Science.gov

Sample records for message passing algorithms

  1. A Message-Passing Algorithm for Wireless Network Scheduling.

    PubMed

    Paschalidis, Ioannis Ch; Huang, Fuzhuo; Lai, Wei

    2015-10-01

    We consider scheduling in wireless networks and formulate it as Maximum Weighted Independent Set (MWIS) problem on a "conflict" graph that captures interference among simultaneous transmissions. We propose a novel, low-complexity, and fully distributed algorithm that yields high-quality feasible solutions. Our proposed algorithm consists of two phases, each of which requires only local information and is based on message-passing. The first phase solves a relaxation of the MWIS problem using a gradient projection method. The relaxation we consider is tighter than the simple linear programming relaxation and incorporates constraints on all cliques in the graph. The second phase of the algorithm starts from the solution of the relaxation and constructs a feasible solution to the MWIS problem. We show that our algorithm always outputs an optimal solution to the MWIS problem for perfect graphs. Simulation results compare our policies against Carrier Sense Multiple Access (CSMA) and other alternatives and show excellent performance.

  2. Algorithms for parallel flow solvers on message passing architectures

    NASA Technical Reports Server (NTRS)

    Vanderwijngaart, Rob F.

    1995-01-01

    The purpose of this project has been to identify and test suitable technologies for implementation of fluid flow solvers -- possibly coupled with structures and heat equation solvers -- on MIMD parallel computers. In the course of this investigation much attention has been paid to efficient domain decomposition strategies for ADI-type algorithms. Multi-partitioning derives its efficiency from the assignment of several blocks of grid points to each processor in the parallel computer. A coarse-grain parallelism is obtained, and a near-perfect load balance results. In uni-partitioning every processor receives responsibility for exactly one block of grid points instead of several. This necessitates fine-grain pipelined program execution in order to obtain a reasonable load balance. Although fine-grain parallelism is less desirable on many systems, especially high-latency networks of workstations, uni-partition methods are still in wide use in production codes for flow problems. Consequently, it remains important to achieve good efficiency with this technique that has essentially been superseded by multi-partitioning for parallel ADI-type algorithms. Another reason for the concentration on improving the performance of pipeline methods is their applicability in other types of flow solver kernels with stronger implied data dependence. Analytical expressions can be derived for the size of the dynamic load imbalance incurred in traditional pipelines. From these it can be determined what is the optimal first-processor retardation that leads to the shortest total completion time for the pipeline process. Theoretical predictions of pipeline performance with and without optimization match experimental observations on the iPSC/860 very well. Analysis of pipeline performance also highlights the effect of uncareful grid partitioning in flow solvers that employ pipeline algorithms. If grid blocks at boundaries are not at least as large in the wall-normal direction as those

  3. Message passing in PUMA

    SciTech Connect

    Maccabe, A.B. |; Wheat, S.R.

    1993-05-01

    This paper provides an overview of the message passing primitives provided by PUMA (Performance-oriented, User-managed Messaging Architecture). Message passing in PUMA is based on the concept of a portal--an opening in the address space of an application process. Once an application process has established a portal, other processes can write values into the memory associated with the portal using a simple send operation. Because messages are written directly into the address space of the receiving process, there is not need to buffer messages in the PUMA kernel. This simplifies the design of the kernel, increasing its reliability and portability. Moreover, because messages are mapped directly into the address space of the application process, the application can manage the messages that it receives without needing direct support from the kernel.

  4. Compressive Imaging via Approximate Message Passing

    DTIC Science & Technology

    2015-09-04

    We propose novel compressive imaging algorithms that employ approximate message passing (AMP), which is an iterative signal estimation algorithm that...Approved for Public Release; Distribution Unlimited Final Report: Compressive Imaging via Approximate Message Passing The views, opinions and/or findings...Research Triangle Park, NC 27709-2211 approximate message passing , compressive imaging, compressive sensing, hyperspectral imaging, signal reconstruction

  5. Streaming data analytics via message passing with application to graph algorithms

    SciTech Connect

    Plimpton, Steven J.; Shead, Tim

    2014-05-06

    The need to process streaming data, which arrives continuously at high-volume in real-time, arises in a variety of contexts including data produced by experiments, collections of environmental or network sensors, and running simulations. Streaming data can also be formulated as queries or transactions which operate on a large dynamic data store, e.g. a distributed database. We describe a lightweight, portable framework named PHISH which enables a set of independent processes to compute on a stream of data in a distributed-memory parallel manner. Datums are routed between processes in patterns defined by the application. PHISH can run on top of either message-passing via MPI or sockets via ZMQ. The former means streaming computations can be run on any parallel machine which supports MPI; the latter allows them to run on a heterogeneous, geographically dispersed network of machines. We illustrate how PHISH can support streaming MapReduce operations, and describe streaming versions of three algorithms for large, sparse graph analytics: triangle enumeration, subgraph isomorphism matching, and connected component finding. Lastly, we also provide benchmark timings for MPI versus socket performance of several kernel operations useful in streaming algorithms.

  6. Streaming data analytics via message passing with application to graph algorithms

    DOE PAGES

    Plimpton, Steven J.; Shead, Tim

    2014-05-06

    The need to process streaming data, which arrives continuously at high-volume in real-time, arises in a variety of contexts including data produced by experiments, collections of environmental or network sensors, and running simulations. Streaming data can also be formulated as queries or transactions which operate on a large dynamic data store, e.g. a distributed database. We describe a lightweight, portable framework named PHISH which enables a set of independent processes to compute on a stream of data in a distributed-memory parallel manner. Datums are routed between processes in patterns defined by the application. PHISH can run on top of eithermore » message-passing via MPI or sockets via ZMQ. The former means streaming computations can be run on any parallel machine which supports MPI; the latter allows them to run on a heterogeneous, geographically dispersed network of machines. We illustrate how PHISH can support streaming MapReduce operations, and describe streaming versions of three algorithms for large, sparse graph analytics: triangle enumeration, subgraph isomorphism matching, and connected component finding. Lastly, we also provide benchmark timings for MPI versus socket performance of several kernel operations useful in streaming algorithms.« less

  7. Message Passing on GPUs

    NASA Astrophysics Data System (ADS)

    Stuart, J. A.

    2011-12-01

    This paper explores the challenges in implementing a message passing interface usable on systems with data-parallel processors, and more specifically GPUs. As a case study, we design and implement the ``DCGN'' API on NVIDIA GPUs that is similar to MPI and allows full access to the underlying architecture. We introduce the notion of data-parallel thread-groups as a way to map resources to MPI ranks. We use a method that also allows the data-parallel processors to run autonomously from user-written CPU code. In order to facilitate communication, we use a sleep-based polling system to store and retrieve messages. Unlike previous systems, our method provides both performance and flexibility. By running a test suite of applications with different communication requirements, we find that a tolerable amount of overhead is incurred, somewhere between one and five percent depending on the application, and indicate the locations where this overhead accumulates. We conclude that with innovations in chipsets and drivers, this overhead will be mitigated and provide similar performance to typical CPU-based MPI implementations while providing fully-dynamic communication.

  8. The ACL Message Passing Library

    SciTech Connect

    Painter, J.; McCormick, P.; Krogh, M.; Hansen, C.; Colin de Verdiere, G.

    1995-09-01

    This paper presents the ACL (Advanced Computing Lab) Message Passing Library. It is a high throughput, low latency communications library, based on Thinking Machines Corp.`s CMMD, upon which message passing applications can be built. The library has been implemented on the Cray T3D, Thinking Machines CM-5, SGI workstations, and on top of PVM.

  9. Gene-network inference by message passing

    NASA Astrophysics Data System (ADS)

    Braunstein, A.; Pagnani, A.; Weigt, M.; Zecchina, R.

    2008-01-01

    The inference of gene-regulatory processes from gene-expression data belongs to the major challenges of computational systems biology. Here we address the problem from a statistical-physics perspective and develop a message-passing algorithm which is able to infer sparse, directed and combinatorial regulatory mechanisms. Using the replica technique, the algorithmic performance can be characterized analytically for artificially generated data. The algorithm is applied to genome-wide expression data of baker's yeast under various environmental conditions. We find clear cases of combinatorial control, and enrichment in common functional annotations of regulated genes and their regulators.

  10. Can rare SAT formulae be easily recognized? On the efficiency of message-passing algorithms for K-SAT at large clause-to-variable ratios

    NASA Astrophysics Data System (ADS)

    Altarelli, Fabrizio; Monasson, Rémi; Zamponi, Francesco

    2007-02-01

    For large clause-to-variable ratios, typical K-SAT instances drawn from the uniform distribution have no solution. We argue, based on statistical mechanics calculations using the replica and cavity methods, that rare satisfiable instances from the uniform distribution are very similar to typical instances drawn from the so-called planted distribution, where instances are chosen uniformly between the ones that admit a given solution. It then follows, from a recent article by Feige, Mossel and Vilenchik (2006 Complete convergence of message passing algorithms for some satisfiability problems Proc. Random 2006 pp 339-50), that these rare instances can be easily recognized (in O(log N) time and with probability close to 1) by a simple message-passing algorithm.

  11. CT reconstruction via denoising approximate message passing

    NASA Astrophysics Data System (ADS)

    Perelli, Alessandro; Lexa, Michael A.; Can, Ali; Davies, Mike E.

    2016-05-01

    In this paper, we adapt and apply a compressed sensing based reconstruction algorithm to the problem of computed tomography reconstruction for luggage inspection. Specifically, we propose a variant of the denoising generalized approximate message passing (D-GAMP) algorithm and compare its performance to the performance of traditional filtered back projection and to a penalized weighted least squares (PWLS) based reconstruction method. D-GAMP is an iterative algorithm that at each iteration estimates the conditional probability of the image given the measurements and employs a non-linear "denoising" function which implicitly imposes an image prior. Results on real baggage show that D-GAMP is well-suited to limited-view acquisitions.

  12. Message Passing Framework for Globally Interconnected Clusters

    NASA Astrophysics Data System (ADS)

    Hafeez, M.; Asghar, S.; Malik, U. A.; Rehman, A.; Riaz, N.

    2011-12-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  13. Tracking particles by passing messages between images

    SciTech Connect

    Chertkov, Michael; Kroc, Lukas; Zdeborova, Lenka; Krakala, Florent; Vergassola, M

    2009-01-01

    Methods to extract information from the tracking of mobile objects/particles have broad interest in biological and physical sciences. Techniques based on the simple criterion of proximity in time-consecutive snapshots are useful to identify the trajectories of the particles. However, they become problematic as the motility and/or the density of the particles increases because of the uncertainties on the trajectories that particles have followed during the acquisition time of the images. Here, we report efficient methods for learning parameters of the dynamics of the particles from their positions in time-consecutive images. Our algorithm belongs to the class of message-passing algorithms, also known in computer science, information theory and statistical physics under the name of Belief Propagation (BP). The algorithm is distributed, thus allowing parallel implementation suitable for computations on multiple machines without significant inter-machine overhead. We test our method on the model example of particle tracking in turbulent flows, which is particularly challenging due to the strong transport that those flows produce. Our numerical experiments show that the BP algorithm compares in quality with exact Markov Chain Monte-Carlo algorithms, yet BP is far superior in speed. We also suggest and analyze a random-distance model that provides theoretical justification for BP accuracy. Methods developed here systematically formulate the problem of particle tracking and provide fast and reliable tools for its extensive range of applications.

  14. Active messages versus explicit message passing under SUNMOS

    SciTech Connect

    Riesen, R.; Wheat, S.R.; Maccabe, A.B.

    1994-07-01

    In the past few years much effort has been devoted to finding faster and more convenient ways to exchange data between nodes of massively parallel distributed memory machines. One such approach, taken by Thorsten von Eicken et al. is called Active Messages. The idea is to hide message passing latency and continue to compute while data is being sent and delivered. The authors have implemented Active Messages under SUNMOS for the Intel Paragon and performed various experiments to determine their efficiency and utility. In this paper they concentrate on the subset of the Active Message layer that is used by the implementation of the Split-C library. They compare performance to explicit message passing under SUNMOS and explore new ways to support Split-C without Active Messages. They also compare the implementation to the original one on the Thinking Machines CM-5 and try to determine what the effects of low latency and low band-width versus high latency and high bandwidth are on user codes.

  15. Message-passing performance of various computers

    SciTech Connect

    Dongarra, J.J.; Dunigan, T.H.

    1996-02-01

    This report compares the performance of different computer systems message passing. Latency and bandwidth are measured on Convex, Cray, IBM, Intel, KSR, Meiko, nCUBE, NEC, SGI, and TMC multiprocessors. Communication performance is contrasted with the computational power of each system. The comparison includes both shared a memory computers as well as networked workstation cluster.

  16. Message passing with parallel queue traversal

    DOEpatents

    Underwood, Keith D [Albuquerque, NM; Brightwell, Ronald B [Albuquerque, NM; Hemmert, K Scott [Albuquerque, NM

    2012-05-01

    In message passing implementations, associative matching structures are used to permit list entries to be searched in parallel fashion, thereby avoiding the delay of linear list traversal. List management capabilities are provided to support list entry turnover semantics and priority ordering semantics.

  17. MPICH. Portable Implementation of the Standard Message Passing Interface

    SciTech Connect

    Gropp, W.; Lusk, E.; Doss, N.; Skjellum, A.

    1992-12-01

    MPICH is a portable implementation of the MPI Message Passing Interface standard. A general-purpose library, it contains routines with which to write message-passing programs for a variety of parallell computers and workstation networks.

  18. Generalized communicators in the message passing interface

    SciTech Connect

    Foster, I.; Kesselmman, C.; Snir, M.

    1996-12-31

    We propose extensions to the Message Passing Interface (MPI) that generalize the MPI communicator concept to allow multiple communication endpoints per process, dynamic creation of endpoints, and the transfer of endpoints between processes. The generalized communicator construct can be used to express a wide range of interesting communication structures, including collective communication operations involving multiple threads per process, communications between dynamically created threads, and object- oriented applications in which communications are directed to specific objects. Furthermore. this enriched functionality can be provided in a manner that preserves backward compatibility with MPI. We describe the proposed extensions, illustrate their use with examples, and discuss implementation issues.

  19. Hybrid approximate message passing for generalized group sparsity

    NASA Astrophysics Data System (ADS)

    Fletcher, Alyson K.; Rangan, Sundeep

    2013-09-01

    We consider the problem of estimating a group sparse vector x ∈ Rn under a generalized linear measurement model. Group sparsity of x means the activity of different components of the vector occurs in groups - a feature common in estimation problems in image processing, simultaneous sparse approximation and feature selection with grouped variables. Unfortunately, many current group sparse estimation methods require that the groups are non-overlapping. This work considers problems with what we call generalized group sparsity where the activity of the different components of x are modeled as functions of a small number of boolean latent variables. We show that this model can incorporate a large class of overlapping group sparse problems including problems in sparse multivariable polynomial regression and gene expression analysis. To estimate vectors with such group sparse structures, the paper proposes to use a recently-developed hybrid generalized approximate message passing (HyGAMP) method. Approximate message passing (AMP) refers to a class of algorithms based on Gaussian and quadratic approximations of loopy belief propagation for estimation of random vectors under linear measurements. The HyGAMP method extends the AMP framework to incorporate priors on x described by graphical models of which generalized group sparsity is a special case. We show that the HyGAMP algorithm is computationally efficient, general and offers superior performance in certain synthetic data test cases.

  20. Message passing with queues and channels

    DOEpatents

    Dozsa, Gabor J; Heidelberger, Philip; Kumar, Sameer; Ratterman, Joseph D; Steinmacher-Burow, Burkhard; Wisniewski, Robert W

    2013-09-24

    In an embodiment, a send thread receives an identifier that identifies a destination node and a pointer to data. The send thread creates a first send request in response to the receipt of the identifier and the data pointer. The send thread selects a selected channel from among a plurality of channels. The selected channel comprises a selected hand-off queue and an identification of a selected message unit. Each of the channels identifies a different message unit. The selected hand-off queue is randomly accessible. If the selected hand-off queue contains an available entry, the send thread adds the first send request to the selected hand-off queue. If the selected hand-off queue does not contain an available entry, the send thread removes a second send request from the selected hand-off queue and sends the second send request to the selected message unit.

  1. Study of parallel efficiency in message passing environments

    SciTech Connect

    Hanebutte, U.R.; Tatsumi, Masahiro

    1996-03-01

    A benchmark test using the Message Passing Interface (MPI, an emerging standard for writing message passing programs) has been developed, to study parallel performance in message passing environments. The test is comprised of a computational task of independent calculations followed by a round-robin data communication step. Performance data as a function of computational granularity and message passing requirements are presented for the IBM SPx at Argonne National Laboratory and for a cluster of quasi-dedicated SUN SPARC Station 20`s. In the later portion of the paper a widely accepted communication cost model combined with Amdahl`s law is used to obtain performance predictions for uneven distributed computational work loads.

  2. Message passing with a limited number of DMA byte counters

    DOEpatents

    Blocksome, Michael; Chen, Dong; Giampapa, Mark E.; Heidelberger, Philip; Kumar, Sameer; Parker, Jeffrey J.

    2011-10-04

    A method for passing messages in a parallel computer system constructed as a plurality of compute nodes interconnected as a network where each compute node includes a DMA engine but includes only a limited number of byte counters for tracking a number of bytes that are sent or received by the DMA engine, where the byte counters may be used in shared counter or exclusive counter modes of operation. The method includes using rendezvous protocol, a source compute node deterministically sending a request to send (RTS) message with a single RTS descriptor using an exclusive injection counter to track both the RTS message and message data to be sent in association with the RTS message, to a destination compute node such that the RTS descriptor indicates to the destination compute node that the message data will be adaptively routed to the destination node. Using one DMA FIFO at the source compute node, the RTS descriptors are maintained for rendezvous messages destined for the destination compute node to ensure proper message data ordering thereat. Using a reception counter at a DMA engine, the destination compute node tracks reception of the RTS and associated message data and sends a clear to send (CTS) message to the source node in a rendezvous protocol form of a remote get to accept the RTS message and message data and processing the remote get (CTS) by the source compute node DMA engine to provide the message data to be sent.

  3. Direct Deposit -- When Message Passing Meets Shared Memory

    DTIC Science & Technology

    2000-05-19

    by H. Karl in [64]. The paper implements the pure DSM code, the pure message passing code and a few intermediate forms on the Charlotte DSM system [8...ASPLOS VI), pages 51–60, San Jose, October 1994. ACM. [64] H. Karl . Bridging the gap between distributed shared memory and message passing. Concurrency...pages 94 – 101, 1988. [73] P.N. Loewenstein and D.L. Dill. Verification of a multiprocessor cache protocol using simulation relations and higher-order

  4. Message passing with queues and channels

    DOEpatents

    Dozsa, Gabor J; Heidelberger, Philip; Kumar, Sameer; Ratterman, Joseph D; Steinmacher-Burrow, Burkhard

    2013-02-19

    In an embodiment, a reception thread receives a source node identifier, a type, and a data pointer from an application and, in response, creates a receive request. If the source node identifier specifies a source node, the reception thread adds the receive request to a fast-post queue. If a message received from a network does not match a receive request on a posted queue, a polling thread adds a receive request that represents the message to an unexpected queue. If the fast-post queue contains the receive request, the polling thread removes the receive request from the fast-post queue. If the receive request that was removed from the fast-post queue does not match the receive request on the unexpected queue, the polling thread adds the receive request that was removed from the fast-post queue to the posted queue. The reception thread and the polling thread execute asynchronously from each other.

  5. Charon Message-Passing Toolkit for Scientific Computations

    NASA Technical Reports Server (NTRS)

    VanderWijngarrt, Rob F.; Saini, Subhash (Technical Monitor)

    1998-01-01

    The Charon toolkit for piecemeal development of high-efficiency parallel programs for scientific computing is described. The portable toolkit, callable from C and Fortran, provides flexible domain decompositions and high-level distributed constructs for easy translation of serial legacy code or design to distributed environments. Gradual tuning can subsequently be applied to obtain high performance, possibly by using explicit message passing. Charon also features general structured communications that support stencil-based computations with complex recurrences. Through the separation of partitioning and distribution, the toolkit can also be used for blocking of uni-processor code, and for debugging of parallel algorithms on serial machines. An elaborate review of recent parallelization aids is presented to highlight the need for a toolkit like Charon. Some performance results of parallelizing the NAS Parallel Benchmark SP program using Charon are given, showing good scalability. Some performance results of parallelizing the NAS Parallel Benchmark SP program using Charon are given, showing good scalability.

  6. Charon Message-Passing Toolkit for Scientific Computations

    NASA Technical Reports Server (NTRS)

    VanderWijngaart, Rob F.; Saini, Subhash (Technical Monitor)

    1998-01-01

    The Charon toolkit for piecemeal development of high-efficiency parallel programs for scientific computing is described. The portable toolkit, callable from C and Fortran, provides flexible domain decompositions and high-level distributed constructs for easy translation of serial legacy code or design to distributed environments. Gradual tuning can subsequently be applied to obtain high performance, possibly by using explicit message passing. Charon also features general structured communications that support stencil-based computations with complex recurrences. Through the separation of partitioning and distribution, the toolkit can also be used for blocking of uni-processor code, and for debugging of parallel algorithms on serial machines. An elaborate review of recent parallelization aids is presented to highlight the need for a toolkit like Charon. Some performance results of parallelizing the NAS Parallel Benchmark SP program using Charon are given, showing good scalability.

  7. Approximate message passing with restricted Boltzmann machine priors

    NASA Astrophysics Data System (ADS)

    Tramel, Eric W.; Drémeau, Angélique; Krzakala, Florent

    2016-07-01

    Approximate message passing (AMP) has been shown to be an excellent statistical approach to signal inference and compressed sensing problems. The AMP framework provides modularity in the choice of signal prior; here we propose a hierarchical form of the Gauss-Bernoulli prior which utilizes a restricted Boltzmann machine (RBM) trained on the signal support to push reconstruction performance beyond that of simple i.i.d. priors for signals whose support can be well represented by a trained binary RBM. We present and analyze two methods of RBM factorization and demonstrate how these affect signal reconstruction performance within our proposed algorithm. Finally, using the MNIST handwritten digit dataset, we show experimentally that using an RBM allows AMP to approach oracle-support performance.

  8. Development of Message Passing Routines for High Performance Parallel Computations

    NASA Technical Reports Server (NTRS)

    Summers, Edward K.

    2004-01-01

    Computational Fluid Dynamics (CFD) calculations require a great deal of computing power for completing the detailed computations involved. In an effort shorten the time it takes to complete such calculations they are implemented on a parallel computer. In the case of a parallel computer some sort of message passing structure must be used to communicate between the computers because, unlike a single machine, each computer in a parallel computing cluster does not have access to all the data or run all the parts of the total program. Thus, message passing is used to divide up the data and send instructions to each machine. The nature of my work this summer involves programming the "message passing" aspect of the parallel computer. I am working on modifying an existing program, which was written with OpenMP, and does not use a multi-machine parallel computing structure, to work with Message Passing Interface (MPI) routines. The actual code is being written in the FORTRAN 90 programming language. My goal is to write a parameterized message passing structure that could be used for a variety of individual applications and implement it on Silicon Graphics Incorporated s (SGI) IRIX operating system. With this new parameterized structure engineers would be able to speed up computations for a wide variety of purposes without having to use larger and more expensive computing equipment from another division or another NASA center.

  9. Passing messages between biological networks to refine predicted interactions.

    PubMed

    Glass, Kimberly; Huttenhower, Curtis; Quackenbush, John; Yuan, Guo-Cheng

    2013-01-01

    Regulatory network reconstruction is a fundamental problem in computational biology. There are significant limitations to such reconstruction using individual datasets, and increasingly people attempt to construct networks using multiple, independent datasets obtained from complementary sources, but methods for this integration are lacking. We developed PANDA (Passing Attributes between Networks for Data Assimilation), a message-passing model using multiple sources of information to predict regulatory relationships, and used it to integrate protein-protein interaction, gene expression, and sequence motif data to reconstruct genome-wide, condition-specific regulatory networks in yeast as a model. The resulting networks were not only more accurate than those produced using individual data sets and other existing methods, but they also captured information regarding specific biological mechanisms and pathways that were missed using other methodologies. PANDA is scalable to higher eukaryotes, applicable to specific tissue or cell type data and conceptually generalizable to include a variety of regulatory, interaction, expression, and other genome-scale data. An implementation of the PANDA algorithm is available at www.sourceforge.net/projects/panda-net.

  10. MPF: A portable message passing facility for shared memory multiprocessors

    NASA Technical Reports Server (NTRS)

    Malony, Allen D.; Reed, Daniel A.; Mcguire, Patrick J.

    1987-01-01

    The design, implementation, and performance evaluation of a message passing facility (MPF) for shared memory multiprocessors are presented. The MPF is based on a message passing model conceptually similar to conversations. Participants (parallel processors) can enter or leave a conversation at any time. The message passing primitives for this model are implemented as a portable library of C function calls. The MPF is currently operational on a Sequent Balance 21000, and several parallel applications were developed and tested. Several simple benchmark programs are presented to establish interprocess communication performance for common patterns of interprocess communication. Finally, performance figures are presented for two parallel applications, linear systems solution, and iterative solution of partial differential equations.

  11. Standards for message-passing in a distributed memory environment

    SciTech Connect

    Walker, D.W.

    1992-08-01

    This report presents a summary of the main ideas presented at the First CRPC Work-shop on Standards for Message Passing in a Distributed Memory Environment, held April 29-30, 1992, in Williamsburg, Virginia. This workshop attracted 68 attendees including representative from major hardware and software vendors, and was the first in a series of workshops sponsored by the Center for Research on Parallel Computation. The aim of this series of workshops is to develop and implement a standard for message passing on distributed memory concurrent computers, thereby making it easier to develop efficient, portable application codes for such machines. The report discusses the main issues raised in the CRPC workshop, and describes proposed desirable features of a message passing standard for distributed memory environments.

  12. Efficiently passing messages in distributed spiking neural network simulation.

    PubMed

    Thibeault, Corey M; Minkovich, Kirill; O'Brien, Michael J; Harris, Frederick C; Srinivasa, Narayan

    2013-01-01

    Efficiently passing spiking messages in a neural model is an important aspect of high-performance simulation. As the scale of networks has increased so has the size of the computing systems required to simulate them. In addition, the information exchange of these resources has become more of an impediment to performance. In this paper we explore spike message passing using different mechanisms provided by the Message Passing Interface (MPI). A specific implementation, MVAPICH, designed for high-performance clusters with Infiniband hardware is employed. The focus is on providing information about these mechanisms for users of commodity high-performance spiking simulators. In addition, a novel hybrid method for spike exchange was implemented and benchmarked.

  13. Physics/computer science. Passing messages between disciplines.

    PubMed

    Mézard, Marc

    2003-09-19

    Problems in computer science, such as error correction in information transfer and "satisfiability" in optimization, show phase transitions familiar from solid-state physics. In his Perspective, Mézard explains how recent advances in these three fields originate in similar "message passing" procedures. The exchange of elaborate messages between different variables and constraints, used in the study of phase transitions in physical systems, helps to make error correction and satisfiability codes more efficient.

  14. Extensible message passing application development and debugging with Python

    SciTech Connect

    Beazley, D.M.; Lomdahl, P.S.

    1996-09-19

    The authors describe how they have parallelized Python, an interpreted object oriented scripting language, and used it to build an extensible message-passing C/C++ applications for the CM-5, Cray T3D, and Sun multiprocessor servers running MPI. Using a parallelized Python interpreter, it is possible to interact with large-scale parallel applications, rapidly prototype new features, and perform application specific debugging. It is even possible to write message passing programs in Python itself. The authors describe some of the tools they have developed to extend Python and applications of this approach.

  15. Message passing in fault-tolerant quantum error correction

    NASA Astrophysics Data System (ADS)

    Evans, Zachary W. E.; Stephens, Ashley M.

    2008-12-01

    Inspired by Knill’s scheme for message passing error detection, here we develop a scheme for message passing error correction for the nine-qubit Bacon-Shor code. We show that for two levels of concatenated error correction, where classical information obtained at the first level is used to help interpret the syndrome at the second level, our scheme will correct all cases with four physical errors. This results in a reduction of the logical failure rate relative to conventional error correction by a factor proportional to the reciprocal of the physical error rate.

  16. Asynchronous Message Passing in the JPL Flight System Testbed

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott

    1996-01-01

    The flight mission simulation software in the Jet Propulsion Laboratory's Flight System Testbed (FST) is a heterogeneous, distributed system that is built on an interprocess communication model of asynchronous message passing rather than remote procedure calls (RPCs). The reasoning behind this design decision is discussed; the mechanism used to implement it (.

  17. Algorithms for TOC message transmission control

    NASA Astrophysics Data System (ADS)

    Wu, Hai-Tao; Zhang, Hui-Jun; Bian, Yu-Jing

    2001-12-01

    The algorithms and approach for TOC message broadcasting control are studied in this paper. The TOC message can be broadcasted, solely or alternating with DGNSS message, over one Loran-C channel. The availability of the messages in alternating broadcast mode is analyzed. The recurrence formulae of the sequence number of the header of the TOC message frames are given. The corresponding appraoch for braodcasting control is presented.

  18. Containing Epidemic Outbreaks by Message-Passing Techniques

    NASA Astrophysics Data System (ADS)

    Altarelli, F.; Braunstein, A.; Dall'Asta, L.; Wakeling, J. R.; Zecchina, R.

    2014-04-01

    The problem of targeted network immunization can be defined as the one of finding a subset of nodes in a network to immunize or vaccinate in order to minimize a tradeoff between the cost of vaccination and the final (stationary) expected infection under a given epidemic model. Although computing the expected infection is a hard computational problem, simple and efficient mean-field approximations have been put forward in the literature in recent years. The optimization problem can be recast into a constrained one in which the constraints enforce local mean-field equations describing the average stationary state of the epidemic process. For a wide class of epidemic models, including the susceptible-infected-removed and the susceptible-infected-susceptible models, we define a message-passing approach to network immunization that allows us to study the statistical properties of epidemic outbreaks in the presence of immunized nodes as well as to find (nearly) optimal immunization sets for a given choice of parameters and costs. The algorithm scales linearly with the size of the graph, and it can be made efficient even on large networks. We compare its performance with topologically based heuristics, greedy methods, and simulated annealing on both random graphs and real-world networks.

  19. Parallelized direct execution simulation of message-passing parallel programs

    NASA Technical Reports Server (NTRS)

    Dickens, Phillip M.; Heidelberger, Philip; Nicol, David M.

