral genome sequences without requiring isolation of the viruses. As a result, metagenomic virus discovery leaves the first and most fundamental question about any novel virus unanswered: What host does the virus infect? The diversity of the global virosphere and the volumes of data obtained in metagenomic sequencing projects demand computational tools for virus–host prediction. We focus on bacteriophages (phages, viruses that infect bacteria), the most abundant and diverse group of viruses found in environmental metagenomes. By analyzing 820 phages with annotated hosts, we review and assess the predictive power of in silico phage–host signals. Sequence homology approaches are the most effective at identifying known phage–host pairs. Compositional and abundance-based methods contain significant signal for phage–host classification, providing opportunities for analyzing the unknowns in viral metagenomes. Together, these computational approaches further our knowledge of the interactions between phages and their hosts. Importantly, we find that all reviewed signals significantly link phages to their hosts, illustrating how current knowledge and insights about the interaction mechanisms and ecology of coevolving phages and bacteria can be exploited to predict phage–host relationships, with potential relevance for medical and industrial applications. PMID:26657537
Monitoring system including an electronic sensor platform and an interrogation transceiver
Kinzel, Robert L.; Sheets, Larry R.
2003-09-23
A wireless monitoring system suitable for a wide range of remote data collection applications. The system includes at least one Electronic Sensor Platform (ESP), an Interrogator Transceiver (IT) and a general purpose host computer. The ESP functions as a remote data collector from a number of digital and analog sensors located therein. The host computer provides for data logging, testing, demonstration, installation checkout, and troubleshooting of the system. The IT transmits signals from one or more ESP's to the host computer to the ESP's. The IT host computer may be powered by a common power supply, and each ESP is individually powered by a battery. This monitoring system has an extremely low power consumption which allows remote operation of the ESP for long periods; provides authenticated message traffic over a wireless network; utilizes state-of-health and tamper sensors to ensure that the ESP is secure and undamaged; has robust housing of the ESP suitable for use in radiation environments; and is low in cost. With one base station (host computer and interrogator transceiver), multiple ESP's may be controlled at a single monitoring site.
Experiencing transformation: the case of Jordanian nurse immigrating to the UK.
Al-Hamdan, Zaid M; Al-Nawafleh, Ahmad H; Bawadi, Hala A; James, Veronica; Matiti, Milika; Hagerty, Bonnie M
2015-08-01
This study explored how Jordanian nurses experienced the transition from home to host country to illuminate the elements of transformation. Much research has been conducted on topics such as the current international nursing shortage and the recruitment of nurses from various countries. International nurses have unique needs with regard to adapting to new host cultures and workplaces; furthermore, the literature has revealed little evidence of nurses' professional and personal experiences related to migration. A qualitative study was conducted, collecting data via individual interviews. Twenty-five face-to-face and telephone interviews with Jordanian migrant nurses. This study showed that living and working in a host country changes the personal, social and professional attributes of migrant nurses. When nurses migrate, they encounter opportunities and significant challenges in their professional and personal lives. Although Jordanian nurses contributed their knowledge and skills to the UK healthcare system, they encountered enormous professional adaptation demands. Work setting discrepancies between source and host country are likely a major element behind the required nursing profession alteration. nurses' lives are transformed in terms of their personal and social networks in the host country. Social transformation is an integral and inseparable part of engagement with professional organisation(s) in the host community. Professional integration likely has far-reaching effects and consequences involving not only the individual but also their home and host country families and their professional networks. To provide high-quality nursing care, we must learn about the transformation experience, expand our sense of who we are and gain a degree of control over how we perform our nursing roles when we move away from our home. © 2015 John Wiley & Sons Ltd.
Arranging computer architectures to create higher-performance controllers
NASA Technical Reports Server (NTRS)
Jacklin, Stephen A.
1988-01-01
Techniques for integrating microprocessors, array processors, and other intelligent devices in control systems are reviewed, with an emphasis on the (re)arrangement of components to form distributed or parallel processing systems. Consideration is given to the selection of the host microprocessor, increasing the power and/or memory capacity of the host, multitasking software for the host, array processors to reduce computation time, the allocation of real-time and non-real-time events to different computer subsystems, intelligent devices to share the computational burden for real-time events, and intelligent interfaces to increase communication speeds. The case of a helicopter vibration-suppression and stabilization controller is analyzed as an example, and significant improvements in computation and throughput rates are demonstrated.
Treecode with a Special-Purpose Processor
NASA Astrophysics Data System (ADS)
Makino, Junichiro
1991-08-01
We describe an implementation of the modified Barnes-Hut tree algorithm for a gravitational N-body calculation on a GRAPE (GRAvity PipE) backend processor. GRAPE is a special-purpose computer for N-body calculations. It receives the positions and masses of particles from a host computer and then calculates the gravitational force at each coordinate specified by the host. To use this GRAPE processor with the hierarchical tree algorithm, the host computer must maintain a list of all nodes that exert force on a particle. If we create this list for each particle of the system at each timestep, the number of floating-point operations on the host and that on GRAPE would become comparable, and the increased speed obtained by using GRAPE would be small. In our modified algorithm, we create a list of nodes for many particles. Thus, the amount of the work required of the host is significantly reduced. This algorithm was originally developed by Barnes in order to vectorize the force calculation on a Cyber 205. With this algorithm, the computing time of the force calculation becomes comparable to that of the tree construction, if the GRAPE backend processor is sufficiently fast. The obtained speed-up factor is 30 to 50 for a RISC-based host computer and GRAPE-1A with a peak speed of 240 Mflops.
Contributing opportunistic resources to the grid with HTCondor-CE-Bosco
NASA Astrophysics Data System (ADS)
Weitzel, Derek; Bockelman, Brian
2017-10-01
The HTCondor-CE [1] is the primary Compute Element (CE) software for the Open Science Grid. While it offers many advantages for large sites, for smaller, WLCG Tier-3 sites or opportunistic clusters, it can be a difficult task to install, configure, and maintain the HTCondor-CE. Installing a CE typically involves understanding several pieces of software, installing hundreds of packages on a dedicated node, updating several configuration files, and implementing grid authentication mechanisms. On the other hand, accessing remote clusters from personal computers has been dramatically improved with Bosco: site admins only need to setup SSH public key authentication and appropriate accounts on a login host. In this paper, we take a new approach with the HTCondor-CE-Bosco, a CE which combines the flexibility and reliability of the HTCondor-CE with the easy-to-install Bosco. The administrators of the opportunistic resource are not required to install any software: only SSH access and a user account are required from the host site. The OSG can then run the grid-specific portions from a central location. This provides a new, more centralized, model for running grid services, which complements the traditional distributed model. We will show the architecture of a HTCondor-CE-Bosco enabled site, as well as feedback from multiple sites that have deployed it.
NASA Astrophysics Data System (ADS)
Meurant, Robert C.
Sorting of Korean English-as-a-Foreign-Language (EFL) university students by Second Language (L2) aptitude allocates students to classes of compatible ability level, and was here used to screen candidates for interview. Paper-and-pen versions of the Oxford Quick Placement Test were adapted to computer-based testing via online hosting using FSCreations ExamView. Problems with their online hosting site led to conversion to the popular computer-based learning management system Moodle, hosted on www.ninehub.com. 317 sophomores were tested online to encourage L2 digital literacy. Strategies for effective hybrid implementation of Learning Management Systems in L2 tertiary education include computer-based Internet-hosted L2 aptitude tests. These potentially provide a convenient measure of student progress in developing L2 fluency, and offer a more objective and relevant means of teacher- and course-assessment than student evaluations, which tend to confuse entertainment value and teacher popularity with academic credibility and pedagogical effectiveness.
Protecting software agents from malicious hosts using quantum computing
NASA Astrophysics Data System (ADS)
Reisner, John; Donkor, Eric
2000-07-01
We evaluate how quantum computing can be applied to security problems for software agents. Agent-based computing, which merges technological advances in artificial intelligence and mobile computing, is a rapidly growing domain, especially in applications such as electronic commerce, network management, information retrieval, and mission planning. System security is one of the more eminent research areas in agent-based computing, and the specific problem of protecting a mobile agent from a potentially hostile host is one of the most difficult of these challenges. In this work, we describe our agent model, and discuss the capabilities and limitations of classical solutions to the malicious host problem. Quantum computing may be extremely helpful in addressing the limitations of classical solutions to this problem. This paper highlights some of the areas where quantum computing could be applied to agent security.
NASA Technical Reports Server (NTRS)
Szuch, J. R.; Krosel, S. M.; Bruton, W. M.
1982-01-01
A systematic, computer-aided, self-documenting methodology for developing hybrid computer simulations of turbofan engines is presented. The methodology that is pesented makes use of a host program that can run on a large digital computer and a machine-dependent target (hybrid) program. The host program performs all the calculations and data manipulations that are needed to transform user-supplied engine design information to a form suitable for the hybrid computer. The host program also trims the self-contained engine model to match specified design-point information. Part I contains a general discussion of the methodology, describes a test case, and presents comparisons between hybrid simulation and specified engine performance data. Part II, a companion document, contains documentation, in the form of computer printouts, for the test case.
Semi-automatic object geometry estimation for image personalization
NASA Astrophysics Data System (ADS)
Ding, Hengzhou; Bala, Raja; Fan, Zhigang; Eschbach, Reiner; Bouman, Charles A.; Allebach, Jan P.
2010-01-01
Digital printing brings about a host of benefits, one of which is the ability to create short runs of variable, customized content. One form of customization that is receiving much attention lately is in photofinishing applications, whereby personalized calendars, greeting cards, and photo books are created by inserting text strings into images. It is particularly interesting to estimate the underlying geometry of the surface and incorporate the text into the image content in an intelligent and natural way. Current solutions either allow fixed text insertion schemes into preprocessed images, or provide manual text insertion tools that are time consuming and aimed only at the high-end graphic designer. It would thus be desirable to provide some level of automation in the image personalization process. We propose a semi-automatic image personalization workflow which includes two scenarios: text insertion and text replacement. In both scenarios, the underlying surfaces are assumed to be planar. A 3-D pinhole camera model is used for rendering text, whose parameters are estimated by analyzing existing structures in the image. Techniques in image processing and computer vison such as the Hough transform, the bilateral filter, and connected component analysis are combined, along with necessary user inputs. In particular, the semi-automatic workflow is implemented as an image personalization tool, which is presented in our companion paper.1 Experimental results including personalized images for both scenarios are shown, which demonstrate the effectiveness of our algorithms.
Wolinski, Christophe Czeslaw [Los Alamos, NM; Gokhale, Maya B [Los Alamos, NM; McCabe, Kevin Peter [Los Alamos, NM
2011-01-18
Fabric-based computing systems and methods are disclosed. A fabric-based computing system can include a polymorphous computing fabric that can be customized on a per application basis and a host processor in communication with said polymorphous computing fabric. The polymorphous computing fabric includes a cellular architecture that can be highly parameterized to enable a customized synthesis of fabric instances for a variety of enhanced application performances thereof. A global memory concept can also be included that provides the host processor random access to all variables and instructions associated with the polymorphous computing fabric.
Frank, M S; Dreyer, K
2001-06-01
We describe a virtual web site hosting technology that enables educators in radiology to emblazon and make available for delivery on the world wide web their own interactive educational content, free from dependencies on in-house resources and policies. This suite of technologies includes a graphically oriented software application, designed for the computer novice, to facilitate the input, storage, and management of domain expertise within a database system. The database stores this expertise as choreographed and interlinked multimedia entities including text, imagery, interactive questions, and audio. Case-based presentations or thematic lectures can be authored locally, previewed locally within a web browser, then uploaded at will as packaged knowledge objects to an educator's (or department's) personal web site housed within a virtual server architecture. This architecture can host an unlimited number of unique educational web sites for individuals or departments in need of such service. Each virtual site's content is stored within that site's protected back-end database connected to Internet Information Server (Microsoft Corp, Redmond WA) using a suite of Active Server Page (ASP) modules that incorporate Microsoft's Active Data Objects (ADO) technology. Each person's or department's electronic teaching material appears as an independent web site with different levels of access--controlled by a username-password strategy--for teachers and students. There is essentially no static hypertext markup language (HTML). Rather, all pages displayed for a given site are rendered dynamically from case-based or thematic content that is fetched from that virtual site's database. The dynamically rendered HTML is displayed within a web browser in a Socratic fashion that can assess the recipient's current fund of knowledge while providing instantaneous user-specific feedback. Each site is emblazoned with the logo and identification of the participating institution. Individuals with teacher-level access can use a web browser to upload new content as well as manage content already stored on their virtual site. Each virtual site stores, collates, and scores participants' responses to the interactive questions posed on line. This virtual web site strategy empowers the educator with an end-to-end solution for creating interactive educational content and hosting that content within the educator's personalized and protected educational site on the world wide web, thus providing a valuable outlet that can magnify the impact of his or her talents and contributions.
NASA Technical Reports Server (NTRS)
Grantham, C.
1979-01-01
The Interactive Software Invocation (ISIS), an interactive data management system, was developed to act as a buffer between the user and host computer system. The user is provided by ISIS with a powerful system for developing software or systems in the interactive environment. The user is protected from the idiosyncracies of the host computer system by providing such a complete range of capabilities that the user should have no need for direct access to the host computer. These capabilities are divided into four areas: desk top calculator, data editor, file manager, and tool invoker.
KNET - DISTRIBUTED COMPUTING AND/OR DATA TRANSFER PROGRAM
NASA Technical Reports Server (NTRS)
Hui, J.
1994-01-01
KNET facilitates distributed computing between a UNIX compatible local host and a remote host which may or may not be UNIX compatible. It is capable of automatic remote login. That is, it performs on the user's behalf the chore of handling host selection, user name, and password to the designated host. Once the login has been successfully completed, the user may interactively communicate with the remote host. Data output from the remote host may be directed to the local screen, to a local file, and/or to a local process. Conversely, data input from the keyboard, a local file, or a local process may be directed to the remote host. KNET takes advantage of the multitasking and terminal mode control features of the UNIX operating system. A parent process is used as the upper layer for interfacing with the local user. A child process is used for a lower layer for interfacing with the remote host computer, and optionally one or more child processes can be used for the remote data output. Output may be directed to the screen and/or to the local processes under the control of a data pipe switch. In order for KNET to operate, the local and remote hosts must observe a common communications protocol. KNET is written in ANSI standard C-language for computers running UNIX. It has been successfully implemented on several Sun series computers and a DECstation 3100 and used to run programs remotely on VAX VMS and UNIX based computers. It requires 100K of RAM under SunOS and 120K of RAM under DEC RISC ULTRIX. An electronic copy of the documentation is provided on the distribution medium. The standard distribution medium for KNET is a .25 inch streaming magnetic tape cartridge in UNIX tar format. It is also available on a 3.5 inch diskette in UNIX tar format. KNET was developed in 1991 and is a copyrighted work with all copyright vested in NASA. UNIX is a registered trademark of AT&T Bell Laboratories. Sun and SunOS are trademarks of Sun Microsystems, Inc. DECstation, VAX, VMS, and ULTRIX are trademarks of Digital Equipment Corporation.
Distributed solar radiation fast dynamic measurement for PV cells
NASA Astrophysics Data System (ADS)
Wan, Xuefen; Yang, Yi; Cui, Jian; Du, Xingjing; Zheng, Tao; Sardar, Muhammad Sohail
2017-10-01
To study the operating characteristics about PV cells, attention must be given to the dynamic behavior of the solar radiation. The dynamic behaviors of annual, monthly, daily and hourly averages of solar radiation have been studied in detail. But faster dynamic behaviors of solar radiation need more researches. The solar radiation random fluctuations in minute-long or second-long range, which lead to alternating radiation and cool down/warm up PV cell frequently, decrease conversion efficiency. Fast dynamic processes of solar radiation are mainly relevant to stochastic moving of clouds. Even in clear sky condition, the solar irradiations show a certain degree of fast variation. To evaluate operating characteristics of PV cells under fast dynamic irradiation, a solar radiation measuring array (SRMA) based on large active area photodiode, LoRa spread spectrum communication and nanoWatt MCU is proposed. This cross photodiodes structure tracks fast stochastic moving of clouds. To compensate response time of pyranometer and reduce system cost, the terminal nodes with low-cost fast-responded large active area photodiode are placed besides positions of tested PV cells. A central node, consists with pyranometer, large active area photodiode, wind detector and host computer, is placed in the center of the central topologies coordinate to scale temporal envelope of solar irradiation and get calibration information between pyranometer and large active area photodiodes. In our SRMA system, the terminal nodes are designed based on Microchip's nanoWatt XLP PIC16F1947. FDS-100 is adopted for large active area photodiode in terminal nodes and host computer. The output current and voltage of each PV cell are monitored by I/V measurement. AS62-T27/SX1278 LoRa communication modules are used for communicating between terminal nodes and host computer. Because the LoRa LPWAN (Low Power Wide Area Network) specification provides seamless interoperability among Smart Things without the need of complex local installations, configuring of our SRMA system is very easy. Lora also provides SRMA a means to overcome the short communication distance and weather signal propagation decline such as in ZigBee and WiFi. The host computer in SRMA system uses the low power single-board PC EMB-3870 which was produced by NORCO. Wind direction sensor SM5386B and wind-force sensor SM5387B are installed to host computer through RS-485 bus for wind reference data collection. And Davis 6450 solar radiation sensor, which is a precision instrument that detects radiation at wavelengths of 300 to 1100 nanometers, allow host computer to follow real-time solar radiation. A LoRa polling scheme is adopt for the communication between host computer and terminal nodes in SRMA. An experimental SRMA has been established. This system was tested in Ganyu, Jiangshu province from May to August, 2016. In the test, the distances between the nodes and the host computer were between 100m and 1900m. At work, SRMA system showed higher reliability. Terminal nodes could follow the instructions from host computer and collect solar radiation data of distributed PV cells effectively. And the host computer managed the SRAM and achieves reference parameters well. Communications between the host computer and terminal nodes were almost unaffected by the weather. In conclusion, the testing results show that SRMA could be a capable method for fast dynamic measuring about solar radiation and related PV cell operating characteristics.
Host-Microbiome Interaction and Cancer: Potential Application in Precision Medicine
Contreras, Alejandra V.; Cocom-Chan, Benjamin; Hernandez-Montes, Georgina; Portillo-Bobadilla, Tobias; Resendis-Antonio, Osbaldo
2016-01-01
It has been experimentally shown that host-microbial interaction plays a major role in shaping the wellness or disease of the human body. Microorganisms coexisting in human tissues provide a variety of benefits that contribute to proper functional activity in the host through the modulation of fundamental processes such as signal transduction, immunity and metabolism. The unbalance of this microbial profile, or dysbiosis, has been correlated with the genesis and evolution of complex diseases such as cancer. Although this latter disease has been thoroughly studied using different high-throughput (HT) technologies, its heterogeneous nature makes its understanding and proper treatment in patients a remaining challenge in clinical settings. Notably, given the outstanding role of host-microbiome interactions, the ecological interactions with microorganisms have become a new significant aspect in the systems that can contribute to the diagnosis and potential treatment of solid cancers. As a part of expanding precision medicine in the area of cancer research, efforts aimed at effective treatments for various kinds of cancer based on the knowledge of genetics, biology of the disease and host-microbiome interactions might improve the prediction of disease risk and implement potential microbiota-directed therapeutics. In this review, we present the state of the art of sequencing and metabolome technologies, computational methods and schemes in systems biology that have addressed recent breakthroughs of uncovering relationships or associations between microorganisms and cancer. Together, microbiome studies extend the horizon of new personalized treatments against cancer from the perspective of precision medicine through a synergistic strategy integrating clinical knowledge, HT data, bioinformatics, and systems biology. PMID:28018236
Universality of human microbial dynamics
NASA Astrophysics Data System (ADS)
Bashan, Amir; Gibson, Travis E.; Friedman, Jonathan; Carey, Vincent J.; Weiss, Scott T.; Hohmann, Elizabeth L.; Liu, Yang-Yu
2016-06-01
Human-associated microbial communities have a crucial role in determining our health and well-being, and this has led to the continuing development of microbiome-based therapies such as faecal microbiota transplantation. These microbial communities are very complex, dynamic and highly personalized ecosystems, exhibiting a high degree of inter-individual variability in both species assemblages and abundance profiles. It is not known whether the underlying ecological dynamics of these communities, which can be parameterized by growth rates, and intra- and inter-species interactions in population dynamics models, are largely host-independent (that is, universal) or host-specific. If the inter-individual variability reflects host-specific dynamics due to differences in host lifestyle, physiology or genetics, then generic microbiome manipulations may have unintended consequences, rendering them ineffective or even detrimental. Alternatively, microbial ecosystems of different subjects may exhibit universal dynamics, with the inter-individual variability mainly originating from differences in the sets of colonizing species. Here we develop a new computational method to characterize human microbial dynamics. By applying this method to cross-sectional data from two large-scale metagenomic studies—the Human Microbiome Project and the Student Microbiome Project—we show that gut and mouth microbiomes display pronounced universal dynamics, whereas communities associated with certain skin sites are probably shaped by differences in the host environment. Notably, the universality of gut microbial dynamics is not observed in subjects with recurrent Clostridium difficile infection but is observed in the same set of subjects after faecal microbiota transplantation. These results fundamentally improve our understanding of the processes that shape human microbial ecosystems, and pave the way to designing general microbiome-based therapies.
Remote information service access system based on a client-server-service model
Konrad, Allan M.
1996-01-01
A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.
Remote information service access system based on a client-server-service model
Konrad, A.M.
1997-12-09
A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.
Remote information service access system based on a client-server-service model
Konrad, Allan M.
1999-01-01
A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.
Remote information service access system based on a client-server-service model
Konrad, A.M.
1996-08-06
A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.
Remote information service access system based on a client-server-service model
Konrad, Allan M.
1997-01-01
A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.
PERSONAL COMPUTERS AND ENVIRONMENTAL ENGINEERING
This article discusses how personal computers can be applied to environmental engineering. fter explaining some of the differences between mainframe and Personal computers, we will review the development of personal computers and describe the areas of data management, interactive...
Code of Federal Regulations, 2012 CFR
2012-10-01
... Compliant Microcomputers, Including Personal Computers, Monitors and Printers. 1552.239-103 Section 1552.239... Star Compliant Microcomputers, Including Personal Computers, Monitors and Printers. As prescribed in... Personal Computers, Monitors, and Printers (APR 1996) (a) The Contractor shall provide computer products...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Compliant Microcomputers, Including Personal Computers, Monitors and Printers. 1552.239-103 Section 1552.239... Star Compliant Microcomputers, Including Personal Computers, Monitors and Printers. As prescribed in... Personal Computers, Monitors, and Printers (APR 1996) (a) The Contractor shall provide computer products...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Compliant Microcomputers, Including Personal Computers, Monitors and Printers. 1552.239-103 Section 1552.239... Star Compliant Microcomputers, Including Personal Computers, Monitors and Printers. As prescribed in... Personal Computers, Monitors, and Printers (APR 1996) (a) The Contractor shall provide computer products...
ERIC Educational Resources Information Center
Zadahmad, Manouchehr; Yousefzadehfard, Parisa
2016-01-01
Mobile Cloud Computing (MCC) aims to improve all mobile applications such as m-learning systems. This study presents an innovative method to use web technology and software engineering's best practices to provide m-learning functionalities hosted in a MCC-learning system as service. Components hosted by MCC are used to empower developers to create…
Defense Acquisitions Acronyms and Terms
2012-12-01
Computer-Aided Design CADD Computer-Aided Design and Drafting CAE Component Acquisition Executive; Computer-Aided Engineering CAIV Cost As an...Radiation to Ordnance HFE Human Factors Engineering HHA Health Hazard Assessment HNA Host-Nation Approval HNS Host-Nation Support HOL High -Order...Engineering Change Proposal VHSIC Very High Speed Integrated Circuit VLSI Very Large Scale Integration VOC Volatile Organic Compound W WAN Wide
Simulink-aided Design and Implementation of Sensorless BLDC Motor Digital Control System
NASA Astrophysics Data System (ADS)
Zhilenkov, A. A.; Tsvetkov, Y. N.; Chistov, V. B.; Nyrkov, A. P.; Sokolov, S. S.
2017-07-01
The paper describes the process of creating of brushless direct current motor’s digital control system. The target motor has no speed sensor, so back-EMF method is used for commutation control. Authors show how to model the control system in MatLab/Simulink and to test it onboard STM32F4 microcontroller.This technology allows to create the most flexible system, which will control possible with a personal computer by communication lines. It is possible to examine the signals in the circuit of the actuator without any external measuring instruments - testers, oscilloscopes, etc. - and output waveforms and measured values of signals directly on the host PC.
[Measurement of intracranial hematoma volume by personal computer].
DU, Wanping; Tan, Lihua; Zhai, Ning; Zhou, Shunke; Wang, Rui; Xue, Gongshi; Xiao, An
2011-01-01
To explore the method for intracranial hematoma volume measurement by the personal computer. Forty cases of various intracranial hematomas were measured by the computer tomography with quantitative software and personal computer with Photoshop CS3 software, respectively. the data from the 2 methods were analyzed and compared. There was no difference between the data from the computer tomography and the personal computer (P>0.05). The personal computer with Photoshop CS3 software can measure the volume of various intracranial hematomas precisely, rapidly and simply. It should be recommended in the clinical medicolegal identification.
NASA Astrophysics Data System (ADS)
Ramalingam, Srikumar
2001-11-01
A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.
Computer-based personality judgments are more accurate than those made by humans
Youyou, Wu; Kosinski, Michal; Stillwell, David
2015-01-01
Judging others’ personalities is an essential skill in successful social living, as personality is a key driver behind people’s interactions, behaviors, and emotions. Although accurate personality judgments stem from social-cognitive skills, developments in machine learning show that computer models can also make valid judgments. This study compares the accuracy of human and computer-based personality judgments, using a sample of 86,220 volunteers who completed a 100-item personality questionnaire. We show that (i) computer predictions based on a generic digital footprint (Facebook Likes) are more accurate (r = 0.56) than those made by the participants’ Facebook friends using a personality questionnaire (r = 0.49); (ii) computer models show higher interjudge agreement; and (iii) computer personality judgments have higher external validity when predicting life outcomes such as substance use, political attitudes, and physical health; for some outcomes, they even outperform the self-rated personality scores. Computers outpacing humans in personality judgment presents significant opportunities and challenges in the areas of psychological assessment, marketing, and privacy. PMID:25583507
Computer-based personality judgments are more accurate than those made by humans.
Youyou, Wu; Kosinski, Michal; Stillwell, David
2015-01-27
Judging others' personalities is an essential skill in successful social living, as personality is a key driver behind people's interactions, behaviors, and emotions. Although accurate personality judgments stem from social-cognitive skills, developments in machine learning show that computer models can also make valid judgments. This study compares the accuracy of human and computer-based personality judgments, using a sample of 86,220 volunteers who completed a 100-item personality questionnaire. We show that (i) computer predictions based on a generic digital footprint (Facebook Likes) are more accurate (r = 0.56) than those made by the participants' Facebook friends using a personality questionnaire (r = 0.49); (ii) computer models show higher interjudge agreement; and (iii) computer personality judgments have higher external validity when predicting life outcomes such as substance use, political attitudes, and physical health; for some outcomes, they even outperform the self-rated personality scores. Computers outpacing humans in personality judgment presents significant opportunities and challenges in the areas of psychological assessment, marketing, and privacy.
Applications of personal computers in geophysics
NASA Astrophysics Data System (ADS)
Lee, W. H. K.; Lahr, J. C.; Habermann, R. E.
Since 1981, the use of personal computers (PCs) to increase productivity has become widespread. At present, more than 5 million personal computers are in operation for business, education, engineering, and scientific purposes. Activities within AGU reflect this trend: KOSMOS, the AGU electronic network, was introduced this year, and the AGU Committee on Personal Computers, chaired by W.H K. Lee (U.S. Geological Survey, Menlo Park, Calif.), was recently formed. In addition, in conjunction with the 1986 AGU Fall Meeting, this committee is organizing a personal computer session and hands-on demonstrations to promote applications of personal computers in geophysics.
General-Purpose Serial Interface For Remote Control
NASA Technical Reports Server (NTRS)
Busquets, Anthony M.; Gupton, Lawrence E.
1990-01-01
Computer controls remote television camera. General-purpose controller developed to serve as interface between host computer and pan/tilt/zoom/focus functions on series of automated video cameras. Interface port based on 8251 programmable communications-interface circuit configured for tristated outputs, and connects controller system to any host computer with RS-232 input/output (I/O) port. Accepts byte-coded data from host, compares them with prestored codes in read-only memory (ROM), and closes or opens appropriate switches. Six output ports control opening and closing of as many as 48 switches. Operator controls remote television camera by speaking commands, in system including general-purpose controller.
Host behaviour–parasite feedback: an essential link between animal behaviour and disease ecology
Archie, Elizabeth A.; Craft, Meggan E.; Hawley, Dana M.; Martin, Lynn B.; Moore, Janice; White, Lauren
2016-01-01
Animal behaviour and the ecology and evolution of parasites are inextricably linked. For this reason, animal behaviourists and disease ecologists have been interested in the intersection of their respective fields for decades. Despite this interest, most research at the behaviour–disease interface focuses either on how host behaviour affects parasites or how parasites affect behaviour, with little overlap between the two. Yet, the majority of interactions between hosts and parasites are probably reciprocal, such that host behaviour feeds back on parasites and vice versa. Explicitly considering these feedbacks is essential for understanding the complex connections between animal behaviour and parasite ecology and evolution. To illustrate this point, we discuss how host behaviour–parasite feedbacks might operate and explore the consequences of feedback for studies of animal behaviour and parasites. For example, ignoring the feedback of host social structure on parasite dynamics can limit the accuracy of predictions about parasite spread. Likewise, considering feedback in studies of parasites and animal personalities may provide unique insight about the maintenance of variation in personality types. Finally, applying the feedback concept to links between host behaviour and beneficial, rather than pathogenic, microbes may shed new light on transitions between mutualism and parasitism. More generally, accounting for host behaviour–parasite feedbacks can help identify critical gaps in our understanding of how key host behaviours and parasite traits evolve and are maintained. PMID:27053751
Host behaviour-parasite feedback: an essential link between animal behaviour and disease ecology.
Ezenwa, Vanessa O; Archie, Elizabeth A; Craft, Meggan E; Hawley, Dana M; Martin, Lynn B; Moore, Janice; White, Lauren
2016-04-13
Animal behaviour and the ecology and evolution of parasites are inextricably linked. For this reason, animal behaviourists and disease ecologists have been interested in the intersection of their respective fields for decades. Despite this interest, most research at the behaviour-disease interface focuses either on how host behaviour affects parasites or how parasites affect behaviour, with little overlap between the two. Yet, the majority of interactions between hosts and parasites are probably reciprocal, such that host behaviour feeds back on parasites and vice versa. Explicitly considering these feedbacks is essential for understanding the complex connections between animal behaviour and parasite ecology and evolution. To illustrate this point, we discuss how host behaviour-parasite feedbacks might operate and explore the consequences of feedback for studies of animal behaviour and parasites. For example, ignoring the feedback of host social structure on parasite dynamics can limit the accuracy of predictions about parasite spread. Likewise, considering feedback in studies of parasites and animal personalities may provide unique insight about the maintenance of variation in personality types. Finally, applying the feedback concept to links between host behaviour and beneficial, rather than pathogenic, microbes may shed new light on transitions between mutualism and parasitism. More generally, accounting for host behaviour-parasite feedbacks can help identify critical gaps in our understanding of how key host behaviours and parasite traits evolve and are maintained. © 2016 The Author(s).
Parasitism, personality and cognition in fish.
Barber, I; Mora, A B; Payne, E M; Weinersmith, K L; Sih, A
2017-08-01
It is well established that parasites can have profound effects on the behaviour of host organisms, and that individual differences in behaviour can influence susceptibility to parasite infections. Recently, two major themes of research have developed. First, there has been a growing interest in the proximate, mechanistic processes underpinning parasite-associated behaviour change, and the interactive roles of the neuro-, immune, and other physiological systems in determining relationships between behaviour and infection susceptibility. Secondly, as the study of behaviour has shifted away from one-off measurements of single behaviours and towards a behavioural syndromes/personality framework, research is starting to focus on the consequences of parasite infection for temporal and contextual consistency of behaviour, and on the implications of different personality types for infection susceptibility. In addition, there is increasing interest in the potential for relationships between cognition and personality to also have implications for host-parasite interactions. As models well-suited to both the laboratory study of behaviour and experimental parasitology, teleost fish have been used as hosts in many of these studies. In this review we provide a broad overview of the range of mechanisms that potentially generate links between fish behaviour, personality, and parasitism, and illustrate these using examples drawn from the recent literature. In addition, we examine the potential interactions between cognition, personality and parasitism, and identify questions that may be usefully investigated with fish models. Copyright © 2016 Elsevier B.V. All rights reserved.
Investigation of a computer virus outbreak in the pharmacy of a tertiary care teaching hospital.
Bailey, T C; Reichley, R M
1992-10-01
A computer virus outbreak was recognized, verified, defined, investigated, and controlled using an infection control approach. The pathogenesis and epidemiology of computer virus infection are reviewed. Case-control study. Pharmacy of a tertiary care teaching institution. On October 28, 1991, 2 personal computers in the drug information center manifested symptoms consistent with the "Jerusalem" virus infection. The same day, a departmental personal computer began playing "Yankee Doodle," a sign of "Doodle" virus infection. An investigation of all departmental personal computers identified the "Stoned" virus in an additional personal computer. Controls were functioning virus-free personal computers within the department. Cases were associated with users who brought diskettes from outside the department (5/5 cases versus 5/13 controls, p = .04) and with College of Pharmacy student users (3/5 cases versus 0/13 controls, p = .012). The detection of a virus-infected diskette or personal computer was associated with the number of 5 1/4-inch diskettes in the files of personal computers, a surrogate for rate of media exchange (mean = 17.4 versus 152.5, p = .018, Wilcoxon rank sum test). After education of departmental personal computer users regarding appropriate computer hygiene and installation of virus protection software, no further spread of personal computer viruses occurred, although 2 additional Stoned-infected and 1 Jerusalem-infected diskettes were detected. We recommend that virus detection software be installed on personal computers where the interchange of diskettes among computers is necessary, that write-protect tabs be placed on all program master diskettes and data diskettes where data are being read and not written, that in the event of a computer virus outbreak, all available diskettes be quarantined and scanned by virus detection software, and to facilitate quarantine and scanning in an outbreak, that diskettes be stored in organized files.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...
Code of Federal Regulations, 2012 CFR
2012-10-01
... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...
Davidson, R W
1985-01-01
The increasing need to communicate to exchange data can be handled by personal microcomputers. The necessity for the transference of information stored in one type of personal computer to another type of personal computer is often encountered in the process of integrating multiple sources of information stored in different and incompatible computers in Medical Research and Practice. A practical example is demonstrated with two relatively inexpensive commonly used computers, the IBM PC jr. and the Apple IIe. The basic input/output (I/O) interface chip for serial communication for each computer are joined together using a Null connector and cable to form a communications link. Using BASIC (Beginner's All-purpose Symbolic Instruction Code) Computer Language and the Disk Operating System (DOS) the communications handshaking protocol and file transfer is established between the two computers. The BASIC programming languages used are Applesoft (Apple Personal Computer) and PC BASIC (IBM Personal computer).
Desktop Computing Integration Project
NASA Technical Reports Server (NTRS)
Tureman, Robert L., Jr.
1992-01-01
The Desktop Computing Integration Project for the Human Resources Management Division (HRMD) of LaRC was designed to help division personnel use personal computing resources to perform job tasks. The three goals of the project were to involve HRMD personnel in desktop computing, link mainframe data to desktop capabilities, and to estimate training needs for the division. The project resulted in increased usage of personal computers by Awards specialists, an increased awareness of LaRC resources to help perform tasks, and personal computer output that was used in presentation of information to center personnel. In addition, the necessary skills for HRMD personal computer users were identified. The Awards Office was chosen for the project because of the consistency of their data requests and the desire of employees in that area to use the personal computer.
Wassermann, Maria; Fujishiro, Kaori; Hoppe, Annekatrin
2017-11-01
Overqualification is a form of person-job misfit that is common among those who reside in a foreign country. It is associated with poor work-related well-being and can inhibit full adjustment to the host society. The goal of our study is to examine the impact of perceived overqualification on job satisfaction and career satisfaction among immigrants. Furthermore, we investigated immigrants' host national identity as a moderator of the impact of perceived overqualification on job satisfaction and career satisfaction. We analysed longitudinal online survey data from 124 Italian and Spanish immigrants who migrated to Germany between 2000 and 2014. Regression analyses show that perceived overqualification is negatively associated with job satisfaction six months later. Furthermore, host national identity moderates the association between perceived overqualification and job satisfaction: low overqualification is beneficial for job satisfaction whereas high overqualification is a threat for job satisfaction, especially for immigrants who identify strongly with the host society. We do not find corresponding direct and moderating effects on career satisfaction. We conclude that indicators of acculturation, such as host national identity, are worth considering in order to understand the impact of person-job misfit on work-related well-being among immigrants.
A demonstrative model of a lunar base simulation on a personal computer
NASA Technical Reports Server (NTRS)
1985-01-01
The initial demonstration model of a lunar base simulation is described. This initial model was developed on the personal computer level to demonstrate feasibility and technique before proceeding to a larger computer-based model. Lotus Symphony Version 1.1 software was used to base the demonstration model on an personal computer with an MS-DOS operating system. The personal computer-based model determined the applicability of lunar base modeling techniques developed at an LSPI/NASA workshop. In addition, the personnal computer-based demonstration model defined a modeling structure that could be employed on a larger, more comprehensive VAX-based lunar base simulation. Refinement of this personal computer model and the development of a VAX-based model is planned in the near future.
NASA Astrophysics Data System (ADS)
Duffett-Smith, Peter
1996-11-01
Easy PC Astronomy is the perfect book for everyone who wants to make easy and accurate astronomical calculations. The author supplies a simple but powerful script language called AstroScript on a disk, ready to use on any IBM PC-type computer. Equipped with this software, readers can compute complex but interesting astronomical results within minutes: from the time of moonrise or moonset anywhere in the world on any date, to the display of a lunar or solar eclipse on the computer screen--all within a few minutes of opening the book! The Sky Graphics feature of the software displays a detailed image of the sky as seen from any point on earth--at any time in the future or past--showing the constellations, planets, and a host of other features. Readers need no expert knowledge of astronomy, math or programming; the author provides full details of the calculations and formulas, which the reader can absorb or ignore as desired, and a comprehensive glossary of astronomical terms. Easy PC Astronomy is of immediate practical use to beginning and advanced amateur astronomers, students at all levels, science teachers, and research astronomers. Peter Duffett-Smith is at the Cavendish Laboratory of the University of Cambridge and is the author of Astronomy with Your Personal Computer (Cambridge University Press, 1990) and Practical Astronomy with Your Calculator (Cambridge University Press, 1989).
DNET: A communications facility for distributed heterogeneous computing
NASA Technical Reports Server (NTRS)
Tole, John; Nagappan, S.; Clayton, J.; Ruotolo, P.; Williamson, C.; Solow, H.
1989-01-01
This document describes DNET, a heterogeneous data communications networking facility. DNET allows programs operating on hosts on dissimilar networks to communicate with one another without concern for computer hardware, network protocol, or operating system differences. The overall DNET network is defined as the collection of host machines/networks on which the DNET software is operating. Each underlying network is considered a DNET 'domain'. Data communications service is provided between any two processes on any two hosts on any of the networks (domains) that may be reached via DNET. DNET provides protocol transparent, reliable, streaming data transmission between hosts (restricted, initially to DECnet and TCP/IP networks). DNET also provides variable length datagram service with optional return receipts.
NASA Technical Reports Server (NTRS)
Montag, Bruce C.; Bishop, Alfred M.; Redfield, Joe B.
1989-01-01
The findings of a preliminary investigation by Southwest Research Institute (SwRI) in simulation host computer concepts is presented. It is designed to aid NASA in evaluating simulation technologies for use in spaceflight training. The focus of the investigation is on the next generation of space simulation systems that will be utilized in training personnel for Space Station Freedom operations. SwRI concludes that NASA should pursue a distributed simulation host computer system architecture for the Space Station Training Facility (SSTF) rather than a centralized mainframe based arrangement. A distributed system offers many advantages and is seen by SwRI as the only architecture that will allow NASA to achieve established functional goals and operational objectives over the life of the Space Station Freedom program. Several distributed, parallel computing systems are available today that offer real-time capabilities for time critical, man-in-the-loop simulation. These systems are flexible in terms of connectivity and configurability, and are easily scaled to meet increasing demands for more computing power.
Smart nanosystems: Bio-inspired technologies that interact with the host environment.
Kwon, Ester J; Lo, Justin H; Bhatia, Sangeeta N
2015-11-24
Nanoparticle technologies intended for human administration must be designed to interact with, and ideally leverage, a living host environment. Here, we describe smart nanosystems classified in two categories: (i) those that sense the host environment and respond and (ii) those that first prime the host environment to interact with engineered nanoparticles. Smart nanosystems have the potential to produce personalized diagnostic and therapeutic schema by using the local environment to drive material behavior and ultimately improve human health.
Host-Nation Operations: Soldier Training on Governance (HOST-G) Training Support Package
2011-07-01
restricted this webpage from running scripts or ActiveX controls that could access your computer. Click here for options…” • If this occurs, select that...scripts and ActiveX controls can be useful, but active content might also harm your computer. Are you sure you want to let this file run active
Imagine, Invent, Program, Share: A Library-Hosted Computer Club Promotes 21st Century Skills
ERIC Educational Resources Information Center
Myers, Brian
2009-01-01
During at least one afternoon each month, Wilmette (Illinois) Public Library (WPL) hosts a local group of computer programmers, designers, and artists, who meet to discuss digital projects and resources, technical challenges, and successful design or programming strategies. WPL's Game Design Club, now in its third year, owes its existence to a…
ERIC Educational Resources Information Center
Sim, KwongNui; Butson, Russell
2014-01-01
This scoping study examines the degree to which twenty two undergraduate students used their personal computers to support their academic study. The students were selected based on their responses to a questionnaire aimed at gauging their degree of computer skill. Computer activity data was harvested from the personal computers of eighteen…
Parasitism and the evolutionary ecology of animal personality
Barber, Iain; Dingemanse, Niels J.
2010-01-01
The ecological factors responsible for the evolution of individual differences in animal personality (consistent individual differences in the same behaviour across time and contexts) are currently the subject of intense debate. A limited number of ecological factors have been investigated to date, with most attention focusing on the roles of resource competition and predation. We suggest here that parasitism may play a potentially important, but largely overlooked, role in the evolution of animal personalities. We identify two major routes by which parasites might influence the evolution of animal personality. First, because the risk of acquiring parasites can be influenced by an individual's behavioural type, local parasite regimes may impose selection on personality traits and behavioural syndromes (correlations between personality traits). Second, because parasite infections have consequences for aspects of host ‘state’, parasites might induce the evolution of individual differences in certain types of host behaviour in populations with endemic infections. Also, because infection often leads to specific changes in axes of personality, parasite infections have the potential to decouple behavioural syndromes. Host–parasite systems therefore provide researchers with valuable tools to study personality variation and behavioural syndromes from a proximate and ultimate perspective. PMID:21078659
Stennis hosts 2010 Special Olympics
NASA Technical Reports Server (NTRS)
2010-01-01
B.J. Matherne, 27, of Gulfport, scores a soccer goal during one of the 2010 Special Olympic games at NASA's John C. Stennis Space Center on March 27. Stennis serves as an annual host for the special needs event. Each year, local, regional and national Special Olympics events are hosted in more than 150 countries for persons with special needs. An international Special Olympics competition is held every two years.
