Code of Federal Regulations, 2012 CFR
2012-10-01
... Compliant Microcomputers, Including Personal Computers, Monitors and Printers. 1552.239-103 Section 1552.239... Star Compliant Microcomputers, Including Personal Computers, Monitors and Printers. As prescribed in... Personal Computers, Monitors, and Printers (APR 1996) (a) The Contractor shall provide computer products...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Compliant Microcomputers, Including Personal Computers, Monitors and Printers. 1552.239-103 Section 1552.239... Star Compliant Microcomputers, Including Personal Computers, Monitors and Printers. As prescribed in... Personal Computers, Monitors, and Printers (APR 1996) (a) The Contractor shall provide computer products...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Compliant Microcomputers, Including Personal Computers, Monitors and Printers. 1552.239-103 Section 1552.239... Star Compliant Microcomputers, Including Personal Computers, Monitors and Printers. As prescribed in... Personal Computers, Monitors, and Printers (APR 1996) (a) The Contractor shall provide computer products...
Research and the Personal Computer.
ERIC Educational Resources Information Center
Blackburn, D. A.
1989-01-01
Discussed is the history and elements of the personal computer. Its uses as a laboratory assistant and generic toolkit for mathematical analysis and modeling are included. The future of the personal computer in research is addressed. (KR)
ERIC Educational Resources Information Center
Toong, Hoo-min D.; Gupta, Amar
1982-01-01
Describes the hardware, software, applications, and current proliferation of personal computers (microcomputers). Includes discussions of microprocessors, memory, output (including printers), application programs, the microcomputer industry, and major microcomputer manufacturers (Apple, Radio Shack, Commodore, and IBM). (JN)
Personal-Computer Video-Terminal Emulator
NASA Technical Reports Server (NTRS)
Buckley, R. H.; Koromilas, A.; Smith, R. M.; Lee, G. E.; Giering, E. W.
1985-01-01
OWL-1200 video terminal emulator has been written for IBM Personal Computer. The OWL-1200 is a simple user terminal with some intelligent capabilities. These capabilities include screen formatting and block transmission of data. Emulator is written in PASCAL and Assembler for the IBM Personal Computer operating under DOS 1.1.
Kannan, Srimathi; Schulz, Amy; Israel, Barbara; Ayra, Indira; Weir, Sheryl; Dvonch, Timothy J.; Rowe, Zachary; Miller, Patricia; Benjamin, Alison
2008-01-01
Background Computer tailoring and personalizing recommendations for dietary health-promoting behaviors are in accordance with community-based participatory research (CBPR) principles, which emphasizes research that benefits the participants and community involved. Objective To describe the CBPR process utilized to computer-generate and disseminate personalized nutrition feedback reports (NFRs) for Detroit Healthy Environments Partnership (HEP) study participants. METHODS The CBPR process included discussion and feedback from HEP partners on several draft personalized reports. The nutrition feedback process included defining the feedback objectives; prioritizing the nutrients; customizing the report design; reviewing and revising the NFR template and readability; producing and disseminating the report; and participant follow-up. Lessons Learned Application of CBPR principles in designing the NFR resulted in a reader-friendly product with useful recommendations to promote heart health. Conclusions A CBPR process can enhance computer tailoring of personalized NFRs to address racial and socioeconomic disparities in cardiovascular disease (CVD). PMID:19337572
Two degree-of-freedom flutter solution for a personal computer
NASA Technical Reports Server (NTRS)
Turnock, D. L.
1985-01-01
A computer programmed flutter solution has been written in the BASIC language for a personal computer. The program is for two degree-of-freedom bending torsion flutter applications and utilizes two dimensional Theodorsen aerodynamics. The aerodynamics were modified to include approximations for Mach number (compressibility) effects and aspect ratio (finite span) effects. Input options, user instructions, program listing, and a test case application are included.
The Use of Microcomputers in Distance Teaching Systems. ZIFF Papiere 70.
ERIC Educational Resources Information Center
Rumble, Greville
Microcomputers have revolutionized distance education in virtually every area. Used alone, personal computers provide students with a wide range of utilities, including word processing, graphics packages, and spreadsheets. When linked to a mainframe computer or connected to other personal computers in local area networks, microcomputers can…
Multimedia and the Future of Distance Learning Technology.
ERIC Educational Resources Information Center
Barnard, John
1992-01-01
Describes recent innovations in distance learning technology, including the use of video technology; personal computers, including computer conferencing, computer-mediated communication, and workstations; multimedia, including hypermedia; Integrated Services Digital Networks (ISDN); and fiber optics. Research implications for multimedia and…
A personal computer-based nuclear magnetic resonance spectrometer
NASA Astrophysics Data System (ADS)
Job, Constantin; Pearson, Robert M.; Brown, Michael F.
1994-11-01
Nuclear magnetic resonance (NMR) spectroscopy using personal computer-based hardware has the potential of enabling the application of NMR methods to fields where conventional state of the art equipment is either impractical or too costly. With such a strategy for data acquisition and processing, disciplines including civil engineering, agriculture, geology, archaeology, and others have the possibility of utilizing magnetic resonance techniques within the laboratory or conducting applications directly in the field. Another aspect is the possibility of utilizing existing NMR magnets which may be in good condition but unused because of outdated or nonrepairable electronics. Moreover, NMR applications based on personal computer technology may open up teaching possibilities at the college or even secondary school level. The goal of developing such a personal computer (PC)-based NMR standard is facilitated by existing technologies including logic cell arrays, direct digital frequency synthesis, use of PC-based electrical engineering software tools to fabricate electronic circuits, and the use of permanent magnets based on neodymium-iron-boron alloy. Utilizing such an approach, we have been able to place essentially an entire NMR spectrometer console on two printed circuit boards, with the exception of the receiver and radio frequency power amplifier. Future upgrades to include the deuterium lock and the decoupler unit are readily envisioned. The continued development of such PC-based NMR spectrometers is expected to benefit from the fast growing, practical, and low cost personal computer market.
Controlling Laboratory Processes From A Personal Computer
NASA Technical Reports Server (NTRS)
Will, H.; Mackin, M. A.
1991-01-01
Computer program provides natural-language process control from IBM PC or compatible computer. Sets up process-control system that either runs without operator or run by workers who have limited programming skills. Includes three smaller programs. Two of them, written in FORTRAN 77, record data and control research processes. Third program, written in Pascal, generates FORTRAN subroutines used by other two programs to identify user commands with device-driving routines written by user. Also includes set of input data allowing user to define user commands to be executed by computer. Requires personal computer operating under MS-DOS with suitable hardware interfaces to all controlled devices. Also requires FORTRAN 77 compiler and device drivers written by user.
ERIC Educational Resources Information Center
Lazzaro, Joseph J.
1993-01-01
Describes adaptive technology for personal computers that accommodate disabled users and may require special equipment including hardware, memory, expansion slots, and ports. Highlights include vision aids, including speech synthesizers, magnification, braille, and optical character recognition (OCR); hearing adaptations; motor-impaired…
Case Study: Audio-Guided Learning, with Computer Graphics.
ERIC Educational Resources Information Center
Koumi, Jack; Daniels, Judith
1994-01-01
Describes teaching packages which involve the use of audiotape recordings with personal computers in Open University (United Kingdom) mathematics courses. Topics addressed include software development; computer graphics; pedagogic principles for distance education; feedback, including course evaluations and student surveys; and future plans.…
ERIC Educational Resources Information Center
Rubin, Michael Rogers
1988-01-01
The second of three articles on abusive data collection and usage practices and their effect on personal privacy, discusses the evolution of data protection laws worldwide, and compares the scope, major provisions, and enforcement components of the laws. A chronology of key events in the regulation of computer databanks in included. (1 reference)…
Kardashian, R A
2018-01-01
To study personality characteristics in adolescents with computer game addiction. The study included students of grades 7 to 10 at the age of 12-17 years (14.6±2.4 years), their parents and school teachers. The results of a study showed the following combination in patients: 'genophilic' type of DPT with schizoid personality accentuation and 'projection' type of psychological protection, and 'dignitophilic' type of DPT with labile personality accentuation and 'denial' type of PP.
Modern Electronic Devices: An Increasingly Common Cause of Skin Disorders in Consumers.
Corazza, Monica; Minghetti, Sara; Bertoldi, Alberto Maria; Martina, Emanuela; Virgili, Annarosa; Borghi, Alessandro
2016-01-01
: The modern conveniences and enjoyment brought about by electronic devices bring with them some health concerns. In particular, personal electronic devices are responsible for rising cases of several skin disorders, including pressure, friction, contact dermatitis, and other physical dermatitis. The universal use of such devices, either for work or recreational purposes, will probably increase the occurrence of polymorphous skin manifestations over time. It is important for clinicians to consider electronics as potential sources of dermatological ailments, for proper patient management. We performed a literature review on skin disorders associated with the personal use of modern technology, including personal computers and laptops, personal computer accessories, mobile phones, tablets, video games, and consoles.
Heinrich, Andreas; Güttler, Felix; Wendt, Sebastian; Schenkl, Sebastian; Hubig, Michael; Wagner, Rebecca; Mall, Gita; Teichgräber, Ulf
2018-06-18
In forensic odontology the comparison between antemortem and postmortem panoramic radiographs (PRs) is a reliable method for person identification. The purpose of this study was to improve and automate identification of unknown people by comparison between antemortem and postmortem PR using computer vision. The study includes 43 467 PRs from 24 545 patients (46 % females/54 % males). All PRs were filtered and evaluated with Matlab R2014b including the toolboxes image processing and computer vision system. The matching process used the SURF feature to find the corresponding points between two PRs (unknown person and database entry) out of the whole database. From 40 randomly selected persons, 34 persons (85 %) could be reliably identified by corresponding PR matching points between an already existing scan in the database and the most recent PR. The systematic matching yielded a maximum of 259 points for a successful identification between two different PRs of the same person and a maximum of 12 corresponding matching points for other non-identical persons in the database. Hence 12 matching points are the threshold for reliable assignment. Operating with an automatic PR system and computer vision could be a successful and reliable tool for identification purposes. The applied method distinguishes itself by virtue of its fast and reliable identification of persons by PR. This Identification method is suitable even if dental characteristics were removed or added in the past. The system seems to be robust for large amounts of data. · Computer vision allows an automated antemortem and postmortem comparison of panoramic radiographs (PRs) for person identification.. · The present method is able to find identical matching partners among huge datasets (big data) in a short computing time.. · The identification method is suitable even if dental characteristics were removed or added.. · Heinrich A, Güttler F, Wendt S et al. Forensic Odontology: Automatic Identification of Persons Comparing Antemortem and Postmortem Panoramic Radiographs Using Computer Vision. Fortschr Röntgenstr 2018; DOI: 10.1055/a-0632-4744. © Georg Thieme Verlag KG Stuttgart · New York.
Computers--Teaching, Technology, and Applications.
ERIC Educational Resources Information Center
Cocco, Anthony M.; And Others
1995-01-01
Includes "Managing Personality Types in the Computer Classroom" (Cocco); "External I/O Input/Output with a PC" (Fryda); "The Future of CAD/CAM Computer-Assisted Design/Computer-Assisted Manufacturing Software" (Fulton); and "Teaching Quality Assurance--A Laboratory Approach" (Wojslaw). (SK)
So, you are buying your first computer.
Ferrara-Love, R
1999-06-01
Buying your first computer need not be that complicated. The first thing that is needed is an understanding of what you want and need the computer for. By making a list of the various essentials, you will be on your way to purchasing that computer. Once that is completed, you will need an understanding of what each of the components of the computer is, how it works, and what options you have. This way, you will be better able to discuss your needs with the salesperson. The focus of this article is limited to personal computers or PCs (i.e., IBMs [Armonk, NY], IBM clones, Compaq [Houston, TX], Gateway [North Sioux City, SD], and so on). I am not including Macintosh or Apple [Cupertino, CA] in this discussion; most software is often made exclusively for personal computers or at least on the market for personal computers before becoming available in Macintosh version.
Microprocessors: An Understandable Guide for the Classroom Teacher.
ERIC Educational Resources Information Center
Okinaka, Russell T.
A microprocessor constitutes the heart and soul of a personal computer. Indeed, the quality of a personal computer is determined largely by the type of microprocessor that is included within its circuitry. Since the microcomputer revolution began in the late 1970s, these special chips have gone through a series of improvements and modifications.…
Learning with Personal Computers: Issues, Observations and Perspectives.
ERIC Educational Resources Information Center
Rowe, Helga A. H.; And Others
This book is about learning and teaching with personal computers. It is aimed at teachers, student teachers, those responsible for pre-service and in-service teacher training, school administrators, and parents. The book is arranged in four sections. Part I includes two chapters providing a theoretical framework for learning and teaching with…
ERIC Educational Resources Information Center
Library Journal, 1985
1985-01-01
This special supplement to "Library Journal" and "School Library Journal" includes articles on technological dependency, promise of computers for reluctant readers, copyright and database downloading, access to neighborhood of Mister Rogers, library acquisitions, circulating personal computers, "microcomputeritis,"…
ERIC Educational Resources Information Center
Rice, Michael
This report summarizes the presentations and discussions at a conference on the development of new products and services in electronic publishing and computer software for personal use. It is noted that the 26 participants came from a variety of perspectives, including the publishing and computer software industries; the fields of home…
Personal Learning Network Clusters: A Comparison between Mathematics and Computer Science Students
ERIC Educational Resources Information Center
Harding, Ansie; Engelbrecht, Johann
2015-01-01
"Personal learning environments" (PLEs) and "personal learning networks" (PLNs) are well-known concepts. A personal learning network "cluster" is a small group of people who regularly interact academically and whose PLNs have a non-empty intersection that includes all the other members. At university level PLN…
Computers in Life Science Education. Volume 5, 1988.
ERIC Educational Resources Information Center
Computers in Life Science Education, 1988
1988-01-01
Designed to serve as a means of communication among life science educators who anticipate or are currently using microcomputers as an educational tool, this volume of newsletters provides background information and practical suggestions on computer use. Over 80 articles are included. Topic areas include: (1) using a personal computer in a plant…
ERIC Educational Resources Information Center
Desmarais, Norman
1991-01-01
Reviews current developments in multimedia computing for both the business and consumer markets, including interactive multimedia players; compact disc-interactive (CD-I), including levels of audio quality, various video specifications and visual effects, and software; digital video interactive (DVI); and multimedia personal computers. (LRW)
Design and Implementation of an MC68020-Based Educational Computer Board
1989-12-01
device and the other for a Macintosh personal computer. A stored program can be installed in 8K bytes Programmable Read Only Memory (PROM) to initialize...MHz. It includes four * Static Random Access Memory (SRAM) chips which provide a storage of 32K bytes. Two Programmable Array Logic (PAL) chips...device and the other for a Macintosh personal computer. A stored program can be installed in 8K bytes Programmable Read Only Memory (PROM) to
Human-computer interface incorporating personal and application domains
Anderson, Thomas G [Albuquerque, NM
2011-03-29
The present invention provides a human-computer interface. The interface includes provision of an application domain, for example corresponding to a three-dimensional application. The user is allowed to navigate and interact with the application domain. The interface also includes a personal domain, offering the user controls and interaction distinct from the application domain. The separation into two domains allows the most suitable interface methods in each: for example, three-dimensional navigation in the application domain, and two- or three-dimensional controls in the personal domain. Transitions between the application domain and the personal domain are under control of the user, and the transition method is substantially independent of the navigation in the application domain. For example, the user can fly through a three-dimensional application domain, and always move to the personal domain by moving a cursor near one extreme of the display.
Human-computer interface incorporating personal and application domains
Anderson, Thomas G.
2004-04-20
The present invention provides a human-computer interface. The interface includes provision of an application domain, for example corresponding to a three-dimensional application. The user is allowed to navigate and interact with the application domain. The interface also includes a personal domain, offering the user controls and interaction distinct from the application domain. The separation into two domains allows the most suitable interface methods in each: for example, three-dimensional navigation in the application domain, and two- or three-dimensional controls in the personal domain. Transitions between the application domain and the personal domain are under control of the user, and the transition method is substantially independent of the navigation in the application domain. For example, the user can fly through a three-dimensional application domain, and always move to the personal domain by moving a cursor near one extreme of the display.
A Computer Security Course in the Undergraduate Computer Science Curriculum.
ERIC Educational Resources Information Center
Spillman, Richard
1992-01-01
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
Situated Computing: The Next Frontier for HCI Research
2002-01-01
population works and lives with information. Most individuals interact with information through a single portal: a personal desktop or laptop...of single devices, nor will one person necessarily own each device. This leap of imagination requires that human-computer interaction (HCI...wireless technologies, including Bluetooth [16], IrDA [22] (Infrared Data Association- standards for infrared communications) and HomeRF TM [21
76 FR 59803 - Children's Online Privacy Protection Rule
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-27
...,'' covering the ``myriad of computer and telecommunications facilities, including equipment and operating..., Dir. and Professor of Computer Sci. and Pub. Affairs, Princeton Univ. (currently Chief Technologist at... data in the manner of a personal computer. See Electronic Privacy Information Center (``EPIC...
Methods and compositions for protection of cells and tissues from computed tomography radiation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grdina, David J.
Described are methods for preventing or inhibiting genomic instability and in cells affected by diagnostic radiology procedures employing ionizing radiation. Embodiments include methods of preventing or inhibiting genomic instability and in cells affected by computed tomography (CT) radiation. Subjects receiving ionizing radiation may be those persons suspected of having cancer, or cancer patients having received or currently receiving cancer therapy, and or those patients having received previous ionizing radiation, including those who are approaching or have exceeded the recommended total radiation dose for a person.
Study of Personnel Attrition and Revocation within U.S. Marine Corps Air Traffic Control Specialties
2012-03-01
Entrance Processing Stations (MEPS) and recruit depots, to include non-cognitive testing, such as Navy Computer Adaptive Personality Scales ( NCAPS ...Revocation, Selection, MOS, Regression, Probit, dProbit, STATA, Statistics, Marginal Effects, ASVAB, AFQT, Composite Scores, Screening, NCAPS 15. NUMBER...Navy Computer Adaptive Personality Scales ( NCAPS ), during recruitment. It is also recommended that an economic analysis be conducted comparing the
Computer Activities for Persons With Dementia.
Tak, Sunghee H; Zhang, Hongmei; Patel, Hetal; Hong, Song Hee
2015-06-01
The study examined participant's experience and individual characteristics during a 7-week computer activity program for persons with dementia. The descriptive study with mixed methods design collected 612 observational logs of computer sessions from 27 study participants, including individual interviews before and after the program. Quantitative data analysis included descriptive statistics, correlational coefficients, t-test, and chi-square. Content analysis was used to analyze qualitative data. Each participant averaged 23 sessions and 591min for 7 weeks. Computer activities included slide shows with music, games, internet use, and emailing. On average, they had a high score of intensity in engagement per session. Women attended significantly more sessions than men. Higher education level was associated with a higher number of different activities used per session and more time spent on online games. Older participants felt more tired. Feeling tired was significantly correlated with a higher number of weeks with only one session attendance per week. More anticholinergic medications taken by participants were significantly associated with a higher percentage of sessions with disengagement. The findings were significant at p < .05. Qualitative content analysis indicated tailoring computer activities appropriate to individual's needs and functioning is critical. All participants needed technical assistance. A framework for tailoring computer activities may provide guidance on developing and maintaining treatment fidelity of tailored computer activity interventions among persons with dementia. Practice guidelines and education protocols may assist caregivers and service providers to integrate computer activities into homes and aging services settings. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
31 CFR 359.31 - What definitive Series I savings bonds are included in the computation?
Code of Federal Regulations, 2011 CFR
2011-07-01
... registered in the name of and bearing the taxpayer identification number (TIN) of that person alone or as co... bearing that person's TIN; and (c) All gift bonds registered in the name of that person but bearing the TIN of the purchaser. ...
31 CFR 359.31 - What definitive Series I savings bonds are included in the computation?
Code of Federal Regulations, 2010 CFR
2010-07-01
... registered in the name of and bearing the taxpayer identification number (TIN) of that person alone or as co... bearing that person's TIN; and (c) All gift bonds registered in the name of that person but bearing the TIN of the purchaser. ...
Flight selection at United Airlines
NASA Technical Reports Server (NTRS)
Traub, W.
1980-01-01
Airline pilot selection proceedures are discussed including psychogical and personality tests, psychomotor performance requirements, and flight skills evaluation. Necessary attitude and personality traits are described and an outline of computer selection, testing, and training techniques is given.
An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives
Neri, Emilio; Jonker, Elizabeth
2007-01-01
Background The public is concerned about the privacy of their health information, especially as more of it is collected, stored, and exchanged electronically. But we do not know the extent of leakage of personal health information (PHI) from data custodians. One form of data leakage is through computer equipment that is sold, donated, lost, or stolen from health care facilities or individuals who work at these facilities. Previous studies have shown that it is possible to get sensitive personal information (PI) from second-hand disk drives. However, there have been no studies investigating the leakage of PHI in this way. Objectives The aim of the study was to determine the extent to which PHI can be obtained from second-hand computer disk drives. Methods A list of Canadian vendors selling second-hand computer equipment was constructed, and we systematically went through the shuffled list and attempted to purchase used disk drives from the vendors. Sixty functional disk drives were purchased and analyzed for data remnants containing PHI using computer forensic tools. Results It was possible to recover PI from 65% (95% CI: 52%-76%) of the drives. In total, 10% (95% CI: 5%-20%) had PHI on people other than the owner(s) of the drive, and 8% (95% CI: 7%-24%) had PHI on the owner(s) of the drive. Some of the PHI included very sensitive mental health information on a large number of people. Conclusions There is a strong need for health care data custodians to either encrypt all computers that can hold PHI on their clients or patients, including those used by employees and subcontractors in their homes, or to ensure that their computers are destroyed rather than finding a second life in the used computer market. PMID:17942386
Test Generators: Teacher's Tool or Teacher's Headache?
ERIC Educational Resources Information Center
Eiser, Leslie
1988-01-01
Discusses the advantages and disadvantages of test generation programs. Includes setting up, printing exams and "bells and whistles." Reviews eight computer packages for Apple and IBM personal computers. Compares features, costs, and usage. (CW)
What Are Some Types of Assistive Devices and How Are They Used?
... in persons with hearing problems. Cognitive assistance, including computer or electrical assistive devices, can help people function following brain injury. Computer software and hardware, such as voice recognition programs, ...
The Personal Computer in Mechanical Engineering Thermodynamics Courses.
ERIC Educational Resources Information Center
Romer, I. C., Jr.; Balmer, R. T.
1986-01-01
Describes experiences over several semesters with microcomputers in a mechanical engineering applied thermodynamics course. Includes course objectives, computer assignment structure, typical assignments, prewritten versus student-written software, and other topic areas. (JN)
[Computer technologies in teaching pathological anatomy].
Ponomarev, A B; Fedorov, D N
2015-01-01
The paper gives experience with personal computers used at the Academician A.L. Strukov Department of Pathological Anatomy for more than 20 years. It shows the objective necessity of introducing computer technologies at all stages of acquiring skills in anatomical pathology, including lectures, students' free work, test check, etc.
How to Program the Principal's Office for the Computer Age.
ERIC Educational Resources Information Center
Frankel, Steven
1983-01-01
Explains why principals' offices need computers and discusses the characteristics of inexpensive personal business computers, including their operating systems, disk drives, memory, and compactness. Reviews software available for word processing, accounting, database management, and communications, and compares the Kaypro II, Morrow, and Osborne I…
Personal travel assistants and the world wide web
DOT National Transportation Integrated Search
1997-01-01
To be successful, handheld computers known as Personal Travel Assistants (PTAs) must be connected to external information sources. The viability of using the Internet and the world wide web (www) as such sources is explored. Considerations include wh...
A performance evaluation of the IBM 370/XT personal computer
NASA Technical Reports Server (NTRS)
Dominick, Wayne D. (Editor); Triantafyllopoulos, Spiros
1984-01-01
An evaluation of the IBM 370/XT personal computer is given. This evaluation focuses primarily on the use of the 370/XT for scientific and technical applications and applications development. A measurement of the capabilities of the 370/XT was performed by means of test programs which are presented. Also included is a review of facilities provided by the operating system (VM/PC), along with comments on the IBM 370/XT hardware configuration.
MAPPER: A personal computer map projection tool
NASA Technical Reports Server (NTRS)
Bailey, Steven A.
1993-01-01
MAPPER is a set of software tools designed to let users create and manipulate map projections on a personal computer (PC). The capability exists to generate five popular map projections. These include azimuthal, cylindrical, mercator, lambert, and sinusoidal projections. Data for projections are contained in five coordinate databases at various resolutions. MAPPER is managed by a system of pull-down windows. This interface allows the user to intuitively create, view and export maps to other platforms.
An on-line reactivity and power monitor for a TRIGA reactor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Binney, Stephen E.; Bakir, Alia J.
1988-07-01
As the personal computer (PC) becomes more and more of a significant influence on modern technology, it is reasonable that at some point in time they would be used to interface with TRIGA reactors. A personal computer with a special interface board has been used to monitor key parameters during operation of the Oregon State University TRIGA Reactor (OSTR). A description of the apparatus used and sample results are included.
Common Sense Planning for a Computer, or, What's It Worth to You?
ERIC Educational Resources Information Center
Crawford, Walt
1984-01-01
Suggests factors to be considered in planning for the purchase of a microcomputer, including budgets, benefits, costs, and decisions. Major uses of a personal computer are described--word processing, financial analysis, file and database management, programming and computer literacy, education, entertainment, and thrill of high technology. (EJS)
Visual Environments for CFD Research
NASA Technical Reports Server (NTRS)
Watson, Val; George, Michael W. (Technical Monitor)
1994-01-01
This viewgraph presentation gives an overview of the visual environments for computational fluid dynamics (CFD) research. It includes details on critical needs from the future computer environment, features needed to attain this environment, prospects for changes in and the impact of the visualization revolution on the human-computer interface, human processing capabilities, limits of personal environment and the extension of that environment with computers. Information is given on the need for more 'visual' thinking (including instances of visual thinking), an evaluation of the alternate approaches for and levels of interactive computer graphics, a visual analysis of computational fluid dynamics, and an analysis of visualization software.
Embedded systems for supporting computer accessibility.
Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio
2015-01-01
Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.
... share personal information let your kids spend real money — even if the app is free include ads link to social media What’s more, ... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making ... Security "Free" Security Scans Computer Security Disposing of Old Computers ...
Faster, Better, Cheaper: A Decade of PC Progress.
ERIC Educational Resources Information Center
Crawford, Walt
1997-01-01
Reviews the development of personal computers and how computer components have changed in price and value. Highlights include disk drives; keyboards; displays; memory; color graphics; modems; CPU (central processing unit); storage; direct mail vendors; and future possibilities. (LRW)
26 CFR 1.168(j)-1T - Questions and answers concerning tax-exempt entity leasing rules (temporary).
Code of Federal Regulations, 2011 CFR
2011-04-01
... technological equipment” means (1) any computer or peripheral equipment, (2) any high technology telephone..., electromechanical, or computer-based high technology equipment which is tangible personal property used in the... before the expiration of its physical useful life. High technology medical equipment may include computer...
Computers in Life Science Education, 1989-1992.
ERIC Educational Resources Information Center
Modell, Harold, Ed.
1992-01-01
This document consists of four years (40 issues) of a newsletter devoted to computers in life science education. Titles of major articles in this collection include: (1) "Good Versus Bad Software: What Makes the Difference?" (G. Kearsly); (2) "Linkway: Hypermedia for IBM Personal Computers" (L. Kheriaty); (3) "Where's the Software: Parts 1-3" (4)…
Computers and Education: The Wrong Approach Continually Being Executed
ERIC Educational Resources Information Center
Walker, Jacob J.
2005-01-01
This opinion paper explores the use of computers in the U.S. Public Education System, concluding that technology is underutilized and not fulfilled most of the educational promises attributed to the tool. Drawing upon research and personal experience, the paper explores 8 possible reasons for the problem, including: the computer itself; not enough…
Factors influencing exemplary science teachers' levels of computer use
NASA Astrophysics Data System (ADS)
Hakverdi, Meral
This study examines exemplary science teachers' use of technology in science instruction, factors influencing their level of computer use, their level of knowledge/skills in using specific computer applications for science instruction, their use of computer-related applications/tools during their instruction, and their students' use of computer applications/tools in or for their science class. After a relevant review of the literature certain variables were selected for analysis. These variables included personal self-efficacy in teaching with computers, outcome expectancy, pupil-control ideology, level of computer use, age, gender, teaching experience, personal computer use, professional computer use and science teachers' level of knowledge/skills in using specific computer applications for science instruction. The sample for this study includes middle and high school science teachers who received the Presidential Award for Excellence in Science Teaching Award (sponsored by the White House and the National Science Foundation) between the years 1997 and 2003 from all 50 states and U.S. territories. Award-winning science teachers were contacted about the survey via e-mail or letter with an enclosed return envelope. Of the 334 award-winning science teachers, usable responses were received from 92 science teachers, which made a response rate of 27.5%. Analysis of the survey responses indicated that exemplary science teachers have a variety of knowledge/skills in using computer related applications/tools. The most commonly used computer applications/tools are information retrieval via the Internet, presentation tools, online communication, digital cameras, and data collection probes. Results of the study revealed that students' use of technology in their science classroom is highly correlated with the frequency of their science teachers' use of computer applications/tools. The results of the multiple regression analysis revealed that personal self-efficacy related to the exemplary science teachers' level of computer use suggesting that computer use is dependent on perceived abilities at using computers. The teachers' use of computer-related applications/tools during class, and their personal self-efficacy, age, and gender are highly related with their level of knowledge/skills in using specific computer applications for science instruction. The teachers' level of knowledge/skills in using specific computer applications for science instruction and gender related to their use of computer-related applications/tools during class and the students' use of computer-related applications/tools in or for their science class. In conclusion, exemplary science teachers need assistance in learning and using computer-related applications/tool in their science class.
McInnes, D Keith; Li, Alice E; Hogan, Timothy P
2013-12-01
We systematically reviewed the health and social science literature on access to and use of information technologies by homeless persons by searching 5 bibliographic databases. Articles were included if they were in English, represented original research, appeared in peer-reviewed publications, and addressed our research questions. Sixteen articles met our inclusion criteria. We found that mobile phone ownership ranged from 44% to 62%; computer ownership, from 24% to 40%; computer access and use, from 47% to 55%; and Internet use, from 19% to 84%. Homeless persons used technologies for a range of purposes, some of which were health related. Many homeless persons had access to information technologies, suggesting possible health benefits to developing programs that link homeless persons to health care through mobile phones and the Internet.
Mediation and the Electronic World.
ERIC Educational Resources Information Center
Swan, John; And Others
1992-01-01
Three articles discuss the issue of the mediator's role in the library of the electronic age. Topics addressed include computer-assisted instruction; online catalogs; computer networks; professional identity; reference service and bibliographic instruction; CD-ROMs; online systems; personal home microcomputers; Internet and list servers;…
ERIC Educational Resources Information Center
Harper, Christopher
1994-01-01
Describes mobile computer carts developed at the Lawrence Hall of Science that use IBM PS/2 computers and Personal Science Laboratory probeware. Activities using temperature probes for elementary and secondary school students are described, including greenhouse environments, ice cream/chemical reactions, probe races, motion studies, and…
NFDRSPC: The National Fire-Danger Rating System on a Personal Computer
Bryan G. Donaldson; James T. Paul
1990-01-01
This user's guide is an introductory manual for using the 1988 version (Burgan 1988) of the National Fire-Danger Rating System on an IBM PC or compatible computer. NFDRSPC is a window-oriented, interactive computer program that processes observed and forecast weather with fuels data to produce NFDRS indices. Other program features include user-designed display...
In person versus Computer Screening for Intimate Partner Violence Among Pregnant Patients
Dado, Diane; Schussler, Sara; Hawker, Lynn; Holland, Cynthia L.; Burke, Jessica G.; Cluss, Patricia A.
2012-01-01
Objective To compare in person versus computerized screening for intimate partner violence (IPV) in a hospital-based prenatal clinic and explore women’s assessment of the screening methods. Methods We compared patient IPV disclosures on a computerized questionnaire to audio-taped first obstetric visits with an obstetric care provider and performed semi-structured interviews with patient participants who reported experiencing IPV. Results Two-hundred and fifty patient participants and 52 provider participants were in the study. Ninety-one (36%) patients disclosed IPV either via computer or in person. Of those who disclosed IPV, 60 (66%) disclosed via both methods, but 31 (34%) disclosed IPV via only one of the two methods. Twenty-three women returned for interviews. They recommended using both types together. While computerized screening was felt to be non-judgmental and more anonymous, in person screening allowed for tailored questioning and more emotional connection with the provider. Conclusion Computerized screening allowed disclosure without fear of immediate judgment. In person screening allows more flexibility in wording of questions regarding IPV and opportunity for interpersonal rapport. Practice Implications Both computerized or self-completed screening and in person screening is recommended. Providers should address IPV using non-judgmental, descriptive language, include assessments for psychological IPV, and repeat screening in person, even if no patient disclosure occurs via computer. PMID:22770815
In person versus computer screening for intimate partner violence among pregnant patients.
Chang, Judy C; Dado, Diane; Schussler, Sara; Hawker, Lynn; Holland, Cynthia L; Burke, Jessica G; Cluss, Patricia A
2012-09-01
To compare in person versus computerized screening for intimate partner violence (IPV) in a hospital-based prenatal clinic and explore women's assessment of the screening methods. We compared patient IPV disclosures on a computerized questionnaire to audio-taped first obstetric visits with an obstetric care provider and performed semi-structured interviews with patient participants who reported experiencing IPV. Two-hundred and fifty patient participants and 52 provider participants were in the study. Ninety-one (36%) patients disclosed IPV either via computer or in person. Of those who disclosed IPV, 60 (66%) disclosed via both methods, but 31 (34%) disclosed IPV via only one of the two methods. Twenty-three women returned for interviews. They recommended using both types together. While computerized screening was felt to be non-judgmental and more anonymous, in person screening allowed for tailored questioning and more emotional connection with the provider. Computerized screening allowed disclosure without fear of immediate judgment. In person screening allows more flexibility in wording of questions regarding IPV and opportunity for interpersonal rapport. Both computerized or self-completed screening and in person screening is recommended. Providers should address IPV using non-judgmental, descriptive language, include assessments for psychological IPV, and repeat screening in person, even if no patient disclosure occurs via computer. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
PERSONAL COMPUTERS AND ENVIRONMENTAL ENGINEERING
This article discusses how personal computers can be applied to environmental engineering. fter explaining some of the differences between mainframe and Personal computers, we will review the development of personal computers and describe the areas of data management, interactive...
Milestones on the road to independence for the blind
NASA Astrophysics Data System (ADS)
Reed, Kenneth
1997-02-01
Ken will talk about his experiences as an end user of technology. Even moderate technological progress in the field of pattern recognition and artificial intelligence can be, often surprisingly, of great help to the blind. An example is the providing of portable bar code scanners so that a blind person knows what he is buying and what color it is. In this age of microprocessors controlling everything, how can a blind person find out what his VCR is doing? Is there some technique that will allow a blind musician to convert print music into midi files to drive a synthesizer? Can computer vision help the blind cross a road including predictions of where oncoming traffic will be located? Can computer vision technology provide spoken description of scenes so a blind person can figure out where doors and entrances are located, and what the signage on the building says? He asks 'can computer vision help me flip a pancake?' His challenge to those in the computer vision field is 'where can we go from here?'
Job-Related Basic Skills. ERIC Digest No. 94.
ERIC Educational Resources Information Center
Kerka, Sandra
Seven job-related basic skills identified as skills employers want are as follows: (1) learning to learn; (2) reading, writing, and computation; (3) oral communication and listening; (4) creative thinking and problem solving; (5) personal management, including self-esteem, goal setting, motivation, and personal and career development; (6) group…
31 CFR 560.539 - Official activities of certain international organizations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... includes items such as laptops, personal computers, cell phones, personal digital assistants and other..., but are not limited to: (1) The provision of services involving Iran necessary for carrying out the official business; (2) Purchasing Iranian-origin goods and services for use in carrying out the official...
31 CFR 560.539 - Official activities of certain international organizations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... includes items such as laptops, personal computers, cell phones, personal digital assistants and other..., but are not limited to: (1) The provision of services involving Iran necessary for carrying out the official business; (2) Purchasing Iranian-origin goods and services for use in carrying out the official...
East-West paths to unconventional computing.
Adamatzky, Andrew; Akl, Selim; Burgin, Mark; Calude, Cristian S; Costa, José Félix; Dehshibi, Mohammad Mahdi; Gunji, Yukio-Pegio; Konkoli, Zoran; MacLennan, Bruce; Marchal, Bruno; Margenstern, Maurice; Martínez, Genaro J; Mayne, Richard; Morita, Kenichi; Schumann, Andrew; Sergeyev, Yaroslav D; Sirakoulis, Georgios Ch; Stepney, Susan; Svozil, Karl; Zenil, Hector
2017-12-01
Unconventional computing is about breaking boundaries in thinking, acting and computing. Typical topics of this non-typical field include, but are not limited to physics of computation, non-classical logics, new complexity measures, novel hardware, mechanical, chemical and quantum computing. Unconventional computing encourages a new style of thinking while practical applications are obtained from uncovering and exploiting principles and mechanisms of information processing in and functional properties of, physical, chemical and living systems; in particular, efficient algorithms are developed, (almost) optimal architectures are designed and working prototypes of future computing devices are manufactured. This article includes idiosyncratic accounts of 'unconventional computing' scientists reflecting on their personal experiences, what attracted them to the field, their inspirations and discoveries. Copyright © 2017 Elsevier Ltd. All rights reserved.
[Measurement of intracranial hematoma volume by personal computer].
DU, Wanping; Tan, Lihua; Zhai, Ning; Zhou, Shunke; Wang, Rui; Xue, Gongshi; Xiao, An
2011-01-01
To explore the method for intracranial hematoma volume measurement by the personal computer. Forty cases of various intracranial hematomas were measured by the computer tomography with quantitative software and personal computer with Photoshop CS3 software, respectively. the data from the 2 methods were analyzed and compared. There was no difference between the data from the computer tomography and the personal computer (P>0.05). The personal computer with Photoshop CS3 software can measure the volume of various intracranial hematomas precisely, rapidly and simply. It should be recommended in the clinical medicolegal identification.
Computer-based personality judgments are more accurate than those made by humans
Youyou, Wu; Kosinski, Michal; Stillwell, David
2015-01-01
Judging others’ personalities is an essential skill in successful social living, as personality is a key driver behind people’s interactions, behaviors, and emotions. Although accurate personality judgments stem from social-cognitive skills, developments in machine learning show that computer models can also make valid judgments. This study compares the accuracy of human and computer-based personality judgments, using a sample of 86,220 volunteers who completed a 100-item personality questionnaire. We show that (i) computer predictions based on a generic digital footprint (Facebook Likes) are more accurate (r = 0.56) than those made by the participants’ Facebook friends using a personality questionnaire (r = 0.49); (ii) computer models show higher interjudge agreement; and (iii) computer personality judgments have higher external validity when predicting life outcomes such as substance use, political attitudes, and physical health; for some outcomes, they even outperform the self-rated personality scores. Computers outpacing humans in personality judgment presents significant opportunities and challenges in the areas of psychological assessment, marketing, and privacy. PMID:25583507
Computer-based personality judgments are more accurate than those made by humans.
Youyou, Wu; Kosinski, Michal; Stillwell, David
2015-01-27
Judging others' personalities is an essential skill in successful social living, as personality is a key driver behind people's interactions, behaviors, and emotions. Although accurate personality judgments stem from social-cognitive skills, developments in machine learning show that computer models can also make valid judgments. This study compares the accuracy of human and computer-based personality judgments, using a sample of 86,220 volunteers who completed a 100-item personality questionnaire. We show that (i) computer predictions based on a generic digital footprint (Facebook Likes) are more accurate (r = 0.56) than those made by the participants' Facebook friends using a personality questionnaire (r = 0.49); (ii) computer models show higher interjudge agreement; and (iii) computer personality judgments have higher external validity when predicting life outcomes such as substance use, political attitudes, and physical health; for some outcomes, they even outperform the self-rated personality scores. Computers outpacing humans in personality judgment presents significant opportunities and challenges in the areas of psychological assessment, marketing, and privacy.
Applications of personal computers in geophysics
NASA Astrophysics Data System (ADS)
Lee, W. H. K.; Lahr, J. C.; Habermann, R. E.
Since 1981, the use of personal computers (PCs) to increase productivity has become widespread. At present, more than 5 million personal computers are in operation for business, education, engineering, and scientific purposes. Activities within AGU reflect this trend: KOSMOS, the AGU electronic network, was introduced this year, and the AGU Committee on Personal Computers, chaired by W.H K. Lee (U.S. Geological Survey, Menlo Park, Calif.), was recently formed. In addition, in conjunction with the 1986 AGU Fall Meeting, this committee is organizing a personal computer session and hands-on demonstrations to promote applications of personal computers in geophysics.