    1994-01-01

    As massively parallel computers proliferate, there is growing interest in findings ways by which performance of massively parallel codes can be efficiently predicted. This problem arises in diverse contexts such as parallelizing computers, parallel performance monitoring, and parallel algorithm development. In this paper we describe one solution where one directly executes the application code, but uses a discrete-event simulator to model details of the presumed parallel machine such as operating system and communication network behavior. Because this approach is computationally expensive, we are interested in its own parallelization specifically the parallelization of the discrete-event simulator. We describe methods suitable for parallelized direct execution simulation of message-passing parallel programs, and report on the performance of such a system, Large Application Parallel Simulation Environment (LAPSE), we have built on the Intel Paragon. On all codes measured to date, LAPSE predicts performance well typically within 10 percent relative error. Depending on the nature of the application code, we have observed low slowdowns (relative to natively executing code) and high relative speedups using up to 64 processors.

  20. Statistics of Epidemics in Networks by Passing Messages

    NASA Astrophysics Data System (ADS)

    Shrestha, Munik Kumar

    Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result

  1. A study of application sensitivity to variation in message passing latency and bandwidth

    SciTech Connect

    Worley, P.H.; Mackay, D.R.; Robinson, A.C.; Barragy, E.J.

    1996-06-01

    This study measures the effects of changes in message latency and bandwidth for production-level codes on a current generation tightly coupled MPP, the Intel Paragon. Messages are sent multiple times to study the application sensitivity to variations in band - width and latency. This method preserves the effects of contention on the interconnection network. Two applications are studied, PCTH, a shock physics code developed at Sandia National Laboratories, and PSTSWM, a spectral shallow water code developed at Oak Ridge National Laboratory and Argonne National Laboratory. These codes are significant in that PCTH is a {open_quote}full physics{close_quotes} application code in production use, while PSTSWM serves as a parallel algorithm test bed and benchmark for production codes used in atmospheric modeling. They are also significant in that the message-passing behavior differs significantly between the two codes, each representing an important class of scientific message-passing applications.

  2. Charon Message-Passing Toolkit for Scientific Computations

    NASA Technical Reports Server (NTRS)

    VanderWijngaart, Rob F.; Yan, Jerry (Technical Monitor)

    2000-01-01

    Charon is a library, callable from C and Fortran, that aids the conversion of structured-grid legacy codes-such as those used in the numerical computation of fluid flows-into parallel, high- performance codes. Key are functions that define distributed arrays, that map between distributed and non-distributed arrays, and that allow easy specification of common communications on structured grids. The library is based on the widely accepted MPI message passing standard. We present an overview of the functionality of Charon, and some representative results.

  3. The Edge-Disjoint Path Problem on Random Graphs by Message-Passing

    PubMed Central

    2015-01-01

    We present a message-passing algorithm to solve a series of edge-disjoint path problems on graphs based on the zero-temperature cavity equations. Edge-disjoint paths problems are important in the general context of routing, that can be defined by incorporating under a unique framework both traffic optimization and total path length minimization. The computation of the cavity equations can be performed efficiently by exploiting a mapping of a generalized edge-disjoint path problem on a star graph onto a weighted maximum matching problem. We perform extensive numerical simulations on random graphs of various types to test the performance both in terms of path length minimization and maximization of the number of accommodated paths. In addition, we test the performance on benchmark instances on various graphs by comparison with state-of-the-art algorithms and results found in the literature. Our message-passing algorithm always outperforms the others in terms of the number of accommodated paths when considering non trivial instances (otherwise it gives the same trivial results). Remarkably, the largest improvement in performance with respect to the other methods employed is found in the case of benchmarks with meshes, where the validity hypothesis behind message-passing is expected to worsen. In these cases, even though the exact message-passing equations do not converge, by introducing a reinforcement parameter to force convergence towards a sub optimal solution, we were able to always outperform the other algorithms with a peak of 27% performance improvement in terms of accommodated paths. On random graphs, we numerically observe two separated regimes: one in which all paths can be accommodated and one in which this is not possible. We also investigate the behavior of both the number of paths to be accommodated and their minimum total length. PMID:26710102

  4. Unsupervised feature learning from finite data by message passing: Discontinuous versus continuous phase transition

    NASA Astrophysics Data System (ADS)

    Huang, Haiping; Toyoizumi, Taro

    2016-12-01

    Unsupervised neural network learning extracts hidden features from unlabeled training data. This is used as a pretraining step for further supervised learning in deep networks. Hence, understanding unsupervised learning is of fundamental importance. Here, we study the unsupervised learning from a finite number of data, based on the restricted Boltzmann machine where only one hidden neuron is considered. Our study inspires an efficient message-passing algorithm to infer the hidden feature and estimate the entropy of candidate features consistent with the data. Our analysis reveals that the learning requires only a few data if the feature is salient and extensively many if the feature is weak. Moreover, the entropy of candidate features monotonically decreases with data size and becomes negative (i.e., entropy crisis) before the message passing becomes unstable, suggesting a discontinuous phase transition. In terms of convergence time of the message-passing algorithm, the unsupervised learning exhibits an easy-hard-easy phenomenon as the training data size increases. All these properties are reproduced in an approximate Hopfield model, with an exception that the entropy crisis is absent, and only continuous phase transition is observed. This key difference is also confirmed in a handwritten digits dataset. This study deepens our understanding of unsupervised learning from a finite number of data and may provide insights into its role in training deep networks.

  5. A message passing kernel for the hypercluster parallel processing test bed

    NASA Technical Reports Server (NTRS)

    Blech, Richard A.; Quealy, Angela; Cole, Gary L.

    1989-01-01

    A Message-Passing Kernel (MPK) for the Hypercluster parallel-processing test bed is described. The Hypercluster is being developed at the NASA Lewis Research Center to support investigations of parallel algorithms and architectures for computational fluid and structural mechanics applications. The Hypercluster resembles the hypercube architecture except that each node consists of multiple processors communicating through shared memory. The MPK efficiently routes information through the Hypercluster, using a message-passing protocol when necessary and faster shared-memory communication whenever possible. The MPK also interfaces all of the processors with the Hypercluster operating system (HYCLOPS), which runs on a Front-End Processor (FEP). This approach distributes many of the I/O tasks to the Hypercluster processors and eliminates the need for a separate I/O support program on the FEP.

  6. Parallelization of a hydrological model using the message passing interface

    USGS Publications Warehouse

    Wu, Yiping; Li, Tiejian; Sun, Liqun; Chen, Ji

    2013-01-01

    With the increasing knowledge about the natural processes, hydrological models such as the Soil and Water Assessment Tool (SWAT) are becoming larger and more complex with increasing computation time. Additionally, other procedures such as model calibration, which may require thousands of model iterations, can increase running time and thus further reduce rapid modeling and analysis. Using the widely-applied SWAT as an example, this study demonstrates how to parallelize a serial hydrological model in a Windows® environment using a parallel programing technology—Message Passing Interface (MPI). With a case study, we derived the optimal values for the two parameters (the number of processes and the corresponding percentage of work to be distributed to the master process) of the parallel SWAT (P-SWAT) on an ordinary personal computer and a work station. Our study indicates that model execution time can be reduced by 42%–70% (or a speedup of 1.74–3.36) using multiple processes (two to five) with a proper task-distribution scheme (between the master and slave processes). Although the computation time cost becomes lower with an increasing number of processes (from two to five), this enhancement becomes less due to the accompanied increase in demand for message passing procedures between the master and all slave processes. Our case study demonstrates that the P-SWAT with a five-process run may reach the maximum speedup, and the performance can be quite stable (fairly independent of a project size). Overall, the P-SWAT can help reduce the computation time substantially for an individual model run, manual and automatic calibration procedures, and optimization of best management practices. In particular, the parallelization method we used and the scheme for deriving the optimal parameters in this study can be valuable and easily applied to other hydrological or environmental models.

  7. A Fine-Grain, Message-Passing Processing Node,

    DTIC Science & Technology

    1987-11-01

    is 2Ons. Wormhole routing (71 [8] [19] is used to give an idle-network latency of 201)+80L ns, where D is the distance in channels and L is the message...The NDFs deliver a message using wormhole routing. Buffering com- presses the message when blockage occurs. to (4,2) is in use). The tail of the message

  8. Message Passing vs. Shared Address Space on a Cluster of SMPs

    NASA Technical Reports Server (NTRS)

    Shan, Hongzhang; Singh, Jaswinder Pal; Oliker, Leonid; Biswas, Rupak

    2000-01-01

    The convergence of scalable computer architectures using clusters of PCs (or PC-SMPs) with commodity networking has become an attractive platform for high end scientific computing. Currently, message-passing and shared address space (SAS) are the two leading programming paradigms for these systems. Message-passing has been standardized with MPI, and is the most common and mature programming approach. However message-passing code development can be extremely difficult, especially for irregular structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality, and high protocol overhead. In this paper, we compare the performance of and programming effort, required for six applications under both programming models on a 32 CPU PC-SMP cluster. Our application suite consists of codes that typically do not exhibit high efficiency under shared memory programming. due to their high communication to computation ratios and complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of our applications: however, on certain classes of problems SAS performance is competitive with MPI. We also present new algorithms for improving the PC cluster performance of MPI collective operations.

  9. Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Wang, Yi-Min

    1993-01-01

    Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.

  10. Intel NX to PVM 3.2 message passing conversion library

    NASA Technical Reports Server (NTRS)

    Arthur, Trey; Nelson, Michael L.

    1993-01-01

    NASA Langley Research Center has developed a library that allows Intel NX message passing codes to be executed under the more popular and widely supported Parallel Virtual Machine (PVM) message passing library. PVM was developed at Oak Ridge National Labs and has become the defacto standard for message passing. This library will allow the many programs that were developed on the Intel iPSC/860 or Intel Paragon in a Single Program Multiple Data (SPMD) design to be ported to the numerous architectures that PVM (version 3.2) supports. Also, the library adds global operations capability to PVM. A familiarity with Intel NX and PVM message passing is assumed.

  11. Characterizing Computation-Communication Overlap in Message-Passing Systems

    SciTech Connect

    David E. Bernholdt; Jarek Nieplocha; P. Sadayappan; Aniruddha G. Shet; Vinod Tipparaju

    2008-01-31

    Effective overlap of computation and communication is a well understood technique for latency hiding and can yield significant performance gains for applications on high-end computers. In this report, we describe an instrumentation framework developed for message-passing systems to characterize the degree of overlap of communication with computation in the execution of parallel applications. The inability to obtain precise time-stamps for pertinent communication events is a significant problem, and is addressed by generation of minimum and maximum bounds on achieved overlap. The overlap measures can aid application developers and system designers in investigating scalability issues. The approach has been used to instrument two MPI implementations as well as the ARMCI system. The implementation resides entirely within the communication library and thus integrates well with existing approaches that operate outside the library. The utility of the framework is demonstrated by analyzing communication-computation overlap for micro-benchmarks and the NAS benchmarks, and the insights obtained are used to modify the NAS SP benchmark, resulting in improved overlap.

  12. Automated Performance Prediction of Message Passing Parallel Programs

    NASA Technical Reports Server (NTRS)

    Block, Robert J.; Mehra, Pankaj; Sarukkai, Sekhar; Woodrow, Thomas (Technical Monitor)

    1994-01-01

    As the trend toward massively parallel processing continues, the need for tools that can predict scalability trends becomes greater. While high level languages Eke HPF have come into greater use, explicit message-passing programs proliferate, and will probably do so for some time, thanks to the onslaught of standards such as MPI. Much work has been done to create simple models that represent important characteristics of parallel programs, such as latency, network contention, and communication volume. But many of these methods still require a substantial manual effort to represent an application in the model's format. The YAPP ("Yet Another Performance Predictor") tool is an attempt to automate the formation of first-order expressions for completion time, with a minimum of programmer assistance. The content of this paper is as follows: First, we explore the implementation details of YAPP, and illustrate with examples some of the reasons that automatic prediction is difficult. In the following sections, we present the results of four applications, using execution traces on the Intel i860, analyze the error in YAPP's predictions, explain the limitations of our implementation, and mention possible future additions. In particular, we illustrate techniques used to identify pipeline communication patterns, and demonstrate how compiler analysis and regression are combined to automate the prediction process.

  13. A proposal for a user-level, message passing interface in a distributed memory environment

    SciTech Connect

    Dongarra, J.J. . Dept. of Computer Science Oak Ridge National Lab., TN ); Hempel, R. ); Hey, A.J.G. . Dept. of Electronics and Computer Science); Walker, D.W. )

    1993-02-01

    This paper describes Message Passing Interface 1 (MPI1), a proposed library interface standard for supporting point-to-point message passing. The intended standard will be provided with Fortran 77 and C interfaces, and will form the basis of a standard high level communication environment featuring collective communication and data distribution transformations. The standard proposed here provides blocking, nonblocking, and synchronized message passing between pairs of processes, with message selectivity by source process and message type. Provision is made for noncontiguous messages. Context control provides a convenient means of avoiding message selectivity conflicts between different phases of an application. The ability to form and manipulate process groups permits task parallelism to be exploited, and is a useful abstraction in controlling certain types of collective communication.

  14. ERIK: An Expert Ship Message Interpreter New Mechanisms For Flexible Passing

    NASA Astrophysics Data System (ADS)

    Rosenberg, J.

    1985-04-01

    ERIK (Evaluating Reports using Integrated Knowledge) is a working system that was developed for the U.S. Coast Guard to parse ship messages. ERIK is capable of parsing at an impressive rate of 1000 to 2000 messages per day, sent from merchant vessels in all parts of the world. Since these reports contain vital information it is important that the system can parse and correct them quickly and accurately, and furthermore know when it has failed to do so. This paper will focus on the following three algorithms: The IntaaLatad spaliaL/ReqQanizeL integrates the tasks of recognizing items on the input stream and spelling correction. Traditionally these tasks were separated, with items that could not be recognized passed on to a separate speller. We will describe the process that allows fast expectation-based spelling correction and recognition in one unit. The InteLRLatara is a general control structure that allows parsing of the various fields even when the reports fail to follow a fixed format, contains various types of ambiguities (both structurely and conceptually) and can handle the intrusion of noisy and irrelevant information. Changing Contaxta without laking has the ability to recover from wrong assumptions due to erroneous information and correct the previously parsed structures without the need to reparse what has already been processed. These three algorithms provided the core of the ERIK system allowing it to accurately parse and correct ship messages with confidence in a real time, real world situation.

  15. Mean-field message-passing equations in the Hopfield model and its generalizations

    NASA Astrophysics Data System (ADS)

    Mézard, Marc

    2017-02-01

    Motivated by recent progress in using restricted Boltzmann machines as preprocessing algorithms for deep neural network, we revisit the mean-field equations [belief-propagation and Thouless-Anderson Palmer (TAP) equations] in the best understood of such machines, namely the Hopfield model of neural networks, and we explicit how they can be used as iterative message-passing algorithms, providing a fast method to compute the local polarizations of neurons. In the "retrieval phase", where neurons polarize in the direction of one memorized pattern, we point out a major difference between the belief propagation and TAP equations: The set of belief propagation equations depends on the pattern which is retrieved, while one can use a unique set of TAP equations. This makes the latter method much better suited for applications in the learning process of restricted Boltzmann machines. In the case where the patterns memorized in the Hopfield model are not independent, but are correlated through a combinatorial structure, we show that the TAP equations have to be modified. This modification can be seen either as an alteration of the reaction term in TAP equations or, more interestingly, as the consequence of message passing on a graphical model with several hidden layers, where the number of hidden layers depends on the depth of the correlations in the memorized patterns. This layered structure is actually necessary when one deals with more general restricted Boltzmann machines.

  16. High-level message-passing constructs for Zipcode 1.0: Design and implementation

    SciTech Connect

    Smith, S.G.; Falgout, R.D.; Still, C.H.; Skjellum, A.

    1993-10-01

    Zipcode is a message passing system that was initially designed for multicomputers and homogeneous networks of computers. This paper describes Zipcode ``invoices,`` which raise the message-passing interface of Zipcode to a higher level of abstraction. The ``gather-send`` and ``receive-scatter`` semantics enable heterogeneous communication. The higher level of abstraction also simplifies message passing and reveals more optimizations. We explain the utility of these features and give examples of the calling sequences that implement them. All of these features are seen as enablers for parallel library development and large applications.

  17. MICA, a facility to achieve portability for message-passing and dynamic memory management in FORTRAN

    SciTech Connect

    Brown, J.C.; Mirin, A.A.

    1994-01-01

    MICA, which stands for Macro Interface for Communication and Allocation, is a macro facility for message passing and dynamic memory management for Fortran programs on Unix platforms. A combination of CPP and M4 preprocessing is used to provide the macro interface. CPP is used for conditional compilation according to machine architecture and selected memory management and message passing options. M4 is used for translating the macro calls into the appropriate Fortran code sequences. Several supporting Fortran subprograms are included.

  18. Verification of Faulty Message Passing Systems with Continuous State Space in PVS

    NASA Technical Reports Server (NTRS)

    Pilotto, Concetta; White, Jerome

    2010-01-01

    We present a library of Prototype Verification System (PVS) meta-theories that verifies a class of distributed systems in which agent commu nication is through message-passing. The theoretic work, outlined in, consists of iterative schemes for solving systems of linear equations , such as message-passing extensions of the Gauss and Gauss-Seidel me thods. We briefly review that work and discuss the challenges in formally verifying it.

  19. Message passing for integrating and assessing renewable generation in a redundant power grid

    SciTech Connect

    Zdeborova, Lenka; Backhaus, Scott; Chertkov, Michael

    2009-01-01

    A simplified model of a redundant power grid is used to study integration of fluctuating renewable generation. The grid consists of large number of generator and consumer nodes. The net power consumption is determined by the difference between the gross consumption and the level of renewable generation. The gross consumption is drawn from a narrow distribution representing the predictability of aggregated loads, and we consider two different distributions representing wind and solar resources. Each generator is connected to D consumers, and redundancy is built in by connecting R {le} D of these consumers to other generators. The lines are switchable so that at any instance each consumer is connected to a single generator. We explore the capacity of the renewable generation by determining the level of 'firm' generation capacity that can be displaced for different levels of redundancy R. We also develop message-passing control algorithm for finding switch sellings where no generator is overloaded.

  20. Incremental Parallelization of Non-Data-Parallel Programs Using the Charon Message-Passing Library

    NASA Technical Reports Server (NTRS)

    VanderWijngaart, Rob F.

    2000-01-01

    , gather/scatter, and redistribution. At the end of the conversion process most intermediate Charon function calls will have been removed, the non-distributed arrays will have been deleted, and virtually the only remaining Charon functions calls are the high-level, highly optimized communications. Distribution of the data is under complete control of the programmer, although a wide range of useful distributions is easily available through predefined functions. A crucial aspect of the library is that it does not allocate space for distributed arrays, but accepts programmer-specified memory. This has two major consequences. First, codes parallelized using Charon do not suffer from encapsulation; user data is always directly accessible. This provides high efficiency, and also retains the possibility of using message passing directly for highly irregular communications. Second, non-distributed arrays can be interpreted as (trivial) distributions in the Charon sense, which allows them to be mapped to truly distributed arrays, and vice versa. This is the mechanism that enables incremental parallelization. In this paper we provide a brief introduction of the library and then focus on the actual steps in the parallelization process, using some representative examples from, among others, the NAS Parallel Benchmarks. We show how a complicated two-dimensional pipeline-the prototypical non-data-parallel algorithm- can be constructed with ease. To demonstrate the flexibility of the library, we give examples of the stepwise, efficient parallel implementation of nonlocal boundary conditions common in aircraft simulations, as well as the construction of the sequence of grids required for multigrid.

  1. A test implementation of the MPI draft message-passing standard

    SciTech Connect

    Gropp, W.; Lusk, E.

    1992-12-01

    Message passing is a common method for programming parallel computers. The lack of a standard has significantly impeded the development of portable software libraries for these machines. Recently, an ad-hoc committee was formed to develop a standard for message-passing software for parallel computers. This group first met in April 1992 at a workshop sponsored in part by the Center for Research on Parallel Computation (CRPC). Four of the attendees at that meeting produced a draft standard, henceforth referred to as the MPI (Message-Passing Interface) draft standard. After review by a larger group, and significant changes in the document, a meeting was held in November to discuss the MPI draft standard. This document is a result of those discussions; it describes a running implementation of in most of the proposed standard,plus additional routines that were suggested by the discussions at the November meeting.

  2. Optimizing spread dynamics on graphs by message passing

    NASA Astrophysics Data System (ADS)

    Altarelli, F.; Braunstein, A.; Dall'Asta, L.; Zecchina, R.

    2013-09-01

    Cascade processes are responsible for many important phenomena in natural and social sciences. Simple models of irreversible dynamics on graphs, in which nodes activate depending on the state of their neighbors, have been successfully applied to describe cascades in a large variety of contexts. Over the past decades, much effort has been devoted to understanding the typical behavior of the cascades arising from initial conditions extracted at random from some given ensemble. However, the problem of optimizing the trajectory of the system, i.e. of identifying appropriate initial conditions to maximize (or minimize) the final number of active nodes, is still considered to be practically intractable, with the only exception being models that satisfy a sort of diminishing returns property called submodularity. Submodular models can be approximately solved by means of greedy strategies, but by definition they lack cooperative characteristics which are fundamental in many real systems. Here we introduce an efficient algorithm based on statistical physics for the optimization of trajectories in cascade processes on graphs. We show that for a wide class of irreversible dynamics, even in the absence of submodularity, the spread optimization problem can be solved efficiently on large networks. Analytic and algorithmic results on random graphs are complemented by the solution of the spread maximization problem on a real-world network (the Epinions consumer reviews network).

  3. Some Aspects of Parallel Implementation of the Finite Element Method on Message Passing Architectures

    DTIC Science & Technology

    1988-05-01

    Method on Message Passing Architecturest I. Babuvka Department of Mathematics and 4 Institute for Physical Science and Technology S H. C. Elman Institute ...for Advanced Computer Studies and Department of Computer Science University of Maryland College Park, MD 20742 4, ABSTRACT We discuss some aspects of...ORGANIZATION NAME AND ADDRESS 10. PRO0GRAM ELEMENT. PROJECT. TASKC Depart. of Math and 21nst. for Advanced AE OKUI UBR Institute for Physical Science

  4. The design of a standard message passing interface for distributed memory concurrent computers

    SciTech Connect

    Walker, D.W.

    1993-10-01

    This paper presents an overview of MPI, a proposed standard message passing interface for MIMD distributed memory concurrent computers. The design of MPI has been a collective effort involving researchers in the United States and Europe from many organizations and institutions. MPI includes point-to-point and collective communication routines, as well as support for process groups, communication contexts, and application topologies. While making use of new ideas where appropriate, the MPI standard is based largely on current practice.

  5. Cloud Middleware Combining the Functionalities of Message Passing and Scaling Control

    NASA Astrophysics Data System (ADS)

    Iakushkin, O.

    2016-02-01

    The paper is focused on a solution providing middleware control over both message passing and scaling in a cloud environment. We provide a detailed analysis of the issue and present the restrictions particular to the load-balancing and communications systems. We also justify the need of such middleware development for a cloud infrastructure. The paper describes the problems emerged while working on a concrete project and presents the results obtained so far.

  6. Probabilistic Algorithm for Sampler Siting (PASS)

    SciTech Connect

    Lorenzetti, David M.; Sohn, Michael D.

    2007-05-29

    PASS (Probabilistic Approach to Sampler Siting) optimizes the placement of samplers in buildings. The program exhaustively checks every sampler-network that can be formed, evaluating against user-supplied simulations of the possible release scenarios. The program identifies the networks that maximize the probablity of detecting a release from among the suite of user-supllied scenarios. The user may specify how many networks to report, in order to provide a number of choices in cases where many networks have very similar behavior.

  7. The Portals 3.0 Message Passing Interface Revision 1.0

    SciTech Connect

    BRIGHTWELL,RONALD B.; HUDSON,TRAMMELL B.; RIESEN,ROLF E.; MACCABE,ARTHUR B.

    1999-12-01

    This report presents a specification for the Portals 3.0 message passing interface. Portals 3.0 is intended to allow scalable, high-performance network communication between nodes of a parallel computing system. Specifically, it is designed to support a parallel computing platform composed of clusters of commodity workstations connected by a commodity system area network fabric. In addition, Portals 3.0 is well suited to massively parallel processing and embedded systems. Portals 3.0 represents an adoption of the data movement layer developed for massively parallel processing platforms, such as the 4500-node Intel TeraFLOPS machine.

  8. Comparative Study of Message Passing and Shared Memory Parallel Programming Models in Neural Network Training

    SciTech Connect

    Vitela, J.; Gordillo, J.; Cortina, L; Hanebutte, U.

    1999-12-14

    It is presented a comparative performance study of a coarse grained parallel neural network training code, implemented in both OpenMP and MPI, standards for shared memory and message passing parallel programming environments, respectively. In addition, these versions of the parallel training code are compared to an implementation utilizing SHMEM the native SGI/CRAY environment for shared memory programming. The multiprocessor platform used is a SGI/Cray Origin 2000 with up to 32 processors. It is shown that in this study, the native CRAY environment outperforms MPI for the entire range of processors used, while OpenMP shows better performance than the other two environments when using more than 19 processors. In this study, the efficiency is always greater than 60% regardless of the parallel programming environment used as well as of the number of processors.

  9. A grid-enabled MPI : message passing in heterogeneous distributed computing systems.

    SciTech Connect

    Foster, I.; Karonis, N. T.

    2000-11-30

    Application development for high-performance distributed computing systems, or computational grids as they are sometimes called, requires grid-enabled tools that hide mundate aspects of the heterogeneous grid environment without compromising performance. As part of an investigation of these issues, they have developed MPICH-G, a grid-enabled implementation of the Message Passing Interface (MPI) that allows a user to run MPI programs across multiple computers at different sites using the same commands that would be used on a parallel computer. This library extends the Argonne MPICH implementation of MPI to use services provided by the globus grid toolkit. In this paper, they describe the MPICH-G implementation and present preliminary performance results.

  10. Multi-partitioning for ADI-schemes on message passing architectures

    NASA Technical Reports Server (NTRS)

    Vanderwijngaart, Rob F.

    1994-01-01

    A kind of discrete-operator splitting called Alternating Direction Implicit (ADI) has been found to be useful in simulating fluid flow problems. In particular, it is being used to study the effects of hot exhaust jets from high performance aircraft on landing surfaces. Decomposition techniques that minimize load imbalance and message-passing frequency are described. Three strategies that are investigated for implementing the NAS Scalar Penta-diagonal Parallel Benchmark (SP) are transposition, pipelined Gaussian elimination, and multipartitioning. The multipartitioning strategy, which was used on Ethernet, was found to be the most efficient, although it was considered only a moderate success because of Ethernet's limited communication properties. The efficiency derived largely from the coarse granularity of the strategy, which reduced latencies and allowed overlap of communication and computation.

  11. Parallelization of the TRIGRS model for rainfall-induced landslides using the message passing interface

    USGS Publications Warehouse

    Alvioli, M.; Baum, R.L.

    2016-01-01

    We describe a parallel implementation of TRIGRS, the Transient Rainfall Infiltration and Grid-Based Regional Slope-Stability Model for the timing and distribution of rainfall-induced shallow landslides. We have parallelized the four time-demanding execution modes of TRIGRS, namely both the saturated and unsaturated model with finite and infinite soil depth options, within the Message Passing Interface framework. In addition to new features of the code, we outline details of the parallel implementation and show the performance gain with respect to the serial code. Results are obtained both on commercial hardware and on a high-performance multi-node machine, showing the different limits of applicability of the new code. We also discuss the implications for the application of the model on large-scale areas and as a tool for real-time landslide hazard monitoring.

  12. Formal verification of an oral messages algorithm for interactive consistency

    NASA Technical Reports Server (NTRS)

    Rushby, John

    1992-01-01

    The formal specification and verification of an algorithm for Interactive Consistency based on the Oral Messages algorithm for Byzantine Agreement is described. We compare our treatment with that of Bevier and Young, who presented a formal specification and verification for a very similar algorithm. Unlike Bevier and Young, who observed that 'the invariant maintained in the recursive subcases of the algorithm is significantly more complicated than is suggested by the published proof' and who found its formal verification 'a fairly difficult exercise in mechanical theorem proving,' our treatment is very close to the previously published analysis of the algorithm, and our formal specification and verification are straightforward. This example illustrates how delicate choices in the formulation of the problem can have significant impact on the readability of its formal specification and on the tractability of its formal verification.

  13. Single-Pass Clustering Algorithm Based on Storm

    NASA Astrophysics Data System (ADS)

    Fang, LI; Longlong, DAI; Zhiying, JIANG; Shunzi, LI

    2017-02-01

    The dramatically increasing volume of data makes the computational complexity of traditional clustering algorithm rise rapidly accordingly, which leads to the longer time. So as to improve the efficiency of the stream data clustering, a distributed real-time clustering algorithm (S-Single-Pass) based on the classic Single-Pass [1] algorithm and Storm [2] computation framework was designed in this paper. By employing this kind of method in the Topic Detection and Tracking (TDT) [3], the real-time performance of topic detection arises effectively. The proposed method splits the clustering process into two parts: one part is to form clusters for the multi-thread parallel clustering, the other part is to merge the generated clusters in the previous process and update the global clusters. Through the experimental results, the conclusion can be drawn that the proposed method have the nearly same clustering accuracy as the traditional Single-Pass algorithm and the clustering accuracy remains steady, computing rate increases linearly when increasing the number of cluster machines and nodes (processing threads).

  14. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    PubMed Central

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  15. Supporting the Development of Soft-Error Resilient Message Passing Applications using Simulation

    SciTech Connect

    Engelmann, Christian; Naughton III, Thomas J

    2016-01-01

    Radiation-induced bit flip faults are of particular concern in extreme-scale high-performance computing systems. This paper presents a simulation-based tool that enables the development of soft-error resilient message passing applications by permitting the investigation of their correctness and performance under various fault conditions. The documented extensions to the Extreme-scale Simulator (xSim) enable the injection of bit flip faults at specific of injection location(s) and fault activation time(s), while supporting a significant degree of configurability of the fault type. Experiments show that the simulation overhead with the new feature is ~2,325% for serial execution and ~1,730% at 128 MPI processes, both with very fine-grain fault injection. Fault injection experiments demonstrate the usefulness of the new feature by injecting bit flips in the input and output matrices of a matrix-matrix multiply application, revealing vulnerability of data structures, masking and error propagation. xSim is the very first simulation-based MPI performance tool that supports both, the injection of process failures and bit flip faults.

  16. Message Passing and Shared Address Space Parallelism on an SMP Cluster

    NASA Technical Reports Server (NTRS)

    Shan, Hongzhang; Singh, Jaswinder P.; Oliker, Leonid; Biswas, Rupak; Biegel, Bryan (Technical Monitor)

    2002-01-01

    Currently, message passing (MP) and shared address space (SAS) are the two leading parallel programming paradigms. MP has been standardized with MPI, and is the more common and mature approach; however, code development can be extremely difficult, especially for irregularly structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality and high protocol overhead. In this paper, we compare the performance of and the programming effort required for six applications under both programming models on a 32-processor PC-SMP cluster, a platform that is becoming increasingly attractive for high-end scientific computing. Our application suite consists of codes that typically do not exhibit scalable performance under shared-memory programming due to their high communication-to-computation ratios and/or complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of our applications, while being competitive for the others. A hybrid MPI+SAS strategy shows only a small performance advantage over pure MPI in some cases. Finally, improved implementations of two MPI collective operations on PC-SMP clusters are presented.