Using IKAROS as a data transfer and management utility within the KM3NeT computing model
NASA Astrophysics Data System (ADS)
Filippidis, Christos; Cotronis, Yiannis; Markou, Christos
2016-04-01
KM3NeT is a future European deep-sea research infrastructure hosting a new generation neutrino detectors that - located at the bottom of the Mediterranean Sea - will open a new window on the universe and answer fundamental questions both in particle physics and astrophysics. IKAROS is a framework that enables creating scalable storage formations on-demand and helps addressing several limitations that the current file systems face when dealing with very large scale infrastructures. It enables creating ad-hoc nearby storage formations and can use a huge number of I/O nodes in order to increase the available bandwidth (I/O and network). IKAROS unifies remote and local access in the overall data flow, by permitting direct access to each I/O node. In this way we can handle the overall data flow at the network layer, limiting the interaction with the operating system. This approach allows virtually connecting, at the users level, the several different computing facilities used (Grids, Clouds, HPCs, Data Centers, Local computing Clusters and personal storage devices), on-demand, based on the needs, by using well known standards and protocols, like HTTP.
2006-10-01
NCAPS ) Christina M. Underhill, Ph.D. Approved for public release; distribution is unlimited. NPRST-TN-06-9 October 2006...Investigation of Item-Pair Presentation and Construct Validity of the Navy Computer Adaptive Personality Scales ( NCAPS ) Christina M. Underhill, Ph.D...documents one of the steps in our development of the Navy Computer Adaptive Personality Scales ( NCAPS ). NCAPS is a computer adaptive personality measure
47 CFR 15.102 - CPU boards and power supplies used in personal computers.
Code of Federal Regulations, 2013 CFR
2013-10-01
... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...
47 CFR 15.102 - CPU boards and power supplies used in personal computers.
Code of Federal Regulations, 2011 CFR
2011-10-01
... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...
47 CFR 15.102 - CPU boards and power supplies used in personal computers.
Code of Federal Regulations, 2010 CFR
2010-10-01
... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...
47 CFR 15.102 - CPU boards and power supplies used in personal computers.
Code of Federal Regulations, 2014 CFR
2014-10-01
... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...
47 CFR 15.102 - CPU boards and power supplies used in personal computers.
Code of Federal Regulations, 2012 CFR
2012-10-01
... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...
Research and the Personal Computer.
ERIC Educational Resources Information Center
Blackburn, D. A.
1989-01-01
Discussed is the history and elements of the personal computer. Its uses as a laboratory assistant and generic toolkit for mathematical analysis and modeling are included. The future of the personal computer in research is addressed. (KR)
Investigating a holobiont: Microbiota perturbations and transkingdom networks.
Greer, Renee; Dong, Xiaoxi; Morgun, Andrey; Shulzhenko, Natalia
2016-01-01
The scientific community has recently come to appreciate that, rather than existing as independent organisms, multicellular hosts and their microbiota comprise a complex evolving superorganism or metaorganism, termed a holobiont. This point of view leads to a re-evaluation of our understanding of different physiological processes and diseases. In this paper we focus on experimental and computational approaches which, when combined in one study, allowed us to dissect mechanisms (traditionally named host-microbiota interactions) regulating holobiont physiology. Specifically, we discuss several approaches for microbiota perturbation, such as use of antibiotics and germ-free animals, including advantages and potential caveats of their usage. We briefly review computational approaches to characterize the microbiota and, more importantly, methods to infer specific components of microbiota (such as microbes or their genes) affecting host functions. One such approach called transkingdom network analysis has been recently developed and applied in our study. (1) Finally, we also discuss common methods used to validate the computational predictions of host-microbiota interactions using in vitro and in vivo experimental systems.
ERIC Educational Resources Information Center
Hopwood, Christopher J.; Burt, S. Alexandra; Keel, Pamela K.; Neale, Michael C.; Boker, Steven M.; Klump, Kelly L.
2013-01-01
Personality traits are known to be associated with a host of important life outcomes, including interpersonal dysfunction. The interpersonal circumplex offers a comprehensive system for articulating the kinds of interpersonal problems associated with personality traits. In the current study, traits as measured by the Multidimensional Personality…
Scrap computer recycling in Taiwan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, C.H.; Chang, S.L.; Wang, K.M.
1999-07-01
It is estimated that approximately 700,000 scrap personal computers will be generated each year in Taiwan. The disposal of such a huge amount of scrap computers presents a difficult task for the island due to the scarcity of landfills and incineration facilities available locally. Also, the hazardous materials contained in the scrap computers may cause serious pollution to the environment, if they are not properly disposed. Thus, EPA of Taiwan has declared scrap personal computers as a producer responsibility recycling product on July 1997 to mandate that the manufacturers, importers and sellers of personal computers have to recover and recyclemore » their scrap computers properly. Beginning on June 1, 1998, a scrap computer recycling plan is officially implemented on the island. Under this plan, consumers can deliver their unwanted personal computers to the designated collection points to receive reward money. Currently, only six items are mandated to be recycled in this recycling plan. They are notebooks, monitor and the hard disk, power supply, printed circuit board and shell of the main frame of the personal computer. This paper presents the current scrap computer recycling system in Taiwan.« less
The Technology Refresh Program: Affording State-of-the Art Personal Computing.
ERIC Educational Resources Information Center
Spiwak, Rand
2000-01-01
Describes the Florida Community College Technology Refresh Program in which 28 Florida community colleges refresh their personal computer technology on a three-year cyclical basis through negotiation of a contract with Dell Computer Corporation. Discusses the contract highlights (such as a 22.5 percent discount on personal computers and on-site…
Using Personal Computers To Acquire Special Education Information. Revised. ERIC Digest #429.
ERIC Educational Resources Information Center
ERIC Clearinghouse on Handicapped and Gifted Children, Reston, VA.
This digest offers basic information about resources, available to users of personal computers, in the area of professional development in special education. Two types of resources are described: those that can be purchased on computer diskettes and those made available by linking personal computers through electronic telephone networks. Resources…
NASA Technical Reports Server (NTRS)
Watson, V. R.
1983-01-01
A personal computer has been used to illustrate physical phenomena and problem solution techniques in engineering classes. According to student evaluations, instruction of concepts was greatly improved through the use of these illustrations. This paper describes the class of phenomena that can be effectively illustrated, the techniques used to create these illustrations, and the techniques used to display the illustrations in regular classrooms and over an instructional TV network. The features of a personal computer required to apply these techniques are listed. The capabilities of some present personal computers are discussed and a forecast of the capabilities of future personal computers is presented.
Revision and Expansion of Navy Computer Adaptive Personality Scales (NCAPS)
2007-08-01
Nav Pesne Reerh Stde, an Technolg y Dii sio Revision and Expansion of Navy Computer Adaptive Personality Scales ( NCAPS ) Robert J. Schneider, Ph.D...TN-o7-12 August 2007 Revision and Expansion of Navy Computer Adaptive Personality Scales ( NCAPS ) Robert J. Schneider, Ph.D. Kerri L. Ferstl, Ph.D...03/31/2006 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Revision and Expansion of Navy Computer Adaptive Personality Scales ( NCAPS ) 5b. GRANT NUMBER 5c
2006-10-01
Investigation of Item-Pair Presentation and Construct Validity of the Navy Computer Adaptive Personality Scales ( NCAPS ) Christina M. Underhill, Ph.D...Construct Validity of the Navy Computer Adaptive Personality Scales ( NCAPS ) Christina M. Underhill, Ph.D. Reviewed and Approved by Jacqueline A. Mottern...and Construct Validity of the Navy Computer Adaptive Personality Scales ( NCAPS ) 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 0602236N and 0603236N 6
Personalized Learning Software
NASA Technical Reports Server (NTRS)
1997-01-01
Analysis and Simulation Inc. products, IEPLANNER and TPLAN, make use of C Language Integrated Production System (CLIPS), a NASA-developed expert system shell which originated at Johnson Space Center. Both products are interactive computer-based systems. They can be run independently or together as one complete system. Utilized as an Individual Education Plan tool, a user of IEPLANNER and TPLAN can define a goals list, while identifying a host of student demands in motor skills, socials skills, life skills, even legal and leisure needs in the user's area. This computerized, expert tutor and advisor allows assessment of the status of the student and the degree to which his/her needs are being met. NASA Small Business Innovation Research contracts have also supported the company Human Memory Extension technology and the creation of a World Wide Web 3D browser.
Development of qualification guidelines for personal computer-based aviation training devices.
DOT National Transportation Integrated Search
1995-02-01
Recent advances in the capabilities of personal computers have resulted in an increase in the number of flight simulation programs made available as Personal Computer-Based Aviation Training Devices (PCATDs).The potential benefits of PCATDs have been...
Walther, Birte; Morgenstern, Matthis; Hanewinkel, Reiner
2012-01-01
To investigate co-occurrence and shared personality characteristics of problematic computer gaming, problematic gambling and substance use. Cross-sectional survey data were collected from 2,553 German students aged 12-25 years. Self-report measures of substance use (alcohol, tobacco and cannabis), problematic gambling (South Oaks Gambling Screen - Revised for Adolescents, SOGS-RA), problematic computer gaming (Video Game Dependency Scale, KFN-CSAS-II), and of twelve different personality characteristics were obtained. Analyses revealed positive correlations between tobacco, alcohol and cannabis use and a smaller positive correlation between problematic gambling and problematic computer gaming. Problematic computer gaming co-occurred only with cannabis use, whereas problematic gambling was associated with all three types of substance use. Multivariate multilevel analyses showed differential patterns of personality characteristics. High impulsivity was the only personality characteristic associated with all five addictive behaviours. Depression and extraversion were specific to substance users. Four personality characteristics were specifically associated with problematic computer gaming: irritability/aggression, social anxiety, ADHD, and low self-esteem. Problematic gamblers seem to be more similar to substance users than problematic computer gamers. From a personality perspective, results correspond to the inclusion of gambling in the same DSM-V category as substance use and question a one-to-one proceeding for computer gaming. Copyright © 2012 S. Karger AG, Basel.
Host computer software specifications for a zero-g payload manhandling simulator
NASA Technical Reports Server (NTRS)
Wilson, S. W.
1986-01-01
The HP PASCAL source code was developed for the Mission Planning and Analysis Division (MPAD) of NASA/JSC, and takes the place of detailed flow charts defining the host computer software specifications for MANHANDLE, a digital/graphical simulator that can be used to analyze the dynamics of onorbit (zero-g) payload manhandling operations. Input and output data for representative test cases are contained.
Precollege Computer Literacy: A Personal Computing Approach. Second Edition.
ERIC Educational Resources Information Center
Moursund, David
Intended for elementary and secondary teachers and curriculum specialists, this booklet discusses and defines computer literacy as a functional knowledge of computers and their effects on students and the rest of society. It analyzes personal computing and the aspects of computers that have direct impact on students. Outlining computer-assisted…
ERIC Educational Resources Information Center
Liew, Tze Wei; Tan, Su-Mae; Seydali, Rouzbeh
2014-01-01
In this article, the effects of personalized narration in multimedia learning on learners' computer perceptions and task-related attitudes were examined. Twenty-six field independent and 22 field dependent participants studied the computer-based multimedia lessons on C-Programming, either with personalized narration or non-personalized narration.…
NASA Astrophysics Data System (ADS)
Tysowski, Piotr K.; Ling, Xinhua; Lütkenhaus, Norbert; Mosca, Michele
2018-04-01
Quantum key distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an enterprise IT environment. Significant challenges exist in building a practical key management service (KMS) for use in a metropolitan network. QKD is generally a point-to-point technique only and is subject to steep performance constraints. The integration of QKD into enterprise-level computing has been researched, to enable quantum-safe communication. A novel method for constructing a KMS is presented that allows arbitrary computing hosts on one site to establish multiple secure communication sessions with the hosts of another site. A key exchange protocol is proposed where symmetric private keys are granted to hosts while satisfying the scalability needs of an enterprise population of users. The KMS operates within a layered architectural style that is able to interoperate with various underlying QKD implementations. Variable levels of security for the host population are enforced through a policy engine. A network layer provides key generation across a network of nodes connected by quantum links. Scheduling and routing functionality allows quantum key material to be relayed across trusted nodes. Optimizations are performed to match the real-time host demand for key material with the capacity afforded by the infrastructure. The result is a flexible and scalable architecture that is suitable for enterprise use and independent of any specific QKD technology.
Beyond Host Language Proficiency: Coping Resources Predicting International Students' Satisfaction
ERIC Educational Resources Information Center
Mak, Anita S.; Bodycott, Peter; Ramburuth, Prem
2015-01-01
As international students navigate in a foreign educational environment, having higher levels of coping or stress-resistance resources--both internal and external--could be related to increased satisfaction with personal and university life. The internal coping resources examined in this study were host language proficiency, self-esteem,…
OCCURRENCE OF NONTUBERCULOUS MYCOBACTERIA IN ENVIRONMENTAL SAMPLES
Nontuberculous mycobacteria (NTM) are a major cause of opportunistic infection in immunocompromised hosts. Because there is no evidence of person-to-person transmission and NTM have been found in drinking water, the environment is considered a likely source of infection. In this ...
NASA Technical Reports Server (NTRS)
Mckay, C. W.; Bown, R. L.
1985-01-01
The space station data management system involves networks of computing resources that must work cooperatively and reliably over an indefinite life span. This program requires a long schedule of modular growth and an even longer period of maintenance and operation. The development and operation of space station computing resources will involve a spectrum of systems and software life cycle activities distributed across a variety of hosts, an integration, verification, and validation host with test bed, and distributed targets. The requirement for the early establishment and use of an apporopriate Computer Systems and Software Engineering Support Environment is identified. This environment will support the Research and Development Productivity challenges presented by the space station computing system.
Personality Types and Affinity for Computers
1991-03-01
differences on personality dimensions between the respondents, and to explore the relationship between these differences and computer affinity. The results...between the respondents, and to explore the relationship between these differences and computer affinity. The results revealed no significant differences...type to this measure of computer affinity. 2 II. LITERATURZ REVIEW The interest of this study was the relationship between a person’s psychological
A CLIPS based personal computer hardware diagnostic system
NASA Technical Reports Server (NTRS)
Whitson, George M.
1991-01-01
Often the person designated to repair personal computers has little or no knowledge of how to repair a computer. Described here is a simple expert system to aid these inexperienced repair people. The first component of the system leads the repair person through a number of simple system checks such as making sure that all cables are tight and that the dip switches are set correctly. The second component of the system assists the repair person in evaluating error codes generated by the computer. The final component of the system applies a large knowledge base to attempt to identify the component of the personal computer that is malfunctioning. We have implemented and tested our design with a full system to diagnose problems for an IBM compatible system based on the 8088 chip. In our tests, the inexperienced repair people found the system very useful in diagnosing hardware problems.
DBSecSys: a database of Burkholderia mallei secretion systems.
Memišević, Vesna; Kumar, Kamal; Cheng, Li; Zavaljevski, Nela; DeShazer, David; Wallqvist, Anders; Reifman, Jaques
2014-07-16
Bacterial pathogenicity represents a major public health concern worldwide. Secretion systems are a key component of bacterial pathogenicity, as they provide the means for bacterial proteins to penetrate host-cell membranes and insert themselves directly into the host cells' cytosol. Burkholderia mallei is a Gram-negative bacterium that uses multiple secretion systems during its host infection life cycle. To date, the identities of secretion system proteins for B. mallei are not well known, and their pathogenic mechanisms of action and host factors are largely uncharacterized. We present the Database of Burkholderia malleiSecretion Systems (DBSecSys), a compilation of manually curated and computationally predicted bacterial secretion system proteins and their host factors. Currently, DBSecSys contains comprehensive experimentally and computationally derived information about B. mallei strain ATCC 23344. The database includes 143 B. mallei proteins associated with five secretion systems, their 1,635 human and murine interacting targets, and the corresponding 2,400 host-B. mallei interactions. The database also includes information about 10 pathogenic mechanisms of action for B. mallei secretion system proteins inferred from the available literature. Additionally, DBSecSys provides details about 42 virulence attenuation experiments for 27 B. mallei secretion system proteins. Users interact with DBSecSys through a Web interface that allows for data browsing, querying, visualizing, and downloading. DBSecSys provides a comprehensive, systematically organized resource of experimental and computational data associated with B. mallei secretion systems. It provides the unique ability to study secretion systems not only through characterization of their corresponding pathogen proteins, but also through characterization of their host-interacting partners.The database is available at https://applications.bhsai.org/dbsecsys.
Cotes-Ruiz, Iván Tomás; Prado, Rocío P.; García-Galán, Sebastián; Muñoz-Expósito, José Enrique; Ruiz-Reyes, Nicolás
2017-01-01
Nowadays, the growing computational capabilities of Cloud systems rely on the reduction of the consumed power of their data centers to make them sustainable and economically profitable. The efficient management of computing resources is at the heart of any energy-aware data center and of special relevance is the adaptation of its performance to workload. Intensive computing applications in diverse areas of science generate complex workload called workflows, whose successful management in terms of energy saving is still at its beginning. WorkflowSim is currently one of the most advanced simulators for research on workflows processing, offering advanced features such as task clustering and failure policies. In this work, an expected power-aware extension of WorkflowSim is presented. This new tool integrates a power model based on a computing-plus-communication design to allow the optimization of new management strategies in energy saving considering computing, reconfiguration and networks costs as well as quality of service, and it incorporates the preeminent strategy for on host energy saving: Dynamic Voltage Frequency Scaling (DVFS). The simulator is designed to be consistent in different real scenarios and to include a wide repertory of DVFS governors. Results showing the validity of the simulator in terms of resources utilization, frequency and voltage scaling, power, energy and time saving are presented. Also, results achieved by the intra-host DVFS strategy with different governors are compared to those of the data center using a recent and successful DVFS-based inter-host scheduling strategy as overlapped mechanism to the DVFS intra-host technique. PMID:28085932
Cotes-Ruiz, Iván Tomás; Prado, Rocío P; García-Galán, Sebastián; Muñoz-Expósito, José Enrique; Ruiz-Reyes, Nicolás
2017-01-01
Nowadays, the growing computational capabilities of Cloud systems rely on the reduction of the consumed power of their data centers to make them sustainable and economically profitable. The efficient management of computing resources is at the heart of any energy-aware data center and of special relevance is the adaptation of its performance to workload. Intensive computing applications in diverse areas of science generate complex workload called workflows, whose successful management in terms of energy saving is still at its beginning. WorkflowSim is currently one of the most advanced simulators for research on workflows processing, offering advanced features such as task clustering and failure policies. In this work, an expected power-aware extension of WorkflowSim is presented. This new tool integrates a power model based on a computing-plus-communication design to allow the optimization of new management strategies in energy saving considering computing, reconfiguration and networks costs as well as quality of service, and it incorporates the preeminent strategy for on host energy saving: Dynamic Voltage Frequency Scaling (DVFS). The simulator is designed to be consistent in different real scenarios and to include a wide repertory of DVFS governors. Results showing the validity of the simulator in terms of resources utilization, frequency and voltage scaling, power, energy and time saving are presented. Also, results achieved by the intra-host DVFS strategy with different governors are compared to those of the data center using a recent and successful DVFS-based inter-host scheduling strategy as overlapped mechanism to the DVFS intra-host technique.
Cooperative processing user interfaces for AdaNET
NASA Technical Reports Server (NTRS)
Gutzmann, Kurt M.
1991-01-01
A cooperative processing user interface (CUI) system shares the task of graphical display generation and presentation between the user's computer and a remote host. The communications link between the two computers is typically a modem or Ethernet. The two main purposes of a CUI are reduction of the amount of data transmitted between user and host machines, and provision of a graphical user interface system to make the system easier to use.
An Implemented Strategy for Campus Connectivity and Cooperative Computing.
ERIC Educational Resources Information Center
Halaris, Antony S.; Sloan, Lynda W.
1989-01-01
ConnectPac, a software package developed at Iona College to allow a computer user to access all services from a single personal computer, is described. ConnectPac uses mainframe computing to support a campus computing network, integrating personal and centralized computing into a menu-driven user environment. (Author/MLW)
The Ethics of Cloud Computing.
de Bruin, Boudewijn; Floridi, Luciano
2017-02-01
Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacentres (e.g., Amazon). It considers the cloud services providers leasing 'space in the cloud' from hosting companies (e.g., Dropbox, Salesforce). And it examines the business and private 'clouders' using these services. The first part of the paper argues that hosting companies, services providers and clouders have mutual informational (epistemic) obligations to provide and seek information about relevant issues such as consumer privacy, reliability of services, data mining and data ownership. The concept of interlucency is developed as an epistemic virtue governing ethically effective communication. The second part considers potential forms of government restrictions on or proscriptions against the development and use of cloud computing technology. Referring to the concept of technology neutrality, it argues that interference with hosting companies and cloud services providers is hardly ever necessary or justified. It is argued, too, however, that businesses using cloud services (e.g., banks, law firms, hospitals etc. storing client data in the cloud) will have to follow rather more stringent regulations.
Using Computer Simulations for Investigating a Sex Education Intervention: An Exploratory Study
Bullock, Seth; Graham, Cynthia A; Ingham, Roger
2017-01-01
Background Sexually transmitted infections (STIs) are ongoing concerns. The best method for preventing the transmission of these infections is the correct and consistent use of condoms. Few studies have explored the use of games in interventions for increasing condom use by challenging the false sense of security associated with judging the presence of an STI based on attractiveness. Objectives The primary purpose of this study was to explore the potential use of computer simulation as a serious game for sex education. Specific aims were to (1) study the influence of a newly designed serious game on self-rated confidence for assessing STI risk and (2) examine whether this varied by gender, age, and scores on sexuality-related personality trait measures. Methods This paper undertook a Web-based questionnaire study employing between and within subject analyses. A Web-based platform hosted in the United Kingdom was used to deliver male and female stimuli (facial photographs) and collect data. A convenience sample group of 66 participants (64%, 42/66) male, mean age 22.5 years) completed the Term on the Tides, a computer simulation developed for this study. Participants also completed questionnaires on demographics, sexual preferences, sexual risk evaluations, the Sexual Sensation Seeking Scale (SSS), and the Sexual Inhibition Subscale 2 (SIS2) of the Sexual Inhibition/Sexual Excitation Scales-Short Form (SIS/SES - SF). Results The overall confidence of participants to evaluate sexual risks reduced after playing the game (P<.005). Age and personality trait measures did not predict the change in confidence of evaluating risk. Women demonstrated larger shifts in confidence than did men (P=.03). Conclusions This study extends the literature by investigating the potential of computer simulations as a serious game for sex education. Engaging in the Term on the Tides game had an impact on participants’ confidence in evaluating sexual risks. PMID:28468747
Shipping Science Worldwide with Open Source Containers
NASA Astrophysics Data System (ADS)
Molineaux, J. P.; McLaughlin, B. D.; Pilone, D.; Plofchan, P. G.; Murphy, K. J.
2014-12-01
Scientific applications often present difficult web-hosting needs. Their compute- and data-intensive nature, as well as an increasing need for high-availability and distribution, combine to create a challenging set of hosting requirements. In the past year, advancements in container-based virtualization and related tooling have offered new lightweight and flexible ways to accommodate diverse applications with all the isolation and portability benefits of traditional virtualization. This session will introduce and demonstrate an open-source, single-interface, Platform-as-a-Serivce (PaaS) that empowers application developers to seamlessly leverage geographically distributed, public and private compute resources to achieve highly-available, performant hosting for scientific applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDermott, Jason E.; Braun, Pascal; Bonneau, Richard A.
Pathogenic infections are a major cause of both human disease and loss of crop yields and animal stocks and thus cause immense damage to the worldwide economy. The significance of infectious diseases is expected to increase in an ever more connected warming world, in which new viral, bacterial and fungal pathogens can find novel hosts and ecologic niches. At the same time, the complex and sophisticated mechanisms by which diverse pathogenic agents evade defense mechanisms and subvert their hosts networks to suit their lifestyle needs is still very incompletely understood especially from a systems perspective [1]. Thus, understanding host-pathogen interactionsmore » is both an important and a scientifically fascinating topic. Recently, technology has offered the opportunity to investigate host-pathogen interactions on a level of detail and scope that offers immense computational and analytical possibilities. Genome sequencing was pioneered on some of these pathogens, and the number of strains and variants of pathogens sequenced to date vastly outnumbers the number of host genomes available. At the same time, for both plant and human hosts more and more data on population level genomic variation becomes available and offers a rich field for analysis into the genetic interactions between host and pathogen.« less
Computer Models of Personality: Implications for Measurement
ERIC Educational Resources Information Center
Cranton, P. A.
1976-01-01
Current research on computer models of personality is reviewed and categorized under five headings: (1) models of belief systems; (2) models of interpersonal behavior; (3) models of decision-making processes; (4) prediction models; and (5) theory-based simulations of specific processes. The use of computer models in personality measurement is…
Computer Competence for the Applied Gerontologist.
ERIC Educational Resources Information Center
Dickel, C. Timothy; Young, W. Wayne
This paper shares some ideas regarding the use of computers by persons who use their gerontology training in direct service to older persons and their families. It proposes that, as professionals serving older persons and their families look toward the future, they need to conscientiously incorporate computer competence into their practice. The…
Personal-Computer Video-Terminal Emulator
NASA Technical Reports Server (NTRS)
Buckley, R. H.; Koromilas, A.; Smith, R. M.; Lee, G. E.; Giering, E. W.
1985-01-01
OWL-1200 video terminal emulator has been written for IBM Personal Computer. The OWL-1200 is a simple user terminal with some intelligent capabilities. These capabilities include screen formatting and block transmission of data. Emulator is written in PASCAL and Assembler for the IBM Personal Computer operating under DOS 1.1.
ERIC Educational Resources Information Center
Djang, Philipp A.
1993-01-01
Describes a Multiple Criteria Decision Analysis Approach for the selection of personal computers that combines the capabilities of Analytic Hierarchy Process and Integer Goal Programing. An example of how decision makers can use this approach to determine what kind of personal computers and how many of each type to purchase is given. (nine…
Antibiotic-Resistant Infections and Treatment Challenges in the Immunocompromised Host.
Dumford, Donald M; Skalweit, Marion
2016-06-01
This article reviews antibiotic resistance and treatment of bacterial infections in the growing number of patients who are immunocompromised: solid organ transplant recipients, the neutropenic host, and persons with human immunodeficiency virus and AIDS. Specific mechanisms of resistance in both gram-negative and gram-positive bacteria, as well as newer treatment options are addressed elsewhere, and are only briefly discussed in the context of the immunocompromised host. Copyright © 2016 Elsevier Inc. All rights reserved.
Understanding the optimal learning environment in palliative care.
Connell, Shirley E; Yates, Patsy; Barrett, Linda
2011-07-01
The learning experiences of student nurses undertaking clinical placement are reported widely, however little is known about the learning experiences of health professionals undertaking continuing professional development (CPD) in a clinical setting, especially in palliative care. The aim of this study, which was conducted as part of the national evaluation of a professional development program involving clinical attachments with palliative care services (The Program of Experience in the Palliative Approach [PEPA]), was to explore factors influencing the learning experiences of participants over time. Thirteen semi-structured, one-to-one telephone interviews were conducted with five participants throughout their PEPA experience. The analysis was informed by the traditions of adult, social and psychological learning theories and relevant literature. The participants' learning was enhanced by engaging interactively with host site staff and patients, and by the validation of their personal and professional life experiences together with the reciprocation of their knowledge with host site staff. Self-directed learning strategies maximised the participants' learning outcomes. Inclusion in team activities aided the participants to feel accepted within the host site. Personal interactions with host site staff and patients shaped this social/cultural environment of the host site. Optimal learning was promoted when participants were actively engaged, felt accepted and supported by, and experienced positive interpersonal interactions with, the host site staff. Copyright © 2010 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adams, Leslie G.; Khare, Sangeeta; Lawhon, Sara D.
The aim of research on infectious diseases is their prevention, and brucellosis and salmonellosis as such are classic examples of worldwide zoonoses for application of a systems biology approach for enhanced rational vaccine development. When used optimally, vaccines prevent disease manifestations, reduce transmission of disease, decrease the need for pharmaceutical intervention, and improve the health and welfare of animals, as well as indirectly protecting against zoonotic diseases of people. Advances in the last decade or so using comprehensive systems biology approaches linking genomics, proteomics, bioinformatics, and biotechnology with immunology, pathogenesis and vaccine formulation and delivery are expected to enable enhancedmore » approaches to vaccine development. The goal of this paper is to evaluate the role of computational systems biology analysis of host:pathogen interactions (the interactome) as a tool for enhanced rational design of vaccines. Systems biology is bringing a new, more robust approach to veterinary vaccine design based upon a deeper understanding of the host pathogen interactions and its impact on the host's molecular network of the immune system. A computational systems biology method was utilized to create interactome models of the host responses to Brucella melitensis (BMEL), Mycobacterium avium paratuberculosis (MAP), Salmonella enterica Typhimurium (STM), and a Salmonella mutant (isogenic *sipA, sopABDE2) and linked to the basis for rational development of vaccines for brucellosis and salmonellosis as reviewed by Adams et al. and Ficht et al. [1,2]. A bovine ligated ileal loop biological model was established to capture the host gene expression response at multiple time points post infection. New methods based on Dynamic Bayesian Network (DBN) machine learning were employed to conduct a comparative pathogenicity analysis of 219 signaling and metabolic pathways and 1620 gene ontology (GO) categories that defined the host's biosignatures to each infectious condition. Through this DBN computational approach, the method identified significantly perturbed pathways and GO category groups of genes that define the pathogenicity signatures of the infectious agent. Our preliminary results provide deeper understanding of the overall complexity of host innate immune response as well as the identification of host gene perturbations that defines a unique host temporal biosignature response to each pathogen. The application of advanced computational methods for developing interactome models based on DBNs has proven to be instrumental in elucidating novel host responses and improved functional biological insight into the host defensive mechanisms. Evaluating the unique differences in pathway and GO perturbations across pathogen conditions allowed the identification of plausible host pathogen interaction mechanisms. Accordingly, a systems biology approach to study molecular pathway gene expression profiles of host cellular responses to microbial pathogens holds great promise as a methodology to identify, model and predict the overall dynamics of the host pathogen interactome. Thus, we propose that such an approach has immediate application to the rational design of brucellosis and salmonellosis vaccines.« less
Adams, L Garry; Khare, Sangeeta; Lawhon, Sara D; Rossetti, Carlos A; Lewin, Harris A; Lipton, Mary S; Turse, Joshua E; Wylie, Dennis C; Bai, Yu; Drake, Kenneth L
2011-09-22
The aim of research on infectious diseases is their prevention, and brucellosis and salmonellosis as such are classic examples of worldwide zoonoses for application of a systems biology approach for enhanced rational vaccine development. When used optimally, vaccines prevent disease manifestations, reduce transmission of disease, decrease the need for pharmaceutical intervention, and improve the health and welfare of animals, as well as indirectly protecting against zoonotic diseases of people. Advances in the last decade or so using comprehensive systems biology approaches linking genomics, proteomics, bioinformatics, and biotechnology with immunology, pathogenesis and vaccine formulation and delivery are expected to enable enhanced approaches to vaccine development. The goal of this paper is to evaluate the role of computational systems biology analysis of host:pathogen interactions (the interactome) as a tool for enhanced rational design of vaccines. Systems biology is bringing a new, more robust approach to veterinary vaccine design based upon a deeper understanding of the host-pathogen interactions and its impact on the host's molecular network of the immune system. A computational systems biology method was utilized to create interactome models of the host responses to Brucella melitensis (BMEL), Mycobacterium avium paratuberculosis (MAP), Salmonella enterica Typhimurium (STM), and a Salmonella mutant (isogenic ΔsipA, sopABDE2) and linked to the basis for rational development of vaccines for brucellosis and salmonellosis as reviewed by Adams et al. and Ficht et al. [1,2]. A bovine ligated ileal loop biological model was established to capture the host gene expression response at multiple time points post infection. New methods based on Dynamic Bayesian Network (DBN) machine learning were employed to conduct a comparative pathogenicity analysis of 219 signaling and metabolic pathways and 1620 gene ontology (GO) categories that defined the host's biosignatures to each infectious condition. Through this DBN computational approach, the method identified significantly perturbed pathways and GO category groups of genes that define the pathogenicity signatures of the infectious agent. Our preliminary results provide deeper understanding of the overall complexity of host innate immune response as well as the identification of host gene perturbations that defines a unique host temporal biosignature response to each pathogen. The application of advanced computational methods for developing interactome models based on DBNs has proven to be instrumental in elucidating novel host responses and improved functional biological insight into the host defensive mechanisms. Evaluating the unique differences in pathway and GO perturbations across pathogen conditions allowed the identification of plausible host-pathogen interaction mechanisms. Accordingly, a systems biology approach to study molecular pathway gene expression profiles of host cellular responses to microbial pathogens holds great promise as a methodology to identify, model and predict the overall dynamics of the host-pathogen interactome. Thus, we propose that such an approach has immediate application to the rational design of brucellosis and salmonellosis vaccines. Copyright © 2011 Elsevier Ltd. All rights reserved.
31 CFR 515.578 - Exportation of certain services incident to Internet-based communications.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Internet, such as instant messaging, chat and email, social networking, sharing of photos and movies, web... direct or indirect exportation of web-hosting services that are for purposes other than personal communications (e.g., web-hosting services for commercial endeavors) or of domain name registration services. (4...
31 CFR 515.578 - Exportation of certain services incident to Internet-based communications.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Internet, such as instant messaging, chat and email, social networking, sharing of photos and movies, web... direct or indirect exportation of web-hosting services that are for purposes other than personal communications (e.g., web-hosting services for commercial endeavors) or of domain name registration services. (4...
Mora-Ortiz, Marina; Claus, Sandrine Paule
2017-09-13
Choline is a crucial methyl donor necessary for epigenetic regulation. In this issue of Cell Host & Microbe, Romano et al. (2017) demonstrate that choline-utilizing gut bacteria compete with their host for this essential resource, calling for a systematic consideration of gut microbial composition for personalized diet recommendations. Copyright © 2017. Published by Elsevier Inc.
International Encounters: Experiences of Visitors and Hosts in a Cross-Cultural Program
ERIC Educational Resources Information Center
Ranz, Rebecca; Nuttman-Shwartz, Orit; Thachil, Githa
2015-01-01
The present study aimed to gain further insights into how visiting international social work students and their hosts from different cultures learn about each others' social services, culture, and personal values. Six Israeli students and 8 Indian students have written narratives and reflections on their experiences in the international encounter…
IUE Data Analysis Software for Personal Computers
NASA Technical Reports Server (NTRS)
Thompson, R.; Caplinger, J.; Taylor, L.; Lawton , P.
1996-01-01
This report summarizes the work performed for the program titled, "IUE Data Analysis Software for Personal Computers" awarded under Astrophysics Data Program NRA 92-OSSA-15. The work performed was completed over a 2-year period starting in April 1994. As a result of the project, 450 IDL routines and eight database tables are now available for distribution for Power Macintosh computers and Personal Computers running Windows 3.1.
ERIC Educational Resources Information Center
Chen, Chiu-Jung; Liu, Pei-Lin
2007-01-01
This study evaluated the effects of a personalized computer-assisted mathematics problem-solving program on the performance and attitude of Taiwanese fourth grade students. The purpose of this study was to determine whether the personalized computer-assisted program improved student performance and attitude over the nonpersonalized program.…
An Electronic Pressure Profile Display system for aeronautic test facilities
NASA Technical Reports Server (NTRS)
Woike, Mark R.
1990-01-01
The NASA Lewis Research Center has installed an Electronic Pressure Profile Display system. This system provides for the real-time display of pressure readings on high resolution graphics monitors. The Electronic Pressure Profile Display system will replace manometer banks currently used in aeronautic test facilities. The Electronic Pressure Profile Display system consists of an industrial type Digital Pressure Transmitter (DPI) unit which interfaces with a host computer. The host computer collects the pressure data from the DPI unit, converts it into engineering units, and displays the readings on a high resolution graphics monitor in bar graph format. Software was developed to accomplish the above tasks and also draw facility diagrams as background information on the displays. Data transfer between host computer and DPT unit is done with serial communications. Up to 64 channels are displayed with one second update time. This paper describes the system configuration, its features, and its advantages over existing systems.
An electronic pressure profile display system for aeronautic test facilities
NASA Technical Reports Server (NTRS)
Woike, Mark R.
1990-01-01
The NASA Lewis Research Center has installed an Electronic Pressure Profile Display system. This system provides for the real-time display of pressure readings on high resolution graphics monitors. The Electronic Pressure Profile Display system will replace manometer banks currently used in aeronautic test facilities. The Electronic Pressure Profile Display system consists of an industrial type Digital Pressure Transmitter (DPT) unit which interfaces with a host computer. The host computer collects the pressure data from the DPT unit, converts it into engineering units, and displays the readings on a high resolution graphics monitor in bar graph format. Software was developed to accomplish the above tasks and also draw facility diagrams as background information on the displays. Data transfer between host computer and DPT unit is done with serial communications. Up to 64 channels are displayed with one second update time. This paper describes the system configuration, its features, and its advantages over existing systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rahman, Nur Aira Abd, E-mail: nur-aira@nuclearmalaysia.gov.my; Yussup, Nolida; Ibrahim, Maslina Bt. Mohd
2015-04-29
A DAQ (data acquisition) software called RPTv2.0 has been developed for Radioactive Particle Tracking System in Malaysian Nuclear Agency. RPTv2.0 that features scanning control GUI, data acquisition from 12-channel counter via RS-232 interface, and multichannel analyzer (MCA). This software is fully developed on National Instruments Labview 8.6 platform. Ludlum Model 4612 Counter is used to count the signals from the scintillation detectors while a host computer is used to send control parameters, acquire and display data, and compute results. Each detector channel consists of independent high voltage control, threshold or sensitivity value and window settings. The counter is configured withmore » a host board and twelve slave boards. The host board collects the counts from each slave board and communicates with the computer via RS-232 data interface.« less
Definition and maintenance of a telemetry database dictionary
NASA Technical Reports Server (NTRS)
Knopf, William P. (Inventor)
2007-01-01
A telemetry dictionary database includes a component for receiving spreadsheet workbooks of telemetry data over a web-based interface from other computer devices. Another component routes the spreadsheet workbooks to a specified directory on the host processing device. A process then checks the received spreadsheet workbooks for errors, and if no errors are detected the spreadsheet workbooks are routed to another directory to await initiation of a remote database loading process. The loading process first converts the spreadsheet workbooks to comma separated value (CSV) files. Next, a network connection with the computer system that hosts the telemetry dictionary database is established and the CSV files are ported to the computer system that hosts the telemetry dictionary database. This is followed by a remote initiation of a database loading program. Upon completion of loading a flatfile generation program is manually initiated to generate a flatfile to be used in a mission operations environment by the core ground system.
NASA Astrophysics Data System (ADS)
Linsky, Jeffrey
2017-08-01
We propose to compute state-of-the-art model atmospheres (photospheres, chromospheres, transition regions and coronae) of the 4 K and 7 M exoplanet host stars observed by HST in the MUSCLES Treasury Survey, the nearest host star Proxima Centauri, and TRAPPIST-1. Our semi-empirical models will fit theunique high-resolution panchromatic (X-ray to infrared) spectra of these stars in the MAST High-Level Science Products archive consisting of COS and STIS UV spectra and near-simultaneous Chandra, XMM-Newton, and ground-based observations. We will compute models with the fully tested SSRPM computer software incorporating 52 atoms and ions in full non-LTE (435,986 spectral lines) and the 20 most-abundant diatomic molecules (about 2 million lines). This code has successfully fit the panchromatic spectrum of the M1.5 V exoplanet host star GJ 832 (Fontenla et al. 2016), the first M star with such a detailed model, and solar spectra. Our models will (1) predict the unobservable extreme-UV spectra, (2) determine radiative energy losses and balancing heating rates throughout these atmospheres, (3) compute a stellar irradiance library needed to describe the radiation environment of potentially habitable exoplanets to be studied by TESS and JWST, and (4) in the long post-HST era when UV observations will not be possible, the stellar irradiance library will be a powerful tool for predicting the panchromatic spectra of host stars that have only limited spectral coverage, in particular no UV spectra. The stellar models and spectral irradiance library will be placed quickly in MAST.
Multiuser Collaboration with Networked Mobile Devices
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Tai, Ann T.; Deng, Yong M.; Becks, Paul G.
2006-01-01
In this paper we describe a multiuser collaboration infrastructure that enables multiple mission scientists to remotely and collaboratively interact with visualization and planning software, using wireless networked personal digital assistants(PDAs) and other mobile devices. During ground operations of planetary rover and lander missions, scientists need to meet daily to review downlinked data and plan science activities. For example, scientists use the Science Activity Planner (SAP) in the Mars Exploration Rover (MER) mission to visualize downlinked data and plan rover activities during the science meetings [1]. Computer displays are projected onto large screens in the meeting room to enable the scientists to view and discuss downlinked images and data displayed by SAP and other software applications. However, only one person can interact with the software applications because input to the computer is limited to a single mouse and keyboard. As a result, the scientists have to verbally express their intentions, such as selecting a target at a particular location on the Mars terrain image, to that person in order to interact with the applications. This constrains communication and limits the returns of science planning. Furthermore, ground operations for Mars missions are fundamentally constrained by the short turnaround time for science and engineering teams to process and analyze data, plan the next uplink, generate command sequences, and transmit the uplink to the vehicle [2]. Therefore, improving ground operations is crucial to the success of Mars missions. The multiuser collaboration infrastructure enables users to control software applications remotely and collaboratively using mobile devices. The infrastructure includes (1) human-computer interaction techniques to provide natural, fast, and accurate inputs, (2) a communications protocol to ensure reliable and efficient coordination of the input devices and host computers, (3) an application-independent middleware that maintains the states, sessions, and interactions of individual users of the software applications, (4) an application programming interface to enable tight integration of applications and the middleware. The infrastructure is able to support any software applications running under the Windows or Unix platforms. The resulting technologies not only are applicable to NASA mission operations, but also useful in other situations such as design reviews, brainstorming sessions, and business meetings, as they can benefit from having the participants concurrently interact with the software applications (e.g., presentation applications and CAD design tools) to illustrate their ideas and provide inputs.