48 CFR 1523.7003 - Contract clause.
Code of Federal Regulations, 2011 CFR
2011-10-01
... PROGRAMS ENVIRONMENTAL, CONSERVATION, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Energy-Efficient...-103, Acquisition of Energy Star Compliant Microcomputers, Including Personal Computers, Monitors, and...
48 CFR 1523.7003 - Contract clause.
Code of Federal Regulations, 2012 CFR
2012-10-01
... PROGRAMS ENVIRONMENTAL, CONSERVATION, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Energy-Efficient...-103, Acquisition of Energy Star Compliant Microcomputers, Including Personal Computers, Monitors, and...
48 CFR 1523.7003 - Contract clause.
Code of Federal Regulations, 2010 CFR
2010-10-01
... PROGRAMS ENVIRONMENTAL, CONSERVATION, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Energy-Efficient...-103, Acquisition of Energy Star Compliant Microcomputers, Including Personal Computers, Monitors, and...
ERIC Educational Resources Information Center
Handy, Alice Evans; Yucht, Alice H.
1993-01-01
Includes two articles that discuss time management and mail management strategies for librarians. Highlights include identifying personal work styles; planning and prioritizing; using calendars and computers; reexamining traffic patterns; delegating; and sorting and handling mail. (Contains eight references.) (LRW)
37 CFR 201.40 - Exemption to prohibition against circumvention.
Code of Federal Regulations, 2011 CFR
2011-07-01
... by the operator of the network. (4) Video games accessible on personal computers and protected by... copyright infringement or a violation of applicable law. (5) Computer programs protected by dongles that... editions of the work (including digital text editions made available by authorized entities) contain access...
Technology in Education: Research Says!!
ERIC Educational Resources Information Center
Canuel, Ron
2011-01-01
A large amount of research existed in the field of technology in the classroom; however, almost all was focused on the impact of desktop computers and the infamous "school computer room". However, the activities in a classroom represent a multitude of behaviours and interventions, including personal dynamics, classroom management and…
Cho, Yongwon; Lee, Areum; Park, Jongha; Ko, Bemseok; Kim, Namkug
2018-07-01
Contactless operating room (OR) interfaces are important for computer-aided surgery, and have been developed to decrease the risk of contamination during surgical procedures. In this study, we used Leap Motion™, with a personalized automated classifier, to enhance the accuracy of gesture recognition for contactless interfaces. This software was trained and tested on a personal basis that means the training of gesture per a user. We used 30 features including finger and hand data, which were computed, selected, and fed into a multiclass support vector machine (SVM), and Naïve Bayes classifiers and to predict and train five types of gestures including hover, grab, click, one peak, and two peaks. Overall accuracy of the five gestures was 99.58% ± 0.06, and 98.74% ± 3.64 on a personal basis using SVM and Naïve Bayes classifiers, respectively. We compared gesture accuracy across the entire dataset and used SVM and Naïve Bayes classifiers to examine the strength of personal basis training. We developed and enhanced non-contact interfaces with gesture recognition to enhance OR control systems. Copyright © 2018 Elsevier B.V. All rights reserved.
ERIC Educational Resources Information Center
Douglass, Malcolm P., Ed.
The articles in this collection approach the theme of "Reading in the Age of the Computer" in a variety of ways. Topics covered in the 26 articles include the following: (1) children, school, and computers; (2) new kinds of electronic learning environments; (3) the personal computer for creative learning and thinking; (4) going beyond…
Silvey, Garry M.; Macri, Jennifer M.; Lee, Paul P.; Lobach, David F.
2005-01-01
New mobile computing devices including personal digital assistants (PDAs) and tablet computers have emerged to facilitate data collection at the point of care. Unfortunately, little research has been reported regarding which device is optimal for a given care setting. In this study we created and compared functionally identical applications on a Palm operating system-based PDA and a Windows-based tablet computer for point-of-care documentation of clinical observations by eye care professionals when caring for patients with diabetes. Eye-care professionals compared the devices through focus group sessions and through validated usability surveys. We found that the application on the tablet computer was preferred over the PDA for documenting the complex data related to eye care. Our findings suggest that the selection of a mobile computing platform depends on the amount and complexity of the data to be entered; the tablet computer functions better for high volume, complex data entry, and the PDA, for low volume, simple data entry. PMID:16779128
Graphing and Percentage Applications Using the Personal Computer.
ERIC Educational Resources Information Center
Innes, Jay
1985-01-01
The paper describes how "IBM Graphing Assistant" and "Apple Softgraph" can foster a multifaceted approach to application of mathematical concepts and how a survey can be undertaken using the computer as word processor, data bank, and source of visual displays. Mathematical skills reinforced include estimating, rounding, graphing, and solving…
Electronic Networking as an Avenue of Enhanced Professional Interchange.
ERIC Educational Resources Information Center
Ratcliff, James L.
Electronic networking is communication between two or more people that involves one or more telecommunications media. There is electronic networking software available for most computers, including IBM, Apple, and Radio Shack personal computers. Depending upon the sophistication of the hardware and software used, individuals and groups can…
38 CFR 3.271 - Computation of income.
Code of Federal Regulations, 2010 CFR
2010-07-01
... period (e.g., an inheritance). Pension computations of income will include nonrecurring income for a full... amount of a person's earnings or wages before any deductions are made for such things as taxes, insurance... goods sold, or expenditures for rent, taxes, and upkeep, or costs of repairs or replacements. The value...
The Design of a Computer Table for the Physically Handicapped Student.
ERIC Educational Resources Information Center
Fitterman, L. Jeffrey
The paper describes the development of a computer table for physically handicapped students including persons with moderate to severe cerebral palsy, muscular dystrophy, uncontrolled epilepsy, and paralysis due to physical trauma. The project first reviewed furniture currently available for the physically handicapped and then conducted ergonomic…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-24
... the entire information system with respect to computer security, prohibition and detection of any.... Safeguards: --Computer-stored information is protected in accordance with the Agency's security requirements..., loaner car agreement, cash incentives agreement (includes social security number for mandatory tax...
Report: EPA’s Contract Oversight and Controls Over Personal Computers Need Improvement
Report #11-P-0705, September 26, 2011. EPA paid the CTS contractor a total of $489,734 over an 11-month period for 3,343 seats—a standard seat includes a leased computer with accessories and technical support—not ordered by the Agency during the period.
ERIC Educational Resources Information Center
Smith, Christopher, Ed.
Thirty-nine papers from the conference "Discovery '84: Technology for Disabled Persons" are presented. The conference was intended to provide an overview of the areas in which technological advances have been made, including the applications of computers and other related products and services. Conference presenters represented fields of…
ERIC Educational Resources Information Center
Loh, Christian Sebastian
2001-01-01
Examines how mobile computers, or personal digital assistants (PDAs), can be used in a Web-based learning environment. Topics include wireless networks on college campuses; online learning; Web-based learning technologies; synchronous and asynchronous communication via the Web; content resources; Web connections; and collaborative learning. (LRW)
Investigation of a computer virus outbreak in the pharmacy of a tertiary care teaching hospital.
Bailey, T C; Reichley, R M
1992-10-01
A computer virus outbreak was recognized, verified, defined, investigated, and controlled using an infection control approach. The pathogenesis and epidemiology of computer virus infection are reviewed. Case-control study. Pharmacy of a tertiary care teaching institution. On October 28, 1991, 2 personal computers in the drug information center manifested symptoms consistent with the "Jerusalem" virus infection. The same day, a departmental personal computer began playing "Yankee Doodle," a sign of "Doodle" virus infection. An investigation of all departmental personal computers identified the "Stoned" virus in an additional personal computer. Controls were functioning virus-free personal computers within the department. Cases were associated with users who brought diskettes from outside the department (5/5 cases versus 5/13 controls, p = .04) and with College of Pharmacy student users (3/5 cases versus 0/13 controls, p = .012). The detection of a virus-infected diskette or personal computer was associated with the number of 5 1/4-inch diskettes in the files of personal computers, a surrogate for rate of media exchange (mean = 17.4 versus 152.5, p = .018, Wilcoxon rank sum test). After education of departmental personal computer users regarding appropriate computer hygiene and installation of virus protection software, no further spread of personal computer viruses occurred, although 2 additional Stoned-infected and 1 Jerusalem-infected diskettes were detected. We recommend that virus detection software be installed on personal computers where the interchange of diskettes among computers is necessary, that write-protect tabs be placed on all program master diskettes and data diskettes where data are being read and not written, that in the event of a computer virus outbreak, all available diskettes be quarantined and scanned by virus detection software, and to facilitate quarantine and scanning in an outbreak, that diskettes be stored in organized files.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...
Code of Federal Regulations, 2012 CFR
2012-10-01
... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...
Affect, Risk and Uncertainty in Decision-Marking an Integrated Computational-Empirical Approach
2009-07-26
OF ABSTRACT UU 18. NUMBER O PAGES 61 19a. NAME OF RESPONSIBLE PERSON Eva Hudlicka, Ph.D. 19b. TELEPHONE NUMBER (include area code...developed by Hudlicka (2002; 2003). MAMID was designed with the explicit purpose to model the effects of affective states and personality traits on...influenced by risk and uncertainty? • How do personality traits and affective states facilitate or prevent the expression of particular types of
DDN (Defense Data Network) Protocol Implementations and Vendors Guide
1989-02-01
Announcement 286-259 6/16/86 MACHINE-TYPE/CPU: IBM RT/PC O/S: AIX DISTRIBUTOR: 1. IBM Marketing 2. IBM Authorized VAR’s 3. Authorized Personal Computer...Vendors Guide 12. PERSONAL AUTHOR(S) Dorio, Nan; Johnson, Marlyn; Lederman. Sol; Redfield, Elizabeth; Ward, Carol 13a. TYPE OF REPORT 13b. TIME COVERED 114...documentation, contact person , and distributor. The fourth section describes analysis tools. It includes information about network analysis products
Davidson, R W
1985-01-01
The increasing need to communicate to exchange data can be handled by personal microcomputers. The necessity for the transference of information stored in one type of personal computer to another type of personal computer is often encountered in the process of integrating multiple sources of information stored in different and incompatible computers in Medical Research and Practice. A practical example is demonstrated with two relatively inexpensive commonly used computers, the IBM PC jr. and the Apple IIe. The basic input/output (I/O) interface chip for serial communication for each computer are joined together using a Null connector and cable to form a communications link. Using BASIC (Beginner's All-purpose Symbolic Instruction Code) Computer Language and the Disk Operating System (DOS) the communications handshaking protocol and file transfer is established between the two computers. The BASIC programming languages used are Applesoft (Apple Personal Computer) and PC BASIC (IBM Personal computer).
Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.
Caruso, Ronald D
2003-01-01
Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003
Dry eye syndrome among computer users
NASA Astrophysics Data System (ADS)
Gajta, Aurora; Turkoanje, Daniela; Malaescu, Iosif; Marin, Catalin-Nicolae; Koos, Marie-Jeanne; Jelicic, Biljana; Milutinovic, Vuk
2015-12-01
Dry eye syndrome is characterized by eye irritation due to changes of the tear film. Symptoms include itching, foreign body sensations, mucous discharge and transitory vision blurring. Less occurring symptoms include photophobia and eye tiredness. Aim of the work was to determine the quality of the tear film and ocular dryness potential risk in persons who spend more than 8 hours using computers and possible correlations between severity of symptoms (dry eyes symptoms anamnesis) and clinical signs assessed by: Schirmer test I, TBUT (Tears break-up time), TFT (Tear ferning test). The results show that subjects using computer have significantly shorter TBUT (less than 5 s for 56 % of subjects and less than 10 s for 37 % of subjects), TFT type II/III in 50 % of subjects and type III 31% of subjects was found when compared to computer non users (TFT type I and II was present in 85,71% of subjects). Visual display terminal use, more than 8 hours daily, has been identified as a significant risk factor for dry eye. It's been advised to all persons who spend substantial time using computers to use artificial tears drops in order to minimize the symptoms of dry eyes syndrome and prevents serious complications.
Mathematics and My Career. A Collection of Essays.
ERIC Educational Resources Information Center
Turner, Nura Dorothea Rains, Ed.
The essays in this booklet have been written by persons who had ranked in the top one percent of the 1958-60 Upstate New York Mathematical Association of America Contests. Personal accounts are given of the role of mathematics in the authors' education and career. The careers described include applied mathematics, computer research and programing,…
ERIC Educational Resources Information Center
Huang, Yueh-Min; Liang, Tsung-Ho; Su, Yen-Ning; Chen, Nian-Shing
2012-01-01
Today various types of tablet computers are used, including iPad and Android Tablets. These individual portable digital devices can be used as e-book readers to support mobile personalized learning. Though many studies have investigated e-books by targeting undergraduate students, yet less attention has been paid to children. Therefore, an…
N-person differential games. Part 2: The penalty method
NASA Technical Reports Server (NTRS)
Chen, G.; Mills, W. H.; Zheng, Q.; Shaw, W. H.
1983-01-01
The equilibrium strategy for N-person differential games can be found by studying a min-max problem subject to differential systems constraints. The differential constraints are penalized and finite elements are used to compute numerical solutions. Convergence proof and error estimates are given. Numerical results are also included and compared with those obtained by the dual method.
ERIC Educational Resources Information Center
Dupont, Stephen
2000-01-01
Presents a selection of computers and peripherals designed to enhance the classroom. They include personal digital assistants (the AlphaSmart 30001R, CalcuScribe Duo, and DreamWriter IT); new Apple products (the iBook laptop, improved iMac, and OS 9 operating system); PC options (new Gateway and Compaq computers); and gadgets (imagiLab, the QX3…
Utilization of KSC Present Broadband Communications Data System for Digital Video Services
NASA Technical Reports Server (NTRS)
Andrawis, Alfred S.
2002-01-01
This report covers a visibility study of utilizing present KSC broadband communications data system (BCDS) for digital video services. Digital video services include compressed digital TV delivery and video-on-demand. Furthermore, the study examines the possibility of providing interactive video on demand to desktop personal computers via KSC computer network.
ERIC Educational Resources Information Center
Sahin, Alpaslan; Adiguzel, Tufan
2014-01-01
The purpose of this study is to investigate how international teachers, who were from overseas but taught in the United States, rate effective teacher qualities in three domains; personal, professional, and classroom management skills. The study includes 130 international mathematics, science, and computer teachers who taught in a multi-school…
Peter D. Knopp; Susan L. Stout
2014-01-01
This user's guide for the SILVAH computer program, version 6.2, supersedes the 1992 user's guide (Gen. Tech. Rep. NE-162). Designed for stand-alone Windows-based personal computers, SILVAH recommends a silvicultural prescription for a forest stand based on a summary and analysis of field inventory data. The program also includes a simulator that can be used...
Buying Your Next (or First) PC: What Matters Now?
ERIC Educational Resources Information Center
Crawford, Walt
1993-01-01
Discussion of factors to consider in purchasing a personal computer covers present and future needs, computing environments, memory, processing performance, disk size, and display quality. Issues such as bundled systems, where and when to purchase, and vendor support are addressed; and an annotated bibliography of 28 recent articles is included.…
Utilization of KSC Present Broadband Communications Data System For Digital Video Services
NASA Technical Reports Server (NTRS)
Andrawis, Alfred S.
2001-01-01
This report covers a visibility study of utilizing present KSC broadband communications data system (BCDS) for digital video services. Digital video services include compressed digital TV delivery and video-on-demand. Furthermore, the study examines the possibility of providing interactive video on demand to desktop personal computers via KSC computer network.
Li, Alice E.; Hogan, Timothy P.
2013-01-01
We systematically reviewed the health and social science literature on access to and use of information technologies by homeless persons by searching 5 bibliographic databases. Articles were included if they were in English, represented original research, appeared in peer-reviewed publications, and addressed our research questions. Sixteen articles met our inclusion criteria. We found that mobile phone ownership ranged from 44% to 62%; computer ownership, from 24% to 40%; computer access and use, from 47% to 55%; and Internet use, from 19% to 84%. Homeless persons used technologies for a range of purposes, some of which were health related. Many homeless persons had access to information technologies, suggesting possible health benefits to developing programs that link homeless persons to health care through mobile phones and the Internet. PMID:24148036
Boyer, Edward W; Smelson, David; Fletcher, Richard; Ziedonis, Douglas; Picard, Rosalind W
2010-06-01
Beneficial advances in the treatment of substance abuse and compliance with medical therapies, including HAART, are possible with new mobile technologies related to personal physiological sensing and computational methods. When incorporated into mobile platforms that allow for ubiquitous computing, these technologies have great potential for extending the reach of behavioral interventions from clinical settings where they are learned into natural environments.
Desktop Computing Integration Project
NASA Technical Reports Server (NTRS)
Tureman, Robert L., Jr.
1992-01-01
The Desktop Computing Integration Project for the Human Resources Management Division (HRMD) of LaRC was designed to help division personnel use personal computing resources to perform job tasks. The three goals of the project were to involve HRMD personnel in desktop computing, link mainframe data to desktop capabilities, and to estimate training needs for the division. The project resulted in increased usage of personal computers by Awards specialists, an increased awareness of LaRC resources to help perform tasks, and personal computer output that was used in presentation of information to center personnel. In addition, the necessary skills for HRMD personal computer users were identified. The Awards Office was chosen for the project because of the consistency of their data requests and the desire of employees in that area to use the personal computer.
ERIC Educational Resources Information Center
Wulfson, Stephen, Ed.
1990-01-01
Reviewed are six computer software packages including "Lunar Greenhouse,""Dyno-Quest,""How Weather Works,""Animal Trackers,""Personal Science Laboratory," and "The Skeletal and Muscular Systems." Availability, functional, and hardware requirements are discussed. (CW)
A demonstrative model of a lunar base simulation on a personal computer
NASA Technical Reports Server (NTRS)
1985-01-01
The initial demonstration model of a lunar base simulation is described. This initial model was developed on the personal computer level to demonstrate feasibility and technique before proceeding to a larger computer-based model. Lotus Symphony Version 1.1 software was used to base the demonstration model on an personal computer with an MS-DOS operating system. The personal computer-based model determined the applicability of lunar base modeling techniques developed at an LSPI/NASA workshop. In addition, the personnal computer-based demonstration model defined a modeling structure that could be employed on a larger, more comprehensive VAX-based lunar base simulation. Refinement of this personal computer model and the development of a VAX-based model is planned in the near future.
75 FR 2511 - Manual for Courts-Martial; Proposed Amendments
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... persons of the same or opposite sex; (b) Bestiality; (c) Masturbation; (d) Sadistic or masochistic abuse...'' includes any developed or undeveloped photograph, picture, film or video; any digital or computer image, picture, film or video made by any means, including those transmitted by any means including streaming...
Integration of the Execution Support System for the Computer-Aided Prototyping System (CAPS)
1990-09-01
SUPPORT SYSTEM FOR THE COMPUTER -AIDED PROTOTYPING SYSTEM (CAPS) by Frank V. Palazzo September 1990 Thesis Advisor: Luq± Approved for public release...ZATON REPOR ,,.VBE (, 6a NAME OF PERPORMING ORGAN ZAT7ON 6b OFF:CE SYVBOL 7a NAME OF MONITORINC O0-CA’Za- ON Computer Science Department (if applicable...Include Security Classification) Integration of the Execution Support System for the Computer -Aided Prototyping System (C S) 12 PERSONAL AUTHOR(S) Frank V
Breaking Free with Wireless Networks.
ERIC Educational Resources Information Center
Fleischman, John
2002-01-01
Discusses wireless local area networks (LANs) which typically consist of laptop computers that connect to fixed access points via infrared or radio signals. Topics include wide area networks; personal area networks; problems, including limitations of available bandwidth, interference, and security concerns; use in education; interoperability;…
ERIC Educational Resources Information Center
Perez, Ernest
1997-01-01
Examines the practical realities of upgrading Intel personal computers in libraries, considering budgets and technical personnel availability. Highlights include adding RAM; putting in faster processor chips, including clock multipliers; new hard disks; CD-ROM speed; motherboards and interface cards; cost limits and economic factors; and…
Comparative study of methods for recognition of an unknown person's action from a video sequence
NASA Astrophysics Data System (ADS)
Hori, Takayuki; Ohya, Jun; Kurumisawa, Jun
2009-02-01
This paper proposes a Tensor Decomposition Based method that can recognize an unknown person's action from a video sequence, where the unknown person is not included in the database (tensor) used for the recognition. The tensor consists of persons, actions and time-series image features. For the observed unknown person's action, one of the actions stored in the tensor is assumed. Using the motion signature obtained from the assumption, the unknown person's actions are synthesized. The actions of one of the persons in the tensor are replaced by the synthesized actions. Then, the core tensor for the replaced tensor is computed. This process is repeated for the actions and persons. For each iteration, the difference between the replaced and original core tensors is computed. The assumption that gives the minimal difference is the action recognition result. For the time-series image features to be stored in the tensor and to be extracted from the observed video sequence, the human body silhouette's contour shape based feature is used. To show the validity of our proposed method, our proposed method is experimentally compared with Nearest Neighbor rule and Principal Component analysis based method. Experiments using 33 persons' seven kinds of action show that our proposed method achieves better recognition accuracies for the seven actions than the other methods.
Mu, Zhendong; Yin, Jinhai; Hu, Jianfeng
2018-01-01
In this paper, a person authentication system that can effectively identify individuals by generating unique electroencephalogram signal features in response to self-face and non-self-face photos is presented. In order to achieve a good stability performance, the sequence of self-face photo including first-occurrence position and non-first-occurrence position are taken into account in the serial occurrence of visual stimuli. In addition, a Fisher linear classification method and event-related potential technique for feature analysis is adapted to yield remarkably better outcomes than that by most of the existing methods in the field. The results have shown that the EEG-based person authentications via brain-computer interface can be considered as a suitable approach for biometric authentication system.
ERIC Educational Resources Information Center
Sim, KwongNui; Butson, Russell
2014-01-01
This scoping study examines the degree to which twenty two undergraduate students used their personal computers to support their academic study. The students were selected based on their responses to a questionnaire aimed at gauging their degree of computer skill. Computer activity data was harvested from the personal computers of eighteen…
Tactile Radar: experimenting a computer game with visually disabled.
Kastrup, Virgínia; Cassinelli, Alvaro; Quérette, Paulo; Bergstrom, Niklas; Sampaio, Eliana
2017-09-18
Visually disabled people increasingly use computers in everyday life, thanks to novel assistive technologies better tailored to their cognitive functioning. Like sighted people, many are interested in computer games - videogames and audio-games. Tactile-games are beginning to emerge. The Tactile Radar is a device through which a visually disabled person is able to detect distal obstacles. In this study, it is connected to a computer running a tactile-game. The game consists in finding and collecting randomly arranged coins in a virtual room. The study was conducted with nine congenital blind people including both sexes, aged 20-64 years old. Complementary methods of first and third person were used: the debriefing interview and the quasi-experimental design. The results indicate that the Tactile Radar is suitable for the creation of computer games specifically tailored for visually disabled people. Furthermore, the device seems capable of eliciting a powerful immersive experience. Methodologically speaking, this research contributes to the consolidation and development of first and third person complementary methods, particularly useful in disabled people research field, including the evaluation by users of the Tactile Radar effectiveness in a virtual reality context. Implications for rehabilitation Despite the growing interest in virtual games for visually disabled people, they still find barriers to access such games. Through the development of assistive technologies such as the Tactile Radar, applied in virtual games, we can create new opportunities for leisure, socialization and education for visually disabled people. The results of our study indicate that the Tactile Radar is adapted to the creation of video games for visually disabled people, providing a playful interaction with the players.
Computer-assisted instruction and diagnosis of radiographic findings.
Harper, D; Butler, C; Hodder, R; Allman, R; Woods, J; Riordan, D
1984-04-01
Recent advances in computer technology, including high bit-density storage, digital imaging, and the ability to interface microprocessors with videodisk, create enormous opportunities in the field of medical education. This program, utilizing a personal computer, videodisk, BASIC language, a linked textfile system, and a triangulation approach to the interpretation of radiographs developed by Dr. W. L. Thompson, can enable the user to engage in a user-friendly, dynamic teaching program in radiology, applicable to various levels of expertise. Advantages include a relatively more compact and inexpensive system with rapid access and ease of revision which requires little instruction to the user.
Electronic spreadsheet vs. manual payroll.
Kiley, M M
1991-01-01
Medical groups with direct employees must employ someone or contract with a company to compute payroll, writes Michael Kiley, Ph.D., M.P.H. However, many medical groups, including small ones, own a personal or minicomputer to handle accounts receivable. Kiley explains, in detail, how this same computer and a spreadsheet program also can be used to perform payroll functions.
Energy star. (Latest citations from the Computer database). Published Search
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The bibliography contains citations concerning a collaborative effort between the Environmental Protection Agency (EPA) and private industry to reduce electrical power consumed by personal computers and related peripherals. Manufacturers complying with EPA guidelines are officially recognized by award of a special Energy Star logo, and are referred to in official documents as a vendor of green computers. (Contains a minimum of 81 citations and includes a subject term index and title list.)
Energy star. (Latest citations from the Computer database). Published Search
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
The bibliography contains citations concerning a collaborative effort between the Environmental Protection Agency (EPA) and private industry to reduce electrical power consumed by personal computers and related peripherals. Manufacturers complying with EPA guidelines are officially recognized by award of a special Energy Star logo, and are referred to in official documents as a vendor of green computers. (Contains a minimum of 234 citations and includes a subject term index and title list.)
2006-10-01
NCAPS ) Christina M. Underhill, Ph.D. Approved for public release; distribution is unlimited. NPRST-TN-06-9 October 2006...Investigation of Item-Pair Presentation and Construct Validity of the Navy Computer Adaptive Personality Scales ( NCAPS ) Christina M. Underhill, Ph.D...documents one of the steps in our development of the Navy Computer Adaptive Personality Scales ( NCAPS ). NCAPS is a computer adaptive personality measure
47 CFR 15.102 - CPU boards and power supplies used in personal computers.
Code of Federal Regulations, 2013 CFR
2013-10-01
... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...
47 CFR 15.102 - CPU boards and power supplies used in personal computers.
Code of Federal Regulations, 2011 CFR
2011-10-01
... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...
47 CFR 15.102 - CPU boards and power supplies used in personal computers.
Code of Federal Regulations, 2010 CFR
2010-10-01
... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...
47 CFR 15.102 - CPU boards and power supplies used in personal computers.
Code of Federal Regulations, 2014 CFR
2014-10-01
... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...
47 CFR 15.102 - CPU boards and power supplies used in personal computers.
Code of Federal Regulations, 2012 CFR
2012-10-01
... computers. 15.102 Section 15.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Unintentional Radiators § 15.102 CPU boards and power supplies used in personal computers. (a... modifications that must be made to a personal computer, peripheral device, CPU board or power supply during...
NASA Technical Reports Server (NTRS)
Bechtel, R. D.; Mateos, M. A.; Lincoln, K. A.
1988-01-01
Briefly described are the essential features of a computer program designed to interface a personal computer with the fast, digital data acquisition system of a time-of-flight mass spectrometer. The instrumentation was developed to provide a time-resolved analysis of individual vapor pulses produced by the incidence of a pulsed laser beam on an ablative material. The high repetition rate spectrometer coupled to a fast transient recorder captures complete mass spectra every 20 to 35 microsecs, thereby providing the time resolution needed for the study of this sort of transient event. The program enables the computer to record the large amount of data generated by the system in short time intervals, and it provides the operator the immediate option of presenting the spectral data in several different formats. Furthermore, the system does this with a high degree of automation, including the tasks of mass labeling the spectra and logging pertinent instrumental parameters.
Development of a PC-based ground support system for a small satellite instrument
NASA Astrophysics Data System (ADS)
Deschambault, Robert L.; Gregory, Philip R.; Spenler, Stephen; Whalen, Brian A.
1993-11-01
The importance of effective ground support for the remote control and data retrieval of a satellite instrument cannot be understated. Problems with ground support may include the need to base personnel at a ground tracking station for extended periods, and the delay between the instrument observation and the processing of the data by the science team. Flexible solutions to such problems in the case of small satellite systems are provided by using low-cost, powerful personal computers and off-the-shelf software for data acquisition and processing, and by using Internet as a communication pathway to enable scientists to view and manipulate satellite data in real time at any ground location. The personal computer based ground support system is illustrated for the case of the cold plasma analyzer flown on the Freja satellite. Commercial software was used as building blocks for writing the ground support equipment software. Several levels of hardware support, including unit tests and development, functional tests, and integration were provided by portable and desktop personal computers. Satellite stations in Saskatchewan and Sweden were linked to the science team via phone lines and Internet, which provided remote control through a central point. These successful strategies will be used on future small satellite space programs.
Scrap computer recycling in Taiwan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, C.H.; Chang, S.L.; Wang, K.M.
1999-07-01
It is estimated that approximately 700,000 scrap personal computers will be generated each year in Taiwan. The disposal of such a huge amount of scrap computers presents a difficult task for the island due to the scarcity of landfills and incineration facilities available locally. Also, the hazardous materials contained in the scrap computers may cause serious pollution to the environment, if they are not properly disposed. Thus, EPA of Taiwan has declared scrap personal computers as a producer responsibility recycling product on July 1997 to mandate that the manufacturers, importers and sellers of personal computers have to recover and recyclemore » their scrap computers properly. Beginning on June 1, 1998, a scrap computer recycling plan is officially implemented on the island. Under this plan, consumers can deliver their unwanted personal computers to the designated collection points to receive reward money. Currently, only six items are mandated to be recycled in this recycling plan. They are notebooks, monitor and the hard disk, power supply, printed circuit board and shell of the main frame of the personal computer. This paper presents the current scrap computer recycling system in Taiwan.« less
Weyand, Sabine; Takehara-Nishiuchi, Kaori; Chau, Tom
2015-10-30
Near-infrared spectroscopy (NIRS) brain-computer interfaces (BCIs) enable users to interact with their environment using only cognitive activities. This paper presents the results of a comparison of four methodological frameworks used to select a pair of tasks to control a binary NIRS-BCI; specifically, three novel personalized task paradigms and the state-of-the-art prescribed task framework were explored. Three types of personalized task selection approaches were compared, including: user-selected mental tasks using weighted slope scores (WS-scores), user-selected mental tasks using pair-wise accuracy rankings (PWAR), and researcher-selected mental tasks using PWAR. These paradigms, along with the state-of-the-art prescribed mental task framework, where mental tasks are selected based on the most commonly used tasks in literature, were tested by ten able-bodied participants who took part in five NIRS-BCI sessions. The frameworks were compared in terms of their accuracy, perceived ease-of-use, computational time, user preference, and length of training. Most notably, researcher-selected personalized tasks resulted in significantly higher accuracies, while user-selected personalized tasks resulted in significantly higher perceived ease-of-use. It was also concluded that PWAR minimized the amount of data that needed to be collected; while, WS-scores maximized user satisfaction and minimized computational time. In comparison to the state-of-the-art prescribed mental tasks, our findings show that overall, personalized tasks appear to be superior to prescribed tasks with respect to accuracy and perceived ease-of-use. The deployment of personalized rather than prescribed mental tasks ought to be considered and further investigated in future NIRS-BCI studies. Copyright © 2015 Elsevier B.V. All rights reserved.
Assessing medical residents' usage and perceived needs for personal digital assistants.
Barrett, James R; Strayer, Scott M; Schubart, Jane R
2004-02-01
Health care professionals need information delivery tools for accessing information at the point of patient care. Personal digital assistants (PDAs), or hand-held devices demonstrate great promise as point of care information devices. An earlier study [The Constellation Project: experience and evaluation of personal digital assistants in the clinical environment, in: Proceedings of the 19th Annual Symposium on Computer Applications in Medical Care, 1995, 678] on the use of PDAs at the point of care found that hardware constraints, such as memory capability limited their usefulness, however, they were used frequently for accessing medical references and drug information [The Constellation Project: experience and evaluation of personal digital assistants in the clinical environment, in: Proceedings of the 19th Annual Symposium on Computer Applications in Medical Care, 1995, 678]. Since this study was completed in 1995, hand-held computer technology has advanced rapidly, and between 26 and 50% of physicians currently use PDAs [Physician's use of hand-helds increases from 15% in 1999 to 26% in 2001: Harris interactive poll results, Harris Poll. 8-24-2002 (electronic citation); ACP-ASIM survey finds nearly half of U.S. members use hand-held computers: ACP-ASIM press release, American College of Physicians, 9-3-2002 (electronic citation)]. This use appears higher among residents, with one recent study finding that over two-thirds of family practice residencies use hand-held computers in their training programs [J. Am. Med. Inform. Assoc. 9 (1) (2002) 80]. In this study, we systematically evaluate PDA usage by residents in our institution using quantitative and qualitative methods. Our evaluation included a brief on-line survey of 88 residents in seven residency programs including primary care and specialty practices. The surveys were completed between 26 October 2001 and 30 April 2002. Follow-up interviews with 15 of the surveyed residents were then conducted between 24 April 2002 and 13 May 2002. The original contributions of this study are the evaluation of residents in primary and specialty programs and evaluation of both medical application software and the conventional personal organizational software (such as calendars and to-do lists). This evaluation was also conducted using significantly advanced hardware and software compared with previous studies [The Constellation Project: experience and evaluation of personal digital assistants in the clinical environment, in: Proceedings of the 19th Annual Symposium on Computer Applications in Medical Care, 1995, 678]. Results of our survey and follow-up interviews of residents showed most residents use PDAs daily, regardless of practice or whether their program encourages PDAs. Uses include commercial medical references and personal organization software, such as calendars and address books. Concerns and drawbacks mentioned by these residents included physical size of the PDA and the potential for catastrophic data loss. Another issue raised by our results suggests that security and Health Information Portability and Accountability Act (HIPAA) compliance need to be addressed, in part by resident education about securing patient data on PDAs. Overall, PDAs may become even more widely used if two issues can be addressed: (a) providing secure clinical data for the current patients of a given resident, and (b) allaying concerns of catastrophic data loss from their PDAs (e.g. by educating residents about procedures to recover information from PDA backup files).
The Technology Refresh Program: Affording State-of-the Art Personal Computing.
ERIC Educational Resources Information Center
Spiwak, Rand
2000-01-01
Describes the Florida Community College Technology Refresh Program in which 28 Florida community colleges refresh their personal computer technology on a three-year cyclical basis through negotiation of a contract with Dell Computer Corporation. Discusses the contract highlights (such as a 22.5 percent discount on personal computers and on-site…
Using Personal Computers To Acquire Special Education Information. Revised. ERIC Digest #429.
ERIC Educational Resources Information Center
ERIC Clearinghouse on Handicapped and Gifted Children, Reston, VA.
This digest offers basic information about resources, available to users of personal computers, in the area of professional development in special education. Two types of resources are described: those that can be purchased on computer diskettes and those made available by linking personal computers through electronic telephone networks. Resources…
Computer Needs of Severely Mentally Retarded Persons.
ERIC Educational Resources Information Center
Flanagan, Kelly
1982-01-01
The article reviews technology applicable for use by severely mentally retarded learners. Descriptions are given of assistive devices (including communication aids), controls and interfaces (such as single switch access to standard software), and software (including games to teach cause and effect and simple matching and counting). (CL)
ERIC Educational Resources Information Center
Mitchell, Donald P.; Scigliano, John A.
2000-01-01
Describes the development of an online learning environment for a visually impaired professional. Topics include physical barriers, intellectual barriers, psychological barriers, and technological barriers; selecting appropriate hardware and software; and combining technologies that include personal computers, Web-based resources, network…
NASA Technical Reports Server (NTRS)
Watson, V. R.
1983-01-01
A personal computer has been used to illustrate physical phenomena and problem solution techniques in engineering classes. According to student evaluations, instruction of concepts was greatly improved through the use of these illustrations. This paper describes the class of phenomena that can be effectively illustrated, the techniques used to create these illustrations, and the techniques used to display the illustrations in regular classrooms and over an instructional TV network. The features of a personal computer required to apply these techniques are listed. The capabilities of some present personal computers are discussed and a forecast of the capabilities of future personal computers is presented.
Energy star. (Latest citations from the Computer database). Published Search
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
The bibliography contains citations concerning a collaborative effort between the Environmental Protection Agency (EPA) and private industry to reduce electrical power consumed by personal computers and related peripherals. Manufacturers complying with EPA guidelines are officially recognized by award of a special Energy Star logo, and are referred to in official documents as a vendor of green computers. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)
Power and Energy Considerations at Forward Operating Bases (FOBs)
2010-06-16
systems • Anticipated additional plug loads by users – Personal Computers and Gaming Devices – Coffee Pots – Refrigerators – Lights – Personal Heaters...effort was made to account for the significant amount of equipment that consumes power not on the unit’s MTOE (printers, plotters, coffee pots, etc...50 Warfighters including billeting, kitchen, laundry, shower, latrines, and new wastewater treatment system Capability/impact: Compact, lightweight
Revision and Expansion of Navy Computer Adaptive Personality Scales (NCAPS)
2007-08-01
Nav Pesne Reerh Stde, an Technolg y Dii sio Revision and Expansion of Navy Computer Adaptive Personality Scales ( NCAPS ) Robert J. Schneider, Ph.D...TN-o7-12 August 2007 Revision and Expansion of Navy Computer Adaptive Personality Scales ( NCAPS ) Robert J. Schneider, Ph.D. Kerri L. Ferstl, Ph.D...03/31/2006 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Revision and Expansion of Navy Computer Adaptive Personality Scales ( NCAPS ) 5b. GRANT NUMBER 5c
2006-10-01
Investigation of Item-Pair Presentation and Construct Validity of the Navy Computer Adaptive Personality Scales ( NCAPS ) Christina M. Underhill, Ph.D...Construct Validity of the Navy Computer Adaptive Personality Scales ( NCAPS ) Christina M. Underhill, Ph.D. Reviewed and Approved by Jacqueline A. Mottern...and Construct Validity of the Navy Computer Adaptive Personality Scales ( NCAPS ) 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 0602236N and 0603236N 6
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-14
... include cloud computing applications that allow for personalized accessible interfaces. The RERC must... the article search feature at: www.federalregister.gov . Specifically, through the advanced search...
26 CFR 301.7216-1 - Penalty for disclosure or use of tax return information.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., including a person who develops software that is used to prepare or file a tax return and any Authorized IRS... purchases computer software designed to assist with the preparation and filing of her income tax return. When A loads the software onto her computer, it prompts her to register her purchase of the software...
26 CFR 301.7216-1 - Penalty for disclosure or use of tax return information.
Code of Federal Regulations, 2012 CFR
2012-04-01
..., including a person who develops software that is used to prepare or file a tax return and any Authorized IRS... purchases computer software designed to assist with the preparation and filing of her income tax return. When A loads the software onto her computer, it prompts her to register her purchase of the software...
Active optical control system design of the SONG-China Telescope
NASA Astrophysics Data System (ADS)
Ye, Yu; Kou, Songfeng; Niu, Dongsheng; Li, Cheng; Wang, Guomin
2012-09-01
The standard SONG node structure of control system is presented. The active optical control system of the project is a distributed system, and a host computer and a slave intelligent controller are included. The host control computer collects the information from wave front sensor and sends commands to the slave computer to realize a closed loop model. For intelligent controller, a programmable logic controller (PLC) system is used. This system combines with industrial personal computer (IPC) and PLC to make up a control system with powerful and reliable.
Spacecraft crew procedures from paper to computers
NASA Technical Reports Server (NTRS)
Oneal, Michael; Manahan, Meera
1991-01-01
Described here is a research project that uses human factors and computer systems knowledge to explore and help guide the design and creation of an effective Human-Computer Interface (HCI) for spacecraft crew procedures. By having a computer system behind the user interface, it is possible to have increased procedure automation, related system monitoring, and personalized annotation and help facilities. The research project includes the development of computer-based procedure system HCI prototypes and a testbed for experiments that measure the effectiveness of HCI alternatives in order to make design recommendations. The testbed will include a system for procedure authoring, editing, training, and execution. Progress on developing HCI prototypes for a middeck experiment performed on Space Shuttle Mission STS-34 and for upcoming medical experiments are discussed. The status of the experimental testbed is also discussed.
Development of qualification guidelines for personal computer-based aviation training devices.
DOT National Transportation Integrated Search
1995-02-01
Recent advances in the capabilities of personal computers have resulted in an increase in the number of flight simulation programs made available as Personal Computer-Based Aviation Training Devices (PCATDs).The potential benefits of PCATDs have been...