  17. Monitoring Data-Structure Evolution in Distributed Message-Passing Programs

    NASA Technical Reports Server (NTRS)

    Sarukkai, Sekhar R.; Beers, Andrew; Woodrow, Thomas S. (Technical Monitor)

    1996-01-01

    Monitoring the evolution of data structures in parallel and distributed programs, is critical for debugging its semantics and performance. However, the current state-of-art in tracking and presenting data-structure information on parallel and distributed environments is cumbersome and does not scale. In this paper we present a methodology that automatically tracks memory bindings (not the actual contents) of static and dynamic data-structures of message-passing C programs, using PVM. With the help of a number of examples we show that in addition to determining the impact of memory allocation overheads on program performance, graphical views can help in debugging the semantics of program execution. Scalable animations of virtual address bindings of source-level data-structures are used for debugging the semantics of parallel programs across all processors. In conjunction with light-weight core-files, this technique can be used to complement traditional debuggers on single processors. Detailed information (such as data-structure contents), on specific nodes, can be determined using traditional debuggers after the data structure evolution leading to the semantic error is observed graphically.

  18. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    PubMed

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  19. Two-Dimensional Pattern-Coupled Sparse Bayesian Learning via Generalized Approximate Message Passing.

    PubMed

    Fang, Jun; Zhang, Lizao; Li, Hohgbin

    2016-04-20

    We consider the problem of recovering twodimensional (2-D) block-sparse signals with unknown cluster patterns. Two-dimensional block-sparse patterns arise naturally in many practical applications such as foreground detection and inverse synthetic aperture radar imaging. To exploit the underlying block-sparse structure, we propose a 2-D pattern-coupled hierarchical Gaussian prior model. The proposed pattern-coupled hierarchical Gaussian prior model imposes a soft coupling mechanism among neighboring coefficients through their shared hyperparameters. This coupling mechanism enables effective and automatic learning of the underlying irregular cluster patterns, without requiring any a priori knowledge of the block partition of sparse signals. We develop a computationally efficient Bayesian inference method which integrates the generalized approximate message passing (GAMP) technique with the proposed prior model. Simulation results show that the proposed method offers competitive recovery performance for a range of 2-D sparse signal recovery and image processing applications over existing method, meanwhile achieving a significant reduction in computational complexity.

  20. Message-passing-interface-based parallel FDTD investigation on the EM scattering from a 1-D rough sea surface using uniaxial perfectly matched layer absorbing boundary.

    PubMed

    Li, J; Guo, L-X; Zeng, H; Han, X-B

    2009-06-01

    A message-passing-interface (MPI)-based parallel finite-difference time-domain (FDTD) algorithm for the electromagnetic scattering from a 1-D randomly rough sea surface is presented. The uniaxial perfectly matched layer (UPML) medium is adopted for truncation of FDTD lattices, in which the finite-difference equations can be used for the total computation domain by properly choosing the uniaxial parameters. This makes the parallel FDTD algorithm easier to implement. The parallel performance with different processors is illustrated for one sea surface realization, and the computation time of the parallel FDTD algorithm is dramatically reduced compared to a single-process implementation. Finally, some numerical results are shown, including the backscattering characteristics of sea surface for different polarization and the bistatic scattering from a sea surface with large incident angle and large wind speed.

  1. Implementation of a Message Passing Interface into a Cloud-Resolving Model for Massively Parallel Computing

    NASA Technical Reports Server (NTRS)

    Juang, Hann-Ming Henry; Tao, Wei-Kuo; Zeng, Xi-Ping; Shie, Chung-Lin; Simpson, Joanne; Lang, Steve

    2004-01-01

    The capability for massively parallel programming (MPP) using a message passing interface (MPI) has been implemented into a three-dimensional version of the Goddard Cumulus Ensemble (GCE) model. The design for the MPP with MPI uses the concept of maintaining similar code structure between the whole domain as well as the portions after decomposition. Hence the model follows the same integration for single and multiple tasks (CPUs). Also, it provides for minimal changes to the original code, so it is easily modified and/or managed by the model developers and users who have little knowledge of MPP. The entire model domain could be sliced into one- or two-dimensional decomposition with a halo regime, which is overlaid on partial domains. The halo regime requires that no data be fetched across tasks during the computational stage, but it must be updated before the next computational stage through data exchange via MPI. For reproducible purposes, transposing data among tasks is required for spectral transform (Fast Fourier Transform, FFT), which is used in the anelastic version of the model for solving the pressure equation. The performance of the MPI-implemented codes (i.e., the compressible and anelastic versions) was tested on three different computing platforms. The major results are: 1) both versions have speedups of about 99% up to 256 tasks but not for 512 tasks; 2) the anelastic version has better speedup and efficiency because it requires more computations than that of the compressible version; 3) equal or approximately-equal numbers of slices between the x- and y- directions provide the fastest integration due to fewer data exchanges; and 4) one-dimensional slices in the x-direction result in the slowest integration due to the need for more memory relocation for computation.

  2. Efficient Tracing for On-the-Fly Space-Time Displays in a Debugger for Message Passing Programs

    NASA Technical Reports Server (NTRS)

    Hood, Robert; Matthews, Gregory

    2001-01-01

    In this work we describe the implementation of a practical mechanism for collecting and displaying trace information in a debugger for message passing programs. We introduce a trace format that is highly compressible while still providing information adequate for debugging purposes. We make the mechanism convenient for users to access by incorporating the trace collection in a set of wrappers for the MPI (message passing interface) communication library. We implement several debugger operations that use the trace display: consistent stoplines, undo, and rollback. They all are implemented using controlled replay, which executes at full speed in target processes until the appropriate position in the computation is reached. They provide convenient mechanisms for getting to places in the execution where the full power of a state-based debugger can be brought to bear on isolating communication errors.

  3. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response

    PubMed Central

    Sutton, Jeannette; Gibson, C. Ben; Spiro, Emma S.; League, Cedar; Fitzhugh, Sean M.; Butts, Carter T.

    2015-01-01

    Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not) perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials’ Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events. PMID:26295584

  4. A new deadlock resolution protocol and message matching algorithm for the extreme-scale simulator

    DOE PAGES

    Engelmann, Christian; Naughton, III, Thomas J.

    2016-03-22

    Investigating the performance of parallel applications at scale on future high-performance computing (HPC) architectures and the performance impact of different HPC architecture choices is an important component of HPC hardware/software co-design. The Extreme-scale Simulator (xSim) is a simulation toolkit for investigating the performance of parallel applications at scale. xSim scales to millions of simulated Message Passing Interface (MPI) processes. The overhead introduced by a simulation tool is an important performance and productivity aspect. This paper documents two improvements to xSim: (1)~a new deadlock resolution protocol to reduce the parallel discrete event simulation overhead and (2)~a new simulated MPI message matchingmore » algorithm to reduce the oversubscription management overhead. The results clearly show a significant performance improvement. The simulation overhead for running the NAS Parallel Benchmark suite was reduced from 102% to 0% for the embarrassingly parallel (EP) benchmark and from 1,020% to 238% for the conjugate gradient (CG) benchmark. xSim offers a highly accurate simulation mode for better tracking of injected MPI process failures. Furthermore, with highly accurate simulation, the overhead was reduced from 3,332% to 204% for EP and from 37,511% to 13,808% for CG.« less

  5. A new deadlock resolution protocol and message matching algorithm for the extreme-scale simulator

    SciTech Connect

    Engelmann, Christian; Naughton, III, Thomas J.

    2016-03-22

    Investigating the performance of parallel applications at scale on future high-performance computing (HPC) architectures and the performance impact of different HPC architecture choices is an important component of HPC hardware/software co-design. The Extreme-scale Simulator (xSim) is a simulation toolkit for investigating the performance of parallel applications at scale. xSim scales to millions of simulated Message Passing Interface (MPI) processes. The overhead introduced by a simulation tool is an important performance and productivity aspect. This paper documents two improvements to xSim: (1)~a new deadlock resolution protocol to reduce the parallel discrete event simulation overhead and (2)~a new simulated MPI message matching algorithm to reduce the oversubscription management overhead. The results clearly show a significant performance improvement. The simulation overhead for running the NAS Parallel Benchmark suite was reduced from 102% to 0% for the embarrassingly parallel (EP) benchmark and from 1,020% to 238% for the conjugate gradient (CG) benchmark. xSim offers a highly accurate simulation mode for better tracking of injected MPI process failures. Furthermore, with highly accurate simulation, the overhead was reduced from 3,332% to 204% for EP and from 37,511% to 13,808% for CG.

  6. The development and performance of a message-passing version of the PAGOSA shock-wave physics code

    SciTech Connect

    Gardner, D.R.; Vaughan, C.T.

    1997-10-01

    A message-passing version of the PAGOSA shock-wave physics code has been developed at Sandia National Laboratories for multiple-instruction, multiple-data stream (MIMD) computers. PAGOSA is an explicit, Eulerian code for modeling the three-dimensional, high-speed hydrodynamic flow of fluids and the dynamic deformation of solids under high rates of strain. It was originally developed at Los Alamos National Laboratory for the single-instruction, multiple-data (SIMD) Connection Machine parallel computers. The performance of Sandia`s message-passing version of PAGOSA has been measured on two MIMD machines, the nCUBE 2 and the Intel Paragon XP/S. No special efforts were made to optimize the code for either machine. The measured scaled speedup (computational time for a single computational node divided by the computational time per node for fixed computational load) and grind time (computational time per cell per time step) show that the MIMD PAGOSA code scales linearly with the number of computational nodes used on a variety of problems, including the simulation of shaped-charge jets perforating an oil well casing. Scaled parallel efficiencies for MIMD PAGOSA are greater than 0.70 when the available memory per node is filled (or nearly filled) on hundreds to a thousand or more computational nodes on these two machines, indicating that the code scales very well. Thus good parallel performance can be achieved for complex and realistic applications when they are first implemented on MIMD parallel computers.

  7. Scalable High Performance Message Passing over InfiniBand for Open MPI

    SciTech Connect

    Friedley, A; Hoefler, T; Leininger, M L; Lumsdaine, A

    2007-10-24

    InfiniBand (IB) is a popular network technology for modern high-performance computing systems. MPI implementations traditionally support IB using a reliable, connection-oriented (RC) transport. However, per-process resource usage that grows linearly with the number of processes, makes this approach prohibitive for large-scale systems. IB provides an alternative in the form of a connectionless unreliable datagram transport (UD), which allows for near-constant resource usage and initialization overhead as the process count increases. This paper describes a UD-based implementation for IB in Open MPI as a scalable alternative to existing RC-based schemes. We use the software reliability capabilities of Open MPI to provide the guaranteed delivery semantics required by MPI. Results show that UD not only requires fewer resources at scale, but also allows for shorter MPI startup times. A connectionless model also improves performance for applications that tend to send small messages to many different processes.

  8. Quantifying statistical interdependence by message passing on graphs-part II: multidimensional point processes.

    PubMed

    Dauwels, J; Vialatte, F; Weber, T; Musha, T; Cichocki, A

    2009-08-01

    Stochastic event synchrony is a technique to quantify the similarity of pairs of signals. First, events are extracted from the two given time series. Next, one tries to align events from one time series with events from the other. The better the alignment, the more similar the two time series are considered to be. In Part I, the companion letter in this issue, one-dimensional events are considered; this letter concerns multidimensional events. Although the basic idea is similar, the extension to multidimensional point processes involves a significantly more difficult combinatorial problem and therefore is nontrivial. Also in the multidimensional case, the problem of jointly computing the pairwise alignment and SES parameters is cast as a statistical inference problem. This problem is solved by coordinate descent, more specifically, by alternating the following two steps: (1) estimate the SES parameters from a given pairwise alignment; (2) with the resulting estimates, refine the pairwise alignment. The SES parameters are computed by maximum a posteriori (MAP) estimation (step 1), in analogy to the one-dimensional case. The pairwise alignment (step 2) can no longer be obtained through dynamic programming, since the state space becomes too large. Instead it is determined by applying the max-product algorithm on a cyclic graphical model. In order to test the robustness and reliability of the SES method, it is first applied to surrogate data. Next, it is applied to detect anomalies in EEG synchrony of mild cognitive impairment (MCI) patients. Numerical results suggest that SES is significantly more sensitive to perturbations in EEG synchrony than a large variety of classical synchrony measures.

  9. Task-parallel message passing interface implementation of Autodock4 for docking of very large databases of compounds using high-performance super-computers.

    PubMed

    Collignon, Barbara; Schulz, Roland; Smith, Jeremy C; Baudry, Jerome

    2011-04-30

    A message passing interface (MPI)-based implementation (Autodock4.lga.MPI) of the grid-based docking program Autodock4 has been developed to allow simultaneous and independent docking of multiple compounds on up to thousands of central processing units (CPUs) using the Lamarkian genetic algorithm. The MPI version reads a single binary file containing precalculated grids that represent the protein-ligand interactions, i.e., van der Waals, electrostatic, and desolvation potentials, and needs only two input parameter files for the entire docking run. In comparison, the serial version of Autodock4 reads ASCII grid files and requires one parameter file per compound. The modifications performed result in significantly reduced input/output activity compared with the serial version. Autodock4.lga.MPI scales up to 8192 CPUs with a maximal overhead of 16.3%, of which two thirds is due to input/output operations and one third originates from MPI operations. The optimal docking strategy, which minimizes docking CPU time without lowering the quality of the database enrichments, comprises the docking of ligands preordered from the most to the least flexible and the assignment of the number of energy evaluations as a function of the number of rotatable bounds. In 24 h, on 8192 high-performance computing CPUs, the present MPI version would allow docking to a rigid protein of about 300K small flexible compounds or 11 million rigid compounds.

  10. Task-parallel message passing interface implementation of Autodock4 for docking of very large databases of compounds using high-performance super-computers

    SciTech Connect

    Collignon, Barbara C; Schultz, Roland; Smith, Jeremy C; Baudry, Jerome Y

    2011-01-01

    A message passing interface (MPI)-based implementation (Autodock4.lga.MPI) of the grid-based docking program Autodock4 has been developed to allow simultaneous and independent docking of multiple compounds on up to thousands of central processing units (CPUs) using the Lamarkian genetic algorithm. The MPI version reads a single binary file containing precalculated grids that represent the protein-ligand interactions, i.e., van der Waals, electrostatic, and desolvation potentials, and needs only two input parameter files for the entire docking run. In comparison, the serial version of Autodock4 reads ASCII grid files and requires one parameter file per compound. The modifications performed result in significantly reduced input/output activity compared with the serial version. Autodock4.lga.MPI scales up to 8192 CPUs with a maximal overhead of 16.3%, of which two thirds is due to input/output operations and one third originates from MPI operations. The optimal docking strategy, which minimizes docking CPU time without lowering the quality of the database enrichments, comprises the docking of ligands preordered from the most to the least flexible and the assignment of the number of energy evaluations as a function of the number of rotatable bounds. In 24 h, on 8192 high-performance computing CPUs, the present MPI version would allow docking to a rigid protein of about 300K small flexible compounds or 11 million rigid compounds.

  11. Message Passing Semantics.

    DTIC Science & Technology

    1981-06-19

    IAP WorkshoD on Electronic Office of the Future, January 1979. 19. Hewitt, C. "Design of the APIARY for VLSI support of knowledge-based systems," MIT...AAAI Conference Stanford, Ca., August 1980, 157-164. 10. Hewitt, C.E. "The Apiary network architecture for knowledgeable systems," Proceedings of Lisp...Conference, Stanford, Ca., August 1980, 107-118. 11. Hewitt, C. " Apiary multiprocessor architecture knowlecigo system," 23 Proceedinas of the Joint

  12. QLWFPC2: Parallel-Processing Quick-Look WFPC2 Stellar Photometry Based on the Message Passing Interface

    NASA Astrophysics Data System (ADS)

    Mighell, K. J.

    2004-07-01

    I describe a new parallel-processing stellar photometry code called QLWFPC2 (http://www.noao.edu/staff/mighell/qlwfpc2) which is designed to do quick-look analysis of two entire WFPC2 observations from the Hubble Space Telescope in under 5 seconds using a fast Beowulf cluster with a Gigabit-Ethernet local network. This program is written in ANSI C and uses MPICH implementation of the Message Passing Interface from the Argonne National Laboratory for the parallel-processing communications, the CFITSIO library (from HEASARC at NASA's GSFC) for reading the standard FITS files from the HST Data Archive, and the Parameter Interface Library (from the INTEGRAL Science Data Center) for the IRAF parameter-file user interface. QLWFPC2 running on 4 processors takes about 2.4 seconds to analyze the WFPC2 archive datasets u37ga407r.c0.fits (F555W; 300 s) and u37ga401r.c0.fits (F814W; 300 s) of M54 (NGC 6715) which is the bright massive globular cluster near the center of the nearby Sagittarius dwarf spheroidal galaxy. The analysis of these HST observations of M54 lead to the serendipitous discovery of more than 50 new bright variable stars in the central region of M54. Most of the candidate variables stars are found on the PC1 images of the cluster center --- a region where no variables have been reported by previous ground-based studies of variables in M54. This discovery is an example of how QLWFPC2 can be used to quickly explore the time domain of observations in the HST Data Archive.

  13. QLWFPC2: Parallel-Processing Quick-Look WFPC2 Stellar Photometry based on the Message Passing Interface

    NASA Astrophysics Data System (ADS)

    Mighell, K. J.

    2003-12-01

    I describe a new parallel-processing stellar photometry code called QLWFPC2 which is designed to do quick-look analysis of two entire WFPC2 observations from the Hubble Space Telescope in under 5 seconds using a fast Beowulf cluster with a Gigabit Ethernet local network. This program is written in ANSI/ISO C and uses the MPICH implementation of the Message Passing Interface from the Argonne National Laboratory for the parallel-processing communications, the CFITSIO library (from HEASARC at NASA's GSFC) for reading the standard FITS files from the HST Data Archive and the Parameter Interface Library (from the INTEGRAL Science Data Center) for the IRAF parameter-file user interface. QLWFPC2 running on 4 processors takes about 2.4 seconds to analyze WFPC2 archive datasets u37ga407r.c0.fits (F555W; 300 s) and u37ga401r.c0.fits (F814W; 300 s) of M54 (NGC 6715) which is the bright massive globular cluster near the center of the nearby Sagittarius dwarf spheroidal galaxy. The analysis of these HST observations of M54 lead to the serendipitous discovery of more than 50 new bright variable stars in the central region of M54. Most of the candidate variables stars are found on the PC1 images of the cluster center --- a region where no variables have been reported by previous ground-based studies of variables in M54. This discovery is an example of how QLWFPC2 can be used to quickly explore the time domain of observations in the HST Data Archive. This work is supported by a grant from the National Aeronautics and Space Administration (NASA), Order No. S-13811-G, which was awarded by the Applied Information Systems Research Program (AISRP) of NASA's Office of Space Science (NRA 01-OSS-01).

  14. Message passing interface and multithreading hybrid for parallel molecular docking of large databases on petascale high performance computing machines.

    PubMed

    Zhang, Xiaohua; Wong, Sergio E; Lightstone, Felice C

    2013-04-30

    A mixed parallel scheme that combines message passing interface (MPI) and multithreading was implemented in the AutoDock Vina molecular docking program. The resulting program, named VinaLC, was tested on the petascale high performance computing (HPC) machines at Lawrence Livermore National Laboratory. To exploit the typical cluster-type supercomputers, thousands of docking calculations were dispatched by the master process to run simultaneously on thousands of slave processes, where each docking calculation takes one slave process on one node, and within the node each docking calculation runs via multithreading on multiple CPU cores and shared memory. Input and output of the program and the data handling within the program were carefully designed to deal with large databases and ultimately achieve HPC on a large number of CPU cores. Parallel performance analysis of the VinaLC program shows that the code scales up to more than 15K CPUs with a very low overhead cost of 3.94%. One million flexible compound docking calculations took only 1.4 h to finish on about 15K CPUs. The docking accuracy of VinaLC has been validated against the DUD data set by the re-docking of X-ray ligands and an enrichment study, 64.4% of the top scoring poses have RMSD values under 2.0 Å. The program has been demonstrated to have good enrichment performance on 70% of the targets in the DUD data set. An analysis of the enrichment factors calculated at various percentages of the screening database indicates VinaLC has very good early recovery of actives.

  15. Fast one-pass algorithm to label objects and compute their features

    NASA Astrophysics Data System (ADS)

    Thai, Tan Q.

    1991-12-01

    In many image processing applications, labeling objects and computing their features for recognition are crucial steps for further analysis. In general these two steps are done separately. This paper proposes a new approach to label all objects and computer their features (such as moments, best fit ellipse, major and minor axis) in one pass. The basic idea of the algorithm is to detect interval overlaps among the line segments as the image is scanned from left to right, top to bottom. Ambiguity about an object's connectivity can also be resolved with the proposed algorithm. It is a fast algorithm and can be implemented on either serial or parallel processors.

  16. Phase Response Design of Recursive All-Pass Digital Filters Using a Modified PSO Algorithm.

    PubMed

    Chang, Wei-Der

    2015-01-01

    This paper develops a new design scheme for the phase response of an all-pass recursive digital filter. A variant of particle swarm optimization (PSO) algorithm will be utilized for solving this kind of filter design problem. It is here called the modified PSO (MPSO) algorithm in which another adjusting factor is more introduced in the velocity updating formula of the algorithm in order to improve the searching ability. In the proposed method, all of the designed filter coefficients are firstly collected to be a parameter vector and this vector is regarded as a particle of the algorithm. The MPSO with a modified velocity formula will force all particles into moving toward the optimal or near optimal solution by minimizing some defined objective function of the optimization problem. To show the effectiveness of the proposed method, two different kinds of linear phase response design examples are illustrated and the general PSO algorithm is compared as well. The obtained results show that the MPSO is superior to the general PSO for the phase response design of digital recursive all-pass filter.

  17. Phase Response Design of Recursive All-Pass Digital Filters Using a Modified PSO Algorithm

    PubMed Central

    Chang, Wei-Der

    2015-01-01

    This paper develops a new design scheme for the phase response of an all-pass recursive digital filter. A variant of particle swarm optimization (PSO) algorithm will be utilized for solving this kind of filter design problem. It is here called the modified PSO (MPSO) algorithm in which another adjusting factor is more introduced in the velocity updating formula of the algorithm in order to improve the searching ability. In the proposed method, all of the designed filter coefficients are firstly collected to be a parameter vector and this vector is regarded as a particle of the algorithm. The MPSO with a modified velocity formula will force all particles into moving toward the optimal or near optimal solution by minimizing some defined objective function of the optimization problem. To show the effectiveness of the proposed method, two different kinds of linear phase response design examples are illustrated and the general PSO algorithm is compared as well. The obtained results show that the MPSO is superior to the general PSO for the phase response design of digital recursive all-pass filter. PMID:26366168

  18. Ripple FPN reduced algorithm based on temporal high-pass filter and hardware implementation

    NASA Astrophysics Data System (ADS)

    Li, Yiyang; Li, Shuo; Zhang, Zhipeng; Jin, Weiqi; Wu, Lei; Jin, Minglei

    2016-11-01

    Cooled infrared detector arrays always suffer from undesired Ripple Fixed-Pattern Noise (FPN) when observe the scene of sky. The Ripple Fixed-Pattern Noise seriously affect the imaging quality of thermal imager, especially for small target detection and tracking. It is hard to eliminate the FPN by the Calibration based techniques and the current scene-based nonuniformity algorithms. In this paper, we present a modified space low-pass and temporal high-pass nonuniformity correction algorithm using adaptive time domain threshold (THP&GM). The threshold is designed to significantly reduce ghosting artifacts. We test the algorithm on real infrared in comparison to several previously published methods. This algorithm not only can effectively correct common FPN such as Stripe, but also has obviously advantage compared with the current methods in terms of detail protection and convergence speed, especially for Ripple FPN correction. Furthermore, we display our architecture with a prototype built on a Xilinx Virtex-5 XC5VLX50T field-programmable gate array (FPGA). The hardware implementation of the algorithm based on FPGA has two advantages: (1) low resources consumption, and (2) small hardware delay (less than 20 lines). The hardware has been successfully applied in actual system.

  19. A robust SEM auto-focus algorithm using multiple band-pass filters

    NASA Astrophysics Data System (ADS)

    Harada, Minoru; Obara, Kenji; Nakamae, Koji

    2017-01-01

    An auto-focus algorithm using multiple band-pass filters for a scanning electron microscope (SEM) is proposed. To acquire sharp images of various kinds of defects by SEM defect observation in semiconductor manufacturing, the auto-focus process must be robust. A method for designing a band-pass filter for calculating the ‘focus measure’ (a key parameter of the auto-focus process) is proposed. To achieve an optimal specific frequency response for various images, multiple band-pass filters are introduced. As for the proposed method, two series of focus measures are calculated by using multiple band-pass filters independently, and it is selected according to reliability of the series of focus measures. The signal-to-noise ratio of an image for acceptable auto-focus precision is determined by simulation using pseudo images. In an experiment using the proposed method with real images, the success rate of auto focus is improved from 79.4% to 95.6%.

  20. Scaling and performance of a 3-D radiation hydrodynamics code on message-passing parallel computers: final report

    SciTech Connect

    Hayes, J C; Norman, M

    1999-10-28

    This report details an investigation into the efficacy of two approaches to solving the radiation diffusion equation within a radiation hydrodynamic simulation. Because leading-edge scientific computing platforms have evolved from large single-node vector processors to parallel aggregates containing tens to thousands of individual CPU's, the ability of an algorithm to maintain high compute efficiency when distributed over a large array of nodes is critically important. The viability of an algorithm thus hinges upon the tripartite question of numerical accuracy, total time to solution, and parallel efficiency.

  1. Message passing for optimization and control of a power grid: model of a distribution system with redundancy.

    PubMed

    Zdeborová, Lenka; Decelle, Aurélien; Chertkov, Michael

    2009-10-01

    We use a power grid model with M generators and N consumption units to optimize the grid and its control. Each consumer demand is drawn from a predefined finite-size-support distribution, thus simulating the instantaneous load fluctuations. Each generator has a maximum power capability. A generator is not overloaded if the sum of the loads of consumers connected to a generator does not exceed its maximum production. In the standard grid each consumer is connected only to its designated generator, while we consider a more general organization of the grid allowing each consumer to select one generator depending on the load from a predefined consumer dependent and sufficiently small set of generators which can all serve the load. The model grid is interconnected in a graph with loops, drawn from an ensemble of random bipartite graphs, while each allowed configuration of loaded links represent a set of graph covering trees. Losses, the reactive character of the grid and the transmission-level connections between generators (and many other details relevant to realistic power grid) are ignored in this proof-of-principles study. We focus on the asymptotic limit, N-->infinity and N/M-->D=O(1)>1 , and we show that the interconnects allow significant expansion of the parameter domains for which the probability of a generator overload is asymptotically zero. Our construction explores the formal relation between the problem of grid optimization and the modern theory of sparse graphical models. We also design heuristic algorithms that achieve the asymptotically optimal selection of loaded links. We conclude discussing the ability of this approach to include other effects such as a more realistic modeling of the power grid and related optimization and control algorithms.

  2. A hybrid method based on Band Pass Filter and Correlation Algorithm to improve debris sensor capacity

    NASA Astrophysics Data System (ADS)

    Hong, Wei; Wang, Shaoping; Liu, Haokuo; Tomovic, Mileta M.; Chao, Zhang

    2017-01-01

    The inductive debris detection is an effective method for monitoring mechanical wear, and could be used to prevent serious accidents. However, debris detection during early phase of mechanical wear, when small debris (<100 um) is generated, requires that the sensor has high sensitivity with respect to background noise. In order to detect smaller debris by existing sensors, this paper presents a hybrid method which combines Band Pass Filter and Correlation Algorithm to improve sensor signal-to-noise ratio (SNR). The simulation results indicate that the SNR will be improved at least 2.67 times after signal processing. In other words, this method ensures debris identification when the sensor's SNR is bigger than -3 dB. Thus, smaller debris will be detected in the same SNR. Finally, effectiveness of the proposed method is experimentally validated.

  3. Optimal message log reclamation for uncoordinated checkpointing

    NASA Technical Reports Server (NTRS)

    Wang, Yi-Min; Fuchs, W. K.

    1994-01-01

    Uncoordinated checkpointing for message-passing systems allows maximum process autonomy and general nondeterministic execution, but suffers from potential domino effect and the large space overhead for maintaining checkpoints and message logs. Traditionally, it has been assumed that only obsolete checkpoints and message logs before the global recovery line can be garbage-collected. Recently, an approach to identifying all garbage checkpoints based on recovery line transformation and decomposition has been developed. We show in this paper that the same approach can be applied to the problem of identifying all garbage message logs for systems requiring message logging to record in-transit messages. Communication trace-driven simulation for several parallel programs is used to evaluate the proposed algorithm.

  4. An algorithm used for quality criterion automatic measurement of band-pass filters and its device implementation

    NASA Astrophysics Data System (ADS)

    Liu, Qianshun; Liu, Yan; Yu, Feihong

    2013-08-01

    As a kind of film device, band-pass filter is widely used in pattern recognition, infrared detection, optical fiber communication, etc. In this paper, an algorithm for automatic measurement of band-pass filter quality criterion is proposed based on the proven theory calculation of derivate spectral transmittance of filter formula. Firstly, wavelet transform to reduce spectrum data noises is used. Secondly, combining with the Gaussian curve fitting and least squares method, the algorithm fits spectrum curve and searches the peak. Finally, some parameters for judging band-pass filter quality are figure out. Based on the algorithm, a pipeline for band-pass filters automatic measurement system has been designed that can scan the filter array automatically and display spectral transmittance of each filter. At the same time, the system compares the measuring result with the user defined standards to determine if the filter is qualified or not. The qualified product will be market with green color, and the unqualified product will be marked with red color. With the experiments verification, the automatic measurement system basically realized comprehensive, accurate and rapid measurement of band-pass filter quality and achieved the expected results.