2011-01-01
Background Comparisons between refugees receiving health care in settlement-based facilities and persons living in host communities have found that refugees have better health outcomes. However, data that compares utilization of health services between refugees and the host population, and across refugee settlements, countries and regions is limited. The paper will address this information gap. The analysis in this paper uses data from the United Nations High Commissioner of Refugees (UNHCR) Health Information System (HIS). Methods Data about settlement populations and the use of outpatient health services were exported from the UNHCR health information system database. Tableau Desktop was used to explore the data. STATA was used for data cleaning and statistical analysis. Differences in various indicators of the use of health services by region, gender, age groups, and status (host national vs. refugee population) were analyzed for statistical significance using generalized estimating equation models that adjusted for correlated data within refugee settlements over time. Results Eighty-one refugee settlements were included in this study and an average population of 1.53 million refugees was receiving outpatient health services between 2008 and 2009. The crude utilization rate among refugees is 2.2 visits per person per year across all settlements. The refugee utilization rate in Asia (3.5) was higher than in Africa on average (1.8). Among refugees, females have a statistically significant higher utilization rate than males (2.4 visits per person per year vs. 2.1). The proportion of new outpatient attributable to refugees is higher than that attributable to host nationals. In the Asian settlements, only 2% outpatient visits, on average, were attributable to host community members. By contrast, in Africa, the proportion of new outpatient (OPD) visits by host nationals was 21% on average; in many Ugandan settlements, the proportion of outpatient visits attributable to host community members was higher than that for refugees. There was no statistically significant difference between the size of the male and female populations across refugee settlements. Across all settlements reporting to the UNHCR database, the percent of the refugee population that was less than five years of age is 16% on average. Conclusions The availability of a centralized database of health information across UNHCR-supported refugee settlements is a rich resource. The SPHERE standard for emergencies of 1-4 visits per person per year appears to be relevant for Asia in the post-emergency phase, but not for Africa. In Africa, a post-emergency standard of 1-2 visits per person per year should be considered. Although it is often assumed that the size of the female population in refugee settlements is higher than males, we found no statistically significant difference between the size of the male and female populations in refugee settlements overall. Another assumption---that the under-fives make up 20% of the settlement population during the emergency phase---does not appear to hold for the post-emergency phase; under-fives made up about 16% of refugee settlement populations. PMID:21936911
uPy: a ubiquitous computer graphics Python API with Biological Modeling Applications
Autin, L.; Johnson, G.; Hake, J.; Olson, A.; Sanner, M.
2015-01-01
In this paper we describe uPy, an extension module for the Python programming language that provides a uniform abstraction of the APIs of several 3D computer graphics programs called hosts, including: Blender, Maya, Cinema4D, and DejaVu. A plugin written with uPy is a unique piece of code that will run in all uPy-supported hosts. We demonstrate the creation of complex plug-ins for molecular/cellular modeling and visualization and discuss how uPy can more generally simplify programming for many types of projects (not solely science applications) intended for multi-host distribution. uPy is available at http://upy.scripps.edu PMID:24806987
Energy Conservation Using Dynamic Voltage Frequency Scaling for Computational Cloud
Florence, A. Paulin; Shanthi, V.; Simon, C. B. Sunil
2016-01-01
Cloud computing is a new technology which supports resource sharing on a “Pay as you go” basis around the world. It provides various services such as SaaS, IaaS, and PaaS. Computation is a part of IaaS and the entire computational requests are to be served efficiently with optimal power utilization in the cloud. Recently, various algorithms are developed to reduce power consumption and even Dynamic Voltage and Frequency Scaling (DVFS) scheme is also used in this perspective. In this paper we have devised methodology which analyzes the behavior of the given cloud request and identifies the associated type of algorithm. Once the type of algorithm is identified, using their asymptotic notations, its time complexity is calculated. Using best fit strategy the appropriate host is identified and the incoming job is allocated to the victimized host. Using the measured time complexity the required clock frequency of the host is measured. According to that CPU frequency is scaled up or down using DVFS scheme, enabling energy to be saved up to 55% of total Watts consumption. PMID:27239551
Energy Conservation Using Dynamic Voltage Frequency Scaling for Computational Cloud.
Florence, A Paulin; Shanthi, V; Simon, C B Sunil
2016-01-01
Cloud computing is a new technology which supports resource sharing on a "Pay as you go" basis around the world. It provides various services such as SaaS, IaaS, and PaaS. Computation is a part of IaaS and the entire computational requests are to be served efficiently with optimal power utilization in the cloud. Recently, various algorithms are developed to reduce power consumption and even Dynamic Voltage and Frequency Scaling (DVFS) scheme is also used in this perspective. In this paper we have devised methodology which analyzes the behavior of the given cloud request and identifies the associated type of algorithm. Once the type of algorithm is identified, using their asymptotic notations, its time complexity is calculated. Using best fit strategy the appropriate host is identified and the incoming job is allocated to the victimized host. Using the measured time complexity the required clock frequency of the host is measured. According to that CPU frequency is scaled up or down using DVFS scheme, enabling energy to be saved up to 55% of total Watts consumption.
Stennis hosts NASA Night at Zephyr Field
2010-08-20
Stennis employee Chris Smith helps a young child 'launch' a balloon rocket. Employees from NASA's John C. Stennis Space Center traveled to New Orleans on Aug. 20 to host NASA Night at Zephyr Field. Stennis personnel provided a variety of activities and materials for persons attending a game between the New Orleans Zephyrs and the Las Vegas 51s.
Examination of Students' Selection Criteria for International Education
ERIC Educational Resources Information Center
Ahmad, Syed Zamberi; Buchanan, F. Robert; Ahmad, Norita
2016-01-01
Purpose: Motivations for study abroad in tourism and hospitality were examined as to the influence of a variety of personal criteria in the individual decision process of adult learners to select a host country and host institution of study. The paper aims to discuss this issue. Design/methodology/approach: Push-pull factors (Mazzarol and Soutar,…
An Ecological Framework for Cancer Communication: Implications for Research
Intille, Stephen S; Zabinski, Marion F
2005-01-01
The field of cancer communication has undergone a major revolution as a result of the Internet. As recently as the early 1990s, face-to-face, print, and the telephone were the dominant methods of communication between health professionals and individuals in support of the prevention and treatment of cancer. Computer-supported interactive media existed, but this usually required sophisticated computer and video platforms that limited availability. The introduction of point-and-click interfaces for the Internet dramatically improved the ability of non-expert computer users to obtain and publish information electronically on the Web. Demand for Web access has driven computer sales for the home setting and improved the availability, capability, and affordability of desktop computers. New advances in information and computing technologies will lead to similarly dramatic changes in the affordability and accessibility of computers. Computers will move from the desktop into the environment and onto the body. Computers are becoming smaller, faster, more sophisticated, more responsive, less expensive, and—essentially—ubiquitous. Computers are evolving into much more than desktop communication devices. New computers include sensing, monitoring, geospatial tracking, just-in-time knowledge presentation, and a host of other information processes. The challenge for cancer communication researchers is to acknowledge the expanded capability of the Web and to move beyond the approaches to health promotion, behavior change, and communication that emerged during an era when language- and image-based interpersonal and mass communication strategies predominated. Ecological theory has been advanced since the early 1900s to explain the highly complex relationships among individuals, society, organizations, the built and natural environments, and personal and population health and well-being. This paper provides background on ecological theory, advances an Ecological Model of Internet-Based Cancer Communication intended to broaden the vision of potential uses of the Internet for cancer communication, and provides some examples of how such a model might inform future research and development in cancer communication. PMID:15998614
Resource Guide for Persons with Speech or Language Impairments.
ERIC Educational Resources Information Center
IBM, Atlanta, GA. National Support Center for Persons with Disabilities.
The resource guide identifies products which assist speech or language impaired individuals in accessing IBM (International Business Machine) Personal Computers or the IBM Personal System/2 family of products. An introduction provides a general overview of ways computers can help persons with speech or language handicaps. The document then…
Models of microbiome evolution incorporating host and microbial selection.
Zeng, Qinglong; Wu, Steven; Sukumaran, Jeet; Rodrigo, Allen
2017-09-25
Numerous empirical studies suggest that hosts and microbes exert reciprocal selective effects on their ecological partners. Nonetheless, we still lack an explicit framework to model the dynamics of both hosts and microbes under selection. In a previous study, we developed an agent-based forward-time computational framework to simulate the neutral evolution of host-associated microbial communities in a constant-sized, unstructured population of hosts. These neutral models allowed offspring to sample microbes randomly from parents and/or from the environment. Additionally, the environmental pool of available microbes was constituted by fixed and persistent microbial OTUs and by contributions from host individuals in the preceding generation. In this paper, we extend our neutral models to allow selection to operate on both hosts and microbes. We do this by constructing a phenome for each microbial OTU consisting of a sample of traits that influence host and microbial fitnesses independently. Microbial traits can influence the fitness of hosts ("host selection") and the fitness of microbes ("trait-mediated microbial selection"). Additionally, the fitness effects of traits on microbes can be modified by their hosts ("host-mediated microbial selection"). We simulate the effects of these three types of selection, individually or in combination, on microbiome diversities and the fitnesses of hosts and microbes over several thousand generations of hosts. We show that microbiome diversity is strongly influenced by selection acting on microbes. Selection acting on hosts only influences microbiome diversity when there is near-complete direct or indirect parental contribution to the microbiomes of offspring. Unsurprisingly, microbial fitness increases under microbial selection. Interestingly, when host selection operates, host fitness only increases under two conditions: (1) when there is a strong parental contribution to microbial communities or (2) in the absence of a strong parental contribution, when host-mediated selection acts on microbes concomitantly. We present a computational framework that integrates different selective processes acting on the evolution of microbiomes. Our framework demonstrates that selection acting on microbes can have a strong effect on microbial diversities and fitnesses, whereas selection on hosts can have weaker outcomes.
A system for distributed intrusion detection
DOE Office of Scientific and Technical Information (OSTI.GOV)
Snapp, S.R.; Brentano, J.; Dias, G.V.
1991-01-01
The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of ourmore » present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.« less
Calculating binding free energies of host-guest systems using the AMOEBA polarizable force field.
Bell, David R; Qi, Rui; Jing, Zhifeng; Xiang, Jin Yu; Mejias, Christopher; Schnieders, Michael J; Ponder, Jay W; Ren, Pengyu
2016-11-09
Molecular recognition is of paramount interest in many applications. Here we investigate a series of host-guest systems previously used in the SAMPL4 blind challenge by using molecular simulations and the AMOEBA polarizable force field. The free energy results computed by Bennett's acceptance ratio (BAR) method using the AMOEBA polarizable force field ranked favorably among the entries submitted to the SAMPL4 host-guest competition [Muddana, et al., J. Comput.-Aided Mol. Des., 2014, 28, 305-317]. In this work we conduct an in-depth analysis of the AMOEBA force field host-guest binding thermodynamics by using both BAR and the orthogonal space random walk (OSRW) methods. The binding entropy-enthalpy contributions are analyzed for each host-guest system. For systems of inordinate binding entropy-enthalpy values, we further examine the hydrogen bonding patterns and configurational entropy contribution. The binding mechanism of this series of host-guest systems varies from ligand to ligand, driven by enthalpy and/or entropy changes. Convergence of BAR and OSRW binding free energy methods is discussed. Ultimately, this work illustrates the value of molecular modelling and advanced force fields for the exploration and interpretation of binding thermodynamics.
Nair, Pradeep S; John, Eugene B
2007-01-01
Aligning specific sequences against a very large number of other sequences is a central aspect of bioinformatics. With the widespread availability of personal computers in biology laboratories, sequence alignment is now often performed locally. This makes it necessary to analyse the performance of personal computers for sequence aligning bioinformatics benchmarks. In this paper, we analyse the performance of a personal computer for the popular BLAST and FASTA sequence alignment suites. Results indicate that these benchmarks have a large number of recurring operations and use memory operations extensively. It seems that the performance can be improved with a bigger L1-cache.
Design of Remote GPRS-based Gas Data Monitoring System
NASA Astrophysics Data System (ADS)
Yan, Xiyue; Yang, Jianhua; Lu, Wei
2018-01-01
In order to solve the problem of remote data transmission of gas flowmeter, and realize unattended operation on the spot, an unattended remote monitoring system based on GPRS for gas data is designed in this paper. The slave computer of this system adopts embedded microprocessor to read data of gas flowmeter through rs-232 bus and transfers it to the host computer through DTU. In the host computer, the VB program dynamically binds the Winsock control to receive and parse data. By using dynamic data exchange, the Kingview configuration software realizes history trend curve, real time trend curve, alarm, print, web browsing and other functions.
Today's Personal Computers: Products for Every Need--Part II.
ERIC Educational Resources Information Center
Personal Computing, 1981
1981-01-01
Looks at microcomputers manufactured by Altos Computer Systems, Cromemco, Exidy, Intelligent Systems, Intertec Data Systems, Mattel, Nippon Electronics, Northstar, Personal Micro Computers, and Sinclair. (Part I of this article, examining other computers, appeared in the May 1981 issue.) Journal availability: Hayden Publishing Company, 50 Essex…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-04
...--Intersection of Cloud Computing and Mobility Forum and Workshop AGENCY: National Institute of Standards and.../intersection-of-cloud-and-mobility.cfm . SUPPLEMENTARY INFORMATION: NIST hosted six prior Cloud Computing Forum... interoperability, portability, and security, discuss the Federal Government's experience with cloud computing...
A Survey of Antiviral Drugs for Bioweapons: Review
2005-01-01
person . An attack with these viruses would result in high morbidity and mortality and cause widespread panic. With the exception of smallpox and...infected cells and are not dependent upon the host cell nucleus. Possible targets for these viruses are the DNA polymerase, virus -encoded immune modulators... person to person . An attack with these viruses would result in high morbidity and mortality and cause widespread panic. With the
ERIC Educational Resources Information Center
Aktag, Isil
2015-01-01
The purpose of this study is to determine the computer self-efficacy, performance outcome, personal outcome, and affect and anxiety level of physical education teachers. Influence of teaching experience, computer usage and participation of seminars or in-service programs on computer self-efficacy level were determined. The subjects of this study…
Click! 101 Computer Activities and Art Projects for Kids and Grown-Ups.
ERIC Educational Resources Information Center
Bundesen, Lynne; And Others
This book presents 101 computer activities and projects geared toward children and adults. The activities for both personal computers (PCs) and Macintosh were developed on the Windows 95 computer operating system, but they are adaptable to non-Windows personal computers as well. The book is divided into two parts. The first part provides an…
Computer Language Settings and Canadian Spellings
ERIC Educational Resources Information Center
Shuttleworth, Roger
2011-01-01
The language settings used on personal computers interact with the spell-checker in Microsoft Word, which directly affects the flagging of spellings that are deemed incorrect. This study examined the language settings of personal computers owned by a group of Canadian university students. Of 21 computers examined, only eight had their Windows…
Specification of Computer Systems by Objectives.
ERIC Educational Resources Information Center
Eltoft, Douglas
1989-01-01
Discusses the evolution of mainframe and personal computers, and presents a case study of a network developed at the University of Iowa called the Iowa Computer-Aided Engineering Network (ICAEN) that combines Macintosh personal computers with Apollo workstations. Functional objectives are stressed as the best measure of system performance. (LRW)
[The host community of a child with food allergies: the personalized care project (PCP)].
Rancé, F
2010-12-01
The personalized care project (PCP) can manage allergic emergencies that may occur during school hours. Other objectives are to facilitate academic achievement, social and professional integration of children and adolescents with chronic illness such as food allergy, by promoting education through certain changes. The PCP is derived from official files including Circular N(o) 2003-135 of September 8 and the inter-ministerial circular of 25 June 2001. The family must request a protocol with the host school principal or school head. Then, the doctor of Education organizes the drafting of the document based on information provided by the physician (or allergist). Copyright © 2010 Elsevier Masson SAS. All rights reserved.
Vertical-angle control system in the LLMC
NASA Astrophysics Data System (ADS)
Li, Binhua; Yang, Lei; Tie, Qiongxian; Mao, Wei
2000-10-01
A control system of the vertical angle transmission used in the Lower Latitude Meridian Circle (LLMC) is described in this paper. The transmission system can change the zenith distance of the tube quickly and precisely. It works in three modes: fast motion, slow motion and lock mode. The fast motion mode and the slow motion mode are that the tube of the instrument is driven by a fast motion stepper motor and a slow motion one separately. The lock mode is running for lock mechanism that is driven by a lock stepper motor. These three motors are controlled together by a single chip microcontroller, which is controlled in turn by a host personal computer. The slow motion mechanism and its rotational step angle are fully discussed because the mechanism is not used before. Then the hardware structure of this control system based on a microcontroller is described. Control process of the system is introduced during a normal observation, which is divided into eleven steps. All the steps are programmed in our control software in C++ and/or in ASM. The C++ control program is set up in the host PC, while the ASM control program is in the microcontroller system. Structures and functions of these rprograms are presented. Some details and skills for programming are discussed in the paper too.
A Novel Centrality Measure for Network-wide Cyber Vulnerability Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sathanur, Arun V.; Haglin, David J.
In this work we propose a novel formulation that models the attack and compromise on a cyber network as a combination of two parts - direct compromise of a host and the compromise occurring through the spread of the attack on the network from a compromised host. The model parameters for the nodes are a concise representation of the host profiles that can include the risky behaviors of the associated human users while the model parameters for the edges are based on the existence of vulnerabilities between each pair of connected hosts. The edge models relate to the summary representationsmore » of the corresponding attack-graphs. This results in a formulation based on Random Walk with Restart (RWR) and the resulting centrality metric can be solved for in an efficient manner through the use of sparse linear solvers. Thus the formulation goes beyond mere topological considerations in centrality computations by summarizing the host profiles and the attack graphs into the model parameters. The computational efficiency of the method also allows us to also quantify the uncertainty in the centrality measure through Monte Carlo analysis.« less
Stennis hosts NASA Night at Zephyr Field
2010-08-20
NASA's John C. Stennis Space Center Director Patrick Scheuermann throws the first pitch of the game Aug. 20 at New Orleans Zephyr Field. Stennis employees traveled to New Orleans to host NASA Night at Zephyr Field. Stennis personnel provided a variety of activities and materials for persons attending a game between the New Orleans Zephyrs and the Las Vegas 51s.
Smallpox and live-virus vaccination in transplant recipients.
Fishman, Jay A
2003-07-01
Recent bioterrorism raises the specter of reemergence of smallpox as a clinical entity. The mortality of variola major infection ('typical smallpox') was approximately 30% in past outbreaks. Programs for smallpox immunization for healthcare workers have been proposed. Atypical forms of smallpox presenting with flat or hemorrhagic skin lesions are most common in individuals with immune deficits with historic mortality approaching 100%. Smallpox vaccination, even after exposure, is highly effective. Smallpox vaccine contains a highly immunogenic live virus, vaccinia. Few data exist for the impact of variola or safety of vaccinia in immunocompromised hosts. Both disseminated infection by vaccinia and person-to-person spread after vaccination are uncommon. When it occurs, secondary vaccinia has usually affected individuals with pre-existing skin conditions (atopic dermatitis or eczema) or with other underlying immune deficits. Historically, disseminated vaccinia infection was uncommon but often fatal even in the absence of the most severe form of disease, "progressive vaccinia". Some responded to vaccinia immune globulin. Smallpox exposure would be likely to cause significant mortality among immunocompromised hosts. In the absence of documented smallpox exposures, immunocompromised hosts should not be vaccinated against smallpox. Planning for bioterrorist events must include consideration of uniquely susceptible hosts.
Serial network simplifies the design of multiple microcomputer systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Folkes, D.
1981-01-01
Recently there has been a lot of interest in developing network communication schemes for carrying digital data between locally distributed computing stations. Many of these schemes have focused on distributed networking techniques for data processing applications. These applications suggest the use of a serial, multipoint bus, where a number of remote intelligent units act as slaves to a central or host computer. Each slave would be serially addressable from the host and would perform required operations upon being addressed by the host. Based on an MK3873 single-chip microcomputer, the SCU 20 is designed to be such a remote slave device.more » The capabilities of the SCU 20 and its use in systems applications are examined.« less
AIR TOXICS EMISSIONS FROM ELECTRONICS INCINERATION
The purpose of this project is to examine the emissions of air toxics from the combustion of electronics equipment, primarily personal computer components. Due to a shortage of recycling programs for personal computers and other personal electronics equipment, most of these mate...
ERIC Educational Resources Information Center
Reed, Lori
2000-01-01
Uses discourses on "computer-phobia" and "computer addiction" to describe the cultural work involved and marketing strategies used between 1960s-1990s regarding management of computer fear. Draws on popular discourses, advertisements, and advice literature to explore how the personal computer was successfully connected to middle-class family…
Inviting and Sponsoring Soviet Guests: A Handbook for American Hosts.
ERIC Educational Resources Information Center
Institute for Soviet-American Relations, Washington, DC.
The purpose of this handbook is to encourage exchange visits between citizens of the United States and the USSR. Person-to-person encounters remain the most effective means of bringing home the reality that people from diverse cultures do share similar needs, emotions, and aspirations. The information provided is intended for individuals and…
My Secondary Modern: Stories from the Invisible Generation
ERIC Educational Resources Information Center
Williams, Emma-Louise; Rosen, Michael
2017-01-01
One of the least recorded and analysed aspects of English and Welsh education is the personal experience of millions of people attending secondary modern schools following the 1944 Education Act. Since 2012, Emma-Louise Williams and Michael Rosen have hosted a moderated blog for self-selecting personal testimony from anyone involved. So far, some…
Subpersonalities with dreaming functions in a patient with multiple personalities.
Salley, R D
1988-02-01
A case report of the hypnotherapy and unusual dream work of a patient with multiple personality disorder is described. Two of his 13 personalities claimed a dream production function. These personalities claimed the ability to organize and create dreams in order to communicate with the host personality. In the course of therapy, clinical data are described that tend to support this claim. The data of this case are then briefly applied to some current models of dream function. Some dream theories with an information-processing and reprogramming emphasis are particularly supported by this case material.
The Remote Analysis Station (RAS) as an instructional system
NASA Technical Reports Server (NTRS)
Rogers, R. H.; Wilson, C. L.; Dye, R. H.; Jaworski, E.
1981-01-01
"Hands-on" training in LANDSAT data analysis techniques can be obtained using a desk-top, interactive remote analysis station (RAS) which consists of a color CRT imagery display, with alphanumeric overwrite and keyboard, as well as a cursor controller and modem. This portable station can communicate via modem and dial-up telephone with a host computer at 1200 baud or it can be hardwired to a host computer at 9600 baud. A Z80 microcomputer controls the display refresh memory and remote station processing. LANDSAT data is displayed as three-band false-color imagery, one-band color-sliced imagery, or color-coded processed imagery. Although the display memory routinely operates at 256 x 256 picture elements, a display resolution of 128 x 128 can be selected to fill the display faster. In the false color mode the computer packs the data into one 8-bit character. When the host is not sending pictorial information the characters sent are in ordinary ASCII code. System capabilities are described.
NASA Technical Reports Server (NTRS)
Ingels, F. M.; Rives, T. B.
1987-01-01
An analytical analysis of the HOSC Generic Peripheral processing system was conducted. The results are summarized and they indicate that the maximum delay in performing screen change requests should be less than 2.5 sec., occurring for a slow VAX host to video screen I/O rate of 50 KBps. This delay is due to the average I/O rate from the video terminals to their host computer. Software structure of the main computers and the host computers will have greater impact on screen change or refresh response times. The HOSC data system model was updated by a newly coded PASCAL based simulation program which was installed on the HOSC VAX system. This model is described and documented. Suggestions are offered to fine tune the performance of the ETERNET interconnection network. Suggestions for using the Nutcracker by Excelan to trace itinerate packets which appear on the network from time to time were offered in discussions with the HOSC personnel. Several visits to the HOSC facility were to install and demonstrate the simulation model.
High Performance Computing Meets Energy Efficiency - Continuum Magazine |
NREL High Performance Computing Meets Energy Efficiency High Performance Computing Meets Energy turbines. Simulation by Patrick J. Moriarty and Matthew J. Churchfield, NREL The new High Performance Computing Data Center at the National Renewable Energy Laboratory (NREL) hosts high-speed, high-volume data
The Impact of Cognitive and Non-Cognitive Personality Traits on Computer Literacy Level
ERIC Educational Resources Information Center
Saparniene, Diana; Merkys, Gediminas; Saparnis, Gintaras
2006-01-01
Purpose: The paper deals with the study of students' computer literacy one of the purposes being demonstration the impact of the cognitive and non-cognitive personality traits (attention, verbal and non-verbal intelligence, emotional-motivational relationship with computer, learning strategies, etc.) on the quality of computer literacy.…
47 CFR 15.101 - Equipment authorization of unintentional radiators.
Code of Federal Regulations, 2014 CFR
2014-10-01
.... TV interface device Declaration of Conformity or Certification. Cable system terminal device Declaration of Conformity. Stand-alone cable input selector switch Verification. Class B personal computers... used with Class B personal computers Declaration of Conformity or Certification. 1 Class B personal...
47 CFR 15.101 - Equipment authorization of unintentional radiators.
Code of Federal Regulations, 2010 CFR
2010-10-01
.... TV interface device Declaration of Conformity or Certification. Cable system terminal device Declaration of Conformity. Stand-alone cable input selector switch Verification. Class B personal computers... used with Class B personal computers Declaration of Conformity or Certification. 1 Class B personal...
47 CFR 15.101 - Equipment authorization of unintentional radiators.
Code of Federal Regulations, 2012 CFR
2012-10-01
.... TV interface device Declaration of Conformity or Certification. Cable system terminal device Declaration of Conformity. Stand-alone cable input selector switch Verification. Class B personal computers... used with Class B personal computers Declaration of Conformity or Certification. 1 Class B personal...
47 CFR 15.101 - Equipment authorization of unintentional radiators.
Code of Federal Regulations, 2011 CFR
2011-10-01
.... TV interface device Declaration of Conformity or Certification. Cable system terminal device Declaration of Conformity. Stand-alone cable input selector switch Verification. Class B personal computers... used with Class B personal computers Declaration of Conformity or Certification. 1 Class B personal...
47 CFR 15.101 - Equipment authorization of unintentional radiators.
Code of Federal Regulations, 2013 CFR
2013-10-01
.... TV interface device Declaration of Conformity or Certification. Cable system terminal device Declaration of Conformity. Stand-alone cable input selector switch Verification. Class B personal computers... used with Class B personal computers Declaration of Conformity or Certification. 1 Class B personal...
A Research Program in Computer Technology. 1987 Annual Technical Report
1990-07-01
TITLE (Indcle Security Clanificstion) 1987 Annual Technical Report: *A Research Program in Computer Technology (Unclassified) 12. PERSONAL AUTHOR(S) IS...distributed processing, survivable networks 17. NCE: distributed processing, local networks, personal computers, workstation environment 18. SC Dev...are the auw’iors and should not be Interpreted as representIng the official opinion or policy of DARPA, the U.S. Government, or any person or agency
[Legal aspects of Web 2.0 in the health field].
Beslay, Nathalie; Jeunehomme, Marie
2009-10-01
Web 2.0 sites are considered to be hosting providers and not publishers of user-generated content. The liability of hosting providers' liability is defined by the law enacted on June 21, 2004, on confidence in the digital economy. Hosting providers must promptly remove the information they host or make its access impossible once they are informed of its illegality. They are required to obtain and retain data to enable identification of any person who has contributed to content hosted by them. The liability of hosting providers has arisen in numerous disputes about user-produced content in various situations (discussion lists, blogs, etc.). The National Board of Physicians has developed specific ethical guidelines for web sites devoted to health issues and specifically for physician-authored content. The National Board of Physicians acknowledges that physicians can present themselves, their office, and their specific practice on their web site, notwithstanding any restrictions otherwise applicable to advertising.
Webcasting in home and hospice care services: virtual communication in home care.
Smith-Stoner, Marilyn
2011-06-01
The access to free live webcasting over home computers was much more available in 2007, when three military leaders from West Point, with the purpose of helping military personnel stay connected with their families when deployed, developed Ustream.tv. There are many types of Web-based video streaming applications. This article describes Ustream, a free and effective communication tool to virtually connect staff. There are many features in Ustream, but the most useful for home care and hospice service providers is its ability to broadcast sound and video to anyone with a broadband Internet connection, a chat room for users to interact during a presentation, and the ability to have a "co-host" or second person also broadcast simultaneously. Agencies that provide community-based services in the home will benefit from integration of Web-based video streaming into their communication strategy.
Ground Software Maintenance Facility (GSMF) system manual
NASA Technical Reports Server (NTRS)
Derrig, D.; Griffith, G.
1986-01-01
The Ground Software Maintenance Facility (GSMF) is designed to support development and maintenance of spacelab ground support software. THE GSMF consists of a Perkin Elmer 3250 (Host computer) and a MITRA 125s (ATE computer), with appropriate interface devices and software to simulate the Electrical Ground Support Equipment (EGSE). This document is presented in three sections: (1) GSMF Overview; (2) Software Structure; and (3) Fault Isolation Capability. The overview contains information on hardware and software organization along with their corresponding block diagrams. The Software Structure section describes the modes of software structure including source files, link information, and database files. The Fault Isolation section describes the capabilities of the Ground Computer Interface Device, Perkin Elmer host, and MITRA ATE.
An Intelligent Terminal for Access to a Medical Database
Womble, M. E.; Wilson, S. D.; Keiser, H. N.; Tworek, M. L.
1978-01-01
Very powerful data base management systems (DBMS) now exist which allow medical personnel access to patient record data bases. DBMS's make it easy to retrieve either complete or abbreviated records of patients with similar characteristics. In addition, statistics on data base records are immediately accessible. However, the price of this power is a large computer with the inherent problems of access, response time, and reliability. If a general purpose, time-shared computer is used to get this power, the response time to a request can be either rapid or slow, depending upon loading by other users. Furthermore, if the computer is accessed via dial-up telephone lines, there is competition with other users for telephone ports. If either the DBMS or the host machine is replaced, the medical users, who are typically not sophisticated in computer usage, are forced to learn the new system. Microcomputers, because of their low cost and adaptability, lend themselves to a solution of these problems. A microprocessor-based intelligent terminal has been designed and implemented at the USAF School of Aerospace Medicine to provide a transparent interface between the user and his data base. The intelligent terminal system includes multiple microprocessors, floppy disks, a CRT terminal, and a printer. Users interact with the system at the CRT terminal using menu selection (framing). The system translates the menu selection into the query language of the DBMS and handles all actual communication with the DBMS and its host computer, including telephone dialing and sign on procedures, as well as the actual data base query and response. Retrieved information is stored locally for CRT display, hard copy production, and/or permanent retention. Microprocessor-based communication units provide security for sensitive medical data through encryption/decryption algorithms and high reliability error detection transmission schemes. Highly modular software design permits adapation to a different DBMS and/or host computer with only minor localized software changes. Importantly, this portability is completely transparent to system users. Although the terminal system is independent of the host computer and its DBMS, it has been linked to a UNIVAC 1108 computer supporting MRI's SYSTEM 2000 DBMS.
Developmental Stages in School Computer Use: Neither Marx Nor Piaget.
ERIC Educational Resources Information Center
Lengel, James G.
Karl Marx's theory of stages can be applied to computer use in the schools. The first stage, the P Stage, comprises the entry of the computer into the school. Computer use at this stage is personal and tends to center around one personality. Social studies teachers are seldom among this select few. The second stage of computer use, the D Stage, is…
A Research Program in Computer Technology. 1986 Annual Technical Report
1989-08-01
1986 (Annual Technical Report I July 1985 - June 1986 A Research Program in Computer Technology ISI/SR-87-178 U S C INFORMA-TION S C I EN C ES...Program in Computer Technology (Unclassified) 12. PERSONAL AUTHOR(S) 151 Research Staff 13a. TYPE OF REPORT 113b. TIME COVERED 14 DATE OF REPORT (Yeer...survivable networks 17. distributed processing, local networks, personal computers, workstation environment 18. computer acquisition, Strategic Computing 19
Philipson, Casandra W.; Bassaganya-Riera, Josep; Viladomiu, Monica; Kronsteiner, Barbara; Abedi, Vida; Hoops, Stefan; Michalak, Pawel; Kang, Lin; Girardin, Stephen E.; Hontecillas, Raquel
2015-01-01
Helicobacter pylori colonizes half of the world’s population as the dominant member of the gastric microbiota resulting in a lifelong chronic infection. Host responses toward the bacterium can result in asymptomatic, pathogenic or even favorable health outcomes; however, mechanisms underlying the dual role of H. pylori as a commensal versus pathogenic organism are not well characterized. Recent evidence suggests mononuclear phagocytes are largely involved in shaping dominant immunity during infection mediating the balance between host tolerance and succumbing to overt disease. We combined computational modeling, bioinformatics and experimental validation in order to investigate interactions between macrophages and intracellular H. pylori. Global transcriptomic analysis on bone marrow-derived macrophages (BMDM) in a gentamycin protection assay at six time points unveiled the presence of three sequential host response waves: an early transient regulatory gene module followed by sustained and late effector responses. Kinetic behaviors of pattern recognition receptors (PRRs) are linked to differential expression of spatiotemporal response waves and function to induce effector immunity through extracellular and intracellular detection of H. pylori. We report that bacterial interaction with the host intracellular environment caused significant suppression of regulatory NLRC3 and NLRX1 in a pattern inverse to early regulatory responses. To further delineate complex immune responses and pathway crosstalk between effector and regulatory PRRs, we built a computational model calibrated using time-series RNAseq data. Our validated computational hypotheses are that: 1) NLRX1 expression regulates bacterial burden in macrophages; and 2) early host response cytokines down-regulate NLRX1 expression through a negative feedback circuit. This paper applies modeling approaches to characterize the regulatory role of NLRX1 in mechanisms of host tolerance employed by macrophages to respond to and/or to co-exist with intracellular H. pylori. PMID:26367386
Data Acquisition System for Multi-Frequency Radar Flight Operations Preparation
NASA Technical Reports Server (NTRS)
Leachman, Jonathan
2010-01-01
A three-channel data acquisition system was developed for the NASA Multi-Frequency Radar (MFR) system. The system is based on a commercial-off-the-shelf (COTS) industrial PC (personal computer) and two dual-channel 14-bit digital receiver cards. The decimated complex envelope representations of the three radar signals are passed to the host PC via the PCI bus, and then processed in parallel by multiple cores of the PC CPU (central processing unit). The innovation is this parallelization of the radar data processing using multiple cores of a standard COTS multi-core CPU. The data processing portion of the data acquisition software was built using autonomous program modules or threads, which can run simultaneously on different cores. A master program module calculates the optimal number of processing threads, launches them, and continually supplies each with data. The benefit of this new parallel software architecture is that COTS PCs can be used to implement increasingly complex processing algorithms on an increasing number of radar range gates and data rates. As new PCs become available with higher numbers of CPU cores, the software will automatically utilize the additional computational capacity.
NASA Astrophysics Data System (ADS)
Yussup, N.; Ibrahim, M. M.; Lombigit, L.; Rahman, N. A. A.; Zin, M. R. M.
2014-02-01
Typically a system consists of hardware as the controller and software which is installed in the personal computer (PC). In the effective nuclear detection, the hardware involves the detection setup and the electronics used, with the software consisting of analysis tools and graphical display on PC. A data acquisition interface is necessary to enable the communication between the controller hardware and PC. Nowadays, Universal Serial Bus (USB) has become a standard connection method for computer peripherals and has replaced many varieties of serial and parallel ports. However the implementation of USB is complex. This paper describes the implementation of data acquisition interface between a field-programmable gate array (FPGA) board and a PC by exploiting the USB link of the FPGA board. The USB link is based on an FTDI chip which allows direct access of input and output to the Joint Test Action Group (JTAG) signals from a USB host and a complex programmable logic device (CPLD) with a 24 MHz clock input to the USB link. The implementation and results of using the USB link of FPGA board as the data interfacing are discussed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yussup, N.; Ibrahim, M. M.; Lombigit, L.
Typically a system consists of hardware as the controller and software which is installed in the personal computer (PC). In the effective nuclear detection, the hardware involves the detection setup and the electronics used, with the software consisting of analysis tools and graphical display on PC. A data acquisition interface is necessary to enable the communication between the controller hardware and PC. Nowadays, Universal Serial Bus (USB) has become a standard connection method for computer peripherals and has replaced many varieties of serial and parallel ports. However the implementation of USB is complex. This paper describes the implementation of datamore » acquisition interface between a field-programmable gate array (FPGA) board and a PC by exploiting the USB link of the FPGA board. The USB link is based on an FTDI chip which allows direct access of input and output to the Joint Test Action Group (JTAG) signals from a USB host and a complex programmable logic device (CPLD) with a 24 MHz clock input to the USB link. The implementation and results of using the USB link of FPGA board as the data interfacing are discussed.« less
UNIX security in a supercomputing environment
NASA Technical Reports Server (NTRS)
Bishop, Matt
1989-01-01
The author critiques some security mechanisms in most versions of the Unix operating system and suggests more effective tools that either have working prototypes or have been implemented, for example in secure Unix systems. Although no computer (not even a secure one) is impenetrable, breaking into systems with these alternate mechanisms will cost more, require more skill, and be more easily detected than penetrations of systems without these mechanisms. The mechanisms described fall into four classes (with considerable overlap). User authentication at the local host affirms the identity of the person using the computer. The principle of least privilege dictates that properly authenticated users should have rights precisely sufficient to perform their tasks, and system administration functions should be compartmentalized; to this end, access control lists or capabilities should either replace or augment the default Unix protection system, and mandatory access controls implementing multilevel security models and integrity mechanisms should be available. Since most users access supercomputing environments using networks, the third class of mechanisms augments authentication (where feasible). As no security is perfect, the fourth class of mechanism logs events that may indicate possible security violations; this will allow the reconstruction of a successful penetration (if discovered), or possibly the detection of an attempted penetration.
Using diffusion k-means for simple stellar population modeling of low S/N quasar host galaxy spectra
NASA Astrophysics Data System (ADS)
Mosby, Gregory; Tremonti, Christina A.; Hooper, Eric; Wolf, Marsha J.; Sheinis, Andrew; Richards, Joseph
2016-01-01
Quasar host galaxies (QHGs) represent a unique stage in galaxy evolution that can provide a glimpse into the relationship between an active supermassive black hole (SMBH) and its host galaxy. However, observing the hosts of high luminosity, unobscured quasars in the optical is complicated by the large ratio of quasar to host galaxy light. One strategy in optical spectroscopy is to use offset longslit observations of the host galaxy. This method allows the centers of QHGs to be analyzed apart from other regions of their host galaxies. But light from the accreting black hole's point spread function still enters the host galaxy observations, and where the contrast between the host and intervening quasar light is favorable, the host galaxy is faint, producing low signal-to-noise (S/N) data. This stymies traditional stellar population methods that might rely on high S/N features in galaxy spectra to recover key galaxy properties like its star formation history (SFH). In response to this challenge, we have developed a method of stellar population modeling using diffusion k-means (DFK) that can recover SFHs from rest frame optical data with S/N ~ 5 Å^-1. Specifically, we use DFK to cultivate a reduced stellar population basis set. This DFK basis set of four broad age bins is able to recover a range of SFHs. With an analytic description of the seeing, we can use this DFK basis set to simultaneously model the SFHs and the intervening quasar light of QHGs as well. We compare the results of this method with previous techniques using synthetic data and find that our new method has a clear advantage in recovering SFHs from QHGs. On average, the DFK basis set is just as accurate and decisively more precise. This new technique could be used to analyze other low S/N galaxy spectra like those from higher redshift or integral field spectroscopy surveys.This material is based upon work supported by the National Science Foundation under grant no. DGE -0718123 and the Advanced Opportunity fellowship program at the University of Wisconsin-Madison. This research was performed using the computer resources and assistance of the UW-Madison Center For High Throughput Computing (CHTC) in the Department of Computer Sciences.
47 CFR 32.2000 - Instructions for telecommunications plant accounts.
Code of Federal Regulations, 2011 CFR
2011-10-01
... equipment; 2122, Furniture; 2123, Office equipment; 2124, General purpose computers, costing $2,000 or less... for personal computers falling within Account 2124. Personal computers classifiable to Account 2124..., power, construction quarters, office space and equipment directly related to the construction project...
REMOTE: Modem Communicator Program for the IBM personal computer
DOE Office of Scientific and Technical Information (OSTI.GOV)
McGirt, F.
1984-06-01
REMOTE, a Modem Communicator Program, was developed to provide full duplex serial communication with arbitrary remote computers via either dial-up telephone modems or direct lines. The latest version of REMOTE (documented in this report) was developed for the IBM Personal Computer.
47 CFR 32.2000 - Instructions for telecommunications plant accounts.
Code of Federal Regulations, 2014 CFR
2014-10-01
... equipment; 2122, Furniture; 2123, Office equipment; 2124, General purpose computers, costing $2,000 or less... for personal computers falling within Account 2124. Personal computers classifiable to Account 2124..., power, construction quarters, office space and equipment directly related to the construction project...
47 CFR 32.2000 - Instructions for telecommunications plant accounts.
Code of Federal Regulations, 2012 CFR
2012-10-01
... equipment; 2122, Furniture; 2123, Office equipment; 2124, General purpose computers, costing $2,000 or less... for personal computers falling within Account 2124. Personal computers classifiable to Account 2124..., power, construction quarters, office space and equipment directly related to the construction project...
47 CFR 32.2000 - Instructions for telecommunications plant accounts.
Code of Federal Regulations, 2013 CFR
2013-10-01
... equipment; 2122, Furniture; 2123, Office equipment; 2124, General purpose computers, costing $2,000 or less... for personal computers falling within Account 2124. Personal computers classifiable to Account 2124..., power, construction quarters, office space and equipment directly related to the construction project...
Nass, C; Lee, K M
2001-09-01
Would people exhibit similarity-attraction and consistency-attraction toward unambiguously computer-generated speech even when personality is clearly not relevant? In Experiment 1, participants (extrovert or introvert) heard a synthesized voice (extrovert or introvert) on a book-buying Web site. Participants accurately recognized personality cues in text to speech and showed similarity-attraction in their evaluation of the computer voice, the book reviews, and the reviewer. Experiment 2, in a Web auction context, added personality of the text to the previous design. The results replicated Experiment 1 and demonstrated consistency (voice and text personality)-attraction. To maximize liking and trust, designers should set parameters, for example, words per minute or frequency range, that create a personality that is consistent with the user and the content being presented.