Walther, Birte; Morgenstern, Matthis; Hanewinkel, Reiner
2012-01-01
To investigate co-occurrence and shared personality characteristics of problematic computer gaming, problematic gambling and substance use. Cross-sectional survey data were collected from 2,553 German students aged 12-25 years. Self-report measures of substance use (alcohol, tobacco and cannabis), problematic gambling (South Oaks Gambling Screen - Revised for Adolescents, SOGS-RA), problematic computer gaming (Video Game Dependency Scale, KFN-CSAS-II), and of twelve different personality characteristics were obtained. Analyses revealed positive correlations between tobacco, alcohol and cannabis use and a smaller positive correlation between problematic gambling and problematic computer gaming. Problematic computer gaming co-occurred only with cannabis use, whereas problematic gambling was associated with all three types of substance use. Multivariate multilevel analyses showed differential patterns of personality characteristics. High impulsivity was the only personality characteristic associated with all five addictive behaviours. Depression and extraversion were specific to substance users. Four personality characteristics were specifically associated with problematic computer gaming: irritability/aggression, social anxiety, ADHD, and low self-esteem. Problematic gamblers seem to be more similar to substance users than problematic computer gamers. From a personality perspective, results correspond to the inclusion of gambling in the same DSM-V category as substance use and question a one-to-one proceeding for computer gaming. Copyright © 2012 S. Karger AG, Basel.
7 CFR 3560.303 - Housing project budgets.
Code of Federal Regulations, 2010 CFR
2010-01-01
... personnel costs of permanent and part-time staff assigned directly to the project site. This includes... incentive or annual bonuses; (I) Direct costs of travel to off-site locations by on-site staff for property... computers are also included (if approved by the Agency). (J) Real estate taxes (personal tangible property...
Taming the Wireless Frontier: PDAs, Tablets, and Laptops at Home on the Range.
ERIC Educational Resources Information Center
Williams, Joe
2003-01-01
Explains how Texas A&M University libraries developed a wireless network, including problems encountered, and describes three wireless services currently being delivered using Personal Digital Assistants (PDAs), tablet PCs, and wireless laptop computers. Topics include costs versus value; data security and access; wireless access points;…
Precollege Computer Literacy: A Personal Computing Approach. Second Edition.
ERIC Educational Resources Information Center
Moursund, David
Intended for elementary and secondary teachers and curriculum specialists, this booklet discusses and defines computer literacy as a functional knowledge of computers and their effects on students and the rest of society. It analyzes personal computing and the aspects of computers that have direct impact on students. Outlining computer-assisted…
ERIC Educational Resources Information Center
Liew, Tze Wei; Tan, Su-Mae; Seydali, Rouzbeh
2014-01-01
In this article, the effects of personalized narration in multimedia learning on learners' computer perceptions and task-related attitudes were examined. Twenty-six field independent and 22 field dependent participants studied the computer-based multimedia lessons on C-Programming, either with personalized narration or non-personalized narration.…
Computer Center: Setting Up a Microcomputer Center--1 Person's Perspective.
ERIC Educational Resources Information Center
Duhrkopf, Richard, Ed.; Collins, Michael, A. J., Ed.
1988-01-01
Considers eight components to be considered in setting up a microcomputer center for use with college classes. Discussions include hardware, software, physical facility, furniture, technical support, personnel, continuing financial expenditures, and security. (CW)
Office Computer Software: A Comprehensive Review of Software Programs.
ERIC Educational Resources Information Center
Secretary, 1992
1992-01-01
Describes types of software including system software, application software, spreadsheets, accounting software, graphics packages, desktop publishing software, database, desktop and personal information management software, project and records management software, groupware, and shareware. (JOW)
Personality Types and Affinity for Computers
1991-03-01
differences on personality dimensions between the respondents, and to explore the relationship between these differences and computer affinity. The results...between the respondents, and to explore the relationship between these differences and computer affinity. The results revealed no significant differences...type to this measure of computer affinity. 2 II. LITERATURZ REVIEW The interest of this study was the relationship between a person’s psychological
Contraceptive efficacy of the personal hormone monitoring system Persona.
Trussell, J
1999-07-01
This is a commentary on the contraceptive effectiveness of the personal hormone-monitoring system Persona; it points out the various errors committed in computing method pregnancy rates. The modifications presented by Bonnar et al. on the incorrect procedure for computing method pregnancy rates are criticized as erroneous because the denominator includes cycles in which there is no risk of a method pregnancy according to the authors' algorithm for classifying pregnancy in an imperfect-use cycle. It is also claimed that the new exercise is a more complicated and less accurate way of computing for pregnancy rates by comparison with the simpler alternative. Since this new algorithm, used in the Persona system, is based on flawed logic, the annual risk of pregnancy is actually higher than the estimated 6% among women using Persona and having intercourse in each cycle except on red days.
Assessing Functional Performance using a Computer-Based Simulations of Everyday Activities
Czaja, Sara J.; Loewenstein, David A.; Lee, Chin Chin; Fu, Shih Hua; Harvey, Philip D.
2016-01-01
Current functional capacity (FC) measures for patients with schizophrenia typically involve informant assessments or are in paper and pencil format, requiring in-person administration by a skilled assessor. This approach presents logistic problems and limits the possibilities for remote assessment, an important issue for these patients. This study evaluated the feasibility of using a computer-based assessment battery, including simulations of everyday activities. The battery was compared to in-person standard assessments of cognition and FC with respect to baseline convergence and sensitivity to group differences. The battery, administered on a touch screen computer, included measures of critical everyday activities, including: ATM Banking/Financial Management, Prescriptions Refill via Telephone/Voice Menu System, and Forms Completion (simulating a clinic and patient history form). The sample included 77 older adult patients with schizophrenia and 24 older adult healthy controls that were administered the battery at two time points. The results indicated that the battery was sensitive to group differences in FC. Performance on the battery was also moderately correlated with standard measures of cognitive abilities and showed convergence with standard measures of FC, while demonstrating good test-retest reliability. Our results show that it is feasible to use technology-based assessment protocols with older adults and patients with schizophrenia. The battery overcomes logistic constraints associated with current FC assessment protocols as the battery is computer-based, can be delivered remotely and does not require a healthcare professional for administration. PMID:27913159
Factors leading to the computer vision syndrome: an issue at the contemporary workplace.
Izquierdo, Juan C; García, Maribel; Buxó, Carmen; Izquierdo, Natalio J
2007-01-01
Vision and eye related problems are common among computer users, and have been collectively called the Computer Vision Syndrome (CVS). An observational study in order to identify the risk factors leading to the CVS was done. Twenty-eight participants answered a validated questionnaire, and had their workstations examined. The questionnaire evaluated personal, environmental, ergonomic factors, and physiologic response of computer users. The distance from the eye to the computers' monitor (A), the computers' monitor height (B), and visual axis height (C) were measured. The difference between B and C was calculated and labeled as D. Angles of gaze to the computer monitor were calculated using the formula: angle=tan-1(D/A). Angles were divided into two groups: participants with angles of gaze ranging from 0 degree to 13.9 degrees were included in Group 1; and participants gazing at angles larger than 14 degrees were included in Group 2. Statistical analysis of the evaluated variables was made. Computer users in both groups used more tear supplements (as part of the syndrome) than expected. This association was statistically significant (p < 0.10). Participants in Group 1 reported more pain than participants in Group 2. Associations between the CVS and other personal or ergonomic variables were not statistically significant. Our findings show that the most important factor leading to the syndrome is the angle of gaze at the computer monitor. Pain in computer users is diminished when gazing downwards at angles of 14 degrees or more. The CVS remains an under estimated and poorly understood issue at the workplace. The general public, health professionals, the government, and private industries need to be educated about the CVS.
Factors leading to the Computer Vision Syndrome: an issue at the contemporary workplace.
Izquierdo, Juan C; García, Maribel; Buxó, Carmen; Izquierdo, Natalio J
2004-01-01
Vision and eye related problems are common among computer users, and have been collectively called the Computer Vision Syndrome (CVS). An observational study in order to identify the risk factors leading to the CVS was done. Twenty-eight participants answered a validated questionnaire, and had their workstations examined. The questionnaire evaluated personal, environmental, ergonomic factors, and physiologic response of computer users. The distance from the eye to the computers' monitor (A), the computers' monitor height (B), and visual axis height (C) were measured. The difference between B and C was calculated and labeled as D. Angles of gaze to the computer monitor were calculated using the formula: angle=tan(-1)(D/ A). Angles were divided into two groups: participants with angles of gaze ranging from 0 degrees to 13.9 degrees were included in Group 1; and participants gazing at angles larger than 14 degrees were included in Group 2. Statistical analysis of the evaluated variables was made. Computer users in both groups used more tear supplements (as part of the syndrome) than expected. This association was statistically significant (p<0.10). Participants in Group 1 reported more pain than participants in Group 2. Associations between the CVS and other personal or ergonomic variables were not statistically significant. Our findings show that most important factor leading to the syndrome is the angle of gaze at the computer monitor. Pain in computer users is diminished when gazing downwards at angles of 14 degrees or more. The CVS remains an under estimated and poorly understood issue at the workplace. The general public, health professionals, the government, and private industries need to be educated about the CVS.
NASA Technical Reports Server (NTRS)
Wright, Jeffrey; Thakur, Siddharth
2006-01-01
Loci-STREAM is an evolving computational fluid dynamics (CFD) software tool for simulating possibly chemically reacting, possibly unsteady flows in diverse settings, including rocket engines, turbomachines, oil refineries, etc. Loci-STREAM implements a pressure- based flow-solving algorithm that utilizes unstructured grids. (The benefit of low memory usage by pressure-based algorithms is well recognized by experts in the field.) The algorithm is robust for flows at all speeds from zero to hypersonic. The flexibility of arbitrary polyhedral grids enables accurate, efficient simulation of flows in complex geometries, including those of plume-impingement problems. The present version - Loci-STREAM version 0.9 - includes an interface with the Portable, Extensible Toolkit for Scientific Computation (PETSc) library for access to enhanced linear-equation-solving programs therein that accelerate convergence toward a solution. The name "Loci" reflects the creation of this software within the Loci computational framework, which was developed at Mississippi State University for the primary purpose of simplifying the writing of complex multidisciplinary application programs to run in distributed-memory computing environments including clusters of personal computers. Loci has been designed to relieve application programmers of the details of programming for distributed-memory computers.
A CLIPS based personal computer hardware diagnostic system
NASA Technical Reports Server (NTRS)
Whitson, George M.
1991-01-01
Often the person designated to repair personal computers has little or no knowledge of how to repair a computer. Described here is a simple expert system to aid these inexperienced repair people. The first component of the system leads the repair person through a number of simple system checks such as making sure that all cables are tight and that the dip switches are set correctly. The second component of the system assists the repair person in evaluating error codes generated by the computer. The final component of the system applies a large knowledge base to attempt to identify the component of the personal computer that is malfunctioning. We have implemented and tested our design with a full system to diagnose problems for an IBM compatible system based on the 8088 chip. In our tests, the inexperienced repair people found the system very useful in diagnosing hardware problems.
Direct medical cost of overweight and obesity in the United States: a quantitative systematic review
Tsai, Adam Gilden; Williamson, David F.; Glick, Henry A.
2010-01-01
Objectives To estimate per-person and aggregate direct medical costs of overweight and obesity and to examine the effect of study design factors. Methods PubMed (1968–2009), EconLit (1969–2009), and Business Source Premier (1995–2009) were searched for original studies. Results were standardized to compute the incremental cost per overweight person and per obese person, and to compute the national aggregate cost. Results A total of 33 U.S. studies met review criteria. Among the 4 highest quality studies, the 2008 per-person direct medical cost of overweight was $266 and of obesity was $1723. The aggregate national cost of overweight and obesity combined was $113.9 billion. Study design factors that affected cost estimate included: use of national samples versus more selected populations; age groups examined; inclusion of all medical costs versus obesity-related costs only; and BMI cutoffs for defining overweight and obesity. Conclusions Depending on the source of total national health care expenditures used, the direct medical cost of overweight and obesity combined is approximately 5.0% to 10% of U.S. health care spending. Future studies should include nationally representative samples, evaluate adults of all ages, report all medical costs, and use standard BMI cutoffs. PMID:20059703
An Implemented Strategy for Campus Connectivity and Cooperative Computing.
ERIC Educational Resources Information Center
Halaris, Antony S.; Sloan, Lynda W.
1989-01-01
ConnectPac, a software package developed at Iona College to allow a computer user to access all services from a single personal computer, is described. ConnectPac uses mainframe computing to support a campus computing network, integrating personal and centralized computing into a menu-driven user environment. (Author/MLW)
Analysis and Representation of Miscellaneous Electric Loads in NEMS
2017-01-01
Miscellaneous Electric Loads (MELs) comprise a growing portion of delivered energy consumption in residential and commercial buildings. Miscellaneous end uses—including televisions, personal computers, security systems, data center servers, and many other devices—have continued to penetrate into building-related market segments. Part of this proliferation of devices and equipment can be attributed to increased service demand for entertainment, computing, and convenience appliances.
Orbiter Flying Qualities (OFQ) Workstation user's guide
NASA Technical Reports Server (NTRS)
Myers, Thomas T.; Parseghian, Zareh; Hogue, Jeffrey R.
1988-01-01
This project was devoted to the development of a software package, called the Orbiter Flying Qualities (OFQ) Workstation, for working with the OFQ Archives which are specially selected sets of space shuttle entry flight data relevant to flight control and flying qualities. The basic approach to creation of the workstation software was to federate and extend commercial software products to create a low cost package that operates on personal computers. Provision was made to link the workstation to large computers, but the OFQ Archive files were also converted to personal computer diskettes and can be stored on workstation hard disk drives. The primary element of the workstation developed in the project is the Interactive Data Handler (IDH) which allows the user to select data subsets from the archives and pass them to specialized analysis programs. The IDH was developed as an application in a relational database management system product. The specialized analysis programs linked to the workstation include a spreadsheet program, FREDA for spectral analysis, MFP for frequency domain system identification, and NIPIP for pilot-vehicle system parameter identification. The workstation also includes capability for ensemble analysis over groups of missions.
Computer interfaces for the visually impaired
NASA Technical Reports Server (NTRS)
Higgins, Gerry
1991-01-01
Information access via computer terminals extends to blind and low vision persons employed in many technical and nontechnical disciplines. Two aspects are detailed of providing computer technology for persons with a vision related handicap. First, research into the most effective means of integrating existing adaptive technologies into information systems was made. This was conducted to integrate off the shelf products with adaptive equipment for cohesive integrated information processing systems. Details are included that describe the type of functionality required in software to facilitate its incorporation into a speech and/or braille system. The second aspect is research into providing audible and tactile interfaces to graphics based interfaces. Parameters are included for the design and development of the Mercator Project. The project will develop a prototype system for audible access to graphics based interfaces. The system is being built within the public domain architecture of X windows to show that it is possible to provide access to text based applications within a graphical environment. This information will be valuable to suppliers to ADP equipment since new legislation requires manufacturers to provide electronic access to the visually impaired.
Graphics supercomputer for computational fluid dynamics research
NASA Astrophysics Data System (ADS)
Liaw, Goang S.
1994-11-01
The objective of this project is to purchase a state-of-the-art graphics supercomputer to improve the Computational Fluid Dynamics (CFD) research capability at Alabama A & M University (AAMU) and to support the Air Force research projects. A cutting-edge graphics supercomputer system, Onyx VTX, from Silicon Graphics Computer Systems (SGI), was purchased and installed. Other equipment including a desktop personal computer, PC-486 DX2 with a built-in 10-BaseT Ethernet card, a 10-BaseT hub, an Apple Laser Printer Select 360, and a notebook computer from Zenith were also purchased. A reading room has been converted to a research computer lab by adding some furniture and an air conditioning unit in order to provide an appropriate working environments for researchers and the purchase equipment. All the purchased equipment were successfully installed and are fully functional. Several research projects, including two existing Air Force projects, are being performed using these facilities.
Computer Models of Personality: Implications for Measurement
ERIC Educational Resources Information Center
Cranton, P. A.
1976-01-01
Current research on computer models of personality is reviewed and categorized under five headings: (1) models of belief systems; (2) models of interpersonal behavior; (3) models of decision-making processes; (4) prediction models; and (5) theory-based simulations of specific processes. The use of computer models in personality measurement is…
Computer Competence for the Applied Gerontologist.
ERIC Educational Resources Information Center
Dickel, C. Timothy; Young, W. Wayne
This paper shares some ideas regarding the use of computers by persons who use their gerontology training in direct service to older persons and their families. It proposes that, as professionals serving older persons and their families look toward the future, they need to conscientiously incorporate computer competence into their practice. The…
ERIC Educational Resources Information Center
Djang, Philipp A.
1993-01-01
Describes a Multiple Criteria Decision Analysis Approach for the selection of personal computers that combines the capabilities of Analytic Hierarchy Process and Integer Goal Programing. An example of how decision makers can use this approach to determine what kind of personal computers and how many of each type to purchase is given. (nine…
ERIC Educational Resources Information Center
Miller, Michael J.
1984-01-01
Description of the Macintosh personal, educational, and business computer produced by Apple covers cost; physical characteristics including display devices, circuit boards, and built-in features; company-produced software; third-party produced software; memory and storage capacity; word-processing features; and graphics capabilities. (MBR)
Satellite Imagery Via Personal Computer
NASA Technical Reports Server (NTRS)
1989-01-01
Automatic Picture Transmission (APT) was incorporated by NASA in the Tiros 8 weather satellite. APT included an advanced satellite camera that immediately transmitted a picture as well as low cost receiving equipment. When an advanced scanning radiometer was later introduced, ground station display equipment would not readily adjust to the new format until GSFC developed an APT Digital Scan Converter that made them compatible. A NASA Technical Note by Goddard's Vermillion and Kamoski described how to build a converter. In 1979, Electro-Services, using this technology, built the first microcomputer weather imaging system in the U.S. The company changed its name to Satellite Data Systems, Inc. and now manufactures the WeatherFax facsimile display graphics system which converts a personal computer into a weather satellite image acquisition and display workstation. Hardware, antennas, receivers, etc. are also offered. Customers include U.S. Weather Service, schools, military, etc.
Zao, John K.; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping
2014-01-01
EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system. PMID:24917804
Zao, John K; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping
2014-01-01
EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system.
Wieland, L. Susan; Falzon, Louise; Sciamanna, Chris N; Trudeau, Kimberlee J; Folse, Suzanne Brodney; Schwartz, Joseph E; Davidson, Karina W
2014-01-01
Background The World Health Organization (WHO) estimates that the number of obese or overweight individuals worldwide will increase to 1.5 billion by 2015. Chronic diseases associated with overweight or obesity include diabetes, heart disease, hypertension and stroke. Objectives To assess the effects of interactive computer-based interventions for weight loss or weight maintenance in overweight or obese people. Search methods We searched several electronic databases, including CENTRAL, MEDLINE, EMBASE, CINAHL, LILACS and PsycINFO, through 25 May 2011. We also searched clinical trials registries to identify studies. We scanned reference lists of included studies and relevant systematic reviews. Selection criteria Studies were included if they were randomized controlled trials or quasi-randomized controlled trials that evaluated interactive computer-based weight loss or weight maintenance programs in adults with overweight or obesity. We excluded trials if the duration of the intervention was less than four weeks or the loss to follow-up was greater than 20% overall. Data collection and analysis Two authors independently extracted study data and assessed risk of bias. Where interventions, control conditions, outcomes and time frames were similar between studies, we combined study data using meta-analysis. Main results We included 14 weight loss studies with a total of 2537 participants, and four weight maintenance studies with a total of 1603 participants. Treatment duration was between four weeks and 30 months. At six months, computer-based interventions led to greater weight loss than minimal interventions (mean difference (MD) −1.5 kg; 95% confidence interval (CI) −2.1 to −0.9; two trials) but less weight loss than in-person treatment (MD 2.1 kg; 95% CI 0.8 to 3.4; one trial). At six months, computer-based interventions were superior to a minimal control intervention in limiting weight regain (MD −0.7 kg; 95% CI −1.2 to −0.2; two trials), but not superior to infrequent in-person treatment (MD 0.5 kg; 95% −0.5 to 1.6; two trials). We did not observe consistent differences in dietary or physical activity behaviors between intervention and control groups in either weight loss or weight maintenance trials. Three weight loss studies estimated the costs of computer-based interventions compared to usual care, however two of the studies were 11 and 28 years old, and recent advances in technology render these estimates unlikely to be applicable to current or future interventions, while the third study was conducted in active duty military personnel, and it is unclear whether the costs are relevant to other settings. One weight loss study reported the cost-effectiveness ratio for a weekly in-person weight loss intervention relative to a computer-based intervention as USD 7177 (EUR 5678) per life year gained (80% CI USD 3055 to USD 60,291 (EUR 2417 to EUR 47,702)). It is unclear whether this could be extrapolated to other studies. No data were identified on adverse events, morbidity, complications or health-related quality of life. Authors’ conclusions Compared to no intervention or minimal interventions (pamphlets, usual care), interactive computer-based interventions are an effective intervention for weight loss and weight maintenance. Compared to in-person interventions, interactive computer-based interventions result in smaller weight losses and lower levels of weight maintenance. The amount of additional weight loss, however, is relatively small and of brief duration, making the clinical significance of these differences unclear. PMID:22895964
Stanghellini, Giovanni; Ballerini, Massimo; Mancini, Milena
2017-01-01
In this paper, we discuss the philosophical and psychopathological background of Domain 3, Other persons, of the Examination of Anomalous World Experiences (EAWE). The EAWE interview aims to describe the manifold phenomena of the schizophrenic lifeworld in all of their concrete and distinctive features, thus complementing a more abstract, symptom-focused approach. Domain 3, Other persons, focuses specifically on subjectively experienced interpersonal disturbances that may be especially common in schizophrenia. The aim of this domain, as with the rest of the EAWE, is to provide clinicians and researchers with a systematic orientation toward, or knowledge of, patients' experiences, so that the experiential universe of schizophrenia can be clarified in terms of the particular feel, meaning, and value it has for the patient. To help provide a context for EAWE Domain 3, Other persons, we propose a definition of "intersubjectivity" (IS) and "dissociality." The former is the ability to understand other persons, that is, the basis of our capacity to experience people and social situations as meaningful. IS relies both on perceptive- intuitive as well as cognitive-computational resources. Dissociality addresses the core psychopathological nucleus characterizing the quality of abnormal IS in persons with schizophrenia and covers several dimensions, including disturbances of both perceptive-intuitive and cognitive-computational capacities. The most typical perceptive-intuitive abnormality is hypoattunement, that is, the lack of interpersonal resonance and difficulties in grasping or immediately understanding others' mental states. The most characteristic cognitive-computational anomaly is social hyperreflexivity, especially an algorithmic conception of sociality (an observational/ethological attitude aimed to develop an explicit, often rule-based personal method for participating in social transactions). Other anomalous interpersonal experiences, such as emotional and behavioral responses to others, are also discussed in relation to this core of dissociality. © 2017 S. Karger AG, Basel.
IUE Data Analysis Software for Personal Computers
NASA Technical Reports Server (NTRS)
Thompson, R.; Caplinger, J.; Taylor, L.; Lawton , P.
1996-01-01
This report summarizes the work performed for the program titled, "IUE Data Analysis Software for Personal Computers" awarded under Astrophysics Data Program NRA 92-OSSA-15. The work performed was completed over a 2-year period starting in April 1994. As a result of the project, 450 IDL routines and eight database tables are now available for distribution for Power Macintosh computers and Personal Computers running Windows 3.1.
ERIC Educational Resources Information Center
Chen, Chiu-Jung; Liu, Pei-Lin
2007-01-01
This study evaluated the effects of a personalized computer-assisted mathematics problem-solving program on the performance and attitude of Taiwanese fourth grade students. The purpose of this study was to determine whether the personalized computer-assisted program improved student performance and attitude over the nonpersonalized program.…
48 CFR 1523.7000 - Background.
Code of Federal Regulations, 2012 CFR
2012-10-01
... PROGRAMS ENVIRONMENTAL, CONSERVATION, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Energy-Efficient... purchase only microcomputers, including personal computers, monitors and printers, which meet “EPA Energy Star” requirements for energy efficiency. This equipment is often identified by the Energy StarTM logo...
48 CFR 1523.7000 - Background.
Code of Federal Regulations, 2011 CFR
2011-10-01
... PROGRAMS ENVIRONMENTAL, CONSERVATION, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Energy-Efficient... purchase only microcomputers, including personal computers, monitors and printers, which meet “EPA Energy Star” requirements for energy efficiency. This equipment is often identified by the Energy StarTM logo...
48 CFR 1523.7000 - Background.
Code of Federal Regulations, 2010 CFR
2010-10-01
... PROGRAMS ENVIRONMENTAL, CONSERVATION, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Energy-Efficient... purchase only microcomputers, including personal computers, monitors and printers, which meet “EPA Energy Star” requirements for energy efficiency. This equipment is often identified by the Energy StarTM logo...
ERIC Educational Resources Information Center
Raitt, David I.
1987-01-01
Considers pros and cons of using personal computers or microcomputers in a library and information setting. Highlights include discussions about the physical environment, security, effects on users, costs in terms of time and money, micro-mainframe links, and standardization considerations. (Author/LRW)
Geiss, Karla; Meyer, Martin
2013-09-01
Standardized mortality ratios and standardized incidence ratios are widely used in cohort studies to compare mortality or incidence in a study population to that in the general population on a age-time-specific basis, but their computation is not included in standard statistical software packages. Here we present a user-friendly Microsoft Windows program for computing standardized mortality ratios and standardized incidence ratios based on calculation of exact person-years at risk stratified by sex, age and calendar time. The program offers flexible import of different file formats for input data and easy handling of general population reference rate tables, such as mortality or incidence tables exported from cancer registry databases. The application of the program is illustrated with two examples using empirical data from the Bavarian Cancer Registry. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
LTCP 2D Graphical User Interface. Application Description and User's Guide
NASA Technical Reports Server (NTRS)
Ball, Robert; Navaz, Homayun K.
1996-01-01
A graphical user interface (GUI) written for NASA's LTCP (Liquid Thrust Chamber Performance) 2 dimensional computational fluid dynamic code is described. The GUI is written in C++ for a desktop personal computer running under a Microsoft Windows operating environment. Through the use of common and familiar dialog boxes, features, and tools, the user can easily and quickly create and modify input files for the LTCP code. In addition, old input files used with the LTCP code can be opened and modified using the GUI. The application is written in C++ for a desktop personal computer running under a Microsoft Windows operating environment. The program and its capabilities are presented, followed by a detailed description of each menu selection and the method of creating an input file for LTCP. A cross reference is included to help experienced users quickly find the variables which commonly need changes. Finally, the system requirements and installation instructions are provided.
Energy Use and Power Levels in New Monitors and Personal Computers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roberson, Judy A.; Homan, Gregory K.; Mahajan, Akshay
2002-07-23
Our research was conducted in support of the EPA ENERGY STAR Office Equipment program, whose goal is to reduce the amount of electricity consumed by office equipment in the U.S. The most energy-efficient models in each office equipment category are eligible for the ENERGY STAR label, which consumers can use to identify and select efficient products. As the efficiency of each category improves over time, the ENERGY STAR criteria need to be revised accordingly. The purpose of this study was to provide reliable data on the energy consumption of the newest personal computers and monitors that the EPA can usemore » to evaluate revisions to current ENERGY STAR criteria as well as to improve the accuracy of ENERGY STAR program savings estimates. We report the results of measuring the power consumption and power management capabilities of a sample of new monitors and computers. These results will be used to improve estimates of program energy savings and carbon emission reductions, and to inform rev isions of the ENERGY STAR criteria for these products. Our sample consists of 35 monitors and 26 computers manufactured between July 2000 and October 2001; it includes cathode ray tube (CRT) and liquid crystal display (LCD) monitors, Macintosh and Intel-architecture computers, desktop and laptop computers, and integrated computer systems, in which power consumption of the computer and monitor cannot be measured separately. For each machine we measured power consumption when off, on, and in each low-power level. We identify trends in and opportunities to reduce power consumption in new personal computers and monitors. Our results include a trend among monitor manufacturers to provide a single very low low-power level, well below the current ENERGY STAR criteria for sleep power consumption. These very low sleep power results mean that energy consumed when monitors are off or in active use has become more important in terms of contribution to the overall unit energy consumption (UEC). Cur rent ENERGY STAR monitor and computer criteria do not specify off or on power, but our results suggest opportunities for saving energy in these modes. Also, significant differences between CRT and LCD technology, and between field-measured and manufacturer-reported power levels reveal the need for standard methods and metrics for measuring and comparing monitor power consumption.« less
Resource Guide for Persons with Speech or Language Impairments.
ERIC Educational Resources Information Center
IBM, Atlanta, GA. National Support Center for Persons with Disabilities.
The resource guide identifies products which assist speech or language impaired individuals in accessing IBM (International Business Machine) Personal Computers or the IBM Personal System/2 family of products. An introduction provides a general overview of ways computers can help persons with speech or language handicaps. The document then…
Education for Incarcerated Juveniles: A Meta-Analysis
ERIC Educational Resources Information Center
Steele, Jennifer L.; Bozick, Robert; Davis, Lois M.
2016-01-01
Based on screenings of 1,150 manuscripts, we synthesize evidence from 18 eligible studies of educational interventions implemented within juvenile correctional facilities. The studies include 5 intervention categories: remedial academic instruction, computer-assisted instruction, personalized academic instruction, vocational education, and GED…
ERIC Educational Resources Information Center
Roth, Gene L.; And Others
1984-01-01
Four colleagues at Idaho State University describe how they used the DACUM (Developing A Curriculum) process to figure out what microcomputer competencies vocational educators need. Competencies include developing a personal plan for microcomputer competency; integrating computer-based instruction (CBI) into the vocational curriculum; planning,…
49 CFR 40.351 - What confidentiality requirements apply to service agents?
Code of Federal Regulations, 2013 CFR
2013-10-01
... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...
49 CFR 40.351 - What confidentiality requirements apply to service agents?
Code of Federal Regulations, 2014 CFR
2014-10-01
... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...
49 CFR 40.351 - What confidentiality requirements apply to service agents?
Code of Federal Regulations, 2012 CFR
2012-10-01
... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...
49 CFR 40.351 - What confidentiality requirements apply to service agents?
Code of Federal Regulations, 2011 CFR
2011-10-01
... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...
Code of Federal Regulations, 2013 CFR
2013-10-01
... or data storage). ESI devices and media include, but are not be limited to: (1) Computers (mainframe...) Personal data assistants (PDAs); (5) External data storage devices including portable devices (e.g., flash drive); and (6) Data storage media (magnetic, e.g., tape; optical, e.g., compact disc, microfilm, etc...
Code of Federal Regulations, 2014 CFR
2014-10-01
... or data storage). ESI devices and media include, but are not be limited to: (1) Computers (mainframe...) Personal data assistants (PDAs); (5) External data storage devices including portable devices (e.g., flash drive); and (6) Data storage media (magnetic, e.g., tape; optical, e.g., compact disc, microfilm, etc...
Pan, D; Chan, M; Deng, S; Xia, L; Xu, X
2011-11-01
This article reports on two numerical studies on the microclimate around, and the thermal neutrality of, a sleeping person in a space installed with a displacement ventilation system. The development of a sleeping computational thermal manikin (SCTM) placed in a space air-conditioned by a displacement ventilation system is first described. This is followed by reporting the results of the first numerical study on the microclimate around the SCTM, including air temperature and velocity distributions and the heat transfer characteristics. Then the outcomes of the other numerical study on the thermal neutrality of a sleeping person are presented, including the thermal neutrality for a naked sleeping person and the effects of the total insulation value of a bedding system on the thermal neutrality of a sleeping person. STATEMENT OF RELEVANCE: The thermal environment would greatly affect the sleep quality of human beings. Through developing a SCTM, the microclimate around a sleeping person has been numerically studied. The thermal neutral environment may then be predicted and contributions to improved sleep quality may be made.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Baker, D.A.
1996-06-01
This manual describes a dose assessment system used to estimate the population or collective dose commitments received via both airborne and waterborne pathways by persons living within a 2- to 80-kilometer region of a commercial operating power reactor for a specific year of effluent releases. Computer programs, data files, and utility routines are included which can be used in conjunction with an IBM or compatible personal computer to produce the required dose commitments and their statistical distributions. In addition, maximum individual airborne and waterborne dose commitments are estimated and compared to 10 CFR Part 50, Appendix 1, design objectives. Thismore » supplement is the last report in the NUREG/CR-2850 series.« less
Nair, Pradeep S; John, Eugene B
2007-01-01
Aligning specific sequences against a very large number of other sequences is a central aspect of bioinformatics. With the widespread availability of personal computers in biology laboratories, sequence alignment is now often performed locally. This makes it necessary to analyse the performance of personal computers for sequence aligning bioinformatics benchmarks. In this paper, we analyse the performance of a personal computer for the popular BLAST and FASTA sequence alignment suites. Results indicate that these benchmarks have a large number of recurring operations and use memory operations extensively. It seems that the performance can be improved with a bigger L1-cache.
Today's Personal Computers: Products for Every Need--Part II.
ERIC Educational Resources Information Center
Personal Computing, 1981
1981-01-01
Looks at microcomputers manufactured by Altos Computer Systems, Cromemco, Exidy, Intelligent Systems, Intertec Data Systems, Mattel, Nippon Electronics, Northstar, Personal Micro Computers, and Sinclair. (Part I of this article, examining other computers, appeared in the May 1981 issue.) Journal availability: Hayden Publishing Company, 50 Essex…
ERIC Educational Resources Information Center
Yilmaz, Ramazan; Karaoglan Yilmaz, F. Gizem; Özturk, H. Tugba; Karademir, Tugra
2017-01-01
Information and Communication Technologies (ICT) have been rapidly prevailed among the children and youths. Personal technologies facilitating the students to gain some learning experiences both in and out of the schools also include many threats. It is important for students to have high awareness of safe internet and computer use to overcome…
ERIC Educational Resources Information Center
Aktag, Isil
2015-01-01
The purpose of this study is to determine the computer self-efficacy, performance outcome, personal outcome, and affect and anxiety level of physical education teachers. Influence of teaching experience, computer usage and participation of seminars or in-service programs on computer self-efficacy level were determined. The subjects of this study…
Click! 101 Computer Activities and Art Projects for Kids and Grown-Ups.
ERIC Educational Resources Information Center
Bundesen, Lynne; And Others
This book presents 101 computer activities and projects geared toward children and adults. The activities for both personal computers (PCs) and Macintosh were developed on the Windows 95 computer operating system, but they are adaptable to non-Windows personal computers as well. The book is divided into two parts. The first part provides an…
Computers in general practice: the patient's voice
Potter, A. R.
1981-01-01
Analysis of answers to a questionnaire on the use of computers in general practice showed that 19 per cent of patients in two practices in Staffordshire would be worried if their general practitioner used a computer to store medical records. Twenty-seven per cent of patients would be unwilling to speak frankly about personal matters to their general practitioner if he or she used a computer and 7 per cent said that they would change to another doctor. Fifteen per cent stated that their general practitioner already had information about them that they would not want to be included in a computerized record of their medical history. PMID:7328555
Trends Shaping Housing Design.
ERIC Educational Resources Information Center
Kennedy, Mike
2002-01-01
Proposes 10 strategies that colleges and universities can use to keep students living on their campuses. Strategies include providing more amenities to living areas, having greater electrical capacity in each room, providing computer connectivity, assuring greater fire safety and personal security, offering more dining options, and allowing…
Broering, N C
1983-01-01
Georgetown University's Library Information System (LIS), an integrated library system designed and implemented at the Dahlgren Memorial Library, is broadly described from an administrative point of view. LIS' functional components consist of eight "user-friendly" modules: catalog, circulation, serials, bibliographic management (including Mini-MEDLINE), acquisitions, accounting, networking, and computer-assisted instruction. This article touches on emerging library services, user education, and computer information services, which are also changing the role of staff librarians. The computer's networking capability brings the library directly to users through personal or institutional computers at remote sites. The proposed Integrated Medical Center Information System at Georgetown University will include interface with LIS through a network mechanism. LIS is being replicated at other libraries, and a microcomputer version is being tested for use in a hospital setting. PMID:6688749
Computer Language Settings and Canadian Spellings
ERIC Educational Resources Information Center
Shuttleworth, Roger
2011-01-01
The language settings used on personal computers interact with the spell-checker in Microsoft Word, which directly affects the flagging of spellings that are deemed incorrect. This study examined the language settings of personal computers owned by a group of Canadian university students. Of 21 computers examined, only eight had their Windows…
Specification of Computer Systems by Objectives.
ERIC Educational Resources Information Center
Eltoft, Douglas
1989-01-01
Discusses the evolution of mainframe and personal computers, and presents a case study of a network developed at the University of Iowa called the Iowa Computer-Aided Engineering Network (ICAEN) that combines Macintosh personal computers with Apollo workstations. Functional objectives are stressed as the best measure of system performance. (LRW)
Computational modeling in melanoma for novel drug discovery.
Pennisi, Marzio; Russo, Giulia; Di Salvatore, Valentina; Candido, Saverio; Libra, Massimo; Pappalardo, Francesco
2016-06-01
There is a growing body of evidence highlighting the applications of computational modeling in the field of biomedicine. It has recently been applied to the in silico analysis of cancer dynamics. In the era of precision medicine, this analysis may allow the discovery of new molecular targets useful for the design of novel therapies and for overcoming resistance to anticancer drugs. According to its molecular behavior, melanoma represents an interesting tumor model in which computational modeling can be applied. Melanoma is an aggressive tumor of the skin with a poor prognosis for patients with advanced disease as it is resistant to current therapeutic approaches. This review discusses the basics of computational modeling in melanoma drug discovery and development. Discussion includes the in silico discovery of novel molecular drug targets, the optimization of immunotherapies and personalized medicine trials. Mathematical and computational models are gradually being used to help understand biomedical data produced by high-throughput analysis. The use of advanced computer models allowing the simulation of complex biological processes provides hypotheses and supports experimental design. The research in fighting aggressive cancers, such as melanoma, is making great strides. Computational models represent the key component to complement these efforts. Due to the combinatorial complexity of new drug discovery, a systematic approach based only on experimentation is not possible. Computational and mathematical models are necessary for bringing cancer drug discovery into the era of omics, big data and personalized medicine.
Rotary engine performance computer program (RCEMAP and RCEMAPPC): User's guide
NASA Technical Reports Server (NTRS)
Bartrand, Timothy A.; Willis, Edward A.
1993-01-01
This report is a user's guide for a computer code that simulates the performance of several rotary combustion engine configurations. It is intended to assist prospective users in getting started with RCEMAP and/or RCEMAPPC. RCEMAP (Rotary Combustion Engine performance MAP generating code) is the mainframe version, while RCEMAPPC is a simplified subset designed for the personal computer, or PC, environment. Both versions are based on an open, zero-dimensional combustion system model for the prediction of instantaneous pressures, temperature, chemical composition and other in-chamber thermodynamic properties. Both versions predict overall engine performance and thermal characteristics, including bmep, bsfc, exhaust gas temperature, average material temperatures, and turbocharger operating conditions. Required inputs include engine geometry, materials, constants for use in the combustion heat release model, and turbomachinery maps. Illustrative examples and sample input files for both versions are included.
Computing shifts to monitor ATLAS distributed computing infrastructure and operations
NASA Astrophysics Data System (ADS)
Adam, C.; Barberis, D.; Crépé-Renaudin, S.; De, K.; Fassi, F.; Stradling, A.; Svatos, M.; Vartapetian, A.; Wolters, H.
2017-10-01
The ATLAS Distributed Computing (ADC) group established a new Computing Run Coordinator (CRC) shift at the start of LHC Run 2 in 2015. The main goal was to rely on a person with a good overview of the ADC activities to ease the ADC experts’ workload. The CRC shifter keeps track of ADC tasks related to their fields of expertise and responsibility. At the same time, the shifter maintains a global view of the day-to-day operations of the ADC system. During Run 1, this task was accomplished by a person of the expert team called the ADC Manager on Duty (AMOD), a position that was removed during the shutdown period due to the reduced number and availability of ADC experts foreseen for Run 2. The CRC position was proposed to cover some of the AMODs former functions, while allowing more people involved in computing to participate. In this way, CRC shifters help with the training of future ADC experts. The CRC shifters coordinate daily ADC shift operations, including tracking open issues, reporting, and representing ADC in relevant meetings. The CRC also facilitates communication between the ADC experts team and the other ADC shifters. These include the Distributed Analysis Support Team (DAST), which is the first point of contact for addressing all distributed analysis questions, and the ATLAS Distributed Computing Shifters (ADCoS), which check and report problems in central services, sites, Tier-0 export, data transfers and production tasks. Finally, the CRC looks at the level of ADC activities on a weekly or monthly timescale to ensure that ADC resources are used efficiently.
Experiments with microcomputer-based artificial intelligence environments
Summers, E.G.; MacDonald, R.A.