  5. Multiple node remote messaging

    DOEpatents

    Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Ohmacht, Martin; Salapura, Valentina; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  6. Improved Noise Minimum Statistics Estimation Algorithm for Using in a Speech-Passing Noise-Rejecting Headset

    NASA Astrophysics Data System (ADS)

    Seyedtabaee, Saeed; Moazami Goodarzi, Hamze

    2010-12-01

    This paper deals with configuration of an algorithm to be used in a speech-passing angle grinder noise-canceling headset. Angle grinder noise is annoying and interrupts ordinary oral communication. Meaning that, low SNR noisy condition is ahead. Since variation in angle grinder working condition changes noise statistics, the noise will be nonstationary with possible jumps in its power. Studies are conducted for picking an appropriate algorithm. A modified version of the well-known spectral subtraction shows superior performance against alternate methods. Noise estimation is calculated through a multi-band fast adapting scheme. The algorithm is adapted very quickly to the non-stationary noise environment while inflecting minimum musical noise and speech distortion on the processed signal. Objective and subjective measures illustrating the performance of the proposed method are introduced.

  7. Parallelization of Edge Detection Algorithm using MPI on Beowulf Cluster

    NASA Astrophysics Data System (ADS)

    Haron, Nazleeni; Amir, Ruzaini; Aziz, Izzatdin A.; Jung, Low Tan; Shukri, Siti Rohkmah

    In this paper, we present the design of parallel Sobel edge detection algorithm using Foster's methodology. The parallel algorithm is implemented using MPI message passing library and master/slave algorithm. Every processor performs the same sequential algorithm but on different part of the image. Experimental results conducted on Beowulf cluster are presented to demonstrate the performance of the parallel algorithm.

  8. Accelerated multiple-pass moving average: a novel algorithm for baseline estimation in CE and its application to baseline correction on real-time bases.

    PubMed

    Solis, Alejandro; Rex, Mathew; Campiglia, Andres D; Sojo, Pedro

    2007-04-01

    We present a novel algorithm for baseline estimation in CE. The new algorithm which we have named as accelerated multiple-pass moving average (AMPMA) is combined to three preexisting low-pass filters, spike-removal, moving average, and multi-pass moving average filter, to achieve real-time baseline correction with commercial instrumentation. The successful performance of AMPMA is demonstrated with simulated and experimental data. Straightforward comparison of experimental data clearly shows the improvement AMPMA provides to the linear fitting, LOD, and accuracy (absolute error) of CE analysis.

  9. Effects of spectrometer band pass, sampling, and signal-to-noise ratio on spectral identification using the Tetracorder algorithm

    USGS Publications Warehouse

    Swayze, G.A.; Clark, R.N.; Goetz, A.F.H.; Chrien, T.H.; Gorelick, N.S.

    2003-01-01

    Estimates of spectrometer band pass, sampling interval, and signal-to-noise ratio required for identification of pure minerals and plants were derived using reflectance spectra convolved to AVIRIS, HYDICE, MIVIS, VIMS, and other imaging spectrometers. For each spectral simulation, various levels of random noise were added to the reflectance spectra after convolution, and then each was analyzed with the Tetracorder spectra identification algorithm [Clark et al., 2003]. The outcome of each identification attempt was tabulated to provide an estimate of the signal-to-noise ratio at which a given percentage of the noisy spectra were identified correctly. Results show that spectral identification is most sensitive to the signal-to-noise ratio at narrow sampling interval values but is more sensitive to the sampling interval itself at broad sampling interval values because of spectral aliasing, a condition when absorption features of different materials can resemble one another. The band pass is less critical to spectral identification than the sampling interval or signal-to-noise ratio because broadening the band pass does not induce spectral aliasing. These conclusions are empirically corroborated by analysis of mineral maps of AVIRIS data collected at Cuprite, Nevada, between 1990 and 1995, a period during which the sensor signal-to-noise ratio increased up to sixfold. There are values of spectrometer sampling and band pass beyond which spectral identification of materials will require an abrupt increase in sensor signal-to-noise ratio due to the effects of spectral aliasing. Factors that control this threshold are the uniqueness of a material's diagnostic absorptions in terms of shape and wavelength isolation, and the spectral diversity of the materials found in nature and in the spectral library used for comparison. Array spectrometers provide the best data for identification when they critically sample spectra. The sampling interval should not be broadened to

  10. Simple Algorithms for Distributed Leader Election in Anonymous Synchronous Rings and Complete Networks Inspired by Neural Development in Fruit Flies.

    PubMed

    Xu, Lei; Jeavons, Peter

    2015-11-01

    Leader election in anonymous rings and complete networks is a very practical problem in distributed computing. Previous algorithms for this problem are generally designed for a classical message passing model where complex messages are exchanged. However, the need to send and receive complex messages makes such algorithms less practical for some real applications. We present some simple synchronous algorithms for distributed leader election in anonymous rings and complete networks that are inspired by the development of the neural system of the fruit fly. Our leader election algorithms all assume that only one-bit messages are broadcast by nodes in the network and processors are only able to distinguish between silence and the arrival of one or more messages. These restrictions allow implementations to use a simpler message-passing architecture. Even with these harsh restrictions our algorithms are shown to achieve good time and message complexity both analytically and experimentally.

  11. Parallel algorithm development

    SciTech Connect

    Adams, T.F.

    1996-06-01

    Rapid changes in parallel computing technology are causing significant changes in the strategies being used for parallel algorithm development. One approach is simply to write computer code in a standard language like FORTRAN 77 or with the expectation that the compiler will produce executable code that will run in parallel. The alternatives are: (1) to build explicit message passing directly into the source code; or (2) to write source code without explicit reference to message passing or parallelism, but use a general communications library to provide efficient parallel execution. Application of these strategies is illustrated with examples of codes currently under development.

  12. Clandestine Message Passing in Virtual Environments

    DTIC Science & Technology

    2008-09-01

    Xbox 360 and PlayStation 3 as managerial software to set up person to person matches for any one of the hundreds of titles. The business world has...million units sold worldwide up to and including the month of June 2008, the Nintendo Wii has outsold both the Xbox (19 million units) and PlayStation 3...their distribution. Installation of the executable places three programs on the hard drive - Wonderland Server, Wonderland Client, and Wonderland

  13. A hierarchical clustering algorithm for MIMD architecture.

    PubMed

    Du, Zhihua; Lin, Feng

    2004-12-01

    Hierarchical clustering is the most often used method for grouping similar patterns of gene expression data. A fundamental problem with existing implementations of this clustering method is the inability to handle large data sets within a reasonable time and memory resources. We propose a parallelized algorithm of hierarchical clustering to solve this problem. Our implementation on a multiple instruction multiple data (MIMD) architecture shows considerable reduction in computational time and inter-node communication overhead, especially for large data sets. We use the standard message passing library, message passing interface (MPI) for any MIMD systems.

  14. Voice Messaging.

    ERIC Educational Resources Information Center

    Davis, Barbara D.; Tisdale, Judy Jones; Krapels, Roberta H.

    2001-01-01

    Surveys corporate use of voice message systems by interviewing employees in four different companies. Finds that all four companies viewed their voicemail systems as a supplement to personal contact (not a replacement) and provided training, but had no formal method to assess customer satisfaction with their system. Suggests business communication…

  15. Subtle Messages.

    ERIC Educational Resources Information Center

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  16. President's Message

    ERIC Educational Resources Information Center

    Stephenson, Andy

    2007-01-01

    In this message from the International Technology Education Association (ITEA) president, Andy Stephenson stresses the need for technology, innovation, design, and engineering (TIDE) education. He cites the recent report--"Preparing for the Perfect Storm, a Report on the Forum, Taking Action Together: Developing a National Plan to Address the…

  17. Parallel algorithms for geometric connected component labeling on a hypercube multiprocessor

    NASA Technical Reports Server (NTRS)

    Belkhale, K. P.; Banerjee, P.

    1992-01-01

    Different algorithms for the geometric connected component labeling (GCCL) problem are defined each of which involves d stages of message passing, for a d-dimensional hypercube. The major idea is that in each stage a hypercube multiprocessor increases its knowledge of domain. The algorithms under consideration include the QUAD algorithm for small number of processors and the Overlap Quad algorithm for large number of processors, subject to the locality of the connected sets. These algorithms differ in their run time, memory requirements, and message complexity. They were implemented on an Intel iPSC2/D4/MX hypercube.

  18. Parameter optimization for a high-order band-pass continuous-time sigma-delta modulator MEMS gyroscope using a genetic algorithm approach

    NASA Astrophysics Data System (ADS)

    Chen, Fang; Chang, Honglong; Yuan, Weizheng; Wilcock, Reuben; Kraft, Michael

    2012-10-01

    This paper describes a novel multiobjective parameter optimization method based on a genetic algorithm (GA) for the design of a sixth-order continuous-time, force feedback band-pass sigma-delta modulator (BP-ΣΔM) interface for the sense mode of a MEMS gyroscope. The design procedure starts by deriving a parameterized Simulink model of the BP-ΣΔM gyroscope interface. The system parameters are then optimized by the GA. Consequently, the optimized design is tested for robustness by a Monte Carlo analysis to find a solution that is both optimal and robust. System level simulations result in a signal-to-noise ratio (SNR) larger than 90 dB in a bandwidth of 64 Hz with a 200° s-1 angular rate input signal; the noise floor is about -100 dBV Hz-1/2. The simulations are compared to measured data from a hardware implementation. For zero input rotation with the gyroscope operating at atmospheric pressure, the spectrum of the output bitstream shows an obvious band-pass noise shaping and a deep notch at the gyroscope resonant frequency. The noise floor of measured power spectral density (PSD) of the output bitstream agrees well with simulation of the optimized system level model. The bias stability, rate sensitivity and nonlinearity of the gyroscope controlled by an optimized BP-ΣΔM closed-loop interface are 34.15° h-1, 22.3 mV °-1 s-1, 98 ppm, respectively. This compares to a simple open-loop interface for which the corresponding values are 89° h-1, 14.3 mV °-1 s-1, 7600 ppm, and a nonoptimized BP-ΣΔM closed-loop interface with corresponding values of 60° h-1, 17 mV °-1 s-1, 200 ppm.

  19. Radiation transport calculations on unstructured grids using a spatially decomposed and threaded algorithm

    SciTech Connect

    Nemanic, M K; Nowak, P

    1999-04-12

    We consider the solution of time-dependent, energy-dependent, discrete ordinates, and nonlinear radiative transfer problems on three-dimensional unstructured spatial grids. We discuss the solution of this class of transport problems, using the code TETON, on large distributed-memory multinode computers having multiple processors per ''node'' (e.g. the IBM-SP). We discuss the use of both spatial decomposition using message passing between ''nodes'' and a threading algorithm in angle on each ''node''. We present timing studies to show how this algorithm scales to hundreds and thousands of processors. We also present an energy group ''batching'' algorithm that greatly enhances cache performance. Our conclusion, after considering cache performance, storage limitations and dependencies inherent in the physics, is that a model that uses a combination of message-passing and threading is superior to one that uses message-passing alone. We present numerical evidence to support our conclusion.

  20. Join-Graph Propagation Algorithms

    PubMed Central

    Mateescu, Robert; Kask, Kalev; Gogate, Vibhav; Dechter, Rina

    2010-01-01

    The paper investigates parameterized approximate message-passing schemes that are based on bounded inference and are inspired by Pearl's belief propagation algorithm (BP). We start with the bounded inference mini-clustering algorithm and then move to the iterative scheme called Iterative Join-Graph Propagation (IJGP), that combines both iteration and bounded inference. Algorithm IJGP belongs to the class of Generalized Belief Propagation algorithms, a framework that allowed connections with approximate algorithms from statistical physics and is shown empirically to surpass the performance of mini-clustering and belief propagation, as well as a number of other state-of-the-art algorithms on several classes of networks. We also provide insight into the accuracy of iterative BP and IJGP by relating these algorithms to well known classes of constraint propagation schemes. PMID:20740057

  1. Mixed messages

    PubMed Central

    Chen, Christopher B.; Hall, Kevin; Tsuyuki, Ross T.

    2014-01-01

    Background: More than 5 years ago, the Blueprint for Pharmacy developed a plan for transitioning pharmacy practice toward more patient-centred care. Much of the strategy for change involves communicating the new vision. Objective: To evaluate the communication of the Vision for Pharmacy by the organizations and corporations that signed the Blueprint for Pharmacy’s Commitment to Act. Methods: The list of 88 signatories of the Commitment to Act was obtained from the Blueprint for Pharmacy document. The website of each of these signatories was searched for all references to the Blueprint for Pharmacy or Vision for Pharmacy. Each of the identified references was then analyzed using summative content analysis. Results: A total of 934 references were identified from the webpages of the 88 signatories. Of these references, 549 were merely links to the Blueprint for Pharmacy’s website, 350 of the references provided some detailed information about the Blueprint for Pharmacy and only 35 references provided any specific plans to transition pharmacy practice. Conclusion: Widespread proliferation of the Vision for Pharmacy has not been achieved. One possible explanation for this is that communication of the vision by the signatories has been incomplete. To ensure the success of future communications, change leaders must develop strategies that consider how individual pharmacists and pharmacies understand the message. PMID:24660012

  2. Optimal message log reclamation for independent checkpointing

    NASA Technical Reports Server (NTRS)

    Wang, Yi-Min; Fuchs, W. Kent

    1993-01-01

    Independent (uncoordinated) check pointing for parallel and distributed systems allows maximum process autonomy but suffers from possible domino effects and the associated storage space overhead for maintaining multiple checkpoints and message logs. In most research on check pointing and recovery, it was assumed that only the checkpoints and message logs older than the global recovery line can be discarded. It is shown how recovery line transformation and decomposition can be applied to the problem of efficiently identifying all discardable message logs, thereby achieving optimal garbage collection. Communication trace-driven simulation for several parallel programs is used to show the benefits of the proposed algorithm for message log reclamation.

  3. Full tensor gravity gradiometry data inversion: Performance analysis of parallel computing algorithms

    NASA Astrophysics Data System (ADS)

    Hou, Zhen-Long; Wei, Xiao-Hui; Huang, Da-Nian; Sun, Xu

    2015-09-01

    We apply reweighted inversion focusing to full tensor gravity gradiometry data using message-passing interface (MPI) and compute unified device architecture (CUDA) parallel computing algorithms, and then combine MPI with CUDA to formulate a hybrid algorithm. Parallel computing performance metrics are introduced to analyze and compare the performance of the algorithms. We summarize the rules for the performance evaluation of parallel algorithms. We use model and real data from the Vinton salt dome to test the algorithms. We find good match between model and real density data, and verify the high efficiency and feasibility of parallel computing algorithms in the inversion of full tensor gravity gradiometry data.

  4. Data communications in a parallel active messaging interface of a parallel computer

    DOEpatents

    Davis, Kristan D.; Faraj, Daniel A.

    2014-07-22

    Algorithm selection for data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI, including associating in the PAMI data communications algorithms and ranges of message sizes so that each algorithm is associated with a separate range of message sizes; receiving in an origin endpoint of the PAMI a data communications instruction, the instruction specifying transmission of a data communications message from the origin endpoint to a target endpoint, the data communications message characterized by a message size; selecting, from among the associated algorithms and ranges, a data communications algorithm in dependence upon the message size; and transmitting, according to the selected data communications algorithm from the origin endpoint to the target endpoint, the data communications message.

  5. Data communications in a parallel active messaging interface of a parallel computer

    DOEpatents

    Davis, Kristan D; Faraj, Daniel A

    2013-07-09

    Algorithm selection for data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI, including associating in the PAMI data communications algorithms and ranges of message sizes so that each algorithm is associated with a separate range of message sizes; receiving in an origin endpoint of the PAMI a data communications instruction, the instruction specifying transmission of a data communications message from the origin endpoint to a target endpoint, the data communications message characterized by a message size; selecting, from among the associated algorithms and ranges, a data communications algorithm in dependence upon the message size; and transmitting, according to the selected data communications algorithm from the origin endpoint to the target endpoint, the data communications message.

  6. Parallel Ray Tracing Using the Message Passing Interface

    DTIC Science & Technology

    2007-09-01

    Optica , which is a book on astronomy that contained the important principle that light rays travel from an object to an eye and not the other way around...this application. This interest is driven by commercial demands from the entertainment industry and a widespread in- terest in visualizing complex

  7. Characterizing Computation-Communication Overlap in Message-Passing Systems

    SciTech Connect

    David E. Bernholdt; Jarek Nieplocha; P. Sadayappan; Aniruddha G. Shet; Vinod Tipparaju

    2008-01-31

    Effective overlap of computation and communication is a well understood technique for latency hiding and can yield significant performance gains for applications on high-end computers. In this report, we describe an instrumentation framework developed for messagepassing systems to characterize the degree of overlap of communication with computation in the execution of parallel applications. The inability to obtain precise time-stamps for pertinent communication events is a significant problem, and is addressed by generation of minimum and maximum bounds on achieved overlap. The overlap measures can aid application developers and system designers in investigating scalability issues. The approach has been used to instrument two MPI implementations as well as the ARMCI system. The implementation resides entirely within the communication library and thus integrates well with existing approaches that operate outside the library. The utility of the framework is demonstrated by analyzing communication-computation overlap for micro-benchmarks and the NAS benchmarks, and the insights obtained are used to modify the NAS SP benchmark, resulting in improved overlap.

  8. Sharing Memory Robustly in Message-Passing Systems

    DTIC Science & Technology

    1990-02-16

    ust: a very restricted form of communication. Chor and Moscovici ([20]) present a hierarchy of resiliency for problems in shared-memory systems and...1985. [20] B. Chor, and L. Moscovici , Solvability in Asynchronous Environments, Proc. 30th Syrup. on Foun- * dations of Comp. Sc~en ce, pp. 422-427, 1989

  9. Automated Performance Prediction of Message-Passing Parallel Programs

    NASA Technical Reports Server (NTRS)

    Block, Robert J.; Sarukkai, Sekhar; Mehra, Pankaj; Woodrow, Thomas S. (Technical Monitor)

    1995-01-01

    The increasing use of massively parallel supercomputers to solve large-scale scientific problems has generated a need for tools that can predict scalability trends of applications written for these machines. Much work has been done to create simple models that represent important characteristics of parallel programs, such as latency, network contention, and communication volume. But many of these methods still require substantial manual effort to represent an application in the model's format. The NIK toolkit described in this paper is the result of an on-going effort to automate the formation of analytic expressions of program execution time, with a minimum of programmer assistance. In this paper we demonstrate the feasibility of our approach, by extending previous work to detect and model communication patterns automatically, with and without overlapped computations. The predictions derived from these models agree, within reasonable limits, with execution times of programs measured on the Intel iPSC/860 and Paragon. Further, we demonstrate the use of MK in selecting optimal computational grain size and studying various scalability metrics.

  10. Increasing fault resiliency in a message-passing environment.

    SciTech Connect

    Stearley, Jon R.; Riesen, Rolf E.; Laros, James H., III; Ferreira, Kurt Brian; Pedretti, Kevin Thomas Tauke; Oldfield, Ron A.; Kordenbrock, Todd; Brightwell, Ronald Brian

    2009-10-01

    Petaflops systems will have tens to hundreds of thousands of compute nodes which increases the likelihood of faults. Applications use checkpoint/restart to recover from these faults, but even under ideal conditions, applications running on more than 30,000 nodes will likely spend more than half of their total run time saving checkpoints, restarting, and redoing work that was lost. We created a library that performs redundant computations on additional nodes allocated to the application. An active node and its redundant partner form a node bundle which will only fail, and cause an application restart, when both nodes in the bundle fail. The goal of this library is to learn whether this can be done entirely at the user level, what requirements this library places on a Reliability, Availability, and Serviceability (RAS) system, and what its impact on performance and run time is. We find that our redundant MPI layer library imposes a relatively modest performance penalty for applications, but that it greatly reduces the number of applications interrupts. This reduction in interrupts leads to huge savings in restart and rework time. For large-scale applications the savings compensate for the performance loss and the additional nodes required for redundant computations.

  11. Preparing EBS messages

    SciTech Connect

    Vogt, B.M., Sorensen, J.H.

    1992-09-01

    Warning messages transmitted to populations at risk from an accidental release of chemical agent must be carefully designed to maximize appropriate responses from affected publics. This guide develops an approach for preparing Emergency Broadcast System (EBS) messages for the Chemical Stockpile Emergency Preparedness Program (CSEPP). Sample messages illustrate the application of this approach. While the sample messages do not cover every emergency situation, the texts are generic in that accident and location specific factors can be incorporated into the final message developed by local emergency planners. Thus they provide a starting point, not an end product, for emergency planners.

  12. Research of a synchronized cooperative GIS system based on message

    NASA Astrophysics Data System (ADS)

    Sun, Yaqin; Du, Peijun; Zhou, Liangchen

    2010-11-01

    In traditional electronic government GIS (E-gov GIS), spatial data evaluation, examination and approval are dealt with by individuals, and the results are shared among collaborators in asynchronous mode. In order to improve the collaborative ability of E-gov GIS, a message-based synchronized cooperative GIS system (MSCGIS) is proposed in this paper. MSCGIS abstracts collaborators' GIS operations and encapsulates them into GIS command messages. And then the GIS command messages are passed and executed among related collaborators. Based on messaging, MSCGIS can realize the GIS synchronized cooperation of group. Some key issues are investigated in detail, such as the design scheme of MSCGIS, the encoding specification of GIS command message based on XML, and the interface and the collaborative process of prototype system. In a word, the construction idea of MSCGIS is sharing the GIS functions through passing collaborators' operations, rather than sharing spatial data among collaborators in traditional modes.

  13. Research of a synchronized cooperative GIS system based on message

    NASA Astrophysics Data System (ADS)

    Sun, Yaqin; Du, Peijun; Zhou, Liangchen

    2009-09-01

    In traditional electronic government GIS (E-gov GIS), spatial data evaluation, examination and approval are dealt with by individuals, and the results are shared among collaborators in asynchronous mode. In order to improve the collaborative ability of E-gov GIS, a message-based synchronized cooperative GIS system (MSCGIS) is proposed in this paper. MSCGIS abstracts collaborators' GIS operations and encapsulates them into GIS command messages. And then the GIS command messages are passed and executed among related collaborators. Based on messaging, MSCGIS can realize the GIS synchronized cooperation of group. Some key issues are investigated in detail, such as the design scheme of MSCGIS, the encoding specification of GIS command message based on XML, and the interface and the collaborative process of prototype system. In a word, the construction idea of MSCGIS is sharing the GIS functions through passing collaborators' operations, rather than sharing spatial data among collaborators in traditional modes.

  14. SMC Message Browser Projects

    NASA Technical Reports Server (NTRS)

    Wichmann, Benjamin C.

    2013-01-01

    I work directly with the System Monitoring and Control (SMC) software engineers who develop, test and release custom and commercial software in support of the Kennedy Space Center Spaceport Command and Control System. (SCCS). SMC uses Commercial Off-The-Shelf (COTS) Enterprise Management Systems (EMS) software which provides a centralized subsystem for configuring, monitoring, and controlling SCCS hardware and software used in the Control Rooms. There are multiple projects being worked on using the COTS EMS software. I am currently working with the HP Operations Manager for UNIX (OMU) software which allows Master Console Operators (MCO) to access, view and interpret messages regarding the status of the SCCS hardware and software. The OMU message browser gets cluttered with messages which can make it difficult for the MCO to manage. My main project involves determining ways to reduce the number of messages being displayed in the OMU message browser. I plan to accomplish this task in two different ways: (1) by correlating multiple messages into one single message being displayed and (2) to create policies that will determine the significance of each message and whether or not it needs to be displayed to the MCO. The core idea is to lessen the number of messages being sent to the OMU message browser so the MCO can more effectively use it.

  15. The Argos seismic data message system.

    USGS Publications Warehouse

    Derr, J.S.; Hunter, R.N.

    1988-01-01

    A reliable, inexpensive method for sending limited daily seismic data messages from remote observatories to the National Earthquake Information Center has been developed for use with the Argos satellite system. Data messages are compressed on a microcomputer and passed automatically to a simple transmitter. About 4 hr later, the data are available at the National Earthquake Information Center, where they are decompressed and reformatted into standard telegrams for use in quick epicenter determinations. Epicenter data are available daily to the international scientific community.-Authors

  16. Scalable Replay with Partial-Order Dependencies for Message-Logging Fault Tolerance

    SciTech Connect

    Lifflander, Jonathan; Meneses, Esteban; Menon, Harshita; Miller, Phil; Krishnamoorthy, Sriram; Kale, Laxmikant

    2014-09-22

    Deterministic replay of a parallel application is commonly used for discovering bugs or to recover from a hard fault with message-logging fault tolerance. For message passing programs, a major source of overhead during forward execution is recording the order in which messages are sent and received. During replay, this ordering must be used to deterministically reproduce the execution. Previous work in replay algorithms often makes minimal assumptions about the programming model and application in order to maintain generality. However, in many cases, only a partial order must be recorded due to determinism intrinsic in the code, ordering constraints imposed by the execution model, and events that are commutative (their relative execution order during replay does not need to be reproduced exactly). In this paper, we present a novel algebraic framework for reasoning about the minimum dependencies required to represent the partial order for different concurrent orderings and interleavings. By exploiting this theory, we improve on an existing scalable message-logging fault tolerance scheme. The improved scheme scales to 131,072 cores on an IBM BlueGene/P with up to 2x lower overhead than one that records a total order.

  17. Launching Family Message Journals.

    ERIC Educational Resources Information Center

    Wollman-Bonilla, Julie

    This lesson introduces Family Message Journals, a tool for encouraging family involvement and supporting writing to reflect and learn. First and second graders are led into composing through demonstration, guided writing, and finally independent writing of messages that they will bring home for family to read and write a reply. During the three…

  18. Passing crisis and emergency risk communications: the effects of communication channel, information type, and repetition.

    PubMed

    Edworthy, Judy; Hellier, Elizabeth; Newbold, Lex; Titchener, Kirsteen

    2015-05-01

    Three experiments explore several factors which influence information transmission when warning messages are passed from person to person. In Experiment 1, messages were passed down chains of participants using five different modes of communication. Written communication channels resulted in more accurate message transmission than verbal. In addition, some elements of the message endured further down the chain than others. Experiment 2 largely replicated these effects and also demonstrated that simple repetition of a message eliminated differences between written and spoken communication. In a final field experiment, chains of participants passed information however they wanted to, with the proviso that half of the chains could not use telephones. Here, the lack of ability to use a telephone did not affect accuracy, but did slow down the speed of transmission from the recipient of the message to the last person in the chain. Implications of the findings for crisis and emergency risk communication are discussed.

  19. Message in a molecule.

    PubMed

    Sarkar, Tanmay; Selvakumar, Karuthapandi; Motiei, Leila; Margulies, David

    2016-05-03

    Since ancient times, steganography, the art of concealing information, has largely relied on secret inks as a tool for hiding messages. However, as the methods for detecting these inks improved, the use of simple and accessible chemicals as a means to secure communication was practically abolished. Here, we describe a method that enables one to conceal multiple different messages within the emission spectra of a unimolecular fluorescent sensor. Similar to secret inks, this molecular-scale messaging sensor (m-SMS) can be hidden on regular paper and the messages can be encoded or decoded within seconds using common chemicals, including commercial ingredients that can be obtained in grocery stores or pharmacies. Unlike with invisible inks, however, uncovering these messages by an unauthorized user is almost impossible because they are protected by three different defence mechanisms: steganography, cryptography and by entering a password, which are used to hide, encrypt or prevent access to the information, respectively.

  20. Message in a molecule

    PubMed Central

    Sarkar, Tanmay; Selvakumar, Karuthapandi; Motiei, Leila; Margulies, David

    2016-01-01

    Since ancient times, steganography, the art of concealing information, has largely relied on secret inks as a tool for hiding messages. However, as the methods for detecting these inks improved, the use of simple and accessible chemicals as a means to secure communication was practically abolished. Here, we describe a method that enables one to conceal multiple different messages within the emission spectra of a unimolecular fluorescent sensor. Similar to secret inks, this molecular-scale messaging sensor (m-SMS) can be hidden on regular paper and the messages can be encoded or decoded within seconds using common chemicals, including commercial ingredients that can be obtained in grocery stores or pharmacies. Unlike with invisible inks, however, uncovering these messages by an unauthorized user is almost impossible because they are protected by three different defence mechanisms: steganography, cryptography and by entering a password, which are used to hide, encrypt or prevent access to the information, respectively. PMID:27138465

  1. Expedition 34 Thanksgiving Message

    NASA Video Gallery

    Expedition 34 Commander Kevin Ford shares a Thanksgiving message from the International Space Station. Ford demonstrates how the crew will spend the holiday on orbit and describes the menu he and h...

  2. Instant Messaging by SIP

    NASA Astrophysics Data System (ADS)

    Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd

    2008-11-01

    SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.

  3. The Research of Message Bus Structure in LAMOST Control System

    NASA Astrophysics Data System (ADS)

    Xu, Ling-Zhe

    2008-09-01

    The LAMOST (Large sky Area Multi-Object fibre Spectroscopic Telescope) has now come to its final completion of R&D stage. Major functions of the telescope have successfully passed serial site tests recently, and various kinds of applications integrated into the automation of the telescope chamber is being under vigorous tests too. The TCS (Telescope Control System) is built on multi-layer distributed network platform with many sub-systems at different levels. How to efficiently process the enormous amount of messages with particular implications running in and out of the TCS is one of the major issues of the TCS software programming. This paper describes the mechanism and methodology of the LAMOST message bus structure. The realisation of message bus structure as a result of years of research and site test is presented in general, and dealing with the message priority and manipulating smallest pieces of message in parallel or in serial sequence are elaborated in particular.

  4. Establishing Passing Scores.

    ERIC Educational Resources Information Center

    McLarty, Joyce R.

    The problem of establishing appropriate passing scores is one of evaluation rather than estimation and not amenable to exact solution. It must therefore be approached by (1) identifying criteria for judging the acceptability of the passing score, (2) collecting the data appropriate to assessing each relevant criterion, and (3) judging how well the…

  5. The Prodiguer Messaging Platform

    NASA Astrophysics Data System (ADS)

    Greenslade, Mark; Denvil, Sebastien; Raciazek, Jerome; Carenton, Nicolas; Levavasseur, Guillame

    2014-05-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output (data and meta-data) are just some of the complexities that CONVERGENCE aims to resolve. The Institut Pierre Simon Laplace (IPSL) is responsible for running climate simulations upon a set of heterogenous HPC environments within France. With heterogeneity comes added complexity in terms of simulation instrumentation and control. Obtaining a global perspective upon the state of all simulations running upon all HPC environments has hitherto been problematic. In this presentation we detail how, within the context of CONVERGENCE, the implementation of the Prodiguer messaging platform resolves complexity and permits the development of real-time applications such as: 1. a simulation monitoring dashboard; 2. a simulation metrics visualizer; 3. an automated simulation runtime notifier; 4. an automated output data & meta-data publishing pipeline; The Prodiguer messaging platform leverages a widely used open source message broker software called RabbitMQ. RabbitMQ itself implements the Advanced Message Queue Protocol (AMPQ). Hence it will be demonstrated that the Prodiguer messaging platform is built upon both open source and open standards.