ERIC Educational Resources Information Center
Hsu, Ching-Kun; Hwang, Gwo-Jen
2014-01-01
Personal computer assembly courses have been recognized as being essential in helping students understand computer structure as well as the functionality of each computer component. In this study, a context-aware ubiquitous learning approach is proposed for providing instant assistance to individual students in the learning activity of a…
ERIC Educational Resources Information Center
Alcoholado, Cristián; Diaz, Anita; Tagle, Arturo; Nussbaum, Miguel; Infante, Cristián
2016-01-01
This study aims to understand the differences in student learning outcomes and classroom behaviour when using the interpersonal computer, personal computer and pen-and-paper to solve arithmetic exercises. In this multi-session experiment, third grade students working on arithmetic exercises from various curricular units were divided into three…
Kannan, Srimathi; Schulz, Amy; Israel, Barbara; Ayra, Indira; Weir, Sheryl; Dvonch, Timothy J.; Rowe, Zachary; Miller, Patricia; Benjamin, Alison
2008-01-01
Background Computer tailoring and personalizing recommendations for dietary health-promoting behaviors are in accordance with community-based participatory research (CBPR) principles, which emphasizes research that benefits the participants and community involved. Objective To describe the CBPR process utilized to computer-generate and disseminate personalized nutrition feedback reports (NFRs) for Detroit Healthy Environments Partnership (HEP) study participants. METHODS The CBPR process included discussion and feedback from HEP partners on several draft personalized reports. The nutrition feedback process included defining the feedback objectives; prioritizing the nutrients; customizing the report design; reviewing and revising the NFR template and readability; producing and disseminating the report; and participant follow-up. Lessons Learned Application of CBPR principles in designing the NFR resulted in a reader-friendly product with useful recommendations to promote heart health. Conclusions A CBPR process can enhance computer tailoring of personalized NFRs to address racial and socioeconomic disparities in cardiovascular disease (CVD). PMID:19337572
ERIC Educational Resources Information Center
Miner, Brenda
2006-01-01
The Area Vo-Tech Center (AVTC) in Russellville, Arkansas, recently hosted its first TechnoCamp to encourage enrollment based on the aptitude and interest level of the students enrolling in the various programs. The center currently offers student enrollment in auto technology, computer engineering, cosmetology, construction technology, drafting…
Extinction by a Homogeneous Spherical Particle in an Absorbing Medium
NASA Technical Reports Server (NTRS)
Mishchenko, Michael I.; Videen, Gorden; Yang, Ping
2017-01-01
We use a recent computer implementation of the first principles theory of electromagnetic scattering to compute far-field extinction by a spherical particle embedded in an absorbing unbounded host. Our results show that the suppressing effect of increasing absorption inside the host medium on the ripple structure of the extinction efficiency factor as a function of the size parameter is similar to the well-known effect of increasing absorption inside a particle embedded in a nonabsorbing host. However, the accompanying effects on the interference structure of the extinction efficiency curves are diametrically opposite. As a result, sufficiently large absorption inside the host medium can cause negative particulate extinction. We offer a simple physical explanation of the phenomenon of negative extinction consistent with the interpretation of the interference structure as being the result of interference of the field transmitted by the particle and the diffracted field due to an incomplete wave front resulting from the blockage of the incident plane wave by the particle's geometrical projection.
Korpinen, Leena; Pääkkönen, Rauno; Gobba, Fabriziomaria
2013-01-01
The purpose of this study was to investigate the possible relation between self-reported neck symptoms (aches, pain or numbness) and use of computers/cell phones. The study was carried out as a cross-sectional study by posting a questionnaire to 15,000 working-age persons, and 15.1% of all respondents (6121) reported that they very often experienced physical symptoms in the neck. The results showed that they also had many other symptoms very often, and 49% used a computer daily at work and 83.9% used cell phones. We compared physical/mental symptoms of persons with symptoms in the neck quite often or more, with others. We found significant differences in the physical/mental symptoms and use of cell phones and computers. The results suggest taking into account in the future that those persons' symptoms in the neck can be associated with use of cell phones or computers. We investigated the possible relation between neck symptoms and use of computers/cell phones. We found that persons, who very often had symptoms in the neck, had also other symptoms very often (e.g. exhaustion at work). Their use of information and communication technology (e.g. computers) can associate with their symptoms.
A high speed buffer for LV data acquisition
NASA Technical Reports Server (NTRS)
Cavone, Angelo A.; Sterlina, Patrick S.; Clemmons, James I., Jr.; Meyers, James F.
1987-01-01
The laser velocimeter (autocovariance) buffer interface is a data acquisition subsystem designed specifically for the acquisition of data from a laser velocimeter. The subsystem acquires data from up to six laser velocimeter components in parallel, measures the times between successive data points for each of the components, establishes and maintains a coincident condition between any two or three components, and acquires data from other instrumentation systems simultaneously with the laser velocimeter data points. The subsystem is designed to control the entire data acquisition process based on initial setup parameters obtained from a host computer and to be independent of the computer during the acquisition. On completion of the acquisition cycle, the interface transfers the contents of its memory to the host under direction of the host via a single 16-bit parallel DMA channel.
Research into display sharing techniques for distributed computing environments
NASA Technical Reports Server (NTRS)
Hugg, Steven B.; Fitzgerald, Paul F., Jr.; Rosson, Nina Y.; Johns, Stephen R.
1990-01-01
The X-based Display Sharing solution for distributed computing environments is described. The Display Sharing prototype includes the base functionality for telecast and display copy requirements. Since the prototype implementation is modular and the system design provided flexibility for the Mission Control Center Upgrade (MCCU) operational consideration, the prototype implementation can be the baseline for a production Display Sharing implementation. To facilitate the process the following discussions are presented: Theory of operation; System of architecture; Using the prototype; Software description; Research tools; Prototype evaluation; and Outstanding issues. The prototype is based on the concept of a dedicated central host performing the majority of the Display Sharing processing, allowing minimal impact on each individual workstation. Each workstation participating in Display Sharing hosts programs to facilitate the user's access to Display Sharing as host machine.
Harrington, Laura C.; Fleisher, Andrew; Ruiz-Moreno, Diego; Vermeylen, Francoise; Wa, Chrystal V.; Poulson, Rebecca L.; Edman, John D.; Clark, John M.; Jones, James W.; Kitthawee, Sangvorn; Scott, Thomas W.
2014-01-01
Background Mosquito biting frequency and how bites are distributed among different people can have significant epidemiologic effects. An improved understanding of mosquito vector-human interactions would refine knowledge of the entomological processes supporting pathogen transmission and could reveal targets for minimizing risk and breaking pathogen transmission cycles. Methodology and principal findings We used human DNA blood meal profiling of the dengue virus (DENV) vector, Aedes aegypti, to quantify its contact with human hosts and to infer epidemiologic implications of its blood feeding behavior. We determined the number of different people bitten, biting frequency by host age, size, mosquito age, and the number of times each person was bitten. Of 3,677 engorged mosquitoes collected and 1,186 complete DNA profiles, only 420 meals matched people from the study area, indicating that Ae. aegypti feed on people moving transiently through communities to conduct daily business. 10–13% of engorged mosquitoes fed on more than one person. No biting rate differences were detected between high- and low-dengue transmission seasons. We estimate that 43–46% of engorged mosquitoes bit more than one person within each gonotrophic cycle. Most multiple meals were from residents of the mosquito collection house or neighbors. People ≤25 years old were bitten less often than older people. Some hosts were fed on frequently, with three hosts bitten nine times. Interaction networks for mosquitoes and humans revealed biologically significant blood feeding hotspots, including community marketplaces. Conclusion and significance High multiple-feeding rates and feeding on community visitors are likely important features in the efficient transmission and rapid spread of DENV. These results help explain why reducing vector populations alone is difficult for dengue prevention and support the argument for additional studies of mosquito feeding behavior, which when integrated with a greater understanding of human behavior will refine estimates of risk and strategies for dengue control. PMID:25102306
Closely Spaced Independent Parallel Runway Simulation.
1984-10-01
facility consists of the Central Computer Facility, the Controller Laboratory, and the Simulator Pilot Complex. CENTRAL COMPUTER FACILITY. The Central... Computer Facility consists of a group of mainframes, minicomputers, and associated peripherals which host the operational and data acquisition...in the Controller Laboratory and convert their verbal directives into a keyboard entry which is transmitted to the Central Computer Complex, where
Design of cylindrical pipe automatic welding control system based on STM32
NASA Astrophysics Data System (ADS)
Chen, Shuaishuai; Shen, Weicong
2018-04-01
The development of modern economy makes the demand for pipeline construction and construction rapidly increasing, and the pipeline welding has become an important link in pipeline construction. At present, there are still a large number of using of manual welding methods at home and abroad, and field pipe welding especially lacks miniature and portable automatic welding equipment. An automated welding system consists of a control system, which consisting of a lower computer control panel and a host computer operating interface, as well as automatic welding machine mechanisms and welding power systems in coordination with the control system. In this paper, a new control system of automatic pipe welding based on the control panel of the lower computer and the interface of the host computer is proposed, which has many advantages over the traditional automatic welding machine.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neil, Joshua Charles; Fisk, Michael Edward; Brugh, Alexander William
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalousmore » behavior. Data collected by a Unified Host Collection Agent ("UHCA") may also be used to detect anomalous behavior.« less
Advanced laptop and small personal computer technology
NASA Technical Reports Server (NTRS)
Johnson, Roger L.
1991-01-01
Advanced laptop and small personal computer technology is presented in the form of the viewgraphs. The following areas of hand carried computers and mobile workstation technology are covered: background, applications, high end products, technology trends, requirements for the Control Center application, and recommendations for the future.
The Relationship between Personality and Computer Deviance
ERIC Educational Resources Information Center
Burns, Cardra E.
2013-01-01
Computer deviance by employees, defined as malicious and nonmalicious computer use behaviors, has contributed to billions of dollars of monetary and productivity losses for public and private sector organizations. The purpose of this correlational study was to examine the relationship between personality characteristics and employees' computer…
Meeting the Needs of Clients with Dissociative Identity Disorder: Considerations for Psychotherapy
ERIC Educational Resources Information Center
Ringrose, Jo L.
2011-01-01
Psychotherapy for clients with Dissociative Identity Disorder (DID) is different to therapy with most clients because these clients are multiple, comprising one or more host, and one or more alter personalities. The necessary components to be addressed in order that clients can live successfully either as a multiple or as an integrated person are…
2016 Personalized Learning & Student Success Summit: Summary from the NMC
ERIC Educational Resources Information Center
New Media Consortium, 2016
2016-01-01
The New Media Consortium (NMC) hosted the Personalized Learning & Student Success Summit at SXSWedu on March 7-9 in Austin, Texas. The summit convened grantees and partners of the Postsecondary Strategy at the Bill & Melinda Gates Foundation and served as a call-to-action for education leaders to first imagine if and then commit to trying…
Two-Way Communication Using RFID Equipment and Techniques
NASA Technical Reports Server (NTRS)
Jedry, Thomas; Archer, Eric
2007-01-01
Equipment and techniques used in radio-frequency identification (RFID) would be extended, according to a proposal, to enable short-range, two-way communication between electronic products and host computers. In one example of a typical contemplated application, the purpose of the short-range radio communication would be to transfer image data from a user s digital still or video camera to the user s computer for recording and/or processing. The concept is also applicable to consumer electronic products other than digital cameras (for example, cellular telephones, portable computers, or motion sensors in alarm systems), and to a variety of industrial and scientific sensors and other devices that generate data. Until now, RFID has been used to exchange small amounts of mostly static information for identifying and tracking assets. Information pertaining to an asset (typically, an object in inventory to be tracked) is contained in miniature electronic circuitry in an RFID tag attached to the object. Conventional RFID equipment and techniques enable a host computer to read data from and, in some cases, to write data to, RFID tags, but they do not enable such additional functions as sending commands to, or retrieving possibly large quantities of dynamic data from, RFID-tagged devices. The proposal would enable such additional functions. The figure schematically depicts an implementation of the proposal for a sensory device (e.g., a digital camera) that includes circuitry that converts sensory information to digital data. In addition to the basic sensory device, there would be a controller and a memory that would store the sensor data and/or data from the controller. The device would also be equipped with a conventional RFID chipset and antenna, which would communicate with a host computer via an RFID reader. The controller would function partly as a communication interface, implementing two-way communication protocols at all levels (including RFID if needed) between the sensory device and the memory and between the host computer and the memory. The controller would perform power V
Heinrich, Andreas; Güttler, Felix; Wendt, Sebastian; Schenkl, Sebastian; Hubig, Michael; Wagner, Rebecca; Mall, Gita; Teichgräber, Ulf
2018-06-18
In forensic odontology the comparison between antemortem and postmortem panoramic radiographs (PRs) is a reliable method for person identification. The purpose of this study was to improve and automate identification of unknown people by comparison between antemortem and postmortem PR using computer vision. The study includes 43 467 PRs from 24 545 patients (46 % females/54 % males). All PRs were filtered and evaluated with Matlab R2014b including the toolboxes image processing and computer vision system. The matching process used the SURF feature to find the corresponding points between two PRs (unknown person and database entry) out of the whole database. From 40 randomly selected persons, 34 persons (85 %) could be reliably identified by corresponding PR matching points between an already existing scan in the database and the most recent PR. The systematic matching yielded a maximum of 259 points for a successful identification between two different PRs of the same person and a maximum of 12 corresponding matching points for other non-identical persons in the database. Hence 12 matching points are the threshold for reliable assignment. Operating with an automatic PR system and computer vision could be a successful and reliable tool for identification purposes. The applied method distinguishes itself by virtue of its fast and reliable identification of persons by PR. This Identification method is suitable even if dental characteristics were removed or added in the past. The system seems to be robust for large amounts of data. · Computer vision allows an automated antemortem and postmortem comparison of panoramic radiographs (PRs) for person identification.. · The present method is able to find identical matching partners among huge datasets (big data) in a short computing time.. · The identification method is suitable even if dental characteristics were removed or added.. · Heinrich A, Güttler F, Wendt S et al. Forensic Odontology: Automatic Identification of Persons Comparing Antemortem and Postmortem Panoramic Radiographs Using Computer Vision. Fortschr Röntgenstr 2018; DOI: 10.1055/a-0632-4744. © Georg Thieme Verlag KG Stuttgart · New York.
So, you are buying your first computer.
Ferrara-Love, R
1999-06-01
Buying your first computer need not be that complicated. The first thing that is needed is an understanding of what you want and need the computer for. By making a list of the various essentials, you will be on your way to purchasing that computer. Once that is completed, you will need an understanding of what each of the components of the computer is, how it works, and what options you have. This way, you will be better able to discuss your needs with the salesperson. The focus of this article is limited to personal computers or PCs (i.e., IBMs [Armonk, NY], IBM clones, Compaq [Houston, TX], Gateway [North Sioux City, SD], and so on). I am not including Macintosh or Apple [Cupertino, CA] in this discussion; most software is often made exclusively for personal computers or at least on the market for personal computers before becoming available in Macintosh version.
Application of ubiquitous computing in personal health monitoring systems.
Kunze, C; Grossmann, U; Stork, W; Müller-Glaser, K D
2002-01-01
A possibility to significantly reduce the costs of public health systems is to increasingly use information technology. The Laboratory for Information Processing Technology (ITIV) at the University of Karlsruhe is developing a personal health monitoring system, which should improve health care and at the same time reduce costs by combining micro-technological smart sensors with personalized, mobile computing systems. In this paper we present how ubiquitous computing theory can be applied in the health-care domain.
Wireless Control of Miniaturized Mobile Vehicle for Indoor Surveillance
NASA Astrophysics Data System (ADS)
Taha Saquib, Syed M.; Hameed, Sarmad; Usman Ali, Syed M.; Jafri, Raza; Amin, Imran
2013-12-01
This work is based upon electronic automation and Smart Control techniques, which constitute the basis of Control Area Network (CAN) and Personal Area Network (PAN). Bluetooth technology has been interfaced with a programmable controller to provide multi-dimensional vehicle control. A network is proposed which contains a remote, mobile host controller and an android operating system based mobile set (Client). The client communicates with a host controller through a Bluetooth device. The system incorporates duplex communication after successful confirmation between the host and the client; the android based mobile unit controls the vehicle through the Bluetooth module.
Strategies, Challenges and Prospects for Active Learning in the Computer-Based Classroom
ERIC Educational Resources Information Center
Holbert, K. E.; Karady, G. G.
2009-01-01
The introduction of computer-equipped classrooms into engineering education has brought with it a host of opportunities and issues. Herein, some of the challenges and successes for creating an environment for active learning within computer-based classrooms are described. The particular teaching approach developed for undergraduate electrical…
Mobile Computer-Assisted-Instruction in Rural New Mexico.
ERIC Educational Resources Information Center
Gittinger, Jack D., Jr.
The University of New Mexico's three-year Computer Assisted Instruction Project established one mobile and five permanent laboratories offering remedial and vocational instruction in winter, 1984-85. Each laboratory has a Degem learning system with minicomputer, teacher terminal, and 32 student terminals. A Digital PDP-11 host computer runs the…
Kidane, Yared H; Lawrence, Christopher; Murali, T M
2013-10-07
Fungi are the second most abundant type of human pathogens. Invasive fungal pathogens are leading causes of life-threatening infections in clinical settings. Toxicity to the host and drug-resistance are two major deleterious issues associated with existing antifungal agents. Increasing a host's tolerance and/or immunity to fungal pathogens has potential to alleviate these problems. A host's tolerance may be improved by modulating the immune system such that it responds more rapidly and robustly in all facets, ranging from the recognition of pathogens to their clearance from the host. An understanding of biological processes and genes that are perturbed during attempted fungal exposure, colonization, and/or invasion will help guide the identification of endogenous immunomodulators and/or small molecules that activate host-immune responses such as specialized adjuvants. In this study, we present computational techniques and approaches using publicly available transcriptional data sets, to predict immunomodulators that may act against multiple fungal pathogens. Our study analyzed data sets derived from host cells exposed to five fungal pathogens, namely, Alternaria alternata, Aspergillus fumigatus, Candida albicans, Pneumocystis jirovecii, and Stachybotrys chartarum. We observed statistically significant associations between host responses to A. fumigatus and C. albicans. Our analysis identified biological processes that were consistently perturbed by these two pathogens. These processes contained both immune response-inducing genes such as MALT1, SERPINE1, ICAM1, and IL8, and immune response-repressing genes such as DUSP8, DUSP6, and SPRED2. We hypothesize that these genes belong to a pool of common immunomodulators that can potentially be activated or suppressed (agonized or antagonized) in order to render the host more tolerant to infections caused by A. fumigatus and C. albicans. Our computational approaches and methodologies described here can now be applied to newly generated or expanded data sets for further elucidation of additional drug targets. Moreover, identified immunomodulators may be used to generate experimentally testable hypotheses that could help in the discovery of broad-spectrum immunotherapeutic interventions. All of our results are available at the following supplementary website: http://bioinformatics.cs.vt.edu/~murali/supplements/2013-kidane-bmc.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kim, Junghyun; Gangwon, Jo; Jaehoon, Jung
Applications written solely in OpenCL or CUDA cannot execute on a cluster as a whole. Most previous approaches that extend these programming models to clusters are based on a common idea: designating a centralized host node and coordinating the other nodes with the host for computation. However, the centralized host node is a serious performance bottleneck when the number of nodes is large. In this paper, we propose a scalable and distributed OpenCL framework called SnuCL-D for large-scale clusters. SnuCL-D's remote device virtualization provides an OpenCL application with an illusion that all compute devices in a cluster are confined inmore » a single node. To reduce the amount of control-message and data communication between nodes, SnuCL-D replicates the OpenCL host program execution and data in each node. We also propose a new OpenCL host API function and a queueing optimization technique that significantly reduce the overhead incurred by the previous centralized approaches. To show the effectiveness of SnuCL-D, we evaluate SnuCL-D with a microbenchmark and eleven benchmark applications on a large-scale CPU cluster and a medium-scale GPU cluster.« less
Karvonen, Anssi
2016-01-01
Cognitive abilities related to the assessment of risk improve survival. While earlier studies have examined the ability of animals to learn to avoid predators, learned parasite avoidance has received little interest. In a series of behavioural trials with the trematode parasite Diplostomum pseudospathaceum, we asked whether sea trout (Salmo trutta trutta) hosts show associative learning in the context of parasitism and if so, whether learning capacity is related to the likelihood of infection mediated through host personality and resistance. We show that animals are capable of learning to avoid visual cues associated with the presence of parasites. However, avoidance behaviour ceased after the likely activation of host resistance following consecutive exposures during learning, suggesting that resistance to infection outweighs avoidance. Further, we found a positive relationship between learning ability and boldness, suggesting a compensation of risky lifestyles through increased investment in cognitive abilities. By contrast, an increased risk of infection due to low resistance was not balanced by learning ability. Instead, these traits were positively related, which may be explained by inherent physiological qualities controlling both traits. Overall, the results demonstrate that parasitism, in addition to other biological interactions such as predation, is an important selective factor in the evolution of animal cognition. PMID:27605504
NASA Technical Reports Server (NTRS)
1988-01-01
The charter of the Structures Division is to perform and disseminate results of research conducted in support of aerospace engine structures. These results have a wide range of applicability to practioners of structural engineering mechanics beyond the aerospace arena. The specific purpose of the symposium was to familiarize the engineering structures community with the depth and range of research performed by the division and its academic and industrial partners. Sessions covered vibration control, fracture mechanics, ceramic component reliability, parallel computing, nondestructive evaluation, constitutive models and experimental capabilities, dynamic systems, fatigue and damage, wind turbines, hot section technology (HOST), aeroelasticity, structural mechanics codes, computational methods for dynamics, structural optimization, and applications of structural dynamics, and structural mechanics computer codes.
NASA Astrophysics Data System (ADS)
Kershaw, Philip; Lawrence, Bryan; Gomez-Dans, Jose; Holt, John
2015-04-01
We explore how the popular IPython Notebook computing system can be hosted on a cloud platform to provide a flexible virtual research hosting environment for Earth Observation data processing and analysis and how this approach can be expanded more broadly into a generic SaaS (Software as a Service) offering for the environmental sciences. OPTIRAD (OPTImisation environment for joint retrieval of multi-sensor RADiances) is a project funded by the European Space Agency to develop a collaborative research environment for Data Assimilation of Earth Observation products for land surface applications. Data Assimilation provides a powerful means to combine multiple sources of data and derive new products for this application domain. To be most effective, it requires close collaboration between specialists in this field, land surface modellers and end users of data generated. A goal of OPTIRAD then is to develop a collaborative research environment to engender shared working. Another significant challenge is that of data volume and complexity. Study of land surface requires high spatial and temporal resolutions, a relatively large number of variables and the application of algorithms which are computationally expensive. These problems can be addressed with the application of parallel processing techniques on specialist compute clusters. However, scientific users are often deterred by the time investment required to port their codes to these environments. Even when successfully achieved, it may be difficult to readily change or update. This runs counter to the scientific process of continuous experimentation, analysis and validation. The IPython Notebook provides users with a web-based interface to multiple interactive shells for the Python programming language. Code, documentation and graphical content can be saved and shared making it directly applicable to OPTIRAD's requirements for a shared working environment. Given the web interface it can be readily made into a hosted service with Wakari and Microsoft Azure being notable examples. Cloud-hosting of the Notebook allows the same familiar Python interface to be retained but backed by Cloud Computing attributes of scalability, elasticity and resource pooling. This combination makes it a powerful solution to address the needs of long-tail science users of Big Data: an intuitive interactive interface with which to access powerful compute resources. IPython Notebook can be hosted as a single user desktop environment but the recent development by the IPython community of JupyterHub enables it to be run as a multi-user hosting environment. In addition, IPython.parallel allows the exposition of parallel compute infrastructure through a Python interface. Applying these technologies in combination, a collaborative research environment has been developed for OPTIRAD on the UK JASMIN/CEMS facility's private cloud (http://jasmin.ac.uk). Based on this experience, a generic virtualised solution is under development suitable for use by the wider environmental science community - on both JASMIN and portable to third party cloud platforms.
ERIC Educational Resources Information Center
Agbatogun, Alaba Olaoluwakotansibe
2012-01-01
This study investigated the extent to which computer literacy dimensions (computer general knowledge, documents and documentations, communication and surfing as well as data inquiry), computer use and academic qualification as independent variables predicted primary school teachers' attitude towards the integration of Personal Response System in…
The Use of Microcomputers in Distance Teaching Systems. ZIFF Papiere 70.
ERIC Educational Resources Information Center
Rumble, Greville
Microcomputers have revolutionized distance education in virtually every area. Used alone, personal computers provide students with a wide range of utilities, including word processing, graphics packages, and spreadsheets. When linked to a mainframe computer or connected to other personal computers in local area networks, microcomputers can…
Active Galactic Nuclei, Host Star Formation, and the Far Infrared
NASA Astrophysics Data System (ADS)
Draper, Aden R.; Ballantyne, D. R.
2011-05-01
Telescopes like Herschel and the Atacama Large Millimeter/submillimeter Array (ALMA) are creating new opportunities to study sources in the far infrared (FIR), a wavelength region dominated by cold dust emission. Probing cold dust in active galaxies allows for study of the star formation history of active galactic nuclei (AGN) hosts. The FIR is also an important spectral region for observing AGN which are heavily enshrouded by dust, such as Compton thick (CT) AGN. By using information from deep X-ray surveys and cosmic X-ray background synthesis models, we compute Cloudy photoionization simulations which are used to predict the spectral energy distribution (SED) of AGN in the FIR. Expected differential number counts of AGN and their host galaxies are calculated in the Herschel bands. The expected contribution of AGN and their hosts to the cosmic infrared background (CIRB) is also computed. Multiple star formation scenarios are investigated using a modified blackbody star formation SED. It is found that FIR observations at 350 and 500 um are an excellent tool in determining the star formation history of AGN hosts. Additionally, the AGN contribution to the CIRB can be used to determine whether star formation in AGN hosts evolves differently than in normal galaxies. AGN and host differential number counts are dominated by CT AGN in the Herschel-SPIRE bands. Therefore, X-ray stacking of bright SPIRE sources is likely to disclose a large fraction of the CT AGN population.
Computational prediction of host-pathogen protein-protein interactions.
Dyer, Matthew D; Murali, T M; Sobral, Bruno W
2007-07-01
Infectious diseases such as malaria result in millions of deaths each year. An important aspect of any host-pathogen system is the mechanism by which a pathogen can infect its host. One method of infection is via protein-protein interactions (PPIs) where pathogen proteins target host proteins. Developing computational methods that identify which PPIs enable a pathogen to infect a host has great implications in identifying potential targets for therapeutics. We present a method that integrates known intra-species PPIs with protein-domain profiles to predict PPIs between host and pathogen proteins. Given a set of intra-species PPIs, we identify the functional domains in each of the interacting proteins. For every pair of functional domains, we use Bayesian statistics to assess the probability that two proteins with that pair of domains will interact. We apply our method to the Homo sapiens-Plasmodium falciparum host-pathogen system. Our system predicts 516 PPIs between proteins from these two organisms. We show that pairs of human proteins we predict to interact with the same Plasmodium protein are close to each other in the human PPI network and that Plasmodium pairs predicted to interact with same human protein are co-expressed in DNA microarray datasets measured during various stages of the Plasmodium life cycle. Finally, we identify functionally enriched sub-networks spanned by the predicted interactions and discuss the plausibility of our predictions. Supplementary data are available at http://staff.vbi.vt.edu/dyermd/publications/dyer2007a.html. Supplementary data are available at Bioinformatics online.
Li, Xiangrui; Lu, Zhong-Lin
2012-02-29
Display systems based on conventional computer graphics cards are capable of generating images with 8-bit gray level resolution. However, most experiments in vision research require displays with more than 12 bits of luminance resolution. Several solutions are available. Bit++ (1) and DataPixx (2) use the Digital Visual Interface (DVI) output from graphics cards and high resolution (14 or 16-bit) digital-to-analog converters to drive analog display devices. The VideoSwitcher (3) described here combines analog video signals from the red and blue channels of graphics cards with different weights using a passive resister network (4) and an active circuit to deliver identical video signals to the three channels of color monitors. The method provides an inexpensive way to enable high-resolution monochromatic displays using conventional graphics cards and analog monitors. It can also provide trigger signals that can be used to mark stimulus onsets, making it easy to synchronize visual displays with physiological recordings or response time measurements. Although computer keyboards and mice are frequently used in measuring response times (RT), the accuracy of these measurements is quite low. The RTbox is a specialized hardware and software solution for accurate RT measurements. Connected to the host computer through a USB connection, the driver of the RTbox is compatible with all conventional operating systems. It uses a microprocessor and high-resolution clock to record the identities and timing of button events, which are buffered until the host computer retrieves them. The recorded button events are not affected by potential timing uncertainties or biases associated with data transmission and processing in the host computer. The asynchronous storage greatly simplifies the design of user programs. Several methods are available to synchronize the clocks of the RTbox and the host computer. The RTbox can also receive external triggers and be used to measure RT with respect to external events. Both VideoSwitcher and RTbox are available for users to purchase. The relevant information and many demonstration programs can be found at http://lobes.usc.edu/.
Modeling the Cloud to Enhance Capabilities for Crises and Catastrophe Management
2016-11-16
order for cloud computing infrastructures to be successfully deployed in real world scenarios as tools for crisis and catastrophe management, where...Statement of the Problem Studied As cloud computing becomes the dominant computational infrastructure[1] and cloud technologies make a transition to hosting...1. Formulate rigorous mathematical models representing technological capabilities and resources in cloud computing for performance modeling and
Do personal computers make doctors less personal?
Rethans, Jan-Joost; Höppener, Paul; Wolfs, George; Diederiks, Jos
1988-01-01
Ten months after the installation of a computer in a general practice surgery a postal survey (piloted questionnaire) was sent to 390 patients. The patients' views of their relationship with their doctor after the computer was introduced were compared with their view of their relationship before the installation of the computer. More than 96% of the patients (n=263) stated that contact with their doctor was as easy and as personal as before. Most stated that the computer did not influence the duration of the consultation. Eighty one patients (30%) stated, however, that they thought that their privacy was reduced. Unlike studies of patients' attitudes performed before any actual experience of use of a computer in general practice, this study found that patients have little difficulty in accepting the presence of a computer in the consultation room. Nevertheless, doctors should inform their patients about any connections between their computer and other, external computers to allay fears about a decrease in privacy. PMID:3132287
ERIC Educational Resources Information Center
van den Bogaart, Antoine C. M.; Bilderbeek, Richel J. C.; Schaap, Harmen; Hummel, Hans G. K.; Kirschner, Paul A.
2016-01-01
This article introduces a dedicated, computer-supported method to construct and formatively assess open, annotated concept maps of Personal Professional Theories (PPTs). These theories are internalised, personal bodies of formal and practical knowledge, values, norms and convictions that professionals use as a reference to interpret and acquire…
Computer-Aided Molecular Design of Bis-phosphine Oxide Lanthanide Extractants
McCann, Billy W.; Silva, Nuwan De; Windus, Theresa L.; ...
2016-02-17
Computer-aided molecular design and high-throughput screening of viable host architectures can significantly reduce the efforts in the design of novel ligands for efficient extraction of rare earth elements. This paper presents a computational approach to the deliberate design of bis-phosphine oxide host architectures that are structurally organized for complexation of trivalent lanthanides. Molecule building software, HostDesigner, was interfaced with molecular mechanics software, PCModel, providing a tool for generating and screening millions of potential R 2(O)P-link-P(O)R 2 ligand geometries. The molecular mechanics ranking of ligand structures is consistent with both the solution-phase free energies of complexation obtained with density functional theorymore » and the performance of known bis-phosphine oxide extractants. For the case where link is -CH 2-, evaluation of the ligand geometry provides the first characterization of a steric origin for the ‘anomalous aryl strengthening’ effect. The design approach has identified a number of novel bis-phosphine oxide ligands that are better organized for lanthanide complexation than previously studied examples.« less
ERIC Educational Resources Information Center
Toong, Hoo-min D.; Gupta, Amar
1982-01-01
Describes the hardware, software, applications, and current proliferation of personal computers (microcomputers). Includes discussions of microprocessors, memory, output (including printers), application programs, the microcomputer industry, and major microcomputer manufacturers (Apple, Radio Shack, Commodore, and IBM). (JN)
Different Types of Sensation Seeking: A Person-Oriented Approach in Sensation-Seeking Research
ERIC Educational Resources Information Center
Suranyi, Zsuzsanna; Hitchcock, David B.; Hittner, James B.; Vargha, Andras; Urban, Robert
2013-01-01
Previous research on sensation seeking (SS) was dominated by a variable-oriented approach indicating that SS level has a linear relation with a host of problem behaviors. Our aim was to provide a person-oriented methodology--a probabilistic clustering--that enables examination of both inter- and intra-individual differences in not only the level,…
Overview of the SAMPL5 host-guest challenge: Are we doing better?
Yin, Jian; Henriksen, Niel M; Slochower, David R; Shirts, Michael R; Chiu, Michael W; Mobley, David L; Gilson, Michael K
2017-01-01
The ability to computationally predict protein-small molecule binding affinities with high accuracy would accelerate drug discovery and reduce its cost by eliminating rounds of trial-and-error synthesis and experimental evaluation of candidate ligands. As academic and industrial groups work toward this capability, there is an ongoing need for datasets that can be used to rigorously test new computational methods. Although protein-ligand data are clearly important for this purpose, their size and complexity make it difficult to obtain well-converged results and to troubleshoot computational methods. Host-guest systems offer a valuable alternative class of test cases, as they exemplify noncovalent molecular recognition but are far smaller and simpler. As a consequence, host-guest systems have been part of the prior two rounds of SAMPL prediction exercises, and they also figure in the present SAMPL5 round. In addition to being blinded, and thus avoiding biases that may arise in retrospective studies, the SAMPL challenges have the merit of focusing multiple researchers on a common set of molecular systems, so that methods may be compared and ideas exchanged. The present paper provides an overview of the host-guest component of SAMPL5, which centers on three different hosts, two octa-acids and a glycoluril-based molecular clip, and two different sets of guest molecules, in aqueous solution. A range of methods were applied, including electronic structure calculations with implicit solvent models; methods that combine empirical force fields with implicit solvent models; and explicit solvent free energy simulations. The most reliable methods tend to fall in the latter class, consistent with results in prior SAMPL rounds, but the level of accuracy is still below that sought for reliable computer-aided drug design. Advances in force field accuracy, modeling of protonation equilibria, electronic structure methods, and solvent models, hold promise for future improvements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... into which altered genetic matter, or genetic matter from another species, has been transferred in order that the host organism acquires the genetic traits of the transferred genes. Motorized personal...
Code of Federal Regulations, 2014 CFR
2014-01-01
... into which altered genetic matter, or genetic matter from another species, has been transferred in order that the host organism acquires the genetic traits of the transferred genes. Motorized personal...
Code of Federal Regulations, 2011 CFR
2011-01-01
... into which altered genetic matter, or genetic matter from another species, has been transferred in order that the host organism acquires the genetic traits of the transferred genes. Motorized personal...
Code of Federal Regulations, 2012 CFR
2012-01-01
... into which altered genetic matter, or genetic matter from another species, has been transferred in order that the host organism acquires the genetic traits of the transferred genes. Motorized personal...
The cyber threat landscape: Challenges and future research directions
NASA Astrophysics Data System (ADS)
Gil, Santiago; Kott, Alexander; Barabási, Albert-László
2014-07-01
While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.
A genetic epidemiology approach to cyber-security.
Gil, Santiago; Kott, Alexander; Barabási, Albert-László
2014-07-16
While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.
A genetic epidemiology approach to cyber-security
Gil, Santiago; Kott, Alexander; Barabási, Albert-László
2014-01-01
While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security. PMID:25028059
First 3D reconstruction of the rhizocephalan root system using MicroCT
NASA Astrophysics Data System (ADS)
Noever, Christoph; Keiler, Jonas; Glenner, Henrik
2016-07-01
Parasitic barnacles (Cirripedia: Rhizocephala) are highly specialized parasites of crustaceans. Instead of an alimentary tract for feeding they utilize a system of roots, which infiltrates the body of their hosts to absorb nutrients. Using X-ray micro computer tomography (MicroCT) and computer-aided 3D-reconstruction, we document the spatial organization of this root system, the interna, inside the intact host and also demonstrate its use for morphological examinations of the parasites reproductive part, the externa. This is the first 3D visualization of the unique root system of the Rhizocephala in situ, showing how it is related to the inner organs of the host. We investigated the interna from different parasitic barnacles of the family Peltogastridae, which are parasitic on anomuran crustaceans. Rhizocephalan parasites of pagurid hermit crabs and lithodid crabs were analysed in this study.
[Use of personal computers by diplomats of anesthesiology in Japan].
Yamamoto, K; Ohmura, S; Tsubokawa, T; Kita, M; Kushida, Y; Kobayashi, T
1999-04-01
Use of personal computers by diplomats of the Japanese Board of Anesthesiology working in Japanese university hospitals was investigated. Unsigned questionnaires were returned from 232 diplomats of 18 anesthesia departments. The age of responders ranged from twenties to sixties. Personal computer systems are used by 223 diplomats (96.1%), while nine (3.9%) do not use them. The computer systems used are: Apple Macintosh 77%, IBM compatible PC 21% and UNIX 2%. Although 197 diplomats have e-mail addresses, only 162 of them actually send and receive e-mails. Diplomats in fifties use e-mail most actively and those in sixties come second.
Bukowski, Henryk; Hietanen, Jari K.; Samson, Dana
2015-01-01
ABSTRACT Two paradigms have shown that people automatically compute what or where another person is looking at. In the visual perspective-taking paradigm, participants judge how many objects they see; whereas, in the gaze cueing paradigm, participants identify a target. Unlike in the former task, in the latter task, the influence of what or where the other person is looking at is only observed when the other person is presented alone before the task-relevant objects. We show that this discrepancy across the two paradigms is not due to differences in visual settings (Experiment 1) or available time to extract the directional information (Experiment 2), but that it is caused by how attention is deployed in response to task instructions (Experiment 3). Thus, the mere presence of another person in the field of view is not sufficient to compute where/what that person is looking at, which qualifies the claimed automaticity of such computations. PMID:26924936
Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing
Balasubramaniam, S.; Kavitha, V.
2015-01-01
Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud. PMID:25767826
Geometric data perturbation-based personal health record transactions in cloud computing.
Balasubramaniam, S; Kavitha, V
2015-01-01
Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.
Bukowski, Henryk; Hietanen, Jari K; Samson, Dana
2015-09-14
Two paradigms have shown that people automatically compute what or where another person is looking at. In the visual perspective-taking paradigm, participants judge how many objects they see; whereas, in the gaze cueing paradigm, participants identify a target. Unlike in the former task, in the latter task, the influence of what or where the other person is looking at is only observed when the other person is presented alone before the task-relevant objects. We show that this discrepancy across the two paradigms is not due to differences in visual settings (Experiment 1) or available time to extract the directional information (Experiment 2), but that it is caused by how attention is deployed in response to task instructions (Experiment 3). Thus, the mere presence of another person in the field of view is not sufficient to compute where/what that person is looking at, which qualifies the claimed automaticity of such computations.
Virtual Computing Laboratories: A Case Study with Comparisons to Physical Computing Laboratories
ERIC Educational Resources Information Center
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher
2009-01-01
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Envisioning the Handheld-Centric Classroom
ERIC Educational Resources Information Center
Norris, Cathleen; Soloway, Elliot
2004-01-01
While appropriate as an initial focus, it is time that the educational community move beyond an emphasis on 1:1 computing (each child having his/her own personal computer) to a vision of a handheld-centric classroom, where each child not only has his/her own personal, handheld computer, but also has access to networked PCs, probeware, digital…
ERIC Educational Resources Information Center
Murphy, Harry J.
Twenty-seven papers are presented from a conference on applications of computer technology for disabled persons. The following titles and authors are represented: "Computer Applications For Rehabilitation Organizations: Finding What You Need" (T. Backer); "Similarities In Cognitive Development Of Severely Physically Handicapped and Younger Regular…
ERIC Educational Resources Information Center
Ceyhan, A. Aykut; Ceyhan, Esra
2007-01-01
This research aims at examining the relationships among unethical computer usage behavior and the personality characteristics of locus of control, adjustment to social norms, antisocial tendency, and aggression on Turkish university students. The research was applied to 217 university students. Data were collected through Unethical Computer Using…
Peretz, Chava; Korczyn, Amos D; Shatil, Evelyn; Aharonson, Vered; Birnboim, Smadar; Giladi, Nir
2011-01-01
Many studies have suggested that cognitive training can result in cognitive gains in healthy older adults. We investigated whether personalized computerized cognitive training provides greater benefits than those obtained by playing conventional computer games. This was a randomized double-blind interventional study. Self-referred healthy older adults (n = 155, 68 ± 7 years old) were assigned to either a personalized, computerized cognitive training or to a computer games group. Cognitive performance was assessed at baseline and after 3 months by a neuropsychological assessment battery. Differences in cognitive performance scores between and within groups were evaluated using mixed effects models in 2 approaches: adherence only (AO; n = 121) and intention to treat (ITT; n = 155). Both groups improved in cognitive performance. The improvement in the personalized cognitive training group was significant (p < 0.03, AO and ITT approaches) in all 8 cognitive domains. However, in the computer games group it was significant (p < 0.05) in only 4 (AO) or 6 domains (ITT). In the AO analysis, personalized cognitive training was significantly more effective than playing games in improving visuospatial working memory (p = 0.0001), visuospatial learning (p = 0.0012) and focused attention (p = 0.0019). Personalized, computerized cognitive training appears to be more effective than computer games in improving cognitive performance in healthy older adults. Further studies are needed to evaluate the ecological validity of these findings. Copyright © 2011 S. Karger AG, Basel.
1989-06-27
Department of Defense Washington DC 20301-3081 Ada Compiler Validation Summary Report : Compiler Name: Harris Ada, Version 5.0 Certificate Number...890627W1.10103 Host: Harris HIOO0 under VOS, E.i Target: Harris HiO00 under VOS, E.1 Testing Completed June 27, 1989 using ACVC 1.10 This report has been...arris Corporation, Computer Systems Division Harris Ada, Version 5.0, Harris H1000 under VOS, 8.1 (Host & Target), Wright-Patterson AFB, ACVC 1.10 DD
Personalization through the Application of Inverse Bayes to Student Modeling
ERIC Educational Resources Information Center
Lang, Charles William McLeod
2015-01-01
Personalization, the idea that teaching can be tailored to each students' needs, has been a goal for the educational enterprise for at least 2,500 years (Regian, Shute, & Shute, 2013, p.2). Recently personalization has picked up speed with the advent of mobile computing, the Internet and increases in computer processing power. These changes…
Computer-Based Script Training for Aphasia: Emerging Themes from Post-Treatment Interviews
ERIC Educational Resources Information Center
Cherney, Leora R.; Halper, Anita S.; Kaye, Rosalind C.
2011-01-01
This study presents results of post-treatment interviews following computer-based script training for persons with chronic aphasia. Each of the 23 participants received 9 weeks of AphasiaScripts training. Post-treatment interviews were conducted with the person with aphasia and/or a significant other person. The 23 interviews yielded 584 coded…
Host-Pathogen Coupled Networks: Model for Bacillus Anthracis Interaction with Host Macrophages
2015-09-01
AFB OH 45433-5707 Distribution A : Approved for public release; distribution unlimited. (PA Case No. 88ABW-2015-5572. Date 12 November 2015...www.dtic.mil). (AFRL-RH- -TR- - ) has been reviewed and is approved for publication in accordance with assigned distribution statement. STEPHANIE A . MILLER...Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a
Expertise transfer for expert system design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boose, J.H.
This book is about the Expertise Transfer System-a computer program which interviews experts and helps them build expert systems, i.e. computer programs that use knowledge from experts to make decisions and judgements under conditions of uncertainty. The techniques are useful to anyone who uses decision-making information based on the expertise of others. The methods can also be applied to personal decision-making. The interviewing methodology is borrowed from a branch of psychology called Personal Construct Theory. It is not necessary to use a computer to take advantage of the techniques from Personal Construction Theory; the fundamental procedures used by the Expertisemore » Transfer System can be performed using paper and pencil. It is not necessary that the reader understand very much about computers to understand the ideas in this book. The few relevant concepts from computer science and expert systems that are needed are explained in a straightforward manner. Ideas from Personal Construct Psychology are also introduced as needed.« less
Space Ultrareliable Modular Computer (SUMC) instruction simulator
NASA Technical Reports Server (NTRS)
Curran, R. T.
1972-01-01
The design principles, description, functional operation, and recommended expansion and enhancements are presented for the Space Ultrareliable Modular Computer interpretive simulator. Included as appendices are the user's manual, program module descriptions, target instruction descriptions, simulator source program listing, and a sample program printout. In discussing the design and operation of the simulator, the key problems involving host computer independence and target computer architectural scope are brought into focus.