1988-01-01
The U.S. Geological Survey (USGS) has been experimenting with the use of relatively inexpensive microcomputers as artificial intelligence (AI) development environments. Several AI languages are available that perform fairly well on desk-top personal computers, as are low-to-medium cost expert system packages. Although performance of these systems is respectable, their speed and capacity limitations are questionable for serious earth science applications foreseen by the USGS. The most capable artificial intelligence applications currently are concentrated on what is known as the "artificial intelligence computer," and include Xerox D-series, Tektronix 4400 series, Symbolics 3600, VAX, LMI, and Texas Instruments Explorer. The artificial intelligence computer runs expert system shells and Lisp, Prolog, and Smalltalk programming languages. However, these AI environments are expensive. Recently, inexpensive 32-bit hardware has become available for the IBM/AT microcomputer. USGS has acquired and recently completed Beta-testing of the Gold Hill Systems 80386 Hummingboard, which runs Common Lisp on an IBM/AT microcomputer. Hummingboard appears to have the potential to overcome many of the speed/capacity limitations observed with AI-applications on standard personal computers. USGS is a Beta-test site for the Gold Hill Systems GoldWorks expert system. GoldWorks combines some high-end expert system shell capabilities in a medium-cost package. This shell is developed in Common Lisp, runs on the 80386 Hummingboard, and provides some expert system features formerly available only on AI-computers including frame and rule-based reasoning, on-line tutorial, multiple inheritance, and object-programming. ?? 1988 International Association for Mathematical Geology.
AIR TOXICS EMISSIONS FROM ELECTRONICS INCINERATION
The purpose of this project is to examine the emissions of air toxics from the combustion of electronics equipment, primarily personal computer components. Due to a shortage of recycling programs for personal computers and other personal electronics equipment, most of these mate...
Historical review of computer-assisted cognitive retraining.
Lynch, Bill
2002-10-01
This article details the introduction and development of the use of microcomputers as adjuncts to traditional cognitive rehabilitation of persons with acquired brain injury. The initial application of video games as therapeutic recreation in the late 1970s was soon followed in the early 1980s by the use of the first personal computers and available educational software. By the mid-1980s, both the IBM PC and Macintosh platforms were established, along with simplified programming languages that allowed individuals without extensive technical expertise to develop their own software. Several rehabilitation clinicians began to produce and market specially written cognitive retraining software for one or the other platform. Their work was detailed and reviewed, as was recently released software from commercial sources. The latter discussion included the latest developments in the rehabilitation applications of personal digital assistants and related organizing, reminding, and dictation devices. A summary of research on the general and specific efficacy of computer-assisted cognitive retraining illustrated the lingering controversy and skepticism that have been associated with this field since its inception. Computer-assisted cognitive retraining (CACR) can be an effective adjunct to a comprehensive program of cognitive rehabilitation. Training needs to be focused, structured, monitored, and as ecologically relevant as possible for optimum effect. Transfer or training or generalizability of skills remains a key issue in the field and should be considered the key criterion in evaluating whether to initiate or continue CACR.
ERIC Educational Resources Information Center
Reed, Lori
2000-01-01
Uses discourses on "computer-phobia" and "computer addiction" to describe the cultural work involved and marketing strategies used between 1960s-1990s regarding management of computer fear. Draws on popular discourses, advertisements, and advice literature to explore how the personal computer was successfully connected to middle-class family…
High-Rate Digital Receiver Board
NASA Technical Reports Server (NTRS)
Ghuman, Parminder; Bialas, Thomas; Brambora, Clifford; Fisher, David
2004-01-01
A high-rate digital receiver (HRDR) implemented as a peripheral component interface (PCI) board has been developed as a prototype of compact, general-purpose, inexpensive, potentially mass-producible data-acquisition interfaces between telemetry systems and personal computers. The installation of this board in a personal computer together with an analog preprocessor enables the computer to function as a versatile, highrate telemetry-data-acquisition and demodulator system. The prototype HRDR PCI board can handle data at rates as high as 600 megabits per second, in a variety of telemetry formats, transmitted by diverse phase-modulation schemes that include binary phase-shift keying and various forms of quadrature phaseshift keying. Costing less than $25,000 (as of year 2003), the prototype HRDR PCI board supplants multiple racks of older equipment that, when new, cost over $500,000. Just as the development of standard network-interface chips has contributed to the proliferation of networked computers, it is anticipated that the development of standard chips based on the HRDR could contribute to reductions in size and cost and increases in performance of telemetry systems.
Adaptive Technologies for Accommodating Persons with Disabilities.
ERIC Educational Resources Information Center
Berliss, Jane; And Others
1993-01-01
Eight articles review the progress achieved in making library computing technologies and library services accessible to people with disabilities. Adaptive technologies, automated conversion into Braille, and successful programs that demonstrate compliance with the American with Disabilities Act are described. A resource list is included. (EA)
Maintenance of Microcomputers. Manual and Apple II Session, IBM Session.
ERIC Educational Resources Information Center
Coffey, Michael A.; And Others
This guide describes maintenance procedures for IBM and Apple personal computers, provides information on detecting and diagnosing problems, and details diagnostic programs. Included are discussions of printers, terminals, disks, disk drives, keyboards, hardware, and software. The text is supplemented by various diagrams. (EW)
Multimedia in Education: Thought Pieces.
ERIC Educational Resources Information Center
Nicol, Anne; And Others
1986-01-01
The six "thought pieces" presented in this document summarize the personal perspectives of conference participants on issues raised in formal or information discussions, but not part of the central themes of the conference or conference papers. They include: (1) "Assuming That..." (Anne Nicol, Apple Computer, Inc.); (2) "A…
20 CFR 229.67 - Redetermination of reduction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Reduction for Worker's Compensation or Disability Benefits... earnings amount by: (1) The average total wages (including wages that exceed the maximum used in computing social security benefits) of all persons for whom wages were reported to the Secretary of the Treasury...
The Impact of Cognitive and Non-Cognitive Personality Traits on Computer Literacy Level
ERIC Educational Resources Information Center
Saparniene, Diana; Merkys, Gediminas; Saparnis, Gintaras
2006-01-01
Purpose: The paper deals with the study of students' computer literacy one of the purposes being demonstration the impact of the cognitive and non-cognitive personality traits (attention, verbal and non-verbal intelligence, emotional-motivational relationship with computer, learning strategies, etc.) on the quality of computer literacy.…
47 CFR 15.101 - Equipment authorization of unintentional radiators.
Code of Federal Regulations, 2014 CFR
2014-10-01
.... TV interface device Declaration of Conformity or Certification. Cable system terminal device Declaration of Conformity. Stand-alone cable input selector switch Verification. Class B personal computers... used with Class B personal computers Declaration of Conformity or Certification. 1 Class B personal...
47 CFR 15.101 - Equipment authorization of unintentional radiators.
Code of Federal Regulations, 2010 CFR
2010-10-01
.... TV interface device Declaration of Conformity or Certification. Cable system terminal device Declaration of Conformity. Stand-alone cable input selector switch Verification. Class B personal computers... used with Class B personal computers Declaration of Conformity or Certification. 1 Class B personal...
47 CFR 15.101 - Equipment authorization of unintentional radiators.
Code of Federal Regulations, 2012 CFR
2012-10-01
.... TV interface device Declaration of Conformity or Certification. Cable system terminal device Declaration of Conformity. Stand-alone cable input selector switch Verification. Class B personal computers... used with Class B personal computers Declaration of Conformity or Certification. 1 Class B personal...
47 CFR 15.101 - Equipment authorization of unintentional radiators.
Code of Federal Regulations, 2011 CFR
2011-10-01
.... TV interface device Declaration of Conformity or Certification. Cable system terminal device Declaration of Conformity. Stand-alone cable input selector switch Verification. Class B personal computers... used with Class B personal computers Declaration of Conformity or Certification. 1 Class B personal...
47 CFR 15.101 - Equipment authorization of unintentional radiators.
Code of Federal Regulations, 2013 CFR
2013-10-01
.... TV interface device Declaration of Conformity or Certification. Cable system terminal device Declaration of Conformity. Stand-alone cable input selector switch Verification. Class B personal computers... used with Class B personal computers Declaration of Conformity or Certification. 1 Class B personal...
A Research Program in Computer Technology. 1987 Annual Technical Report
1990-07-01
TITLE (Indcle Security Clanificstion) 1987 Annual Technical Report: *A Research Program in Computer Technology (Unclassified) 12. PERSONAL AUTHOR(S) IS...distributed processing, survivable networks 17. NCE: distributed processing, local networks, personal computers, workstation environment 18. SC Dev...are the auw’iors and should not be Interpreted as representIng the official opinion or policy of DARPA, the U.S. Government, or any person or agency
Zhang, Jiangheng; Chen, Yangxi; Zhou, Xiukun
2002-09-01
The characteristics of lip-mouth region including the soft and hard tissues in smiling position with frontal fixed position photographic computer-aided analysis were studied. The subjects were 80 persons (40 male and 40 females, age range: 17 to approximately 25 years) with acceptable faces and individual normal occlusions. The subjects were asked to take maximum smiling position to accept photographic measurement with computer-aided analysis. The maximum smile line could be divided into 3 categories: low smile line (16.25%), average smile line (68.75%), and high smile line (15%). The method adopting maximum smiling position to study the lip-month region is reproducible and comparable. This study would be helpful to provide a quantitative reference for clinical investigation, diagnosis, treatment and efficacy appraisal.
A FORTRAN program for multivariate survival analysis on the personal computer.
Mulder, P G
1988-01-01
In this paper a FORTRAN program is presented for multivariate survival or life table regression analysis in a competing risks' situation. The relevant failure rate (for example, a particular disease or mortality rate) is modelled as a log-linear function of a vector of (possibly time-dependent) explanatory variables. The explanatory variables may also include the variable time itself, which is useful for parameterizing piecewise exponential time-to-failure distributions in a Gompertz-like or Weibull-like way as a more efficient alternative to Cox's proportional hazards model. Maximum likelihood estimates of the coefficients of the log-linear relationship are obtained from the iterative Newton-Raphson method. The program runs on a personal computer under DOS; running time is quite acceptable, even for large samples.
Developmental Stages in School Computer Use: Neither Marx Nor Piaget.
ERIC Educational Resources Information Center
Lengel, James G.
Karl Marx's theory of stages can be applied to computer use in the schools. The first stage, the P Stage, comprises the entry of the computer into the school. Computer use at this stage is personal and tends to center around one personality. Social studies teachers are seldom among this select few. The second stage of computer use, the D Stage, is…
A Research Program in Computer Technology. 1986 Annual Technical Report
1989-08-01
1986 (Annual Technical Report I July 1985 - June 1986 A Research Program in Computer Technology ISI/SR-87-178 U S C INFORMA-TION S C I EN C ES...Program in Computer Technology (Unclassified) 12. PERSONAL AUTHOR(S) 151 Research Staff 13a. TYPE OF REPORT 113b. TIME COVERED 14 DATE OF REPORT (Yeer...survivable networks 17. distributed processing, local networks, personal computers, workstation environment 18. computer acquisition, Strategic Computing 19
An Ada Linear-Algebra Software Package Modeled After HAL/S
NASA Technical Reports Server (NTRS)
Klumpp, Allan R.; Lawson, Charles L.
1990-01-01
New avionics software written more easily. Software package extends Ada programming language to include linear-algebra capabilities similar to those of HAL/S programming language. Designed for such avionics applications as Space Station flight software. In addition to built-in functions of HAL/S, package incorporates quaternion functions used in Space Shuttle and Galileo projects and routines from LINPAK solving systems of equations involving general square matrices. Contains two generic programs: one for floating-point computations and one for integer computations. Written on IBM/AT personal computer running under PC DOS, v.3.1.
47 CFR 32.2000 - Instructions for telecommunications plant accounts.
Code of Federal Regulations, 2011 CFR
2011-10-01
... equipment; 2122, Furniture; 2123, Office equipment; 2124, General purpose computers, costing $2,000 or less... for personal computers falling within Account 2124. Personal computers classifiable to Account 2124..., power, construction quarters, office space and equipment directly related to the construction project...
REMOTE: Modem Communicator Program for the IBM personal computer
DOE Office of Scientific and Technical Information (OSTI.GOV)
McGirt, F.
1984-06-01
REMOTE, a Modem Communicator Program, was developed to provide full duplex serial communication with arbitrary remote computers via either dial-up telephone modems or direct lines. The latest version of REMOTE (documented in this report) was developed for the IBM Personal Computer.
47 CFR 32.2000 - Instructions for telecommunications plant accounts.
Code of Federal Regulations, 2014 CFR
2014-10-01
... equipment; 2122, Furniture; 2123, Office equipment; 2124, General purpose computers, costing $2,000 or less... for personal computers falling within Account 2124. Personal computers classifiable to Account 2124..., power, construction quarters, office space and equipment directly related to the construction project...
47 CFR 32.2000 - Instructions for telecommunications plant accounts.
Code of Federal Regulations, 2012 CFR
2012-10-01
... equipment; 2122, Furniture; 2123, Office equipment; 2124, General purpose computers, costing $2,000 or less... for personal computers falling within Account 2124. Personal computers classifiable to Account 2124..., power, construction quarters, office space and equipment directly related to the construction project...
47 CFR 32.2000 - Instructions for telecommunications plant accounts.
Code of Federal Regulations, 2013 CFR
2013-10-01
... equipment; 2122, Furniture; 2123, Office equipment; 2124, General purpose computers, costing $2,000 or less... for personal computers falling within Account 2124. Personal computers classifiable to Account 2124..., power, construction quarters, office space and equipment directly related to the construction project...
Psychiatrists’ Comfort Using Computers and Other Electronic Devices in Clinical Practice
Fochtmann, Laura J.; Clarke, Diana E.; Barber, Keila; Hong, Seung-Hee; Yager, Joel; Mościcki, Eve K.; Plovnick, Robert M.
2015-01-01
This report highlights findings from the Study of Psychiatrists’ Use of Informational Resources in Clinical Practice, a cross-sectional Web- and paper-based survey that examined psychiatrists’ comfort using computers and other electronic devices in clinical practice. One-thousand psychiatrists were randomly selected from the American Medical Association Physician Masterfile and asked to complete the survey between May and August, 2012. A total of 152 eligible psychiatrists completed the questionnaire (response rate 22.2 %). The majority of psychiatrists reported comfort using computers for educational and personal purposes. However, 26 % of psychiatrists reported not using or not being comfortable using computers for clinical functions. Psychiatrists under age 50 were more likely to report comfort using computers for all purposes than their older counterparts. Clinical tasks for which computers were reportedly used comfortably, specifically by psychiatrists younger than 50, included documenting clinical encounters, prescribing, ordering laboratory tests, accessing read-only patient information (e.g., test results), conducting internet searches for general clinical information, accessing online patient educational materials, and communicating with patients or other clinicians. Psychiatrists generally reported comfort using computers for personal and educational purposes. However, use of computers in clinical care was less common, particularly among psychiatrists 50 and older. Information and educational resources need to be available in a variety of accessible, user-friendly, computer and non-computer-based formats, to support use across all ages. Moreover, ongoing training and technical assistance with use of electronic and mobile device technologies in clinical practice is needed. Research on barriers to clinical use of computers is warranted. PMID:26667248
Psychiatrists' Comfort Using Computers and Other Electronic Devices in Clinical Practice.
Duffy, Farifteh F; Fochtmann, Laura J; Clarke, Diana E; Barber, Keila; Hong, Seung-Hee; Yager, Joel; Mościcki, Eve K; Plovnick, Robert M
2016-09-01
This report highlights findings from the Study of Psychiatrists' Use of Informational Resources in Clinical Practice, a cross-sectional Web- and paper-based survey that examined psychiatrists' comfort using computers and other electronic devices in clinical practice. One-thousand psychiatrists were randomly selected from the American Medical Association Physician Masterfile and asked to complete the survey between May and August, 2012. A total of 152 eligible psychiatrists completed the questionnaire (response rate 22.2 %). The majority of psychiatrists reported comfort using computers for educational and personal purposes. However, 26 % of psychiatrists reported not using or not being comfortable using computers for clinical functions. Psychiatrists under age 50 were more likely to report comfort using computers for all purposes than their older counterparts. Clinical tasks for which computers were reportedly used comfortably, specifically by psychiatrists younger than 50, included documenting clinical encounters, prescribing, ordering laboratory tests, accessing read-only patient information (e.g., test results), conducting internet searches for general clinical information, accessing online patient educational materials, and communicating with patients or other clinicians. Psychiatrists generally reported comfort using computers for personal and educational purposes. However, use of computers in clinical care was less common, particularly among psychiatrists 50 and older. Information and educational resources need to be available in a variety of accessible, user-friendly, computer and non-computer-based formats, to support use across all ages. Moreover, ongoing training and technical assistance with use of electronic and mobile device technologies in clinical practice is needed. Research on barriers to clinical use of computers is warranted.
Arifin, Muhammad Zafrullah; Yudoyono, Farid; Setiawan, Cecilia; Sidabutar, Roland; Sutiono, Agung Budi; Faried, Ahmad
2014-01-01
Background: Brain tumor patients have a tendency to suffer from psychiatric disturbances. One of the most frequent disturbance experienced by frontal area tumor patients are personality changes. Case Description: In this paper, the authors report a 28-year-old male patient who presented with headache and personality changes, with no other neurological disturbance. The patient became increasingly pensive and apathetic with frontal and cerebellopontine angle tumor. The diagnosis is based on computed tomography scanning images, and histopathological examination of the excised tumor results in meningioma. Conclusion: Before the operation was performed, the patient suffered from personality changes and suicidal tendencies. After the operation, the patient's suicidal tendency was gone, but the personality changes still persist. For this reason, a comprehensive management of the patient is required, including postoperative pharmacological and psychological treatment. PMID:25593758
Nass, C; Lee, K M
2001-09-01
Would people exhibit similarity-attraction and consistency-attraction toward unambiguously computer-generated speech even when personality is clearly not relevant? In Experiment 1, participants (extrovert or introvert) heard a synthesized voice (extrovert or introvert) on a book-buying Web site. Participants accurately recognized personality cues in text to speech and showed similarity-attraction in their evaluation of the computer voice, the book reviews, and the reviewer. Experiment 2, in a Web auction context, added personality of the text to the previous design. The results replicated Experiment 1 and demonstrated consistency (voice and text personality)-attraction. To maximize liking and trust, designers should set parameters, for example, words per minute or frequency range, that create a personality that is consistent with the user and the content being presented.
ERIC Educational Resources Information Center
Hsu, Ching-Kun; Hwang, Gwo-Jen
2014-01-01
Personal computer assembly courses have been recognized as being essential in helping students understand computer structure as well as the functionality of each computer component. In this study, a context-aware ubiquitous learning approach is proposed for providing instant assistance to individual students in the learning activity of a…
ERIC Educational Resources Information Center
Alcoholado, Cristián; Diaz, Anita; Tagle, Arturo; Nussbaum, Miguel; Infante, Cristián
2016-01-01
This study aims to understand the differences in student learning outcomes and classroom behaviour when using the interpersonal computer, personal computer and pen-and-paper to solve arithmetic exercises. In this multi-session experiment, third grade students working on arithmetic exercises from various curricular units were divided into three…
A PC-based single-ADC multi-parameter data acquisition system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Woodring, M.; Kegel, G.H.R.; Egan, J.J.
1995-10-01
A personal computer (PC) based mult parameter data acquisition system using the Microsoft Window operating environment has been designed and constructed. An IBI AT compatible personal computer with an Intel 486DX5 microprocessor was combined with a National Instruments ATIDIO 32 digital I/O card, a single Canberra 8713 ADC with 13-bit resolution and a modified Canberra 8223 8-input analog multiplexer to acquil data from experiments carried out at the UML Van de Graa accelerator. The accelerator data acquisition (ADAC) computer environment was programmed in Microsoft Visual BASIC for use i Windows. ADAC allows event-mode data acquisition with up to eight parametersmore » (modifiable to 64) and the simultaneous display parameters during acquisition. Additional features of ADAC include replay of event-mode data and graphical analysis/display of data. TV ADAC environment is easy to upgrade or expand, inexpensive 1 implement, and is specifically designed to meet the needs of nuclei spectroscopy.« less
Digital communication support and Alzheimer's disease.
Ekström, Anna; Ferm, Ulrika; Samuelsson, Christina
2017-08-01
Communication is one of the areas where people with dementia and their caregivers experience most challenges. The purpose of this study is to contribute to the understanding of possibilities and pitfalls of using personalized communication applications installed on tablet computers to support communication for people with dementia and their conversational partners. The study is based on video recordings of a woman, 52 years old, with Alzheimer's disease interacting with her husband in their home. The couple was recorded interacting with and without a tablet computer including a personalized communication application. The results from the present study reveal both significant possibilities and potential difficulties in introducing a digital communication device to people with dementia and their conversational partners. For the woman in the present study, the amount of interactive actions and the number of communicative actions seem to increase with the use of the communication application. The results also indicate that problems associated with dementia are foregrounded in interaction where the tablet computer is used.
Adapting for Impaired Patrons.
ERIC Educational Resources Information Center
Schuyler, Michael
1999-01-01
Describes how a library, with an MCI Corporation grant, approached the process of setting up computers for the visually impaired. Discusses preparations, which included hiring a visually-impaired user as a consultant and contacting the VIP (Visually Impaired Persons) group; equipment; problems with the graphical user interface; and training.…
Preparing for the Integration of Emerging Technologies.
ERIC Educational Resources Information Center
Dyrli, Odvard Egil; Kinnaman, Daniel E.
1994-01-01
Discussion of the process of integrating new technologies into schools considers the evolution of technology, including personal computers, CD-ROMs, hypermedia, and networking/communications; the transition from Industrial-Age to Information-Age schools; and the logical steps of transition. Sidebars discuss a networked multimedia pilot project and…
46 CFR 15.815 - Radar observers.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Radar observers. 15.815 Section 15.815 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Computations § 15.815 Radar observers. (a) Each person in the required complement of deck officers, including...
The Watershed Health Assessment Tools-Investigating Fisheries (WHAT-IF) is a decision-analysis modeling toolkit for personal computers that supports watershed and fisheries management. The WHAT-IF toolkit includes a relational database, help-system functions and documentation, a...
Have You Got What It Takes...And Are You Using All You Could?
ERIC Educational Resources Information Center
Dyer, Hilary
1994-01-01
Suggests ways of using personal computers in special libraries, including online searching; CD-ROM networks; reference work; current awareness services; press cuttings services; selective dissemination of information; local databases; object linking and embedding; cataloging; acquisitions; circulation; serials control; interlibrary loan; space…
46 CFR 15.815 - Radar observers.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Radar observers. 15.815 Section 15.815 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Computations § 15.815 Radar observers. (a) Each person in the required complement of deck officers, including...
46 CFR 15.815 - Radar observers.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Radar observers. 15.815 Section 15.815 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Computations § 15.815 Radar observers. (a) Each person in the required complement of deck officers, including...
46 CFR 15.815 - Radar observers.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Radar observers. 15.815 Section 15.815 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Computations § 15.815 Radar observers. (a) Each person in the required complement of deck officers, including...
Document Indexing for Image-Based Optical Information Systems.
ERIC Educational Resources Information Center
Thiel, Thomas J.; And Others
1991-01-01
Discussion of image-based information retrieval systems focuses on indexing. Highlights include computerized information retrieval; multimedia optical systems; optical mass storage and personal computers; and a case study that describes an optical disk system which was developed to preserve, access, and disseminate military documents. (19…
Korpinen, Leena; Pääkkönen, Rauno; Gobba, Fabriziomaria
2013-01-01
The purpose of this study was to investigate the possible relation between self-reported neck symptoms (aches, pain or numbness) and use of computers/cell phones. The study was carried out as a cross-sectional study by posting a questionnaire to 15,000 working-age persons, and 15.1% of all respondents (6121) reported that they very often experienced physical symptoms in the neck. The results showed that they also had many other symptoms very often, and 49% used a computer daily at work and 83.9% used cell phones. We compared physical/mental symptoms of persons with symptoms in the neck quite often or more, with others. We found significant differences in the physical/mental symptoms and use of cell phones and computers. The results suggest taking into account in the future that those persons' symptoms in the neck can be associated with use of cell phones or computers. We investigated the possible relation between neck symptoms and use of computers/cell phones. We found that persons, who very often had symptoms in the neck, had also other symptoms very often (e.g. exhaustion at work). Their use of information and communication technology (e.g. computers) can associate with their symptoms.
GPR data processing computer software for the PC
Lucius, Jeffrey E.; Powers, Michael H.
2002-01-01
The computer software described in this report is designed for processing ground penetrating radar (GPR) data on Intel-compatible personal computers running the MS-DOS operating system or MS Windows 3.x/95/98/ME/2000. The earliest versions of these programs were written starting in 1990. At that time, commercially available GPR software did not meet the processing and display requirements of the USGS. Over the years, the programs were refined and new features and programs were added. The collection of computer programs presented here can perform all basic processing of GPR data, including velocity analysis and generation of CMP stacked sections and data volumes, as well as create publication quality data images.
Advanced laptop and small personal computer technology
NASA Technical Reports Server (NTRS)
Johnson, Roger L.
1991-01-01
Advanced laptop and small personal computer technology is presented in the form of the viewgraphs. The following areas of hand carried computers and mobile workstation technology are covered: background, applications, high end products, technology trends, requirements for the Control Center application, and recommendations for the future.
The Relationship between Personality and Computer Deviance
ERIC Educational Resources Information Center
Burns, Cardra E.
2013-01-01
Computer deviance by employees, defined as malicious and nonmalicious computer use behaviors, has contributed to billions of dollars of monetary and productivity losses for public and private sector organizations. The purpose of this correlational study was to examine the relationship between personality characteristics and employees' computer…
Combined illumination cylindrical millimeter-wave imaging technique for concealed weapon detection
NASA Astrophysics Data System (ADS)
Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.
2000-07-01
A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30 - 300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3D images of the person. After reconstruction, the images are combined into a single high-resolution 3D image of the person under surveillance. This combined image is then rendered using 3D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operate will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration.
Personal digital assistant applications for the healthcare provider.
Keplar, Kristine E; Urbanski, Christopher J
2003-02-01
To review some common medical applications available for personal digital assistants (PDAs), with brief discussion of the different PDA operating systems and memory requirements. Key search terms included handheld, PDA, personal digital assistants, and medical applications. The literature was accessed through MEDLINE (1999-August 2002). Other information was obtained through secondary sources such as Web sites describing common PDAs. Medical applications available on PDAs are numerous and include general drug references, specialized drug references (e.g., pediatrics, geriatrics, cardiology, infectious disease), diagnostic guides, medical calculators, herbal medication references, nursing references, toxicology references, and patient tracking databases. Costs and memory requirements for these programs can vary; consequently, the healthcare provider must limit the medication applications that are placed on the handheld computer. This article attempts to systematically describe the common medical applications available for the handheld computer along with cost, memory and download requirements, and Web site information. This review found many excellent PDA drug information applications offering many features which will aid the healthcare provider. Very likely, after using these PDA applications, the healthcare provider will find them indispensable, as their multifunctional capabilities can save time, improve accuracy, and allow for general business procedures as well as being a quick reference tool. To avoid the benefits of this technology might be a step backward.
Application of ubiquitous computing in personal health monitoring systems.
Kunze, C; Grossmann, U; Stork, W; Müller-Glaser, K D
2002-01-01
A possibility to significantly reduce the costs of public health systems is to increasingly use information technology. The Laboratory for Information Processing Technology (ITIV) at the University of Karlsruhe is developing a personal health monitoring system, which should improve health care and at the same time reduce costs by combining micro-technological smart sensors with personalized, mobile computing systems. In this paper we present how ubiquitous computing theory can be applied in the health-care domain.
Operating System For Numerically Controlled Milling Machine
NASA Technical Reports Server (NTRS)
Ray, R. B.
1992-01-01
OPMILL program is operating system for Kearney and Trecker milling machine providing fast easy way to program manufacture of machine parts with IBM-compatible personal computer. Gives machinist "equation plotter" feature, which plots equations that define movements and converts equations to milling-machine-controlling program moving cutter along defined path. System includes tool-manager software handling up to 25 tools and automatically adjusts to account for each tool. Developed on IBM PS/2 computer running DOS 3.3 with 1 MB of random-access memory.
Lee, Victoria K; Harris, Lasana T
2014-12-01
Social learning requires inferring social information about another person, as well as evaluating outcomes. Previous research shows that prior social information biases decision making and reduces reliance on striatal activity during learning (Delgado, Frank, & Phelps, Nature Neuroscience 8 (11): 1611-1618, 2005). A rich literature in social psychology on person perception demonstrates that people spontaneously infer social information when viewing another person (Fiske & Taylor, 2013) and engage a network of brain regions, including the medial prefrontal cortex, temporal parietal junction, superior temporal sulcus, and precuneus (Amodio & Frith, Nature Reviews Neuroscience, 7(4), 268-277, 2006; Haxby, Gobbini, & Montgomery, 2004; van Overwalle Human Brain Mapping, 30, 829-858, 2009). We investigate the role of these brain regions during social learning about well-established dimensions of person perception-trait warmth and trait competence. We test the hypothesis that activity in person perception brain regions interacts with learning structures during social learning. Participants play an investment game where they must choose an agent to invest on their behalf. This choice is guided by cues signaling trait warmth or trait competence based on framing of monetary returns. Trait warmth information impairs learning about human but not computer agents, while trait competence information produces similar learning rates for human and computer agents. We see increased activation to warmth information about human agents in person perception brain regions. Interestingly, activity in person perception brain regions during the decision phase negatively predicts activity in the striatum during feedback for trait competence inferences about humans. These results suggest that social learning may engage additional processing within person perception brain regions that hampers learning in economic contexts.
Starting Over: Current Issues in Online Catalog User Interface Design.
ERIC Educational Resources Information Center
Crawford, Walt
1992-01-01
Discussion of online catalogs focuses on issues in interface design. Issues addressed include understanding the user base; common user access (CUA) with personal computers; common command language (CCL); hyperlinks; screen design issues; differences from card catalogs; indexes; graphic user interfaces (GUIs); color; online help; and remote users.…
ERIC Educational Resources Information Center
Darter, Marvin E.; Wise, Donald E.
1989-01-01
Describes the experiences of Rider College School of Business Administration in implementing the use of microcomputers for courses in the business curriculum. Topics discussed include student purchase of microcomputers; cost effectiveness; software considerations; security for student equipment; printers; large screen projection facilities; and…
Incorporating a Collaborative Web-Based Virtual Laboratory in an Undergraduate Bioinformatics Course
ERIC Educational Resources Information Center
Weisman, David
2010-01-01
Face-to-face bioinformatics courses commonly include a weekly, in-person computer lab to facilitate active learning, reinforce conceptual material, and teach practical skills. Similarly, fully-online bioinformatics courses employ hands-on exercises to achieve these outcomes, although students typically perform this work offsite. Combining a…
Are We Ready for the Virtual Library? Technology Push, Market Pull and Organisational Response.
ERIC Educational Resources Information Center
Gilbert, J. D.
1993-01-01
Discusses virtual libraries, i.e., library services available to users via personal computers; considers the issues of technological development, user demands, and organizational response; and describes progress toward virtual libraries in the Netherlands, including networks, online systems, navigation tools, subject classification, coordination…
The Changing Business Environment: Implications for Vocational Curricula. State-of-the-Art Paper.
ERIC Educational Resources Information Center
Smith, E. Ray; Stallard, John J.
The widespread use of the micro/personal computer and related technological advancements are having important impacts on information management in the modern electronic office. Some of the most common software applications include word processing, spread sheet analysis, data management, graphics, and communications. Ancillary hardware/software…
VIEW OF HISTORIC SLATE SWITCHBOARD IN THE CONTROL ROOM OF ...
VIEW OF HISTORIC SLATE SWITCHBOARD IN THE CONTROL ROOM OF THE ELWHA POWERHOUSE, INCLUDING: METERS, PROTECTIVE RELAYS, AND SWITCHES. NOTE ADDITION OF PERSONAL COMPUTERS FOR POWER METERING AND OPERATIONS. PHOTO BY JET LOWE, HAER, 1995. - Elwha River Hydroelectric System, Elwha Hydroelectric Dam & Plant, Port Angeles, Clallam County, WA
Assessing Teaching Skills with a Mobile Simulation
ERIC Educational Resources Information Center
Gibson, David
2013-01-01
Because mobile technologies are overtaking personal computers as the primary tools of Internet access, and cloud-based resources are fundamentally transforming the world's knowledge, new forms of teaching and assessment are required to foster 21st century literacies, including those needed by K-12 teachers. A key feature of mobile technology…
32 CFR Appendix A to Part 223 - Procedures for Identifying and Controlling DoD UCNI
Code of Federal Regulations, 2011 CFR
2011-07-01
... security measures, including security plans, procedures, and equipment, for the physical protection of DoD... stand-alone personal computers, or shared-logic work processing systems, if protection from unauthorized... and security by increasing significantly the likelihood of the illegal production of nuclear weapons...
Code of Federal Regulations, 2010 CFR
2010-01-01
... applied in determining inspection due times under the new program. (Approved by the Office of Management... for hire in an aircraft which that person provides, unless within the preceding 100 hours of time in... time used to reach a place where the inspection can be done must be included in computing the next 100...
CAI Programs and Macros for Formative Curriculum Evaluation.
ERIC Educational Resources Information Center
Dasenbrock, David; Teates, Thomas
This technical memo is designed for persons who are interested in research with and development of curriculum material. Detailed information regarding computer programs, and program documentation used in the development and evaluation of ISCS curriculum materials is provided. The memo includes supplemental information to ISCS Technical Report I…
78 FR 15807 - Energy Conservation Program: Test Procedures for Television Sets
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
.... Edwards to initiate the necessary procedures. Please also note that those wishing to bring laptops into... laptops, or allow an extra 45 minutes. Persons can attend the public meeting via webinar. For more... are typically used with a computer. Additionally, DOE proposes to include definitions for the...
Parallel approach to identifying the well-test interpretation model using a neurocomputer
NASA Astrophysics Data System (ADS)
May, Edward A., Jr.; Dagli, Cihan H.
1996-03-01
The well test is one of the primary diagnostic and predictive tools used in the analysis of oil and gas wells. In these tests, a pressure recording device is placed in the well and the pressure response is recorded over time under controlled flow conditions. The interpreted results are indicators of the well's ability to flow and the damage done to the formation surrounding the wellbore during drilling and completion. The results are used for many purposes, including reservoir modeling (simulation) and economic forecasting. The first step in the analysis is the identification of the Well-Test Interpretation (WTI) model, which determines the appropriate solution method. Mis-identification of the WTI model occurs due to noise and non-ideal reservoir conditions. Previous studies have shown that a feed-forward neural network using the backpropagation algorithm can be used to identify the WTI model. One of the drawbacks to this approach is, however, training time, which can run into days of CPU time on personal computers. In this paper a similar neural network is applied using both a personal computer and a neurocomputer. Input data processing, network design, and performance are discussed and compared. The results show that the neurocomputer greatly eases the burden of training and allows the network to outperform a similar network running on a personal computer.
ERIC Educational Resources Information Center
Agbatogun, Alaba Olaoluwakotansibe
2012-01-01
This study investigated the extent to which computer literacy dimensions (computer general knowledge, documents and documentations, communication and surfing as well as data inquiry), computer use and academic qualification as independent variables predicted primary school teachers' attitude towards the integration of Personal Response System in…
Espinosa, Pablo; Pfeiffer, Ruth M; García-Casado, Zaida; Requena, Celia; Landi, Maria Teresa; Kumar, Rajiv; Nagore, Eduardo
2016-01-01
Melanoma survivors are at an increased risk of developing other malignancies, including keratinocyte skin cancer (KSC). While it is known that many risk factors for melanoma also impact risk of KSC in the general population, no previous study has investigated risk factors for KSC development in melanoma patients. We assessed associations of personal and clinical characteristics, including skin phenotype and variations in the melanocortin 1 receptor (MC1R) gene, with KSC risk in melanoma patients. We used prospective follow-up information on 1200 patients treated for melanoma at the Instituto Valenciano de Oncología, Spain, between 2000 and 2011. We computed hazard ratios and 95% confidence intervals (CIs) for the association of clinical, personal and genetic characteristics with risk of KSC, squamous cell carcinoma (SCC), or basal cell carcinoma (BCC) from Cox proportional hazard models. Five-year cumulative incidence based on competing risk models of SCC, BCC or KSC overall was computed using multivariate subdistribution hazard models. To assess predictive performance of the models, we computed areas under the receiver-operating characteristic curves (AUCs, discriminatory power) using cross-validation. Median follow-up was 57.2 months; a KSC was detected in 163 patients (13.6%). In multivariable Cox models, age, sex, sunburns, chronic sun exposure, past personal history of non-melanoma skin cancer or other non-cutaneous neoplasia, and the MC1R variants p.D294H and p.R163Q were significantly associated with KSC risk. A cumulative incidence model including age, sex, personal history of KSC, and of other non-cutaneous neoplasia had an AUC of 0.76 (95% CI: 0.71-0.80). When p.D294H and p.R163Q variants were added to the model, the AUC increased to 0.81 (95% CI: 0.77-0.84) (p-value for difference <0.0001). In addition to age, sex, skin characteristics, and sun exposure, p.R163Q and p.D294H MC1R variants significantly increased KSC risk among melanoma patients. Our findings may help identify patients who could benefit most from preventive measures. Copyright © 2015 Elsevier Ltd. All rights reserved.
Do personal computers make doctors less personal?
Rethans, Jan-Joost; Höppener, Paul; Wolfs, George; Diederiks, Jos
1988-01-01
Ten months after the installation of a computer in a general practice surgery a postal survey (piloted questionnaire) was sent to 390 patients. The patients' views of their relationship with their doctor after the computer was introduced were compared with their view of their relationship before the installation of the computer. More than 96% of the patients (n=263) stated that contact with their doctor was as easy and as personal as before. Most stated that the computer did not influence the duration of the consultation. Eighty one patients (30%) stated, however, that they thought that their privacy was reduced. Unlike studies of patients' attitudes performed before any actual experience of use of a computer in general practice, this study found that patients have little difficulty in accepting the presence of a computer in the consultation room. Nevertheless, doctors should inform their patients about any connections between their computer and other, external computers to allay fears about a decrease in privacy. PMID:3132287
ERIC Educational Resources Information Center
van den Bogaart, Antoine C. M.; Bilderbeek, Richel J. C.; Schaap, Harmen; Hummel, Hans G. K.; Kirschner, Paul A.
2016-01-01
This article introduces a dedicated, computer-supported method to construct and formatively assess open, annotated concept maps of Personal Professional Theories (PPTs). These theories are internalised, personal bodies of formal and practical knowledge, values, norms and convictions that professionals use as a reference to interpret and acquire…
Climate@Home: Crowdsourcing Climate Change Research
NASA Astrophysics Data System (ADS)
Xu, C.; Yang, C.; Li, J.; Sun, M.; Bambacus, M.
2011-12-01
Climate change deeply impacts human wellbeing. Significant amounts of resources have been invested in building super-computers that are capable of running advanced climate models, which help scientists understand climate change mechanisms, and predict its trend. Although climate change influences all human beings, the general public is largely excluded from the research. On the other hand, scientists are eagerly seeking communication mediums for effectively enlightening the public on climate change and its consequences. The Climate@Home project is devoted to connect the two ends with an innovative solution: crowdsourcing climate computing to the general public by harvesting volunteered computing resources from the participants. A distributed web-based computing platform will be built to support climate computing, and the general public can 'plug-in' their personal computers to participate in the research. People contribute the spare computing power of their computers to run a computer model, which is used by scientists to predict climate change. Traditionally, only super-computers could handle such a large computing processing load. By orchestrating massive amounts of personal computers to perform atomized data processing tasks, investments on new super-computers, energy consumed by super-computers, and carbon release from super-computers are reduced. Meanwhile, the platform forms a social network of climate researchers and the general public, which may be leveraged to raise climate awareness among the participants. A portal is to be built as the gateway to the climate@home project. Three types of roles and the corresponding functionalities are designed and supported. The end users include the citizen participants, climate scientists, and project managers. Citizen participants connect their computing resources to the platform by downloading and installing a computing engine on their personal computers. Computer climate models are defined at the server side. Climate scientists configure computer model parameters through the portal user interface. After model configuration, scientists then launch the computing task. Next, data is atomized and distributed to computing engines that are running on citizen participants' computers. Scientists will receive notifications on the completion of computing tasks, and examine modeling results via visualization modules of the portal. Computing tasks, computing resources, and participants are managed by project managers via portal tools. A portal prototype has been built for proof of concept. Three forums have been setup for different groups of users to share information on science aspect, technology aspect, and educational outreach aspect. A facebook account has been setup to distribute messages via the most popular social networking platform. New treads are synchronized from the forums to facebook. A mapping tool displays geographic locations of the participants and the status of tasks on each client node. A group of users have been invited to test functions such as forums, blogs, and computing resource monitoring.