  6. LBNL SecureMessaging

    SciTech Connect

    Pery, Marcia; Agarwal, Deb

    2003-03-17

    The LBNLSecureMessaging application enables collaboration among colocated or geograhically dispersed users by supporting secure synchronous and asynchronous communication. This application is the graphical user interface client that is meant to be used in conjunction with servers (LBNL's PCCEServer and a customized IRC server) to allow group and one-to-one conversations via text-based instant messaging. Conversations may be private (by invitation only) or public (open to any member of a collaboratory group_ and they may be permanent and on-going or temporary and ad hoc. Users may leave notes for other people who are online or offline. By providing presence and awareness information, collaborators can easily locate each other and rendezvous. Written in Java/Swing, this application is cross-platform. To gain access to functionality, users have to be registered with an authorization server (PCCEServer) that maintains an access control list. Thus a collaboration group is comprised of a set of PCCE-registered users. Registered users can log in via either X.509 certificate or a username and password combination. PKI and SSL are used to authenticate servers and clients and to encrypt messages sent over the network. The LBNLSecureMessaging application offers instant messaging capabilities in a secure environment that provides data integrity, privacyk authorization, and authentication.

  7. Passing and Catching in Rugby.

    ERIC Educational Resources Information Center

    Namudu, Mike M.

    This booklet contains the fundamentals for rugby at the primary school level. It deals primarily with passing and catching the ball. It contains instructions on (1) holding the ball for passing, (2) passing the ball to the left--standing, (3) passing the ball to the left--running, (4) making a switch pass, (5) the scrum half's normal pass, (6) the…

  8. Particle-particle, particle-scaling function algorithm for electrostatic problems in free boundary conditions.

    PubMed

    Neelov, Alexey; Ghasemi, S Alireza; Goedecker, Stefan

    2007-07-14

    An algorithm for fast calculation of the Coulombic forces and energies of point particles with free boundary conditions is proposed. Its calculation time scales as N log N for N particles. This novel method has lower crossover point with the full O(N(2)) direct summation than the fast multipole method. The forces obtained by our algorithm are analytical derivatives of the energy which guarantees energy conservation during a molecular dynamics simulation. Our algorithm is very simple. A version of the code parallelized with the Message Passing Interface can be downloaded under the GNU General Public License from the website of our group.

  9. Parallel implementation of the FETI-DPEM algorithm for general 3D EM simulations

    NASA Astrophysics Data System (ADS)

    Li, Yu-Jia; Jin, Jian-Ming

    2009-05-01

    A parallel implementation of the electromagnetic dual-primal finite element tearing and interconnecting algorithm (FETI-DPEM) is designed for general three-dimensional (3D) electromagnetic large-scale simulations. As a domain decomposition implementation of the finite element method, the FETI-DPEM algorithm provides fully decoupled subdomain problems and an excellent numerical scalability, and thus is well suited for parallel computation. The parallel implementation of the FETI-DPEM algorithm on a distributed-memory system using the message passing interface (MPI) is discussed in detail along with a few practical guidelines obtained from numerical experiments. Numerical examples are provided to demonstrate the efficiency of the parallel implementation.

  10. A parallel encryption algorithm for dual-core processor based on chaotic map

    NASA Astrophysics Data System (ADS)

    Liu, Jiahui; Song, Dahua; Xu, Yiqiu

    2011-12-01

    In this paper, we propose a parallel chaos-based encryption scheme in order to take advantage of the dual-core processor. The chaos-based cryptosystem is combinatorially generated by the logistic map and Fibonacci sequence. Fibonacci sequence is employed to convert the value of the logistic map to integer data. The parallel algorithm is designed with a master/slave communication model with the Message Passing Interface (MPI). The experimental results show that chaotic cryptosystem possesses good statistical properties, and the parallel algorithm provides more enhanced performance against the serial version of the algorithm. It is suitable for encryption/decryption large sensitive data or multimedia.

  11. An Examination of Adolescent Recall of Anti-Smoking Messages: Attitudes, Message Type, and Message Perceptions.

    PubMed

    Bigsby, Elisabeth; Monahan, Jennifer L; Ewoldsen, David R

    2017-04-01

    Delayed message recall may be influenced by currently held accessible attitudes, the nature of the message, and message perceptions (perception of bias and message elaboration). This study examined the potential of message perceptions to mediate the influence of valenced attitude accessibility and message type on unaided recall of anti-smoking Public Service Announcements (PSAs). In a field experiment, ninth grade students (N = 244) watched three PSAs and responded to items on laptop computers. Twelve weeks later, follow-up telephone surveys were conducted to assess unaided recall. Both valenced attitude accessibility and message type were associated with message perceptions. However, only perception of message bias partially mediated the relationship between message type and unaided recall.

  12. Authentication of quantum messages.

    SciTech Connect

    Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D.; Smith, A.; Tapp, Alan

    2001-01-01

    Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

  13. Delivering the Starry Message

    NASA Astrophysics Data System (ADS)

    Krupp, Ed

    2009-05-01

    Although Galileo's telescopic revelations 400 years ago prompted the International Year of Astronomy, Galileo didn't just get a starry message at the instrument's eyepiece. He also sent one. He targeted a narrow audience_astronomers, philosphers, and scholars_with his account of his discoveries, but his report, his telescopes, and his observations became famous. Ordinary people were energized by astronomical discovery, and that continues today. The content of the astronomical messages has evolved, and so have the mechanisms of transmission. Public astronomy now helps sustain support for research, and like Galileo's telescope, it also transforms people personally and society broadly. The process is illustrated with a few highly subjective examples.

  14. Learning factorizations in estimation of distribution algorithms using affinity propagation.

    PubMed

    Santana, Roberto; Larrañaga, Pedro; Lozano, José A

    2010-01-01

    Estimation of distribution algorithms (EDAs) that use marginal product model factorizations have been widely applied to a broad range of mainly binary optimization problems. In this paper, we introduce the affinity propagation EDA (AffEDA) which learns a marginal product model by clustering a matrix of mutual information learned from the data using a very efficient message-passing algorithm known as affinity propagation. The introduced algorithm is tested on a set of binary and nonbinary decomposable functions and using a hard combinatorial class of problem known as the HP protein model. The results show that the algorithm is a very efficient alternative to other EDAs that use marginal product model factorizations such as the extended compact genetic algorithm (ECGA) and improves the quality of the results achieved by ECGA when the cardinality of the variables is increased.

  15. A parallelization of the row-searching algorithm

    NASA Astrophysics Data System (ADS)

    Yaici, Malika; Khaled, Hayet; Khaled, Zakia; Bentahar, Athmane

    2012-11-01

    The problem dealt in this paper concerns the parallelization of the row-searching algorithm which allows the search for linearly dependant rows on a given matrix and its implementation on MPI (Message Passing Interface) environment. This algorithm is largely used in control theory and more specifically in solving the famous diophantine equation. An introduction to the diophantine equation is presented, then two parallelization approaches of the algorithm are detailed. The first distributes a set of rows on processes (processors) and the second makes a distribution per blocks. The sequential algorithm and its two parallel forms are implemented using MPI routines, then modelled using UML (Unified Modelling Language) and finally evaluated using algorithmic complexity.

  16. Making health messages interesting.

    PubMed

    Gebreel, A O; Butt, J

    1997-01-01

    In Afghanistan a radio drama serial carrying messages vital to the well-being of the population, backed up by more detailed information in reinforcing radio programmes and a cartoon magazine, is proving effective in increasing people's knowledge of immunization and other subjects.

  17. Evaluating Personalized Risk Messages.

    ERIC Educational Resources Information Center

    Weinstein, Neil D.; And Others

    1992-01-01

    An experiment with 766 homeowners compared 3 strategies for delivering radon test results to homeowners. Small improvements in consumer satisfaction were found for personalized messages (a telephone call or personal letter) over a form letter. No detectable improvement was found in recall of advice or compliance for any strategy. (SLD)

  18. Research Messages 2010

    ERIC Educational Resources Information Center

    National Centre for Vocational Education Research (NCVER), 2011

    2011-01-01

    Research messages 2010 is a collection of summaries of research projects published by the National Centre for Vocational Education Research (NCVER). The summaries are clustered under five broad themes used by NCVER to organise its research and analysis: Industry and employers; Students and individuals; Teaching and learning: VET system; and VET in…

  19. Grounding in Instant Messaging

    ERIC Educational Resources Information Center

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  20. Are Instant Messages Speech?

    NASA Astrophysics Data System (ADS)

    Baron, Naomi S.

    Instant messaging (IM) is commonly viewed as a “spoken” medium, in light of its reputation for informality, non-standard spelling and punctuation, and use of lexical shortenings and emoticons. However, the actual nature of IM is an empirical issue that bears linguistic analysis.

  1. Message in a Bottle

    ERIC Educational Resources Information Center

    Gallagher, Joy

    2008-01-01

    In this article, the author shares a lesson that uses the Message in a Bottle concept. This lesson combines social studies, language arts, technology, and art, particularly studying and drawing portraits and utilizing values within a drawing. As part of their grade-four art curriculum, students are required to correctly proportion the face and the…

  2. Research Messages 2014

    ERIC Educational Resources Information Center

    National Centre for Vocational Education Research (NCVER), 2015

    2015-01-01

    "Research Messages 2014" is a collection of summaries of research published by the National Centre for Vocational Education Research (NCVER) in 2014 in the context of changing economic, industrial, social and education conditions, organised under the following broad categories: (1) Productivity: to sustain and build Australia's human…

  3. Research Messages 2011

    ERIC Educational Resources Information Center

    National Centre for Vocational Education Research (NCVER), 2012

    2012-01-01

    "Research messages 2011" is a collection of summaries of research projects published by National Centre for Vocational Education Research (NCVER) in 2011. The publication also has an overview essay that captures the themes and highlights from the research for the year, including: (1) the initial education and training of young people and…

  4. President's Message: "Forward"

    ERIC Educational Resources Information Center

    Starkman, Ken

    2006-01-01

    In this message from the ITEA president, he states that it is imperative that ITEA convey a shared mission and philosophy, foster leadership, and grow a large audience of supportive professional members while remaining agile enough to withstand generational and political changes that naturally occur over time. The strategic plan of ITEA focuses on…

  5. Understanding Telex Messages.

    ERIC Educational Resources Information Center

    Kitto, Michael

    1984-01-01

    Examines the problems of writing grammatical rules for the writing of telexes and makes some suggestions as to how to teach comprehension of telex messages. Emphasizes the inconsistency in style, length, and form of telexes, and the impact this has had on international correspondence, which involves many nonnative speakers of English. (SL)

  6. The Prodiguer Messaging Platform

    NASA Astrophysics Data System (ADS)

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  7. YAMPA: Yet Another Matching Pursuit Algorithm for compressive sensing

    NASA Astrophysics Data System (ADS)

    Lodhi, Muhammad A.; Voronin, Sergey; Bajwa, Waheed U.

    2016-05-01

    State-of-the-art sparse recovery methods often rely on the restricted isometry property for their theoretical guarantees. However, they cannot explicitly incorporate metrics such as restricted isometry constants within their recovery procedures due to the computational intractability of calculating such metrics. This paper formulates an iterative algorithm, termed yet another matching pursuit algorithm (YAMPA), for recovery of sparse signals from compressive measurements. YAMPA differs from other pursuit algorithms in that: (i) it adapts to the measurement matrix using a threshold that is explicitly dependent on two computable coherence metrics of the matrix, and (ii) it does not require knowledge of the signal sparsity. Performance comparisons of YAMPA against other matching pursuit and approximate message passing algorithms are made for several types of measurement matrices. These results show that while state-of-the-art approximate message passing algorithms outperform other algorithms (including YAMPA) in the case of well-conditioned random matrices, they completely break down in the case of ill-conditioned measurement matrices. On the other hand, YAMPA and comparable pursuit algorithms not only result in reasonable performance for well-conditioned matrices, but their performance also degrades gracefully for ill-conditioned matrices. The paper also shows that YAMPA uniformly outperforms other pursuit algorithms for the case of thresholding parameters chosen in a clairvoyant fashion. Further, when combined with a simple and fast technique for selecting thresholding parameters in the case of ill-conditioned matrices, YAMPA outperforms other pursuit algorithms in the regime of low undersampling, although some of these algorithms can outperform YAMPA in the regime of high undersampling in this setting.

  8. Concurrent Smalltalk on the Message-Driven Processor

    DTIC Science & Technology

    1991-09-01

    NDPSim -x 2 -y 2 - maize Ox1O00 ::Coamoa:Coamoa.m NewFact.mdp Message-Driven Processor Simulator Version 7.0 Rev B Accompanies MDP Architecture Document...it could peel invocations of recursive functions forever. However, the sin- gle pass of inlining does not mean that functions are only inlined one

  9. Couriers in the Inca Empire: Getting Your Message Across. [Lesson Plan].

    ERIC Educational Resources Information Center

    2002

    This lesson shows how the Inca communicated across the vast stretches of their mountain realm, the largest empire of the pre-industrial world. The lesson explains how couriers carried messages along mountain-ridge roads, up and down stone steps, and over chasm-spanning footbridges. It states that couriers could pass a message from Quito (Ecuador)…

  10. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    PubMed

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  11. Remote Asynchronous Message Service Gateway

    NASA Technical Reports Server (NTRS)

    Wang, Shin-Ywan; Burleigh, Scott C.

    2011-01-01

    The Remote Asynchronous Message Service (RAMS) gateway is a special-purpose AMS application node that enables exchange of AMS messages between nodes residing in different AMS "continua," notionally in different geographical locations. JPL s implementation of RAMS gateway functionality is integrated with the ION (Interplanetary Overlay Network) implementation of the DTN (Delay-Tolerant Networking) bundle protocol, and with JPL s implementation of AMS itself. RAMS protocol data units are encapsulated in ION bundles and are forwarded to the neighboring RAMS gateways identified in the source gateway s AMS management information base. Each RAMS gateway has interfaces in two communication environments: the AMS message space it serves, and the RAMS network - the grid or tree of mutually aware RAMS gateways - that enables AMS messages produced in one message space to be forwarded to other message spaces of the same venture. Each gateway opens persistent, private RAMS network communication channels to the RAMS gateways of other message spaces for the same venture, in other continua. The interconnected RAMS gateways use these communication channels to forward message petition assertions and cancellations among themselves. Each RAMS gateway subscribes locally to all subjects that are of interest in any of the linked message spaces. On receiving its copy of a message on any of these subjects, the RAMS gateway node uses the RAMS network to forward the message to every other RAMS gateway whose message space contains at least one node that has subscribed to messages on that subject. On receiving a message via the RAMS network from some other RAMS gateway, the RAMS gateway node forwards the message to all subscribers in its own message space.

  12. Sequoia Messaging Rate Benchmark

    SciTech Connect

    Friedley, Andrew

    2008-01-22

    The purpose of this benchmark is to measure the maximal message rate of a single compute node. The first num_cores ranks are expected to reside on the 'core' compute node for which message rate is being tested. After that, the next num_nbors ranks are neighbors for the first core rank, the next set of num_nbors ranks are neighbors for the second core rank, and so on. For example, testing an 8-core node (num_cores = 8) with 4 neighbors (num_nbors = 4) requires 8 + 8 * 4 - 40 ranks. The first 8 of those 40 ranks are expected to be on the 'core' node being benchmarked, while the rest of the ranks are on separate nodes.

  13. On "Passing" through Adolescence.

    ERIC Educational Resources Information Center

    Uttermohlen, T. L.

    1997-01-01

    The author, born with a severe visual impairment, addresses the tendency of adolescents with visual impairments to try to hide the disability and "pass" as unimpaired with their peers. It is suggested that these adolescents be helped to find a comfortable balance between taking excessive risks and allowing visual impairment or blindness to be an…

  14. Algorithm for solving the linear Cauchy problem for large systems of ordinary differential equations with the use of parallel computations

    NASA Astrophysics Data System (ADS)

    Moryakov, A. V.

    2016-12-01

    An algorithm for solving the linear Cauchy problem for large systems of ordinary differential equations is presented. The algorithm for systems of first-order differential equations is implemented in the EDELWEISS code with the possibility of parallel computations on supercomputers employing the MPI (Message Passing Interface) standard for the data exchange between parallel processes. The solution is represented by a series of orthogonal polynomials on the interval [0, 1]. The algorithm is characterized by simplicity and the possibility to solve nonlinear problems with a correction of the operator in accordance with the solution obtained in the previous iterative process.

  15. Extracting hidden messages in steganographic images

    DOE PAGES

    Quach, Tu-Thach

    2014-07-17

    The eventual goal of steganalytic forensic is to extract the hidden messages embedded in steganographic images. A promising technique that addresses this problem partially is steganographic payload location, an approach to reveal the message bits, but not their logical order. It works by finding modified pixels, or residuals, as an artifact of the embedding process. This technique is successful against simple least-significant bit steganography and group-parity steganography. The actual messages, however, remain hidden as no logical order can be inferred from the located payload. This paper establishes an important result addressing this shortcoming: we show that the expected mean residualsmore » contain enough information to logically order the located payload provided that the size of the payload in each stego image is not fixed. The located payload can be ordered as prescribed by the mean residuals to obtain the hidden messages without knowledge of the embedding key, exposing the vulnerability of these embedding algorithms. We provide experimental results to support our analysis.« less

  16. Extracting hidden messages in steganographic images

    SciTech Connect

    Quach, Tu-Thach

    2014-07-17

    The eventual goal of steganalytic forensic is to extract the hidden messages embedded in steganographic images. A promising technique that addresses this problem partially is steganographic payload location, an approach to reveal the message bits, but not their logical order. It works by finding modified pixels, or residuals, as an artifact of the embedding process. This technique is successful against simple least-significant bit steganography and group-parity steganography. The actual messages, however, remain hidden as no logical order can be inferred from the located payload. This paper establishes an important result addressing this shortcoming: we show that the expected mean residuals contain enough information to logically order the located payload provided that the size of the payload in each stego image is not fixed. The located payload can be ordered as prescribed by the mean residuals to obtain the hidden messages without knowledge of the embedding key, exposing the vulnerability of these embedding algorithms. We provide experimental results to support our analysis.

  17. Multi-pass microscopy

    NASA Astrophysics Data System (ADS)

    Juffmann, Thomas; Klopfer, Brannon B.; Frankort, Timmo L. I.; Haslinger, Philipp; Kasevich, Mark A.

    2016-09-01

    Microscopy of biological specimens often requires low light levels to avoid damage. This yields images impaired by shot noise. An improved measurement accuracy at the Heisenberg limit can be achieved exploiting quantum correlations. If sample damage is the limiting resource, an equivalent limit can be reached by passing photons through a specimen multiple times sequentially. Here we use self-imaging cavities and employ a temporal post-selection scheme to present full-field multi-pass polarization and transmission micrographs with variance reductions of 4.4+/-0.8 dB (11.6+/-0.8 dB in a lossless setup) and 4.8+/-0.8 dB, respectively, compared with the single-pass shot-noise limit. If the accuracy is limited by the number of detected probe particles, our measurements show a variance reduction of 25.9+/-0.9 dB. The contrast enhancement capabilities in imaging and in diffraction studies are demonstrated with nanostructured samples and with embryonic kidney 293T cells. This approach to Heisenberg-limited microscopy does not rely on quantum state engineering.

  18. Multi-pass microscopy

    PubMed Central

    Juffmann, Thomas; Klopfer, Brannon B.; Frankort, Timmo L.I.; Haslinger, Philipp; Kasevich, Mark A.

    2016-01-01

    Microscopy of biological specimens often requires low light levels to avoid damage. This yields images impaired by shot noise. An improved measurement accuracy at the Heisenberg limit can be achieved exploiting quantum correlations. If sample damage is the limiting resource, an equivalent limit can be reached by passing photons through a specimen multiple times sequentially. Here we use self-imaging cavities and employ a temporal post-selection scheme to present full-field multi-pass polarization and transmission micrographs with variance reductions of 4.4±0.8 dB (11.6±0.8 dB in a lossless setup) and 4.8±0.8 dB, respectively, compared with the single-pass shot-noise limit. If the accuracy is limited by the number of detected probe particles, our measurements show a variance reduction of 25.9±0.9 dB. The contrast enhancement capabilities in imaging and in diffraction studies are demonstrated with nanostructured samples and with embryonic kidney 293T cells. This approach to Heisenberg-limited microscopy does not rely on quantum state engineering. PMID:27670525

  19. Secret Message Science Goggles

    ERIC Educational Resources Information Center

    DeVita, Christina; Ruppert, Sarah

    2007-01-01

    Light is radiation in wavelengths composed of many colors that are visible to the eyes. These wavelengths can be separated. One way to separate colors is with a filter. Filters keep certain wavelengths out and allow other wavelengths to pass through. In this article, the authors discuss an activity to provide students the opportunity to build a…

  20. Electronic Message Preservation Act

    THOMAS, 111th Congress

    Rep. Hodes, Paul W. [D-NH-2

    2009-03-09

    03/18/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  1. Message Technology Research and Development

    DTIC Science & Technology

    1976-08-01

    for immediate sending or for further editing. New automatic HERMES-crcated fields are generated corresponding to the new sender and date. We also...are not copied, so that the new outgoing message receives a new SENDER field, a new DATE, and a new MESSAGE-ID. 2. Three new message-fields were...switches were installed a) STARTWITHINBOX (Ask-Yes-No) controls whether KERMES Gets the user’s Inbox , MESSAGE.TXT;1, when the user enters the system

  2. [Message from Lyme].

    PubMed

    Wahlberg, P

    1993-01-01

    The background to the discovery of Lyme disease teaches a salutary lesson. The symptoms and signs of this disease had been observed by doctors for a century, particularly in the Scandinavian countries, without anybody being able to draw the right conclusions. The first patients were identified in the USA by their relatives or by themselves. Recognition of their plight by the medical profession was chiefly due to the patients' tenacity. We must remember to pay attention to what patients tell us; they may often be right, even when they seem to be wrong. Where fact and theory are incompatible, it is theory, not fact, that needs to be amended. In all likelihood, we all from time to time observe disorders in our patients that are inconsistent with established scientific models, but which we nevertheless attempt to squeeze into these models. Such an approach is not uncommon in the history of medicine. The message from Lyme calls for humility and reflexion.

  3. The psychology of nutrition messages.

    PubMed

    Schofield, Heather; Mullainathan, Sendhil

    2008-01-01

    The purpose of this paper is to explore consumer thinking about nutrition decisions and how firms can use consumers' awareness of the links between nutrients and health generated by public health messages to market products, including ones, which have little nutritional value. We approach this issue by tracking the development of public health messages based on scientific research, dissemination of those messages in the popular press, and use of nutrition claims in food advertisements to assess whether firms are timing the use of nutrition claims to take advantage of heuristic-based decision-making. Our findings suggest that the timing of the development of nutrition information, its dissemination in the press, and use in advertising accords well with a heuristic processing model in which firms take advantage of associations between nutrient information and health in their advertisements. However, the demonstrated relationships may not be causal. Further research will be needed to provide stronger and more comprehensive evidence regarding the proposed message hijacking process. If the message hijacking framework is borne out: (1) simple overall health rating scales could significantly improve consumer decision-making, (2) the impact of misleading advertisements could be mitigated by encouraging a multidimensional view of nutrition, and (3) more intensive regulation of product labeling could limit the impact of hijacked messages. Overall, this paper considers a novel hypothesis about the impact of public health messages on nutrition and health.

  4. Improving scalability with loop transformations and message aggregation in parallel object-oriented frameworks for scientific computing

    SciTech Connect

    Bassetti, F.; Davis, K.; Quinlan, D.

    1998-09-01

    Application codes reliably achieve performance far less than the advertised capabilities of existing architectures, and this problem is worsening with increasingly-parallel machines. For large-scale numerical applications, stencil operations often impose the great part of the computational cost, and the primary sources of inefficiency are the costs of message passing and poor cache utilization. This paper proposes and demonstrates optimizations for stencil and stencil-like computations for both serial and parallel environments that ameliorate these sources of inefficiency. Achieving scalability, they believe, requires both algorithm design and compile-time support. The optimizations they present are automatable because the stencil-like computations are implemented at a high level of abstraction using object-oriented parallel array class libraries. These optimizations, which are beyond the capabilities of today compilers, may be performed automatically by a preprocessor such as the one they are currently developing.

  5. Priority nutrition messages.

    PubMed

    1991-01-01

    The Philippine Food and Nutrition Program deliver priority short, simple, clear, and action filled nutrition messages in different languages and dialects to different audiences. Its 1st priority task is to promote breast feeding. It informs mothers that breast milk is the most nutritious food for infants and that it protects them from infectious diseases. The program also encourages breast feeding as long as possible. If mothers cannot breast feed, they should talk to an infant nutrition expert to help them choose the best formula and learn about proper preparation. A 4-6 month infant needs to begin eating small amounts of semisolid nutritious foods. Moreover these foods must include body building foods, such as meat and eggs, and energy providing foods, such as corn and rice. Mothers must 1st attend to food needs of infants and preschoolers since they are more likely to suffer malnutrition than older children and adults. This is especially important when they suffer from an infection. Specifically, the very young need a variety of foods each day including the vitamin and mineral rich vegetables and fruits. In fact, families should grow their own fruits and vegetables to ensure an adequate supply. Hands must be cleaned with soap and water after defecation and before preparing foods. Mothers should add fats and oils when preparing foods because they provide concentrated energy, fatty acids, and fat soluble vitamins. Pregnant mothers must consume increased amounts of fish, beans, and other body building foods as well as regulating foods (vegetables and fruits). Mothers must also space births. They should weigh children each month to monitor nutritional levels. Moreover they must pay attention to signs indicating inadequate and insufficient food intake e.g., underweight and night blindness.

  6. Broadcasting a message in a parallel computer

    DOEpatents

    Archer, Charles J; Faraj, Daniel A

    2014-11-18

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer that includes: transmitting, by the logical root to all of the nodes directly connected to the logical root, a message; and for each node except the logical root: receiving the message; if that node is the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received; if that node received the message from a parent node and if that node is not a leaf node, then transmitting the message to all of the child nodes; and if that node received the message from a child node and if that node is not the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received and transmitting the message to the parent node.

  7. Broadcasting a message in a parallel computer

    DOEpatents

    Archer, Charles J; Faraj, Ahmad A

    2013-04-16

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer that includes: transmitting, by the logical root to all of the nodes directly connected to the logical root, a message; and for each node except the logical root: receiving the message; if that node is the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received; if that node received the message from a parent node and if that node is not a leaf node, then transmitting the message to all of the child nodes; and if that node received the message from a child node and if that node is not the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received and transmitting the message to the parent node.

  8. Military Message Experiment. Volume II.

    DTIC Science & Technology

    1982-04-01

    elements of the Department of Defense. This resulted in a memorandum from the Director, Telecomunications and Comand and Control, OSD, in June 1975...1978 to April 1979 and provides a discussion of the telecomunications inter- face aspects of the experiment. This Final Report covers the period of...arise in the telecomunication system which require A retransmission of an outgoing message. A "service" message may be created within the

  9. A parallel systematic-Monte Carlo algorithm for exploring conformational space.

    PubMed

    Perez-Riverol, Yasset; Vera, Roberto; Mazola, Yuliet; Musacchio, Alexis

    2012-01-01

    Computational algorithms to explore the conformational space of small molecules are complex and computer demand field in chemoinformatics. In this paper a hybrid algorithm to explore the conformational space of organic molecules is presented. This hybrid algorithm is based in a systematic search approach combined with a Monte Carlo based method in order to obtain an ensemble of low-energy conformations simulating the flexibility of small chemical compounds. The Monte Carlo method uses the Metropolis criterion to accept or reject a conformation through an in-house implementation of the MMFF94s force field to calculate the conformational energy. The parallel design of this algorithm, based on the message passing interface (MPI) paradigm, was implemented. The results showed a performance increase in the terms of speed and efficiency.

  10. DoD Message Protocol Report. Volume II. Message Transfer Protocol Requirements Analysis.

    DTIC Science & Technology

    1981-12-15

    transmission instructions. This assurance can, in principle, be provided by either the message service (where a message is prepared) or by the message...transfer protocol. This document does not assume it is always practical for a message service to assure message correctness and so prescribes... assure service and speed to urgent messages. The protocol must also ensure aginst unauthorized access to high precedence service . When a message

  11. Multiple pass laser amplifier system

    DOEpatents

    Brueckner, Keith A.; Jorna, Siebe; Moncur, N. Kent

    1977-01-01

    A laser amplification method for increasing the energy extraction efficiency from laser amplifiers while reducing the energy flux that passes through a flux limited system which includes apparatus for decomposing a linearly polarized light beam into multiple components, passing the components through an amplifier in delayed time sequence and recombining the amplified components into an in phase linearly polarized beam.

  12. Streamlined one-pass modelling

    SciTech Connect

    Jones, J.H.; Harne, R.L.; Firth, K.J.; Meyer, G.A.

    1986-01-01

    Streamlined one-pass models provide an alternative to the standard type of one-pass models for departure from nucleate boiling ratio (DNBR) studies, which require a large number of computer simulations. The standard one-pass models simulate the limiting subchannel (subchannel in which minimum DNBR occurs), a ring of subchannels around the limiting subchannel, the remainder of the limiting bundle, and the remainder of the core. Typically, these standard models use from 8 to 12 channels and approx.20 cross-flow gaps. Babcock and Wilcox (B and W) has developed streamlined one-pass models that require approximately one-half the number of channels and approx.20% of the computer resources as the standard one-pass models. These streamlined models are applicable in one-pass analysis codes such as the B and W code LYNXT and the Electric Power Research Institute VIPRE code. Streamlined one-pass models are particularly suited to extensive studies wherein computer cost and turnaround are critical, without sacrificing DNBR accuracy. Examples of such studies are reactor protection operating limit determination, limiting transient selection, and scoping studies. Moreover, streamlined one-pass models make it possible to perform DNBR studies on personal computers (PCs) using PC-adapted codes such as COBRAPC.

  13. Simultaneous message framing and error detection

    NASA Technical Reports Server (NTRS)

    Frey, A. H., Jr.

    1968-01-01

    Circuitry simultaneously inserts message framing information and detects noise errors in binary code data transmissions. Separate message groups are framed without requiring both framing bits and error-checking bits, and predetermined message sequence are separated from other message sequences without being hampered by intervening noise.

  14. Boosting Achievement with Messages that Motivate

    ERIC Educational Resources Information Center

    Dweck, Carol S.

    2007-01-01

    Almost everything educators say to their students sends a message. Some messages enhance students' motivation, but other messages undermine it. What should teachers say to students to send messages that motivate? In a survey given to parents, over 80% of them thought that it was necessary to praise their children's intelligence in order to give…

  15. Using Text Messages to Communicate with Patrons

    ERIC Educational Resources Information Center

    Konshak, Peter

    2009-01-01

    Text messaging is an ideal communications method for libraries, which often want to send short, concise messages to their patrons near and far. Uses for text messaging in libraries include reminders about items' due dates, hold pickup notices, program reminders, and even short messages of content. Some libraries are already using text messaging…

  16. Mission Services Evolution Center Message Bus

    NASA Technical Reports Server (NTRS)

    Mayorga, Arturo; Bristow, John O.; Butschky, Mike

    2011-01-01

    The Goddard Mission Services Evolution Center (GMSEC) Message Bus is a robust, lightweight, fault-tolerant middleware implementation that supports all messaging capabilities of the GMSEC API. This architecture is a distributed software system that routes messages based on message subject names and knowledge of the locations in the network of the interested software components.