Evidence That Head and Body Lice on Homeless Persons Have the Same Genotype
Veracx, Aurélie; Rivet, Romain; McCoy, Karen D.; Brouqui, Philippe; Raoult, Didier
2012-01-01
Human head lice and body lice are morphologically and biologically similar but have distinct ecologies. They were shown to have almost the same basic genetic content (one gene is absent in head lice), but differentially express certain genes, presumably responsible for the vector competence. They are now believed to be ecotypes of the same species (Pediculus humanus) and based on mitochondrial studies, body lice have been included with head lice in one of three clades of human head lice (Clade A). Here, we tested whether head and body lice collected from the same host belong to the same population by examining highly polymorphic intergenic spacers. This study was performed on lice collected from five homeless persons living in the same shelter in which Clade A lice are prevalent. Lice were individually genotyped at four spacer loci. The genetic identity and diversity of lice from head and body populations were compared for each homeless person. Population genetic structure was tested between lice from the two body regions and between the lice from different host individuals. We found two pairs of head and body lice on the same homeless person with identical multi locus genotypes. No difference in genetic diversity was found between head and body louse populations and no evidence of significant structure between the louse populations was found, even after controlling for a possible effect of the host individual. More surprisingly, no structure was obvious between lice of different homeless persons. We believe that the head and body lice collected from our five subjects belong to the same population and are shared between people living in the same shelter. These findings confirm that head and body lice are two ecotypes of the same species and show the importance of implementing measures to prevent lice transmission between homeless people in shelters. PMID:23049889
Evidence that head and body lice on homeless persons have the same genotype.
Veracx, Aurélie; Rivet, Romain; McCoy, Karen D; Brouqui, Philippe; Raoult, Didier
2012-01-01
Human head lice and body lice are morphologically and biologically similar but have distinct ecologies. They were shown to have almost the same basic genetic content (one gene is absent in head lice), but differentially express certain genes, presumably responsible for the vector competence. They are now believed to be ecotypes of the same species (Pediculus humanus) and based on mitochondrial studies, body lice have been included with head lice in one of three clades of human head lice (Clade A). Here, we tested whether head and body lice collected from the same host belong to the same population by examining highly polymorphic intergenic spacers. This study was performed on lice collected from five homeless persons living in the same shelter in which Clade A lice are prevalent. Lice were individually genotyped at four spacer loci. The genetic identity and diversity of lice from head and body populations were compared for each homeless person. Population genetic structure was tested between lice from the two body regions and between the lice from different host individuals.We found two pairs of head and body lice on the same homeless person with identical multi locus genotypes. No difference in genetic diversity was found between head and body louse populations and no evidence of significant structure between the louse populations was found, even after controlling for a possible effect of the host individual. More surprisingly, no structure was obvious between lice of different homeless persons.We believe that the head and body lice collected from our five subjects belong to the same population and are shared between people living in the same shelter. These findings confirm that head and body lice are two ecotypes of the same species and show the importance of implementing measures to prevent lice transmission between homeless people in shelters.
Qualification and Approval of Personal Computer-Based Aviation Training Devices
DOT National Transportation Integrated Search
1997-05-12
This Advisory Circular (AC) provides information and guidance to potential training device manufacturers and aviation training consumers concerning a means, acceptable to the Administrator, by which personal computer-based aviation training devices (...
92. VIEW OF CHART RECORDERS AND PERSONAL COMPUTER LINING NORTHEAST ...
92. VIEW OF CHART RECORDERS AND PERSONAL COMPUTER LINING NORTHEAST CORNER OF AUTOPILOT ROOM - Vandenberg Air Force Base, Space Launch Complex 3, Launch Operations Building, Napa & Alden Roads, Lompoc, Santa Barbara County, CA
Default Parallels Plesk Panel Page
services that small businesses want and need. Our software includes key building blocks of cloud service virtualized servers Service Provider Products Parallels® Automation Hosting, SaaS, and cloud computing , the leading hosting automation software. You see this page because there is no Web site at this
A Randomized Trial of an Avatar-Hosted Multiple Behavior Change Intervention for Young Adult Smokers
2013-01-01
Background Young adulthood is a critical transition period for the development of health behaviors. We present here the results of a randomized controlled trial of an online avatar-hosted personal health makeover program designed for young adult smokers. Methods We conducted a three-group randomized trial comparing delivery of general lifestyle content (Tx1), personally tailored health information (Tx2), and personally tailored health information plus online video–based peer coaching (Tx3) as part of a 6-week online health program. Participants were asked to set weekly goals around eating breakfast, exercise, alcohol use, and cigarette smoking. Eligibility criteria included age (18–30 years) and smoking status (any cigarette use in the previous 30 days). The primary outcome was self-reported 30-day abstinence measured 12 weeks postenrollment. Results Participant (n = 1698) characteristics were balanced across the groups (72% women, mean age 24, 26% nonwhite, 32% high school education or less, and 50% daily smokers). Considering intention to treat, 30-day smoking abstinence rates were statistically significantly higher in the intervention groups (Tx1 = 11%, Tx2 = 23%, Tx3 = 31%, P < .001). Participants in the intervention groups were also more likely to reduce their number of days spent on binge drinking and increase their number of days eating breakfast and exercising. Overall, intervention group participants were much more likely to make positive changes in at least three or four of the target behaviors (Tx1 = 19%, Tx2 = 39%, Tx3 = 41%, P < .001). Conclusions This online avatar-hosted personal health makeover “show” increased smoking abstinence and induced positive changes in multiple related health behaviors. Addition of the online video–based peer coaching further improved behavioral outcomes. PMID:24395994
An, Lawrence C; Demers, Michele R S; Kirch, Matthias A; Considine-Dunn, Shannon; Nair, Vijay; Dasgupta, Kohinoor; Narisetty, Naveen; Resnicow, Ken; Ahluwalia, Jasjit
2013-12-01
Young adulthood is a critical transition period for the development of health behaviors. We present here the results of a randomized controlled trial of an online avatar-hosted personal health makeover program designed for young adult smokers. We conducted a three-group randomized trial comparing delivery of general lifestyle content (Tx1), personally tailored health information (Tx2), and personally tailored health information plus online video-based peer coaching (Tx3) as part of a 6-week online health program. Participants were asked to set weekly goals around eating breakfast, exercise, alcohol use, and cigarette smoking. Eligibility criteria included age (18-30 years) and smoking status (any cigarette use in the previous 30 days). The primary outcome was self-reported 30-day abstinence measured 12 weeks postenrollment. Participant (n = 1698) characteristics were balanced across the groups (72% women, mean age 24, 26% nonwhite, 32% high school education or less, and 50% daily smokers). Considering intention to treat, 30-day smoking abstinence rates were statistically significantly higher in the intervention groups (Tx1 = 11%, Tx2 = 23%, Tx3 = 31%, P < .001). Participants in the intervention groups were also more likely to reduce their number of days spent on binge drinking and increase their number of days eating breakfast and exercising. Overall, intervention group participants were much more likely to make positive changes in at least three or four of the target behaviors (Tx1 = 19%, Tx2 = 39%, Tx3 = 41%, P < .001). This online avatar-hosted personal health makeover "show" increased smoking abstinence and induced positive changes in multiple related health behaviors. Addition of the online video-based peer coaching further improved behavioral outcomes.
Host-dependent variables: The missing link to personalized medicine.
Demlova, Regina; Zdrazilova-Dubska, Lenka; Sterba, Jaroslav; Stanta, Giorgio; Valik, Dalibor
2018-04-26
Individualized medicine has the potential to tailor anticancer therapy with the best response and highest safety margin to provide better patient care. However, modern targeted therapies are still being tested through clinical trials comparing preselected patient cohorts and assessed upon behaviour of group averages. Clinically manifesting malignant disease requires identification of host- and tumour-dependent variables such as biological characteristics of the tumour and its microenvironment including immune response features, and overall capacity of the host to receive, tolerate and efficiently utilize treatment. Contemporary medical oncology including clinical trial design need to refocus from assessing group averages to individuality taking into consideration time dependent host-associated characteristics and reinventing outliers to be appreciated as naturally occurring variables collectively determining the ultimate outcome of malignant disease. Copyright © 2018. Published by Elsevier Ltd.
Propulsion/flight control integration technology (PROFIT) software system definition
NASA Technical Reports Server (NTRS)
Carlin, C. M.; Hastings, W. J.
1978-01-01
The Propulsion Flight Control Integration Technology (PROFIT) program is designed to develop a flying testbed dedicated to controls research. The control software for PROFIT is defined. Maximum flexibility, needed for long term use of the flight facility, is achieved through a modular design. The Host program, processes inputs from the telemetry uplink, aircraft central computer, cockpit computer control and plant sensors to form an input data base for use by the control algorithms. The control algorithms, programmed as application modules, process the input data to generate an output data base. The Host program formats the data for output to the telemetry downlink, the cockpit computer control, and the control effectors. Two applications modules are defined - the bill of materials F-100 engine control and the bill of materials F-15 inlet control.
Dynamic gas temperature measurements using a personal computer for data acquisition and reduction
NASA Technical Reports Server (NTRS)
Fralick, Gustave C.; Oberle, Lawrence G.; Greer, Lawrence C., III
1993-01-01
This report describes a dynamic gas temperature measurement system. It has frequency response to 1000 Hz, and can be used to measure temperatures in hot, high pressure, high velocity flows. A personal computer is used for collecting and processing data, which results in a much shorter wait for results than previously. The data collection process and the user interface are described in detail. The changes made in transporting the software from a mainframe to a personal computer are described in appendices, as is the overall theory of operation.
Morphology of methane hydrate host sediments
Jones, K.W.; Feng, H.; Tomov, S.; Winters, W.J.; Eaton, M.; Mahajan, D.
2005-01-01
The morphological features including porosity and grains of methane hydrate host sediments were investigated using synchrotron computed microtomography (CMT) technique. The sediment sample was obtained during Ocean Drilling Program Leg 164 on the Blake Ridge at water depth of 2278.5 m. The CMT experiment was performed at the Brookhaven National Synchrotron Light Source facility. The analysis gave ample porosity, specific surface area, mean particle size, and tortuosity. The method was found to be highly effective for the study of methane hydrate host sediments.
ERIC Educational Resources Information Center
Brug, Johannes; Campbell, Marci; van Assema, Patricia
1999-01-01
Describes the process of providing people with computer-tailored nutrition education and reviews the studies on the impact of this type of education. Results indicate that computer-tailored nutrition education is more likely to be read, remembered, and experienced as personally relevant compared to standard materials. It also appears to have a…
ERIC Educational Resources Information Center
Passmore, David Lynn
Intended for developers of vocational education professionals and for educators making decisions about the usefulness of personal computers in education, this report deals with the effects of the personal computing revolution on professional development of vocational educators. The two major papers and published opinion pieces that make up this…
Theory and Programs for Dynamic Modeling of Tree Rings from Climate
Paul C. van Deusen; Jennifer Koretz
1988-01-01
Computer programs written in GAUSS(TM) for IBM compatible personal computers are described that perform dynamic tree ring modeling with climate data; the underlying theory is also described. The programs and a separate users manual are available from the authors, although users must have the GAUSS software package on their personal computer. An example application of...
ERIC Educational Resources Information Center
Moran, Mark; Hawkes, Mark; El Gayar, Omar
2010-01-01
Many educational institutions have implemented ubiquitous or required laptop, notebook, or tablet personal computing programs for their students. Yet, limited evidence exists to validate integration and acceptance of the technology among student populations. This research examines student acceptance of mobile computing devices using a modification…
Computer Administering of the Psychological Investigations: Set-Relational Representation
NASA Astrophysics Data System (ADS)
Yordzhev, Krasimir
Computer administering of a psychological investigation is the computer representation of the entire procedure of psychological assessments - test construction, test implementation, results evaluation, storage and maintenance of the developed database, its statistical processing, analysis and interpretation. A mathematical description of psychological assessment with the aid of personality tests is discussed in this article. The set theory and the relational algebra are used in this description. A relational model of data, needed to design a computer system for automation of certain psychological assessments is given. Some finite sets and relation on them, which are necessary for creating a personality psychological test, are described. The described model could be used to develop real software for computer administering of any psychological test and there is full automation of the whole process: test construction, test implementation, result evaluation, storage of the developed database, statistical implementation, analysis and interpretation. A software project for computer administering personality psychological tests is suggested.
ASTEC: Controls analysis for personal computers
NASA Technical Reports Server (NTRS)
Downing, John P.; Bauer, Frank H.; Thorpe, Christopher J.
1989-01-01
The ASTEC (Analysis and Simulation Tools for Engineering Controls) software is under development at Goddard Space Flight Center (GSFC). The design goal is to provide a wide selection of controls analysis tools at the personal computer level, as well as the capability to upload compute-intensive jobs to a mainframe or supercomputer. The project is a follow-on to the INCA (INteractive Controls Analysis) program that has been developed at GSFC over the past five years. While ASTEC makes use of the algorithms and expertise developed for the INCA program, the user interface was redesigned to take advantage of the capabilities of the personal computer. The design philosophy and the current capabilities of the ASTEC software are described.
Omaki, Elise; Rizzutti, Nicholas; Shields, Wendy; Zhu, Jeffrey; McDonald, Eileen; Stevens, Martha W; Gielen, Andrea
2017-04-01
The aims of this literature review are to (1) summarise how computer and mobile technology-based health behaviour change applications have been evaluated in unintentional injury prevention, (2) describe how these successes can be applied to injury-prevention programmes in the future and (3) identify research gaps. Studies included in this systematic review were education and behaviour change intervention trials and programme evaluations in which the intervention was delivered by either a computer or mobile technology and addressed an unintentional injury prevention topic. Articles were limited to those published in English and after 1990. Among the 44 technology-based injury-prevention studies included in this review, 16 studies evaluated locally hosted software programmes, 4 studies offered kiosk-based programmes, 11 evaluated remotely hosted internet programmes, 2 studies used mobile technology or portable devices and 11 studies evaluated virtual-reality interventions. Locally hosted software programmes and remotely hosted internet programmes consistently increased knowledge and behaviours. Kiosk programmes showed evidence of modest knowledge and behaviour gains. Both programmes using mobile technology improved behaviours. Virtual-reality programmes consistently improved behaviours, but there were little gains in knowledge. No studies evaluated text-messaging programmes dedicated to injury prevention. There is much potential for computer-based programmes to be used for injury-prevention behaviour change. The reviewed studies provide evidence that computer-based communication is effective in conveying information and influencing how participants think about an injury topic and adopt safety behaviours. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Test-bench system for a borehole azimuthal acoustic reflection imaging logging tool
NASA Astrophysics Data System (ADS)
Liu, Xianping; Ju, Xiaodong; Qiao, Wenxiao; Lu, Junqiang; Men, Baiyong; Liu, Dong
2016-06-01
The borehole azimuthal acoustic reflection imaging logging tool (BAAR) is a new generation of imaging logging tool, which is able to investigate stratums in a relatively larger range of space around the borehole. The BAAR is designed based on the idea of modularization with a very complex structure, so it has become urgent for us to develop a dedicated test-bench system to debug each module of the BAAR. With the help of a test-bench system introduced in this paper, test and calibration of BAAR can be easily achieved. The test-bench system is designed based on the client/server model. The hardware system mainly consists of a host computer, an embedded controlling board, a bus interface board, a data acquisition board and a telemetry communication board. The host computer serves as the human machine interface and processes the uploaded data. The software running on the host computer is designed based on VC++. The embedded controlling board uses Advanced Reduced Instruction Set Machines 7 (ARM7) as the micro controller and communicates with the host computer via Ethernet. The software for the embedded controlling board is developed based on the operating system uClinux. The bus interface board, data acquisition board and telemetry communication board are designed based on a field programmable gate array (FPGA) and provide test interfaces for the logging tool. To examine the feasibility of the test-bench system, it was set up to perform a test on BAAR. By analyzing the test results, an unqualified channel of the electronic receiving cabin was discovered. It is suggested that the test-bench system can be used to quickly determine the working condition of sub modules of BAAR and it is of great significance in improving production efficiency and accelerating industrial production of the logging tool.
Ontology-based representation and analysis of host-Brucella interactions.
Lin, Yu; Xiang, Zuoshuang; He, Yongqun
2015-01-01
Biomedical ontologies are representations of classes of entities in the biomedical domain and how these classes are related in computer- and human-interpretable formats. Ontologies support data standardization and exchange and provide a basis for computer-assisted automated reasoning. IDOBRU is an ontology in the domain of Brucella and brucellosis. Brucella is a Gram-negative intracellular bacterium that causes brucellosis, the most common zoonotic disease in the world. In this study, IDOBRU is used as a platform to model and analyze how the hosts, especially host macrophages, interact with virulent Brucella strains or live attenuated Brucella vaccine strains. Such a study allows us to better integrate and understand intricate Brucella pathogenesis and host immunity mechanisms. Different levels of host-Brucella interactions based on different host cell types and Brucella strains were first defined ontologically. Three important processes of virulent Brucella interacting with host macrophages were represented: Brucella entry into macrophage, intracellular trafficking, and intracellular replication. Two Brucella pathogenesis mechanisms were ontologically represented: Brucella Type IV secretion system that supports intracellular trafficking and replication, and Brucella erythritol metabolism that participates in Brucella intracellular survival and pathogenesis. The host cell death pathway is critical to the outcome of host-Brucella interactions. For better survival and replication, virulent Brucella prevents macrophage cell death. However, live attenuated B. abortus vaccine strain RB51 induces caspase-2-mediated proinflammatory cell death. Brucella-associated cell death processes are represented in IDOBRU. The gene and protein information of 432 manually annotated Brucella virulence factors were represented using the Ontology of Genes and Genomes (OGG) and Protein Ontology (PRO), respectively. Seven inference rules were defined to capture the knowledge of host-Brucella interactions and implemented in IDOBRU. Current IDOBRU includes 3611 ontology terms. SPARQL queries identified many results that are critical to the host-Brucella interactions. For example, out of 269 protein virulence factors related to macrophage-Brucella interactions, 81 are critical to Brucella intracellular replication inside macrophages. A SPARQL query also identified 11 biological processes important for Brucella virulence. To systematically represent and analyze fundamental host-pathogen interaction mechanisms, we provided for the first time comprehensive ontological modeling of host-pathogen interactions using Brucella as the pathogen model. The methods and ontology representations used in our study are generic and can be broadened to study the interactions between hosts and other pathogens.
NASA Technical Reports Server (NTRS)
Jacklin, S. A.; Leyland, J. A.; Warmbrodt, W.
1985-01-01
Modern control systems must typically perform real-time identification and control, as well as coordinate a host of other activities related to user interaction, online graphics, and file management. This paper discusses five global design considerations which are useful to integrate array processor, multimicroprocessor, and host computer system architectures into versatile, high-speed controllers. Such controllers are capable of very high control throughput, and can maintain constant interaction with the nonreal-time or user environment. As an application example, the architecture of a high-speed, closed-loop controller used to actively control helicopter vibration is briefly discussed. Although this system has been designed for use as the controller for real-time rotorcraft dynamics and control studies in a wind tunnel environment, the controller architecture can generally be applied to a wide range of automatic control applications.
The Role of Personal Computers in Vocational Education: A Critical View.
ERIC Educational Resources Information Center
Passmore, David L.; And Others
1984-01-01
Personal computers are inexpensive, portable, accessible, and adaptable for vocational education instruction, administration, and communications. Successful infusion of microcomputers into vocational education requires staff orientation, improvement in software quality, and careful planning. (SK)
ERIC Educational Resources Information Center
Stanley, Timothy D.; Wong, Lap Kei; Prigmore, Daniel; Benson, Justin; Fishler, Nathan; Fife, Leslie; Colton, Don
2007-01-01
Students learn better when they both hear and do. In computer architecture courses "doing" can be difficult in small schools without hardware laboratories hosted by computer engineering, electrical engineering, or similar departments. Software solutions exist. Our success with George Mills' Multimedia Logic (MML) is the focus of this paper. MML…
Flexible Animation Computer Program
NASA Technical Reports Server (NTRS)
Stallcup, Scott S.
1990-01-01
FLEXAN (Flexible Animation), computer program animating structural dynamics on Evans and Sutherland PS300-series graphics workstation with VAX/VMS host computer. Typical application is animation of spacecraft undergoing structural stresses caused by thermal and vibrational effects. Displays distortions in shape of spacecraft. Program displays single natural mode of vibration, mode history, or any general deformation of flexible structure. Written in FORTRAN 77.
Definitions of database files and fields of the Personal Computer-Based Water Data Sources Directory
Green, J. Wayne
1991-01-01
This report describes the data-base files and fields of the personal computer-based Water Data Sources Directory (WDSD). The personal computer-based WDSD was derived from the U.S. Geological Survey (USGS) mainframe computer version. The mainframe version of the WDSD is a hierarchical data-base design. The personal computer-based WDSD is a relational data- base design. This report describes the data-base files and fields of the relational data-base design in dBASE IV (the use of brand names in this abstract is for identification purposes only and does not constitute endorsement by the U.S. Geological Survey) for the personal computer. The WDSD contains information on (1) the type of organization, (2) the major orientation of water-data activities conducted by each organization, (3) the names, addresses, and telephone numbers of offices within each organization from which water data may be obtained, (4) the types of data held by each organization and the geographic locations within which these data have been collected, (5) alternative sources of an organization's data, (6) the designation of liaison personnel in matters related to water-data acquisition and indexing, (7) the volume of water data indexed for the organization, and (8) information about other types of data and services available from the organization that are pertinent to water-resources activities.
Kardashian, R A
2018-01-01
To study personality characteristics in adolescents with computer game addiction. The study included students of grades 7 to 10 at the age of 12-17 years (14.6±2.4 years), their parents and school teachers. The results of a study showed the following combination in patients: 'genophilic' type of DPT with schizoid personality accentuation and 'projection' type of psychological protection, and 'dignitophilic' type of DPT with labile personality accentuation and 'denial' type of PP.
1990-12-20
and infectious mononucleosis , as well as outbreaks of herpes simplex (Ishigami, 1919; Hinkle and Plummer, 1952; McClelland, Alexander, and Marks, 1982...Evans, A., and Neiderman, J., (1979). Psychosocial risk factors in the development of infectious mononucleosis . Psychosomatic Medicine, 41, 445-466...34Stress, Coping, and Infectious Illness: Persistently Low Natural Killer Cell Activity as a Host Ri-k Fa.ctor" 2. PERSONAL AUTHOR(S) Sandra M. Lev
Hopwood, Christopher J.; Burt, S. Alexandra; Keel, Pamela K.; Neale, Michael C.; Boker, Steven M.; Klump, Kelly L.
2012-01-01
Personality traits are known to be associated with a host of important life outcomes, including interpersonal dysfunction. The interpersonal circumplex offers a comprehensive system for articulating the kinds of interpersonal problems associated with personality traits. In the current study, traits as measured by the Multidimensional Personality Questionnaire (MPQ) in a sample of 124 young women were correlated with interpersonal dysfunction as measured by the Inventory of Interpersonal Problems-Circumplex. Results suggest that MPQ traits vary in their associations with interpersonal distress and in their coverage of specific kinds of interpersonal difficulties among women undergoing the transition to adulthood. PMID:22064504
Diamond, Alan; Nowotny, Thomas; Schmuker, Michael
2016-01-01
Neuromorphic computing employs models of neuronal circuits to solve computing problems. Neuromorphic hardware systems are now becoming more widely available and “neuromorphic algorithms” are being developed. As they are maturing toward deployment in general research environments, it becomes important to assess and compare them in the context of the applications they are meant to solve. This should encompass not just task performance, but also ease of implementation, speed of processing, scalability, and power efficiency. Here, we report our practical experience of implementing a bio-inspired, spiking network for multivariate classification on three different platforms: the hybrid digital/analog Spikey system, the digital spike-based SpiNNaker system, and GeNN, a meta-compiler for parallel GPU hardware. We assess performance using a standard hand-written digit classification task. We found that whilst a different implementation approach was required for each platform, classification performances remained in line. This suggests that all three implementations were able to exercise the model's ability to solve the task rather than exposing inherent platform limits, although differences emerged when capacity was approached. With respect to execution speed and power consumption, we found that for each platform a large fraction of the computing time was spent outside of the neuromorphic device, on the host machine. Time was spent in a range of combinations of preparing the model, encoding suitable input spiking data, shifting data, and decoding spike-encoded results. This is also where a large proportion of the total power was consumed, most markedly for the SpiNNaker and Spikey systems. We conclude that the simulation efficiency advantage of the assessed specialized hardware systems is easily lost in excessive host-device communication, or non-neuronal parts of the computation. These results emphasize the need to optimize the host-device communication architecture for scalability, maximum throughput, and minimum latency. Moreover, our results indicate that special attention should be paid to minimize host-device communication when designing and implementing networks for efficient neuromorphic computing. PMID:26778950
Tobin-West, Charles
2017-01-01
Background Researchers have linked gas flaring to climate change, the hastening of the epidemiological transition and an upsurge in the prevalence of non-communicable diseases. We sought to determine if a relationship exists between residing in a gas-flaring host community and hypertension. Methods We conducted an analytical cross-sectional household survey among residents of 600 households in three gas-flaring and three non-gas-flaring host communities in the Niger Delta region of Nigeria. We took geo-coordinates, administered a modified WHO-STEPS questionnaire and built on Android mobile phones using Open-Data-Kit (ODK) software. We also took biological measurements and carried out descriptive and inferential statistical analysis using SPSS and STATA. Results We interviewed a total of 912 adults: 437 (47.9%) from non-gas-flaring and 475 (52.1%) from gas-flaring host communities. There were differences in level of education (x2=42.99; p=0.00), occupation category (x2=25.42; p=0.00) and BMI category (x2=15.37; 0.003) among the two groups. The overall prevalence of hypertension was 23.7%: 20.7% among persons living in non-gas-flaring host communities compared with 25.3% among persons living in gas-flaring host communities (x2=2.89; p=0.89). Residence in a gas-flaring host community, (AdjOR=1.75; 95% CI=1.11 to 2.74) and mean age (AdjOR=1.05; 95% CI=1.03 to 1.07) were identified as the predictors of hypertension. There was a significant association between hypertension and age, 1.05 (1.04–1.06) while the probability of being hypertensive was higher among residents of gas-flaring host communities between 20 to 40 years and 60 to 80 years. Conclusion There is a need for the relevant agencies to scale up environmental and biological monitoring of air pollutants. The implication of a possible relationship between gas-flaring and hypertension brings to the fore the need for interventions to regulate gas-flaring activities. PMID:29225950
Breaking Transmission with Vaccines: The Case of Tuberculosis.
Gonzalo-Asensio, Jesus; Aguilo, Nacho; Marinova, Dessislava; Martin, Carlos
2017-07-01
Members of the Mycobacterium tuberculosis complex (MTBC) have evolved causing tuberculosis (TB) in different mammalian hosts. MTBC ecotypes have adapted to diverse animal species, with M. bovis being the most common cause of TB in livestock. Cattle-to-human transmission of M. bovis through ingestion of raw milk was common before introduction of the pasteurization process. TB in humans is mainly caused by M. tuberculosis . This bacterium is considered a genetically clonal pathogen that has coevolved with humans due to its ability to manipulate and subvert the immune response. TB is a major public health problem due to airborne person-to-person transmission of M. tuberculosis . The essential yet unanswered question on the natural history of TB is when M. tuberculosis decides to establish latent infection in the host (resambling the lysogenic cycle of lambda phage) or to cause pulmonary disease (comparable to the lytic cycle of lambda phage). In this latter case, M. tuberculosis kills the host with the aim of achieving transmission to new hosts. Combating the TB epidemic requires stopping transmission. M. bovis BCG, the present vaccine against TB, is derived from M. bovis and only protects against disseminated forms of TB. Thus, a priority in TB research is development of new effective vaccines to prevent pulmonary disease. Attenuated vaccines based on M. tuberculosis as MTBVAC are potential candidates that could contribute to break the TB transmission cycle.
Sato, Emi; Matsuda, Kouhei
2018-06-11
The purpose of this study was to examine cerebral blood flow in the frontal cortex area during personality self-rating tasks. Our two hypotheses were (1) cerebral blood flow varies based on personality rating condition and (2) cerebral blood flow varies based on the personality traits. This experiment measured cerebral blood flow under 3 personal computer rating conditions and 2 questionnaire conditions. Comparing the rating conditions, the results of the t-test indicated that cerebral blood flow was higher in the questionnaire condition than it was in the personal computer condition. With respect to the Big Five, the result of the correlation coefficient, that is, cerebral blood flow during a personality rating task, changed according to the trait for agreeableness. The results of the analysis of the 5-cluster on individual differences indicated that certain personality traits were related to the factors that increased or decreased cerebral blood flow. An analysis of variance indicated that openness to experience and Behavioural Activation System-drive was significant given that participants with high intellectual curiosity were motivated in this experiment, thus, their cerebral blood flow may have increased. The significance of this experiment was that by employing certain performance measures we could examine differences in physical changes based on personality traits. © 2018 International Union of Psychological Science.
Future prospect 2012-2025 - How will our business change for the next 10 years -
NASA Astrophysics Data System (ADS)
Tanaka, Sakae
2013-04-01
The purpose of this lecture is to discuss about the "Future". How our business will change in the next 10 years? I believe the key is 3 mega-trends "Sustainability", "Cloud Computing" and "Life Innovation". With the development of social environment, the required business will change, too. The future would be invisible if you shut yourself up in your single industry. It is important to see various business fields horizontally, and recognize various key changes stereoscopically such as demographics, economy, technology, sense of value and lifestyle, when you develop mid-and-long term strategy. "Cloud" is silent, but the revolution of personal computing. It will bring the drastic changes in every industry. It will make "voice" and "moving image" possible to use as the interface to access your computer. Cloud computing will also make the client device more diversified and spread the application range widely. 15 years ago, the term "IT" was equivalent to "personal computer". Recently, it rather means to use smartphone and tablet device. In the next several years, TV and car-navigation system will be connected to broadband and it will become a part of personal computing. The meaning of personal computing is changing essentially year by year. In near future, the universe of computing will expand to the energy, medical and health-care, and agriculture etc. It passed only 20 years since we use "Computer" in a full scale operation. Recently, computer has start understanding our few words and talking in babble like a baby. The history of computing has just started.
Personal Computer Price and Performance.
ERIC Educational Resources Information Center
Crawford, Walt
1993-01-01
Discusses personal computer price trends since 1986; describes offerings and prices for four direct-market suppliers, i.e., Dell CompuAdd, PC Brand, and Gateway 2000; and discusses overall value and price/performance ratios. Tables and graphs chart value over time. (EA)
Gray, Charles M; Goodell, Baldwin; Lear, Alex
2007-07-01
We describe the design and performance of an electromechanical system for conducting multineuron recording experiments in alert non-human primates. The system is based on a simple design, consisting of a microdrive, control electronics, software, and a unique type of recording chamber. The microdrive consists of an aluminum frame, a set of eight linear actuators driven by computer-controlled miniature stepping motors, and two printed circuit boards (PCBs) that provide connectivity to the electrodes and the control electronics. The control circuitry is structured around an Atmel RISC-based microcontroller, which sends commands to as many as eight motor control cards, each capable of controlling eight motors. The microcontroller is programmed in C and uses serial communication to interface with a host computer. The graphical user interface for sending commands is written in C and runs on a conventional personal computer. The recording chamber is low in profile, mounts within a circular craniotomy, and incorporates a removable internal sleeve. A replaceable Sylastic membrane can be stretched across the bottom opening of the sleeve to provide a watertight seal between the cranial cavity and the external environment. This greatly reduces the susceptibility to infection, nearly eliminates the need for routine cleaning, and permits repeated introduction of electrodes into the brain at the same sites while maintaining the watertight seal. The system is reliable, easy to use, and has several advantages over other commercially available systems with similar capabilities.
Distributed Computing Environment for Mine Warfare Command
1993-06-01
based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress of the evolution as of May of...network of personal computers over the past several years. This thesis analyzes the progress of the evolution as of May of 1992. The building blocks of a...85 A. BACKGROUND ............. .................. 85 B. PAST ENVIRONMENT ........... ............... 86 C. PRESENT ENVIRONMENT
Patently Absurd: The Ethical Implications of Software Patents
ERIC Educational Resources Information Center
Stark, Chris D.
2005-01-01
Since the mid-1980s, the percentage of the population in the United States owning a personal computer has grown from just over 8% to well over 50%, and nearly 60% of the population uses a computer at work. At the end of 2004, there were over 820 million personal computers in active use worldwide, and projections indicate that the number will…
Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data.
Guo, Ao; Ma, Jianhua
2018-02-25
A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual). This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject's persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual's facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model.
Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data
Ma, Jianhua
2018-01-01
A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual). This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject’s persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual’s facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model. PMID:29495343
APECS: A Network for Polar Early Career Scientist Professional Development
NASA Astrophysics Data System (ADS)
Enderlin, E. M.
2014-12-01
The Association of Polar Early Career Researchers (APECS) is an international and interdisciplinary organization for undergraduate and graduate students, postdoctoral researchers, early faculty members, educators and others with interests in the polar regions, alpine regions and the wider Cryosphere. APECS is a scientific, non-profit organization with free individual membership that aims to stimulate research collaborations and develop effective future leaders in polar research, education, and outreach. APECS grew out of the 4th International Polar Year (2007-08), which emphasized the need to stimulate and nurture the next generation of scientists in order to improve the understanding and communication of the polar regions and its global connections. The APECS organizational structure includes a Council and an elected Executive Committee that are supported by a Directorate. These positions are open to all individual members through a democratic process. The APECS Directorate is funded by the Norwegian Research Council, the University of Tromsø and the Norwegian Polar Institute and is hosted by the University of Tromsø. Early career scientists benefit from a range of activities hosted/organized by APECS. Every year, numerous activities are run with partner organizations and in conjunction with major polar conferences and meetings. In-person and online panels and workshops focus on a range of topics, from developing field skills to applying for a job after graduate school. Career development webinars are hosted each fall and topical research webinars are hosted throughout the year and archived online (http://www.apecs.is). The APECS website also contains abundant information on polar news, upcoming conferences and meetings, and job postings for early career scientists. To better respond to members' needs, APECS has national/regional committees that are linked to the international overarching organization. Many of these committees organize regional meetings or informal meet-ups, providing a means to personally interact with a subset of APECS' 4725 members. The combination of in-person and online activities and resources hosted/organized by APECS provides members with unique opportunities for networking, career development, and international and interdisciplinary collaboration.
Properties and Expected Number Counts of Active Galactic Nuclei and Their Hosts in the Far-infrared
NASA Astrophysics Data System (ADS)
Draper, A. R.; Ballantyne, D. R.
2011-03-01
Telescopes like Herschel and the Atacama Large Millimeter/submillimeter Array (ALMA) are creating new opportunities to study sources in the far-infrared (FIR), a wavelength region dominated by cold dust emission. Probing cold dust in active galaxies allows for study of the star formation history of active galactic nucleus (AGN) hosts. The FIR is also an important spectral region for observing AGNs which are heavily enshrouded by dust, such as Compton thick (CT) AGNs. By using information from deep X-ray surveys and cosmic X-ray background synthesis models, we compute Cloudy photoionization simulations which are used to predict the spectral energy distribution (SED) of AGNs in the FIR. Expected differential number counts of AGNs and their host galaxies are calculated in the Herschel bands. The expected contribution of AGNs and their hosts to the cosmic infrared background (CIRB) and the infrared luminosity density are also computed. Multiple star formation scenarios are investigated using a modified blackbody star formation SED. It is found that FIR observations at ~500 μm are an excellent tool in determining the star formation history of AGN hosts. Additionally, the AGN contribution to the CIRB can be used to determine whether star formation in AGN hosts evolves differently than in normal galaxies. The contribution of CT AGNs to the bright end differential number counts and to the bright source infrared luminosity density is a good test of AGN evolution models where quasars are triggered by major mergers.
Teaching Hands-On Linux Host Computer Security
ERIC Educational Resources Information Center
Shumba, Rose
2006-01-01
In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…
Seal, John B; Alverdy, John C; Zaborina, Olga; An, Gary
2011-09-19
There is a growing realization that alterations in host-pathogen interactions (HPI) can generate disease phenotypes without pathogen invasion. The gut represents a prime region where such HPI can arise and manifest. Under normal conditions intestinal microbial communities maintain a stable, mutually beneficial ecosystem. However, host stress can lead to changes in environmental conditions that shift the nature of the host-microbe dialogue, resulting in escalation of virulence expression, immune activation and ultimately systemic disease. Effective modulation of these dynamics requires the ability to characterize the complexity of the HPI, and dynamic computational modeling can aid in this task. Agent-based modeling is a computational method that is suited to representing spatially diverse, dynamical systems. We propose that dynamic knowledge representation of gut HPI with agent-based modeling will aid in the investigation of the pathogenesis of gut-derived sepsis. An agent-based model (ABM) of virulence regulation in Pseudomonas aeruginosa was developed by translating bacterial and host cell sense-and-response mechanisms into behavioral rules for computational agents and integrated into a virtual environment representing the host-microbe interface in the gut. The resulting gut milieu ABM (GMABM) was used to: 1) investigate a potential clinically relevant laboratory experimental condition not yet developed--i.e. non-lethal transient segmental intestinal ischemia, 2) examine the sufficiency of existing hypotheses to explain experimental data--i.e. lethality in a model of major surgical insult and stress, and 3) produce behavior to potentially guide future experimental design--i.e. suggested sample points for a potential laboratory model of non-lethal transient intestinal ischemia. Furthermore, hypotheses were generated to explain certain discrepancies between the behaviors of the GMABM and biological experiments, and new investigatory avenues proposed to test those hypotheses. Agent-based modeling can account for the spatio-temporal dynamics of an HPI, and, even when carried out with a relatively high degree of abstraction, can be useful in the investigation of system-level consequences of putative mechanisms operating at the individual agent level. We suggest that an integrated and iterative heuristic relationship between computational modeling and more traditional laboratory and clinical investigations, with a focus on identifying useful and sufficient degrees of abstraction, will enhance the efficiency and translational productivity of biomedical research.
2011-01-01
Background There is a growing realization that alterations in host-pathogen interactions (HPI) can generate disease phenotypes without pathogen invasion. The gut represents a prime region where such HPI can arise and manifest. Under normal conditions intestinal microbial communities maintain a stable, mutually beneficial ecosystem. However, host stress can lead to changes in environmental conditions that shift the nature of the host-microbe dialogue, resulting in escalation of virulence expression, immune activation and ultimately systemic disease. Effective modulation of these dynamics requires the ability to characterize the complexity of the HPI, and dynamic computational modeling can aid in this task. Agent-based modeling is a computational method that is suited to representing spatially diverse, dynamical systems. We propose that dynamic knowledge representation of gut HPI with agent-based modeling will aid in the investigation of the pathogenesis of gut-derived sepsis. Methodology/Principal Findings An agent-based model (ABM) of virulence regulation in Pseudomonas aeruginosa was developed by translating bacterial and host cell sense-and-response mechanisms into behavioral rules for computational agents and integrated into a virtual environment representing the host-microbe interface in the gut. The resulting gut milieu ABM (GMABM) was used to: 1) investigate a potential clinically relevant laboratory experimental condition not yet developed - i.e. non-lethal transient segmental intestinal ischemia, 2) examine the sufficiency of existing hypotheses to explain experimental data - i.e. lethality in a model of major surgical insult and stress, and 3) produce behavior to potentially guide future experimental design - i.e. suggested sample points for a potential laboratory model of non-lethal transient intestinal ischemia. Furthermore, hypotheses were generated to explain certain discrepancies between the behaviors of the GMABM and biological experiments, and new investigatory avenues proposed to test those hypotheses. Conclusions/Significance Agent-based modeling can account for the spatio-temporal dynamics of an HPI, and, even when carried out with a relatively high degree of abstraction, can be useful in the investigation of system-level consequences of putative mechanisms operating at the individual agent level. We suggest that an integrated and iterative heuristic relationship between computational modeling and more traditional laboratory and clinical investigations, with a focus on identifying useful and sufficient degrees of abstraction, will enhance the efficiency and translational productivity of biomedical research. PMID:21929759
A vectorial semantics approach to personality assessment.
Neuman, Yair; Cohen, Yochai
2014-04-23
Personality assessment and, specifically, the assessment of personality disorders have traditionally been indifferent to computational models. Computational personality is a new field that involves the automatic classification of individuals' personality traits that can be compared against gold-standard labels. In this context, we introduce a new vectorial semantics approach to personality assessment, which involves the construction of vectors representing personality dimensions and disorders, and the automatic measurements of the similarity between these vectors and texts written by human subjects. We evaluated our approach by using a corpus of 2468 essays written by students who were also assessed through the five-factor personality model. To validate our approach, we measured the similarity between the essays and the personality vectors to produce personality disorder scores. These scores and their correspondence with the subjects' classification of the five personality factors reproduce patterns well-documented in the psychological literature. In addition, we show that, based on the personality vectors, we can predict each of the five personality factors with high accuracy.
A Vectorial Semantics Approach to Personality Assessment
NASA Astrophysics Data System (ADS)
Neuman, Yair; Cohen, Yochai
2014-04-01
Personality assessment and, specifically, the assessment of personality disorders have traditionally been indifferent to computational models. Computational personality is a new field that involves the automatic classification of individuals' personality traits that can be compared against gold-standard labels. In this context, we introduce a new vectorial semantics approach to personality assessment, which involves the construction of vectors representing personality dimensions and disorders, and the automatic measurements of the similarity between these vectors and texts written by human subjects. We evaluated our approach by using a corpus of 2468 essays written by students who were also assessed through the five-factor personality model. To validate our approach, we measured the similarity between the essays and the personality vectors to produce personality disorder scores. These scores and their correspondence with the subjects' classification of the five personality factors reproduce patterns well-documented in the psychological literature. In addition, we show that, based on the personality vectors, we can predict each of the five personality factors with high accuracy.
A Vectorial Semantics Approach to Personality Assessment
Neuman, Yair; Cohen, Yochai
2014-01-01
Personality assessment and, specifically, the assessment of personality disorders have traditionally been indifferent to computational models. Computational personality is a new field that involves the automatic classification of individuals' personality traits that can be compared against gold-standard labels. In this context, we introduce a new vectorial semantics approach to personality assessment, which involves the construction of vectors representing personality dimensions and disorders, and the automatic measurements of the similarity between these vectors and texts written by human subjects. We evaluated our approach by using a corpus of 2468 essays written by students who were also assessed through the five-factor personality model. To validate our approach, we measured the similarity between the essays and the personality vectors to produce personality disorder scores. These scores and their correspondence with the subjects' classification of the five personality factors reproduce patterns well-documented in the psychological literature. In addition, we show that, based on the personality vectors, we can predict each of the five personality factors with high accuracy. PMID:24755833
Secure data sharing in public cloud
NASA Astrophysics Data System (ADS)
Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.
2012-04-01
Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.
ARIES NDA Robot operators` manual
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scheer, N.L.; Nelson, D.C.