Erdinc, Oguzhan
2011-01-01
This study explored the prevalence and work interference (WI) of upper extremity musculoskeletal discomfort (UEMSD) and investigated the associations of individual and work-related risk factors and using a notebook stand or docking station with UEMSD among symptomatic occupational notebook personal computer (PC) users. The participant group included 45 Turkish occupational notebook PC users. The study used self-reports of participants. The Turkish version of the Cornell Musculoskeletal Discomfort Questionnaire (T-CMDQ) was used to collect symptom data. UEMSD prevailed mostly in the neck, the upper back, and the lower back with prevalence rates of 77.8%, 73.3%, and 60.0% respectively, and with WI rates of 28.9%, 24.4%, and 26.7% respectively. Aggregated results showed that 44% of participants reported WI due to UEMSD in at least one body region. Significant risk factors were: being female, being aged <31 years, having computer work experience <10 years, and physical discomfort during computer use. UEMSD prevalence and WI rates were considerable in the neck, the upper back, and the lower back. Significant associations between certain risk factors and UEMSD were identified, but no association was found between using notebook stand and docking station and UEMSD among participants.
Soft control of scanning probe microscope with high flexibility.
Liu, Zhenghui; Guo, Yuzheng; Zhang, Zhaohui; Zhu, Xing
2007-01-01
Most commercial scanning probe microscopes have multiple embedded digital microprocessors and utilize complex software for system control, which is not easily obtained or modified by researchers wishing to perform novel and special applications. In this paper, we present a simple and flexible control solution that just depends on software running on a single-processor personal computer with real-time Linux operating system to carry out all the control tasks including negative feedback, tip moving, data processing and user interface. In this way, we fully exploit the potential of a personal computer in calculating and programming, enabling us to manipulate the scanning probe as required without any special digital control circuits and related technical know-how. This solution has been successfully applied to a homemade ultrahigh vacuum scanning tunneling microscope and a multiprobe scanning tunneling microscope.
Systems and methods for performing wireless financial transactions
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCown, Steven Harvey
2012-07-03
A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature tomore » the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction.« less
Textual data in psychiatry: reasoning by analogy to quantitative principles.
Yang, Suzanne; Mulvey, Edward P; Falissard, Bruno
2012-08-01
Personal meaning in subjective experience is a key element in the treatment of persons with mental disorders. Open-response speech samples would appear to be suitable for studying this type of subjective experience, but there are still important challenges in using language as data. Scientific principles involved in sample size calculation, validity, and reliability may be applicable, by analogy, to data collected in the form of words. We describe a rationale for including computer-assisted techniques as one step of a qualitative analysis procedure that includes manual reading. Clarification of a framework for including language as data in psychiatric research may allow us to more effectively bridge biological and psychometric research with clinical practice, a setting where the patient's clinical "data" are, in large part, conveyed in words.
1992-09-01
reports were prepared as an account of government-sponsored work. Neither the United States, nor the United States Navy, nor any person acting on...apparatus, method, or process disclosed in the report. As used in the above, “Persons acting on behalf of the United States Navy” includes any...strategic vision. Once the participants had exhausted every possible required act ion for v is ion implementation, these actions were then grouped into
DOE Office of Scientific and Technical Information (OSTI.GOV)
Runnels, Scott Robert; Caldwell, Wendy; Brown, Barton Jed
The two primary purposes of LANL’s Computational Physics Student Summer Workshop are (1) To educate graduate and exceptional undergraduate students in the challenges and applications of computational physics of interest to LANL, and (2) Entice their interest toward those challenges. Computational physics is emerging as a discipline in its own right, combining expertise in mathematics, physics, and computer science. The mathematical aspects focus on numerical methods for solving equations on the computer as well as developing test problems with analytical solutions. The physics aspects are very broad, ranging from low-temperature material modeling to extremely high temperature plasma physics, radiation transportmore » and neutron transport. The computer science issues are concerned with matching numerical algorithms to emerging architectures and maintaining the quality of extremely large codes built to perform multi-physics calculations. Although graduate programs associated with computational physics are emerging, it is apparent that the pool of U.S. citizens in this multi-disciplinary field is relatively small and is typically not focused on the aspects that are of primary interest to LANL. Furthermore, more structured foundations for LANL interaction with universities in computational physics is needed; historically interactions rely heavily on individuals’ personalities and personal contacts. Thus a tertiary purpose of the Summer Workshop is to build an educational network of LANL researchers, university professors, and emerging students to advance the field and LANL’s involvement in it. This report includes both the background for the program and the reports from the students.« less
Crew appliance computer program manual, volume 1
NASA Technical Reports Server (NTRS)
Russell, D. J.
1975-01-01
Trade studies of numerous appliance concepts for advanced spacecraft galley, personal hygiene, housekeeping, and other areas were made to determine which best satisfy the space shuttle orbiter and modular space station mission requirements. Analytical models of selected appliance concepts not currently included in the G-189A Generalized Environmental/Thermal Control and Life Support Systems (ETCLSS) Computer Program subroutine library were developed. The new appliance subroutines are given along with complete analytical model descriptions, solution methods, user's input instructions, and validation run results. The appliance components modeled were integrated with G-189A ETCLSS models for shuttle orbiter and modular space station, and results from computer runs of these systems are presented.
[Use of personal computers by diplomats of anesthesiology in Japan].
Yamamoto, K; Ohmura, S; Tsubokawa, T; Kita, M; Kushida, Y; Kobayashi, T
1999-04-01
Use of personal computers by diplomats of the Japanese Board of Anesthesiology working in Japanese university hospitals was investigated. Unsigned questionnaires were returned from 232 diplomats of 18 anesthesia departments. The age of responders ranged from twenties to sixties. Personal computer systems are used by 223 diplomats (96.1%), while nine (3.9%) do not use them. The computer systems used are: Apple Macintosh 77%, IBM compatible PC 21% and UNIX 2%. Although 197 diplomats have e-mail addresses, only 162 of them actually send and receive e-mails. Diplomats in fifties use e-mail most actively and those in sixties come second.
Bukowski, Henryk; Hietanen, Jari K.; Samson, Dana
2015-01-01
ABSTRACT Two paradigms have shown that people automatically compute what or where another person is looking at. In the visual perspective-taking paradigm, participants judge how many objects they see; whereas, in the gaze cueing paradigm, participants identify a target. Unlike in the former task, in the latter task, the influence of what or where the other person is looking at is only observed when the other person is presented alone before the task-relevant objects. We show that this discrepancy across the two paradigms is not due to differences in visual settings (Experiment 1) or available time to extract the directional information (Experiment 2), but that it is caused by how attention is deployed in response to task instructions (Experiment 3). Thus, the mere presence of another person in the field of view is not sufficient to compute where/what that person is looking at, which qualifies the claimed automaticity of such computations. PMID:26924936
Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing
Balasubramaniam, S.; Kavitha, V.
2015-01-01
Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud. PMID:25767826
Geometric data perturbation-based personal health record transactions in cloud computing.
Balasubramaniam, S; Kavitha, V
2015-01-01
Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.
Bukowski, Henryk; Hietanen, Jari K; Samson, Dana
2015-09-14
Two paradigms have shown that people automatically compute what or where another person is looking at. In the visual perspective-taking paradigm, participants judge how many objects they see; whereas, in the gaze cueing paradigm, participants identify a target. Unlike in the former task, in the latter task, the influence of what or where the other person is looking at is only observed when the other person is presented alone before the task-relevant objects. We show that this discrepancy across the two paradigms is not due to differences in visual settings (Experiment 1) or available time to extract the directional information (Experiment 2), but that it is caused by how attention is deployed in response to task instructions (Experiment 3). Thus, the mere presence of another person in the field of view is not sufficient to compute where/what that person is looking at, which qualifies the claimed automaticity of such computations.
Envisioning the Handheld-Centric Classroom
ERIC Educational Resources Information Center
Norris, Cathleen; Soloway, Elliot
2004-01-01
While appropriate as an initial focus, it is time that the educational community move beyond an emphasis on 1:1 computing (each child having his/her own personal computer) to a vision of a handheld-centric classroom, where each child not only has his/her own personal, handheld computer, but also has access to networked PCs, probeware, digital…
ERIC Educational Resources Information Center
Murphy, Harry J.
Twenty-seven papers are presented from a conference on applications of computer technology for disabled persons. The following titles and authors are represented: "Computer Applications For Rehabilitation Organizations: Finding What You Need" (T. Backer); "Similarities In Cognitive Development Of Severely Physically Handicapped and Younger Regular…
ERIC Educational Resources Information Center
Ceyhan, A. Aykut; Ceyhan, Esra
2007-01-01
This research aims at examining the relationships among unethical computer usage behavior and the personality characteristics of locus of control, adjustment to social norms, antisocial tendency, and aggression on Turkish university students. The research was applied to 217 university students. Data were collected through Unethical Computer Using…
Peretz, Chava; Korczyn, Amos D; Shatil, Evelyn; Aharonson, Vered; Birnboim, Smadar; Giladi, Nir
2011-01-01
Many studies have suggested that cognitive training can result in cognitive gains in healthy older adults. We investigated whether personalized computerized cognitive training provides greater benefits than those obtained by playing conventional computer games. This was a randomized double-blind interventional study. Self-referred healthy older adults (n = 155, 68 ± 7 years old) were assigned to either a personalized, computerized cognitive training or to a computer games group. Cognitive performance was assessed at baseline and after 3 months by a neuropsychological assessment battery. Differences in cognitive performance scores between and within groups were evaluated using mixed effects models in 2 approaches: adherence only (AO; n = 121) and intention to treat (ITT; n = 155). Both groups improved in cognitive performance. The improvement in the personalized cognitive training group was significant (p < 0.03, AO and ITT approaches) in all 8 cognitive domains. However, in the computer games group it was significant (p < 0.05) in only 4 (AO) or 6 domains (ITT). In the AO analysis, personalized cognitive training was significantly more effective than playing games in improving visuospatial working memory (p = 0.0001), visuospatial learning (p = 0.0012) and focused attention (p = 0.0019). Personalized, computerized cognitive training appears to be more effective than computer games in improving cognitive performance in healthy older adults. Further studies are needed to evaluate the ecological validity of these findings. Copyright © 2011 S. Karger AG, Basel.
Personalization through the Application of Inverse Bayes to Student Modeling
ERIC Educational Resources Information Center
Lang, Charles William McLeod
2015-01-01
Personalization, the idea that teaching can be tailored to each students' needs, has been a goal for the educational enterprise for at least 2,500 years (Regian, Shute, & Shute, 2013, p.2). Recently personalization has picked up speed with the advent of mobile computing, the Internet and increases in computer processing power. These changes…
Computer-Based Script Training for Aphasia: Emerging Themes from Post-Treatment Interviews
ERIC Educational Resources Information Center
Cherney, Leora R.; Halper, Anita S.; Kaye, Rosalind C.
2011-01-01
This study presents results of post-treatment interviews following computer-based script training for persons with chronic aphasia. Each of the 23 participants received 9 weeks of AphasiaScripts training. Post-treatment interviews were conducted with the person with aphasia and/or a significant other person. The 23 interviews yielded 584 coded…
On the Use of Computers for Teaching Fluid Mechanics
NASA Technical Reports Server (NTRS)
Benson, Thomas J.
1994-01-01
Several approaches for improving the teaching of basic fluid mechanics using computers are presented. There are two objectives to these approaches: to increase the involvement of the student in the learning process and to present information to the student in a variety of forms. Items discussed include: the preparation of educational videos using the results of computational fluid dynamics (CFD) calculations, the analysis of CFD flow solutions using workstation based post-processing graphics packages, and the development of workstation or personal computer based simulators which behave like desk top wind tunnels. Examples of these approaches are presented along with observations from working with undergraduate co-ops. Possible problems in the implementation of these approaches as well as solutions to these problems are also discussed.
Expertise transfer for expert system design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boose, J.H.
This book is about the Expertise Transfer System-a computer program which interviews experts and helps them build expert systems, i.e. computer programs that use knowledge from experts to make decisions and judgements under conditions of uncertainty. The techniques are useful to anyone who uses decision-making information based on the expertise of others. The methods can also be applied to personal decision-making. The interviewing methodology is borrowed from a branch of psychology called Personal Construct Theory. It is not necessary to use a computer to take advantage of the techniques from Personal Construction Theory; the fundamental procedures used by the Expertisemore » Transfer System can be performed using paper and pencil. It is not necessary that the reader understand very much about computers to understand the ideas in this book. The few relevant concepts from computer science and expert systems that are needed are explained in a straightforward manner. Ideas from Personal Construct Psychology are also introduced as needed.« less
The Joy of Telecomputing: Everything You Need to Know about Going On-Line at Home.
ERIC Educational Resources Information Center
Pearlman, Dara
1984-01-01
Discusses advantages and pleasures of utilizing a personal computer at home to receive electronic mail; participate in online conferences, software exchanges, and game networks; do shopping and banking; and have access to databases storing volumes of information. Information sources for the services mentioned are included. (MBR)
What Really Happens to Complimentary Textbook Software? A Case Study in Software Utilization.
ERIC Educational Resources Information Center
Vernon, Robert F.
1993-01-01
Discussion of complimentary computer software for college-level textbooks focuses on a study that investigated how a complimentary program was used and identified factors that influenced its use or nonuse. Barriers to use are described, including personal, technical, process, political, and economic factors. (Contains four references.) (LRW)
Code of Federal Regulations, 2011 CFR
2011-07-01
... include providing adaptive hardware and software for computers, electronic visual aids, braille devices, talking calculators, magnifiers, audio recordings and braille or large-print materials. For persons with... vision or hearing impaired, e.g., by making an announcement available in braille, in large print, or on...
Direct Results from Direct Mail: The New Technology and Volunteer Know-How Can Do It.
ERIC Educational Resources Information Center
Newman, Bruce D.; Pearson, John D.
1983-01-01
Rutgers' direct mail fund-raising campaign operated by volunteers and using computer and word-processing technology is outlined. Alumni were divided into subgroups and different techniques were used in the mail appeal, including personalized letters and reply cards. Suggestions for others undertaking such a campaign are noted. (MSE)
Impact of Commercial Search Engines and International Databases on Engineering Teaching and Research
ERIC Educational Resources Information Center
Chanson, Hubert
2007-01-01
For the last three decades, the engineering higher education and professional environments have been completely transformed by the "electronic/digital information revolution" that has included the introduction of personal computer, the development of email and world wide web, and broadband Internet connections at home. Herein the writer compares…
46 CFR 15.815 - Radar observers.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Radar observers. 15.815 Section 15.815 Shipping COAST... Computations § 15.815 Radar observers. (a) Each person in the required complement of deck officers, including the master, on inspected vessels of 300 gross tons or over which are radar equipped, shall hold an...
Corpus Linguistics for Korean Language Learning and Teaching. NFLRC Technical Report No. 26
ERIC Educational Resources Information Center
Bley-Vroman, Robert, Ed.; Ko, Hyunsook, Ed.
2006-01-01
Dramatic advances in personal computer technology have given language teachers access to vast quantities of machine-readable text, which can be analyzed with a view toward improving the basis of language instruction. Corpus linguistics provides analytic techniques and practical tools for studying language in use. This volume includes both an…
Quality Teaching in Mathematics
ERIC Educational Resources Information Center
Ediger, Marlow
2012-01-01
The best teaching possible needs to accrue in the mathematics curriculum. Pupils also need to become proficient in using mathematics in every day situations in life. Individuals buy goods and services. They pay for these in different ways, including cash. Here, persons need to be able to compute the total cost of items purchased and then pay for…
NASA Administrative Data Base Management Systems, 1984
NASA Technical Reports Server (NTRS)
Radosevich, J. D. (Editor)
1984-01-01
Strategies for converting to a data base management system (DBMS) and the implementation of the software packages necessary are discussed. Experiences with DBMS at various NASA centers are related including Langley's ADABAS/NATURAL and the NEMS subsystem of the NASA metrology informaton system. The value of the integrated workstation with a personal computer is explored.
Integration of an Intelligent Tutoring System in a Course of Computer Network Design
ERIC Educational Resources Information Center
Verdú, Elena; Regueras, Luisa M.; Gal, Eran; de Castro, Juan P.; Verdú, María J.; Kohen-Vacs, Dan
2017-01-01
INTUITEL is a research project aiming to offer a personalized learning environment. The INTUITEL approach includes an Intelligent Tutoring System that gives students recommendations and feedback about what the best learning path is for them according to their profile, learning progress, context and environmental influences. INTUITEL combines…
Qualification and Approval of Personal Computer-Based Aviation Training Devices
DOT National Transportation Integrated Search
1997-05-12
This Advisory Circular (AC) provides information and guidance to potential training device manufacturers and aviation training consumers concerning a means, acceptable to the Administrator, by which personal computer-based aviation training devices (...
92. VIEW OF CHART RECORDERS AND PERSONAL COMPUTER LINING NORTHEAST ...
92. VIEW OF CHART RECORDERS AND PERSONAL COMPUTER LINING NORTHEAST CORNER OF AUTOPILOT ROOM - Vandenberg Air Force Base, Space Launch Complex 3, Launch Operations Building, Napa & Alden Roads, Lompoc, Santa Barbara County, CA
Dynamic gas temperature measurements using a personal computer for data acquisition and reduction
NASA Technical Reports Server (NTRS)
Fralick, Gustave C.; Oberle, Lawrence G.; Greer, Lawrence C., III
1993-01-01
This report describes a dynamic gas temperature measurement system. It has frequency response to 1000 Hz, and can be used to measure temperatures in hot, high pressure, high velocity flows. A personal computer is used for collecting and processing data, which results in a much shorter wait for results than previously. The data collection process and the user interface are described in detail. The changes made in transporting the software from a mainframe to a personal computer are described in appendices, as is the overall theory of operation.
ANL statement of site strategy for computing workstations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fenske, K.R.; Boxberger, L.M.; Amiot, L.W.
1991-11-01
This Statement of Site Strategy describes the procedure at Argonne National Laboratory for defining, acquiring, using, and evaluating scientific and office workstations and related equipment and software in accord with DOE Order 1360.1A (5-30-85), and Laboratory policy. It is Laboratory policy to promote the installation and use of computing workstations to improve productivity and communications for both programmatic and support personnel, to ensure that computing workstations acquisitions meet the expressed need in a cost-effective manner, and to ensure that acquisitions of computing workstations are in accord with Laboratory and DOE policies. The overall computing site strategy at ANL is tomore » develop a hierarchy of integrated computing system resources to address the current and future computing needs of the laboratory. The major system components of this hierarchical strategy are: Supercomputers, Parallel computers, Centralized general purpose computers, Distributed multipurpose minicomputers, and Computing workstations and office automation support systems. Computing workstations include personal computers, scientific and engineering workstations, computer terminals, microcomputers, word processing and office automation electronic workstations, and associated software and peripheral devices costing less than $25,000 per item.« less
GAS eleven node thermal model (GEM)
NASA Technical Reports Server (NTRS)
Butler, Dan
1988-01-01
The Eleven Node Thermal Model (GEM) of the Get Away Special (GAS) container was originally developed based on the results of thermal tests of the GAS container. The model was then used in the thermal analysis and design of several NASA/GSFC GAS experiments, including the Flight Verification Payload, the Ultraviolet Experiment, and the Capillary Pumped Loop. The model description details the five cu ft container both with and without an insulated end cap. Mass specific heat values are also given so that transient analyses can be performed. A sample problem for each configuration is included as well so that GEM users can verify their computations. The model can be run on most personal computers with a thermal analyzer solution routine.
ERIC Educational Resources Information Center
Brug, Johannes; Campbell, Marci; van Assema, Patricia
1999-01-01
Describes the process of providing people with computer-tailored nutrition education and reviews the studies on the impact of this type of education. Results indicate that computer-tailored nutrition education is more likely to be read, remembered, and experienced as personally relevant compared to standard materials. It also appears to have a…
ERIC Educational Resources Information Center
Passmore, David Lynn
Intended for developers of vocational education professionals and for educators making decisions about the usefulness of personal computers in education, this report deals with the effects of the personal computing revolution on professional development of vocational educators. The two major papers and published opinion pieces that make up this…
Theory and Programs for Dynamic Modeling of Tree Rings from Climate
Paul C. van Deusen; Jennifer Koretz
1988-01-01
Computer programs written in GAUSS(TM) for IBM compatible personal computers are described that perform dynamic tree ring modeling with climate data; the underlying theory is also described. The programs and a separate users manual are available from the authors, although users must have the GAUSS software package on their personal computer. An example application of...
ERIC Educational Resources Information Center
Moran, Mark; Hawkes, Mark; El Gayar, Omar
2010-01-01
Many educational institutions have implemented ubiquitous or required laptop, notebook, or tablet personal computing programs for their students. Yet, limited evidence exists to validate integration and acceptance of the technology among student populations. This research examines student acceptance of mobile computing devices using a modification…
Computer Administering of the Psychological Investigations: Set-Relational Representation
NASA Astrophysics Data System (ADS)
Yordzhev, Krasimir
Computer administering of a psychological investigation is the computer representation of the entire procedure of psychological assessments - test construction, test implementation, results evaluation, storage and maintenance of the developed database, its statistical processing, analysis and interpretation. A mathematical description of psychological assessment with the aid of personality tests is discussed in this article. The set theory and the relational algebra are used in this description. A relational model of data, needed to design a computer system for automation of certain psychological assessments is given. Some finite sets and relation on them, which are necessary for creating a personality psychological test, are described. The described model could be used to develop real software for computer administering of any psychological test and there is full automation of the whole process: test construction, test implementation, result evaluation, storage of the developed database, statistical implementation, analysis and interpretation. A software project for computer administering personality psychological tests is suggested.
ASTEC: Controls analysis for personal computers
NASA Technical Reports Server (NTRS)
Downing, John P.; Bauer, Frank H.; Thorpe, Christopher J.
1989-01-01
The ASTEC (Analysis and Simulation Tools for Engineering Controls) software is under development at Goddard Space Flight Center (GSFC). The design goal is to provide a wide selection of controls analysis tools at the personal computer level, as well as the capability to upload compute-intensive jobs to a mainframe or supercomputer. The project is a follow-on to the INCA (INteractive Controls Analysis) program that has been developed at GSFC over the past five years. While ASTEC makes use of the algorithms and expertise developed for the INCA program, the user interface was redesigned to take advantage of the capabilities of the personal computer. The design philosophy and the current capabilities of the ASTEC software are described.
The Role of Personal Computers in Vocational Education: A Critical View.
ERIC Educational Resources Information Center
Passmore, David L.; And Others
1984-01-01
Personal computers are inexpensive, portable, accessible, and adaptable for vocational education instruction, administration, and communications. Successful infusion of microcomputers into vocational education requires staff orientation, improvement in software quality, and careful planning. (SK)
Ultrafast Comparison of Personal Genomes via Precomputed Genome Fingerprints.
Glusman, Gustavo; Mauldin, Denise E; Hood, Leroy E; Robinson, Max
2017-01-01
We present an ultrafast method for comparing personal genomes. We transform the standard genome representation (lists of variants relative to a reference) into "genome fingerprints" via locality sensitive hashing. The resulting genome fingerprints can be meaningfully compared even when the input data were obtained using different sequencing technologies, processed using different pipelines, represented in different data formats and relative to different reference versions. Furthermore, genome fingerprints are robust to up to 30% missing data. Because of their reduced size, computation on the genome fingerprints is fast and requires little memory. For example, we could compute all-against-all pairwise comparisons among the 2504 genomes in the 1000 Genomes data set in 67 s at high quality (21 μs per comparison, on a single processor), and achieved a lower quality approximation in just 11 s. Efficient computation enables scaling up a variety of important genome analyses, including quantifying relatedness, recognizing duplicative sequenced genomes in a set, population reconstruction, and many others. The original genome representation cannot be reconstructed from its fingerprint, effectively decoupling genome comparison from genome interpretation; the method thus has significant implications for privacy-preserving genome analytics.
Inventory of environmental impact models related to energy technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Owen, P.T.; Dailey, N.S.; Johnson, C.A.
The purpose of this inventory is to identify and collect data on computer simulations and computational models related to the environmental effects of energy source development, energy conversion, or energy utilization. Information for 33 data fields was sought for each model reported. All of the information which could be obtained within the time alloted for completion of the project is presented for each model listed. Efforts will be continued toward acquiring the needed information. Readers who are interested in these particular models are invited to contact ESIC for assistance in locating them. In addition to the standard bibliographic information, othermore » data fields of interest to modelers, such as computer hardware and software requirements, algorithms, applications, and existing model validation information, are included. Indexes are provided for contact person, acronym, keyword, and title. The models are grouped into the following categories: atmospheric transport, air quality, aquatic transport, terrestrial food chains, soil transport, aquatic food chains, water quality, dosimetry, and human effects, animal effects, plant effects, and generalized environmental transport. Within these categories, the models are arranged alphabetically by last name of the contact person.« less
A preliminary computer pattern analysis of satellite images of mature extratropical cyclones
NASA Technical Reports Server (NTRS)
Burfeind, Craig R.; Weinman, James A.; Barkstrom, Bruce R.
1987-01-01
This study has applied computerized pattern analysis techniques to the location and classification of features of several mature extratropical cyclones that were depicted in GOES satellite images. These features include the location of the center of the cyclone vortex core and the location of the associated occluded front. The cyclone type was classified in accord with the scheme of Troup and Streten. The present analysis was implemented on a personal computer; results were obtained within approximately one or two minutes without the intervention of an analyst.
Atom probe field ion microscopy and related topics: A bibliography 1993
DOE Office of Scientific and Technical Information (OSTI.GOV)
Godfrey, R.D.; Miller, M.K.; Russell, K.F.
1994-10-01
This bibliography, covering the period 1993, includes references related to the following topics: atom probe field ion microscopy (APFIM), field emission (FE), and field ion microscopy (FIM). Technique-oriented studies and applications are included. The references contained in this document were compiled from a variety of sources including computer searches and personal lists of publications. To reduce the length of this document, the references have been reduced to the minimum necessary to locate the articles. The references are listed alphabetically by authors, an Addendum of references missed in previous bibliographies is included.
NASA Astrophysics Data System (ADS)
Kuznetsov, P. G.; Tverdokhlebov, S. I.; Goreninskii, S. I.; Bolbasov, E. N.; Popkov, A. V.; Kulbakin, D. E.; Grigoryev, E. G.; Cherdyntseva, N. V.; Choinzonov, E. L.
2017-09-01
The present work demonstrates the possibility of production of personalized implants from bioresorbable polymers designed for replacement of bone defects. The stages of creating a personalized implant are described, which include the obtaining of 3D model from a computer tomogram, development of the model with respect to shape of bone fitment bore using Autodesk Meshmixer software, and 3D printing process from bioresorbable polymers. The results of bioresorbable polymer scaffolds implantation in pre-clinical tests on laboratory animals are shown. The biological properties of new bioresorbable polymers based on poly(lactic acid) were studied during their subcutaneous, intramuscular, bone and intraosseous implantation in laboratory animals. In all cases, there was a lack of a fibrous capsule formation around the bioresorbable polymer over time. Also, during the performed study, conclusions were made on osteogenesis intensity depending on the initial state of bone tissue.
Gordon, Peter; Camhi, Eli; Hesse, Ron; Odlum, Michelle; Schnall, Rebecca; Rodriguez, Martha; Valdez, Esmerlin; Bakken, Suzanne
2012-10-01
To describe the processes and outcomes of developing and implementing a Continuity of Care Document (CCD), My Health Profile, as a personal health record for persons living with HIV (PLWH) in an HIV/AIDS Special Needs Plan in New York City. Multiple qualitative and quantitative data sources were used to describe the processes and outcomes of implementing My Health Profile including focus groups, Audio Computer Assisted Self Interview (ACASI) surveys, administrative databases, chart abstraction, usage logs, and project management records. Qualitative data were thematically analyzed. Quantitative data analytic methods included descriptive and multivariate statistics. Data were triangulated and synthesized using the Reach, Efficacy/Effectiveness, Adoption, Implementation, Maintenance (RE-AIM) Framework. Reach - SNP members are predominantly African American or Hispanic/Latino and about one-third are female. A larger proportion of African Americans and smaller proportions of Hispanics/Latinos and Whites were trained to use My Health Profile.Efficacy/Effectiveness - CCDs were produced for 8249 unique members and updated on a monthly basis, 509 members were trained to use My Health Profile. Total number of member logins for 112 active users was 1808 and the longest duration of use was 1008 days. There were no significant differences between users and non-users of My Health Profile in clinical outcomes, perceptions of the quality of medical care, or health service utilization. Adoption -My Health Profile was well-matched to organizational mission, values, and priorities related to coordination of care for a high-risk population of PLWH. Implementation - Pre-implementation focus group participants identified potential barriers to use of My Health Profile including functional and computer literacy, privacy and confidentiality concerns, potential reluctance to use technology, and cognitive challenges. Key strategies for addressing barriers included a dedicated bilingual coach for recruitment, training, and support; basic computer and My Health Profile training; transparent audit trail revealing clinician and case manager access of My Health Profile, time-limited passwords for sharing My Health Profile with others at the point of need, and emergency access mechanism. Maintenance -My Health Profile was integrated into routine operational activities and its sustainability is facilitated by its foundation on standards for Health Information Exchange (HIE). Although potential barriers exist to the use of personal health records (PHRs) such as My Health Profile, PLWH with complex medical needs, low socioeconomic status, and limited computer experience will use such tools when a sufficient level of user support is provided and privacy and confidentiality concerns are addressed. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Definitions of database files and fields of the Personal Computer-Based Water Data Sources Directory
Green, J. Wayne
1991-01-01
This report describes the data-base files and fields of the personal computer-based Water Data Sources Directory (WDSD). The personal computer-based WDSD was derived from the U.S. Geological Survey (USGS) mainframe computer version. The mainframe version of the WDSD is a hierarchical data-base design. The personal computer-based WDSD is a relational data- base design. This report describes the data-base files and fields of the relational data-base design in dBASE IV (the use of brand names in this abstract is for identification purposes only and does not constitute endorsement by the U.S. Geological Survey) for the personal computer. The WDSD contains information on (1) the type of organization, (2) the major orientation of water-data activities conducted by each organization, (3) the names, addresses, and telephone numbers of offices within each organization from which water data may be obtained, (4) the types of data held by each organization and the geographic locations within which these data have been collected, (5) alternative sources of an organization's data, (6) the designation of liaison personnel in matters related to water-data acquisition and indexing, (7) the volume of water data indexed for the organization, and (8) information about other types of data and services available from the organization that are pertinent to water-resources activities.
Kon, Haruka; Kobayashi, Hiroshi; Sakurai, Naoki; Watanabe, Kiyoshi; Yamaga, Yoshiro; Ono, Takahiro
2017-11-01
The aim of the present study was to clarify differences between personal computer (PC)/mobile device combination and PC-only user patterns. We analyzed access frequency and time spent on a complete denture preclinical website in order to maximize website effectiveness. Fourth-year undergraduate students (N=41) in the preclinical complete denture laboratory course were invited to participate in this survey during the final week of the course to track login data. Students accessed video demonstrations and quizzes via our e-learning site/course program, and were instructed to view online demonstrations before classes. When the course concluded, participating students filled out a questionnaire about the program, their opinions, and devices they had used to access the site. Combination user access was significantly more frequent than PC-only during supplementary learning time, indicating that students with mobile devices studied during lunch breaks and before morning classes. Most students had favorable opinions of the e-learning site, but a few combination users commented that some videos were too long and that descriptive answers were difficult on smartphones. These results imply that mobile devices' increased accessibility encouraged learning by enabling more efficient time use between classes. They also suggest that e-learning system improvements should cater to mobile device users by reducing video length and including more short-answer questions. © 2016 John Wiley & Sons Australia, Ltd.
FaceWarehouse: a 3D facial expression database for visual computing.
Cao, Chen; Weng, Yanlin; Zhou, Shun; Tong, Yiying; Zhou, Kun
2014-03-01
We present FaceWarehouse, a database of 3D facial expressions for visual computing applications. We use Kinect, an off-the-shelf RGBD camera, to capture 150 individuals aged 7-80 from various ethnic backgrounds. For each person, we captured the RGBD data of her different expressions, including the neutral expression and 19 other expressions such as mouth-opening, smile, kiss, etc. For every RGBD raw data record, a set of facial feature points on the color image such as eye corners, mouth contour, and the nose tip are automatically localized, and manually adjusted if better accuracy is required. We then deform a template facial mesh to fit the depth data as closely as possible while matching the feature points on the color image to their corresponding points on the mesh. Starting from these fitted face meshes, we construct a set of individual-specific expression blendshapes for each person. These meshes with consistent topology are assembled as a rank-3 tensor to build a bilinear face model with two attributes: identity and expression. Compared with previous 3D facial databases, for every person in our database, there is a much richer matching collection of expressions, enabling depiction of most human facial actions. We demonstrate the potential of FaceWarehouse for visual computing with four applications: facial image manipulation, face component transfer, real-time performance-based facial image animation, and facial animation retargeting from video to image.
NASA Astrophysics Data System (ADS)
Marinos, Alexandros; Briscoe, Gerard
Cloud Computing is rising fast, with its data centres growing at an unprecedented rate. However, this has come with concerns over privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon and Microsoft. Our response is an alternative model for the Cloud conceptualisation, providing a paradigm for Clouds in the community, utilising networked personal computers for liberation from the centralised vendor model. Community Cloud Computing (C3) offers an alternative architecture, created by combing the Cloud with paradigms from Grid Computing, principles from Digital Ecosystems, and sustainability from Green Computing, while remaining true to the original vision of the Internet. It is more technically challenging than Cloud Computing, having to deal with distributed computing issues, including heterogeneous nodes, varying quality of service, and additional security constraints. However, these are not insurmountable challenges, and with the need to retain control over our digital lives and the potential environmental consequences, it is a challenge we must pursue.
Sato, Emi; Matsuda, Kouhei
2018-06-11
The purpose of this study was to examine cerebral blood flow in the frontal cortex area during personality self-rating tasks. Our two hypotheses were (1) cerebral blood flow varies based on personality rating condition and (2) cerebral blood flow varies based on the personality traits. This experiment measured cerebral blood flow under 3 personal computer rating conditions and 2 questionnaire conditions. Comparing the rating conditions, the results of the t-test indicated that cerebral blood flow was higher in the questionnaire condition than it was in the personal computer condition. With respect to the Big Five, the result of the correlation coefficient, that is, cerebral blood flow during a personality rating task, changed according to the trait for agreeableness. The results of the analysis of the 5-cluster on individual differences indicated that certain personality traits were related to the factors that increased or decreased cerebral blood flow. An analysis of variance indicated that openness to experience and Behavioural Activation System-drive was significant given that participants with high intellectual curiosity were motivated in this experiment, thus, their cerebral blood flow may have increased. The significance of this experiment was that by employing certain performance measures we could examine differences in physical changes based on personality traits. © 2018 International Union of Psychological Science.
Using commercial video games for falls prevention in older adults: the way for the future?
Pietrzak, Eva; Cotea, Cristina; Pullman, Stephen
2014-01-01
Falls in older adults are an increasingly costly public health issue. There are many fall prevention strategies that are effective. However, with an increasing population of older people and ever-decreasing availability of health practitioners and health funding, novel modes of intervention are being developed, including those relying on computer technologies.The aim of this article was to review the literature on the use of exergaming to prevent falls in older adult persons living in the community. The Cochrane, Medline, and Embase databases were searched using prespecified search terms. To be included, studies had to investigate the effect of using commercially available consoles and video games on outcome measures such as a decrease in falls, improvements in balance control or gait parameters, decreased fear of falling, and attitude to exercise in older adult persons living in the community. All study designs with the exception of single-person case studies were included. Articles had to be published in peer-reviewed journals in the English language. Nineteen studies fulfilled the inclusion criteria. The following outcomes were observed: (1) using computer-based virtual reality gaming for balance training in older adults was feasible; (2) the majority of studies showed a positive effect of exergaming on balance control; (3) some studies showed a positive effect on balance confidence and gait parameters; (4) the effect was seen across the age and sex spectrum of older adults, including those with and without balance impairment. There is as yet no evidence that using virtual reality games will prevent falls, but there is an indication that their use in balance training may improve balance control, which in turn may lead to falls prevention.
Future prospect 2012-2025 - How will our business change for the next 10 years -
NASA Astrophysics Data System (ADS)
Tanaka, Sakae
2013-04-01
The purpose of this lecture is to discuss about the "Future". How our business will change in the next 10 years? I believe the key is 3 mega-trends "Sustainability", "Cloud Computing" and "Life Innovation". With the development of social environment, the required business will change, too. The future would be invisible if you shut yourself up in your single industry. It is important to see various business fields horizontally, and recognize various key changes stereoscopically such as demographics, economy, technology, sense of value and lifestyle, when you develop mid-and-long term strategy. "Cloud" is silent, but the revolution of personal computing. It will bring the drastic changes in every industry. It will make "voice" and "moving image" possible to use as the interface to access your computer. Cloud computing will also make the client device more diversified and spread the application range widely. 15 years ago, the term "IT" was equivalent to "personal computer". Recently, it rather means to use smartphone and tablet device. In the next several years, TV and car-navigation system will be connected to broadband and it will become a part of personal computing. The meaning of personal computing is changing essentially year by year. In near future, the universe of computing will expand to the energy, medical and health-care, and agriculture etc. It passed only 20 years since we use "Computer" in a full scale operation. Recently, computer has start understanding our few words and talking in babble like a baby. The history of computing has just started.
Personal Computer Price and Performance.
ERIC Educational Resources Information Center
Crawford, Walt
1993-01-01
Discusses personal computer price trends since 1986; describes offerings and prices for four direct-market suppliers, i.e., Dell CompuAdd, PC Brand, and Gateway 2000; and discusses overall value and price/performance ratios. Tables and graphs chart value over time. (EA)
Distributed Computing Environment for Mine Warfare Command
1993-06-01
based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress of the evolution as of May of...network of personal computers over the past several years. This thesis analyzes the progress of the evolution as of May of 1992. The building blocks of a...85 A. BACKGROUND ............. .................. 85 B. PAST ENVIRONMENT ........... ............... 86 C. PRESENT ENVIRONMENT
Patently Absurd: The Ethical Implications of Software Patents
ERIC Educational Resources Information Center
Stark, Chris D.
2005-01-01
Since the mid-1980s, the percentage of the population in the United States owning a personal computer has grown from just over 8% to well over 50%, and nearly 60% of the population uses a computer at work. At the end of 2004, there were over 820 million personal computers in active use worldwide, and projections indicate that the number will…
Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data.
Guo, Ao; Ma, Jianhua
2018-02-25
A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual). This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject's persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual's facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model.
Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data
Ma, Jianhua
2018-01-01
A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual). This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject’s persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual’s facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model. PMID:29495343
A vectorial semantics approach to personality assessment.
Neuman, Yair; Cohen, Yochai
2014-04-23
Personality assessment and, specifically, the assessment of personality disorders have traditionally been indifferent to computational models. Computational personality is a new field that involves the automatic classification of individuals' personality traits that can be compared against gold-standard labels. In this context, we introduce a new vectorial semantics approach to personality assessment, which involves the construction of vectors representing personality dimensions and disorders, and the automatic measurements of the similarity between these vectors and texts written by human subjects. We evaluated our approach by using a corpus of 2468 essays written by students who were also assessed through the five-factor personality model. To validate our approach, we measured the similarity between the essays and the personality vectors to produce personality disorder scores. These scores and their correspondence with the subjects' classification of the five personality factors reproduce patterns well-documented in the psychological literature. In addition, we show that, based on the personality vectors, we can predict each of the five personality factors with high accuracy.
A Vectorial Semantics Approach to Personality Assessment
NASA Astrophysics Data System (ADS)
Neuman, Yair; Cohen, Yochai
2014-04-01
Personality assessment and, specifically, the assessment of personality disorders have traditionally been indifferent to computational models. Computational personality is a new field that involves the automatic classification of individuals' personality traits that can be compared against gold-standard labels. In this context, we introduce a new vectorial semantics approach to personality assessment, which involves the construction of vectors representing personality dimensions and disorders, and the automatic measurements of the similarity between these vectors and texts written by human subjects. We evaluated our approach by using a corpus of 2468 essays written by students who were also assessed through the five-factor personality model. To validate our approach, we measured the similarity between the essays and the personality vectors to produce personality disorder scores. These scores and their correspondence with the subjects' classification of the five personality factors reproduce patterns well-documented in the psychological literature. In addition, we show that, based on the personality vectors, we can predict each of the five personality factors with high accuracy.