  17. Spectral element methods: Algorithms and architectures

    NASA Technical Reports Server (NTRS)

    Fischer, Paul; Ronquist, Einar M.; Dewey, Daniel; Patera, Anthony T.

    1988-01-01

    Spectral element methods are high-order weighted residual techniques for partial differential equations that combine the geometric flexibility of finite element methods with the rapid convergence of spectral techniques. Spectral element methods are described for the simulation of incompressible fluid flows, with special emphasis on implementation of spectral element techniques on medium-grained parallel processors. Two parallel architectures are considered: the first, a commercially available message-passing hypercube system; the second, a developmental reconfigurable architecture based on Geometry-Defining Processors. High parallel efficiency is obtained in hypercube spectral element computations, indicating that load balancing and communication issues can be successfully addressed by a high-order technique/medium-grained processor algorithm-architecture coupling.

  18. MessageSpace: a messaging system for health research

    NASA Astrophysics Data System (ADS)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  19. Data communications for a collective operation in a parallel active messaging interface of a parallel computer

    DOEpatents

    Faraj, Daniel A

    2013-07-16

    Algorithm selection for data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI, including associating in the PAMI data communications algorithms and bit masks; receiving in an origin endpoint of the PAMI a collective instruction, the instruction specifying transmission of a data communications message from the origin endpoint to a target endpoint; constructing a bit mask for the received collective instruction; selecting, from among the associated algorithms and bit masks, a data communications algorithm in dependence upon the constructed bit mask; and executing the collective instruction, transmitting, according to the selected data communications algorithm from the origin endpoint to the target endpoint, the data communications message.

  20. Data communications for a collective operation in a parallel active messaging interface of a parallel computer

    DOEpatents

    Faraj, Daniel A.

    2015-11-19

    Algorithm selection for data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI, including associating in the PAMI data communications algorithms and bit masks; receiving in an origin endpoint of the PAMI a collective instruction, the instruction specifying transmission of a data communications message from the origin endpoint to a target endpoint; constructing a bit mask for the received collective instruction; selecting, from among the associated algorithms and bit masks, a data communications algorithm in dependence upon the constructed bit mask; and executing the collective instruction, transmitting, according to the selected data communications algorithm from the origin endpoint to the target endpoint, the data communications message.

  1. Parallel simulated annealing algorithms for cell placement on hypercube multiprocessors

    NASA Technical Reports Server (NTRS)

    Banerjee, Prithviraj; Jones, Mark Howard; Sargent, Jeff S.

    1990-01-01

    Two parallel algorithms for standard cell placement using simulated annealing are developed to run on distributed-memory message-passing hypercube multiprocessors. The cells can be mapped in a two-dimensional area of a chip onto processors in an n-dimensional hypercube in two ways, such that both small and large cell exchange and displacement moves can be applied. The computation of the cost function in parallel among all the processors in the hypercube is described, along with a distributed data structure that needs to be stored in the hypercube to support the parallel cost evaluation. A novel tree broadcasting strategy is used extensively for updating cell locations in the parallel environment. A dynamic parallel annealing schedule estimates the errors due to interacting parallel moves and adapts the rate of synchronization automatically. Two novel approaches in controlling error in parallel algorithms are described: heuristic cell coloring and adaptive sequence control.

  2. Distributed-Memory Computing With the Langley Aerothermodynamic Upwind Relaxation Algorithm (LAURA)

    NASA Technical Reports Server (NTRS)

    Riley, Christopher J.; Cheatwood, F. McNeil

    1997-01-01

    The Langley Aerothermodynamic Upwind Relaxation Algorithm (LAURA), a Navier-Stokes solver, has been modified for use in a parallel, distributed-memory environment using the Message-Passing Interface (MPI) standard. A standard domain decomposition strategy is used in which the computational domain is divided into subdomains with each subdomain assigned to a processor. Performance is examined on dedicated parallel machines and a network of desktop workstations. The effect of domain decomposition and frequency of boundary updates on performance and convergence is also examined for several realistic configurations and conditions typical of large-scale computational fluid dynamic analysis.

  3. Skil: An imperative language with algorithmic skeletons for efficient distributed programming

    SciTech Connect

    Botorog, G.H.; Kuchen, H.

    1996-12-31

    In this paper we present Skil, an imperative language enhanced with higher-order functions and currying, as well as with a polymorphic type system. The high level of Skil allows the integration of algorithmic skeletons, i.e. of higher-order functions representing parallel computation patterns. At the same time, the language can be efficiently implemented. After describing a series of skeletons which work with distributed arrays, we give two examples of parallel programs implemented on the basis of skeletons, namely shortest paths in graphs and Gaussian elimination. Runtime measurements show that we approach the efficiency of message-passing C up to a factor between 1 and 2.5.

  4. Model of stacked long Josephson junctions: Parallel algorithm and numerical results in case of weak coupling

    NASA Astrophysics Data System (ADS)

    Zemlyanaya, E. V.; Bashashin, M. V.; Rahmonov, I. R.; Shukrinov, Yu. M.; Atanasova, P. Kh.; Volokhova, A. V.

    2016-10-01

    We consider a model of system of long Josephson junctions (LJJ) with inductive and capacitive coupling. Corresponding system of nonlinear partial differential equations is solved by means of the standard three-point finite-difference approximation in the spatial coordinate and utilizing the Runge-Kutta method for solution of the resulting Cauchy problem. A parallel algorithm is developed and implemented on a basis of the MPI (Message Passing Interface) technology. Effect of the coupling between the JJs on the properties of LJJ system is demonstrated. Numerical results are discussed from the viewpoint of effectiveness of parallel implementation.

  5. Extraction of Questions Behind Messages

    NASA Astrophysics Data System (ADS)

    Matsumura, Naohiro; Kawahara, Daisuke; Okamoto, Masashi; Kurohashi, Sadao; Nishida, Toyoaki

    To overcome the limitation of conventional text-mining approaches in which frequent patterns of word occurrences are to be extracted to understand obvious user needs, this paper proposes an approach to extracting questions behind messages to understand potential user needs. We first extract characteristic case frames by comparing the case frames constructed from target messages with the ones from 25M sentences in the Web and 20M sentences in newspaper articles of 20 years. Then we extract questions behind messages by transforming the characteristic case frames into interrogative sentences based on new information and old information, i.e., replacing new information with WH-question words. The proposed approach is, in other words, a kind of classification of word occurrence pattern. Qualitative evaluations of our preliminary experiments suggest that extracted questions show problem consciousness and alternative solutions -- all of which help to understand potential user needs.

  6. A parallel adaptive mesh refinement algorithm

    NASA Technical Reports Server (NTRS)

    Quirk, James J.; Hanebutte, Ulf R.

    1993-01-01

    Over recent years, Adaptive Mesh Refinement (AMR) algorithms which dynamically match the local resolution of the computational grid to the numerical solution being sought have emerged as powerful tools for solving problems that contain disparate length and time scales. In particular, several workers have demonstrated the effectiveness of employing an adaptive, block-structured hierarchical grid system for simulations of complex shock wave phenomena. Unfortunately, from the parallel algorithm developer's viewpoint, this class of scheme is quite involved; these schemes cannot be distilled down to a small kernel upon which various parallelizing strategies may be tested. However, because of their block-structured nature such schemes are inherently parallel, so all is not lost. In this paper we describe the method by which Quirk's AMR algorithm has been parallelized. This method is built upon just a few simple message passing routines and so it may be implemented across a broad class of MIMD machines. Moreover, the method of parallelization is such that the original serial code is left virtually intact, and so we are left with just a single product to support. The importance of this fact should not be underestimated given the size and complexity of the original algorithm.

  7. The mushroom message.

    PubMed

    Zimmerman, M

    1992-04-28

    A basic law of ecology is that living things are tightly dependent on one another, often in ways that are not easy to imagine. Who, for example, would have predicted that when the last dodo was killed in 1675, that death would lead to the slow extermination of the tambalocoque tree, whose fruits germinate only after passing through the dodo's digestive system? Now no natural strands of tambalocoque younger than 300 years can be found. Or who would have predicted that clear-cutting tropical rainforests would so significantly alter local weather patterns that the tropical rainforest biome itself and its vast diversity of life might not survive? Such interactions are worth noting because of the possible ramifications of a phenomenon that ecologists have just begun to document. Mushrooms worldwide appear to be in a catastrophic state of decline. Throughout Europe, in countries with terrains as diverse as Holland, Germany, Austria, Czechoslovakia, Poland and England, wild mushrooms are becoming increasingly difficult to find. Those fungi that are found are significantly smaller than those found years ago. Preliminary data suggest that the same troubling situation is occurring throughout North American as well. The decline has been so precipitous that biologists have begun to refer to it as a mass extinction. The 2 obvious explanations for the demise of the mushrooms--habitat destruction and overpicking of edible types by an ever growing human population--have been ruled out. Sophisticated sampling schemes designed by ecologists control for the fact that there is less land available for wild mushrooms; they have been declining at a rate that far exceeds the rate at which land is being developed. The fact that the decline has affected both edible and inedible mushrooms equally indicates that humans hunting for tasty treats are not the main cause of the problem. The loss of wild mushrooms worldwide might not seem like that big a deal, but the consequences may well be grave

  8. Modularity, reuse and efficiency with message-driven libraries

    SciTech Connect

    Kale, L.V.; Gursoy, A.

    1995-12-01

    Software re-use via libraries is a strategy that allows the cost of software to be amortized. A parallel programming system must support the ability to develop modules that can be {open_quotes}fitted together{close_quotes} in a variety of contexts. Although it is important to be able to reuse parallel libraries, it is also more difficult to use parallel modules in comparison to sequential module. We present a methodology for developing libraries that addresses these issues effectively. The methodology, which is embodied in the Charm system, employs message-driven execution (in contrast to traditional, receive based message passing), information sharing abstractions, the notion of branched objects, and explicit support for modules.

  9. EDITORIAL: Message from the Editor

    NASA Astrophysics Data System (ADS)

    Thomas, Paul

    2009-01-01

    The end of 2008 cannot pass without remarking that the economic news has repeatedly strengthened the case for nuclear fusion; not perhaps to solve the immediate crises but to offer long-term security of energy supply. Although temporary, the passage of the price of oil through 100 per barrel is a portent of things to come and should bolster our collective determination to develop nuclear fusion into a viable energy source. It is with great pride, therefore, that I can highlight the contributions that the Nuclear Fusion journal has made to the research programme and the consolidation of its position as the lead journal in the field. Of course, the journal would be nothing without its authors and referees and I would like to pass on my sincere thanks to them all for their work in 2008 and look forward to a continuing, successful collaboration in 2009. Refereeing The Nuclear Fusion Editorial Office understands how much effort is required of our referees. The Editorial Board decided that an expression of thanks to our most loyal referees is appropriate and so, since January 2005, we have been offering the top ten most loyal referees over the past year a personal subscription to Nuclear Fusion with electronic access for one year, free of charge. To select the top referees we have adopted the criterion that a researcher should have acted as a referee or adjudicator for at least two different manuscripts during the period from November 2007 to November 2008 and provided particularly detailed advice to the authors. We have excluded our Board members and those referees who were already listed in the last four years. According to our records the following people met this criterion. Congratulations and many, many thanks! T. Hino (Hokkaido University, Japan) M. Sugihara (ITER Cadarache, France) M. Dreval (Saskatchewan University, Canada) M. Fenstermacher (General Atomics, USA) V.S. Marchenko (Institute for Nuclear Research, Ukraine) G.V. Pereverzev (Max-Planck-Institut fuer

  10. Re: Design Changing the Message

    ERIC Educational Resources Information Center

    Wall, Miranda Wakeman

    2008-01-01

    The advertisements that flood everyone's visual culture are designed to create desire. From the author's experience, most high school students are not aware of the messages that they are bombarded with every day, and if they are, few care or think about them critically. The author's goals for this lesson were to increase students' awareness of the…

  11. [Presidential Message on Indian Affairs.

    ERIC Educational Resources Information Center

    Nixon, Richard

    President Nixon's message pointed out the deprivation and the injustices which the American Indians have suffered for centuries. It was noted that now is the time to break with the past and create conditions for a new era in which the Indian future is determined by Indian acts and decisions. The relationship between the Federal Government and the…

  12. Representing culture in interstellar messages

    NASA Astrophysics Data System (ADS)

    Vakoch, Douglas A.

    2008-09-01

    As scholars involved with the Search for Extraterrestrial Intelligence (SETI) have contemplated how we might portray humankind in any messages sent to civilizations beyond Earth, one of the challenges they face is adequately representing the diversity of human cultures. For example, in a 2003 workshop in Paris sponsored by the SETI Institute, the International Academy of Astronautics (IAA) SETI Permanent Study Group, the International Society for the Arts, Sciences and Technology (ISAST), and the John Templeton Foundation, a varied group of artists, scientists, and scholars from the humanities considered how to encode notions of altruism in interstellar messages . Though the group represented 10 countries, most were from Europe and North America, leading to the group's recommendation that subsequent discussions on the topic should include more globally representative perspectives. As a result, the IAA Study Group on Interstellar Message Construction and the SETI Institute sponsored a follow-up workshop in Santa Fe, New Mexico, USA in February 2005. The Santa Fe workshop brought together scholars from a range of disciplines including anthropology, archaeology, chemistry, communication science, philosophy, and psychology. Participants included scholars familiar with interstellar message design as well as specialists in cross-cultural research who had participated in the Symposium on Altruism in Cross-cultural Perspective, held just prior to the workshop during the annual conference of the Society for Cross-cultural Research . The workshop included discussion of how cultural understandings of altruism can complement and critique the more biologically based models of altruism proposed for interstellar messages at the 2003 Paris workshop. This paper, written by the chair of both the Paris and Santa Fe workshops, will explore the challenges of communicating concepts of altruism that draw on both biological

  13. Fast parallel algorithms for short-range molecular dynamics

    SciTech Connect

    Plimpton, S.

    1993-05-01

    Three parallel algorithms for classical molecular dynamics are presented. The first assigns each processor a subset of atoms; the second assigns each a subset of inter-atomic forces to compute; the third assigns each a fixed spatial region. The algorithms are suitable for molecular dynamics models which can be difficult to parallelize efficiently -- those with short-range forces where the neighbors of each atom change rapidly. They can be implemented on any distributed-memory parallel machine which allows for message-passing of data between independently executing processors. The algorithms are tested on a standard Lennard-Jones benchmark problem for system sizes ranging from 500 to 10,000,000 atoms on three parallel supercomputers, the nCUBE 2, Intel iPSC/860, and Intel Delta. Comparing the results to the fastest reported vectorized Cray Y-MP and C90 algorithm shows that the current generation of parallel machines is competitive with conventional vector supercomputers even for small problems. For large problems, the spatial algorithm achieves parallel efficiencies of 90% and the Intel Delta performs about 30 times faster than a single Y-MP processor and 12 times faster than a single C90 processor. Trade-offs between the three algorithms and guidelines for adapting them to more complex molecular dynamics simulations are also discussed.

  14. Monitors, messages, and clusters : the p4 parallel programming system.

    SciTech Connect

    Butler, R. M.; Lusk, E. T.; Mathematics and Computer Science; Univ. of North Florida

    1994-01-01

    p4 is a portable library of C and Fortran subroutines for programming parallel computers. It is the current version of a system that has been in use since 1984. It includes features for explicit parallel programming of shared-memory machines, distributed-memory machines (including heterogeneous networks of workstations), and clusters, by which we mean shared-memory multiprocessors communicating via message passing. We discuss here the design goals, history, and system architecture of p4 and describe briefly a diverse collection of applications that have demonstrated the utility of p4.

  15. Evaluation of a new parallel numerical parameter optimization algorithm for a dynamical system

    NASA Astrophysics Data System (ADS)

    Duran, Ahmet; Tuncel, Mehmet

    2016-10-01

    It is important to have a scalable parallel numerical parameter optimization algorithm for a dynamical system used in financial applications where time limitation is crucial. We use Message Passing Interface parallel programming and present such a new parallel algorithm for parameter estimation. For example, we apply the algorithm to the asset flow differential equations that have been developed and analyzed since 1989 (see [3-6] and references contained therein). We achieved speed-up for some time series to run up to 512 cores (see [10]). Unlike [10], we consider more extensive financial market situations, for example, in presence of low volatility, high volatility and stock market price at a discount/premium to its net asset value with varying magnitude, in this work. Moreover, we evaluated the convergence of the model parameter vector, the nonlinear least squares error and maximum improvement factor to quantify the success of the optimization process depending on the number of initial parameter vectors.

  16. Parallel OSEM Reconstruction Algorithm for Fully 3-D SPECT on a Beowulf Cluster.

    PubMed

    Rong, Zhou; Tianyu, Ma; Yongjie, Jin

    2005-01-01

    In order to improve the computation speed of ordered subset expectation maximization (OSEM) algorithm for fully 3-D single photon emission computed tomography (SPECT) reconstruction, an experimental beowulf-type cluster was built and several parallel reconstruction schemes were described. We implemented a single-program-multiple-data (SPMD) parallel 3-D OSEM reconstruction algorithm based on message passing interface (MPI) and tested it with combinations of different number of calculating processors and different size of voxel grid in reconstruction (64×64×64 and 128×128×128). Performance of parallelization was evaluated in terms of the speedup factor and parallel efficiency. This parallel implementation methodology is expected to be helpful to make fully 3-D OSEM algorithms more feasible in clinical SPECT studies.

  17. Txt2MEDLINE: Text-Messaging Access to MEDLINE/PubMed

    PubMed Central

    Fontelo, Paul; Liu, Fang; Muin, Michael; Tolentino, Herman; Ackerman, Michael

    2006-01-01

    We developed a text messaging system for processing incoming Short Message Service (SMS) queries, retrieving medical journal citations from MEDLINE/PubMed and sending them back to the user in the text message format. A database of medical terminology abbreviations and acronyms was developed to reduce the size of text in journal citations and abstracts because of the 160-character per message limit of text messages. Queries may be sent as full-length terms or abbreviations. An algorithm transforms the citations into the SMS format. An abbreviated TBL (the bottom-line) summary instead of the full abstract is sent to the mobile device to shorten the resulting text. The system decreases citation size by 77.5±7.9%. Txt2MEDLINE provides physicians and healthcare personnel another rapid and convenient method for searching MEDLINE/PubMed through wireless mobile devices. It is accessible from any location worldwide where GSM wireless service is available. PMID:17238343

  18. Toward Predicting Popularity of Social Marketing Messages

    NASA Astrophysics Data System (ADS)

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  19. Practice What You Preach about Goodwill Messages.

    ERIC Educational Resources Information Center

    Casady, Mona J.

    1985-01-01

    Suggests ways for students to experience the impact of written messages and for teachers to promote good public relations through the use of goodwill messages. Examples include the use of verbal compliments and personal business letters. (EL)

  20. Perceived effectiveness of messages promoting hand hygiene.

    PubMed

    Taylor, Ronald E

    2017-03-01

    Eighty-six infection control specialists evaluated 24 messages promoting hand hygiene (HH). Brief, simple messages using appeals to social situations and to ego (self-efficacy) were rated as most likely to increase HH compliance.

  1. Presentation of dynamically overlapping auditory messages in user interfaces

    SciTech Connect

    Papp, III, Albert Louis

    1997-09-01

    This dissertation describes a methodology and example implementation for the dynamic regulation of temporally overlapping auditory messages in computer-user interfaces. The regulation mechanism exists to schedule numerous overlapping auditory messages in such a way that each individual message remains perceptually distinct from all others. The method is based on the research conducted in the area of auditory scene analysis. While numerous applications have been engineered to present the user with temporally overlapped auditory output, they have generally been designed without any structured method of controlling the perceptual aspects of the sound. The method of scheduling temporally overlapping sounds has been extended to function in an environment where numerous applications can present sound independently of each other. The Centralized Audio Presentation System is a global regulation mechanism that controls all audio output requests made from all currently running applications. The notion of multimodal objects is explored in this system as well. Each audio request that represents a particular message can include numerous auditory representations, such as musical motives and voice. The Presentation System scheduling algorithm selects the best representation according to the current global auditory system state, and presents it to the user within the request constraints of priority and maximum acceptable latency. The perceptual conflicts between temporally overlapping audio messages are examined in depth through the Computational Auditory Scene Synthesizer. At the heart of this system is a heuristic-based auditory scene synthesis scheduling method. Different schedules of overlapped sounds are evaluated and assigned penalty scores. High scores represent presentations that include perceptual conflicts between over-lapping sounds. Low scores indicate fewer and less serious conflicts. A user study was conducted to validate that the perceptual difficulties predicted by

  2. A public-key cryptosystem for quantum message transmission

    NASA Astrophysics Data System (ADS)

    Yang, Li

    2005-01-01

    We present a quantum public-key cryptography protocol for quantum message transmission. The private key of this protocol includes three classical matrices: a generator matrix of a Goppa code, an invertible matrix and a permutation matrix. The public key is product of these three matrices. The encryption and decryption algorithms are merely quantum computations related with the transformations between bases of the quantum registers. The security of this protocol is based on the hypothesis that there is no effective algorithm of NP-complete problem.

  3. 47 CFR 10.420 - Message elements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Message elements. 10.420 Section 10.420... § 10.420 Message elements. A WEA Alert Message processed by a Participating CMS Provider shall include five mandatory CAP elements—Event Type; Area Affected; Recommended Action; Expiration Time (with...

  4. 47 CFR 10.420 - Message elements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Message elements. 10.420 Section 10.420... Requirements § 10.420 Message elements. A CMAS Alert Message processed by a Participating CMS Provider shall include five mandatory CAP elements—Event Type; Area Affected; Recommended Action; Expiration Time...

  5. 47 CFR 10.420 - Message elements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Message elements. 10.420 Section 10.420... Requirements § 10.420 Message elements. A CMAS Alert Message processed by a Participating CMS Provider shall include five mandatory CAP elements—Event Type; Area Affected; Recommended Action; Expiration Time...

  6. 47 CFR 10.420 - Message elements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Message elements. 10.420 Section 10.420... § 10.420 Message elements. A WEA Alert Message processed by a Participating CMS Provider shall include five mandatory CAP elements—Event Type; Area Affected; Recommended Action; Expiration Time (with...

  7. 47 CFR 10.420 - Message elements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Message elements. 10.420 Section 10.420... Requirements § 10.420 Message elements. A CMAS Alert Message processed by a Participating CMS Provider shall include five mandatory CAP elements—Event Type; Area Affected; Recommended Action; Expiration Time...

  8. Deaf Children's Referential Messages to Mother.

    ERIC Educational Resources Information Center

    MacKay-Soroka, Sherri; And Others

    1987-01-01

    Examination of the nature and quality of deaf children's referential messages to their mothers, the outcome of such messages, and the reformulations of "failed" messages. Deaf children 6-10 years old, from oral or bimodal educational programs, were tested in two tasks involving identification and description of a picture. (Author/BN)

  9. Static analysis techniques for semiautomatic synthesis of message passing software skeletons

    DOE PAGES

    Sottile, Matthew; Dagit, Jason; Zhang, Deli; ...

    2015-06-29

    The design of high-performance computing architectures demands performance analysis of large-scale parallel applications to derive various parameters concerning hardware design and software development. The process of performance analysis and benchmarking an application can be done in several ways with varying degrees of fidelity. One of the most cost-effective ways is to do a coarse-grained study of large-scale parallel applications through the use of program skeletons. The concept of a “program skeleton” that we discuss in this article is an abstracted program that is derived from a larger program where source code that is determined to be irrelevant is removed formore » the purposes of the skeleton. In this work, we develop a semiautomatic approach for extracting program skeletons based on compiler program analysis. Finally, we demonstrate correctness of our skeleton extraction process by comparing details from communication traces, as well as show the performance speedup of using skeletons by running simulations in the SST/macro simulator.« less

  10. Static analysis techniques for semiautomatic synthesis of message passing software skeletons

    SciTech Connect

    Sottile, Matthew; Dagit, Jason; Zhang, Deli; Hendry, Gilbert; Dechev, Damian

    2015-06-29

    The design of high-performance computing architectures demands performance analysis of large-scale parallel applications to derive various parameters concerning hardware design and software development. The process of performance analysis and benchmarking an application can be done in several ways with varying degrees of fidelity. One of the most cost-effective ways is to do a coarse-grained study of large-scale parallel applications through the use of program skeletons. The concept of a “program skeleton” that we discuss in this article is an abstracted program that is derived from a larger program where source code that is determined to be irrelevant is removed for the purposes of the skeleton. In this work, we develop a semiautomatic approach for extracting program skeletons based on compiler program analysis. Finally, we demonstrate correctness of our skeleton extraction process by comparing details from communication traces, as well as show the performance speedup of using skeletons by running simulations in the SST/macro simulator.

  11. Run-time scheduling and execution of loops on message passing machines

    NASA Technical Reports Server (NTRS)

    Saltz, Joel; Crowley, Kathleen; Mirchandaney, Ravi; Berryman, Harry

    1990-01-01

    Sparse system solvers and general purpose codes for solving partial differential equations are examples of the many types of problems whose irregularity can result in poor performance on distributed memory machines. Often, the data structures used in these problems are very flexible. Crucial details concerning loop dependences are encoded in these structures rather than being explicitly represented in the program. Good methods for parallelizing and partitioning these types of problems require assignment of computations in rather arbitrary ways. Naive implementations of programs on distributed memory machines requiring general loop partitions can be extremely inefficient. Instead, the scheduling mechanism needs to capture the data reference patterns of the loops in order to partition the problem. First, the indices assigned to each processor must be locally numbered. Next, it is necessary to precompute what information is needed by each processor at various points in the computation. The precomputed information is then used to generate an execution template designed to carry out the computation, communication, and partitioning of data, in an optimized manner. The design is presented for a general preprocessor and schedule executer, the structures of which do not vary, even though the details of the computation and of the type of information are problem dependent.

  12. Run-time scheduling and execution of loops on message passing machines

    NASA Technical Reports Server (NTRS)

    Crowley, Kay; Saltz, Joel; Mirchandaney, Ravi; Berryman, Harry

    1989-01-01

    Sparse system solvers and general purpose codes for solving partial differential equations are examples of the many types of problems whose irregularity can result in poor performance on distributed memory machines. Often, the data structures used in these problems are very flexible. Crucial details concerning loop dependences are encoded in these structures rather than being explicitly represented in the program. Good methods for parallelizing and partitioning these types of problems require assignment of computations in rather arbitrary ways. Naive implementations of programs on distributed memory machines requiring general loop partitions can be extremely inefficient. Instead, the scheduling mechanism needs to capture the data reference patterns of the loops in order to partition the problem. First, the indices assigned to each processor must be locally numbered. Next, it is necessary to precompute what information is needed by each processor at various points in the computation. The precomputed information is then used to generate an execution template designed to carry out the computation, communication, and partitioning of data, in an optimized manner. The design is presented for a general preprocessor and schedule executer, the structures of which do not vary, even though the details of the computation and of the type of information are problem dependent.

  13. rMPI : increasing fault resiliency in a message-passing environment.

    SciTech Connect

    Stearley, Jon R.; Laros, James H., III; Ferreira, Kurt Brian; Pedretti, Kevin Thomas Tauke; Oldfield, Ron A.; Riesen, Rolf; Brightwell, Ronald Brian

    2011-04-01

    As High-End Computing machines continue to grow in size, issues such as fault tolerance and reliability limit application scalability. Current techniques to ensure progress across faults, like checkpoint-restart, are unsuitable at these scale due to excessive overheads predicted to more than double an applications time to solution. Redundant computation, long used in distributed and mission critical systems, has been suggested as an alternative to checkpoint-restart on its own. In this paper we describe the rMPI library which enables portable and transparent redundant computation for MPI applications. We detail the design of the library as well as two replica consistency protocols, outline the overheads of this library at scale on a number of real-world applications, and finally outline the significant increase in an applications time to solution at extreme scale as well as show the scenarios in which redundant computation makes sense.

  14. Automated Generation of Message-Passing Programs: An Evaluation Using CAPTools

    NASA Technical Reports Server (NTRS)

    Hribar, Michelle R.; Jin, Haoqiang; Yan, Jerry C.; Saini, Subhash (Technical Monitor)

    1998-01-01

    Scientists at NASA Ames Research Center have been developing computational aeroscience applications on highly parallel architectures over the past ten years. During that same time period, a steady transition of hardware and system software also occurred, forcing us to expend great efforts into migrating and re-coding our applications. As applications and machine architectures become increasingly complex, the cost and time required for this process will become prohibitive. In this paper, we present the first set of results in our evaluation of interactive parallelization tools. In particular, we evaluate CAPTool's ability to parallelize computational aeroscience applications. CAPTools was tested on serial versions of the NAS Parallel Benchmarks and ARC3D, a computational fluid dynamics application, on two platforms: the SGI Origin 2000 and the Cray T3E. This evaluation includes performance, amount of user interaction required, limitations and portability. Based on these results, a discussion on the feasibility of computer aided parallelization of aerospace applications is presented along with suggestions for future work.

  15. Automated Generation of Message-Passing Programs: An Evaluation Using CAPTools

    NASA Technical Reports Server (NTRS)

    Hribar, Michelle R.; Yan, Jerry C.; Jin, Haoqiang; Saini, Subhah (Technical Monitor)

    2002-01-01

    Scientists at NASA Ames Research Center have been developing computational aeroscience applications on highly parallel architectures over the past ten years. During that same time period, a steady transition of hardware and system software also occurred, forcing us to expend great efforts into migrating and re-coding our applications. As applications and machine architectures become increasingly complex, the cost and time required for this process will become prohibitive. In this paper, we present the first set of results in our evaluation of interactive parallelization tools. In particular, we evaluate CAPTool's ability to parallelize computational aeroscience applications. CAPTools was tested on serial versions of the NAS Parallel Benchmarks and ARC3D, a computational fluid dynamics application, on two platforms: the SGI Origin 2000 and the Cray T3E. This evaluation includes performance, amount of user interaction required, limitations and portability. Based on these results, a discussion on the feasibility of computer aided parallelization of aerospace applications is presented along with suggestions for future work.