1998-05-01
The ARIES NDA Robot is an automation device for servicing the material movements for a suite of Non-destructive assay (NDA) instruments. This suite of instruments includes a calorimeter, a gamma isotopic system, a segmented gamma scanner (SGS), and a neutron coincidence counter (NCC). Objects moved by the robot include sample cans, standard cans, and instrument plugs. The robot computer has an RS-232 connection with the NDA Host computer, which coordinates robot movements and instrument measurements. The instruments are expected to perform measurements under the direction of the Host without operator intervention. This user`s manual describes system startup, using the mainmore » menu, manual operation, and error recovery.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Priedhorsky, Reid; Randles, Tim
Charliecloud is a set of scripts to let users run a virtual cluster of virtual machines (VMs) on a desktop or supercomputer. Key functions include: 1. Creating (typically by installing an operating system from vendor media) and updating VM images; 2. Running a single VM; 3. Running multiple VMs in a virtual cluster. The virtual machines can talk to one another over the network and (in some cases) the outside world. This is accomplished by calling external programs such as QEMU and the Virtual Distributed Ethernet (VDE) suite. The goal is to let users have a virtual cluster containing nodesmore » where they have privileged access, while isolating that privilege within the virtual cluster so it cannot affect the physical compute resources. Host configuration enforces security; this is not included in Charliecloud, though security guidelines are included in its documentation and Charliecloud is designed to facilitate such configuration. Charliecloud manages passing information from host computers into and out of the virtual machines, such as parameters of the virtual cluster, input data specified by the user, output data from virtual compute jobs, VM console display, and network connections (e.g., SSH or X11). Parameters for the virtual cluster (number of VMs, RAM and disk per VM, etc.) are specified by the user or gathered from the environment (e.g., SLURM environment variables). Example job scripts are included. These include computation examples (such as a "hello world" MPI job) as well as performance tests. They also include a security test script to verify that the virtual cluster is appropriately sandboxed. Tests include: 1. Pinging hosts inside and outside the virtual cluster to explore connectivity; 2. Port scans (again inside and outside) to see what services are available; 3. Sniffing tests to see what traffic is visible to running VMs; 4. IP address spoofing to test network functionality in this case; 5. File access tests to make sure host access permissions are enforced. This test script is not a comprehensive scanner and does not test for specific vulnerabilities. Importantly, no information about physical hosts or network topology is included in this script (or any of Charliecloud); while part of a sensible test, such information is specified by the user when the test is run. That is, one cannot learn anything about the LANL network or computing infrastructure by examining Charliecloud code.« less
To Mac or Not To Mac? One Apple Devotee's Excruciating Purchase Dilemma.
ERIC Educational Resources Information Center
Shenk, David
1998-01-01
Discusses the pros and cons of selecting Apple Macintosh computers versus a personal computer that runs the Windows platform. Graphical user interfaces, current and future support, and aesthetics are considered, as well as personal preferences. (LRW)
Emancipative Educational Technology.
ERIC Educational Resources Information Center
Boyd, Gary M.
1996-01-01
Presents a theoretical systems model for computer-mediated conferencing. Discusses Habermas' criteria for emancipative discourse (i.e., liberation or emancipation is increasing a person's abilities and opportunities to make rational choices about matters important to that person). Demonstrates why computer conferencing is best suited to…
Revealing the Gag Itinerary: How HIV is Transmitted One Cell at a Time | Center for Cancer Research
Although person-to-person transmission of HIV has been well understood for years, researchers are still trying to figure out exactly how the virus moves from one cell to another. Researchers have delineated the steps and key players involved in the generation of HIV particles inside infected (host) cells. However, the precise location of virus assembly inside these cells and
Use of computer games as an intervention for stroke.
Proffitt, Rachel M; Alankus, Gazihan; Kelleher, Caitlin L; Engsberg, Jack R
2011-01-01
Current rehabilitation for persons with hemiparesis after stroke requires high numbers of repetitions to be in accordance with contemporary motor learning principles. The motivational characteristics of computer games can be harnessed to create engaging interventions for persons with hemiparesis after stroke that incorporate this high number of repetitions. The purpose of this case report was to test the feasibility of using computer games as a 6-week home therapy intervention to improve upper extremity function for a person with stroke. One person with left upper extremity hemiparesis after stroke participated in a 6-week home therapy computer game intervention. The games were customized to her preferences and abilities and modified weekly. Her performance was tracked and analyzed. Data from pre-, mid-, and postintervention testing using standard upper extremity measures and the Reaching Performance Scale (RPS) were analyzed. After 3 weeks, the participant demonstrated increased upper extremity range of motion at the shoulder and decreased compensatory trunk movements during reaching tasks. After 6 weeks, she showed functional gains in activities of daily living (ADLs) and instrumental ADLs despite no further improvements on the RPS. Results indicate that computer games have the potential to be a useful intervention for people with stroke. Future work will add additional support to quantify the effectiveness of the games as a home therapy intervention for persons with stroke.
White, Timothy C.; Sauter, Edward A.; Stewart, Duff C.
2014-01-01
Intermagnet is an international oversight group which exists to establish a global network for geomagnetic observatories. This group establishes data standards and standard operating procedures for members and prospective members. Intermagnet has proposed a new One-Second Data Standard, for that emerging geomagnetic product. The standard specifies that all data collected must have a time stamp accuracy of ±10 milliseconds of the top-of-the-second Coordinated Universal Time. Therefore, the U.S. Geological Survey Geomagnetism Program has designed and executed several tests on its current data collection system, the Personal Computer Data Collection Platform. Tests are designed to measure the time shifts introduced by individual components within the data collection system, as well as to measure the time shift introduced by the entire Personal Computer Data Collection Platform. Additional testing designed for Intermagnet will be used to validate further such measurements. Current results of the measurements showed a 5.0–19.9 millisecond lag for the vertical channel (Z) of the Personal Computer Data Collection Platform and a 13.0–25.8 millisecond lag for horizontal channels (H and D) of the collection system. These measurements represent a dynamically changing delay introduced within the U.S. Geological Survey Personal Computer Data Collection Platform.
Development of a personal-computer-based intelligent tutoring system
NASA Technical Reports Server (NTRS)
Mueller, Stephen J.
1988-01-01
A large number of Intelligent Tutoring Systems (ITSs) have been built since they were first proposed in the early 1970's. Research conducted on the use of the best of these systems has demonstrated their effectiveness in tutoring in selected domains. A prototype ITS for tutoring students in the use of CLIPS language: CLIPSIT (CLIPS Intelligent Tutor) was developed. For an ITS to be widely accepted, not only must it be effective, flexible, and very responsive, it must also be capable of functioning on readily available computers. While most ITSs have been developed on powerful workstations, CLIPSIT is designed for use on the IBM PC/XT/AT personal computer family (and their clones). There are many issues to consider when developing an ITS on a personal computer such as the teaching strategy, user interface, knowledge representation, and program design methodology. Based on experiences in developing CLIPSIT, results on how to address some of these issues are reported and approaches are suggested for maintaining a powerful learning environment while delivering robust performance within the speed and memory constraints of the personal computer.
Image matrix processor for fast multi-dimensional computations
Roberson, George P.; Skeate, Michael F.
1996-01-01
An apparatus for multi-dimensional computation which comprises a computation engine, including a plurality of processing modules. The processing modules are configured in parallel and compute respective contributions to a computed multi-dimensional image of respective two dimensional data sets. A high-speed, parallel access storage system is provided which stores the multi-dimensional data sets, and a switching circuit routes the data among the processing modules in the computation engine and the storage system. A data acquisition port receives the two dimensional data sets representing projections through an image, for reconstruction algorithms such as encountered in computerized tomography. The processing modules include a programmable local host, by which they may be configured to execute a plurality of different types of multi-dimensional algorithms. The processing modules thus include an image manipulation processor, which includes a source cache, a target cache, a coefficient table, and control software for executing image transformation routines using data in the source cache and the coefficient table and loading resulting data in the target cache. The local host processor operates to load the source cache with a two dimensional data set, loads the coefficient table, and transfers resulting data out of the target cache to the storage system, or to another destination.
Image-Processing Software For A Hypercube Computer
NASA Technical Reports Server (NTRS)
Lee, Meemong; Mazer, Alan S.; Groom, Steven L.; Williams, Winifred I.
1992-01-01
Concurrent Image Processing Executive (CIPE) is software system intended to develop and use image-processing application programs on concurrent computing environment. Designed to shield programmer from complexities of concurrent-system architecture, it provides interactive image-processing environment for end user. CIPE utilizes architectural characteristics of particular concurrent system to maximize efficiency while preserving architectural independence from user and programmer. CIPE runs on Mark-IIIfp 8-node hypercube computer and associated SUN-4 host computer.
A System Biology Perspective on Environment-Host-Microbe Interactions.
Chen, Lianmin; Garmaeva, Sanzhima; Zherankova, Alexandra; Fu, Jingyuan; Wijmenga, Cisca
2018-04-16
A vast, complex and dynamic consortium of microorganisms known as the gut microbiome colonizes the human gut. Over the past few decades we have developed an increased awareness of its important role in human health. In this review we discuss the role of the gut microbiome in complex diseases and the possible causal scenarios behind its interactions with the host genome and environmental factors. We then propose a new analysis framework that combines a systems biology approach, cross-kingdom integration of multiple levels of omics data, and innovative in vitro models to yield an integrated picture of human host-microbe interactions. This new framework will lay the foundation for the development of the next phase in personalized medicine.
Predicted outcomes of vaccinating wildlife to reduce human risk of Lyme disease.
Tsao, Kimberly; Fish, Durland; Galvani, Alison P
2012-07-01
Vaccination efforts for Lyme disease prevention in humans have focused on wildlife reservoirs to target the causative agent, Borrelia burgdorferi, for elimination in vector ticks. Multiple host species are involved in the transmission and maintenance of the bacterium, but not all host species can be vaccinated effectively. To evaluate vaccinating a subset of hosts in the context of host-tick interactions, we constructed and evaluated a dynamic model of B. burgdorferi transmission in mice. Our analyses indicate that on average, a mouse-targeted vaccine is expected to proportionally reduce infection prevalence among ticks by 56%. However, relative to mouse vaccination, human risk of exposure is dominated by the number of tick bites received per person, the proportion of tick blood meals taken from the highly reservoir-competent white-footed mouse relative to other hosts, and the average number of tick bites per mouse. Variation in these factors reduces the predictability of vaccination outcomes. Additionally, contributions of nonmouse hosts to pathogen maintenance preclude elimination of B. burgdorferi through mouse vaccination alone. Our findings indicate that to increase the impact of wildlife vaccination, reducing tick populations by acaricide application, in addition to targeting additional reservoir-competent host species, should be employed.
ERIC Educational Resources Information Center
Fenton, Ginger D.; LaBorde, Luke F.; Radhakrishna, Rama B.; Brown, J. Lynne; Cutter, Catherine N.
2006-01-01
Computer-based training is increasingly favored by food companies for training workers due to convenience, self-pacing ability, and ease of use. The objectives of this study were to determine if personal hygiene training, offered through a computer-based method, is as effective as a face-to-face method in knowledge acquisition and improved…
ERIC Educational Resources Information Center
Rubin, Michael Rogers
1988-01-01
The second of three articles on abusive data collection and usage practices and their effect on personal privacy, discusses the evolution of data protection laws worldwide, and compares the scope, major provisions, and enforcement components of the laws. A chronology of key events in the regulation of computer databanks in included. (1 reference)…
Two degree-of-freedom flutter solution for a personal computer
NASA Technical Reports Server (NTRS)
Turnock, D. L.
1985-01-01
A computer programmed flutter solution has been written in the BASIC language for a personal computer. The program is for two degree-of-freedom bending torsion flutter applications and utilizes two dimensional Theodorsen aerodynamics. The aerodynamics were modified to include approximations for Mach number (compressibility) effects and aspect ratio (finite span) effects. Input options, user instructions, program listing, and a test case application are included.
Study on Thermal Conductivity of Personal Computer Aluminum-Magnesium Alloy Casing
NASA Astrophysics Data System (ADS)
Liao, MeiHong
With the rapid development of computer technology, micro-state atoms by simulating the movement of material to analyze the nature of the macro-state have become an important subject. Materials, especially aluminium-magnesium alloy materials, often used in personal computer case, this article puts forward heat conduction model of the material, and numerical methods of heat transfer performance of the material.
Liability for Personal Injury Caused by Defective Medical Computer Programs
Brannigan, Vincent M.
1980-01-01
Defective medical computer programs can cause personal injury. Financial responsibility for the injury under tort law will turn on several factors: whether the program is a product or a service, what types of defect exist in the product, and who produced the program. The factors involved in making these decisions are complex, but knowledge of the relevant issues can assist computer personnel in avoiding liability.
On introduction of artificial intelligence elements to heat power engineering
NASA Astrophysics Data System (ADS)
Dregalin, A. F.; Nazyrova, R. R.
1993-10-01
The basic problems of 'the thermodynamic intelligence' of personal computers have been outlined. The thermodynamic intellect of personal computers as a concept has been introduced to heat processes occurring in engines of flying vehicles. In particular, the thermodynamic intellect of computers is determined by the possibility of deriving formal relationships between thermodynamic functions. In chemical thermodynamics, a concept of a characteristic function has been introduced.
Client-Server: What Is It and Are We There Yet?
ERIC Educational Resources Information Center
Gershenfeld, Nancy
1995-01-01
Discusses client-server architecture in dumb terminals, personal computers, local area networks, and graphical user interfaces. Focuses on functions offered by client personal computers: individualized environments; flexibility in running operating systems; advanced operating system features; multiuser environments; and centralized data…
Computers and Communications. Improving the Employability of Persons with Handicaps.
ERIC Educational Resources Information Center
Deitel, Harvey M.
1984-01-01
Reviews applications of computer and communications technologies for persons with visual, hearing, physical, speech, and language impairments, as well as the effects of technologies on transportation, work at home, education, and other aspects affecting the employment of the disabled. (SK)
Dahlö, Martin; Scofield, Douglas G; Schaal, Wesley; Spjuth, Ola
2018-05-01
Next-generation sequencing (NGS) has transformed the life sciences, and many research groups are newly dependent upon computer clusters to store and analyze large datasets. This creates challenges for e-infrastructures accustomed to hosting computationally mature research in other sciences. Using data gathered from our own clusters at UPPMAX computing center at Uppsala University, Sweden, where core hour usage of ∼800 NGS and ∼200 non-NGS projects is now similar, we compare and contrast the growth, administrative burden, and cluster usage of NGS projects with projects from other sciences. The number of NGS projects has grown rapidly since 2010, with growth driven by entry of new research groups. Storage used by NGS projects has grown more rapidly since 2013 and is now limited by disk capacity. NGS users submit nearly twice as many support tickets per user, and 11 more tools are installed each month for NGS projects than for non-NGS projects. We developed usage and efficiency metrics and show that computing jobs for NGS projects use more RAM than non-NGS projects, are more variable in core usage, and rarely span multiple nodes. NGS jobs use booked resources less efficiently for a variety of reasons. Active monitoring can improve this somewhat. Hosting NGS projects imposes a large administrative burden at UPPMAX due to large numbers of inexperienced users and diverse and rapidly evolving research areas. We provide a set of recommendations for e-infrastructures that host NGS research projects. We provide anonymized versions of our storage, job, and efficiency databases.
2018-01-01
Abstract Background Next-generation sequencing (NGS) has transformed the life sciences, and many research groups are newly dependent upon computer clusters to store and analyze large datasets. This creates challenges for e-infrastructures accustomed to hosting computationally mature research in other sciences. Using data gathered from our own clusters at UPPMAX computing center at Uppsala University, Sweden, where core hour usage of ∼800 NGS and ∼200 non-NGS projects is now similar, we compare and contrast the growth, administrative burden, and cluster usage of NGS projects with projects from other sciences. Results The number of NGS projects has grown rapidly since 2010, with growth driven by entry of new research groups. Storage used by NGS projects has grown more rapidly since 2013 and is now limited by disk capacity. NGS users submit nearly twice as many support tickets per user, and 11 more tools are installed each month for NGS projects than for non-NGS projects. We developed usage and efficiency metrics and show that computing jobs for NGS projects use more RAM than non-NGS projects, are more variable in core usage, and rarely span multiple nodes. NGS jobs use booked resources less efficiently for a variety of reasons. Active monitoring can improve this somewhat. Conclusions Hosting NGS projects imposes a large administrative burden at UPPMAX due to large numbers of inexperienced users and diverse and rapidly evolving research areas. We provide a set of recommendations for e-infrastructures that host NGS research projects. We provide anonymized versions of our storage, job, and efficiency databases. PMID:29659792
1982-11-12
File 1/0 Prgram Invocation Other Access M and Control Services KAPSE/Host Interface most Operating System Peripherals/ 01 su ?eetworks 6282318-2 Figure 3...3.2.4.3.8.5 Transitory Windows The TRANSITORY flag is used to prevent permanent dependence on temporary windows created simply for focusing on a part of the...KAPSE/Tool interfaces in terms of these low-level host-independent interfaces. In addition, the KAPSE/Host interface packages prevent the application
Method for redesign of microbial production systems
Maranas, Costas D.; Burgard, Anthony P.; Pharkya, Priti
2010-11-02
A computer-assisted method for identifying functionalities to add to an organism-specific metabolic network to enable a desired biotransformation in a host includes accessing reactions from a universal database to provide stoichiometric balance, identifying at least one stoichiometrically balanced pathway at least partially based on the reactions and a substrate to minimize a number of non-native functionalities in the production host, and incorporating the at least one stoichiometrically balanced pathway into the host to provide the desired biotransformation. A representation of the metabolic network as modified can be stored.
Method for redesign of microbial production systems
Maranas, Costas D [State College, PA; Burgard, Anthony P [San Diego, CA; Pharkya, Priti [San Diego, CA
2012-01-31
A computer-assisted method for identifying functionalities to add to an organism-specific metabolic network to enable a desired biotransformation in a host includes accessing reactions from a universal database to provide stoichiometric balance, identifying at least one stoichiometrically balanced pathway at least partially based on the reactions and a substrate to minimize a number of non-native functionalities in the production host, and incorporating the at least one stoichiometrically balanced pathway into the host to provide the desired biotransformation. A representation of the metabolic network as modified can be stored.
The SAMPL4 host-guest blind prediction challenge: an overview.
Muddana, Hari S; Fenley, Andrew T; Mobley, David L; Gilson, Michael K
2014-04-01
Prospective validation of methods for computing binding affinities can help assess their predictive power and thus set reasonable expectations for their performance in drug design applications. Supramolecular host-guest systems are excellent model systems for testing such affinity prediction methods, because their small size and limited conformational flexibility, relative to proteins, allows higher throughput and better numerical convergence. The SAMPL4 prediction challenge therefore included a series of host-guest systems, based on two hosts, cucurbit[7]uril and octa-acid. Binding affinities in aqueous solution were measured experimentally for a total of 23 guest molecules. Participants submitted 35 sets of computational predictions for these host-guest systems, based on methods ranging from simple docking, to extensive free energy simulations, to quantum mechanical calculations. Over half of the predictions provided better correlations with experiment than two simple null models, but most methods underperformed the null models in terms of root mean squared error and linear regression slope. Interestingly, the overall performance across all SAMPL4 submissions was similar to that for the prior SAMPL3 host-guest challenge, although the experimentalists took steps to simplify the current challenge. While some methods performed fairly consistently across both hosts, no single approach emerged as consistent top performer, and the nonsystematic nature of the various submissions made it impossible to draw definitive conclusions regarding the best choices of energy models or sampling algorithms. Salt effects emerged as an issue in the calculation of absolute binding affinities of cucurbit[7]uril-guest systems, but were not expected to affect the relative affinities significantly. Useful directions for future rounds of the challenge might involve encouraging participants to carry out some calculations that replicate each others' studies, and to systematically explore parameter options.
The influence of gut microbiota on drug metabolism and toxicity
Li, Houkai; He, Jiaojiao; Jia, Wei
2017-01-01
Introduction Gut microbiota plays critical roles in drug metabolism. The individual variation of gut microbiota contributes to the interindividual differences towards drug therapy including drug-induced toxicity and efficacy. Accordingly, the investigation and elucidation of gut microbial impacts on drug metabolism and toxicity will not only facilitate the way of personalized medicine, but also improve the rational drug design. Areas covered This review provide an overview on the microbiota-host cometabolism on drug metabolism and summarize 30 clinical drugs which are co-metabolized by host and gut microbiota. Moreover, this review is specifically focused on elucidating the gut microbial modulation on some clinical drugs, in which the gut microbial influences on drug metabolism, drug-induced toxicity and efficacy are intensively discussed. Expert opinion The gut microbial contribution to drug metabolism and toxicity is increasingly recognized, but remains largely unexplored due to the extremely complex relationship between gut microbiota and host. The mechanistic elucidation of gut microbiota in drug metabolism is critical before any practical progress in drug design or personalized medicine could be made by modulating human gut microbiota, which is predominantly relied on the technical innovations such as metagenomics and metabolomics, as well as the integration of multi-disciplinary knowledge. PMID:26569070
Kirschner, Denise E; Linderman, Jennifer J
2009-04-01
In addition to traditional and novel experimental approaches to study host-pathogen interactions, mathematical and computer modelling have recently been applied to address open questions in this area. These modelling tools not only offer an additional avenue for exploring disease dynamics at multiple biological scales, but also complement and extend knowledge gained via experimental tools. In this review, we outline four examples where modelling has complemented current experimental techniques in a way that can or has already pushed our knowledge of host-pathogen dynamics forward. Two of the modelling approaches presented go hand in hand with articles in this issue exploring fluorescence resonance energy transfer and two-photon intravital microscopy. Two others explore virtual or 'in silico' deletion and depletion as well as a new method to understand and guide studies in genetic epidemiology. In each of these examples, the complementary nature of modelling and experiment is discussed. We further note that multi-scale modelling may allow us to integrate information across length (molecular, cellular, tissue, organism, population) and time (e.g. seconds to lifetimes). In sum, when combined, these compatible approaches offer new opportunities for understanding host-pathogen interactions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zuo, Wangda; McNeil, Andrew; Wetter, Michael
2013-05-23
Building designers are increasingly relying on complex fenestration systems to reduce energy consumed for lighting and HVAC in low energy buildings. Radiance, a lighting simulation program, has been used to conduct daylighting simulations for complex fenestration systems. Depending on the configurations, the simulation can take hours or even days using a personal computer. This paper describes how to accelerate the matrix multiplication portion of a Radiance three-phase daylight simulation by conducting parallel computing on heterogeneous hardware of a personal computer. The algorithm was optimized and the computational part was implemented in parallel using OpenCL. The speed of new approach wasmore » evaluated using various daylighting simulation cases on a multicore central processing unit and a graphics processing unit. Based on the measurements and analysis of the time usage for the Radiance daylighting simulation, further speedups can be achieved by using fast I/O devices and storing the data in a binary format.« less
Development of a UNIX network compatible reactivity computer
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sanchez, R.F.; Edwards, R.M.
1996-12-31
A state-of-the-art UNIX network compatible controller and UNIX host workstation with MATLAB/SIMULINK software were used to develop, implement, and validate a digital reactivity calculation. An objective of the development was to determine why a Macintosh-based reactivity computer reactivity output drifted intolerably.
High-Performance Computing in Neuroscience for Data-Driven Discovery, Integration, and Dissemination
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bouchard, Kristofer E.; Aimone, James B.; Chun, Miyoung
A lack of coherent plans to analyze, manage, and understand data threatens the various opportunities offered by new neuro-technologies. High-performance computing will allow exploratory analysis of massive datasets stored in standardized formats, hosted in open repositories, and integrated with simulations.
High-Performance Computing in Neuroscience for Data-Driven Discovery, Integration, and Dissemination
Bouchard, Kristofer E.; Aimone, James B.; Chun, Miyoung; ...
2016-11-01
A lack of coherent plans to analyze, manage, and understand data threatens the various opportunities offered by new neuro-technologies. High-performance computing will allow exploratory analysis of massive datasets stored in standardized formats, hosted in open repositories, and integrated with simulations.
Banerjee, Soumya; Perelson, Alan S; Moses, Melanie
2017-11-01
Understanding how quickly pathogens replicate and how quickly the immune system responds is important for predicting the epidemic spread of emerging pathogens. Host body size, through its correlation with metabolic rates, is theoretically predicted to impact pathogen replication rates and immune system response rates. Here, we use mathematical models of viral time courses from multiple species of birds infected by a generalist pathogen (West Nile Virus; WNV) to test more thoroughly how disease progression and immune response depend on mass and host phylogeny. We use hierarchical Bayesian models coupled with nonlinear dynamical models of disease dynamics to incorporate the hierarchical nature of host phylogeny. Our analysis suggests an important role for both host phylogeny and species mass in determining factors important for viral spread such as the basic reproductive number, WNV production rate, peak viraemia in blood and competency of a host to infect mosquitoes. Our model is based on a principled analysis and gives a quantitative prediction for key epidemiological determinants and how they vary with species mass and phylogeny. This leads to new hypotheses about the mechanisms that cause certain taxonomic groups to have higher viraemia. For example, our models suggest that higher viral burst sizes cause corvids to have higher levels of viraemia and that the cellular rate of virus production is lower in larger species. We derive a metric of competency of a host to infect disease vectors and thereby sustain the disease between hosts. This suggests that smaller passerine species are highly competent at spreading the disease compared with larger non-passerine species. Our models lend mechanistic insight into why some species (smaller passerine species) are pathogen reservoirs and some (larger non-passerine species) are potentially dead-end hosts for WNV. Our techniques give insights into the role of body mass and host phylogeny in the spread of WNV and potentially other zoonotic diseases. The major contribution of this work is a computational framework for infectious disease modelling at the within-host level that leverages data from multiple species. This is likely to be of interest to modellers of infectious diseases that jump species barriers and infect multiple species. Our method can be used to computationally determine the competency of a host to infect mosquitoes that will sustain WNV and other zoonotic diseases. We find that smaller passerine species are more competent in spreading the disease than larger non-passerine species. This suggests the role of host phylogeny as an important determinant of within-host pathogen replication. Ultimately, we view our work as an important step in linking within-host viral dynamics models to between-host models that determine spread of infectious disease between different hosts. © 2017 The Author(s).
A design of an interface board between a MRC thermistor probe and a personal computer.
DOT National Transportation Integrated Search
2013-09-01
The main purpose of this project was to design and build a prototype of an interface board between an MRC temperature probe : (thermistor array) and a personal laptop computer. This interface board replaces and significantly improve the capabilities ...
Feedback and its effectiveness in a computer-aided personalized system of instruction course.
Martin, Toby L; Pear, Joseph J; Martin, Garry L
2002-01-01
In a computer-managed version of Keller's personalized system of instruction, students received frequent feedback from more advanced students within the course. Overall accuracy of student-provided feedback was 87%, and students complied with 61% of the feedback. PMID:12555917
76 FR 12935 - Proposed Information Collection; Comment Request; The American Community Survey
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-09
... to conduct interviews via Computer-assisted Telephone Interviews (CATI). We will also conduct Computer-assisted Personal Interviews (CAPI) for a sub sample of nonrespondents. A content reinterview will... representatives (FRs) will conduct personal interviews with respondents to complete questionnaires or, if...
Chernenkov, Iu V; Gumeniuk, O I
2009-01-01
The paper presents the results of studying the impact of using cellular phones and personal computers on the health status of 277 Saratov schoolchildren (mean age 13.2 +/- 2.3 years). About 80% of the adolescents have been ascertained to use cellular phones and computers mainly for game purposes. The active users of cellular phones and computers show a high aggressiveness, anxiety, hostility, and social stress, low stress resistance, and susceptibility to arterial hypotension. The negative influence of cellular phones and computers on the schoolchildren's health increases with the increased duration and frequency of their use.
Jannesari, Milad; Wang, Zhongming; McCall, Jacob; Zheng, Boyang
2017-01-01
This research examined the role of psychological availability as a means of psychological engagement between self-initiated expatriates (SIEs) and their host-country nationals (HCNs) colleagues during their work and interaction adjustment. To reveal this process, this study presented the concept of psychological availability, which refers to an individual's belief that they are physically, cognitively, and emotionally ready or confident to engage the self with their colleagues, as a mediator between proactive personality and adjustment. Also, it investigated the relationship between proactive personality and psychological availability and how it was moderated by supportive supervisor relations. We hypothesized, this relationship would be weakened/strengthened when SIEs and HCNs received low/high level of support from their supervisor. This study was conducted as a quantitative study, data was used from 342 SIEs and 342 HCNs working in mainland China. Our finding supported the hypothesis that psychological availability mediated the relationship between proactive personality and their adjustment to an international work environment; in addition, the relationship between proactive personality and psychological availability would be stronger when the level of superiors relations support is high between SIEs and HCNs. This study demonstrated the value of proactive personality as an antecedent effect and supportive supervisor relations as a moderating effect, and investigated how these factors can lead to a sense of psychological availability and boost psychological engagement between SIEs and HCNs in order to improve the adjustment between them.
Jannesari, Milad; Wang, Zhongming; McCall, Jacob; Zheng, Boyang
2017-01-01
This research examined the role of psychological availability as a means of psychological engagement between self-initiated expatriates (SIEs) and their host-country nationals (HCNs) colleagues during their work and interaction adjustment. To reveal this process, this study presented the concept of psychological availability, which refers to an individual’s belief that they are physically, cognitively, and emotionally ready or confident to engage the self with their colleagues, as a mediator between proactive personality and adjustment. Also, it investigated the relationship between proactive personality and psychological availability and how it was moderated by supportive supervisor relations. We hypothesized, this relationship would be weakened/strengthened when SIEs and HCNs received low/high level of support from their supervisor. This study was conducted as a quantitative study, data was used from 342 SIEs and 342 HCNs working in mainland China. Our finding supported the hypothesis that psychological availability mediated the relationship between proactive personality and their adjustment to an international work environment; in addition, the relationship between proactive personality and psychological availability would be stronger when the level of superiors relations support is high between SIEs and HCNs. This study demonstrated the value of proactive personality as an antecedent effect and supportive supervisor relations as a moderating effect, and investigated how these factors can lead to a sense of psychological availability and boost psychological engagement between SIEs and HCNs in order to improve the adjustment between them. PMID:29225587
Evolution of the Virtualized HPC Infrastructure of Novosibirsk Scientific Center
NASA Astrophysics Data System (ADS)
Adakin, A.; Anisenkov, A.; Belov, S.; Chubarov, D.; Kalyuzhny, V.; Kaplin, V.; Korol, A.; Kuchin, N.; Lomakin, S.; Nikultsev, V.; Skovpen, K.; Sukharev, A.; Zaytsev, A.
2012-12-01
Novosibirsk Scientific Center (NSC), also known worldwide as Akademgorodok, is one of the largest Russian scientific centers hosting Novosibirsk State University (NSU) and more than 35 research organizations of the Siberian Branch of Russian Academy of Sciences including Budker Institute of Nuclear Physics (BINP), Institute of Computational Technologies, and Institute of Computational Mathematics and Mathematical Geophysics (ICM&MG). Since each institute has specific requirements on the architecture of computing farms involved in its research field, currently we've got several computing facilities hosted by NSC institutes, each optimized for a particular set of tasks, of which the largest are the NSU Supercomputer Center, Siberian Supercomputer Center (ICM&MG), and a Grid Computing Facility of BINP. A dedicated optical network with the initial bandwidth of 10 Gb/s connecting these three facilities was built in order to make it possible to share the computing resources among the research communities, thus increasing the efficiency of operating the existing computing facilities and offering a common platform for building the computing infrastructure for future scientific projects. Unification of the computing infrastructure is achieved by extensive use of virtualization technology based on XEN and KVM platforms. This contribution gives a thorough review of the present status and future development prospects for the NSC virtualized computing infrastructure and the experience gained while using it for running production data analysis jobs related to HEP experiments being carried out at BINP, especially the KEDR detector experiment at the VEPP-4M electron-positron collider.
Recycling of WEEE: Characterization of spent printed circuit boards from mobile phones and computers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yamane, Luciana Harue, E-mail: lucianayamane@uol.com.br; Tavares de Moraes, Viviane, E-mail: tavares.vivi@gmail.com; Crocce Romano Espinosa, Denise, E-mail: espinosa@usp.br
Highlights: > This paper presents new and important data on characterization of wastes of electric and electronic equipments. > Copper concentration is increasing in mobile phones and remaining constant in personal computers. > Printed circuit boards from mobile phones and computers would not be mixed prior treatment. - Abstract: This paper presents a comparison between printed circuit boards from computers and mobile phones. Since printed circuits boards are becoming more complex and smaller, the amount of materials is constantly changing. The main objective of this work was to characterize spent printed circuit boards from computers and mobile phones applying mineralmore » processing technique to separate the metal, ceramic, and polymer fractions. The processing was performed by comminution in a hammer mill, followed by particle size analysis, and by magnetic and electrostatic separation. Aqua regia leaching, loss-on-ignition and chemical analysis (inductively coupled plasma atomic emission spectroscopy - ICP-OES) were carried out to determine the composition of printed circuit boards and the metal rich fraction. The composition of the studied mobile phones printed circuit boards (PCB-MP) was 63 wt.% metals; 24 wt.% ceramics and 13 wt.% polymers; and of the printed circuit boards from studied personal computers (PCB-PC) was 45 wt.% metals; 27 wt.% polymers and ceramics 28 wt.% ceramics. The chemical analysis showed that copper concentration in printed circuit boards from personal computers was 20 wt.% and in printed circuit boards from mobile phones was 34.5 wt.%. According to the characteristics of each type of printed circuit board, the recovery of precious metals may be the main goal of the recycling process of printed circuit boards from personal computers and the recovery of copper should be the main goal of the recycling process of printed circuit boards from mobile phones. Hence, these printed circuit boards would not be mixed prior treatment. The results of this paper show that copper concentration is increasing in mobile phones and remaining constant in personal computers.« less
Human-Computer Interaction and Information Management Research Needs
2003-10-01
Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be...hand-held personal digital assistants, networked sensors and actuators, and low-power computers on satellites. 5 most complex tools that humans have...calculations using data on external media such as tapes evolved into our multi-functional 21st century systems. More ideas came as networks of computing
Rickmann, M; Siklós, L; Joó, F; Wolff, J R
1990-09-01
An interface for IBM XT/AT-compatible computers is described which has been designed to read the actual specimen stage position of electron microscopes. The complete system consists of (i) optical incremental encoders attached to the x- and y-stage drivers of the microscope, (ii) two keypads for operator input, (iii) an interface card fitted to the bus of the personal computer, (iv) a standard configuration IBM XT (or compatible) personal computer optionally equipped with a (v) HP Graphic Language controllable colour plotter. The small size of the encoders and their connection to the stage drivers by simple ribbed belts allows an easy adaptation of the system to most electron microscopes. Operation of the interface card itself is supported by any high-level language available for personal computers. By the modular concept of these languages, the system can be customized to various applications, and no computer expertise is needed for actual operation. The present configuration offers an inexpensive attachment, which covers a wide range of applications from a simple notebook to high-resolution (200-nm) mapping of tissue. Since section coordinates can be processed in real-time, stereological estimations can be derived directly "on microscope". This is exemplified by an application in which particle numbers were determined by the disector method.
The Workstation Approach to Laboratory Computing
Crosby, P.A.; Malachowski, G.C.; Hall, B.R.; Stevens, V.; Gunn, B.J.; Hudson, S.; Schlosser, D.
1985-01-01
There is a need for a Laboratory Workstation which specifically addresses the problems associated with computing in the scientific laboratory. A workstation based on the IBM PC architecture and including a front end data acquisition system which communicates with a host computer via a high speed communications link; a new graphics display controller with hardware window management and window scrolling; and an integrated software package is described.
Bootstrapping and Maintaining Trust in the Cloud
2016-12-01
simultaneous cloud nodes. 1. INTRODUCTION The proliferation and popularity of infrastructure-as-a- service (IaaS) cloud computing services such as...Amazon Web Services and Google Compute Engine means more cloud tenants are hosting sensitive, private, and business critical data and applications in the...thousands of IaaS resources as they are elastically instantiated and terminated. Prior cloud trusted computing solutions address a subset of these features
A direct-to-drive neural data acquisition system.
Kinney, Justin P; Bernstein, Jacob G; Meyer, Andrew J; Barber, Jessica B; Bolivar, Marti; Newbold, Bryan; Scholvin, Jorg; Moore-Kochlacs, Caroline; Wentz, Christian T; Kopell, Nancy J; Boyden, Edward S
2015-01-01
Driven by the increasing channel count of neural probes, there is much effort being directed to creating increasingly scalable electrophysiology data acquisition (DAQ) systems. However, all such systems still rely on personal computers for data storage, and thus are limited by the bandwidth and cost of the computers, especially as the scale of recording increases. Here we present a novel architecture in which a digital processor receives data from an analog-to-digital converter, and writes that data directly to hard drives, without the need for a personal computer to serve as an intermediary in the DAQ process. This minimalist architecture may support exceptionally high data throughput, without incurring costs to support unnecessary hardware and overhead associated with personal computers, thus facilitating scaling of electrophysiological recording in the future.
A direct-to-drive neural data acquisition system
Kinney, Justin P.; Bernstein, Jacob G.; Meyer, Andrew J.; Barber, Jessica B.; Bolivar, Marti; Newbold, Bryan; Scholvin, Jorg; Moore-Kochlacs, Caroline; Wentz, Christian T.; Kopell, Nancy J.; Boyden, Edward S.
2015-01-01
Driven by the increasing channel count of neural probes, there is much effort being directed to creating increasingly scalable electrophysiology data acquisition (DAQ) systems. However, all such systems still rely on personal computers for data storage, and thus are limited by the bandwidth and cost of the computers, especially as the scale of recording increases. Here we present a novel architecture in which a digital processor receives data from an analog-to-digital converter, and writes that data directly to hard drives, without the need for a personal computer to serve as an intermediary in the DAQ process. This minimalist architecture may support exceptionally high data throughput, without incurring costs to support unnecessary hardware and overhead associated with personal computers, thus facilitating scaling of electrophysiological recording in the future. PMID:26388740
The Mark III Hypercube-Ensemble Computers
NASA Technical Reports Server (NTRS)
Peterson, John C.; Tuazon, Jesus O.; Lieberman, Don; Pniel, Moshe
1988-01-01
Mark III Hypercube concept applied in development of series of increasingly powerful computers. Processor of each node of Mark III Hypercube ensemble is specialized computer containing three subprocessors and shared main memory. Solves problem quickly by simultaneously processing part of problem at each such node and passing combined results to host computer. Disciplines benefitting from speed and memory capacity include astrophysics, geophysics, chemistry, weather, high-energy physics, applied mechanics, image processing, oil exploration, aircraft design, and microcircuit design.
2004-09-01
protection. Firewalls, Intrusion Detection Systems (IDS’s), Anti-Virus (AV) software , and routers are such tools used. In recent years, computer security...associated with operating systems, application software , and computing hardware. When IDS’s are utilized on a host computer or network, there are two...primary approaches to detecting and / or preventing attacks. Traditional IDS’s, like most AV software , rely on known “signatures” to detect attacks
2010-11-30
www.nprst.navy.mil NPRST-TN-11-1 November 2010 Practical Recommendations for -level Estimation in NCAPS Frederick L. Oswald, Ph.D. Rice University...Navy Computer Adaptive Personality Scales ( NCAPS ) Frederick L. Oswald, Ph.D. Rice University Reviewed, Approved, and Released by David M...Personality Scales ( NCAPS ) Frederick P. Oswald, Ph.D. Rice University 6100 Main St., MS25 Houston, TX 77005 Navy Personnel Research, Studies, and
NASA Astrophysics Data System (ADS)
Meurant, Robert C.
Second Language (L2) Digital Literacy is of emerging importance within English as a Foreign Language (EFL) in Korea, and will evolve to become regarded as the most critical component of overall L2 English Literacy. Computer-based Internet-hosted Learning Management Systems (LMS), such as the popular open-source Moodle, are rapidly being adopted worldwide for distance education, and are also being applied to blended (hybrid) education. In EFL Education, they have a special potential: by setting the LMS to force English to be used exclusively throughout a course website, the meta-language can be made the target L2 language. Of necessity, students develop the ability to use English to navigate the Internet, access and contribute to online resources, and engage in computer-mediated communication. Through such pragmatic engagement with English, students significantly develop their L2 Digital Literacy.
NASA Astrophysics Data System (ADS)
Knosp, B.; Neely, S.; Zimdars, P.; Mills, B.; Vance, N.
2007-12-01
The Microwave Limb Sounder (MLS) Science Computing Facility (SCF) stores over 50 terabytes of data, has over 240 computer processing hosts, and 64 users from around the world. These resources are spread over three primary geographical locations - the Jet Propulsion Laboratory (JPL), Raytheon RIS, and New Mexico Institute of Mining and Technology (NMT). A need for a grid network system was identified and defined to solve the problem of users competing for finite, and increasingly scarce, MLS SCF computing resources. Using Sun's Grid Engine software, a grid network was successfully created in a development environment that connected the JPL and Raytheon sites, established master and slave hosts, and demonstrated that transfer queues for jobs can work among multiple clusters in the same grid network. This poster will first describe MLS SCF resources and the lessons that were learned in the design and development phase of this project. It will then go on to discuss the test environment and plans for deployment by highlighting benchmarks and user experiences.
Computer simulation for integrated pest management of spruce budworms
Carroll B. Williams; Patrick J. Shea
1982-01-01
Some field studies of the effects of various insecticides on the spruce budworm (Choristoneura sp.) and their parasites have shown severe suppression of host (budworm) populations and increased parasitism after treatment. Computer simulation using hypothetical models of spruce budworm-parasite systems based on these field data revealed that (1)...
Distriblets: Java-Based Distributed Computing on the Web.
ERIC Educational Resources Information Center
Finkel, David; Wills, Craig E.; Brennan, Brian; Brennan, Chris
1999-01-01
Describes a system for using the World Wide Web to distribute computational tasks to multiple hosts on the Web that is written in Java programming language. Describes the programs written to carry out the load distribution, the structure of a "distriblet" class, and experiences in using this system. (Author/LRW)
EPA and GSA Webinar: E Scrap Management, Computers for Learning and the Federal Green Challenge
EPA and the General Services Administration (GSA) are hosting a webinar on May 2, 2018. Topics will include policies and procedures on E Scrap management, a review of the Computers For Leaning Program, and benefits of joining the Federal Green Challenge.
NASA Technical Reports Server (NTRS)
White, P. R.; Little, R. R.
1985-01-01
A research effort was undertaken to develop personal computer based software for vibrational analysis. The software was developed to analytically determine the natural frequencies and mode shapes for the uncoupled lateral vibrations of the blade and counterweight assemblies used in a single bladed wind turbine. The uncoupled vibration analysis was performed in both the flapwise and chordwise directions for static rotor conditions. The effects of rotation on the uncoupled flapwise vibration of the blade and counterweight assemblies were evaluated for various rotor speeds up to 90 rpm. The theory, used in the vibration analysis codes, is based on a lumped mass formulation for the blade and counterweight assemblies. The codes are general so that other designs can be readily analyzed. The input for the codes is generally interactive to facilitate usage. The output of the codes is both tabular and graphical. Listings of the codes are provided. Predicted natural frequencies of the first several modes show reasonable agreement with experimental results. The analysis codes were originally developed on a DEC PDP 11/34 minicomputer and then downloaded and modified to run on an ITT XTRA personal computer. Studies conducted to evaluate the efficiency of running the programs on a personal computer as compared with the minicomputer indicated that, with the proper combination of hardware and software options, the efficiency of using a personal computer exceeds that of a minicomputer.