A Vectorial Semantics Approach to Personality Assessment
Neuman, Yair; Cohen, Yochai
2014-01-01
Personality assessment and, specifically, the assessment of personality disorders have traditionally been indifferent to computational models. Computational personality is a new field that involves the automatic classification of individuals' personality traits that can be compared against gold-standard labels. In this context, we introduce a new vectorial semantics approach to personality assessment, which involves the construction of vectors representing personality dimensions and disorders, and the automatic measurements of the similarity between these vectors and texts written by human subjects. We evaluated our approach by using a corpus of 2468 essays written by students who were also assessed through the five-factor personality model. To validate our approach, we measured the similarity between the essays and the personality vectors to produce personality disorder scores. These scores and their correspondence with the subjects' classification of the five personality factors reproduce patterns well-documented in the psychological literature. In addition, we show that, based on the personality vectors, we can predict each of the five personality factors with high accuracy. PMID:24755833
ERIC Educational Resources Information Center
Aman, Michael G.
This working bibliography was compiled as part of an extensive review of instruments used for assessing behavioral and emotional disorders in persons with mental retardation. The literature search went back to the early 1970s and included computer searches as well as survey responses from 50 prominent workers in the field, responses from…
ERIC Educational Resources Information Center
Scott, Michael J.; Ghinea, Gheorghita
2014-01-01
Deliberate practice is important in many areas of learning, including that of learning to program computers. However, beliefs about the nature of personal traits, known as "mindsets," can have a profound impact on such practice. Previous research has shown that those with a "fixed mindset" believe their traits cannot change;…
Here's What We Have to Say! Podcasting in the Early Childhood Classroom
ERIC Educational Resources Information Center
Berson, Ilene R.
2009-01-01
A podcast is an audio file published to the Internet for playback on mobile devices and personal computers; the meaning of the term has expanded to include video files, or "enhanced podcasts" as well. Many students are already engaged with digital technologies when they first step into early childhood classrooms. Children as young as…
Touch and Gesture-Based Language Learning: Some Possible Avenues for Research and Classroom Practice
ERIC Educational Resources Information Center
Reinders, Hayo
2014-01-01
Our interaction with digital resources is becoming increasingly based on touch, gestures, and now also eye movement. Many everyday consumer electronics products already include touch-based interfaces, from e-book readers to tablets, and from the last personal computers to the GPS system in your car. What implications do these new forms of…
The Need to Address Mobile Device Security in the Higher Education IT Curriculum
ERIC Educational Resources Information Center
Patten, Karen P.; Harris, Mark A.
2013-01-01
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
A Numerical Approach to Solving the Hall MHD Equations Including Diamagnetic Drift (Preprint)
2008-02-19
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON Dr. Jean-Luc Cambier a. REPORT...1997. [3] L. Chacon and D.A. Knoll. A 2d high-beta hall mhd implicit nonlinear solver. Journal of Computational Physics, 188:573–592, 2003. [4] Tony F
75 FR 3238 - Draft Guidance for Industry and Food and Drug Administration Staff; Heart Valves...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-20
...-847-8149 to receive a hard copy. Please use the document number (1607). CDRH maintains an entry on the... personal computer with Internet access. Updated on a regular basis, the CDRH home page includes device... capability for all CDRH guidance documents is available at http://www.fda.gov/medicaldevices...
Outcomes of On-Line Financial Education for Chronically Ill Rural Women
ERIC Educational Resources Information Center
Haynes, Deborah C.; Haynes, George W.; Weinert, Clarann
2011-01-01
This research was part of a larger longitudinal study of chronically ill rural women to determine if computer technology could be effective in allowing the women to take control of their own well-being, including finances. The current study examined whether chronically ill rural women can effectively use on-line personal finance educational…
NASA Technical Reports Server (NTRS)
Smith, M. E.; Gevins, A.; Brown, H.; Karnik, A.; Du, R.
2001-01-01
Electroencephalographic (EEG) recordings were made while 16 participants performed versions of a personal-computer-based flight simulation task of low, moderate, or high difficulty. As task difficulty increased, frontal midline theta EEG activity increased and alpha band activity decreased. A participant-specific function that combined multiple EEG features to create a single load index was derived from a sample of each participant's data and then applied to new test data from that participant. Index values were computed for every 4 s of task data. Across participants, mean task load index values increased systematically with increasing task difficulty and differed significantly between the different task versions. Actual or potential applications of this research include the use of multivariate EEG-based methods to monitor task loading during naturalistic computer-based work.
Construction of In-house Databases in a Corporation
NASA Astrophysics Data System (ADS)
Nishikawa, Takaya
The author describes the progress in and present status of the information management system at the research laboratories as a R & D component of pharmaceutical industry. The system deals with three fundamental types of information, that is, graphic information, numeral information and textual information which includes the former two types of information. The author and others have constructed the system which enables to process these kinds of information integrally. The system is also featured by the fact that natural form of information in which Japanese words (2 byte type) and English (1 byte type) as culture of personal & word processing computers are mixed can be processed by large-size computers because Japanese language are eligible for computer processing. The system is originally for research administrators, but can be effective also for researchers. At present 7 databases are available including external databases. The system is always ready to accept other databases newly.
Summary of talks and papers at ISCB-Asia/SCCG 2012
2013-01-01
The second ISCB-Asia conference of the International Society for Computational Biology took place December 17-19, 2012, in Shenzhen, China. The conference was co-hosted by BGI as the first Shenzhen Conference on Computational Genomics (SCCG). 45 talks were presented at ISCB-Asia/SCCG 2012. The topics covered included software tools, reproducible computing, next-generation sequencing data analysis, transcription and mRNA regulation, protein structure and function, cancer genomics and personalized medicine. Nine of the proceedings track talks are included as full papers in this supplement. In this report we first give a short overview of the conference by listing some statistics and visualizing the talk abstracts as word clouds. Then we group the talks by topic and briefly summarize each one, providing references to related publications whenever possible. Finally, we close with a few comments on the success of this conference.
Internet design preferences of patients with cancer.
Chernecky, Cynthia; Macklin, Denise; Walter, Jennifer
2006-07-01
To describe computer experience and preferences for multimedia design. Prospective, descriptive. Physician office and outpatient cancer centers in an urban area in the southeastern United States. Convenience sample of 22 volunteer patients with cancer from four racial groups. A questionnaire on computer experiences was followed by a hands-on computer session with questions regarding preferences for seven interface items. Data termination occurred when sample size was obtained. Design of Internet education site for patients. Variables include preferences, computer, cancer, multimedia, and education. Eighty-two percent had personal computers, 41% used a computer daily, and 95% believed that computers would be a good avenue for learning about cancer care. Preferences included display colors in blue and green hues; colored buttons; easy-to-read text; graphics with a simple design and large, clear pictures; serif font in dark type; light-colored background; and larger photo size in a rectangle shape. Most popular graphic icons as metaphors were 911 for emergency, picture of skull and crossbones for danger, and a picture of a string on an index finger representing reminder. The simple layout most preferred for appearances was one that included text and pictures, read from left to right, and was symmetrical in its placement of pictures and text on the page. Preferences are necessary to maintain interest and support navigation through computer designs to enhance the translation of knowledge to patients. Development of multimedia based on patient preferences will enhance education, learning, and, ultimately, quality patient care.
To Mac or Not To Mac? One Apple Devotee's Excruciating Purchase Dilemma.
ERIC Educational Resources Information Center
Shenk, David
1998-01-01
Discusses the pros and cons of selecting Apple Macintosh computers versus a personal computer that runs the Windows platform. Graphical user interfaces, current and future support, and aesthetics are considered, as well as personal preferences. (LRW)
Emancipative Educational Technology.
ERIC Educational Resources Information Center
Boyd, Gary M.
1996-01-01
Presents a theoretical systems model for computer-mediated conferencing. Discusses Habermas' criteria for emancipative discourse (i.e., liberation or emancipation is increasing a person's abilities and opportunities to make rational choices about matters important to that person). Demonstrates why computer conferencing is best suited to…
Use of computer games as an intervention for stroke.
Proffitt, Rachel M; Alankus, Gazihan; Kelleher, Caitlin L; Engsberg, Jack R
2011-01-01
Current rehabilitation for persons with hemiparesis after stroke requires high numbers of repetitions to be in accordance with contemporary motor learning principles. The motivational characteristics of computer games can be harnessed to create engaging interventions for persons with hemiparesis after stroke that incorporate this high number of repetitions. The purpose of this case report was to test the feasibility of using computer games as a 6-week home therapy intervention to improve upper extremity function for a person with stroke. One person with left upper extremity hemiparesis after stroke participated in a 6-week home therapy computer game intervention. The games were customized to her preferences and abilities and modified weekly. Her performance was tracked and analyzed. Data from pre-, mid-, and postintervention testing using standard upper extremity measures and the Reaching Performance Scale (RPS) were analyzed. After 3 weeks, the participant demonstrated increased upper extremity range of motion at the shoulder and decreased compensatory trunk movements during reaching tasks. After 6 weeks, she showed functional gains in activities of daily living (ADLs) and instrumental ADLs despite no further improvements on the RPS. Results indicate that computer games have the potential to be a useful intervention for people with stroke. Future work will add additional support to quantify the effectiveness of the games as a home therapy intervention for persons with stroke.
White, Timothy C.; Sauter, Edward A.; Stewart, Duff C.
2014-01-01
Intermagnet is an international oversight group which exists to establish a global network for geomagnetic observatories. This group establishes data standards and standard operating procedures for members and prospective members. Intermagnet has proposed a new One-Second Data Standard, for that emerging geomagnetic product. The standard specifies that all data collected must have a time stamp accuracy of ±10 milliseconds of the top-of-the-second Coordinated Universal Time. Therefore, the U.S. Geological Survey Geomagnetism Program has designed and executed several tests on its current data collection system, the Personal Computer Data Collection Platform. Tests are designed to measure the time shifts introduced by individual components within the data collection system, as well as to measure the time shift introduced by the entire Personal Computer Data Collection Platform. Additional testing designed for Intermagnet will be used to validate further such measurements. Current results of the measurements showed a 5.0–19.9 millisecond lag for the vertical channel (Z) of the Personal Computer Data Collection Platform and a 13.0–25.8 millisecond lag for horizontal channels (H and D) of the collection system. These measurements represent a dynamically changing delay introduced within the U.S. Geological Survey Personal Computer Data Collection Platform.
Development of a personal-computer-based intelligent tutoring system
NASA Technical Reports Server (NTRS)
Mueller, Stephen J.
1988-01-01
A large number of Intelligent Tutoring Systems (ITSs) have been built since they were first proposed in the early 1970's. Research conducted on the use of the best of these systems has demonstrated their effectiveness in tutoring in selected domains. A prototype ITS for tutoring students in the use of CLIPS language: CLIPSIT (CLIPS Intelligent Tutor) was developed. For an ITS to be widely accepted, not only must it be effective, flexible, and very responsive, it must also be capable of functioning on readily available computers. While most ITSs have been developed on powerful workstations, CLIPSIT is designed for use on the IBM PC/XT/AT personal computer family (and their clones). There are many issues to consider when developing an ITS on a personal computer such as the teaching strategy, user interface, knowledge representation, and program design methodology. Based on experiences in developing CLIPSIT, results on how to address some of these issues are reported and approaches are suggested for maintaining a powerful learning environment while delivering robust performance within the speed and memory constraints of the personal computer.
NASA Technical Reports Server (NTRS)
Gupta, K. K.
1997-01-01
A multidisciplinary, finite element-based, highly graphics-oriented, linear and nonlinear analysis capability that includes such disciplines as structures, heat transfer, linear aerodynamics, computational fluid dynamics, and controls engineering has been achieved by integrating several new modules in the original STARS (STructural Analysis RoutineS) computer program. Each individual analysis module is general-purpose in nature and is effectively integrated to yield aeroelastic and aeroservoelastic solutions of complex engineering problems. Examples of advanced NASA Dryden Flight Research Center projects analyzed by the code in recent years include the X-29A, F-18 High Alpha Research Vehicle/Thrust Vectoring Control System, B-52/Pegasus Generic Hypersonics, National AeroSpace Plane (NASP), SR-71/Hypersonic Launch Vehicle, and High Speed Civil Transport (HSCT) projects. Extensive graphics capabilities exist for convenient model development and postprocessing of analysis results. The program is written in modular form in standard FORTRAN language to run on a variety of computers, such as the IBM RISC/6000, SGI, DEC, Cray, and personal computer; associated graphics codes use OpenGL and IBM/graPHIGS language for color depiction. This program is available from COSMIC, the NASA agency for distribution of computer programs.
Genomics and privacy: implications of the new reality of closed data for the field.
Greenbaum, Dov; Sboner, Andrea; Mu, Xinmeng Jasmine; Gerstein, Mark
2011-12-01
Open source and open data have been driving forces in bioinformatics in the past. However, privacy concerns may soon change the landscape, limiting future access to important data sets, including personal genomics data. Here we survey this situation in some detail, describing, in particular, how the large scale of the data from personal genomic sequencing makes it especially hard to share data, exacerbating the privacy problem. We also go over various aspects of genomic privacy: first, there is basic identifiability of subjects having their genome sequenced. However, even for individuals who have consented to be identified, there is the prospect of very detailed future characterization of their genotype, which, unanticipated at the time of their consent, may be more personal and invasive than the release of their medical records. We go over various computational strategies for dealing with the issue of genomic privacy. One can "slice" and reformat datasets to allow them to be partially shared while securing the most private variants. This is particularly applicable to functional genomics information, which can be largely processed without variant information. For handling the most private data there are a number of legal and technological approaches-for example, modifying the informed consent procedure to acknowledge that privacy cannot be guaranteed, and/or employing a secure cloud computing environment. Cloud computing in particular may allow access to the data in a more controlled fashion than the current practice of downloading and computing on large datasets. Furthermore, it may be particularly advantageous for small labs, given that the burden of many privacy issues falls disproportionately on them in comparison to large corporations and genome centers. Finally, we discuss how education of future genetics researchers will be important, with curriculums emphasizing privacy and data security. However, teaching personal genomics with identifiable subjects in the university setting will, in turn, create additional privacy issues and social conundrums. © 2011 Greenbaum et al.
Assessment of toxic metals in waste personal computers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kolias, Konstantinos; Hahladakis, John N., E-mail: john_chach@yahoo.gr; Gidarakos, Evangelos, E-mail: gidarako@mred.tuc.gr
Highlights: • Waste personal computers were collected and dismantled in their main parts. • Motherboards, monitors and plastic housing were examined in their metal content. • Concentrations measured were compared to the RoHS Directive, 2002/95/EC. • Pb in motherboards and funnel glass of devices released <2006 was above the limit. • Waste personal computers need to be recycled and environmentally sound managed. - Abstract: Considering the enormous production of waste personal computers nowadays, it is obvious that the study of their composition is necessary in order to regulate their management and prevent any environmental contamination caused by their inappropriate disposal.more » This study aimed at determining the toxic metals content of motherboards (printed circuit boards), monitor glass and monitor plastic housing of two Cathode Ray Tube (CRT) monitors, three Liquid Crystal Display (LCD) monitors, one LCD touch screen monitor and six motherboards, all of which were discarded. In addition, concentrations of chromium (Cr), cadmium (Cd), lead (Pb) and mercury (Hg) were compared with the respective limits set by the RoHS 2002/95/EC Directive, that was recently renewed by the 2012/19/EU recast, in order to verify manufacturers’ compliance with the regulation. The research included disassembly, pulverization, digestion and chemical analyses of all the aforementioned devices. The toxic metals content of all samples was determined using Inductively Coupled Plasma-Mass Spectrometry (ICP-MS). The results demonstrated that concentrations of Pb in motherboards and funnel glass of devices with release dates before 2006, that is when the RoHS Directive came into force, exceeded the permissible limit. In general, except from Pb, higher metal concentrations were detected in motherboards in comparison with plastic housing and glass samples. Finally, the results of this work were encouraging, since concentrations of metals referred in the RoHS Directive were found in lower levels than the legislative limits.« less
The Individual Virtual Eye: a Computer Model for Advanced Intraocular Lens Calculation
Einighammer, Jens; Oltrup, Theo; Bende, Thomas; Jean, Benedikt
2010-01-01
Purpose To describe the individual virtual eye, a computer model of a human eye with respect to its optical properties. It is based on measurements of an individual person and one of its major application is calculating intraocular lenses (IOLs) for cataract surgery. Methods The model is constructed from an eye's geometry, including axial length and topographic measurements of the anterior corneal surface. All optical components of a pseudophakic eye are modeled with computer scientific methods. A spline-based interpolation method efficiently includes data from corneal topographic measurements. The geometrical optical properties, such as the wavefront aberration, are simulated with real ray-tracing using Snell's law. Optical components can be calculated using computer scientific optimization procedures. The geometry of customized aspheric IOLs was calculated for 32 eyes and the resulting wavefront aberration was investigated. Results The more complex the calculated IOL is, the lower the residual wavefront error is. Spherical IOLs are only able to correct for the defocus, while toric IOLs also eliminate astigmatism. Spherical aberration is additionally reduced by aspheric and toric aspheric IOLs. The efficient implementation of time-critical numerical ray-tracing and optimization procedures allows for short calculation times, which may lead to a practicable method integrated in some device. Conclusions The individual virtual eye allows for simulations and calculations regarding geometrical optics for individual persons. This leads to clinical applications like IOL calculation, with the potential to overcome the limitations of those current calculation methods that are based on paraxial optics, exemplary shown by calculating customized aspheric IOLs.
Value of wireless personal digital assistants for practice: perceptions of advanced practice nurses.
Garrett, Bernard; Klein, Gerri
2008-08-01
The aims were to explore advanced practice nurses' perceptions on wireless Personal Digital Assistant technologies, to establish the type and range of tools that would be useful to support their practice and to identify any requirements and limitations that may impact the implementation of wireless Personal Digital Assistants in practice. The wireless Personal Digital Assistant is becoming established as a hand-held computing tool for healthcare professionals. The reflections of advanced practice nurses' about the value of wireless Personal Digital Assistants and its potential to contribute to improved patient care has not been investigated. A qualitative interpretivist design was used to explore advanced practice nurses' perceptions on the value of wireless Personal Digital Assistant technologies to support their practice. The data were collected using survey questionnaires and individual and focus group interviews with nurse practitioners, clinical nurse specialists and information technology managers based in British Columbia, Canada. An open-coding content analysis was performed using qualitative data analysis software. Wireless Personal Digital Assistant's use supports the principles of pervasivity and is a technology rapidly being adopted by advanced practice nurses. Some nurses indicated a reluctance to integrate wireless Personal Digital Assistant technologies into their practices because of the cost and the short technological life cycle of these devices. Many of the barriers which precluded the use of wireless networks within facilities are being removed. Nurses demonstrated a complex understanding of wireless Personal Digital Assistant technologies and gave good rationales for its integration in their practice. Nurses identified improved client care as the major benefit of this technology in practice and the type and range of tools they identified included clinical reference tools such as drug and diagnostic/laboratory reference applications and wireless communications. Nurses in this study support integrating wireless mobile computing technologies into their practice to improve client care.
ERIC Educational Resources Information Center
Fenton, Ginger D.; LaBorde, Luke F.; Radhakrishna, Rama B.; Brown, J. Lynne; Cutter, Catherine N.
2006-01-01
Computer-based training is increasingly favored by food companies for training workers due to convenience, self-pacing ability, and ease of use. The objectives of this study were to determine if personal hygiene training, offered through a computer-based method, is as effective as a face-to-face method in knowledge acquisition and improved…
Study on Thermal Conductivity of Personal Computer Aluminum-Magnesium Alloy Casing
NASA Astrophysics Data System (ADS)
Liao, MeiHong
With the rapid development of computer technology, micro-state atoms by simulating the movement of material to analyze the nature of the macro-state have become an important subject. Materials, especially aluminium-magnesium alloy materials, often used in personal computer case, this article puts forward heat conduction model of the material, and numerical methods of heat transfer performance of the material.
Liability for Personal Injury Caused by Defective Medical Computer Programs
Brannigan, Vincent M.
1980-01-01
Defective medical computer programs can cause personal injury. Financial responsibility for the injury under tort law will turn on several factors: whether the program is a product or a service, what types of defect exist in the product, and who produced the program. The factors involved in making these decisions are complex, but knowledge of the relevant issues can assist computer personnel in avoiding liability.
On introduction of artificial intelligence elements to heat power engineering
NASA Astrophysics Data System (ADS)
Dregalin, A. F.; Nazyrova, R. R.
1993-10-01
The basic problems of 'the thermodynamic intelligence' of personal computers have been outlined. The thermodynamic intellect of personal computers as a concept has been introduced to heat processes occurring in engines of flying vehicles. In particular, the thermodynamic intellect of computers is determined by the possibility of deriving formal relationships between thermodynamic functions. In chemical thermodynamics, a concept of a characteristic function has been introduced.
Normalized distance aggregation of discriminative features for person reidentification
NASA Astrophysics Data System (ADS)
Hou, Li; Han, Kang; Wan, Wanggen; Hwang, Jenq-Neng; Yao, Haiyan
2018-03-01
We propose an effective person reidentification method based on normalized distance aggregation of discriminative features. Our framework is built on the integration of three high-performance discriminative feature extraction models, including local maximal occurrence (LOMO), feature fusion net (FFN), and a concatenation of LOMO and FFN called LOMO-FFN, through two fast and discriminant metric learning models, i.e., cross-view quadratic discriminant analysis (XQDA) and large-scale similarity learning (LSSL). More specifically, we first represent all the cross-view person images using LOMO, FFN, and LOMO-FFN, respectively, and then apply each extracted feature representation to train XQDA and LSSL, respectively, to obtain the optimized individual cross-view distance metric. Finally, the cross-view person matching is computed as the sum of the optimized individual cross-view distance metric through the min-max normalization. Experimental results have shown the effectiveness of the proposed algorithm on three challenging datasets (VIPeR, PRID450s, and CUHK01).
Client-Server: What Is It and Are We There Yet?
ERIC Educational Resources Information Center
Gershenfeld, Nancy
1995-01-01
Discusses client-server architecture in dumb terminals, personal computers, local area networks, and graphical user interfaces. Focuses on functions offered by client personal computers: individualized environments; flexibility in running operating systems; advanced operating system features; multiuser environments; and centralized data…
Computers and Communications. Improving the Employability of Persons with Handicaps.
ERIC Educational Resources Information Center
Deitel, Harvey M.
1984-01-01
Reviews applications of computer and communications technologies for persons with visual, hearing, physical, speech, and language impairments, as well as the effects of technologies on transportation, work at home, education, and other aspects affecting the employment of the disabled. (SK)
Laboratory process control using natural language commands from a personal computer
NASA Technical Reports Server (NTRS)
Will, Herbert A.; Mackin, Michael A.
1989-01-01
PC software is described which provides flexible natural language process control capability with an IBM PC or compatible machine. Hardware requirements include the PC, and suitable hardware interfaces to all controlled devices. Software required includes the Microsoft Disk Operating System (MS-DOS) operating system, a PC-based FORTRAN-77 compiler, and user-written device drivers. Instructions for use of the software are given as well as a description of an application of the system.
Huang, Song; Tian, Na; Wang, Yan; Ji, Zhicheng
2016-01-01
Convergence stagnation is the chief difficulty to solve hard optimization problems for most particle swarm optimization variants. To address this issue, a novel particle swarm optimization using multi-information characteristics of all personal-best information is developed in our research. In the modified algorithm, two positions are defined by personal-best positions and an improved cognition term with three positions of all personal-best information is used in velocity update equation to enhance the search capability. This strategy could make particles fly to a better direction by discovering useful information from all the personal-best positions. The validity of the proposed algorithm is assessed on twenty benchmark problems including unimodal, multimodal, rotated and shifted functions, and the results are compared with that obtained by some published variants of particle swarm optimization in the literature. Computational results demonstrate that the proposed algorithm finds several global optimum and high-quality solutions in most case with a fast convergence speed.
Seamless personal health information system in cloud computing.
Chung, Wan-Young; Fong, Ee May
2014-01-01
Noncontact ECG measurement has gained popularity these days due to its noninvasive and conveniences to be applied on daily life. This approach does not require any direct contact between patient's skin and sensor for physiological signal measurement. The noncontact ECG measurement is integrated with mobile healthcare system for health status monitoring. Mobile phone acts as the personal health information system displaying health status and body mass index (BMI) tracking. Besides that, it plays an important role being the medical guidance providing medical knowledge database including symptom checker and health fitness guidance. At the same time, the system also features some unique medical functions that cater to the living demand of the patients or users, including regular medication reminders, alert alarm, medical guidance, appointment scheduling. Lastly, we demonstrate mobile healthcare system with web application for extended uses, thus health data are clouded into web server system and web database storage. This allows remote health status monitoring easily and so forth it promotes a cost effective personal healthcare system.
Djomba, Janet Klara; Zaletel-Kragelj, Lijana
2016-12-01
Research on social networks in public health focuses on how social structures and relationships influence health and health-related behaviour. While the sociocentric approach is used to study complete social networks, the egocentric approach is gaining popularity because of its focus on individuals, groups and communities. One of the participants of the healthy lifestyle health education workshop 'I'm moving', included in the study of social support for exercise was randomly selected. The participant was denoted as the ego and members of her/his social network as the alteri. Data were collected by personal interviews using a self-made questionnaire. Numerical methods and computer programmes for the analysis of social networks were used for the demonstration of analysis. The size, composition and structure of the egocentric social network were obtained by a numerical analysis. The analysis of composition included homophily and homogeneity. Moreover, the analysis of the structure included the degree of the egocentric network, the strength of the ego-alter ties and the average strength of ties. Visualisation of the network was performed by three freely available computer programmes, namely: Egonet.QF, E-net and Pajek. The computer programmes were described and compared by their usefulness. Both numerical analysis and visualisation have their benefits. The decision what approach to use is depending on the purpose of the social network analysis. While the numerical analysis can be used in large-scale population-based studies, visualisation of personal networks can help health professionals at creating, performing and evaluation of preventive programmes, especially if focused on behaviour change.
LABORATORY PROCESS CONTROLLER USING NATURAL LANGUAGE COMMANDS FROM A PERSONAL COMPUTER
NASA Technical Reports Server (NTRS)
Will, H.
1994-01-01
The complex environment of the typical research laboratory requires flexible process control. This program provides natural language process control from an IBM PC or compatible machine. Sometimes process control schedules require changes frequently, even several times per day. These changes may include adding, deleting, and rearranging steps in a process. This program sets up a process control system that can either run without an operator, or be run by workers with limited programming skills. The software system includes three programs. Two of the programs, written in FORTRAN77, record data and control research processes. The third program, written in Pascal, generates the FORTRAN subroutines used by the other two programs to identify the user commands with the user-written device drivers. The software system also includes an input data set which allows the user to define the user commands which are to be executed by the computer. To set the system up the operator writes device driver routines for all of the controlled devices. Once set up, this system requires only an input file containing natural language command lines which tell the system what to do and when to do it. The operator can make up custom commands for operating and taking data from external research equipment at any time of the day or night without the operator in attendance. This process control system requires a personal computer operating under MS-DOS with suitable hardware interfaces to all controlled devices. The program requires a FORTRAN77 compiler and user-written device drivers. This program was developed in 1989 and has a memory requirement of about 62 Kbytes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zuo, Wangda; McNeil, Andrew; Wetter, Michael
2013-05-23
Building designers are increasingly relying on complex fenestration systems to reduce energy consumed for lighting and HVAC in low energy buildings. Radiance, a lighting simulation program, has been used to conduct daylighting simulations for complex fenestration systems. Depending on the configurations, the simulation can take hours or even days using a personal computer. This paper describes how to accelerate the matrix multiplication portion of a Radiance three-phase daylight simulation by conducting parallel computing on heterogeneous hardware of a personal computer. The algorithm was optimized and the computational part was implemented in parallel using OpenCL. The speed of new approach wasmore » evaluated using various daylighting simulation cases on a multicore central processing unit and a graphics processing unit. Based on the measurements and analysis of the time usage for the Radiance daylighting simulation, further speedups can be achieved by using fast I/O devices and storing the data in a binary format.« less
A design of an interface board between a MRC thermistor probe and a personal computer.
DOT National Transportation Integrated Search
2013-09-01
The main purpose of this project was to design and build a prototype of an interface board between an MRC temperature probe : (thermistor array) and a personal laptop computer. This interface board replaces and significantly improve the capabilities ...
Feedback and its effectiveness in a computer-aided personalized system of instruction course.
Martin, Toby L; Pear, Joseph J; Martin, Garry L
2002-01-01
In a computer-managed version of Keller's personalized system of instruction, students received frequent feedback from more advanced students within the course. Overall accuracy of student-provided feedback was 87%, and students complied with 61% of the feedback. PMID:12555917
76 FR 12935 - Proposed Information Collection; Comment Request; The American Community Survey
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-09
... to conduct interviews via Computer-assisted Telephone Interviews (CATI). We will also conduct Computer-assisted Personal Interviews (CAPI) for a sub sample of nonrespondents. A content reinterview will... representatives (FRs) will conduct personal interviews with respondents to complete questionnaires or, if...
Chernenkov, Iu V; Gumeniuk, O I
2009-01-01
The paper presents the results of studying the impact of using cellular phones and personal computers on the health status of 277 Saratov schoolchildren (mean age 13.2 +/- 2.3 years). About 80% of the adolescents have been ascertained to use cellular phones and computers mainly for game purposes. The active users of cellular phones and computers show a high aggressiveness, anxiety, hostility, and social stress, low stress resistance, and susceptibility to arterial hypotension. The negative influence of cellular phones and computers on the schoolchildren's health increases with the increased duration and frequency of their use.
Semi-automatic object geometry estimation for image personalization
NASA Astrophysics Data System (ADS)
Ding, Hengzhou; Bala, Raja; Fan, Zhigang; Eschbach, Reiner; Bouman, Charles A.; Allebach, Jan P.
2010-01-01
Digital printing brings about a host of benefits, one of which is the ability to create short runs of variable, customized content. One form of customization that is receiving much attention lately is in photofinishing applications, whereby personalized calendars, greeting cards, and photo books are created by inserting text strings into images. It is particularly interesting to estimate the underlying geometry of the surface and incorporate the text into the image content in an intelligent and natural way. Current solutions either allow fixed text insertion schemes into preprocessed images, or provide manual text insertion tools that are time consuming and aimed only at the high-end graphic designer. It would thus be desirable to provide some level of automation in the image personalization process. We propose a semi-automatic image personalization workflow which includes two scenarios: text insertion and text replacement. In both scenarios, the underlying surfaces are assumed to be planar. A 3-D pinhole camera model is used for rendering text, whose parameters are estimated by analyzing existing structures in the image. Techniques in image processing and computer vison such as the Hough transform, the bilateral filter, and connected component analysis are combined, along with necessary user inputs. In particular, the semi-automatic workflow is implemented as an image personalization tool, which is presented in our companion paper.1 Experimental results including personalized images for both scenarios are shown, which demonstrate the effectiveness of our algorithms.
RUDO: A Home Ambient Intelligence System for Blind People
Hudec, Milan
2017-01-01
The article introduces an ambient intelligence system for blind people which besides providing assistance in home environment also helps with various situations and roles in which blind people may find themselves involved. RUDO, the designed system, comprises several modules that mainly support or ensure recognition of approaching people, alerting to other household members’ movement in the flat, work on a computer, supervision of (sighted) children, cooperation of a sighted and a blind person (e.g., when studying), control of heating and zonal regulation by a blind person. It has a unified user interface that gives the blind person access to individual functions. The interface for blind people offers assistance with work on a computer, including writing in Braille on a regular keyboard and specialized work in informatics and electronics (e.g., programming). RUDO can complement the standard aids used by blind people at home, it increases their independence and creates conditions that allow them to become fully involved. RUDO also supports blind people sharing a home with sighted people, which contributes to their feeling of security and greater inclusion in society. RUDO has been implemented in a household for two years, which allows an evaluation of its use in practice. PMID:28829372
RUDO: A Home Ambient Intelligence System for Blind People.
Hudec, Milan; Smutny, Zdenek
2017-08-22
The article introduces an ambient intelligence system for blind people which besides providing assistance in home environment also helps with various situations and roles in which blind people may find themselves involved. RUDO, the designed system, comprises several modules that mainly support or ensure recognition of approaching people, alerting to other household members' movement in the flat, work on a computer, supervision of (sighted) children, cooperation of a sighted and a blind person (e.g., when studying), control of heating and zonal regulation by a blind person. It has a unified user interface that gives the blind person access to individual functions. The interface for blind people offers assistance with work on a computer, including writing in Braille on a regular keyboard and specialized work in informatics and electronics (e.g., programming). RUDO can complement the standard aids used by blind people at home, it increases their independence and creates conditions that allow them to become fully involved. RUDO also supports blind people sharing a home with sighted people, which contributes to their feeling of security and greater inclusion in society. RUDO has been implemented in a household for two years, which allows an evaluation of its use in practice.
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
NASA Astrophysics Data System (ADS)
Mannan, Mohammad; van Oorschot, P. C.
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (
Recycling of WEEE: Characterization of spent printed circuit boards from mobile phones and computers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yamane, Luciana Harue, E-mail: lucianayamane@uol.com.br; Tavares de Moraes, Viviane, E-mail: tavares.vivi@gmail.com; Crocce Romano Espinosa, Denise, E-mail: espinosa@usp.br
Highlights: > This paper presents new and important data on characterization of wastes of electric and electronic equipments. > Copper concentration is increasing in mobile phones and remaining constant in personal computers. > Printed circuit boards from mobile phones and computers would not be mixed prior treatment. - Abstract: This paper presents a comparison between printed circuit boards from computers and mobile phones. Since printed circuits boards are becoming more complex and smaller, the amount of materials is constantly changing. The main objective of this work was to characterize spent printed circuit boards from computers and mobile phones applying mineralmore » processing technique to separate the metal, ceramic, and polymer fractions. The processing was performed by comminution in a hammer mill, followed by particle size analysis, and by magnetic and electrostatic separation. Aqua regia leaching, loss-on-ignition and chemical analysis (inductively coupled plasma atomic emission spectroscopy - ICP-OES) were carried out to determine the composition of printed circuit boards and the metal rich fraction. The composition of the studied mobile phones printed circuit boards (PCB-MP) was 63 wt.% metals; 24 wt.% ceramics and 13 wt.% polymers; and of the printed circuit boards from studied personal computers (PCB-PC) was 45 wt.% metals; 27 wt.% polymers and ceramics 28 wt.% ceramics. The chemical analysis showed that copper concentration in printed circuit boards from personal computers was 20 wt.% and in printed circuit boards from mobile phones was 34.5 wt.%. According to the characteristics of each type of printed circuit board, the recovery of precious metals may be the main goal of the recycling process of printed circuit boards from personal computers and the recovery of copper should be the main goal of the recycling process of printed circuit boards from mobile phones. Hence, these printed circuit boards would not be mixed prior treatment. The results of this paper show that copper concentration is increasing in mobile phones and remaining constant in personal computers.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education & Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1-3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices. Leaders may incorporate the Short Subjects into presentations. After talkingmore » about a subject area, one of the Short Subjects may be shown to highlight that subject matter. Another method for sharing them could be to show a Short Subject first and then lead a discussion about its topic. The cast of characters and a bit of information about their personalities in the LLNL Computer Security Short Subjects is included in this report.« less
Human-Computer Interaction and Information Management Research Needs
2003-10-01
Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be...hand-held personal digital assistants, networked sensors and actuators, and low-power computers on satellites. 5 most complex tools that humans have...calculations using data on external media such as tapes evolved into our multi-functional 21st century systems. More ideas came as networks of computing
Common and distinct neural correlates of personal and vicarious reward: A quantitative meta-analysis
Morelli, Sylvia A.; Sacchet, Matthew D.; Zaki, Jamil
2015-01-01
Individuals experience reward not only when directly receiving positive outcomes (e.g., food or money), but also when observing others receive such outcomes. This latter phenomenon, known as vicarious reward, is a perennial topic of interest among psychologists and economists. More recently, neuroscientists have begun exploring the neuroanatomy underlying vicarious reward. Here we present a quantitative whole-brain meta-analysis of this emerging literature. We identified 25 functional neuroimaging studies that included contrasts between vicarious reward and a neutral control, and subjected these contrasts to an activation likelihood estimate (ALE) meta-analysis. This analysis revealed a consistent pattern of activation across studies, spanning structures typically associated with the computation of value (especially ventromedial prefrontal cortex) and mentalizing (including dorsomedial prefrontal cortex and superior temporal sulcus). We further quantitatively compared this activation pattern to activation foci from a previous meta-analysis of personal reward. Conjunction analyses yielded overlapping VMPFC activity in response to personal and vicarious reward. Contrast analyses identified preferential engagement of the nucleus accumbens in response to personal as compared to vicarious reward, and in mentalizing-related structures in response to vicarious as compared to personal reward. These data shed light on the common and unique components of the reward that individuals experience directly and through their social connections. PMID:25554428
Rickmann, M; Siklós, L; Joó, F; Wolff, J R
1990-09-01
An interface for IBM XT/AT-compatible computers is described which has been designed to read the actual specimen stage position of electron microscopes. The complete system consists of (i) optical incremental encoders attached to the x- and y-stage drivers of the microscope, (ii) two keypads for operator input, (iii) an interface card fitted to the bus of the personal computer, (iv) a standard configuration IBM XT (or compatible) personal computer optionally equipped with a (v) HP Graphic Language controllable colour plotter. The small size of the encoders and their connection to the stage drivers by simple ribbed belts allows an easy adaptation of the system to most electron microscopes. Operation of the interface card itself is supported by any high-level language available for personal computers. By the modular concept of these languages, the system can be customized to various applications, and no computer expertise is needed for actual operation. The present configuration offers an inexpensive attachment, which covers a wide range of applications from a simple notebook to high-resolution (200-nm) mapping of tissue. Since section coordinates can be processed in real-time, stereological estimations can be derived directly "on microscope". This is exemplified by an application in which particle numbers were determined by the disector method.
A direct-to-drive neural data acquisition system.
Kinney, Justin P; Bernstein, Jacob G; Meyer, Andrew J; Barber, Jessica B; Bolivar, Marti; Newbold, Bryan; Scholvin, Jorg; Moore-Kochlacs, Caroline; Wentz, Christian T; Kopell, Nancy J; Boyden, Edward S
2015-01-01
Driven by the increasing channel count of neural probes, there is much effort being directed to creating increasingly scalable electrophysiology data acquisition (DAQ) systems. However, all such systems still rely on personal computers for data storage, and thus are limited by the bandwidth and cost of the computers, especially as the scale of recording increases. Here we present a novel architecture in which a digital processor receives data from an analog-to-digital converter, and writes that data directly to hard drives, without the need for a personal computer to serve as an intermediary in the DAQ process. This minimalist architecture may support exceptionally high data throughput, without incurring costs to support unnecessary hardware and overhead associated with personal computers, thus facilitating scaling of electrophysiological recording in the future.
A direct-to-drive neural data acquisition system
Kinney, Justin P.; Bernstein, Jacob G.; Meyer, Andrew J.; Barber, Jessica B.; Bolivar, Marti; Newbold, Bryan; Scholvin, Jorg; Moore-Kochlacs, Caroline; Wentz, Christian T.; Kopell, Nancy J.; Boyden, Edward S.
2015-01-01
Driven by the increasing channel count of neural probes, there is much effort being directed to creating increasingly scalable electrophysiology data acquisition (DAQ) systems. However, all such systems still rely on personal computers for data storage, and thus are limited by the bandwidth and cost of the computers, especially as the scale of recording increases. Here we present a novel architecture in which a digital processor receives data from an analog-to-digital converter, and writes that data directly to hard drives, without the need for a personal computer to serve as an intermediary in the DAQ process. This minimalist architecture may support exceptionally high data throughput, without incurring costs to support unnecessary hardware and overhead associated with personal computers, thus facilitating scaling of electrophysiological recording in the future. PMID:26388740
2010-11-30
www.nprst.navy.mil NPRST-TN-11-1 November 2010 Practical Recommendations for -level Estimation in NCAPS Frederick L. Oswald, Ph.D. Rice University...Navy Computer Adaptive Personality Scales ( NCAPS ) Frederick L. Oswald, Ph.D. Rice University Reviewed, Approved, and Released by David M...Personality Scales ( NCAPS ) Frederick P. Oswald, Ph.D. Rice University 6100 Main St., MS25 Houston, TX 77005 Navy Personnel Research, Studies, and
ERIC Educational Resources Information Center
Hand, Thea
2012-01-01
In the last 20 years, educational technology has exploded into the schoolhouse as a result of the exponential advances being made on a global front in technology to include the Internet, personal computing, smart phones and mobile devices. Much research has been conducted regarding the advent of integrating this technology within the core…
Advanced Civilian Aeronautical Concepts
NASA Technical Reports Server (NTRS)
Bushnell, Dennis M.