  16. Automated Generation of Message-Passing Programs: An Evaluation of CAPTools using NAS Benchmarks

    NASA Technical Reports Server (NTRS)

    Hribar, Michelle R.; Jin, Hao-Qiang; Yan, Jerry C.; Bailey, David (Technical Monitor)

    1998-01-01

    Scientists at NASA Ames Research Center have been developing computational aeroscience applications on highly parallel architectures over the past ten years. During the same time period, a steady transition of hardware and system software also occurred, forcing us to expand great efforts into migrating and receding our applications. As applications and machine architectures continue to become increasingly complex, the cost and time required for this process will become prohibitive. Various attempts to exploit software tools to assist and automate the parallelization process have not produced favorable results. In this paper, we evaluate an interactive parallelization tool, CAPTools, for parallelizing serial versions of the NAB Parallel Benchmarks. Finally, we compare the performance of the resulting CAPTools generated code to the hand-coded benchmarks on the Origin 2000 and IBM SP2. Based on these results, a discussion on the feasibility of automated parallelization of aerospace applications is presented along with suggestions for future work.

  17. Interpreting a Museum Exhibit: The Message Effectiveness and Cost Effectiveness of Alternative Audio Messages.

    ERIC Educational Resources Information Center

    Hambleton, Susan K.

    In this Masters Thesis, the message effectiveness and cost effectiveness (in terms of costs and monetary benefits) of two interpretive audio messages were evaluated. Ninety-nine randomly selected visitors to a Central Ohio interpretive museum were exposed to one of two audio tape recorded messages. One message used interpretive technique; the…

  18. Instant Messaging in Dental Education.

    PubMed

    Khatoon, Binish; Hill, Kirsty B; Walmsley, A Damien

    2015-12-01

    Instant messaging (IM) is when users communicate instantly via their mobile devices, and it has become one of the most preferred choices of tools to communicate amongst health professions students. The aim of this study was to understand how dental students communicate via IM, faculty members' perspectives on using IM to communicate with students, and whether such tools are useful in the learning environment. After free-associating themes on online communication, two draft topic guides for structured interviews were designed that focussed on mobile device-related communication activities. A total of 20 students and six faculty members at the University of Birmingham School of Dentistry agreed to take part in the interviews. Students were selected from years 1-5 representing each year group. The most preferred communication tools were emails, social networking, and IM. Emails were used for more formal messages, and IM and social networking sites were used for shorter messages. WhatsApp was the most used IM app because of its popular features such as being able to check if recipients have read and received messages and group work. The students reported that changes were necessary to improve their communication with faculty members. The faculty members reported having mixed feelings toward the use of IM to communicate with students. The students wished to make such tools a permanent part of their learning environment, but only with the approval of faculty members. The faculty members were willing to accept IM as a communication tool only if it is monitored and maintained by the university and has a positive effect on learning.

  19. Usage of the hybrid encryption in a cloud instant messages exchange system

    NASA Astrophysics Data System (ADS)

    Kvyetnyy, Roman N.; Romanyuk, Olexander N.; Titarchuk, Evgenii O.; Gromaszek, Konrad; Mussabekov, Nazarbek

    2016-09-01

    A new approach for constructing cloud instant messaging represented in this article allows users to encrypt data locally by using Diffie - Hellman key exchange protocol. The described approach allows to construct a cloud service which operates only by users encrypted messages; encryption and decryption takes place locally at the user party using a symmetric AES encryption. A feature of the service is the conferences support without the need for messages reecryption for each participant. In the article it is given an example of the protocol implementation on the ECC and RSA encryption algorithms basis, as well as a comparison of these implementations.

  20. Multi-pass light amplifier

    NASA Technical Reports Server (NTRS)

    Plaessmann, Henry (Inventor); Grossman, William M. (Inventor)

    1997-01-01

    A multiple-pass laser amplifier that uses optical focusing between subsequent passes through a single gain medium so that a reproducibly stable beam size is achieved within the gain region. A confocal resonator or White Cell resonator is provided, including two or three curvilinearly shaped mirrors facing each other along a resonator axis and an optical gain medium positioned on the resonator axis between the mirrors (confocal resonator) or adjacent to one of the mirrors (White Cell). In a first embodiment, two mirrors, which may include adjacent lenses, are configured so that a light beam passing through the gain medium and incident on the first mirror is reflected by that mirror toward the second mirror in a direction approximately parallel to the resonator axis. A light beam translator, such as an optical flat of transparent material, is positioned to translate this light beam by a controllable amount toward or away from the resonator axis for each pass of the light beam through the translator. The optical gain medium may be solid-state, liquid or gaseous medium and may be pumped longitudinally or transversely. In a second embodiment, first and second mirrors face a third mirror in a White Cell configuration, and the optical gain medium is positioned at or adjacent to one of the mirrors. Defocusing means and optical gain medium cooling means are optionally provided with either embodiment, to controllably defocus the light beam, to cool the optical gain medium and to suppress thermal lensing in the gain medium.

  1. Preparing EBS messages. [Emergency Broadcast System (EBS)

    SciTech Connect

    Vogt, B.M., Sorensen, J.H.

    1992-09-01

    Warning messages transmitted to populations at risk from an accidental release of chemical agent must be carefully designed to maximize appropriate responses from affected publics. This guide develops an approach for preparing Emergency Broadcast System (EBS) messages for the Chemical Stockpile Emergency Preparedness Program (CSEPP). Sample messages illustrate the application of this approach. While the sample messages do not cover every emergency situation, the texts are generic in that accident and location specific factors can be incorporated into the final message developed by local emergency planners. Thus they provide a starting point, not an end product, for emergency planners.

  2. Distributed parallel messaging for multiprocessor systems

    SciTech Connect

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  3. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  4. Asynchronous Message Service Reference Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to

  5. Messages about appearance, food, weight and exercise in "tween" television.

    PubMed

    Simpson, Courtney C; Kwitowski, Melissa; Boutte, Rachel; Gow, Rachel W; Mazzeo, Suzanne E

    2016-12-01

    Tweens (children ages ~8-14years) are a relatively recently defined age group, increasingly targeted by marketers. Individuals in this age group are particularly vulnerable to opinions and behaviors presented in media messages, given their level of cognitive and social development. However, little research has examined messages about appearance, food, weight, and exercise in television specifically targeting tweens, despite the popularity of this media type among this age group. This study used a content analytic approach to explore these messages in the five most popular television shows for tweens on the Disney Channel (as of 2015). Using a multiple-pass approach, relevant content in episodes from the most recently completed seasons of each show was coded. Appearance related incidents occurred in every episode; these most frequently mentioned attractiveness/beauty. Food related incidents were also present in every episode; typically, these situations were appearance and weight neutral. Exercise related incidents occurred in 53.3% of episodes; the majority expressed resistance to exercise. Weight related incidents occurred in 40.0% of the episodes; the majority praised the muscular ideal. Women were more likely to initiate appearance incidents, and men were more likely to initiate exercise incidents. These results suggest that programs specifically marketed to tweens reinforce appearance ideals, including stereotypes about female attractiveness and male athleticism, two constructs linked to eating pathology and body dissatisfaction. Given the developmental vulnerability of the target group, these findings are concerning, and highlight potential foci for prevention programming, including media literacy, for tweens.

  6. 78 FR 35625 - Sabine Pass Liquefaction Expansion, LLC; Sabine Pass Liquefaction, LLC; Sabine Pass LNG, L.P...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-13

    ..., LLC; Sabine Pass LNG, L.P.; Cheniere Creole Trail Pipeline, L.P.: Notice of Intent To Prepare an... Sabine Pass Liquefaction Expansion, LLC; Sabine Pass Liquefaction, LLC; and Sabine Pass LNG, L.P... metric tonnes of liquefied natural gas (LNG) per annum (mtpa) via LNG carriers. Trains 5 and 6...

  7. A Decompositional Approach to Executing Quality Data Model Algorithms on the i2b2 Platform

    PubMed Central

    Mo, Huan; Jiang, Guoqian; Pacheco, Jennifer A.; Kiefer, Richard; Rasmussen, Luke V.; Pathak, Jyotishman; Denny, Joshua C.; Thompson, William K.

    2016-01-01

    The Quality Data Model (QDM) is an established standard for representing electronic clinical quality measures on electronic health record (EHR) repositories. The Informatics for Integrated Biology and the Bedside (i2b2) is a widely used platform for implementing clinical data repositories. However, translation from QDM to i2b2 is challenging, since QDM allows for complex queries beyond the capability of single i2b2 messages. We have developed an approach to decompose complex QDM algorithms into workflows of single i2b2 messages, and execute them on the KNIME data analytics platform. Each workflow operation module is composed of parameter lists, a template for the i2b2 message, an mechanism to create parameter updates, and a web service call to i2b2. The communication between workflow modules relies on passing keys ofi2b2 result sets. As a demonstration of validity, we describe the implementation and execution of a type 2 diabetes mellitus phenotype algorithm against an i2b2 data repository. PMID:27570665

  8. 27 CFR 9.88 - Pacheco Pass.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Pacheco Pass. 9.88 Section... Pass. (a) Name. The name of the viticultural area described in this section is “Pacheco Pass.” (b) Approved maps. The appropriate maps for determining the boundaries of Pacheco Pass viticultural area...

  9. 34 CFR 668.147 - Passing scores.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Passing scores. 668.147 Section 668.147 Education...; Specification of Passing Score; Approval of State Process § 668.147 Passing scores. Except as provided in §§ 668... education and training offered, the Secretary specifies that the passing score on each approved test is...

  10. Key paediatric messages from Amsterdam

    PubMed Central

    Barben, Jürg; Bohlin, Kajsa; Everard, Mark L.; Hall, Graham; Pijnenburg, Mariëlle; Priftis, Kostas N.; Rusconi, Franca; Midulla, Fabio

    2016-01-01

    The Paediatric Assembly of the European Respiratory Society (ERS) maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress. PMID:27730186

  11. Message Technology Research and Development

    DTIC Science & Technology

    1976-12-01

    and continue with your work. 5. New Mail Notice Before Quitting If you Quit HERMES and there is new mail in your INBOX , HERMES notifies you, then...uses the Mail Forwarding Data Base (MFDB) to check addresses. At present, an active MFDB is implemented only on the five BBN systems. The MFDB...names in the Tor-field of the original message. a i l ä I •5 + a a y 1. Host Names Supplied Correctly a) Replying to the From: and Sender

  12. Processes of incremental message planning during conversation.

    PubMed

    Brown-Schmidt, Sarah; Konopka, Agnieszka E

    2015-06-01

    Speaking begins with the formulation of an intended preverbal message and linguistic encoding of this information. The transition from thought to speech occurs incrementally, with cascading planning at subsequent levels of production. In this article, we aim to specify the mechanisms that support incremental message preparation. We contrast two hypotheses about the mechanisms responsible for incorporating message-level information into a linguistic plan. According to the Initial Preparation view, messages can be encoded as fluent utterances if all information is ready before speaking begins. By contrast, on the Continuous Incrementality view, messages can be continually prepared and updated throughout the production process, allowing for fluent production even if new information is added to the message while speaking is underway. Testing these hypotheses, eye-tracked speakers in two experiments produced unscripted, conjoined noun phrases with modifiers. Both experiments showed that new message elements can be incrementally incorporated into the utterance even after articulation begins, consistent with a Continuous Incrementality view of message planning, in which messages percolate to linguistic encoding immediately as that information becomes available in the mind of the speaker. We conclude by discussing the functional role of incremental message planning in conversational speech and the situations in which this continuous incremental planning would be most likely to be observed.

  13. Regulatory fit messages and physical activity motivation.

    PubMed

    Pfeffer, Ines

    2013-04-01

    Targeted communication about health behaviors seems to be more effective than mass communication in which undifferentiated audiences receive identical messages. Regulatory focus is psychological variable that can be used to build two target groups: promotion-focused or prevention-focused people. It is hypothesized that targeting messages to an individual's regulatory focus creates regulatory fit and is more successful to promote a physically active lifestyle than nonfit messages. Two different print messages promoting a physically active lifestyle derived from regulatory focus theory (promotion message vs. prevention message) were randomly assigned to N = 98 participants after measuring their regulatory focus. It was examined whether regulatory fit between the regulatory focus and the assigned print message would lead to more positive evaluations in the dependent variables inclination toward the message (preference for the message), intention to perform the behavior, prospective and retrospective feelings associated with the behavior (positive and negative), and perceived value of the behavior directly after reading the message. Hierarchical linear regression analyses revealed that regulatory fit led to stronger intentions in the prevention-message condition and more prospective positive and retrospective positive feelings associated with the behavior in the promotion-message condition in contrast to the nonfit conditions. Prospective positive feelings associated with the behavior mediated the effect of regulatory fit on intention. The results partly provided support for the regulatory fit concept. Matching print messages to the regulatory focus of individuals seems to be a useful approach to enhance physical activity motivation. Future studies should include an objective measure of physical activity behavior.

  14. Application of a Tsunami Warning Message Metric to refine NOAA NWS Tsunami Warning Messages

    NASA Astrophysics Data System (ADS)

    Gregg, C. E.; Johnston, D.; Sorensen, J.; Whitmore, P.

    2013-12-01

    In 2010, the U.S. National Weather Service (NWS) funded a three year project to integrate social science into their Tsunami Program. One of three primary requirements of the grant was to make improvements to tsunami warning messages of the NWS' two Tsunami Warning Centers- the West Coast/Alaska Tsunami Warning Center (WCATWC) in Palmer, Alaska and the Pacific Tsunami Warning Center (PTWC) in Ewa Beach, Hawaii. We conducted focus group meetings with a purposive sample of local, state and Federal stakeholders and emergency managers in six states (AK, WA, OR, CA, HI and NC) and two US Territories (US Virgin Islands and American Samoa) to qualitatively asses information needs in tsunami warning messages using WCATWC tsunami messages for the March 2011 Tohoku earthquake and tsunami event. We also reviewed research literature on behavioral response to warnings to develop a tsunami warning message metric that could be used to guide revisions to tsunami warning messages of both warning centers. The message metric is divided into categories of Message Content, Style, Order and Formatting and Receiver Characteristics. A message is evaluated by cross-referencing the message with the operational definitions of metric factors. Findings are then used to guide revisions of the message until the characteristics of each factor are met. Using findings from this project and findings from a parallel NWS Warning Tiger Team study led by T. Nicolini, the WCATWC implemented the first of two phases of revisions to their warning messages in November 2012. A second phase of additional changes, which will fully implement the redesign of messages based on the metric, is in progress. The resulting messages will reflect current state-of-the-art knowledge on warning message effectiveness. Here we present the message metric; evidence-based rational for message factors; and examples of previous, existing and proposed messages.

  15. Multi-pass light amplifier

    NASA Technical Reports Server (NTRS)

    Plaessmann, Henry (Inventor); Grossman, William M. (Inventor); Olson, Todd E. (Inventor)

    1996-01-01

    A multiple-pass laser amplifier that uses optical focusing between subsequent passes through a single gain medium so that a reproducibly stable beam size is achieved within the gain region. A resonator or a White Cell cavity is provided, including two or more mirrors (planar or curvilinearly shaped) facing each other along a resonator axis and an optical gain medium positioned on a resonator axis between the mirrors or adjacent to one of the mirrors. In a first embodiment, two curvilinear mirrors, which may include adjacent lenses, are configured so that a light beam passing through the gain medium and incident on the first mirror is reflected by that mirror toward the second mirror in a direction approximately parallel to the resonator axis. A light beam translator, such as an optical flat of transparent material, is positioned to translate this light beam by a controllable amount toward or away from the resonator axis for each pass of the light beam through the translator. A second embodiment uses two curvilinear mirrors and one planar mirror, with a gain medium positioned in the optical path between each curvilinear mirror and the planar mirror. A third embodiment uses two curvilinear mirrors and two planar mirrors, with a gain medium positioned adjacent to a planar mirror. A fourth embodiment uses a curvilinear mirror and three planar mirrors, with a gain medium positioned adjacent to a planar mirror. A fourth embodiment uses four planar mirrors and a focusing lens system, with a gain medium positioned between the four mirrors. A fifth embodiment uses first and second planar mirrors, a focusing lens system and a third mirror that may be planar or curvilinear, with a gain medium positioned adjacent to the third mirror. A sixth embodiment uses two planar mirrors and a curvilinear mirror and a fourth mirror that may be planar or curvilinear, with a gain medium positioned adjacent to the fourth mirror. In a seventh embodiment, first and second mirrors face a third

  16. Message framing in social networking sites.

    PubMed

    Kao, Danny Tengti; Chuang, Shih-Chieh; Wang, Sui-Min; Zhang, Lei

    2013-10-01

    Online social networking sites represent significant new opportunities for Internet advertisers. However, results based on the real world cannot be generalized to all virtual worlds. In this research, the moderating effects of need for cognition (NFC) and knowledge were applied to examine the impact of message framing on attitudes toward social networking sites. A total of 216 undergraduates participated in the study. Results reveal that for social networking sites, while high-NFC individuals form more favorable attitudes toward negatively framed messages than positively framed messages, low-NFC individuals form more favorable attitudes toward positively framed messages than negatively framed messages. In addition, low-knowledge individuals demonstrate more favorable attitudes toward negatively framed messages than positively framed messages; however, the framing effect does not differentially affect the attitudes of high-knowledge individuals. Furthermore, the framing effect does not differentially affect the attitudes of high-NFC individuals with high knowledge. In contrast, low-NFC individuals with low knowledge hold more favorable attitudes toward positively framed messages than negatively framed messages.

  17. Evaluation of sexual communication message strategies.

    PubMed

    Evans, W Douglas; Davis, Kevin C; Umanzor, Cindy; Patel, Kajal; Khan, Munziba

    2011-05-20

    Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC) have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  18. Identification of SPAM messages using an approach inspired on the immune system.

    PubMed

    Guzella, T S; Mota-Santos, T A; Uchôa, J Q; Caminhas, W M

    2008-06-01

    In this paper, an immune-inspired model, named innate and adaptive artificial immune system (IA-AIS) is proposed and applied to the problem of identification of unsolicited bulk e-mail messages (SPAM). It integrates entities analogous to macrophages, B and T lymphocytes, modeling both the innate and the adaptive immune systems. An implementation of the algorithm was capable of identifying more than 99% of legitimate or SPAM messages in particular parameter configurations. It was compared to an optimized version of the naive Bayes classifier, which has been attained extremely high correct classification rates. It has been concluded that IA-AIS has a greater ability to identify SPAM messages, although the identification of legitimate messages is not as high as that of the implemented naive Bayes classifier.

  19. Low-pass spatial filtering of satellite radar data

    NASA Technical Reports Server (NTRS)

    Mueller, Paul W.; Hoffer, Roger N.

    1989-01-01

    Thirty-four low-pass spatial filter treatments were applied to a multi-angle SIR-B data set to reduce speckle effects and improve classification performance. These treatments were based on four algorithms: square mean, separable mean, square median, and separable recursive median. The filtered images were evaluated using both quantitative and qualitative techniques. It was determined that the square median algorithm implemented at two iterations with a window size of 3 by 3 produced the best overall results with the 28.5-m SIR-B data.

  20. 78 FR 62344 - Sabine Pass Liquefaction Expansion, LLC, Sabine Pass Liquefaction, LLC, and Sabine Pass LNG, L.P...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-18

    ... Sabine Pass LNG, L.P., Cheniere Creole Trail Pipeline, L.P.; Notice of Application Take notice that on... LNG, L.P. (collectively referred to as Sabine Pass) filed with the Federal Energy Regulatory..., construct, and operate additional liquefied natural gas (LNG) export facilities at the Sabine Pass...

  1. When you pass your due date

    MedlinePlus

    ... medlineplus.gov/ency/patientinstructions/000515.htm When you pass your due date To use the sharing features ... link between you and your baby. As you pass your due date, the placenta may not work ...

  2. Maintaining High Assurance in Asynchronous Messaging

    DTIC Science & Technology

    2015-10-24

    assurance environment. Index Terms—Asynchronous Communication, Publish Subscribe, IT Security, Encryption, Key Management I. INTRODUCTION...synchronous communication take place in or how these relate to each other. It is possible to implement synchronous communication using an asynchronous...continuing its processing. At the completion of message transmission, the sender does not know when or whether the receiver received it . The message

  3. Persuasive email messages for patient communication.

    PubMed

    Walji, Muhammad; Johnson-Throop, Kathy; Johnson, Todd; Bernstam, Elmer; Zhang, Jiajie

    2005-01-01

    To improve health and reduce costs, we need to encourage patients to make better health care decisions. Since email is widely available, it may be useful for patient-directed interventions. However, we know little about how the contents of an email message can influence a health-related decision. We propose a model to understand how patients may process persuasive email messages.

  4. Memorable Messages for Navigating College Life

    ERIC Educational Resources Information Center

    Nazione, Samantha; Laplante, Carolyn; Smith, Sandi W.; Cornacchione, Jennifer; Russell, Jessica; Stohl, Cynthia

    2011-01-01

    This manuscript details an investigation of memorable messages that help students navigate college life using a control theory framework. Researchers conducted face-to-face interviews with 61 undergraduate students who recalled a specific memorable message that helped them as they navigated college. Results of this formative study show the…

  5. Should We Ban Instant Messaging In School?

    ERIC Educational Resources Information Center

    Texley, Sharon; DeGennaro, Donna

    2005-01-01

    This article is a brief debate on the pros and cons of allowing students to use instant messaging (IM) in school. On one hand, teenagers' desire to socialize can overcome other priorities and schools may set policies to ban instant messaging. The contrary view is that schools should embrace the IM technology being popularized by youth and find…

  6. 78 FR 52166 - Quantitative Messaging Research

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-22

    ... qualitative message testing research (for which CFTC received fast-track OMB approval) and is necessary to... the survey as well as other qualitative research. Findings from the summary report will be used to... COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures Trading Commission. ACTION:...

  7. Messages about Sexuality: An Ecological Perspective

    ERIC Educational Resources Information Center

    Boone, Tanya L.

    2015-01-01

    The goal of this two-part study was to identify the perceived influence of sexuality messages from parents, peers, school and the media--four microsystems within the Ecological Model--on emerging adult US college women's sexual attitudes. Findings suggest that parents were the most likely source of the message to "remain abstinent until…

  8. Text Messaging for Student Communication and Voting

    ERIC Educational Resources Information Center

    McClean, Stephen; Hagan, Paul; Morgan, Jason

    2010-01-01

    Text messaging has gained widespread popularity in higher education as a communication tool and as a means of engaging students in the learning process. In this study we report on the use of text messaging in a large, year-one introductory chemistry module where students were encouraged to send questions and queries to a dedicated text number both…

  9. Hidden Messages: Instructional Materials for Investigating Culture.

    ERIC Educational Resources Information Center

    Finkelstein, Barbara, Ed.; Eder, Elizabeth K., Ed.

    This book, intended to be used in the middle and high school classroom, provides teachers with unique ideas and lesson plans for exploring culture and adding a multicultural perspective to diverse subjects. "Hidden messages" are the messages of culture that are entwined in everyday lives, but which are seldom recognized or appreciated…

  10. Correlating Log Messages for System Diagnostics

    SciTech Connect

    Gunasekaran, Raghul; Dillow, David A; Shipman, Galen M; Maxwell, Don E; Hill, Jason J; Park, Byung H; Geist, Al

    2010-01-01

    In large-scale computing systems, the sheer volume of log data generated presents daunting challenges for debugging and monitoring of these systems. The Oak Ridge Leadership Computing Facility s premier simulation platform, the Cray XT5 known as Jaguar, can generate a few hundred thousand log entries in less than a minute for many system level events. Determining the root cause of such system events requires analyzing and interpretation of a large number of log messages. Most often, the log messages are best understood when they are interpreted collectively rather than individually. In this paper, we present our approach to interpreting log messages by identifying their commonalities and grouping them into clusters. Given a set of log messages within a time interval, we group the messages based on source, target, and/or error type, and correlate the messages with hardware and application information. We monitor the Lustre log messages in the XT5 console log and show that such grouping of log messages assists in detecting the source of system events. By intelligent grouping and correlation of events in the log, we are able to provide system administrators with meaningful information in a concise format for root cause analysis.

  11. Steganographic embedding of a secret message in a video flow

    NASA Astrophysics Data System (ADS)

    Datcu, Octaviana; Dobre, Robert A.; Stanciu, Mihai

    2016-12-01

    The paper presents a steganographic method which hides a secret message in a video flow. The secret message represents the result of a chaos-based encryption scheme. One of the flaws which make the algorithm unpractical for real-time applications is that, while the elements of the plain-message are represented using 8 bits (ASCII characters) the corresponding encrypted values need to be represented using 16 bits. Since the pixels of a typical image are represented using 24 bits (8 bits for each color component), each encrypted character fits in only one pixel. Moreover, since the resolution of today's video materials is very large, the pixel previously established to carry in its evolution the hidden content will not be obvious to unaware spectators, but only to the one which knows its coordinates. In addition to the steganographic procedure, the work presents preliminary results on the degree of pseudo-randomness of video flows. The study is based upon the idea behind Lyapunov exponents. The evolution of two pixels which initially differ only by the minimum possible value (the color representation's resolution) is followed for a large number of video frames. The distance between such points, for pseudo-random behavior, is known to evolve over time in a Gaussian manner. A Kolmogorov-Smirnov statistic is computed and illustrated in order to conclude over the provenience of the data series representing the evolution of the distance between the two initially neighboring pixels from a standard normal law.

  12. Coding for Parallel Links to Maximize the Expected Value of Decodable Messages

    NASA Technical Reports Server (NTRS)

    Klimesh, Matthew A.; Chang, Christopher S.

    2011-01-01

    When multiple parallel communication links are available, it is useful to consider link-utilization strategies that provide tradeoffs between reliability and throughput. Interesting cases arise when there are three or more available links. Under the model considered, the links have known probabilities of being in working order, and each link has a known capacity. The sender has a number of messages to send to the receiver. Each message has a size and a value (i.e., a worth or priority). Messages may be divided into pieces arbitrarily, and the value of each piece is proportional to its size. The goal is to choose combinations of messages to send on the links so that the expected value of the messages decodable by the receiver is maximized. There are three parts to the innovation: (1) Applying coding to parallel links under the model; (2) Linear programming formulation for finding the optimal combinations of messages to send on the links; and (3) Algorithms for assisting in finding feasible combinations of messages, as support for the linear programming formulation. There are similarities between this innovation and methods developed in the field of network coding. However, network coding has generally been concerned with either maximizing throughput in a fixed network, or robust communication of a fixed volume of data. In contrast, under this model, the throughput is expected to vary depending on the state of the network. Examples of error-correcting codes that are useful under this model but which are not needed under previous models have been found. This model can represent either a one-shot communication attempt, or a stream of communications. Under the one-shot model, message sizes and link capacities are quantities of information (e.g., measured in bits), while under the communications stream model, message sizes and link capacities are information rates (e.g., measured in bits/second). This work has the potential to increase the value of data returned from

  13. Message from the Editor Message from the Editor

    NASA Astrophysics Data System (ADS)

    Thomas, Paul

    2012-04-01

    Whilst travelling to Vienna to hand over the Editorship of Nuclear Fusion to Ron Stambaugh, I jotted down a few ideas to put in a farewell message. Somewhat unsurprisingly, I find them almost identical to the remarks that Chris Schueller made in handing over to me five years ago. Both of us served in this role for five years, which seems like a good timescale to replace presidents and editors alike; just to allow a fresh approach. In addition, since I have been directly involved in ITER, I have found it increasingly difficult, due to time pressure, to give the journal the attention that it deserves. Therefore, I am very pleased that Ron Stambaugh has agreed to take over as Editor. Not only does he bring the experience as a leading figure in the US fusion programme but, in addition, he has all the contacts, worldwide, from his leadership of the ITPA. I am completely assured that the journal is in a highly competent pair of hands. Such a farewell should not lack my heartfelt thanks to all of those who have made being Editor of Nuclear Fusion so enjoyable and stimulating; readership, authors, referees, the Editorial Board and the NF Office alike. I wish Ron all the best for his tenure and have offered such help and support as I am able to give.

  14. 33 CFR 117.311 - New Pass.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false New Pass. 117.311 Section 117.311... REGULATIONS Specific Requirements Florida § 117.311 New Pass. The drawspan for the State Road 789 Drawbridge... must be passed at anytime....

  15. Effect of multiple extrusion passes on zein

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Zein was repeatedly processed up to seven times using a single screw extruder at a temperature of 145 °C and at approximately 15 grams per minute to determine the extent of degradation that occurs with multiple extrusion passes. SDS-PAGE shows that with the second pass, and each additional pass, the...

  16. Message communications of particular message types between compute nodes using DMA shadow buffers

    DOEpatents

    Blocksome, Michael A.; Parker, Jeffrey J.

    2010-11-16

    Message communications of particular message types between compute nodes using DMA shadow buffers includes: receiving a buffer identifier specifying an application buffer having a message of a particular type for transmission to a target compute node through a network; selecting one of a plurality of shadow buffers for a DMA engine on the compute node for storing the message, each shadow buffer corresponding to a slot of an injection FIFO buffer maintained by the DMA engine; storing the message in the selected shadow buffer; creating a data descriptor for the message stored in the selected shadow buffer; injecting the data descriptor into the slot of the injection FIFO buffer corresponding to the selected shadow buffer; selecting the data descriptor from the injection FIFO buffer; and transmitting the message specified by the selected data descriptor through the data communications network to the target compute node.

  17. Improving the Effectiveness of Fundraising Messages: The Impact of Charity Goal Attainment, Message Framing, and Evidence on Persuasion

    ERIC Educational Resources Information Center

    Das, Enny; Kerkhof, Peter; Kuiper, Joyce

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a positive message frame. In addition, building on…

  18. Iterative pass optimization of sequence data

    NASA Technical Reports Server (NTRS)

    Wheeler, Ward C.

    2003-01-01

    The problem of determining the minimum-cost hypothetical ancestral sequences for a given cladogram is known to be NP-complete. This "tree alignment" problem has motivated the considerable effort placed in multiple sequence alignment procedures. Wheeler in 1996 proposed a heuristic method, direct optimization, to calculate cladogram costs without the intervention of multiple sequence alignment. This method, though more efficient in time and more effective in cladogram length than many alignment-based procedures, greedily optimizes nodes based on descendent information only. In their proposal of an exact multiple alignment solution, Sankoff et al. in 1976 described a heuristic procedure--the iterative improvement method--to create alignments at internal nodes by solving a series of median problems. The combination of a three-sequence direct optimization with iterative improvement and a branch-length-based cladogram cost procedure, provides an algorithm that frequently results in superior (i.e., lower) cladogram costs. This iterative pass optimization is both computation and memory intensive, but economies can be made to reduce this burden. An example in arthropod systematics is discussed. c2003 The Willi Hennig Society. Published by Elsevier Science (USA). All rights reserved.