A personal computer-based nuclear magnetic resonance spectrometer
NASA Astrophysics Data System (ADS)
Job, Constantin; Pearson, Robert M.; Brown, Michael F.
1994-11-01
Nuclear magnetic resonance (NMR) spectroscopy using personal computer-based hardware has the potential of enabling the application of NMR methods to fields where conventional state of the art equipment is either impractical or too costly. With such a strategy for data acquisition and processing, disciplines including civil engineering, agriculture, geology, archaeology, and others have the possibility of utilizing magnetic resonance techniques within the laboratory or conducting applications directly in the field. Another aspect is the possibility of utilizing existing NMR magnets which may be in good condition but unused because of outdated or nonrepairable electronics. Moreover, NMR applications based on personal computer technology may open up teaching possibilities at the college or even secondary school level. The goal of developing such a personal computer (PC)-based NMR standard is facilitated by existing technologies including logic cell arrays, direct digital frequency synthesis, use of PC-based electrical engineering software tools to fabricate electronic circuits, and the use of permanent magnets based on neodymium-iron-boron alloy. Utilizing such an approach, we have been able to place essentially an entire NMR spectrometer console on two printed circuit boards, with the exception of the receiver and radio frequency power amplifier. Future upgrades to include the deuterium lock and the decoupler unit are readily envisioned. The continued development of such PC-based NMR spectrometers is expected to benefit from the fast growing, practical, and low cost personal computer market.
Ahamed, Nizam U; Sundaraj, Kenneth; Poo, Tarn S
2013-03-01
This article describes the design of a robust, inexpensive, easy-to-use, small, and portable online electromyography acquisition system for monitoring electromyography signals during rehabilitation. This single-channel (one-muscle) system was connected via the universal serial bus port to a programmable Windows operating system handheld tablet personal computer for storage and analysis of the data by the end user. The raw electromyography signals were amplified in order to convert them to an observable scale. The inherent noise of 50 Hz (Malaysia) from power lines electromagnetic interference was then eliminated using a single-hybrid IC notch filter. These signals were sampled by a signal processing module and converted into 24-bit digital data. An algorithm was developed and programmed to transmit the digital data to the computer, where it was reassembled and displayed in the computer using software. Finally, the following device was furnished with the graphical user interface to display the online muscle strength streaming signal in a handheld tablet personal computer. This battery-operated system was tested on the biceps brachii muscles of 20 healthy subjects, and the results were compared to those obtained with a commercial single-channel (one-muscle) electromyography acquisition system. The results obtained using the developed device when compared to those obtained from a commercially available physiological signal monitoring system for activities involving muscle contractions were found to be comparable (the comparison of various statistical parameters) between male and female subjects. In addition, the key advantage of this developed system over the conventional desktop personal computer-based acquisition systems is its portability due to the use of a tablet personal computer in which the results are accessible graphically as well as stored in text (comma-separated value) form.
Implementing Computer Technology in the Rehabilitation Process.
ERIC Educational Resources Information Center
McCollum, Paul S., Ed.; Chan, Fong, Ed.
1985-01-01
This special issue contains seven articles, addressing rehabilitation in the information age, computer-assisted rehabilitation services, computer technology in rehabilitation counseling, computer-assisted career exploration and vocational decision making, computer-assisted assessment, computer enhanced employment opportunities for persons with…
Cryptographic Protocol for Comparing Sets without Leaking Them: Applications in Astronomy
NASA Astrophysics Data System (ADS)
McCullough, Peter R.
2011-09-01
We describe a cryptographic protocol for two or more persons to compare individual lists of astronomical objects of interest without leaking them. Cryptographers have long known such protocols; astronomers and other scientists may benefit from them also. We describe some latent opportunities that would be enabled by this protocol. Consider the following scenario: Alice has a set of stars that are candidate hosts of transiting planets. Bob has a similar set. Alice and Bob have a mutual desire to know the intersection of their two lists without revealing them to each other. Alice and Bob can recruit a trusted third party, Josephine, to make the comparison, report the results, and then destroy each list. Limitations of that approach are that 1) Josephine must devote time to make each comparison, 2) Alice and Bob may not know a Josephine that they both can trust, especially if Alice and Bob are from different communities, 3) Josephine may not indeed be trustworthy, 4) a fourth person may wittingly or unwittingly intercept one or both of the lists in Josephine's care, and 5) anticipating those limitations, Alice and Bob may elect not to recruit a Josephine and hence not compare their lists. We describe a variant that overcomes those limitations by A) encrypting the lists prior to transmitting them to Josephine, and B) replacing a human Josephine with a computer website.
Ju, Tingting; Shoblak, Yasmeen; Gao, Yanhua; Yang, Kaiyuan; Fouhse, Janelle; Finlay, B. Brett; So, Yee Wing; Stothard, Paul
2017-01-01
ABSTRACT Antibiotics are important for treating bacterial infection; however, efficacies and side effects of antibiotics vary in medicine and experimental models. A few studies have correlated microbiota composition variations with health outcomes in response to antibiotics; however, no study has demonstrated causality. We had noted variation in colonic expression of C-type lectins, regenerating islet-derived protein 3β (Reg3β) and Reg3γ, after metronidazole treatment in a mouse model. To investigate the effects of specific variations in the preexisting microbiome on host response to antibiotics, mice harboring a normal microbiota were allocated to 4 treatments in a 2-by-2 factorial arrangement with or without commensal Escherichia coli and with or without metronidazole in drinking water. E. coli colonized readily without causing a notable shift in the microbiota or host response. Metronidazole administration reduced microbiota biodiversity, indicated by decreased Chao1 and Shannon index values, and altered microbiota composition. However, the presence of E. coli strongly affected metronidazole-induced microbiota shifts. Remarkably, this single commensal bacterium in the context of a complex population led to variations in host responses to metronidazole treatment, including increased expression of antimicrobial peptides Reg3β and Reg3γ and intestinal inflammation indicated by tumor necrosis factor alpha levels. Similar results were obtained from 2-week antibiotic exposure and with additional E. coli isolates. The results of this proof-of-concept study indicate that even minor variations in initial commensal microbiota can drive shifts in microbial composition and host response after antibiotic administration. As well as providing an explanation for variability in animal models using antibiotics, the findings encourage the development of personalized medication in antibiotic therapies. IMPORTANCE This work provides an understanding of variability in studies where antibiotics are used to alter the gut microbiota to generate a host response. Furthermore, although providing evidence only for the one antibiotic, the study demonstrated that initial gut microbial composition is a key factor driving host response to antibiotic administration, creating a compelling argument for considering personalized medication based on individual variations in gut microbiota. PMID:28667114
Ju, Tingting; Shoblak, Yasmeen; Gao, Yanhua; Yang, Kaiyuan; Fouhse, Janelle; Finlay, B Brett; So, Yee Wing; Stothard, Paul; Willing, Benjamin P
2017-09-01
Antibiotics are important for treating bacterial infection; however, efficacies and side effects of antibiotics vary in medicine and experimental models. A few studies have correlated microbiota composition variations with health outcomes in response to antibiotics; however, no study has demonstrated causality. We had noted variation in colonic expression of C-type lectins, regenerating islet-derived protein 3β (Reg3β) and Reg3γ, after metronidazole treatment in a mouse model. To investigate the effects of specific variations in the preexisting microbiome on host response to antibiotics, mice harboring a normal microbiota were allocated to 4 treatments in a 2-by-2 factorial arrangement with or without commensal Escherichia coli and with or without metronidazole in drinking water. E. coli colonized readily without causing a notable shift in the microbiota or host response. Metronidazole administration reduced microbiota biodiversity, indicated by decreased Chao1 and Shannon index values, and altered microbiota composition. However, the presence of E. coli strongly affected metronidazole-induced microbiota shifts. Remarkably, this single commensal bacterium in the context of a complex population led to variations in host responses to metronidazole treatment, including increased expression of antimicrobial peptides Reg3β and Reg3γ and intestinal inflammation indicated by tumor necrosis factor alpha levels. Similar results were obtained from 2-week antibiotic exposure and with additional E. coli isolates. The results of this proof-of-concept study indicate that even minor variations in initial commensal microbiota can drive shifts in microbial composition and host response after antibiotic administration. As well as providing an explanation for variability in animal models using antibiotics, the findings encourage the development of personalized medication in antibiotic therapies. IMPORTANCE This work provides an understanding of variability in studies where antibiotics are used to alter the gut microbiota to generate a host response. Furthermore, although providing evidence only for the one antibiotic, the study demonstrated that initial gut microbial composition is a key factor driving host response to antibiotic administration, creating a compelling argument for considering personalized medication based on individual variations in gut microbiota. Copyright © 2017 American Society for Microbiology.
Secure Dynamic access control scheme of PHR in cloud computing.
Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching
2012-12-01
With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access scheme in Cloud computing environments is proven flexible and secure and could effectively correspond to real-time appending and deleting user access authorization and appending and revising PHR records.
Vector-Borne Pathogen and Host Evolution in a Structured Immuno-Epidemiological System.
Gulbudak, Hayriye; Cannataro, Vincent L; Tuncer, Necibe; Martcheva, Maia
2017-02-01
Vector-borne disease transmission is a common dissemination mode used by many pathogens to spread in a host population. Similar to directly transmitted diseases, the within-host interaction of a vector-borne pathogen and a host's immune system influences the pathogen's transmission potential between hosts via vectors. Yet there are few theoretical studies on virulence-transmission trade-offs and evolution in vector-borne pathogen-host systems. Here, we consider an immuno-epidemiological model that links the within-host dynamics to between-host circulation of a vector-borne disease. On the immunological scale, the model mimics antibody-pathogen dynamics for arbovirus diseases, such as Rift Valley fever and West Nile virus. The within-host dynamics govern transmission and host mortality and recovery in an age-since-infection structured host-vector-borne pathogen epidemic model. By considering multiple pathogen strains and multiple competing host populations differing in their within-host replication rate and immune response parameters, respectively, we derive evolutionary optimization principles for both pathogen and host. Invasion analysis shows that the [Formula: see text] maximization principle holds for the vector-borne pathogen. For the host, we prove that evolution favors minimizing case fatality ratio (CFR). These results are utilized to compute host and pathogen evolutionary trajectories and to determine how model parameters affect evolution outcomes. We find that increasing the vector inoculum size increases the pathogen [Formula: see text], but can either increase or decrease the pathogen virulence (the host CFR), suggesting that vector inoculum size can contribute to virulence of vector-borne diseases in distinct ways.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCann, Billy W.; Silva, Nuwan De; Windus, Theresa L.
Computer-aided molecular design and high-throughput screening of viable host architectures can significantly reduce the efforts in the design of novel ligands for efficient extraction of rare earth elements. This paper presents a computational approach to the deliberate design of bis-phosphine oxide host architectures that are structurally organized for complexation of trivalent lanthanides. Molecule building software, HostDesigner, was interfaced with molecular mechanics software, PCModel, providing a tool for generating and screening millions of potential R 2(O)P-link-P(O)R 2 ligand geometries. The molecular mechanics ranking of ligand structures is consistent with both the solution-phase free energies of complexation obtained with density functional theorymore » and the performance of known bis-phosphine oxide extractants. For the case where link is -CH 2-, evaluation of the ligand geometry provides the first characterization of a steric origin for the ‘anomalous aryl strengthening’ effect. The design approach has identified a number of novel bis-phosphine oxide ligands that are better organized for lanthanide complexation than previously studied examples.« less
Gish, Stacey R.; Maier, Ezekiel J.; Haynes, Brian C.; Santiago-Tirado, Felipe H.; Srikanta, Deepa L.; Ma, Cynthia Z.; Li, Lucy X.; Williams, Matthew; Crouch, Erika C.; Khader, Shabaana A.
2016-01-01
ABSTRACT Cryptococcus neoformans is a ubiquitous, opportunistic fungal pathogen that kills over 600,000 people annually. Here, we report integrated computational and experimental investigations of the role and mechanisms of transcriptional regulation in cryptococcal infection. Major cryptococcal virulence traits include melanin production and the development of a large polysaccharide capsule upon host entry; shed capsule polysaccharides also impair host defenses. We found that both transcription and translation are required for capsule growth and that Usv101 is a master regulator of pathogenesis, regulating melanin production, capsule growth, and capsule shedding. It does this by directly regulating genes encoding glycoactive enzymes and genes encoding three other transcription factors that are essential for capsule growth: GAT201, RIM101, and SP1. Murine infection with cryptococci lacking Usv101 significantly alters the kinetics and pathogenesis of disease, with extended survival and, unexpectedly, death by pneumonia rather than meningitis. Our approaches and findings will inform studies of other pathogenic microbes. PMID:27094327
Can people with Alzheimer's disease improve their day-to-day functioning with a tablet computer?
Imbeault, Hélène; Langlois, Francis; Bocti, Christian; Gagnon, Lise; Bier, Nathalie
2018-07-01
New technologies, such as tablet computers, present great potential to support the day-to-day living of persons with Alzheimer's disease (AD). However, whether people with AD can learn how to use a tablet properly in daily life remains to be demonstrated. A single case study was conducted with a 65-year-old woman with AD. A specific and structured intervention tailored to her needs was conceptualised for the use of a calendar application on a tablet computer according to the following learning stages: Acquisition, Application and Adaptation. In spite of her severe episodic memory deficit, she showed progressive learning of the tablet application during the intervention phase. Furthermore, data compiled over 12 months post-use show that she used the tablet successfully in her day-to-day life. She was even able to transfer her newly acquired ability to other available applications designed to monitor regular purchases, consult various recipes and play games. Tablet computers thereby offer a promising avenue for cognitive rehabilitation for persons with AD. This success was mainly achieved through a one-on-one individual programme tailored to this person. The limits and constraints of utilising tablet computers for persons with AD are discussed.
Personal Computers: Products for Every Need.
ERIC Educational Resources Information Center
Personal Computing, 1981
1981-01-01
Begins a two-part look at some of the personal computers now on the market. Discusses microcomputers being offered by Apple, Atari, Commodore (PET), Heath, Hewlett-Packard, Ohio Scientific, Osborne, Radio Shack (TRS-80), and Texas Instruments. Journal availability: Hayden Publishing Company, 50 Essex Street, Rochelle Park, NJ 07662. (Author/SJL)
Transfer of numeric ASCII data files between Apple and IBM personal computers.
Allan, R W; Bermejo, R; Houben, D
1986-01-01
Listings for programs designed to transfer numeric ASCII data files between Apple and IBM personal computers are provided with accompanying descriptions of how the software operates. Details of the hardware used are also given. The programs may be easily adapted for transferring data between other microcomputers.
The report gives results of a screening evaluation of volatile organic emissions from printed circuit board laminates and potential pollution prevention alternatives. In the evaluation, printed circuit board laminates, without circuitry, commonly found in personal computer (PC) m...
UNIX Micros for Students Majoring in Computer Science and Personal Information Retrieval.
ERIC Educational Resources Information Center
Fox, Edward A.; Birch, Sandra
1986-01-01
Traces the history of Virginia Tech's requirement that incoming freshmen majoring in computer science each acquire a microcomputer running the UNIX operating system; explores rationale for the decision; explains system's key features; and describes program implementation and research and development efforts to provide personal information…
Personal Computers Help Gifted Students Work Smart. ERIC Digest #E483.
ERIC Educational Resources Information Center
Jones, Geoffrey
This digest considers the role of personal computers in the education of gifted students. There is evidence that students are working "smarter," whether they are learning and using more information, understanding key concepts and relationships better, or developing higher level thinking skills. Research findings concerning the specific…
DOT National Transportation Integrated Search
2007-08-01
This research was conducted to develop and test a personal computer-based study procedure (PCSP) with secondary task loading for use in human factors laboratory experiments in lieu of a driving simulator to test reading time and understanding of traf...
31 CFR 560.539 - Official activities of certain international organizations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... items such as many laptop computers, personal computers, cell phones, personal digital assistants and... limited to: (1) The provision of services involving Iran necessary for carrying out the official business; (2) Purchasing Iranian-origin goods and services for use in carrying out the official business; (3...
31 CFR 560.539 - Official activities of certain international organizations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... items such as many laptop computers, personal computers, cell phones, personal digital assistants and... limited to: (1) The provision of services involving Iran necessary for carrying out the official business; (2) Purchasing Iranian-origin goods and services for use in carrying out the official business; (3...
Security of Personal Computer Systems: A Management Guide.
ERIC Educational Resources Information Center
Steinauer, Dennis D.
This report describes management and technical security considerations associated with the use of personal computer systems as well as other microprocessor-based systems designed for use in a general office environment. Its primary objective is to identify and discuss several areas of potential vulnerability and associated protective measures. The…
PERKAM: Personalized Knowledge Awareness Map for Computer Supported Ubiquitous Learning
ERIC Educational Resources Information Center
El-Bishouty, Moushir M.; Ogata, Hiroaki; Yano, Yoneo
2007-01-01
This paper introduces a ubiquitous computing environment in order to support the learners while doing tasks; this environment is called PERKAM (PERsonalized Knowledge Awareness Map). PERKAM allows the learners to share knowledge, interact, collaborate, and exchange individual experiences. It utilizes the RFID ubiquities technology to detect the…
Computers in medicine: patients' attitudes
Cruickshank, P. J.
1984-01-01
Data are presented from two surveys where a 26-item questionnaire was used to measure patients' attitudes to diagnostic computers and to medical computers in general. The first group of respondents were 229 patients who had been given outpatient appointments at a hospital general medical clinic specializing in gastrointestinal problems, where some had experienced a diagnostic computer in use. The second group of respondents were 416 patients attending a group general practice where there was no computer. Patients who had experience of the diagnostic computer or a personal computer had more favourable attitudes to computers in medicine as did younger people and males. The two samples of patients showed broadly similar attitudes, and a notable finding was that over half of each group believed that, with a computer around, the personal touch of the doctor would be lost. PMID:6471021
Dynamic Space for Rent: Using Commercial Web Hosting to Develop a Web 2.0 Intranet
ERIC Educational Resources Information Center
Hodgins, Dave
2010-01-01
The explosion of Web 2.0 into libraries has left many smaller academic libraries (and other libraries with limited computing resources or support) to work in the cloud using free Web applications. The use of commercial Web hosting is an innovative approach to the problem of inadequate local resources. While the idea of insourcing IT will seem…
Defense Data Network/TOPS-20 Tutorial. An Interative Computer Program.
1985-12-01
33 XI. ELECTRONIC MAIL HOST ( EMH )-------------------------- 34 XII. EMACS...contents of text buffer to a file X EXCHANGE , used to search for and replace text Z ZAP, puts your entire file into the print buffer 23 - -° SWITCH...prompt USC-ISIE.ARPA> Sample foreign host command level prompt FTP COMMAND LEVEL COMMANDS COMMAND USE(S) FTP Invokes the FTP protocol CONNECT Connects
Institutional computing (IC) information session
DOE Office of Scientific and Technical Information (OSTI.GOV)
Koch, Kenneth R; Lally, Bryan R
2011-01-19
The LANL Institutional Computing Program (IC) will host an information session about the current state of unclassified Institutional Computing at Los Alamos, exciting plans for the future, and the current call for proposals for science and engineering projects requiring computing. Program representatives will give short presentations and field questions about the call for proposals and future planned machines, and discuss technical support available to existing and future projects. Los Alamos has started making a serious institutional investment in open computing available to our science projects, and that investment is expected to increase even more.
2013-01-01
Background Fungi are the second most abundant type of human pathogens. Invasive fungal pathogens are leading causes of life-threatening infections in clinical settings. Toxicity to the host and drug-resistance are two major deleterious issues associated with existing antifungal agents. Increasing a host’s tolerance and/or immunity to fungal pathogens has potential to alleviate these problems. A host’s tolerance may be improved by modulating the immune system such that it responds more rapidly and robustly in all facets, ranging from the recognition of pathogens to their clearance from the host. An understanding of biological processes and genes that are perturbed during attempted fungal exposure, colonization, and/or invasion will help guide the identification of endogenous immunomodulators and/or small molecules that activate host-immune responses such as specialized adjuvants. Results In this study, we present computational techniques and approaches using publicly available transcriptional data sets, to predict immunomodulators that may act against multiple fungal pathogens. Our study analyzed data sets derived from host cells exposed to five fungal pathogens, namely, Alternaria alternata, Aspergillus fumigatus, Candida albicans, Pneumocystis jirovecii, and Stachybotrys chartarum. We observed statistically significant associations between host responses to A. fumigatus and C. albicans. Our analysis identified biological processes that were consistently perturbed by these two pathogens. These processes contained both immune response-inducing genes such as MALT1, SERPINE1, ICAM1, and IL8, and immune response-repressing genes such as DUSP8, DUSP6, and SPRED2. We hypothesize that these genes belong to a pool of common immunomodulators that can potentially be activated or suppressed (agonized or antagonized) in order to render the host more tolerant to infections caused by A. fumigatus and C. albicans. Conclusions Our computational approaches and methodologies described here can now be applied to newly generated or expanded data sets for further elucidation of additional drug targets. Moreover, identified immunomodulators may be used to generate experimentally testable hypotheses that could help in the discovery of broad-spectrum immunotherapeutic interventions. All of our results are available at the following supplementary website: http://bioinformatics.cs.vt.edu/~murali/supplements/2013-kidane-bmc PMID:24099000
ERIC Educational Resources Information Center
Rice, Michael
This report summarizes the presentations and discussions at a conference on the development of new products and services in electronic publishing and computer software for personal use. It is noted that the 26 participants came from a variety of perspectives, including the publishing and computer software industries; the fields of home…
Remote observing with NASA's Deep Space Network
NASA Astrophysics Data System (ADS)
Kuiper, T. B. H.; Majid, W. A.; Martinez, S.; Garcia-Miro, C.; Rizzo, J. R.
2012-09-01
The Deep Space Network (DSN) communicates with spacecraft as far away as the boundary between the Solar System and the interstellar medium. To make this possible, large sensitive antennas at Canberra, Australia, Goldstone, California, and Madrid, Spain, provide for constant communication with interplanetary missions. We describe the procedures for radioastronomical observations using this network. Remote access to science monitor and control computers by authorized observers is provided by two-factor authentication through a gateway at the Jet Propulsion Laboratory (JPL) in Pasadena. To make such observations practical, we have devised schemes based on SSH tunnels and distributed computing. At the very minimum, one can use SSH tunnels and VNC (Virtual Network Computing, a remote desktop software suite) to control the science hosts within the DSN Flight Operations network. In this way we have controlled up to three telescopes simultaneously. However, X-window updates can be slow and there are issues involving incompatible screen sizes and multi-screen displays. Consequently, we are now developing SSH tunnel-based schemes in which instrument control and monitoring, and intense data processing, are done on-site by the remote DSN hosts while data manipulation and graphical display are done at the observer's host. We describe our approaches to various challenges, our experience with what worked well and lessons learned, and directions for future development.
Nourani, Esmaeil; Khunjush, Farshad; Durmuş, Saliha
2016-05-24
Pathogenic microorganisms exploit host cellular mechanisms and evade host defense mechanisms through molecular pathogen-host interactions (PHIs). Therefore, comprehensive analysis of these PHI networks should be an initial step for developing effective therapeutics against infectious diseases. Computational prediction of PHI data is gaining increasing demand because of scarcity of experimental data. Prediction of protein-protein interactions (PPIs) within PHI systems can be formulated as a classification problem, which requires the knowledge of non-interacting protein pairs. This is a restricting requirement since we lack datasets that report non-interacting protein pairs. In this study, we formulated the "computational prediction of PHI data" problem using kernel embedding of heterogeneous data. This eliminates the abovementioned requirement and enables us to predict new interactions without randomly labeling protein pairs as non-interacting. Domain-domain associations are used to filter the predicted results leading to 175 novel PHIs between 170 human proteins and 105 viral proteins. To compare our results with the state-of-the-art studies that use a binary classification formulation, we modified our settings to consider the same formulation. Detailed evaluations are conducted and our results provide more than 10 percent improvements for accuracy and AUC (area under the receiving operating curve) results in comparison with state-of-the-art methods.
In-camera video-stream processing for bandwidth reduction in web inspection
NASA Astrophysics Data System (ADS)
Jullien, Graham A.; Li, QiuPing; Hajimowlana, S. Hossain; Morvay, J.; Conflitti, D.; Roberts, James W.; Doody, Brian C.
1996-02-01
Automated machine vision systems are now widely used for industrial inspection tasks where video-stream data information is taken in by the camera and then sent out to the inspection system for future processing. In this paper we describe a prototype system for on-line programming of arbitrary real-time video data stream bandwidth reduction algorithms; the output of the camera only contains information that has to be further processed by a host computer. The processing system is built into a DALSA CCD camera and uses a microcontroller interface to download bit-stream data to a XILINXTM FPGA. The FPGA is directly connected to the video data-stream and outputs data to a low bandwidth output bus. The camera communicates to a host computer via an RS-232 link to the microcontroller. Static memory is used to both generate a FIFO interface for buffering defect burst data, and for off-line examination of defect detection data. In addition to providing arbitrary FPGA architectures, the internal program of the microcontroller can also be changed via the host computer and a ROM monitor. This paper describes a prototype system board, mounted inside a DALSA camera, and discusses some of the algorithms currently being implemented for web inspection applications.
NASA Astrophysics Data System (ADS)
Zhang, Hong
2017-06-01
In recent years, with the continuous development and application of network technology, network security has gradually entered people's field of vision. The host computer network external network of violations is an important reason for the threat of network security. At present, most of the work units have a certain degree of attention to network security, has taken a lot of means and methods to prevent network security problems such as the physical isolation of the internal network, install the firewall at the exit. However, these measures and methods to improve network security are often not comply with the safety rules of human behavior damage. For example, the host to wireless Internet access and dual-network card to access the Internet, inadvertently formed a two-way network of external networks and computer connections [1]. As a result, it is possible to cause some important documents and confidentiality leak even in the the circumstances of user unaware completely. Secrecy Computer Violation Out-of-band monitoring technology can largely prevent the violation by monitoring the behavior of the offending connection. In this paper, we mainly research and discuss the technology of secret computer monitoring.
Distributed run of a one-dimensional model in a regional application using SOAP-based web services
NASA Astrophysics Data System (ADS)
Smiatek, Gerhard
This article describes the setup of a distributed computing system in Perl. It facilitates the parallel run of a one-dimensional environmental model on a number of simple network PC hosts. The system uses Simple Object Access Protocol (SOAP) driven web services offering the model run on remote hosts and a multi-thread environment distributing the work and accessing the web services. Its application is demonstrated in a regional run of a process-oriented biogenic emission model for the area of Germany. Within a network consisting of up to seven web services implemented on Linux and MS-Windows hosts, a performance increase of approximately 400% has been reached compared to a model run on the fastest single host.
In-Storage Embedded Accelerator for Sparse Pattern Processing
2016-09-13
computation . As a result, a very small processor could be used and still make full use of storage device bandwidth. When the host software sends...Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee et al. "A view of cloud computing ."Communications of the ACM 53, no. 4 (2010...Laboratory, * MIT Computer Science & Artificial Intelligence Laboratory Abstract— We present a novel system architecture for sparse pattern
2008-02-27
between the PHY layer and for example a host PC computer . The PC wants to generate and receive a sequence of data packets. The PC may also want to send...the testbed is quite similar. Given the intense computational requirements of SVD and other matrix mode operations needed to support eigen spreading a...platform for real time operation. This task is probably the major challenge in the development of the testbed. All compute intensive tasks will be
Image matrix processor for fast multi-dimensional computations
Roberson, G.P.; Skeate, M.F.
1996-10-15
An apparatus for multi-dimensional computation is disclosed which comprises a computation engine, including a plurality of processing modules. The processing modules are configured in parallel and compute respective contributions to a computed multi-dimensional image of respective two dimensional data sets. A high-speed, parallel access storage system is provided which stores the multi-dimensional data sets, and a switching circuit routes the data among the processing modules in the computation engine and the storage system. A data acquisition port receives the two dimensional data sets representing projections through an image, for reconstruction algorithms such as encountered in computerized tomography. The processing modules include a programmable local host, by which they may be configured to execute a plurality of different types of multi-dimensional algorithms. The processing modules thus include an image manipulation processor, which includes a source cache, a target cache, a coefficient table, and control software for executing image transformation routines using data in the source cache and the coefficient table and loading resulting data in the target cache. The local host processor operates to load the source cache with a two dimensional data set, loads the coefficient table, and transfers resulting data out of the target cache to the storage system, or to another destination. 10 figs.
XpressWare Installation User guide
NASA Astrophysics Data System (ADS)
Duffey, K. P.
XpressWare is a set of X terminal software, released by Tektronix Inc, that accommodates the X Window system on a range of host computers. The software comprises boot files (the X server image), configuration files, fonts, and font tools to support the X terminal. The files can be installed on one host or distributed across multiple hosts The purpose of this guide is to present the system or network administrator with a step-by-step account of how to install XpressWare, and how subsequently to configure the X terminals appropriately for the environment in which they operate.
Sensor Authentication: Embedded Processor Code
DOE Office of Scientific and Technical Information (OSTI.GOV)
Svoboda, John
2012-09-25
Described is the c code running on the embedded Microchip 32bit PIC32MX575F256H located on the INL developed noise analysis circuit board. The code performs the following functions: Controls the noise analysis circuit board preamplifier voltage gains of 1, 10, 100, 000 Initializes the analog to digital conversion hardware, input channel selection, Fast Fourier Transform (FFT) function, USB communications interface, and internal memory allocations Initiates high resolution 4096 point 200 kHz data acquisition Computes complex 2048 point FFT and FFT magnitude. Services Host command set Transfers raw data to Host Transfers FFT result to host Communication error checking
[Planning a Health Residence for Prison Security Measures, Tuscany (Italy)].
Porfido, Eugenio; Colombai, Renato; Scarpa, Franco; Totaro, Michele; Tani, Luca; Baldini, Claudio; Baggiani, Angelo
2016-01-01
Health Residences for Prison Security Measures are facilities hosting psychotic persons who have committed crimes and providing them with personalized rehabilitation and treatment plans to promote their reinstatement in society. The aim of this study was to describe the criteria for planning and designing a prison health residence in the Tuscany region (Italy), to be managed by the regional healthcare service, in line with current regulations, with dedicated staff for providing specific treatment plans and programmes.
Impacts and Risks of Migration and Refugee Flows in Africa
2012-03-12
In Africa, as in other parts of the world , border management systems are coming under increasing pressure from large flows of persons moving across...management globally have been and will continue to be strongly affected by security concerns. Some regions in the world have been the subject of attacks...and many parts of the world . Also, the presence of large numbers of displaced persons in refugee camps and IDP hosting areas can have negative
Event-Driven Random-Access-Windowing CCD Imaging System
NASA Technical Reports Server (NTRS)
Monacos, Steve; Portillo, Angel; Ortiz, Gerardo; Alexander, James; Lam, Raymond; Liu, William
2004-01-01
A charge-coupled-device (CCD) based high-speed imaging system, called a realtime, event-driven (RARE) camera, is undergoing development. This camera is capable of readout from multiple subwindows [also known as regions of interest (ROIs)] within the CCD field of view. Both the sizes and the locations of the ROIs can be controlled in real time and can be changed at the camera frame rate. The predecessor of this camera was described in High-Frame-Rate CCD Camera Having Subwindow Capability (NPO- 30564) NASA Tech Briefs, Vol. 26, No. 12 (December 2002), page 26. The architecture of the prior camera requires tight coupling between camera control logic and an external host computer that provides commands for camera operation and processes pixels from the camera. This tight coupling limits the attainable frame rate and functionality of the camera. The design of the present camera loosens this coupling to increase the achievable frame rate and functionality. From a host computer perspective, the readout operation in the prior camera was defined on a per-line basis; in this camera, it is defined on a per-ROI basis. In addition, the camera includes internal timing circuitry. This combination of features enables real-time, event-driven operation for adaptive control of the camera. Hence, this camera is well suited for applications requiring autonomous control of multiple ROIs to track multiple targets moving throughout the CCD field of view. Additionally, by eliminating the need for control intervention by the host computer during the pixel readout, the present design reduces ROI-readout times to attain higher frame rates. This camera (see figure) includes an imager card consisting of a commercial CCD imager and two signal-processor chips. The imager card converts transistor/ transistor-logic (TTL)-level signals from a field programmable gate array (FPGA) controller card. These signals are transmitted to the imager card via a low-voltage differential signaling (LVDS) cable assembly. The FPGA controller card is connected to the host computer via a standard peripheral component interface (PCI).
Emulating Host-Microbiome Ecosystem of Human Gastrointestinal Tract in Vitro.
Park, Gun-Seok; Park, Min Hee; Shin, Woojung; Zhao, Connie; Sheikh, Sameer; Oh, So Jung; Kim, Hyun Jung
2017-06-01
The human gut microbiome performs prodigious physiological functions such as production of microbial metabolites, modulation of nutrient digestion and drug metabolism, control of immune system, and prevention of infection. Paradoxically, gut microbiome can also negatively orchestrate the host responses in diseases or chronic disorders, suggesting that the regulated and balanced host-gut microbiome crosstalk is a salient prerequisite in gastrointestinal physiology. To understand the pathophysiological role of host-microbiome crosstalk, it is critical to recreate in vivo relevant models of the host-gut microbiome ecosystem in human. However, controlling the multi-species microbial communities and their uncontrolled growth has remained a notable technical challenge. Furthermore, conventional two-dimensional (2D) or 3D culture systems do not recapitulate multicellular microarchitectures, mechanical dynamics, and tissue-specific functions. Here, we review recent advances and current pitfalls of in vitro and ex vivo models that display human GI functions. We also discuss how the disruptive technologies such as 3D organoids or a human organ-on-a-chip microphysiological system can contribute to better emulate host-gut microbiome crosstalks in health and disease. Finally, the medical and pharmaceutical significance of the gut microbiome-based personalized interventions is underlined as a future perspective.
Combining high performance simulation, data acquisition, and graphics display computers
NASA Technical Reports Server (NTRS)
Hickman, Robert J.
1989-01-01
Issues involved in the continuing development of an advanced simulation complex are discussed. This approach provides the capability to perform the majority of tests on advanced systems, non-destructively. The controlled test environments can be replicated to examine the response of the systems under test to alternative treatments of the system control design, or test the function and qualification of specific hardware. Field tests verify that the elements simulated in the laboratories are sufficient. The digital computer is hosted by a Digital Equipment Corp. MicroVAX computer with an Aptec Computer Systems Model 24 I/O computer performing the communication function. An Applied Dynamics International AD100 performs the high speed simulation computing and an Evans and Sutherland PS350 performs on-line graphics display. A Scientific Computer Systems SCS40 acts as a high performance FORTRAN program processor to support the complex, by generating numerous large files from programs coded in FORTRAN that are required for the real time processing. Four programming languages are involved in the process, FORTRAN, ADSIM, ADRIO, and STAPLE. FORTRAN is employed on the MicroVAX host to initialize and terminate the simulation runs on the system. The generation of the data files on the SCS40 also is performed with FORTRAN programs. ADSIM and ADIRO are used to program the processing elements of the AD100 and its IOCP processor. STAPLE is used to program the Aptec DIP and DIA processors.
Providing Assistive Technology Applications as a Service Through Cloud Computing.
Mulfari, Davide; Celesti, Antonio; Villari, Massimo; Puliafito, Antonio
2015-01-01
Users with disabilities interact with Personal Computers (PCs) using Assistive Technology (AT) software solutions. Such applications run on a PC that a person with a disability commonly uses. However the configuration of AT applications is not trivial at all, especially whenever the user needs to work on a PC that does not allow him/her to rely on his / her AT tools (e.g., at work, at university, in an Internet point). In this paper, we discuss how cloud computing provides a valid technological solution to enhance such a scenario.With the emergence of cloud computing, many applications are executed on top of virtual machines (VMs). Virtualization allows us to achieve a software implementation of a real computer able to execute a standard operating system and any kind of application. In this paper we propose to build personalized VMs running AT programs and settings. By using the remote desktop technology, our solution enables users to control their customized virtual desktop environment by means of an HTML5-based web interface running on any computer equipped with a browser, whenever they are.
Wang, Likun; Yang, Luhe; Peng, Zuohan; Lu, Dan; Jin, Yan; McNutt, Michael; Yin, Yuxin
2015-01-01
With the burgeoning development of cloud technology and services, there are an increasing number of users who prefer cloud to run their applications. All software and associated data are hosted on the cloud, allowing users to access them via a web browser from any computer, anywhere. This paper presents cisPath, an R/Bioconductor package deployed on cloud servers for client users to visualize, manage, and share functional protein interaction networks. With this R package, users can easily integrate downloaded protein-protein interaction information from different online databases with private data to construct new and personalized interaction networks. Additional functions allow users to generate specific networks based on private databases. Since the results produced with the use of this package are in the form of web pages, cloud users can easily view and edit the network graphs via the browser, using a mouse or touch screen, without the need to download them to a local computer. This package can also be installed and run on a local desktop computer. Depending on user preference, results can be publicized or shared by uploading to a web server or cloud driver, allowing other users to directly access results via a web browser. This package can be installed and run on a variety of platforms. Since all network views are shown in web pages, such package is particularly useful for cloud users. The easy installation and operation is an attractive quality for R beginners and users with no previous experience with cloud services.
2015-01-01
Background With the burgeoning development of cloud technology and services, there are an increasing number of users who prefer cloud to run their applications. All software and associated data are hosted on the cloud, allowing users to access them via a web browser from any computer, anywhere. This paper presents cisPath, an R/Bioconductor package deployed on cloud servers for client users to visualize, manage, and share functional protein interaction networks. Results With this R package, users can easily integrate downloaded protein-protein interaction information from different online databases with private data to construct new and personalized interaction networks. Additional functions allow users to generate specific networks based on private databases. Since the results produced with the use of this package are in the form of web pages, cloud users can easily view and edit the network graphs via the browser, using a mouse or touch screen, without the need to download them to a local computer. This package can also be installed and run on a local desktop computer. Depending on user preference, results can be publicized or shared by uploading to a web server or cloud driver, allowing other users to directly access results via a web browser. Conclusions This package can be installed and run on a variety of platforms. Since all network views are shown in web pages, such package is particularly useful for cloud users. The easy installation and operation is an attractive quality for R beginners and users with no previous experience with cloud services. PMID:25708840
Architectures for Device Aware Network
2005-03-01
68 b. PDA in DAN Mode ............................................................. 69 c. Cell Phone in DAN Mode...68 Figure 15. PDA in DAN Mode - Reduced Resolution Image ..................................... 69 Figure 16. Cell Phone in DAN Mode -No Image...computer, notebook computer, cell phone and a host of networked embedded systems) may have extremely differing capabilities and resources to retrieve and
Design and Implementation of an MC68020-Based Educational Computer Board
1989-12-01
device and the other for a Macintosh personal computer. A stored program can be installed in 8K bytes Programmable Read Only Memory (PROM) to initialize...MHz. It includes four * Static Random Access Memory (SRAM) chips which provide a storage of 32K bytes. Two Programmable Array Logic (PAL) chips...device and the other for a Macintosh personal computer. A stored program can be installed in 8K bytes Programmable Read Only Memory (PROM) to
Embedded systems for supporting computer accessibility.
Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio
2015-01-01
Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.
Personal supercomputing by using transputer and Intel 80860 in plasma engineering
NASA Astrophysics Data System (ADS)
Ido, S.; Aoki, K.; Ishine, M.; Kubota, M.
1992-09-01
Transputer (T800) and 64-bit RISC Intel 80860 (i860) added on a personal computer can be used as an accelerator. When 32-bit T800s in a parallel system or 64-bit i860s are used, scientific calculations are carried out several ten times as fast as in the case of commonly used 32-bit personal computers or UNIX workstations. Benchmark tests and examples of physical simulations using T800s and i860 are reported.
An Amphibious Ship-To-Shore Simulation for Use on an IBM PC (Personal Computer)
1984-09-01
CA : «< <- j Special ■ *- amphibious ship- an IBM Personal ion of the phy- he logic used analysis, and a DD | JAM 11 1473 COITION...research, for instance, wiL1 be geared toward a technically oriented person who is familiar with computers, programming and the associated logic. A...problem, often vaguely stated by the decision aaker , into precise and operational terms [Ref. Hz p.51]. The analysis begins with specification of the
Dissemination of Information in Developing Countries: The Personal Computer and beyond
ERIC Educational Resources Information Center
Wong, Wai-Man
2005-01-01
With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…
USER'S GUIDE TO THE PERSONAL COMPUTER VERSION OF THE BIOGENIC EMISSIONS INVENTORY SYSTEM (PC-BEIS2)
The document is a user's guide for an updated Personal Computer version of the Biogenic Emissions Inventory System (PC-BEIS2), allowing users to estimate hourly emissions of biogenic volatile organic compounds (BVOCs) and soil nitrogen oxide emissions for any county in the contig...
A Computer Spreadsheet for Locating Assistive Devices.
ERIC Educational Resources Information Center
Palmer, Catherine V.; Garstecki, Dean C.
1988-01-01
The article presents a directory of assistive devices for persons with hearing impairments in a grid format by distributor and type of device (alerting devices, telephone, TV/radio/stereo, personal communication, group communication, and other). The product locator is also available in spreadsheet form for either the Macintosh or IBM-PC computers.…
Microprocessors: An Understandable Guide for the Classroom Teacher.
ERIC Educational Resources Information Center
Okinaka, Russell T.
A microprocessor constitutes the heart and soul of a personal computer. Indeed, the quality of a personal computer is determined largely by the type of microprocessor that is included within its circuitry. Since the microcomputer revolution began in the late 1970s, these special chips have gone through a series of improvements and modifications.…
Personality Characteristics and Performance on Computer Assisted Instruction and Programmed Text.
ERIC Educational Resources Information Center
Blitz, Allan N.; Smith, Timothy
An empirical study investigated whether personality characteristics have a bearing on an individual's success with particular modes of instruction, in this case, computer-assisted instruction (CAI) and the programed text (PT). The study was developed in an attempt to establish useful criteria on which to base a rationale for choosing suitable…
Academic Achievement Enhanced by Personal Digital Assistant Use
ERIC Educational Resources Information Center
Bick, Alexander
2005-01-01
Research during the past decade suggests that integrating computing technology in general, and mobile computers in particular, into the educational environment has positive effects. This is the first long-term study of high school Personal Digital Assistant use. It involved three-parts, 146 students during four years. Part one found that PDA use…
Learning with Personal Computers: Issues, Observations and Perspectives.
ERIC Educational Resources Information Center
Rowe, Helga A. H.; And Others
This book is about learning and teaching with personal computers. It is aimed at teachers, student teachers, those responsible for pre-service and in-service teacher training, school administrators, and parents. The book is arranged in four sections. Part I includes two chapters providing a theoretical framework for learning and teaching with…
Beyond Computer Literacy: Technology Integration and Curriculum Transformation
ERIC Educational Resources Information Center
Safar, Ammar H.; AlKhezzi, Fahad A.