1996-01-01
Paper discusses alternatives to currently deployed systems which could provide revolutionary improvements in metrics applicable to civilian aeronautics. Specific missions addressed include subsonic transports, supersonic transports and personal aircraft. These alternative systems and concepts are enabled by recent and envisaged advancements in electronics, communications, computing and Designer Fluid Mechanics in conjunction with a design approach employing extensive synergistic interactions between propulsion, aerodynamics and structures.
Beyond the Organizer: A Manual of Educational Uses for the Handheld Computer.
ERIC Educational Resources Information Center
Leibiger, Carol A.
This manual was initially written to support the University of South Dakota's Palm Initiative. It has been substantially revised and updated to include the latest in handheld applications with educational uses, and it applies to any Personal Digital Assistant (PDA) using the Palm OS Software (3.1 or higher) and having at least 8 megabytes of…
Include Your Patrons in Web Design. Computers in Small Libraries
ERIC Educational Resources Information Center
Roberts, Gary
2005-01-01
Successful Web publishing requires not only technical skills but also a refined sense of taste, a good understanding of design, and strong writing abilities. When designing a library Web page, a person must possess all of these talents and be able to market to a broad spectrum of patrons. As a result, library sites vary widely in their style and…
2013-04-01
completely change the entire landscape. For example, under the quantum computing regime, factoring prime numbers requires only polynomial time (i.e., Shor’s...AFRL-OSR-VA-TR-2013-0206 Wireless Cybersecurity Biao Chen Syracuse University April 2013 Final Report DISTRIBUTION A...19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 21-02-2013 FINAL REPORT 01-04-2009 TO 30-11-2012 Wireless Cybersecurity
BehavePlus fire modeling system, version 4.0: User's Guide
Patricia L. Andrews; Collin D. Bevins; Robert C. Seli
2005-01-01
The BehavePlus fire modeling system is a program for personal computers that is a collection of mathematical models that describe fire and the fire environment. It is a flexible system that produces tables, graphs, and simple diagrams. It can be used for a multitude of fire management applications including projecting the behavior of an ongoing fire, planning...
NASA Technical Reports Server (NTRS)
White, P. R.; Little, R. R.
1985-01-01
A research effort was undertaken to develop personal computer based software for vibrational analysis. The software was developed to analytically determine the natural frequencies and mode shapes for the uncoupled lateral vibrations of the blade and counterweight assemblies used in a single bladed wind turbine. The uncoupled vibration analysis was performed in both the flapwise and chordwise directions for static rotor conditions. The effects of rotation on the uncoupled flapwise vibration of the blade and counterweight assemblies were evaluated for various rotor speeds up to 90 rpm. The theory, used in the vibration analysis codes, is based on a lumped mass formulation for the blade and counterweight assemblies. The codes are general so that other designs can be readily analyzed. The input for the codes is generally interactive to facilitate usage. The output of the codes is both tabular and graphical. Listings of the codes are provided. Predicted natural frequencies of the first several modes show reasonable agreement with experimental results. The analysis codes were originally developed on a DEC PDP 11/34 minicomputer and then downloaded and modified to run on an ITT XTRA personal computer. Studies conducted to evaluate the efficiency of running the programs on a personal computer as compared with the minicomputer indicated that, with the proper combination of hardware and software options, the efficiency of using a personal computer exceeds that of a minicomputer.
Ahamed, Nizam U; Sundaraj, Kenneth; Poo, Tarn S
2013-03-01
This article describes the design of a robust, inexpensive, easy-to-use, small, and portable online electromyography acquisition system for monitoring electromyography signals during rehabilitation. This single-channel (one-muscle) system was connected via the universal serial bus port to a programmable Windows operating system handheld tablet personal computer for storage and analysis of the data by the end user. The raw electromyography signals were amplified in order to convert them to an observable scale. The inherent noise of 50 Hz (Malaysia) from power lines electromagnetic interference was then eliminated using a single-hybrid IC notch filter. These signals were sampled by a signal processing module and converted into 24-bit digital data. An algorithm was developed and programmed to transmit the digital data to the computer, where it was reassembled and displayed in the computer using software. Finally, the following device was furnished with the graphical user interface to display the online muscle strength streaming signal in a handheld tablet personal computer. This battery-operated system was tested on the biceps brachii muscles of 20 healthy subjects, and the results were compared to those obtained with a commercial single-channel (one-muscle) electromyography acquisition system. The results obtained using the developed device when compared to those obtained from a commercially available physiological signal monitoring system for activities involving muscle contractions were found to be comparable (the comparison of various statistical parameters) between male and female subjects. In addition, the key advantage of this developed system over the conventional desktop personal computer-based acquisition systems is its portability due to the use of a tablet personal computer in which the results are accessible graphically as well as stored in text (comma-separated value) form.
Implementing Computer Technology in the Rehabilitation Process.
ERIC Educational Resources Information Center
McCollum, Paul S., Ed.; Chan, Fong, Ed.
1985-01-01
This special issue contains seven articles, addressing rehabilitation in the information age, computer-assisted rehabilitation services, computer technology in rehabilitation counseling, computer-assisted career exploration and vocational decision making, computer-assisted assessment, computer enhanced employment opportunities for persons with…
Dilsizian, Steven E; Siegel, Eliot L
2014-01-01
Although advances in information technology in the past decade have come in quantum leaps in nearly every aspect of our lives, they seem to be coming at a slower pace in the field of medicine. However, the implementation of electronic health records (EHR) in hospitals is increasing rapidly, accelerated by the meaningful use initiatives associated with the Center for Medicare & Medicaid Services EHR Incentive Programs. The transition to electronic medical records and availability of patient data has been associated with increases in the volume and complexity of patient information, as well as an increase in medical alerts, with resulting "alert fatigue" and increased expectations for rapid and accurate diagnosis and treatment. Unfortunately, these increased demands on health care providers create greater risk for diagnostic and therapeutic errors. In the near future, artificial intelligence (AI)/machine learning will likely assist physicians with differential diagnosis of disease, treatment options suggestions, and recommendations, and, in the case of medical imaging, with cues in image interpretation. Mining and advanced analysis of "big data" in health care provide the potential not only to perform "in silico" research but also to provide "real time" diagnostic and (potentially) therapeutic recommendations based on empirical data. "On demand" access to high-performance computing and large health care databases will support and sustain our ability to achieve personalized medicine. The IBM Jeopardy! Challenge, which pitted the best all-time human players against the Watson computer, captured the imagination of millions of people across the world and demonstrated the potential to apply AI approaches to a wide variety of subject matter, including medicine. The combination of AI, big data, and massively parallel computing offers the potential to create a revolutionary way of practicing evidence-based, personalized medicine.
Secure Dynamic access control scheme of PHR in cloud computing.
Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching
2012-12-01
With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access scheme in Cloud computing environments is proven flexible and secure and could effectively correspond to real-time appending and deleting user access authorization and appending and revising PHR records.
A scalable parallel black oil simulator on distributed memory parallel computers
NASA Astrophysics Data System (ADS)
Wang, Kun; Liu, Hui; Chen, Zhangxin
2015-11-01
This paper presents our work on developing a parallel black oil simulator for distributed memory computers based on our in-house parallel platform. The parallel simulator is designed to overcome the performance issues of common simulators that are implemented for personal computers and workstations. The finite difference method is applied to discretize the black oil model. In addition, some advanced techniques are employed to strengthen the robustness and parallel scalability of the simulator, including an inexact Newton method, matrix decoupling methods, and algebraic multigrid methods. A new multi-stage preconditioner is proposed to accelerate the solution of linear systems from the Newton methods. Numerical experiments show that our simulator is scalable and efficient, and is capable of simulating extremely large-scale black oil problems with tens of millions of grid blocks using thousands of MPI processes on parallel computers.
Can people with Alzheimer's disease improve their day-to-day functioning with a tablet computer?
Imbeault, Hélène; Langlois, Francis; Bocti, Christian; Gagnon, Lise; Bier, Nathalie
2018-07-01
New technologies, such as tablet computers, present great potential to support the day-to-day living of persons with Alzheimer's disease (AD). However, whether people with AD can learn how to use a tablet properly in daily life remains to be demonstrated. A single case study was conducted with a 65-year-old woman with AD. A specific and structured intervention tailored to her needs was conceptualised for the use of a calendar application on a tablet computer according to the following learning stages: Acquisition, Application and Adaptation. In spite of her severe episodic memory deficit, she showed progressive learning of the tablet application during the intervention phase. Furthermore, data compiled over 12 months post-use show that she used the tablet successfully in her day-to-day life. She was even able to transfer her newly acquired ability to other available applications designed to monitor regular purchases, consult various recipes and play games. Tablet computers thereby offer a promising avenue for cognitive rehabilitation for persons with AD. This success was mainly achieved through a one-on-one individual programme tailored to this person. The limits and constraints of utilising tablet computers for persons with AD are discussed.
Human nonverbal courtship behavior--a brief historical review.
Moore, Monica M
2010-03-01
This article reviews research findings documenting the nature of nonverbal courtship behavior compiled through both observation and self-report methods. I briefly present the major theoretical perspectives guiding research methodologies used in the field and in the laboratory. Studies of verbal courtship, including those conducted via computer, via text messaging, or through personal advertisement, are not included in this review. The article ends by elucidating some key features of human nonverbal courtship behavior that have become apparent after scrutinizing these data.
Management: A bibliography for NASA managers
NASA Technical Reports Server (NTRS)
1985-01-01
This bibliography lists 706 reports, articles, and other documents introduced into the NASA scientific and technical information system in 1984. Entries, which include abstracts, are arranged in the following categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs, and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy. Subject, personal author, corporate source, contract number, report number, and accession number indexes are included.
A typewriting system operated by head movements, based on home-computer equipment.
Heuvelmans, A M; Mélotte, H E; Neve, J J
1990-06-01
For persons who cannot move their hands and legs we have designed a relatively inexpensive typewriting system which can be operated by movements of the head. The typewriter is made up of commercially available home computer equipment - i e, a computer including monitor and printer and a headset replacing the mouse. A user-friendly software program has been designed to replace the mouse button and to make this equipment act as a typewriter with simple text-editing features. Some ergonomics aspects of the typewriter set-up and the results of an evaluation of the typewriter by two patients suffering from amyotrophic lateral sclerosis (ALS) are given. Several factors relevant to the design, construction, evaluation and application of the typewriter are discussed.
Schmidt, Sigrun A J; Vestergaard, Mogens; Baggesen, Lisbeth M; Pedersen, Lars; Schønheyder, Henrik C; Sørensen, Henrik T
2017-10-09
Herpes zoster (HZ) is a vaccine-preventable disease caused by reactivation of the varicella-zoster virus. Unfortunately, formulation of recommendations on routine immunization is hampered by a lack of data on disease burden, since most countries do not record cases of HZ in the general population. We developed and validated an algorithm to identify HZ based on routinely collected registry data and used it to quantify HZ occurrence and risk factors in Denmark prior to marketing of the HZ vaccine. We included patients aged ≥40years with a first-time systemic Acyclovir, Valacyclovir, or Famciclovir prescription or a hospital-based HZ diagnosis in the Danish nationwide health registries during 1997-2013. In a validation substudy (n=176), we computed the proportion of persons with HZ among patients who redeemed antiviral prescriptions. In a cohort study, we computed age-specific rates of HZ (45,297,258 person-years). In a case-control study, we then computed odds ratios (ORs) for common chronic diseases and immunosuppressive factors among HZ cases (n=189,025) vs. matched population controls (n=945,111). Medical record review confirmed HZ in 87% (95% confidence interval: 79-93%) of persons ≥40years who dispensed antivirals at doses recommended for HZ. HZ rates increased from 2.15/1000 person-years in 40-year-olds to 9.45/1000 person-years in 95-year-olds. Rates were highest in women. HZ was diagnosed during hospitalization among 3.5%. As expected, persons with severe immunosuppressive conditions had the highest ORs of HZ (between 1.82 and 4.12), but various autoimmune diseases, asthma, chronic kidney disease, and inhaled glucocorticoids were also associated with increased ORs (between 1.06 and 1.64). This algorithm is a valid tool for identifying HZ in routine healthcare data. It shows that HZ is common in Denmark, especially in patients with certain chronic conditions. Prioritized vaccination of such high-risk patients might be an option in countries considering alternatives to universal vaccination. Copyright © 2017 Elsevier Ltd. All rights reserved.
Personal Computers: Products for Every Need.
ERIC Educational Resources Information Center
Personal Computing, 1981
1981-01-01
Begins a two-part look at some of the personal computers now on the market. Discusses microcomputers being offered by Apple, Atari, Commodore (PET), Heath, Hewlett-Packard, Ohio Scientific, Osborne, Radio Shack (TRS-80), and Texas Instruments. Journal availability: Hayden Publishing Company, 50 Essex Street, Rochelle Park, NJ 07662. (Author/SJL)
Transfer of numeric ASCII data files between Apple and IBM personal computers.
Allan, R W; Bermejo, R; Houben, D
1986-01-01
Listings for programs designed to transfer numeric ASCII data files between Apple and IBM personal computers are provided with accompanying descriptions of how the software operates. Details of the hardware used are also given. The programs may be easily adapted for transferring data between other microcomputers.
The report gives results of a screening evaluation of volatile organic emissions from printed circuit board laminates and potential pollution prevention alternatives. In the evaluation, printed circuit board laminates, without circuitry, commonly found in personal computer (PC) m...
UNIX Micros for Students Majoring in Computer Science and Personal Information Retrieval.
ERIC Educational Resources Information Center
Fox, Edward A.; Birch, Sandra
1986-01-01
Traces the history of Virginia Tech's requirement that incoming freshmen majoring in computer science each acquire a microcomputer running the UNIX operating system; explores rationale for the decision; explains system's key features; and describes program implementation and research and development efforts to provide personal information…
Personal Computers Help Gifted Students Work Smart. ERIC Digest #E483.
ERIC Educational Resources Information Center
Jones, Geoffrey
This digest considers the role of personal computers in the education of gifted students. There is evidence that students are working "smarter," whether they are learning and using more information, understanding key concepts and relationships better, or developing higher level thinking skills. Research findings concerning the specific…
DOT National Transportation Integrated Search
2007-08-01
This research was conducted to develop and test a personal computer-based study procedure (PCSP) with secondary task loading for use in human factors laboratory experiments in lieu of a driving simulator to test reading time and understanding of traf...
31 CFR 560.539 - Official activities of certain international organizations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... items such as many laptop computers, personal computers, cell phones, personal digital assistants and... limited to: (1) The provision of services involving Iran necessary for carrying out the official business; (2) Purchasing Iranian-origin goods and services for use in carrying out the official business; (3...
31 CFR 560.539 - Official activities of certain international organizations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... items such as many laptop computers, personal computers, cell phones, personal digital assistants and... limited to: (1) The provision of services involving Iran necessary for carrying out the official business; (2) Purchasing Iranian-origin goods and services for use in carrying out the official business; (3...
Security of Personal Computer Systems: A Management Guide.
ERIC Educational Resources Information Center
Steinauer, Dennis D.
This report describes management and technical security considerations associated with the use of personal computer systems as well as other microprocessor-based systems designed for use in a general office environment. Its primary objective is to identify and discuss several areas of potential vulnerability and associated protective measures. The…
PERKAM: Personalized Knowledge Awareness Map for Computer Supported Ubiquitous Learning
ERIC Educational Resources Information Center
El-Bishouty, Moushir M.; Ogata, Hiroaki; Yano, Yoneo
2007-01-01
This paper introduces a ubiquitous computing environment in order to support the learners while doing tasks; this environment is called PERKAM (PERsonalized Knowledge Awareness Map). PERKAM allows the learners to share knowledge, interact, collaborate, and exchange individual experiences. It utilizes the RFID ubiquities technology to detect the…
Computers in medicine: patients' attitudes
Cruickshank, P. J.
1984-01-01
Data are presented from two surveys where a 26-item questionnaire was used to measure patients' attitudes to diagnostic computers and to medical computers in general. The first group of respondents were 229 patients who had been given outpatient appointments at a hospital general medical clinic specializing in gastrointestinal problems, where some had experienced a diagnostic computer in use. The second group of respondents were 416 patients attending a group general practice where there was no computer. Patients who had experience of the diagnostic computer or a personal computer had more favourable attitudes to computers in medicine as did younger people and males. The two samples of patients showed broadly similar attitudes, and a notable finding was that over half of each group believed that, with a computer around, the personal touch of the doctor would be lost. PMID:6471021
Gordon, Peter; Camhi, Eli; Hesse, Ron; Odlum, Michelle; Schnall, Rebecca; Rodriguez, Martha; Valdez, Esmerlin; Bakken, Suzanne
2015-01-01
Purpose To describe the processes and outcomes of developing and implementing a Continuity of Care Document (CCD), My Health Profile, as personal health record for persons living with HIV (PLWH) in an HIV/AIDS Special Needs Plan (SNP) in New York City. Methods Multiple qualitative and quantitative data sources were used to describe the processes and outcomes of implementing My Health Profile including focus groups, Audio Computer Assisted Self Interview (ACASI) surveys, administrative databases, chart abstraction, usage logs, and project management records. Qualitative data were thematically analyzed. Quantitative data analytic methods included descriptive and multivariate statistics. Data were triangulated and synthesized using the Reach, Efficacy/Effectiveness, Adoption, Implementation, Maintenance (RE-AIM) Framework. Results Reach SNP members are predominantly African American or Hispanic/Latino and about one third are female. A larger proportion of African Americans and smaller proportions of Hispanics/Latinos and Whites were trained to use My Health Profile. Efficacy/Effectiveness CCDs were produced for 8,249 unique members and updated on a monthly basis, 509 members were trained to use My Health Profile. Total number of member logins for 112 active users was 1,808 and the longest duration of use was 1,008 days. There were no significant differences between users and non-users of My Health Profile in clinical outcomes, perceptions of the quality of medical care, or health service utilization. Adoption My Health Profile was well-matched to organizational mission, values, and priorities related to coordination of care for a high-risk population of PLWH. Implementation Pre-implementation focus group participants identified potential barriers to use of My Health Profile including functional and computer literacy, privacy and confidentiality concerns, potential reluctance to use technology, and cognitive challenges. Key strategies for addressing barriers included a dedicated bilingual coach for recruitment, training, and support; basic computer and My Health Profile training; transparent audit trail revealing clinician and case manager access of My Health Profile, time-limited passwords for sharing My Health Profile with others at the point of need, and emergency access mechanism. Maintenance My Health Profile was integrated into routine operational activities and its sustainability is facilitated by its foundation on standards for Health Information Exchange (HIE). Conclusions Although potential barriers exist to the use of PHRs such as My Health Profile, PLWH with complex medical needs, low socioeconomic status, and limited computer experience will use such tools when a sufficient level of user support is provided and privacy and confidentiality concerns are addressed. PMID:22841825
Habegger, Lukas; Balasubramanian, Suganthi; Chen, David Z; Khurana, Ekta; Sboner, Andrea; Harmanci, Arif; Rozowsky, Joel; Clarke, Declan; Snyder, Michael; Gerstein, Mark
2012-09-01
The functional annotation of variants obtained through sequencing projects is generally assumed to be a simple intersection of genomic coordinates with genomic features. However, complexities arise for several reasons, including the differential effects of a variant on alternatively spliced transcripts, as well as the difficulty in assessing the impact of small insertions/deletions and large structural variants. Taking these factors into consideration, we developed the Variant Annotation Tool (VAT) to functionally annotate variants from multiple personal genomes at the transcript level as well as obtain summary statistics across genes and individuals. VAT also allows visualization of the effects of different variants, integrates allele frequencies and genotype data from the underlying individuals and facilitates comparative analysis between different groups of individuals. VAT can either be run through a command-line interface or as a web application. Finally, in order to enable on-demand access and to minimize unnecessary transfers of large data files, VAT can be run as a virtual machine in a cloud-computing environment. VAT is implemented in C and PHP. The VAT web service, Amazon Machine Image, source code and detailed documentation are available at vat.gersteinlab.org.
Ergonomic intervention for employed persons with rheumatic conditions.
Allaire, Saralynn J; Backman, Catherine L; Alheresh, Rawan; Baker, Nancy A
2013-01-01
Prior articles in this series on employment and arthritis have documented the major impact arthritis and other rheumatic conditions have on employment. As expected, physically demanding job tasks, including hand use, are substantial risk factors for work limitation. Computer use has been increasing. People with arthritis may choose occupations involving extensive computer use to avoid occupations with other physical demands. But studies show many people with arthritis conditions have difficulty using computers.Ergonomic assessment and implementation helps relieve the physical and other demands of jobs. The Ergonomic Assessment Tool for Arthritis (EATA) is specifically for people with arthritis conditions. Since the EATA can be conducted off worksite, it is feasible to use with workers not wishing to disclose their condition to their employer. Available research supports the effectiveness of ergonomic intervention as a viable method to reduce work limitation for persons with arthritis. Some workers will need additional vocational intervention to remain employed long term. However, ergonomic intervention is a useful first step, as it promotes awareness of arthritis effects on work activities. Assisting workers with arthritis or other rheumatic conditions to use ergonomics to enhance their ability to work well should be an important aspect of managing these conditions.
Ultrafast Comparison of Personal Genomes via Precomputed Genome Fingerprints
Glusman, Gustavo; Mauldin, Denise E.; Hood, Leroy E.; Robinson, Max
2017-01-01
We present an ultrafast method for comparing personal genomes. We transform the standard genome representation (lists of variants relative to a reference) into “genome fingerprints” via locality sensitive hashing. The resulting genome fingerprints can be meaningfully compared even when the input data were obtained using different sequencing technologies, processed using different pipelines, represented in different data formats and relative to different reference versions. Furthermore, genome fingerprints are robust to up to 30% missing data. Because of their reduced size, computation on the genome fingerprints is fast and requires little memory. For example, we could compute all-against-all pairwise comparisons among the 2504 genomes in the 1000 Genomes data set in 67 s at high quality (21 μs per comparison, on a single processor), and achieved a lower quality approximation in just 11 s. Efficient computation enables scaling up a variety of important genome analyses, including quantifying relatedness, recognizing duplicative sequenced genomes in a set, population reconstruction, and many others. The original genome representation cannot be reconstructed from its fingerprint, effectively decoupling genome comparison from genome interpretation; the method thus has significant implications for privacy-preserving genome analytics. PMID:29018478
Nugis, V Yu; Khvostunov, I K; Goloub, E V; Kozlova, M G; Nadejinal, N M; Galstian, I A
2015-01-01
The method for retrospective dose assessment based on the analysis of cell distribution by the number of dicentrics and unstable aberrations using a special computer program was earlier developed based on the data about the persons irradiated as a result of the accident at the Chernobyl nuclear power plant. This method was applied for the same purpose for data processing of repeated cytogenetic studies of the patients exposed to γ-, γ-β- or γ-neutron radiation in various situations. As a whole, this group was followed up in more distant periods (17-50 years) after exposure than Chernobyl patients (up to 25 years). The use for retrospective dose assessment of the multiple regression equations obtained for the Chernobyl cohort showed that the equation, which includes computer recovered estimate of the dose and the time elapsed after irradiation, was generally unsatisfactory (r = 0.069 at p = 0.599). Similar equations with recovered estimate of the dose and frequency of abnormal chromosomes in a distant period or with all three parameters as variables gave better results (r = 0.686 at p = 0.000000001 and r = 0.542 at p = 0.000008, respectively).
A unified coding strategy for processing faces and voices
Yovel, Galit; Belin, Pascal
2013-01-01
Both faces and voices are rich in socially-relevant information, which humans are remarkably adept at extracting, including a person's identity, age, gender, affective state, personality, etc. Here, we review accumulating evidence from behavioral, neuropsychological, electrophysiological, and neuroimaging studies which suggest that the cognitive and neural processing mechanisms engaged by perceiving faces or voices are highly similar, despite the very different nature of their sensory input. The similarity between the two mechanisms likely facilitates the multi-modal integration of facial and vocal information during everyday social interactions. These findings emphasize a parsimonious principle of cerebral organization, where similar computational problems in different modalities are solved using similar solutions. PMID:23664703
Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui
2016-05-13
Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.
Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui
2016-05-13
Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.
Optical correction of refractive error for preventing and treating eye symptoms in computer users.
Heus, Pauline; Verbeek, Jos H; Tikka, Christina
2018-04-10
Computer users frequently complain about problems with seeing and functioning of the eyes. Asthenopia is a term generally used to describe symptoms related to (prolonged) use of the eyes like ocular fatigue, headache, pain or aching around the eyes, and burning and itchiness of the eyelids. The prevalence of asthenopia during or after work on a computer ranges from 46.3% to 68.5%. Uncorrected or under-corrected refractive error can contribute to the development of asthenopia. A refractive error is an error in the focusing of light by the eye and can lead to reduced visual acuity. There are various possibilities for optical correction of refractive errors including eyeglasses, contact lenses and refractive surgery. To examine the evidence on the effectiveness, safety and applicability of optical correction of refractive error for reducing and preventing eye symptoms in computer users. We searched the Cochrane Central Register of Controlled Trials (CENTRAL); PubMed; Embase; Web of Science; and OSH update, all to 20 December 2017. Additionally, we searched trial registries and checked references of included studies. We included randomised controlled trials (RCTs) and quasi-randomised trials of interventions evaluating optical correction for computer workers with refractive error for preventing or treating asthenopia and their effect on health related quality of life. Two authors independently assessed study eligibility and risk of bias, and extracted data. Where appropriate, we combined studies in a meta-analysis. We included eight studies with 381 participants. Three were parallel group RCTs, three were cross-over RCTs and two were quasi-randomised cross-over trials. All studies evaluated eyeglasses, there were no studies that evaluated contact lenses or surgery. Seven studies evaluated computer glasses with at least one focal area for the distance of the computer screen with or without additional focal areas in presbyopic persons. Six studies compared computer glasses to other types of glasses; and one study compared them to an ergonomic workplace assessment. The eighth study compared optimal correction of refractive error with the actual spectacle correction in use. Two studies evaluated computer glasses in persons with asthenopia but for the others the glasses were offered to all workers regardless of symptoms. The risk of bias was unclear in five, high in two and low in one study. Asthenopia was measured as eyestrain or a summary score of symptoms but there were no studies on health-related quality of life. Adverse events were measured as headache, nausea or dizziness. Median asthenopia scores at baseline were about 30% of the maximum possible score.Progressive computer glasses versus monofocal glassesOne study found no considerable difference in asthenopia between various progressive computer glasses and monofocal computer glasses after one-year follow-up (mean difference (MD) change scores 0.23, 95% confidence interval (CI) -5.0 to 5.4 on a 100 mm VAS scale, low quality evidence). For headache the results were in favour of progressive glasses.Progressive computer glasses with an intermediate focus in the upper part of the glasses versus other glassesIn two studies progressive computer glasses with intermediate focus led to a small decrease in asthenopia symptoms (SMD -0.49, 95% CI -0.75 to -0.23, low-quality evidence) but not in headache score in the short-term compared to general purpose progressive glasses. There were similar small decreases in dizziness. At medium term follow-up, in one study the effect size was not statistically significant (SMD -0.64, 95% CI -1.40 to 0.12). The study did not assess adverse events.Another study found no considerable difference in asthenopia between progressive computer glasses and monofocal computer glasses after one-year follow-up (MD change scores 1.44, 95% CI -6.95 to 9.83 on a 100 mm VAS scale, very low quality evidence). For headache the results were inconsistent.Progressive computer glasses with far-distance focus in the upper part of the glasses versus other glassesOne study found no considerable difference in number of persons with asthenopia between progressive computer glasses with far-distance focus and bifocal computer glasses after four weeks' follow-up (OR 1.00, 95% CI 0.40 to 2.50, very low quality evidence). The number of persons with headache, nausea and dizziness was also not different between groups.Another study found no considerable difference in asthenopia between progressive computer glasses with far-distance focus and monofocal computer glasses after one-year follow-up (MD change scores -1.79, 95% CI -11.60 to 8.02 on a 100 mm VAS scale, very low quality evidence). The effects on headaches were inconsistent.One study found no difference between progressive far-distance focus computer glasses and trifocal glasses in effect on eyestrain severity (MD -0.50, 95% CI -1.07 to 0.07, very low quality evidence) or on eyestrain frequency (MD -0.75, 95% CI -1.61 to 0.11, very low quality evidence).Progressive computer glasses versus ergonomic assessment with habitual (computer) glassesOne study found that computer glasses optimised for individual needs reduced asthenopia sum score more than an ergonomic assessment and habitual (computer) glasses (MD -8.9, 95% CI -16.47 to -1.33, scale 0 to 140, very low quality evidence) but there was no effect on the frequency of eyestrain (OR 1.08, 95% CI 0.38 to 3.11, very low quality evidence).We rated the quality of the evidence as low or very low due to risk of bias in the included studies, inconsistency in the results and imprecision. There is low to very low quality evidence that providing computer users with progressive computer glasses does not lead to a considerable decrease in problems with the eyes or headaches compared to other computer glasses. Progressive computer glasses might be slightly better than progressive glasses for daily use in the short term but not in the intermediate term and there is no data on long-term follow-up. The quality of the evidence is low or very low and therefore we are uncertain about this conclusion. Larger studies with several hundreds of participants are needed with proper randomisation, validated outcome measurement methods, and longer follow-up of at least one year to improve the quality of the evidence.
Alford, Rebecca F.; Dolan, Erin L.
2017-01-01
Computational biology is an interdisciplinary field, and many computational biology research projects involve distributed teams of scientists. To accomplish their work, these teams must overcome both disciplinary and geographic barriers. Introducing new training paradigms is one way to facilitate research progress in computational biology. Here, we describe a new undergraduate program in biomolecular structure prediction and design in which students conduct research at labs located at geographically-distributed institutions while remaining connected through an online community. This 10-week summer program begins with one week of training on computational biology methods development, transitions to eight weeks of research, and culminates in one week at the Rosetta annual conference. To date, two cohorts of students have participated, tackling research topics including vaccine design, enzyme design, protein-based materials, glycoprotein modeling, crowd-sourced science, RNA processing, hydrogen bond networks, and amyloid formation. Students in the program report outcomes comparable to students who participate in similar in-person programs. These outcomes include the development of a sense of community and increases in their scientific self-efficacy, scientific identity, and science values, all predictors of continuing in a science research career. Furthermore, the program attracted students from diverse backgrounds, which demonstrates the potential of this approach to broaden the participation of young scientists from backgrounds traditionally underrepresented in computational biology. PMID:29216185
Alford, Rebecca F; Leaver-Fay, Andrew; Gonzales, Lynda; Dolan, Erin L; Gray, Jeffrey J
2017-12-01
Computational biology is an interdisciplinary field, and many computational biology research projects involve distributed teams of scientists. To accomplish their work, these teams must overcome both disciplinary and geographic barriers. Introducing new training paradigms is one way to facilitate research progress in computational biology. Here, we describe a new undergraduate program in biomolecular structure prediction and design in which students conduct research at labs located at geographically-distributed institutions while remaining connected through an online community. This 10-week summer program begins with one week of training on computational biology methods development, transitions to eight weeks of research, and culminates in one week at the Rosetta annual conference. To date, two cohorts of students have participated, tackling research topics including vaccine design, enzyme design, protein-based materials, glycoprotein modeling, crowd-sourced science, RNA processing, hydrogen bond networks, and amyloid formation. Students in the program report outcomes comparable to students who participate in similar in-person programs. These outcomes include the development of a sense of community and increases in their scientific self-efficacy, scientific identity, and science values, all predictors of continuing in a science research career. Furthermore, the program attracted students from diverse backgrounds, which demonstrates the potential of this approach to broaden the participation of young scientists from backgrounds traditionally underrepresented in computational biology.
Marx, Gary T
2007-01-01
The new social surveillance can be defined as scrutiny through the use of technical means to extract or create personal or group data, whether from individuals or contexts. Examples include: video cameras; computer matching, profiling and data mining; work, computer and electronic location monitoring; biometrics; DNA analysis; drug tests; brain scans for lie detection; various forms of imaging to reveal what is behind walls and enclosures. There are two problems with the new surveillance technologies. One is that they don't work and the other is that they work too well. If the first, they fail to prevent disasters, bring miscarriages of justice, and waste resources. If the second, they can further inequality and invidious social categorization; they chill liberty. These twin threats are part of the enduring paradox of democratic government that must be strong enough to maintain reasonable order, but not so strong as to become undemocratic.
Providing Assistive Technology Applications as a Service Through Cloud Computing.
Mulfari, Davide; Celesti, Antonio; Villari, Massimo; Puliafito, Antonio
2015-01-01
Users with disabilities interact with Personal Computers (PCs) using Assistive Technology (AT) software solutions. Such applications run on a PC that a person with a disability commonly uses. However the configuration of AT applications is not trivial at all, especially whenever the user needs to work on a PC that does not allow him/her to rely on his / her AT tools (e.g., at work, at university, in an Internet point). In this paper, we discuss how cloud computing provides a valid technological solution to enhance such a scenario.With the emergence of cloud computing, many applications are executed on top of virtual machines (VMs). Virtualization allows us to achieve a software implementation of a real computer able to execute a standard operating system and any kind of application. In this paper we propose to build personalized VMs running AT programs and settings. By using the remote desktop technology, our solution enables users to control their customized virtual desktop environment by means of an HTML5-based web interface running on any computer equipped with a browser, whenever they are.
Personal supercomputing by using transputer and Intel 80860 in plasma engineering
NASA Astrophysics Data System (ADS)
Ido, S.; Aoki, K.; Ishine, M.; Kubota, M.
1992-09-01
Transputer (T800) and 64-bit RISC Intel 80860 (i860) added on a personal computer can be used as an accelerator. When 32-bit T800s in a parallel system or 64-bit i860s are used, scientific calculations are carried out several ten times as fast as in the case of commonly used 32-bit personal computers or UNIX workstations. Benchmark tests and examples of physical simulations using T800s and i860 are reported.
An Amphibious Ship-To-Shore Simulation for Use on an IBM PC (Personal Computer)
1984-09-01
CA : «< <- j Special ■ *- amphibious ship- an IBM Personal ion of the phy- he logic used analysis, and a DD | JAM 11 1473 COITION...research, for instance, wiL1 be geared toward a technically oriented person who is familiar with computers, programming and the associated logic. A...problem, often vaguely stated by the decision aaker , into precise and operational terms [Ref. Hz p.51]. The analysis begins with specification of the
Dissemination of Information in Developing Countries: The Personal Computer and beyond
ERIC Educational Resources Information Center
Wong, Wai-Man
2005-01-01
With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…
USER'S GUIDE TO THE PERSONAL COMPUTER VERSION OF THE BIOGENIC EMISSIONS INVENTORY SYSTEM (PC-BEIS2)
The document is a user's guide for an updated Personal Computer version of the Biogenic Emissions Inventory System (PC-BEIS2), allowing users to estimate hourly emissions of biogenic volatile organic compounds (BVOCs) and soil nitrogen oxide emissions for any county in the contig...
A Computer Spreadsheet for Locating Assistive Devices.
ERIC Educational Resources Information Center
Palmer, Catherine V.; Garstecki, Dean C.
1988-01-01
The article presents a directory of assistive devices for persons with hearing impairments in a grid format by distributor and type of device (alerting devices, telephone, TV/radio/stereo, personal communication, group communication, and other). The product locator is also available in spreadsheet form for either the Macintosh or IBM-PC computers.…
Personality Characteristics and Performance on Computer Assisted Instruction and Programmed Text.
ERIC Educational Resources Information Center
Blitz, Allan N.; Smith, Timothy
An empirical study investigated whether personality characteristics have a bearing on an individual's success with particular modes of instruction, in this case, computer-assisted instruction (CAI) and the programed text (PT). The study was developed in an attempt to establish useful criteria on which to base a rationale for choosing suitable…
Academic Achievement Enhanced by Personal Digital Assistant Use
ERIC Educational Resources Information Center
Bick, Alexander
2005-01-01
Research during the past decade suggests that integrating computing technology in general, and mobile computers in particular, into the educational environment has positive effects. This is the first long-term study of high school Personal Digital Assistant use. It involved three-parts, 146 students during four years. Part one found that PDA use…
Beyond Computer Literacy: Technology Integration and Curriculum Transformation
ERIC Educational Resources Information Center
Safar, Ammar H.; AlKhezzi, Fahad A.
2013-01-01
Personal computers, the Internet, smartphones, and other forms of information and communication technology (ICT) have changed our world, our job, our personal lives, as well as how we manage our knowledge and time effectively and efficiently. Research findings in the past decades have acknowledged and affirmed that the content the ICT medium…
A Computer Program for Training Eccentric Reading in Persons with Central Scotoma
ERIC Educational Resources Information Center
Kasten, Erich; Haschke, Peggy; Meinhold, Ulrike; Oertel-Verweyen, Petra
2010-01-01
This article explores the effectiveness of a computer program--Xcentric viewing--for training eccentric reading in persons with central scotoma. The authors conducted a small study to investigate whether this program increases the reading capacities of individuals with age-related macular degeneration (AMD). Instead of a control group, they…
Performance Measures in Courses Using Computer-Aided Personalized System of Instruction
ERIC Educational Resources Information Center
Springer, C. R.; Pear, J. J.
2008-01-01
Archived data from four courses taught with computer-aided personalized system of instruction (CAPSI)--an online, self-paced, instructional program--were used to explore the relationship between objectively rescored final exam grades, peer reviewing, and progress rate--i.e., the rate at which students completed unit tests. There was a strong…
The Future's Future: Implications of Emerging Technology for Special Education Program Planning.
ERIC Educational Resources Information Center
Hofstetter, Fred T.
2001-01-01
This article reviews emerging technologies, imagines how they can be used to help learners with special needs, and recommends new special education program initiatives to help these students make a meaningful transition from school to work. Wearable computers, personal computing devices, DVD, HDTV, MP3, and personal digital assistants are…
Awareness of Computer Knowledge among XI Standard Students in Coimbatore District
ERIC Educational Resources Information Center
K., Santhoshini; Bhavana, A. R.
2016-01-01
Education is a lifelong journey for every person. A person experiences most of his education through schools. After the invention of computers, the world has become a global village. Education system in India is facing increasing pressure to use innovative methodologies and integrate new Information and Communication Technologies in the teaching…
Readiness of healthcare providers for eHealth: the case from primary healthcare centers in Lebanon.
Saleh, Shadi; Khodor, Rawya; Alameddine, Mohamad; Baroud, Maysa
2016-11-10
eHealth can positively impact the efficiency and quality of healthcare services. Its potential benefits extend to the patient, healthcare provider, and organization. Primary healthcare (PHC) settings may particularly benefit from eHealth. In these settings, healthcare provider readiness is key to successful eHealth implementation. Accordingly, it is necessary to explore the potential readiness of providers to use eHealth tools. Therefore, the purpose of this study was to assess the readiness of healthcare providers working in PHC centers in Lebanon to use eHealth tools. A self-administered questionnaire was used to assess participants' socio-demographics, computer use, literacy, and access, and participants' readiness for eHealth implementation (appropriateness, management support, change efficacy, personal beneficence). The study included primary healthcare providers (physicians, nurses, other providers) working in 22 PHC centers distributed across Lebanon. Descriptive and bivariate analyses (ANOVA, independent t-test, Kruskal Wallis, Tamhane's T2) were used to compare participant characteristics to the level of readiness for the implementation of eHealth. Of the 541 questionnaires, 213 were completed (response rate: 39.4 %). The majority of participants were physicians (46.9 %), and nurses (26.8 %). Most physicians (54.0 %), nurses (61.4 %), and other providers (50.9 %) felt comfortable using computers, and had access to computers at their PHC center (physicians: 77.0 %, nurses: 87.7 %, others: 92.5 %). Frequency of computer use varied. The study found a significant difference for personal beneficence, management support, and change efficacy among different healthcare providers, and relative to participants' level of comfort using computers. There was a significant difference by level of comfort using computers and appropriateness. A significant difference was also found between those with access to computers in relation to personal beneficence and change efficacy; and between frequency of computer use and change efficacy. The implementation of eHealth cannot be achieved without the readiness of healthcare providers. This study demonstrates that the majority of healthcare providers at PHC centers across Lebanon are ready for eHealth implementation. The findings of this study can be considered by decision makers to enhance and scale-up the use of eHealth in PHC centers nationally. Efforts should be directed towards capacity building for healthcare providers.
Wise, Meg; Gustafson, David H.; Sorkness, Christine A.; Molfenter, Todd; Staresinic, Anthony; Meis, Tracy; Hawkins, Robert P.; Shanovich, Kathleen Kelly; Walker, Nola P.