2013-01-01
Personal computers, the Internet, smartphones, and other forms of information and communication technology (ICT) have changed our world, our job, our personal lives, as well as how we manage our knowledge and time effectively and efficiently. Research findings in the past decades have acknowledged and affirmed that the content the ICT medium…
A Computer Program for Training Eccentric Reading in Persons with Central Scotoma
ERIC Educational Resources Information Center
Kasten, Erich; Haschke, Peggy; Meinhold, Ulrike; Oertel-Verweyen, Petra
2010-01-01
This article explores the effectiveness of a computer program--Xcentric viewing--for training eccentric reading in persons with central scotoma. The authors conducted a small study to investigate whether this program increases the reading capacities of individuals with age-related macular degeneration (AMD). Instead of a control group, they…
Performance Measures in Courses Using Computer-Aided Personalized System of Instruction
ERIC Educational Resources Information Center
Springer, C. R.; Pear, J. J.
2008-01-01
Archived data from four courses taught with computer-aided personalized system of instruction (CAPSI)--an online, self-paced, instructional program--were used to explore the relationship between objectively rescored final exam grades, peer reviewing, and progress rate--i.e., the rate at which students completed unit tests. There was a strong…
The Future's Future: Implications of Emerging Technology for Special Education Program Planning.
ERIC Educational Resources Information Center
Hofstetter, Fred T.
2001-01-01
This article reviews emerging technologies, imagines how they can be used to help learners with special needs, and recommends new special education program initiatives to help these students make a meaningful transition from school to work. Wearable computers, personal computing devices, DVD, HDTV, MP3, and personal digital assistants are…
Awareness of Computer Knowledge among XI Standard Students in Coimbatore District
ERIC Educational Resources Information Center
K., Santhoshini; Bhavana, A. R.
2016-01-01
Education is a lifelong journey for every person. A person experiences most of his education through schools. After the invention of computers, the world has become a global village. Education system in India is facing increasing pressure to use innovative methodologies and integrate new Information and Communication Technologies in the teaching…
Nakrani, Sunil; Tovey, Craig
2007-12-01
An Internet hosting center hosts services on its server ensemble. The center must allocate servers dynamically amongst services to maximize revenue earned from hosting fees. The finite server ensemble, unpredictable request arrival behavior and server reallocation cost make server allocation optimization difficult. Server allocation closely resembles honeybee forager allocation amongst flower patches to optimize nectar influx. The resemblance inspires a honeybee biomimetic algorithm. This paper describes details of the honeybee self-organizing model in terms of information flow and feedback, analyzes the homology between the two problems and derives the resulting biomimetic algorithm for hosting centers. The algorithm is assessed for effectiveness and adaptiveness by comparative testing against benchmark and conventional algorithms. Computational results indicate that the new algorithm is highly adaptive to widely varying external environments and quite competitive against benchmark assessment algorithms. Other swarm intelligence applications are briefly surveyed, and some general speculations are offered regarding their various degrees of success.
A new communications technique for the nonvocal person, using the Apple II Computer.
Seamone, W
1982-01-01
The purpose of this paper is to describe a technique for nonvocal personal communication for the severely handicapped person, using the Apple II computer system and standard commercially available software diskettes (Visi-Calc). The user's input in a pseudo-Morse code is generated via minute chin motions or limited finger motions applied to a suitable configured two-switch device, and input via the JHU/APL Morse code interface card. The commands and features of the program's row-column matrix, originally intended and widely used for financial management, are used here to call up and modify a large array of stored sentences which can be useful in personal communication. It is not known at this time if the system is in fact cost-effective for the sole purpose of nonvocal communication, since system tradeoff studies have not been made relative to other techniques. However, in some instances an Apple computer may be already available for other purposes at the institution or in the home, and the system described could simply be another utilization of that personal computer. In any case, the system clearly does not meet the requirement of portability. No special components (except for the JHU/APL Morse interface card) and no special programming experience are required to duplicate the communications technique described.
NASA Astrophysics Data System (ADS)
Anbar, Ariel; Center for Education Through eXploration
2018-01-01
Advances in scientific visualization and public access to data have transformed science outreach and communication, but have yet to realize their potential impacts in the realm of education. Computer-based learning is a clear bridge between visualization and education that benefits students through adaptative personalization and enhanced access. Building this bridge requires close partnerships among scientists, technologists, and educators.The Infiniscope project fosters such partnerships to produce exploration-driven online learning experiences that teach basic science concepts using a combination of authentic space science narratives, data, and images, and a personalized guided inquiry approach. Infiniscope includes a web portal to host these digital learning experiences, as well as a teaching network of educators using and modifying these experiences. Infiniscope experiences are built around a new theory of digital learning design that we call “education through exploration” (ETX) developed during the creation of successful online, interactive science courses offered at ASU and other institutions. ETX builds on the research-based practices of active learning and guided inquiry to provide a set of design principles that aim to develop higher order thinking skills in addition to understanding of content. It is employed in these experiences by asking students to solve problems and actively discover relationships, supported by an intelligent tutoring system which provides immediate, personalized feedback and scaffolds scientific thinking and methods. The project is led by ASU’s School of Earth and Space Exploration working with learning designers in the Center for Education Through eXploration, with support from NASA’s Science Mission Directorate as part of the NASA Exploration Connection program.We will present an overview of ETX design, the Infinscope project, and emerging evidence of effectiveness.
Communication-Gateway Software For NETEX, DECnet, And TCP/IP
NASA Technical Reports Server (NTRS)
Keith, B.; Ferry, D.; Fendler, E.
1990-01-01
Communications gateway software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. Provides necessary mapping from one protocol to another and facilitates practical intermachine communications in cost-effective manner by eliminating need to standardize on single protocol or to implement multiple protocols in host computers. Written in Ada.
Security and Interdependency in a Public Cloud: A Game Theoretic Approach
2014-08-29
maximum utility can be reached (i.e., Pareto efficiency). However, the examples of perverse incentives and information inequality (where this feedback...interdependent structure. Cloud computing gives way to two types of interdependent relationships: cloud host-to- client and cloud client -to- client ... Client -to- client interdependency is much less studied than to the above-mentioned cloud host-to- client relationship. Although, it can still carry the
In person versus Computer Screening for Intimate Partner Violence Among Pregnant Patients
Dado, Diane; Schussler, Sara; Hawker, Lynn; Holland, Cynthia L.; Burke, Jessica G.; Cluss, Patricia A.
2012-01-01
Objective To compare in person versus computerized screening for intimate partner violence (IPV) in a hospital-based prenatal clinic and explore women’s assessment of the screening methods. Methods We compared patient IPV disclosures on a computerized questionnaire to audio-taped first obstetric visits with an obstetric care provider and performed semi-structured interviews with patient participants who reported experiencing IPV. Results Two-hundred and fifty patient participants and 52 provider participants were in the study. Ninety-one (36%) patients disclosed IPV either via computer or in person. Of those who disclosed IPV, 60 (66%) disclosed via both methods, but 31 (34%) disclosed IPV via only one of the two methods. Twenty-three women returned for interviews. They recommended using both types together. While computerized screening was felt to be non-judgmental and more anonymous, in person screening allowed for tailored questioning and more emotional connection with the provider. Conclusion Computerized screening allowed disclosure without fear of immediate judgment. In person screening allows more flexibility in wording of questions regarding IPV and opportunity for interpersonal rapport. Practice Implications Both computerized or self-completed screening and in person screening is recommended. Providers should address IPV using non-judgmental, descriptive language, include assessments for psychological IPV, and repeat screening in person, even if no patient disclosure occurs via computer. PMID:22770815
In person versus computer screening for intimate partner violence among pregnant patients.
Chang, Judy C; Dado, Diane; Schussler, Sara; Hawker, Lynn; Holland, Cynthia L; Burke, Jessica G; Cluss, Patricia A
2012-09-01
To compare in person versus computerized screening for intimate partner violence (IPV) in a hospital-based prenatal clinic and explore women's assessment of the screening methods. We compared patient IPV disclosures on a computerized questionnaire to audio-taped first obstetric visits with an obstetric care provider and performed semi-structured interviews with patient participants who reported experiencing IPV. Two-hundred and fifty patient participants and 52 provider participants were in the study. Ninety-one (36%) patients disclosed IPV either via computer or in person. Of those who disclosed IPV, 60 (66%) disclosed via both methods, but 31 (34%) disclosed IPV via only one of the two methods. Twenty-three women returned for interviews. They recommended using both types together. While computerized screening was felt to be non-judgmental and more anonymous, in person screening allowed for tailored questioning and more emotional connection with the provider. Computerized screening allowed disclosure without fear of immediate judgment. In person screening allows more flexibility in wording of questions regarding IPV and opportunity for interpersonal rapport. Both computerized or self-completed screening and in person screening is recommended. Providers should address IPV using non-judgmental, descriptive language, include assessments for psychological IPV, and repeat screening in person, even if no patient disclosure occurs via computer. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Developing a multimodal biometric authentication system using soft computing methods.
Malcangi, Mario
2015-01-01
Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.
A computer-based physics laboratory apparatus: Signal generator software
NASA Astrophysics Data System (ADS)
Thanakittiviroon, Tharest; Liangrocapart, Sompong
2005-09-01
This paper describes a computer-based physics laboratory apparatus to replace expensive instruments such as high-precision signal generators. This apparatus uses a sound card in a common personal computer to give sinusoidal signals with an accurate frequency that can be programmed to give different frequency signals repeatedly. An experiment on standing waves on an oscillating string uses this apparatus. In conjunction with interactive lab manuals, which have been developed using personal computers in our university, we achieve a complete set of low-cost, accurate, and easy-to-use equipment for teaching a physics laboratory.
Computing Models of M-type Host Stars and their Panchromatic Spectral Output
NASA Astrophysics Data System (ADS)
Linsky, Jeffrey; Tilipman, Dennis; France, Kevin
2018-06-01
We have begun a program of computing state-of-the-art model atmospheres from the photospheres to the coronae of M stars that are the host stars of known exoplanets. For each model we are computing the emergent radiation at all wavelengths that are critical for assessingphotochemistry and mass-loss from exoplanet atmospheres. In particular, we are computing the stellar extreme ultraviolet radiation that drives hydrodynamic mass loss from exoplanet atmospheres and is essential for determing whether an exoplanet is habitable. The model atmospheres are computed with the SSRPM radiative transfer/statistical equilibrium code developed by Dr. Juan Fontenla. The code solves for the non-LTE statistical equilibrium populations of 18,538 levels of 52 atomic and ion species and computes the radiation from all species (435,986 spectral lines) and about 20,000,000 spectral lines of 20 diatomic species.The first model computed in this program was for the modestly active M1.5 V star GJ 832 by Fontenla et al. (ApJ 830, 152 (2016)). We will report on a preliminary model for the more active M5 V star GJ 876 and compare this model and its emergent spectrum with GJ 832. In the future, we will compute and intercompare semi-empirical models and spectra for all of the stars observed with the HST MUSCLES Treasury Survey, the Mega-MUSCLES Treasury Survey, and additional stars including Proxima Cen and Trappist-1.This multiyear theory program is supported by a grant from the Space Telescope Science Institute.
NCC Simulation Model: Simulating the operations of the network control center, phase 2
NASA Technical Reports Server (NTRS)
Benjamin, Norman M.; Paul, Arthur S.; Gill, Tepper L.
1992-01-01
The simulation of the network control center (NCC) is in the second phase of development. This phase seeks to further develop the work performed in phase one. Phase one concentrated on the computer systems and interconnecting network. The focus of phase two will be the implementation of the network message dialogues and the resources controlled by the NCC. These resources are requested, initiated, monitored and analyzed via network messages. In the NCC network messages are presented in the form of packets that are routed across the network. These packets are generated, encoded, decoded and processed by the network host processors that generate and service the message traffic on the network that connects these hosts. As a result, the message traffic is used to characterize the work done by the NCC and the connected network. Phase one of the model development represented the NCC as a network of bi-directional single server queues and message generating sources. The generators represented the external segment processors. The served based queues represented the host processors. The NCC model consists of the internal and external processors which generate message traffic on the network that links these hosts. To fully realize the objective of phase two it is necessary to identify and model the processes in each internal processor. These processes live in the operating system of the internal host computers and handle tasks such as high speed message exchanging, ISN and NFE interface, event monitoring, network monitoring, and message logging. Inter process communication is achieved through the operating system facilities. The overall performance of the host is determined by its ability to service messages generated by both internal and external processors.
Electronic structure and magnetic properties of dilute U impurities in metals
NASA Astrophysics Data System (ADS)
Mohanta, S. K.; Cottenier, S.; Mishra, S. N.
2016-05-01
The electronic structure and magnetic moment of dilute U impurity in metallic hosts have been calculated from first principles. The calculations have been performed within local density approximation of the density functional theory using Augmented plane wave+local orbital (APW+lo) technique, taking account of spin-orbit coupling and Coulomb correlation through LDA+U approach. We present here our results for the local density of states, magnetic moment and hyperfine field calculated for an isolated U impurity embedded in hosts with sp-, d- and f-type conduction electrons. The results of our systematic study provide a comprehensive insight on the pressure dependence of 5f local magnetism in metallic systems. The unpolarized local density of states (LDOS), analyzed within the frame work of Stoner model suggest the occurrence of local moment for U in sp-elements, noble metals and f-block hosts like La, Ce, Lu and Th. In contrast, U is predicted to be nonmagnetic in most transition metal hosts except in Sc, Ti, Y, Zr, and Hf consistent with the results obtained from spin polarized calculation. The spin and orbital magnetic moments of U computed within the frame of LDA+U formalism show a scaling behavior with lattice compression. We have also computed the spin and orbital hyperfine fields and a detail analysis has been carried out. The host dependent trends for the magnetic moment, hyperfine field and 5f occupation reflect pressure induced change of electronic structure with U valency changing from 3+ to 4+ under lattice compression. In addition, we have made a detailed analysis of the impurity induced host spin polarization suggesting qualitatively different roles of f-band electrons on moment stability. The results presented in this work would be helpful towards understanding magnetism and spin fluctuation in U based alloys.
Understanding health care communication preferences of veteran primary care users.
LaVela, Sherri L; Schectman, Gordon; Gering, Jeffrey; Locatelli, Sara M; Gawron, Andrew; Weaver, Frances M
2012-09-01
To assess veterans' health communication preferences (in-person, telephone, or electronic) for primary care needs and the impact of computer use on preferences. Structured patient interviews (n=448). Bivariate analyses examined preferences for primary care by 'infrequent' vs. 'regular' computer users. Only 54% were regular computer users, nearly all of whom had ever used the internet. 'Telephone' was preferred for 6 of 10 reasons (general medical questions, medication questions and refills, preventive care reminders, scheduling, and test results); although telephone was preferred by markedly fewer regular computer users. 'In-person' was preferred for new/ongoing conditions/symptoms, treatment instructions, and next care steps; these preferences were unaffected by computer use frequency. Among regular computer users, 1/3 preferred 'electronic' for preventive reminders (37%), test results (34%), and refills (32%). For most primary care needs, telephone communication was preferred, although by a greater proportion of infrequent vs. regular computer users. In-person communication was preferred for reasons that may require an exam or visual instructions. About 1/3 of regular computer users prefer electronic communication for routine needs, e.g., preventive reminders, test results, and refills. These findings can be used to plan patient-centered care that is aligned with veterans' preferred health communication methods. Published by Elsevier Ireland Ltd.
1986-03-01
SCHIZOPHRENIC DISORDER Amphetamine Delusional Disorder PARANOID DISORDER Cannabis Delusional Disorder Hallucinogen Delusional Disorder BRIEF REACTIVE...Intoxication Borderline Personality Disorder Cocaine Intoxication Histrionic Personality Disorder Caffeine Intoxication Narcissistic Personality Disorder... Cannabis Intoxication Dependent Personality Disorder ON, Inhalant Intoxication Schizoid Personality Disorder Minor Tranquilizer Intoxication Compulsive
Navab, Nassir; Fellow, Miccai; Hennersperger, Christoph; Frisch, Benjamin; Fürst, Bernhard
2016-10-01
In the last decade, many researchers in medical image computing and computer assisted interventions across the world focused on the development of the Virtual Physiological Human (VPH), aiming at changing the practice of medicine from classification and treatment of diseases to that of modeling and treating patients. These projects resulted in major advancements in segmentation, registration, morphological, physiological and biomechanical modeling based on state of art medical imaging as well as other sensory data. However, a major issue which has not yet come into the focus is personalizing intra-operative imaging, allowing for optimal treatment. In this paper, we discuss the personalization of imaging and visualization process with particular focus on satisfying the challenging requirements of computer assisted interventions. We discuss such requirements and review a series of scientific contributions made by our research team to tackle some of these major challenges. Copyright © 2016. Published by Elsevier B.V.
Code of Federal Regulations, 2010 CFR
2010-04-01
... imposition of the personal holding company tax on a foreign corporation, resident or nonresident, which files..., which files no return, the undistributed personal holding company income shall be computed on the basis... TAXES (CONTINUED) Personal Holding Companies § 1.545-1 Definition. (a) Undistributed personal holding...
Code of Federal Regulations, 2011 CFR
2011-04-01
... imposition of the personal holding company tax on a foreign corporation, resident or nonresident, which files..., which files no return, the undistributed personal holding company income shall be computed on the basis... TAXES (CONTINUED) Personal Holding Companies § 1.545-1 Definition. (a) Undistributed personal holding...
Controlling Laboratory Processes From A Personal Computer
NASA Technical Reports Server (NTRS)
Will, H.; Mackin, M. A.
1991-01-01
Computer program provides natural-language process control from IBM PC or compatible computer. Sets up process-control system that either runs without operator or run by workers who have limited programming skills. Includes three smaller programs. Two of them, written in FORTRAN 77, record data and control research processes. Third program, written in Pascal, generates FORTRAN subroutines used by other two programs to identify user commands with device-driving routines written by user. Also includes set of input data allowing user to define user commands to be executed by computer. Requires personal computer operating under MS-DOS with suitable hardware interfaces to all controlled devices. Also requires FORTRAN 77 compiler and device drivers written by user.
Ensmenger, Nathan
2015-01-01
Over the course of the 1960s and 1970s, male computer experts were able to successfully transform the "routine and mechanical" (and therefore feminized) activity of computer programming into a highly valued, well-paying, and professionally respectable discipline. They did so by constructing for themselves a distinctively masculine identity in which individual artistic genius, personal eccentricity, anti-authoritarian behavior, and a characteristic "dislike of activities involving human interaction" were mobilized as sources of personal and professional authority. This article explores the history of masculine culture and practices in computer programming, with a particular focus on the role of university computer centers as key sites of cultural formation and dissemination.
Predicting bacteriophage proteins located in host cell with feature selection technique.
Ding, Hui; Liang, Zhi-Yong; Guo, Feng-Biao; Huang, Jian; Chen, Wei; Lin, Hao
2016-04-01
A bacteriophage is a virus that can infect a bacterium. The fate of an infected bacterium is determined by the bacteriophage proteins located in the host cell. Thus, reliably identifying bacteriophage proteins located in the host cell is extremely important to understand their functions and discover potential anti-bacterial drugs. Thus, in this paper, a computational method was developed to recognize bacteriophage proteins located in host cells based only on their amino acid sequences. The analysis of variance (ANOVA) combined with incremental feature selection (IFS) was proposed to optimize the feature set. Using a jackknife cross-validation, our method can discriminate between bacteriophage proteins located in a host cell and the bacteriophage proteins not located in a host cell with a maximum overall accuracy of 84.2%, and can further classify bacteriophage proteins located in host cell cytoplasm and in host cell membranes with a maximum overall accuracy of 92.4%. To enhance the value of the practical applications of the method, we built a web server called PHPred (〈http://lin.uestc.edu.cn/server/PHPred〉). We believe that the PHPred will become a powerful tool to study bacteriophage proteins located in host cells and to guide related drug discovery. Copyright © 2016 Elsevier Ltd. All rights reserved.
Wiese, Dawn; Atreja, Ashish; Mehta, Neil
2008-11-06
Tablet Personal Computers (PCs) have a huge potential in medical education due to their interactive human- computer interface and the need for anatomical diagrams, annotations, biochemistry flow charts etc. We conducted an online survey of medical students to determine their pattern of usage of the tablet features. The results revealed that the majority of medical students use the tablet features infrequently and most do not place a high value on the tablet features.
Sarmady, Mahdi; Dampier, William; Tozeren, Aydin
2011-01-01
Virus proteins alter protein pathways of the host toward the synthesis of viral particles by breaking and making edges via binding to host proteins. In this study, we developed a computational approach to predict viral sequence hotspots for binding to host proteins based on sequences of viral and host proteins and literature-curated virus-host protein interactome data. We use a motif discovery algorithm repeatedly on collections of sequences of viral proteins and immediate binding partners of their host targets and choose only those motifs that are conserved on viral sequences and highly statistically enriched among binding partners of virus protein targeted host proteins. Our results match experimental data on binding sites of Nef to host proteins such as MAPK1, VAV1, LCK, HCK, HLA-A, CD4, FYN, and GNB2L1 with high statistical significance but is a poor predictor of Nef binding sites on highly flexible, hoop-like regions. Predicted hotspots recapture CD8 cell epitopes of HIV Nef highlighting their importance in modulating virus-host interactions. Host proteins potentially targeted or outcompeted by Nef appear crowding the T cell receptor, natural killer cell mediated cytotoxicity, and neurotrophin signaling pathways. Scanning of HIV Nef motifs on multiple alignments of hepatitis C protein NS5A produces results consistent with literature, indicating the potential value of the hotspot discovery in advancing our understanding of virus-host crosstalk. PMID:21738584
Conference Connections: Rewiring the Circuit
ERIC Educational Resources Information Center
Siemens, George; Tittenberger, Peter; Anderson, Terry
2008-01-01
Increased openness, two-way dialogue, and blurred distinctions between experts and amateurs have combined with numerous technology tools for dialogue, personal expression, networking, and community formation to "remake" conferences, influencing not only how attendees participate in but also how organizers host conferences today. (Contains 31…
Code of Federal Regulations, 2012 CFR
2012-04-01
.... Identify those personal expenses expected to be covered by the student Diet: a. Does anyone in the family... a particular dietary restriction (ex. Vegetarian, Vegan, etc.)? (Y/N) d. Would the family provide...
Code of Federal Regulations, 2013 CFR
2013-04-01
.... Identify those personal expenses expected to be covered by the student Diet: a. Does anyone in the family... a particular dietary restriction (ex. Vegetarian, Vegan, etc.)? (Y/N) d. Would the family provide...
Code of Federal Regulations, 2014 CFR
2014-04-01
.... Identify those personal expenses expected to be covered by the student Diet: a. Does anyone in the family... a particular dietary restriction (ex. Vegetarian, Vegan, etc.)? (Y/N) d. Would the family provide...
Code of Federal Regulations, 2011 CFR
2011-04-01
.... Identify those personal expenses expected to be covered by the student Diet: a. Does anyone in the family... a particular dietary restriction (ex. Vegetarian, Vegan, etc.)? (Y/N) d. Would the family provide...
Addressing Toxicity of Water using the Challenge Process
Exposure concerns from an increasing number of pollutants in US waters requires the need for better monitoring. The pollutants are diverse and can include pesticides, heavy metals, personal care products, natural toxins such as cyanobacterial toxins, and a host of other organic ...
ERIC Educational Resources Information Center
Bakkabulindi, Fred Edward K.; Adebanjo, Oyebade Stephen
2011-01-01
This paper reports a survey that sought to establish levels of use of PC (personal computer) software by graduate students in Makerere University and to link the same to organizational characteristics, related to a given respondent's "unit", that is school, faculty or institute, namely its ability to absorb change, its ICT (Information…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-06
... Mobile Communications Devices and Related Software; Notice of Investigation AGENCY: U.S. International... Apple Computer, Inc. of Cupertino, California and NeXT Software, Inc. f/k/a NeXT Computer, Inc. of... certain personal data and mobile communications devices and related software by reason of infringement of...
Games as Artistic Medium: Interfacing Complexity Theory in Game-Based Art Pedagogy
ERIC Educational Resources Information Center
Patton, Ryan Matthew
2011-01-01
Having computer skills, let alone access to a personal computer, has become a necessary component of contemporary Western society and many parts of the world. Digital media literacy involves youth being able to view, participate in, and make creative works with technologies in personal and meaningful ways. Games, defined in this study as…
ERIC Educational Resources Information Center
Beauvois, Margaret Healy; Eledge, Jean
1996-01-01
Describes the results of a pilot study to examine the attitudes of university students toward the use of computer-mediated communication in their French conversation and composition course. Results indicate that both introvert and extrovert personality types generally perceive the use of a local area network as a beneficial experience. (15…
Computer Problems Can Infuriate Even the Most Tech Savvy
ERIC Educational Resources Information Center
Goldsborough, Reid
2004-01-01
Which high-tech products give you the most grief? Surprisingly, more people singled out TiVo and replay digital recording systems than personal computers, according to a recent survey by Best Buy. Nine percent of people said they found these TV devices difficult to use. The same percentage found PDAs (personal digital assistants) difficult. Only 2…
John R. Mills
1989-01-01
The timber resource inventory model (TRIM) has been adapted to run on person al computers. The personal computer version of TRIM (PC-TRIM) is more widely used than its mainframe parent. Errors that existed in previous versions of TRIM have been corrected. Information is presented to help users with program input and output management in the DOS environment, to...
Computers--Teaching, Technology, and Applications.
ERIC Educational Resources Information Center
Cocco, Anthony M.; And Others
1995-01-01
Includes "Managing Personality Types in the Computer Classroom" (Cocco); "External I/O Input/Output with a PC" (Fryda); "The Future of CAD/CAM Computer-Assisted Design/Computer-Assisted Manufacturing Software" (Fulton); and "Teaching Quality Assurance--A Laboratory Approach" (Wojslaw). (SK)
Gender stereotypes, aggression, and computer games: an online survey of women.
Norris, Kamala O
2004-12-01
Computer games were conceptualized as a potential mode of entry into computer-related employment for women. Computer games contain increasing levels of realism and violence, as well as biased gender portrayals. It has been suggested that aggressive personality characteristics attract people to aggressive video games, and that more women do not play computer games because they are socialized to be non-aggressive. To explore gender identity and aggressive personality in the context of computers, an online survey was conducted on women who played computer games and women who used the computer but did not play computer games. Women who played computer games perceived their online environments as less friendly but experienced less sexual harassment online, were more aggressive themselves, and did not differ in gender identity, degree of sex role stereotyping, or acceptance of sexual violence when compared to women who used the computer but did not play video games. Finally, computer gaming was associated with decreased participation in computer-related employment; however, women with high masculine gender identities were more likely to use computers at work.
An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives
Neri, Emilio; Jonker, Elizabeth
2007-01-01
Background The public is concerned about the privacy of their health information, especially as more of it is collected, stored, and exchanged electronically. But we do not know the extent of leakage of personal health information (PHI) from data custodians. One form of data leakage is through computer equipment that is sold, donated, lost, or stolen from health care facilities or individuals who work at these facilities. Previous studies have shown that it is possible to get sensitive personal information (PI) from second-hand disk drives. However, there have been no studies investigating the leakage of PHI in this way. Objectives The aim of the study was to determine the extent to which PHI can be obtained from second-hand computer disk drives. Methods A list of Canadian vendors selling second-hand computer equipment was constructed, and we systematically went through the shuffled list and attempted to purchase used disk drives from the vendors. Sixty functional disk drives were purchased and analyzed for data remnants containing PHI using computer forensic tools. Results It was possible to recover PI from 65% (95% CI: 52%-76%) of the drives. In total, 10% (95% CI: 5%-20%) had PHI on people other than the owner(s) of the drive, and 8% (95% CI: 7%-24%) had PHI on the owner(s) of the drive. Some of the PHI included very sensitive mental health information on a large number of people. Conclusions There is a strong need for health care data custodians to either encrypt all computers that can hold PHI on their clients or patients, including those used by employees and subcontractors in their homes, or to ensure that their computers are destroyed rather than finding a second life in the used computer market. PMID:17942386
A prisoner's dilemma experiment on cooperation with people and human-like computers.
Kiesler, S; Sproull, L; Waters, K
1996-01-01
The authors investigated basic properties of social exchange and interaction with technology in an experiment on cooperation with a human-like computer partner or a real human partner. Talking with a computer partner may trigger social identity feelings or commitment norms. Participants played a prisoner's dilemma game with a confederate or a computer partner. Discussion, inducements to make promises, and partner cooperation varied across trials. On Trial 1, after discussion, most participants proposed cooperation. They kept their promises as much with a text-only computer as with a person, but less with a more human-like computer. Cooperation dropped sharply when any partner avoided discussion. The strong impact of discussion fits a social contract explanation of cooperation following discussion. Participants broke their promises to a computer more than to a person, however, indicating that people make heterogeneous commitments.
Factors influencing exemplary science teachers' levels of computer use
NASA Astrophysics Data System (ADS)
Hakverdi, Meral
This study examines exemplary science teachers' use of technology in science instruction, factors influencing their level of computer use, their level of knowledge/skills in using specific computer applications for science instruction, their use of computer-related applications/tools during their instruction, and their students' use of computer applications/tools in or for their science class. After a relevant review of the literature certain variables were selected for analysis. These variables included personal self-efficacy in teaching with computers, outcome expectancy, pupil-control ideology, level of computer use, age, gender, teaching experience, personal computer use, professional computer use and science teachers' level of knowledge/skills in using specific computer applications for science instruction. The sample for this study includes middle and high school science teachers who received the Presidential Award for Excellence in Science Teaching Award (sponsored by the White House and the National Science Foundation) between the years 1997 and 2003 from all 50 states and U.S. territories. Award-winning science teachers were contacted about the survey via e-mail or letter with an enclosed return envelope. Of the 334 award-winning science teachers, usable responses were received from 92 science teachers, which made a response rate of 27.5%. Analysis of the survey responses indicated that exemplary science teachers have a variety of knowledge/skills in using computer related applications/tools. The most commonly used computer applications/tools are information retrieval via the Internet, presentation tools, online communication, digital cameras, and data collection probes. Results of the study revealed that students' use of technology in their science classroom is highly correlated with the frequency of their science teachers' use of computer applications/tools. The results of the multiple regression analysis revealed that personal self-efficacy related to the exemplary science teachers' level of computer use suggesting that computer use is dependent on perceived abilities at using computers. The teachers' use of computer-related applications/tools during class, and their personal self-efficacy, age, and gender are highly related with their level of knowledge/skills in using specific computer applications for science instruction. The teachers' level of knowledge/skills in using specific computer applications for science instruction and gender related to their use of computer-related applications/tools during class and the students' use of computer-related applications/tools in or for their science class. In conclusion, exemplary science teachers need assistance in learning and using computer-related applications/tool in their science class.
Dynamic Transfers Of Tasks Among Computers
NASA Technical Reports Server (NTRS)
Liu, Howard T.; Silvester, John A.
1989-01-01
Allocation scheme gives jobs to idle computers. Ideal resource-sharing algorithm should have following characteristics: Dynamics, decentralized, and heterogeneous. Proposed enhanced receiver-initiated dynamic algorithm (ERIDA) for resource sharing fulfills all above criteria. Provides method balancing workload among hosts, resulting in improvement in response time and throughput performance of total system. Adjusts dynamically to traffic load of each station.
ERIC Educational Resources Information Center
Mandernach, B. Jean
2006-01-01
There is a host of research examining the equivalence of alternative modes of technology-facilitated educational delivery (such as computer-based or online instruction) and traditional classroom instruction. While various studies have promoted each of these modalities for specific populations or topic areas, the bulk of research supports relative…
Computer symbiosis: Emergence of symbiotic behavior through evolution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ikegami, Takashi; Kaneko, Kunihiko
Symbiosis is altruistic cooperation between distinct species. It is one of the most effective evolutionary processes, but its dynamics are not well understood as yet. A simple model of symbiosis is introduced, where we consider interactions between hosts and parasites and also mutations of hosts and parasites. It is found that a symbiotic state emerges for a suitable range of mutation rates. The symbiotic state is not static, but dynamically oscillates. Harmful parasites violating symbiosis appear periodically, but are rapidly extinguished by hosts and other parasites, and the symbiotic state is recovered. The emergence of ''Tit for Tat'' strategy tomore » maintain symbiosis is discussed. 4 figs.« less
Computer and online health information literacy among Belgrade citizens aged 66-89 years.
Gazibara, Tatjana; Kurtagic, Ilma; Kisic-Tepavcevic, Darija; Nurkovic, Selmina; Kovacevic, Nikolina; Gazibara, Teodora; Pekmezovic, Tatjana
2016-06-01
Computer users over 65 years of age in Serbia are rare. The purpose of this study was to (i) describe main demographic characteristics of computer users older than 65; (ii) evaluate their online health information literacy and (iii) assess factors associated with computer use in this population. Persons above 65 years of age were recruited at the Community Health Center 'Vračar' in Belgrade from November 2012 to January 2013. Data were collected after medical checkups using a questionnaire. Of 480 persons who were invited to participate 354 (73.7%) agreed to participate, while 346 filled in the questionnaire (72.1%). A total of 70 (20.2%) older persons were computer users (23.4% males vs. 17.7% females). Of those, 23.7% explored health-related web sites. The majority of older persons who do not use computers reported that they do not have a reason to use a computer (76.5%), while every third senior (30.4%) did not own a computer. Predictors of computer use were being younger [odds ratio (OR) = 2.14, 95% confidence interval (CI) 1.30-4.04; p = 0.019], having less members of household (OR = 2.97, 95% CI 1.45-6.08; p = 0.003), being more educated (OR = 3.53, 95% CI 1.88-6.63; p = 0.001), having higher income (OR = 2.31, 95% CI 1.17-4.58; p = 0.016) as well as fewer comorbidities (OR = 0.42, 95% CI 0.23-0.79; p = 0.007). Being male was independent predictor of online health information use at the level of marginal significance (OR = 4.43, 95% CI 1.93-21.00; p = 0.061). Frequency of computer and Internet use among older adults in Belgrade is similar to other populations. Patterns of Internet use as well as non-use demonstrate particular socio-cultural characteristics. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems
1999-06-01
administrator whenever a system binary file (such as the ps, login , or ls program) is modified. Normal users have no legitimate reason to alter these files...development of EMERALD [46], which combines statistical anomaly detection from NIDES with signature verification. Specification-based intrusion detection...the creation of a single host that can act as many hosts. Daemons that provide network services—including telnetd, ftpd, and login — display banners
Dijkstra, Arie; Ballast, Karien
2012-02-01
In most computer-tailored interventions, the recipient's name is used to personalize the information. This is done to increase the process of persuasion but few empirical data exist that support this notion. An experimental laboratory study was conducted to test the effects of mentioning the participants name and to study whether it was related to the depth of processing in a 2 (personalization/standard) × 2 (weak/strong arguments) design. Over 120 student smokers were randomly assigned to one of the four experimental conditions in which they read smoking cessation messages offering (pre-tested) strong or weak arguments. Personalization was applied by mentioning the recipient's first name three times in the text. The intention to quit smoking was the dependent variable. Personalization increased persuasion when perceived personal relevance was high, but it decreased persuasion when perceived personal relevance was low. The effects on persuasion were only present in the case of strong arguments. Personalization is not always effective, and it may even lead to less persuasion. Therefore, this often used way to tailor messages must be applied with care. ©2011 The British Psychological Society.
Facing the challenges of multiscale modelling of bacterial and fungal pathogen–host interactions
Schleicher, Jana; Conrad, Theresia; Gustafsson, Mika; Cedersund, Gunnar; Guthke, Reinhard
2017-01-01
Abstract Recent and rapidly evolving progress on high-throughput measurement techniques and computational performance has led to the emergence of new disciplines, such as systems medicine and translational systems biology. At the core of these disciplines lies the desire to produce multiscale models: mathematical models that integrate multiple scales of biological organization, ranging from molecular, cellular and tissue models to organ, whole-organism and population scale models. Using such models, hypotheses can systematically be tested. In this review, we present state-of-the-art multiscale modelling of bacterial and fungal infections, considering both the pathogen and host as well as their interaction. Multiscale modelling of the interactions of bacteria, especially Mycobacterium tuberculosis, with the human host is quite advanced. In contrast, models for fungal infections are still in their infancy, in particular regarding infections with the most important human pathogenic fungi, Candida albicans and Aspergillus fumigatus. We reflect on the current availability of computational approaches for multiscale modelling of host–pathogen interactions and point out current challenges. Finally, we provide an outlook for future requirements of multiscale modelling. PMID:26857943
78 FR 2912 - Prohibition on Personal Use of Electronic Devices on the Flight Deck
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-15
....C. 332(c)(7)(C)(i). In general, wireless telecommunications is the transfer of information between... personal wireless communications device or laptop computer for personal use while at their duty station on.... Personal Wireless Communications Device IV. Regulatory Notices and Analyses A. Regulatory Evaluation B...
Personal Learning Network Clusters: A Comparison between Mathematics and Computer Science Students
ERIC Educational Resources Information Center
Harding, Ansie; Engelbrecht, Johann
2015-01-01
"Personal learning environments" (PLEs) and "personal learning networks" (PLNs) are well-known concepts. A personal learning network "cluster" is a small group of people who regularly interact academically and whose PLNs have a non-empty intersection that includes all the other members. At university level PLN…
A roadmap towards personalized immunology.
Delhalle, Sylvie; Bode, Sebastian F N; Balling, Rudi; Ollert, Markus; He, Feng Q
2018-01-01
Big data generation and computational processing will enable medicine to evolve from a "one-size-fits-all" approach to precise patient stratification and treatment. Significant achievements using "Omics" data have been made especially in personalized oncology. However, immune cells relative to tumor cells show a much higher degree of complexity in heterogeneity, dynamics, memory-capability, plasticity and "social" interactions. There is still a long way ahead on translating our capability to identify potentially targetable personalized biomarkers into effective personalized therapy in immune-centralized diseases. Here, we discuss the recent advances and successful applications in "Omics" data utilization and network analysis on patients' samples of clinical trials and studies, as well as the major challenges and strategies towards personalized stratification and treatment for infectious or non-communicable inflammatory diseases such as autoimmune diseases or allergies. We provide a roadmap and highlight experimental, clinical, computational analysis, data management, ethical and regulatory issues to accelerate the implementation of personalized immunology.
[Change of host's behavior including man under the influence of parasites].
Sergiev, V P
2010-01-01
Directed modulation of hosts' behavior favouring transmission of pathogen was noted in many parasites and, above all, in helminthes, which life cycle includes the consequent change of several hosts. It turned out that parasites use the same neuromediators for change of behavior of both mammals and hosts belonging to other animal classes. In fishes as well as in mammals, monoamines-neurotransmitters assist in brain functioning. Norepinephrine, dopamine and serotonin affect the alimentation, motion activity, aggression and social behaviour. Changes in concentration ratio of serotonin and its metabolites in invaded species were more pronounced, which pointed to directed effects of pathogens on serotonin activity. The same effect of some pathogens on human behaviour does not have selective significance because humans are not an essential link in life cycle of many parasites. Although the mentioned effect on behaviour could lead to negative consequences. For examples, persons with latent toxoplasmosis are significantly more frequent become members or victims of traffic accidents due to decreased ability for concentration of attention.
Saraiva, Danilo G.; Soares, Herbert S.; Soares, João Fábio
2014-01-01
Rocky Mountain spotted fever is endemic to the São Paulo metropolitan area, Brazil, where the etiologic agent, Rickettsia rickettsii, is transmitted to humans by adult Amblyomma aureolatum ticks. We determined the minimal feeding period required by A. aureolatum nymphs and adults to transmit R. rickettsii to guinea pigs. Unfed nymphs and unfed adult ticks had to be attached to the host for >10 hours to transmit R. rickettsii. In contrast, fed ticks needed a minimum of 10 minutes of attachment to transmit R. rickettsii to hosts. Most confirmed infections of Rocky Mountain spotted fever in humans in the São Paulo metropolitan area have been associated with contact with domestic dogs, the main host of A. aureolatum adult ticks. The typical expectation that transmission of tickborne bacteria to humans as well as to dogs requires ≥2 hours of tick attachment may discourage persons from immediately removing them and result in transmission of this lethal bacterium. PMID:25148391
Stochastic processes constrain the within and between host evolution of influenza virus.
McCrone, John T; Woods, Robert J; Martin, Emily T; Malosh, Ryan E; Monto, Arnold S; Lauring, Adam S
2018-05-03
The evolutionary dynamics of influenza virus ultimately derive from processes that take place within and between infected individuals. Here we define influenza virus dynamics in human hosts through sequencing of 249 specimens from 200 individuals collected over 6290 person-seasons of observation. Because these viruses were collected from individuals in a prospective community-based cohort, they are broadly representative of natural infections with seasonal viruses. Consistent with a neutral model of evolution, sequence data from 49 serially sampled individuals illustrated the dynamic turnover of synonymous and nonsynonymous single nucleotide variants and provided little evidence for positive selection of antigenic variants. We also identified 43 genetically-validated transmission pairs in this cohort. Maximum likelihood optimization of multiple transmission models estimated an effective transmission bottleneck of 1-2 genomes. Our data suggest that positive selection is inefficient at the level of the individual host and that stochastic processes dominate the host-level evolution of influenza viruses. © 2018, McCrone et al.
Weight, Caroline M; Carding, Simon R
2012-07-01
Abstract Toxoplasma gondii is a ubiquitous parasite found within all mammals and birds worldwide that can cause fatal infections in immunocompromised persons and fetuses. The parasite causes chronic infections by residing in long-living tissues of the muscle and brain. T. gondii infects the host through contaminated meat and water consumption with the gastrointestinal tract (GI tract) being the first point of contact with the host. The mechanisms by which the parasite invades the host through the GI tract are unknown, although it has been suggested that the paracellular pathway is important for parasite dissemination. Studies indicate that epithelial tight junction-associated proteins are affected by T. gondii, although which junctional proteins are affected and the nature of host protein-parasite interactions have not been established. We have uncovered evidence that T. gondii influences the cellular distribution of occludin to transmigrate the intestinal epithelium and suggest how candidate binding partners can be identified. © 2012 New York Academy of Sciences.
Environment dominates over host genetics in shaping human gut microbiota.
Rothschild, Daphna; Weissbrod, Omer; Barkan, Elad; Kurilshikov, Alexander; Korem, Tal; Zeevi, David; Costea, Paul I; Godneva, Anastasia; Kalka, Iris N; Bar, Noam; Shilo, Smadar; Lador, Dar; Vila, Arnau Vich; Zmora, Niv; Pevsner-Fischer, Meirav; Israeli, David; Kosower, Noa; Malka, Gal; Wolf, Bat Chen; Avnit-Sagi, Tali; Lotan-Pompan, Maya; Weinberger, Adina; Halpern, Zamir; Carmi, Shai; Fu, Jingyuan; Wijmenga, Cisca; Zhernakova, Alexandra; Elinav, Eran; Segal, Eran
2018-03-08
Human gut microbiome composition is shaped by multiple factors but the relative contribution of host genetics remains elusive. Here we examine genotype and microbiome data from 1,046 healthy individuals with several distinct ancestral origins who share a relatively common environment, and demonstrate that the gut microbiome is not significantly associated with genetic ancestry, and that host genetics have a minor role in determining microbiome composition. We show that, by contrast, there are significant similarities in the compositions of the microbiomes of genetically unrelated individuals who share a household, and that over 20% of the inter-person microbiome variability is associated with factors related to diet, drugs and anthropometric measurements. We further demonstrate that microbiome data significantly improve the prediction accuracy for many human traits, such as glucose and obesity measures, compared to models that use only host genetic and environmental data. These results suggest that microbiome alterations aimed at improving clinical outcomes may be carried out across diverse genetic backgrounds.