2008-01-01
This article reports on the development of a personalized, Web-based asthma-education program for parents whose 4- to 12-year-old children have moderate to severe asthma. Personalization includes computer-based tailored messages and a human coach to build asthma self-management skills. Computerized features include the Asthma Manager, My Calendar/Reminder, My Goals, and a tailored home page. These are integrated with monthly asthma-education phone calls from an asthmanurse case manager. The authors discuss the development process and issues and describe the current randomized evaluation study to test whether the yearlong integrated intervention can improve adherence to a daily asthma controller medication, asthma control, and parent quality of life to reduce asthma-related healthcare utilization. Implications for health education for chronic disease management are raised. PMID:16928987
Chris B. LeDoux; John E. Baumgras; R. Bryan Selbe
1989-01-01
PROFIT-PC is a menu driven, interactive PC (personal computer) program that estimates optimum product mix and maximum net harvesting revenue based on projected product yields and stump-to-mill timber harvesting costs. Required inputs include the number of trees/acre by species and 2 inches diameter at breast-height class, delivered product prices by species and product...
The Ames Power Monitoring System
NASA Technical Reports Server (NTRS)
Osetinsky, Leonid; Wang, David
2003-01-01
The Ames Power Monitoring System (APMS) is a centralized system of power meters, computer hardware, and specialpurpose software that collects and stores electrical power data by various facilities at Ames Research Center (ARC). This system is needed because of the large and varying nature of the overall ARC power demand, which has been observed to range from 20 to 200 MW. Large portions of peak demand can be attributed to only three wind tunnels (60, 180, and 100 MW, respectively). The APMS helps ARC avoid or minimize costly demand charges by enabling wind-tunnel operators, test engineers, and the power manager to monitor total demand for center in real time. These persons receive the information they need to manage and schedule energy-intensive research in advance and to adjust loads in real time to ensure that the overall maximum allowable demand is not exceeded. The APMS (see figure) includes a server computer running the Windows NT operating system and can, in principle, include an unlimited number of power meters and client computers. As configured at the time of reporting the information for this article, the APMS includes more than 40 power meters monitoring all the major research facilities, plus 15 Windows-based client personal computers that display real-time and historical data to users via graphical user interfaces (GUIs). The power meters and client computers communicate with the server using Transmission Control Protocol/Internet Protocol (TCP/IP) on Ethernet networks, variously, through dedicated fiber-optic cables or through the pre-existing ARC local-area network (ARCLAN). The APMS has enabled ARC to achieve significant savings ($1.2 million in 2001) in the cost of power and electric energy by helping personnel to maintain total demand below monthly allowable levels, to manage the overall power factor to avoid low power factor penalties, and to use historical system data to identify opportunities for additional energy savings. The APMS also provides power engineers and electricians with the information they need to plan modifications in advance and perform day-to-day maintenance of the ARC electric-power distribution system.
A new communications technique for the nonvocal person, using the Apple II Computer.
Seamone, W
1982-01-01
The purpose of this paper is to describe a technique for nonvocal personal communication for the severely handicapped person, using the Apple II computer system and standard commercially available software diskettes (Visi-Calc). The user's input in a pseudo-Morse code is generated via minute chin motions or limited finger motions applied to a suitable configured two-switch device, and input via the JHU/APL Morse code interface card. The commands and features of the program's row-column matrix, originally intended and widely used for financial management, are used here to call up and modify a large array of stored sentences which can be useful in personal communication. It is not known at this time if the system is in fact cost-effective for the sole purpose of nonvocal communication, since system tradeoff studies have not been made relative to other techniques. However, in some instances an Apple computer may be already available for other purposes at the institution or in the home, and the system described could simply be another utilization of that personal computer. In any case, the system clearly does not meet the requirement of portability. No special components (except for the JHU/APL Morse interface card) and no special programming experience are required to duplicate the communications technique described.
Developing a multimodal biometric authentication system using soft computing methods.
Malcangi, Mario
2015-01-01
Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.
A computer-based physics laboratory apparatus: Signal generator software
NASA Astrophysics Data System (ADS)
Thanakittiviroon, Tharest; Liangrocapart, Sompong
2005-09-01
This paper describes a computer-based physics laboratory apparatus to replace expensive instruments such as high-precision signal generators. This apparatus uses a sound card in a common personal computer to give sinusoidal signals with an accurate frequency that can be programmed to give different frequency signals repeatedly. An experiment on standing waves on an oscillating string uses this apparatus. In conjunction with interactive lab manuals, which have been developed using personal computers in our university, we achieve a complete set of low-cost, accurate, and easy-to-use equipment for teaching a physics laboratory.
Understanding health care communication preferences of veteran primary care users.
LaVela, Sherri L; Schectman, Gordon; Gering, Jeffrey; Locatelli, Sara M; Gawron, Andrew; Weaver, Frances M
2012-09-01
To assess veterans' health communication preferences (in-person, telephone, or electronic) for primary care needs and the impact of computer use on preferences. Structured patient interviews (n=448). Bivariate analyses examined preferences for primary care by 'infrequent' vs. 'regular' computer users. Only 54% were regular computer users, nearly all of whom had ever used the internet. 'Telephone' was preferred for 6 of 10 reasons (general medical questions, medication questions and refills, preventive care reminders, scheduling, and test results); although telephone was preferred by markedly fewer regular computer users. 'In-person' was preferred for new/ongoing conditions/symptoms, treatment instructions, and next care steps; these preferences were unaffected by computer use frequency. Among regular computer users, 1/3 preferred 'electronic' for preventive reminders (37%), test results (34%), and refills (32%). For most primary care needs, telephone communication was preferred, although by a greater proportion of infrequent vs. regular computer users. In-person communication was preferred for reasons that may require an exam or visual instructions. About 1/3 of regular computer users prefer electronic communication for routine needs, e.g., preventive reminders, test results, and refills. These findings can be used to plan patient-centered care that is aligned with veterans' preferred health communication methods. Published by Elsevier Ireland Ltd.
1986-03-01
SCHIZOPHRENIC DISORDER Amphetamine Delusional Disorder PARANOID DISORDER Cannabis Delusional Disorder Hallucinogen Delusional Disorder BRIEF REACTIVE...Intoxication Borderline Personality Disorder Cocaine Intoxication Histrionic Personality Disorder Caffeine Intoxication Narcissistic Personality Disorder... Cannabis Intoxication Dependent Personality Disorder ON, Inhalant Intoxication Schizoid Personality Disorder Minor Tranquilizer Intoxication Compulsive
StarTrax --- The Next Generation User Interface
NASA Astrophysics Data System (ADS)
Richmond, Alan; White, Nick
StarTrax is a software package to be distributed to end users for installation on their local computing infrastructure. It will provide access to many services of the HEASARC, i.e. bulletins, catalogs, proposal and analysis tools, initially for the ROSAT MIPS (Mission Information and Planning System), later for the Next Generation Browse. A user activating the GUI will reach all HEASARC capabilities through a uniform view of the system, independent of the local computing environment and of the networking method of accessing StarTrax. Use it if you prefer the point-and-click metaphor of modern GUI technology, to the classical command-line interfaces (CLI). Notable strengths include: easy to use; excellent portability; very robust server support; feedback button on every dialog; painstakingly crafted User Guide. It is designed to support a large number of input devices including terminals, workstations and personal computers. XVT's Portability Toolkit is used to build the GUI in C/C++ to run on: OSF/Motif (UNIX or VMS), OPEN LOOK (UNIX), or Macintosh, or MS-Windows (DOS), or character systems.
A ground track control algorithm for the Topographic Mapping Laser Altimeter (TMLA)
NASA Technical Reports Server (NTRS)
Blaes, V.; Mcintosh, R.; Roszman, L.; Cooley, J.
1993-01-01
The results of an analysis of an algorithm that will provide autonomous onboard orbit control using orbits determined with Global Positioning System (GPS) data. The algorithm uses the GPS data to (1) compute the ground track error relative to a fixed longitude grid, and (2) determine the altitude adjustment required to correct the longitude error. A program was written on a personal computer (PC) to test the concept for numerous altitudes and values of solar flux using a simplified orbit model including only the J sub 2 zonal harmonic and simple orbit decay computations. The algorithm was then implemented in a precision orbit propagation program having a full range of perturbations. The analysis showed that, even with all perturbations (including actual time histories of solar flux variation), the algorithm could effectively control the spacecraft ground track and yield more than 99 percent Earth coverage in the time required to complete one coverage cycle on the fixed grid (220 to 230 days depending on altitude and overlap allowance).
Does exposure to computers affect the routine parameters of semen quality?
Sun, Yue-Lian; Zhou, Wei-Jin; Wu, Jun-Qing; Gao, Er-Sheng
2005-09-01
To assess whether exposure to computers harms the semen quality of healthy young men. A total of 178 subjects were recruited from two maternity and children healthcare centers in Shanghai, 91 with a history of exposure to computers (i.e., exposure for 20 h or more per week in the last 2 years) and 87 persons to act as control (no or little exposure to computers). Data on the history of exposure to computers and other characteristics were obtained by means of a structured questionnaire interview. Semen samples were collected by masturbation in the place where the semen samples were analyzed. No differences in the distribution of the semen parameters (semen volume, sperm density, percentage of progressive sperm, sperm viability and percentage of normal form sperm) were found between the exposed group and the control group. Exposure to computers was not found to be a risk factor for inferior semen quality after adjusting for potential confounders, including abstinence days, testicle size, occupation, history of exposure to toxic substances. The present study did not find that healthy men exposed to computers had inferior semen quality.
Navab, Nassir; Fellow, Miccai; Hennersperger, Christoph; Frisch, Benjamin; Fürst, Bernhard
2016-10-01
In the last decade, many researchers in medical image computing and computer assisted interventions across the world focused on the development of the Virtual Physiological Human (VPH), aiming at changing the practice of medicine from classification and treatment of diseases to that of modeling and treating patients. These projects resulted in major advancements in segmentation, registration, morphological, physiological and biomechanical modeling based on state of art medical imaging as well as other sensory data. However, a major issue which has not yet come into the focus is personalizing intra-operative imaging, allowing for optimal treatment. In this paper, we discuss the personalization of imaging and visualization process with particular focus on satisfying the challenging requirements of computer assisted interventions. We discuss such requirements and review a series of scientific contributions made by our research team to tackle some of these major challenges. Copyright © 2016. Published by Elsevier B.V.
Code of Federal Regulations, 2010 CFR
2010-04-01
... imposition of the personal holding company tax on a foreign corporation, resident or nonresident, which files..., which files no return, the undistributed personal holding company income shall be computed on the basis... TAXES (CONTINUED) Personal Holding Companies § 1.545-1 Definition. (a) Undistributed personal holding...
Code of Federal Regulations, 2011 CFR
2011-04-01
... imposition of the personal holding company tax on a foreign corporation, resident or nonresident, which files..., which files no return, the undistributed personal holding company income shall be computed on the basis... TAXES (CONTINUED) Personal Holding Companies § 1.545-1 Definition. (a) Undistributed personal holding...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-21
...The U.S. Department of Commerce and U.S. Department of Homeland Security are requesting information on the requirements of, and possible approaches to creating, a voluntary industry code of conduct to address the detection, notification and mitigation of botnets.\\1\\ Over the past several years, botnets have increasingly put computer owners at risk. A botnet infection can lead to the monitoring of a consumer's personal information and communication, and exploitation of that consumer's computing power and Internet access. Networks of these compromised computers are often used to disseminate spam, to store and transfer illegal content, and to attack the servers of government and private entities with massive, distributed denial of service attacks. The Departments seek public comment from all Internet stakeholders, including the commercial, academic, and civil society sectors, on potential models for detection, notification, prevention, and mitigation of botnets' illicit use of computer equipment. ---------------------------------------------------------------------------
White-collar workers' self-reported physical symptoms associated with using computers.
Korpinen, Leena; Pääkkönen, Rauno; Gobba, Fabriziomaria
2012-01-01
The aim of our work was to study the physical symptoms of upper- and lower-level white-collar workers using a questionnaire. The study was cross-sectional with a questionnaire posted to 15 000 working-age persons. The responses (6121) included 970 upper- and 1150 lower-level white-collar workers. In the upper- and lower-level white-collar worker groups, 45.7 and 56.0%, respectively, had experienced pain, numbness and aches in the neck either pretty often or more frequently. When comparing daily computer users and nonusers, there were significant differences in pain, numbness and aches in the neck or in the shoulders. In addition, age and gender influenced some physical symptoms. In the future, it is essential to take into account that working with computers can be especially associated with physical symptoms in the neck and in the shoulders when workers use computers daily.
New diagnostic tool for robotic psychology and robotherapy studies.
Libin, Elena; Libin, Alexander
2003-08-01
Robotic psychology and robotherapy as a new research area employs a systematic approach in studying psycho-physiological, psychological, and social aspects of person-robot communication. An analysis of the mechanisms underlying different forms of computer-mediated behavior requires both an adequate methodology and research tools. In the proposed article we discuss the concept, basic principles, structure, and contents of the newly designed Person-Robot Complex Interactive Scale (PRCIS), proposed for the purpose of investigating psychological specifics and therapeutic potentials of multilevel person-robot interactions. Assuming that human-robot communication has symbolic meaning, each interactive pattern evaluated via the newly developed scale is assigned certain psychological value associated with the person's past life experiences, likes and dislikes, emotional, cognitive, and behavioral traits or states. PRCIS includes (1) assessment of a person's individual style of communication with the robotic creature based on direct observations; (2) the participant's evaluation of his/her new experiences with an interactive robot and evaluation of its features, advantages and disadvantages, as well as past experiences with modern technology; and (3) the instructor's overall evaluation of the session.
Ensmenger, Nathan
2015-01-01
Over the course of the 1960s and 1970s, male computer experts were able to successfully transform the "routine and mechanical" (and therefore feminized) activity of computer programming into a highly valued, well-paying, and professionally respectable discipline. They did so by constructing for themselves a distinctively masculine identity in which individual artistic genius, personal eccentricity, anti-authoritarian behavior, and a characteristic "dislike of activities involving human interaction" were mobilized as sources of personal and professional authority. This article explores the history of masculine culture and practices in computer programming, with a particular focus on the role of university computer centers as key sites of cultural formation and dissemination.
Wiese, Dawn; Atreja, Ashish; Mehta, Neil
2008-11-06
Tablet Personal Computers (PCs) have a huge potential in medical education due to their interactive human- computer interface and the need for anatomical diagrams, annotations, biochemistry flow charts etc. We conducted an online survey of medical students to determine their pattern of usage of the tablet features. The results revealed that the majority of medical students use the tablet features infrequently and most do not place a high value on the tablet features.
Design and implementation of the standards-based personal intelligent self-management system (PICS).
von Bargen, Tobias; Gietzelt, Matthias; Britten, Matthias; Song, Bianying; Wolf, Klaus-Hendrik; Kohlmann, Martin; Marschollek, Michael; Haux, Reinhold
2013-01-01
Against the background of demographic change and a diminishing care workforce there is a growing need for personalized decision support. The aim of this paper is to describe the design and implementation of the standards-based personal intelligent care systems (PICS). PICS makes consistent use of internationally accepted standards such as the Health Level 7 (HL7) Arden syntax for the representation of the decision logic, HL7 Clinical Document Architecture for information representation and is based on a open-source service-oriented architecture framework and a business process management system. Its functionality is exemplified for the application scenario of a patient suffering from congestive heart failure. Several vital signs sensors provide data for the decision support system, and a number of flexible communication channels are available for interaction with patient or caregiver. PICS is a standards-based, open and flexible system enabling personalized decision support. Further development will include the implementation of components on small computers and sensor nodes.
Hankin, Abigail; Haley, Leon; Baugher, Amy; Colbert, Kia; Houry, Debra
2015-01-01
Introduction Annually eight million emergency department (ED) visits are attributable to alcohol use. Screening ED patients for at-risk alcohol and substance use is an integral component of screening, brief intervention, and referral to treatment programs, shown to be effective at reducing substance use. The objective is to evaluate ED patients’ acceptance of and willingness to disclose alcohol/substance use via a computer kiosk versus an in-person interview. Methods This was a cross-sectional, survey-based study. Eligible participants included those who presented to walk-in triage, were English-speaking, ≥18 years, were clinically stable and able to consent. Patients had the opportunity to access the kiosk in the ED waiting room, and were approached for an in-person survey by a research assistant (9am–5pm weekdays). Both surveys used validated assessment tools to assess drug and alcohol use. Disclosure statistics and preferences were calculated using chi-square tests and McNemar’s test. Results A total of 1,207 patients were screened: 229 in person only, 824 by kiosk, and 154 by both in person and kiosk. Single-modality participants were more likely to disclose hazardous drinking (p=0.003) and high-risk drug use (OR=22.3 [12.3–42.2]; p<0.0001) via kiosk. Participants who had participated in screening via both modalities were more likely to reveal high-risk drug use on the kiosk (p=0.003). When asked about screening preferences, 73.6% reported a preference for an in-person survey, which patients rated higher on privacy and comfort. Conclusion ED patients were significantly more likely to disclose at-risk alcohol and substance use to a computer kiosk than an interviewer. Paradoxically patients stated a preference for in-person screening, despite reduced disclosure to a human screener. PMID:25834660
Interface Provides Standard-Bus Communication
NASA Technical Reports Server (NTRS)
Culliton, William G.
1995-01-01
Microprocessor-controlled interface (IEEE-488/LVABI) incorporates service-request and direct-memory-access features. Is circuit card enabling digital communication between system called "laser auto-covariance buffer interface" (LVABI) and compatible personal computer via general-purpose interface bus (GPIB) conforming to Institute for Electrical and Electronics Engineers (IEEE) Standard 488. Interface serves as second interface enabling first interface to exploit advantages of GPIB, via utility software written specifically for GPIB. Advantages include compatibility with multitasking and support of communication among multiple computers. Basic concept also applied in designing interfaces for circuits other than LVABI for unidirectional or bidirectional handling of parallel data up to 16 bits wide.
The role of architecture and ontology for interoperability.
Blobel, Bernd; González, Carolina; Oemig, Frank; Lopéz, Diego; Nykänen, Pirkko; Ruotsalainen, Pekka
2010-01-01
Turning from organization-centric to process-controlled or even to personalized approaches, advanced healthcare settings have to meet special interoperability challenges. eHealth and pHealth solutions must assure interoperability between actors cooperating to achieve common business objectives. Hereby, the interoperability chain also includes individually tailored technical systems, but also sensors and actuators. For enabling corresponding pervasive computing and even autonomic computing, individualized systems have to be based on an architecture framework covering many domains, scientifically managed by specialized disciplines using their specific ontologies in a formalized way. Therefore, interoperability has to advance from a communication protocol to an architecture-centric approach mastering ontology coordination challenges.
PC-assisted translation of photogrammetric papers
NASA Astrophysics Data System (ADS)
Güthner, Karlheinz; Peipe, Jürgen
A PC-based system for machine translation of photogrammetric papers from the English into the German language and vice versa is described. The computer-assisted translating process is not intended to create a perfect interpretation of a text but to produce a rough rendering of the content of a paper. Starting with the original text, a continuous data flow is effected into the translated version by means of hardware (scanner, personal computer, printer) and software (OCR, translation, word processing, DTP). An essential component of the system is a photogrammetric microdictionary which is being established at present. It is based on several sources, including e.g. the ISPRS Multilingual Dictionary.
Aircraft noise prediction program propeller analysis system IBM-PC version user's manual version 2.0
NASA Technical Reports Server (NTRS)
Nolan, Sandra K.
1988-01-01
The IBM-PC version of the Aircraft Noise Prediction Program (ANOPP) Propeller Analysis System (PAS) is a set of computational programs for predicting the aerodynamics, performance, and noise of propellers. The ANOPP-PAS is a subset of a larger version of ANOPP which can be executed on CDC or VAX computers. This manual provides a description of the IBM-PC version of the ANOPP-PAS and its prediction capabilities, and instructions on how to use the system on an IBM-XT or IBM-AT personal computer. Sections within the manual document installation, system design, ANOPP-PAS usage, data entry preprocessors, and ANOPP-PAS functional modules and procedures. Appendices to the manual include a glossary of ANOPP terms and information on error diagnostics and recovery techniques.
Harb, Omar S; Roos, David S
2015-01-01
Over the past 20 years, advances in high-throughput biological techniques and the availability of computational resources including fast Internet access have resulted in an explosion of large genome-scale data sets "big data." While such data are readily available for download and personal use and analysis from a variety of repositories, often such analysis requires access to seldom-available computational skills. As a result a number of databases have emerged to provide scientists with online tools enabling the interrogation of data without the need for sophisticated computational skills beyond basic knowledge of Internet browser utility. This chapter focuses on the Eukaryotic Pathogen Databases (EuPathDB: http://eupathdb.org) Bioinformatic Resource Center (BRC) and illustrates some of the available tools and methods.
ERIC Educational Resources Information Center
Bakkabulindi, Fred Edward K.; Adebanjo, Oyebade Stephen
2011-01-01
This paper reports a survey that sought to establish levels of use of PC (personal computer) software by graduate students in Makerere University and to link the same to organizational characteristics, related to a given respondent's "unit", that is school, faculty or institute, namely its ability to absorb change, its ICT (Information…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-06
... Mobile Communications Devices and Related Software; Notice of Investigation AGENCY: U.S. International... Apple Computer, Inc. of Cupertino, California and NeXT Software, Inc. f/k/a NeXT Computer, Inc. of... certain personal data and mobile communications devices and related software by reason of infringement of...
Games as Artistic Medium: Interfacing Complexity Theory in Game-Based Art Pedagogy
ERIC Educational Resources Information Center
Patton, Ryan Matthew
2011-01-01
Having computer skills, let alone access to a personal computer, has become a necessary component of contemporary Western society and many parts of the world. Digital media literacy involves youth being able to view, participate in, and make creative works with technologies in personal and meaningful ways. Games, defined in this study as…
ERIC Educational Resources Information Center
Beauvois, Margaret Healy; Eledge, Jean
1996-01-01
Describes the results of a pilot study to examine the attitudes of university students toward the use of computer-mediated communication in their French conversation and composition course. Results indicate that both introvert and extrovert personality types generally perceive the use of a local area network as a beneficial experience. (15…
Computer Problems Can Infuriate Even the Most Tech Savvy
ERIC Educational Resources Information Center
Goldsborough, Reid
2004-01-01
Which high-tech products give you the most grief? Surprisingly, more people singled out TiVo and replay digital recording systems than personal computers, according to a recent survey by Best Buy. Nine percent of people said they found these TV devices difficult to use. The same percentage found PDAs (personal digital assistants) difficult. Only 2…
John R. Mills
1989-01-01
The timber resource inventory model (TRIM) has been adapted to run on person al computers. The personal computer version of TRIM (PC-TRIM) is more widely used than its mainframe parent. Errors that existed in previous versions of TRIM have been corrected. Information is presented to help users with program input and output management in the DOS environment, to...
Ayub, Nailah
2015-11-01
While a specific personality trait may escalate suicide ideation, contextual factors such as social support, when provided effectively, may alleviate the effects of such personality traits. This study examined the moderating role of social support in the relationship between the Big-Five personality traits and suicide ideation. Significant interactions were found between social support and extraversion and emotional stability. Specifically, the relationship between emotional stability and extraversion to suicide ideation was exacerbated when social support was low. Slope analysis showed openness also interacted with low social support. Results were computed for frequency, duration and attitude dimensions of suicide ideation. Extraversion interacted with social support to predict all three dimensions. Social support moderated emotional stability to predict frequency and duration, moderated conscientiousness towards frequency and attitude, and moderated openness towards attitude. The results imply that whereas personality traits may be difficult to alter, social support may play a significant role in saving a life. Psychologists should include family and friends when treating a suicidal youth, guiding them to awareness of one's personality and being more supportive. Copyright © 2015 John Wiley & Sons, Ltd.
Gender stereotypes, aggression, and computer games: an online survey of women.
Norris, Kamala O
2004-12-01
Computer games were conceptualized as a potential mode of entry into computer-related employment for women. Computer games contain increasing levels of realism and violence, as well as biased gender portrayals. It has been suggested that aggressive personality characteristics attract people to aggressive video games, and that more women do not play computer games because they are socialized to be non-aggressive. To explore gender identity and aggressive personality in the context of computers, an online survey was conducted on women who played computer games and women who used the computer but did not play computer games. Women who played computer games perceived their online environments as less friendly but experienced less sexual harassment online, were more aggressive themselves, and did not differ in gender identity, degree of sex role stereotyping, or acceptance of sexual violence when compared to women who used the computer but did not play video games. Finally, computer gaming was associated with decreased participation in computer-related employment; however, women with high masculine gender identities were more likely to use computers at work.
The orbifolder: A tool to study the low-energy effective theory of heterotic orbifolds
NASA Astrophysics Data System (ADS)
Nilles, H. P.; Ramos-Sánchez, S.; Vaudrevange, P. K. S.; Wingerter, A.
2012-06-01
The orbifolder is a program developed in C++ that computes and analyzes the low-energy effective theory of heterotic orbifold compactifications. The program includes routines to compute the massless spectrum, to identify the allowed couplings in the superpotential, to automatically generate large sets of orbifold models, to identify phenomenologically interesting models (e.g. MSSM-like models) and to analyze their vacuum configurations. Program summaryProgram title: orbifolder Catalogue identifier: AELR_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AELR_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: GNU General Public License version 3 No. of lines in distributed program, including test data, etc.: 145 572 No. of bytes in distributed program, including test data, etc.: 930 517 Distribution format: tar.gz Programming language:C++ Computer: Personal computer Operating system: Tested on Linux (Fedora 15, Ubuntu 11, SuSE 11) Word size: 32 bits or 64 bits Classification: 11.1 External routines: Boost (http://www.boost.org/), GSL (http://www.gnu.org/software/gsl/) Nature of problem: Calculating the low-energy spectrum of heterotic orbifold compactifications. Solution method: Quadratic equations on a lattice; representation theory; polynomial algebra. Running time: Less than a second per model.
A prisoner's dilemma experiment on cooperation with people and human-like computers.
Kiesler, S; Sproull, L; Waters, K
1996-01-01
The authors investigated basic properties of social exchange and interaction with technology in an experiment on cooperation with a human-like computer partner or a real human partner. Talking with a computer partner may trigger social identity feelings or commitment norms. Participants played a prisoner's dilemma game with a confederate or a computer partner. Discussion, inducements to make promises, and partner cooperation varied across trials. On Trial 1, after discussion, most participants proposed cooperation. They kept their promises as much with a text-only computer as with a person, but less with a more human-like computer. Cooperation dropped sharply when any partner avoided discussion. The strong impact of discussion fits a social contract explanation of cooperation following discussion. Participants broke their promises to a computer more than to a person, however, indicating that people make heterogeneous commitments.
NASA Astrophysics Data System (ADS)
Clementi, Enrico
2012-06-01
This is the introductory chapter to the AIP Proceedings volume "Theory and Applications of Computational Chemistry: The First Decade of the Second Millennium" where we discuss the evolution of "computational chemistry". Very early variational computational chemistry developments are reported in Sections 1 to 7, and 11, 12 by recalling some of the computational chemistry contributions by the author and his collaborators (from late 1950 to mid 1990); perturbation techniques are not considered in this already extended work. Present day's computational chemistry is partly considered in Sections 8 to 10 where more recent studies by the author and his collaborators are discussed, including the Hartree-Fock-Heitler-London method; a more general discussion on present day computational chemistry is presented in Section 14. The following chapters of this AIP volume provide a view of modern computational chemistry. Future computational chemistry developments can be extrapolated from the chapters of this AIP volume; further, in Sections 13 and 15 present an overall analysis on computational chemistry, obtained from the Global Simulation approach, by considering the evolution of scientific knowledge confronted with the opportunities offered by modern computers.
Hogan, Timothy P; Hill, Jennifer N; Locatelli, Sara M; Weaver, Frances M; Thomas, Florian P; Nazi, Kim M; Goldstein, Barry; Smith, Bridget M
2016-02-01
Access to health information is crucial to persons living with a spinal cord injury or disorder (SCI/D). Although previous research has provided insights on computer and Internet use among persons with SCI/D, as well as how and where persons with SCI/D gather health information, few studies have focused on U.S. veterans with SCI/D. To characterize health information seeking among veterans with SCI/D and to examine the association between technology use and the characteristics of veterans with SCI/D. Cross-sectional. Veterans Health Administration (VHA). Sample of 290 veterans with SCI/D who utilize services at 2 VHA SCI/D Centers. Postal mail survey. Extent of computer, Internet, and text messaging use, information source use, and e-Health literacy rates. The survey response rate was 38%. The majority of respondents were male (97.2%), younger than 65 years (71.0%), and white (71.7%). Of the respondents, 64.8% indicated that they use a computer, 62.9% reported use of the Internet, and 26.2% reported use of text messaging. The mean overall e-Health Literacy Scale score was 27.3 (standard deviation = 7.2). Similar to findings reported in studies focused outside the veteran population, the most frequent source that veterans turned to for information about SCI/D was a health professional (85.1%); this was also the most frequent source that veterans indicated they would turn to first to get information about SCI/D (75.9%). Other frequently reported sources of information included other persons with SCI/D (41.0%), Internet resources (31.0%), and family and friends (27.9%). Fairly high levels of computer and Internet use exist among veterans with SCI/D. Veterans with SCI/D also have a strong preference for people-particularly health professionals, and to a lesser extent peers and family and friends-as sources of information about SCI/D. These findings highlight the importance of combining technology and human interaction to meet the information needs of this population. Published by Elsevier Inc.
Computer and internet use by ophthalmologists and trainees in an academic centre.
Somal, Kirandeep; Lam, Wai-Ching; Tam, Eric
2009-06-01
The purpose of this study was to determine computer, internet, and department web site use by members of the Department of Ophthalmology and Vision Sciences at the University of Toronto in Toronto, Ont. Cross-sectional analysis. Eighty-eight members of the Department of Ophthalmology and Vision Sciences who responded to a survey. One hundred forty-eight department members (93 staff, 24 residents, and 31 fellows) were invited via e-mail to complete an online survey looking at computer and internet use. Participation was voluntary. Individuals who did not fill in an online response were sent a paper copy of the survey. No identifying fields were used in the data analysis. A response rate of 59% (88/148) was obtained. Fifty-nine percent of respondents described their computer skill as "good" or better; 86.4% utilized a computer in their clinical practice. Performance of computer-related tasks included accessing e-mail (98.9%), accessing medical literature (87.5%), conducting personal affairs (83%), and accessing conference/round schedules (65.9%). The survey indicated that 89.1% of respondents accessed peer-reviewed material online, including eMedicine (60.2%) and UpToDate articles (48.9%). Thirty-three percent of department members reported never having visited the department web site. Impediments to web site use included information not up to date (27.3%), information not of interest (22.1%), and difficulty locating the web site (20.8%). The majority of ophthalmologists and trainees in an academic centre utilize computer and internet resources for various tasks. A weak linear correlation was found between lower age of respondent and higher self-evaluated experience with computers (r = -0.43). Although use of the current department web site was low, respondents were interested in seeing improvements to the web site to increase its utility.
Computer and online health information literacy among Belgrade citizens aged 66-89 years.
Gazibara, Tatjana; Kurtagic, Ilma; Kisic-Tepavcevic, Darija; Nurkovic, Selmina; Kovacevic, Nikolina; Gazibara, Teodora; Pekmezovic, Tatjana
2016-06-01
Computer users over 65 years of age in Serbia are rare. The purpose of this study was to (i) describe main demographic characteristics of computer users older than 65; (ii) evaluate their online health information literacy and (iii) assess factors associated with computer use in this population. Persons above 65 years of age were recruited at the Community Health Center 'Vračar' in Belgrade from November 2012 to January 2013. Data were collected after medical checkups using a questionnaire. Of 480 persons who were invited to participate 354 (73.7%) agreed to participate, while 346 filled in the questionnaire (72.1%). A total of 70 (20.2%) older persons were computer users (23.4% males vs. 17.7% females). Of those, 23.7% explored health-related web sites. The majority of older persons who do not use computers reported that they do not have a reason to use a computer (76.5%), while every third senior (30.4%) did not own a computer. Predictors of computer use were being younger [odds ratio (OR) = 2.14, 95% confidence interval (CI) 1.30-4.04; p = 0.019], having less members of household (OR = 2.97, 95% CI 1.45-6.08; p = 0.003), being more educated (OR = 3.53, 95% CI 1.88-6.63; p = 0.001), having higher income (OR = 2.31, 95% CI 1.17-4.58; p = 0.016) as well as fewer comorbidities (OR = 0.42, 95% CI 0.23-0.79; p = 0.007). Being male was independent predictor of online health information use at the level of marginal significance (OR = 4.43, 95% CI 1.93-21.00; p = 0.061). Frequency of computer and Internet use among older adults in Belgrade is similar to other populations. Patterns of Internet use as well as non-use demonstrate particular socio-cultural characteristics. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Directory of Energy Information Administration model abstracts 1988
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1988-01-01
This directory contains descriptions about each basic and auxiliary model, including the title, acronym, purpose, and type, followed by more detailed information on characteristics, uses, and requirements. For developing models, limited information is provided. Sources for additional information are identified. Included in this directory are 44 EIA models active as of February 1, 1988; 16 of which operate on personal computers. Models that run on personal computers are identified by ''PC'' as part of the acronyms. The main body of this directory is an alphabetical listing of all basic and auxiliary EIA models. Appendix A identifies major EIA modeling systemsmore » and the models within these systems, and Appendix B identifies EIA models by type (basic or auxiliary). Appendix C lists developing models and contact persons for those models. A basic model is one designated by the EIA Administrator as being sufficiently important to require sustained support and public scrutiny. An auxiliary model is one designated by the EIA Administrator as being used only occasionally in analyses, and therefore requires minimal levels of documentation. A developing model is one designated by the EIA Administrator as being under development and yet of sufficient interest to require a basic level of documentation at a future date. EIA also leases models developed by proprietary software vendors. Documentation for these ''proprietary'' models is the responsibility of the companies from which they are leased. EIA has recently leased models from Chase Econometrics, Inc., Data Resources, Inc. (DRI), the Oak Ridge National Laboratory (ORNL), and Wharton Econometric Forecasting Associates (WEFA). Leased models are not abstracted here.« less
Dijkstra, Arie; Ballast, Karien
2012-02-01
In most computer-tailored interventions, the recipient's name is used to personalize the information. This is done to increase the process of persuasion but few empirical data exist that support this notion. An experimental laboratory study was conducted to test the effects of mentioning the participants name and to study whether it was related to the depth of processing in a 2 (personalization/standard) × 2 (weak/strong arguments) design. Over 120 student smokers were randomly assigned to one of the four experimental conditions in which they read smoking cessation messages offering (pre-tested) strong or weak arguments. Personalization was applied by mentioning the recipient's first name three times in the text. The intention to quit smoking was the dependent variable. Personalization increased persuasion when perceived personal relevance was high, but it decreased persuasion when perceived personal relevance was low. The effects on persuasion were only present in the case of strong arguments. Personalization is not always effective, and it may even lead to less persuasion. Therefore, this often used way to tailor messages must be applied with care. ©2011 The British Psychological Society.
2012-01-01
Background Bioinformatics services have been traditionally provided in the form of a web-server that is hosted at institutional infrastructure and serves multiple users. This model, however, is not flexible enough to cope with the increasing number of users, increasing data size, and new requirements in terms of speed and availability of service. The advent of cloud computing suggests a new service model that provides an efficient solution to these problems, based on the concepts of "resources-on-demand" and "pay-as-you-go". However, cloud computing has not yet been introduced within bioinformatics servers due to the lack of usage scenarios and software layers that address the requirements of the bioinformatics domain. Results In this paper, we provide different use case scenarios for providing cloud computing based services, considering both the technical and financial aspects of the cloud computing service model. These scenarios are for individual users seeking computational power as well as bioinformatics service providers aiming at provision of personalized bioinformatics services to their users. We also present elasticHPC, a software package and a library that facilitates the use of high performance cloud computing resources in general and the implementation of the suggested bioinformatics scenarios in particular. Concrete examples that demonstrate the suggested use case scenarios with whole bioinformatics servers and major sequence analysis tools like BLAST are presented. Experimental results with large datasets are also included to show the advantages of the cloud model. Conclusions Our use case scenarios and the elasticHPC package are steps towards the provision of cloud based bioinformatics services, which would help in overcoming the data challenge of recent biological research. All resources related to elasticHPC and its web-interface are available at http://www.elasticHPC.org. PMID:23281941
El-Kalioby, Mohamed; Abouelhoda, Mohamed; Krüger, Jan; Giegerich, Robert; Sczyrba, Alexander; Wall, Dennis P; Tonellato, Peter
2012-01-01
Bioinformatics services have been traditionally provided in the form of a web-server that is hosted at institutional infrastructure and serves multiple users. This model, however, is not flexible enough to cope with the increasing number of users, increasing data size, and new requirements in terms of speed and availability of service. The advent of cloud computing suggests a new service model that provides an efficient solution to these problems, based on the concepts of "resources-on-demand" and "pay-as-you-go". However, cloud computing has not yet been introduced within bioinformatics servers due to the lack of usage scenarios and software layers that address the requirements of the bioinformatics domain. In this paper, we provide different use case scenarios for providing cloud computing based services, considering both the technical and financial aspects of the cloud computing service model. These scenarios are for individual users seeking computational power as well as bioinformatics service providers aiming at provision of personalized bioinformatics services to their users. We also present elasticHPC, a software package and a library that facilitates the use of high performance cloud computing resources in general and the implementation of the suggested bioinformatics scenarios in particular. Concrete examples that demonstrate the suggested use case scenarios with whole bioinformatics servers and major sequence analysis tools like BLAST are presented. Experimental results with large datasets are also included to show the advantages of the cloud model. Our use case scenarios and the elasticHPC package are steps towards the provision of cloud based bioinformatics services, which would help in overcoming the data challenge of recent biological research. All resources related to elasticHPC and its web-interface are available at http://www.elasticHPC.org.
My contribution to broadening the base of chemical engineering.
Sargent, Roger W H
2011-01-01
This paper is a short account, from a personal viewpoint, of the various contributions I have made to expand the academic basis of chemical engineering from its origin in the unifying concept of unit operations, focussed on process design, to encompassing all the professional activities of industrial chemical engineers. This includes all aspects of planning and scheduling the operations as well as designing and controlling the process plant. The span of my career also happens to include the birth of the age of computing, with all the consequential implications.
78 FR 2912 - Prohibition on Personal Use of Electronic Devices on the Flight Deck
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-15
....C. 332(c)(7)(C)(i). In general, wireless telecommunications is the transfer of information between... personal wireless communications device or laptop computer for personal use while at their duty station on.... Personal Wireless Communications Device IV. Regulatory Notices and Analyses A. Regulatory Evaluation B...
A roadmap towards personalized immunology.
Delhalle, Sylvie; Bode, Sebastian F N; Balling, Rudi; Ollert, Markus; He, Feng Q
2018-01-01
Big data generation and computational processing will enable medicine to evolve from a "one-size-fits-all" approach to precise patient stratification and treatment. Significant achievements using "Omics" data have been made especially in personalized oncology. However, immune cells relative to tumor cells show a much higher degree of complexity in heterogeneity, dynamics, memory-capability, plasticity and "social" interactions. There is still a long way ahead on translating our capability to identify potentially targetable personalized biomarkers into effective personalized therapy in immune-centralized diseases. Here, we discuss the recent advances and successful applications in "Omics" data utilization and network analysis on patients' samples of clinical trials and studies, as well as the major challenges and strategies towards personalized stratification and treatment for infectious or non-communicable inflammatory diseases such as autoimmune diseases or allergies. We provide a roadmap and highlight experimental, clinical, computational analysis, data management, ethical and regulatory issues to accelerate the implementation of personalized immunology.
Lerdal, Anners; Andenæs, Randi; Bjørnsborg, Eva; Bonsaksen, Tore; Borge, Lisbet; Christiansen, Bjørg; Eide, Hilde; Hvinden, Kari; Fagermoen, May Solveig
2011-10-01
To explore relationships of socio-demographic variables, health behaviours, environmental characteristics and personal factors, with physical and mental health variables in persons with morbid obesity, and to compare their health-related quality of life (HRQoL) scores with scores from the general population. A cross-sectional correlation study design was used. Data were collected by self-reported questionnaire from adult patients within the first 2 days of commencement of a mandatory educational course. Of 185 course attendees, 142 (76.8%) volunteered to participate in the study. Valid responses on all items were recorded for 128 participants. HRQoL was measured with the Short Form 12v2 from which physical (PCS) and mental component summary (MCS) scores were computed. Other standardized instruments measured regular physical activity, social support, self-esteem, sense of coherence, self-efficacy and coping style. Respondents scored lower on all the HRQoL sub-domains compared with norms. Linear regression analyses showed that personal factors that included self-esteem, self-efficacy, sense of coherence and coping style explained 3.6% of the variance in PCS scores and 41.6% in MCS scores. Personal factors such as self-esteem, sense of coherence and a high approaching coping style are strongly related to mental health in obese persons.