  19. Iterative pass optimization of sequence data.

    PubMed

    Wheeler, Ward C

    2003-06-01

    The problem of determining the minimum-cost hypothetical ancestral sequences for a given cladogram is known to be NP-complete. This "tree alignment" problem has motivated the considerable effort placed in multiple sequence alignment procedures. Wheeler in 1996 proposed a heuristic method, direct optimization, to calculate cladogram costs without the intervention of multiple sequence alignment. This method, though more efficient in time and more effective in cladogram length than many alignment-based procedures, greedily optimizes nodes based on descendent information only. In their proposal of an exact multiple alignment solution, Sankoff et al. in 1976 described a heuristic procedure--the iterative improvement method--to create alignments at internal nodes by solving a series of median problems. The combination of a three-sequence direct optimization with iterative improvement and a branch-length-based cladogram cost procedure, provides an algorithm that frequently results in superior (i.e., lower) cladogram costs. This iterative pass optimization is both computation and memory intensive, but economies can be made to reduce this burden. An example in arthropod systematics is discussed.

  20. Parallel algorithm to analyze the brain signals: application on epileptic spikes.

    PubMed

    Keshri, Anup Kumar; Das, Barda Nand; Mallick, Dheeresh Kumar; Sinha, Rakesh Kumar

    2011-02-01

    In the current work, we have proposed a parallel algorithm for the recognition of Epileptic Spikes (ES) in EEG. The automated systems are used in biomedical field to help the doctors and pathologist by producing the result of an inspection in real time. Generally, the biomedical signal data to be processed are very large in size. A uniprocessor computer is having its own limitation regarding its speed. So the fastest available computer with latest configuration also may not produce results in real time for the immense computation. Parallel computing can be proved as a useful tool for processing the huge data with higher speed. In the proposed algorithm 'Data Parallelism' has been applied where multiple processors perform the same operation on different part of the data to produce fast result. All the processors are interconnected with each other by an interconnection network. The complexity of the algorithm was analyzed as Θ((n + δn) / N) where, 'n' is the length of the input data, 'N' is the number of processor used in the algorithm and 'δn' is the amount of overlapped data between two consecutive intermediate processors (IPs). This algorithm is scalable as the level of parallelism increase linearly with the increase in number of processors. The algorithm has been implemented in Message Passing Interface (MPI). It was tested with 60 min recorded EEG signal data files. The recognition rate of ES on an average was 95.68%.

  1. A parallel dynamic programming algorithm for multi-reservoir system optimization

    NASA Astrophysics Data System (ADS)

    Li, Xiang; Wei, Jiahua; Li, Tiejian; Wang, Guangqian; Yeh, William W.-G.

    2014-05-01

    This paper develops a parallel dynamic programming algorithm to optimize the joint operation of a multi-reservoir system. First, a multi-dimensional dynamic programming (DP) model is formulated for a multi-reservoir system. Second, the DP algorithm is parallelized using a peer-to-peer parallel paradigm. The parallelization is based on the distributed memory architecture and the message passing interface (MPI) protocol. We consider both the distributed computing and distributed computer memory in the parallelization. The parallel paradigm aims at reducing the computation time as well as alleviating the computer memory requirement associated with running a multi-dimensional DP model. Next, we test the parallel DP algorithm on the classic, benchmark four-reservoir problem on a high-performance computing (HPC) system with up to 350 cores. Results indicate that the parallel DP algorithm exhibits good performance in parallel efficiency; the parallel DP algorithm is scalable and will not be restricted by the number of cores. Finally, the parallel DP algorithm is applied to a real-world, five-reservoir system in China. The results demonstrate the parallel efficiency and practical utility of the proposed methodology.

  2. Petascale self-consistent electromagnetic computations using scalable and accurate algorithms for complex structures

    NASA Astrophysics Data System (ADS)

    Cary, John R.; Abell, D.; Amundson, J.; Bruhwiler, D. L.; Busby, R.; Carlsson, J. A.; Dimitrov, D. A.; Kashdan, E.; Messmer, P.; Nieter, C.; Smithe, D. N.; Spentzouris, P.; Stoltz, P.; Trines, R. M.; Wang, H.; Werner, G. R.

    2006-09-01

    As the size and cost of particle accelerators escalate, high-performance computing plays an increasingly important role; optimization through accurate, detailed computermodeling increases performance and reduces costs. But consequently, computer simulations face enormous challenges. Early approximation methods, such as expansions in distance from the design orbit, were unable to supply detailed accurate results, such as in the computation of wake fields in complex cavities. Since the advent of message-passing supercomputers with thousands of processors, earlier approximations are no longer necessary, and it is now possible to compute wake fields, the effects of dampers, and self-consistent dynamics in cavities accurately. In this environment, the focus has shifted towards the development and implementation of algorithms that scale to large numbers of processors. So-called charge-conserving algorithms evolve the electromagnetic fields without the need for any global solves (which are difficult to scale up to many processors). Using cut-cell (or embedded) boundaries, these algorithms can simulate the fields in complex accelerator cavities with curved walls. New implicit algorithms, which are stable for any time-step, conserve charge as well, allowing faster simulation of structures with details small compared to the characteristic wavelength. These algorithmic and computational advances have been implemented in the VORPAL7 Framework, a flexible, object-oriented, massively parallel computational application that allows run-time assembly of algorithms and objects, thus composing an application on the fly.

  3. Algorithms and Algorithmic Languages.

    ERIC Educational Resources Information Center

    Veselov, V. M.; Koprov, V. M.

    This paper is intended as an introduction to a number of problems connected with the description of algorithms and algorithmic languages, particularly the syntaxes and semantics of algorithmic languages. The terms "letter, word, alphabet" are defined and described. The concept of the algorithm is defined and the relation between the algorithm and…

  4. 14 CFR 189.3 - Kinds of messages accepted or relayed.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... address: (1) Distress messages and distress traffic. (2) Messages concerning the safety of human life. (3) Flight safety messages concerning— (i) Air traffic control, including— (A) Messages concerning...

  5. Message Variability and Heterogeneity: A Core Challenge for Communication Research

    PubMed Central

    Slater, Michael D.; Peter, Jochen; Valkenberg, Patti

    2015-01-01

    Messages are central to human social experience, and pose key conceptual and methodological challenges in the study of communication. In response to these challenges, we outline a systematic approach to conceptualizing, operationalizing, and analyzing messages. At the conceptual level, we distinguish between two core aspects of messages: message variability (the defined and operationalized features of messages) and message heterogeneity (the undefined and unmeasured features of messages), and suggest preferred approaches to defining message variables. At the operational level, we identify message sampling, selection, and research design strategies responsive to issues of message variability and heterogeneity in experimental and survey research. At the analytical level, we highlight effective techniques to deal with message variability and heterogeneity. We conclude with seven recommendations to increase rigor in the study of communication through appropriately addressing the challenges presented by messages. PMID:26681816

  6. 78 FR 62657 - Proposed Information Collection; The Interagency Access Pass and Senior Pass Application Processes

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-22

    ... National Park Service Proposed Information Collection; The Interagency Access Pass and Senior Pass... Parks and Federal Recreation Lands Pass Program covers recreation opportunities on public lands managed... U.S. Forest Service. The passes provide U.S. citizens and visitors an affordable and convenient...

  7. 33 CFR 110.196 - Sabine Pass Channel, Sabine Pass, Tex.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Sabine Pass Channel, Sabine Pass, Tex. 110.196 Section 110.196 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.196 Sabine Pass Channel, Sabine Pass,...

  8. 33 CFR 110.196 - Sabine Pass Channel, Sabine Pass, Tex.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Sabine Pass Channel, Sabine Pass, Tex. 110.196 Section 110.196 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.196 Sabine Pass Channel, Sabine Pass,...

  9. When message-frame fits salient cultural-frame, messages feel more persuasive.

    PubMed

    Uskul, Ayse K; Oyserman, Daphna

    2010-03-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a message about health risks of caffeine consumption among individuals prescreened to be regular caffeine consumers. After being primed for individualism, European Americans who read a health message that focused on the personal self were more likely to accept the message-they found it more persuasive, believed they were more at risk and engaged in more message-congruent behaviour. These effects were also found among Asian Americans who were primed for collectivism and who read a health message that focused on relational obligations. The findings point to the importance of investigating the role of situational cues in persuasive effects of health messages and suggest that matching content to primed frame consistent with the chronic frame may be a way to know what to match messages to.

  10. Understanding Messages in a Diagnostic Domain.

    ERIC Educational Resources Information Center

    Ciravegna, Fabio

    1995-01-01

    Introduces characteristics of the sublanguage found in diagnostic messages about automotive equipment failures and discusses a system for minimizing jargon. Proposes using general knowledge sources and evaluates levels of communication accuracy, robustness and efficiency. (AEF)

  11. Inoculating against reactance to persuasive health messages.

    PubMed

    Richards, Adam S; Banas, John A

    2015-01-01

    This investigation examined the possibility of decreasing psychological reactance to health campaigns through the use of inoculation messages. It was hypothesized that an inoculation message, which forewarned of the potential of subsequent reactance, would decrease participants' likelihood of reacting negatively to a freedom-threatening message aimed to reduce excessive alcohol consumption. Participants (N = 275) who were inoculated against potential reactance felt less threatened and experienced less reactance compared to those who did not read an inoculation message. Structural equation modeling showed that inoculation indirectly predicted lower intention to drink alcohol via the theorized mediated reactance process. This research suggests that it is possible to inoculate against self-generated cognitions that might otherwise lead toward negative health behaviors.

  12. Six-Message Electromechanical Display System

    NASA Technical Reports Server (NTRS)

    Howard, Richard T.

    2007-01-01

    A proposed electromechanical display system would be capable of presenting as many as six distinct messages. In the proposed system, each display element would include a cylinder having a regular hexagonal cross section.

  13. Is Your Drug Program Sending Deadly Messages?

    ERIC Educational Resources Information Center

    Horton, Lowell

    1989-01-01

    Many drug education programs send a mixed and confusing message to students. Others are clearly wrong. Cites examples and advises administrators to conduct a critical review of all drug education programs. (MLF)

  14. An Interpersonal Approach to Writing Negative Messages.

    ERIC Educational Resources Information Center

    Salerno, Douglas

    1986-01-01

    Examines commonly held notions about writing negative messages and suggests that these notions could be improved by incorporating research in audience analysis and interpersonal communication. Argues that letter writing is not simply information transfer. (MS)

  15. Books about Teen Parents: Messages and Omissions.

    ERIC Educational Resources Information Center

    Davis, Joy B.; MacGillivray, Laurie

    2001-01-01

    Examines narratives and novels written for young adults that deal with teenage pregnancy and parenting. Discusses eight common messages found in 17 such short stories and books, and notes three areas of significant silence. (SR)

  16. Parallelized FVM algorithm for three-dimensional viscoelastic flows

    NASA Astrophysics Data System (ADS)

    Dou, H.-S.; Phan-Thien, N.

    A parallel implementation for the finite volume method (FVM) for three-dimensional (3D) viscoelastic flows is developed on a distributed computing environment through Parallel Virtual Machine (PVM). The numerical procedure is based on the SIMPLEST algorithm using a staggered FVM discretization in Cartesian coordinates. The final discretized algebraic equations are solved with the TDMA method. The parallelisation of the program is implemented by a domain decomposition strategy, with a master/slave style programming paradigm, and a message passing through PVM. A load balancing strategy is proposed to reduce the communications between processors. The three-dimensional viscoelastic flow in a rectangular duct is computed with this program. The modified Phan-Thien-Tanner (MPTT) constitutive model is employed for the equation system closure. Computing results are validated on the secondary flow problem due to non-zero second normal stress difference N2. Three sets of meshes are used, and the effect of domain decomposition strategies on the performance is discussed. It is found that parallel efficiency is strongly dependent on the grid size and the number of processors for a given block number. The convergence rate as well as the total efficiency of domain decomposition depends upon the flow problem and the boundary conditions. The parallel efficiency increases with increasing problem size for given block number. Comparing to two-dimensional flow problems, 3D parallelized algorithm has a lower efficiency owing to largely overlapped block interfaces, but the parallel algorithm is indeed a powerful means for large scale flow simulations.

  17. Send-side matching of data communications messages

    DOEpatents

    Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.

    2014-06-17

    Send-side matching of data communications messages in a distributed computing system comprising a plurality of compute nodes, including: issuing by a receiving node to source nodes a receive message that specifies receipt of a single message to be sent from any source node, the receive message including message matching information, a specification of a hardware-level mutual exclusion device, and an identification of a receive buffer; matching by two or more of the source nodes the receive message with pending send messages in the two or more source nodes; operating by one of the source nodes having a matching send message the mutual exclusion device, excluding messages from other source nodes with matching send messages and identifying to the receiving node the source node operating the mutual exclusion device; and sending to the receiving node from the source node operating the mutual exclusion device a matched pending message.

  18. Send-side matching of data communications messages

    DOEpatents

    Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.

    2014-07-01

    Send-side matching of data communications messages includes a plurality of compute nodes organized for collective operations, including: issuing by a receiving node to source nodes a receive message that specifies receipt of a single message to be sent from any source node, the receive message including message matching information, a specification of a hardware-level mutual exclusion device, and an identification of a receive buffer; matching by two or more of the source nodes the receive message with pending send messages in the two or more source nodes; operating by one of the source nodes having a matching send message the mutual exclusion device, excluding messages from other source nodes with matching send messages and identifying to the receiving node the source node operating the mutual exclusion device; and sending to the receiving node from the source node operating the mutual exclusion device a matched pending message.

  19. Cockpit Interfaces, Displays, and Alerting Messages for the Interval Management Alternative Clearances (IMAC) Experiment

    NASA Technical Reports Server (NTRS)

    Baxley, Brian T.; Palmer, Michael T.; Swieringa, Kurt A.

    2015-01-01

    This document describes the IM cockpit interfaces, displays, and alerting capabilities that were developed for and used in the IMAC experiment, which was conducted at NASA Langley in the summer of 2015. Specifically, this document includes: (1) screen layouts for each page of the interface; (2) step-by-step instructions for data entry, data verification and input error correction; (3) algorithm state messages and error condition alerting messages; (4) aircraft speed guidance and deviation indications; and (5) graphical display of the spatial relationships between the Ownship aircraft and the Target aircraft. The controller displays for IM will be described in a separate document.

  20. Pass-transistor very large scale integration

    NASA Technical Reports Server (NTRS)

    Maki, Gary K. (Inventor); Bhatia, Prakash R. (Inventor)

    2004-01-01

    Logic elements are provided that permit reductions in layout size and avoidance of hazards. Such logic elements may be included in libraries of logic cells. A logical function to be implemented by the logic element is decomposed about logical variables to identify factors corresponding to combinations of the logical variables and their complements. A pass transistor network is provided for implementing the pass network function in accordance with this decomposition. The pass transistor network includes ordered arrangements of pass transistors that correspond to the combinations of variables and complements resulting from the logical decomposition. The logic elements may act as selection circuits and be integrated with memory and buffer elements.

  1. Photoacoustic Soot Spectrometer (PASS) Instrument Handbook

    SciTech Connect

    Dubey, M; Springston, S; Koontz, A; Aiken, A

    2013-01-17

    The photoacoustic soot spectrometer (PASS) measures light absorption by aerosol particles. As the particles pass through a laser beam, the absorbed energy heats the particles and in turn the surrounding air, which sets off a pressure wave that can be detected by a microphone. The PASS instruments deployed by ARM can also simultaneously measure the scattered laser light at three wavelengths and therefore provide a direct measure of the single-scattering albedo. The Operator Manual for the PASS-3100 is included here with the permission of Droplet Measurement Technologies, the instrument’s manufacturer.

  2. 78 FR 25432 - Sabine Pass LNG, L.P., Sabine Pass Liquefaction, LLC; Notice of Availability of the Environmental...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-01

    ... Energy Regulatory Commission Sabine Pass LNG, L.P., Sabine Pass Liquefaction, LLC; Notice of Availability... Sabine Pass Sabine Pass LNG, L.P. and Sabine Pass Liquefaction, LLC (Sabine Pass) in the above-referenced... construction at the existing Sabine Pass LNG terminal in Cameron Parish, Louisiana. The EA assesses...

  3. A De-centralized Scheduling and Load Balancing Algorithm for Heterogeneous Grid Environments

    NASA Technical Reports Server (NTRS)

    Arora, Manish; Das, Sajal K.; Biswas, Rupak

    2002-01-01

    In the past two decades, numerous scheduling and load balancing techniques have been proposed for locally distributed multiprocessor systems. However, they all suffer from significant deficiencies when extended to a Grid environment: some use a centralized approach that renders the algorithm unscalable, while others assume the overhead involved in searching for appropriate resources to be negligible. Furthermore, classical scheduling algorithms do not consider a Grid node to be N-resource rich and merely work towards maximizing the utilization of one of the resources. In this paper, we propose a new scheduling and load balancing algorithm for a generalized Grid model of N-resource nodes that not only takes into account the node and network heterogeneity, but also considers the overhead involved in coordinating among the nodes. Our algorithm is decentralized, scalable, and overlaps the node coordination time with that of the actual processing of ready jobs, thus saving valuable clock cycles needed for making decisions. The proposed algorithm is studied by conducting simulations using the Message Passing Interface (MPI) paradigm.

  4. A De-Centralized Scheduling and Load Balancing Algorithm for Heterogeneous Grid Environments

    NASA Technical Reports Server (NTRS)

    Arora, Manish; Das, Sajal K.; Biswas, Rupak; Biegel, Bryan (Technical Monitor)

    2002-01-01

    In the past two decades, numerous scheduling and load balancing techniques have been proposed for locally distributed multiprocessor systems. However, they all suffer from significant deficiencies when extended to a Grid environment: some use a centralized approach that renders the algorithm unscalable, while others assume the overhead involved in searching for appropriate resources to be negligible. Furthermore, classical scheduling algorithms do not consider a Grid node to be N-resource rich and merely work towards maximizing the utilization of one of the resources. In this paper we propose a new scheduling and load balancing algorithm for a generalized Grid model of N-resource nodes that not only takes into account the node and network heterogeneity, but also considers the overhead involved in coordinating among the nodes. Our algorithm is de-centralized, scalable, and overlaps the node coordination time of the actual processing of ready jobs, thus saving valuable clock cycles needed for making decisions. The proposed algorithm is studied by conducting simulations using the Message Passing Interface (MPI) paradigm.

  5. Framing Flames: The Structure of Argumentative Messages on the Net.

    ERIC Educational Resources Information Center

    Mabry, Edward A.

    1997-01-01

    Assesses the use of the strategic message structuring tactic known as framing. Analyzes 3,000 messages obtained from a diverse sampling of computer-mediated discussion groups and forums. Finds that a speaker's emotional involvement was significantly and curvilinearly related to two message framing devices (message dependency and coalition…

  6. Replacing the Message Service Component In an Integration Framework.

    DTIC Science & Technology

    1994-10-01

    routine: add- eventO if (event->type == Message && event->tt~pattern 1= NULL) tt-pattern-register(event->tt~pattern); A..4 ToolTalk Message Pattern...Message Pattern Destruction A.5.1 routine: free- eventO if (event->type == Message && event->tt~pattern 1= NULL) tt-free (event->tt~pattern); A.6

  7. An Analysis of Normative Messages in Signs at Recreation Settings.

    ERIC Educational Resources Information Center

    Winter, Patricia L.; Cialdini, Robert B.; Bator, Renee J.; Rhoads, Kelton; Sagarin, Brad J.

    1998-01-01

    A systematic evaluation of signs and messages at 42 recreation areas in California and Arizona focused on type of site, managing agency, density of message locales, sign attributes, and message content. The vast majority of messages presented behavioral commands and were negatively worded. This striking imbalance points to concerns in visitor…

  8. Gambling warning messages: The impact of winning and losing on message reception across a gambling session.

    PubMed

    Ginley, Meredith K; Whelan, James P; Keating, Holly A; Meyers, Andrew W

    2016-12-01

    Gambling warning messages have been shown to lead to prevention and modification of risk-taking behaviors. Laboratory studies have shown messages can increase a player's knowledge about gambling specific risks, modify their gambling-related cognitive distortions, and even change play. In the present laboratory study, participants were randomly assigned to a winning or losing slot machine gambling experience where they either viewed periodic warning messages or not. It was hypothesized that those in the message conditions would place smaller bets, spend more time considering bets, and spend less time gambling than those in the control conditions. We also hypothesized participants would play differently across the contexts of winning or losing. The results showed those who received warning messages while winning made the fewest number of spins and did not speed up their bet rate over the course of play as much as those in other conditions. Players who received warning messages while losing decreased the size of their bets over the course of play compared to those who received messages while winning. Despite receiving warning messages, losing players did not decrease their number of spins or rate of betting. Winning or losing during slot machine play appears to have significant consequences on the impact of a warning message. Whereas a message to change gambling behavior may encourage a winning gambler to stop play, the same message for a losing player may lead to a small minimization in harm by helping them to decrease bet size, though not their rate of betting. (PsycINFO Database Record

  9. LSB Based Quantum Image Steganography Algorithm

    NASA Astrophysics Data System (ADS)

    Jiang, Nan; Zhao, Na; Wang, Luo

    2016-01-01

    Quantum steganography is the technique which hides a secret message into quantum covers such as quantum images. In this paper, two blind LSB steganography algorithms in the form of quantum circuits are proposed based on the novel enhanced quantum representation (NEQR) for quantum images. One algorithm is plain LSB which uses the message bits to substitute for the pixels' LSB directly. The other is block LSB which embeds a message bit into a number of pixels that belong to one image block. The extracting circuits can regain the secret message only according to the stego cover. Analysis and simulation-based experimental results demonstrate that the invisibility is good, and the balance between the capacity and the robustness can be adjusted according to the needs of applications.

  10. 33 CFR 117.311 - New Pass.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false New Pass. 117.311 Section 117.311 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Florida § 117.311 New Pass. The drawspan for the State Road 789...

  11. Multifrequency, single pass free electron laser

    DOEpatents

    Szoke, Abraham; Prosnitz, Donald

    1985-01-01

    A method for simultaneous amplification of laser beams with a sequence of frequencies in a single pass, using a relativistic beam of electrons grouped in a sequence of energies corresponding to the sequence of laser beam frequencies. The method allows electrons to pass from one potential well or "bucket" to another adjacent bucket, thus increasing efficiency of trapping and energy conversion.

  12. 33 CFR 117.484 - Pass Manchac.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Pass Manchac. 117.484 Section 117.484 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.484 Pass Manchac. The draw of the...

  13. 33 CFR 117.303 - Matlacha Pass.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Matlacha Pass. 117.303 Section 117.303 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Florida § 117.303 Matlacha Pass. The draw of the...

  14. 33 CFR 117.487 - Pierre Pass.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Pierre Pass. 117.487 Section 117.487 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.487 Pierre Pass. The draw of the S70...

  15. Global Identification of Protein Post-translational Modifications in a Single-Pass Database Search.

    PubMed

    Shortreed, Michael R; Wenger, Craig D; Frey, Brian L; Sheynkman, Gloria M; Scalf, Mark; Keller, Mark P; Attie, Alan D; Smith, Lloyd M

    2015-11-06

    Bottom-up proteomics database search algorithms used for peptide identification cannot comprehensively identify post-translational modifications (PTMs) in a single-pass because of high false discovery rates (FDRs). A new approach to database searching enables global PTM (G-PTM) identification by exclusively looking for curated PTMs, thereby avoiding the FDR penalty experienced during conventional variable modification searches. We identified over 2200 unique, high-confidence modified peptides comprising 26 different PTM types in a single-pass database search.

  16. Information Theory, Inference and Learning Algorithms

    NASA Astrophysics Data System (ADS)

    Mackay, David J. C.

    2003-10-01

    Information theory and inference, often taught separately, are here united in one entertaining textbook. These topics lie at the heart of many exciting areas of contemporary science and engineering - communication, signal processing, data mining, machine learning, pattern recognition, computational neuroscience, bioinformatics, and cryptography. This textbook introduces theory in tandem with applications. Information theory is taught alongside practical communication systems, such as arithmetic coding for data compression and sparse-graph codes for error-correction. A toolbox of inference techniques, including message-passing algorithms, Monte Carlo methods, and variational approximations, are developed alongside applications of these tools to clustering, convolutional codes, independent component analysis, and neural networks. The final part of the book describes the state of the art in error-correcting codes, including low-density parity-check codes, turbo codes, and digital fountain codes -- the twenty-first century standards for satellite communications, disk drives, and data broadcast. Richly illustrated, filled with worked examples and over 400 exercises, some with detailed solutions, David MacKay's groundbreaking book is ideal for self-learning and for undergraduate or graduate courses. Interludes on crosswords, evolution, and sex provide entertainment along the way. In sum, this is a textbook on information, communication, and coding for a new generation of students, and an unparalleled entry point into these subjects for professionals in areas as diverse as computational biology, financial engineering, and machine learning.

  17. Single pass Doppler positioning for Search and Rescue satellite missions

    NASA Technical Reports Server (NTRS)

    Schmid, P. E.; Vonbun, F. O.; Lynn, J. J.

    1976-01-01

    This paper describes the implementation of beacon location experiments involving the NASA Nimbus-6 and the Amateur Satellite Corporation (AMSAT) Oscar-6 and Oscar-7 spacecraft. The purpose of these experiments is to demonstrate the feasibility of determining the geographical location of a low power VHF 'distress beacon' via satellite. Doppler data collected during satellite passes is reduced in a mini-computer by means of a simple algorithm resulting in the simultaneous recovery of the unknown receiver coordinates and the unknown Doppler bias frequency. Results indicate point positioning to within a few kilometers - which is within the required accuracies for the positioning of downed aircraft for Search/Rescue missions.

  18. UAVSAR: Airborne L-band Radar for Repeat Pass Interferometry

    NASA Technical Reports Server (NTRS)

    Moes, Timothy R.

    2009-01-01

    The primary objectives of the UAVSAR Project were to: a) develop a miniaturized polarimetric L-band synthetic aperture radar (SAR) for use on an unmanned aerial vehicle (UAV) or piloted vehicle. b) develop the associated processing algorithms for repeat-pass differential interferometric measurements using a single antenna. c) conduct measurements of geophysical interest, particularly changes of rapidly deforming surfaces such as volcanoes or earthquakes. Two complete systems were developed. Operational Science Missions began on February 18, 2009 ... concurrent development and testing of the radar system continues.

  19. Vehicle passes detector based on multi-sensor analysis

    NASA Astrophysics Data System (ADS)

    Bocharov, D.; Sidorchuk, D.; Konovalenko, I.; Koptelov, I.

    2015-02-01

    The study concerned deals with a new approach to the problem of detecting vehicle passes in vision-based automatic vehicle classification system. Essential non-affinity image variations and signals from induction loop are the events that can be considered as detectors of an object presence. We propose several vehicle detection techniques based on image processing and induction loop signal analysis. Also we suggest a combined method based on multi-sensor analysis to improve vehicle detection performance. Experimental results in complex outdoor environments show that the proposed multi-sensor algorithm is effective for vehicles detection.

  20. Scaffolding Collaborative Argumentation in Asynchronous Discussions with Message Constraints and Message Labels

    ERIC Educational Resources Information Center

    Jeong, Allan; Joung, Sunyoung

    2007-01-01

    This study examined the effects of message constraints and labels on collaborative argumentation in asynchronous online discussions. Thirty-eight undergraduate students in an introductory educational technology course were assigned to one of three groups. In one group, students posted specific types of messages using a prescribed set of message…

  1. Impact of Product Involvement, Message Format, and Receiver Sex on the Efficacy of Comparative Advertising Messages.

    ERIC Educational Resources Information Center

    Pfau, Michael

    1994-01-01

    Investigates the role and impact of receiver involvement in product class, comparative message format, and receiver sex on the relative effectiveness of comparative advertising messages. Indicates that females and males respond uniquely to comparative advertising, revealing consistent patterns regarding both circumstances and approaches. (SR)

  2. Can Messages Make a Difference? The Association between E-Mail Messages and Health Outcomes in Diabetes Patients

    ERIC Educational Resources Information Center

    Turner, Jeanine Warisse; Robinson, James D.; Tian, Yan; Neustadtl, Alan; Angelus, Pam; Russell, Marie; Mun, Seong K.; Levine, Betty

    2013-01-01

    This investigation examined the impact of social support messages on patient health outcomes. Forty-one American Indian, Alaska Native, and Native Hawaiian patients received a total of 618 e-mail messages from their healthcare provider (HCP). The e-mail messages were divided into 3,565 message units and coded for instances of emotional social…

  3. Promoting stair use: single versus multiple stair-riser messages.

    PubMed

    Webb, Oliver J; Eves, Frank F

    2005-09-01

    Message banners attached to stair risers produced a significant increase in pedestrian stair use, exceeding effects previously reported for conventional posters. Multiple instances of the same message banner, however, were as effective as banners featuring different messages. Therefore, greater visibility, rather than message variety, appears to account for the superiority of the banner format. Our findings indicate the feasibility of simple stair-use promotion campaigns based around the repetition of a single message.

  4. Positive messaging promotes walking in older adults

    PubMed Central

    Notthoff, Nanna; Carstensen, Laura L.

    2014-01-01

    Walking is among the most cost-effective and accessible means of exercise. Mounting evidence suggests that walking may help to maintain physical and cognitive independence in old age by preventing a variety of health problems. However, older Americans fall far short of meeting the daily recommendations for walking. In two studies, we examined whether considering older adults’ preferential attention to positive information may effectively enhance interventions aimed at promoting walking. In Study 1, we compared the effectiveness of positive, negative, and neutral messages to encourage walking (as measured with pedometers). Older adults who were informed about the benefits of walking walked more than those who were informed about the negative consequences of failing to walk, whereas younger adults were unaffected by framing valence. In Study 2, we examined within-person change in walking in older adults in response to positively- or negatively-framed messages over a 28-day period. Once again, positively-framed messages more effectively promoted walking than negatively-framed messages, and the effect was sustained across the intervention period. Together, these studies suggest that consideration of age-related changes in preferences for positive and negative information may inform the design of effective interventions to promote healthy lifestyles. Future research is needed to examine the mechanisms underlying the greater effectiveness of positively as opposed to negatively framed messages and the generalizability of findings to other intervention targets and other subpopulations of older adults. PMID:24956001

  5. Supervising simulations with the Prodiguer Messaging Platform

    NASA Astrophysics Data System (ADS)

    Greenslade, Mark; Carenton, Nicolas; Denvil, Sebastien

    2015-04-01

    At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of High Performance Computing (HPC) environments spread throughout France. The IPSL's simulation execution runtime is called libIGCM (library for IPSL Global Climate Modeling group). libIGCM has recently been enhanced so as to support realtime operational use cases. Such use cases include simulation monitoring, data publication, environment metrics collection, automated simulation control … etc. At the core of this enhancement is the Prodiguer messaging platform. libIGCM now emits information, in the form of messages, for remote processing at IPSL servers in Paris. The remote message processing takes several forms, for example: 1. Persisting message content to database(s); 2. Notifying an operator of changes in a simulation's execution status; 3. Launching rollback jobs upon simulation failure; 4. Dynamically updating controlled vocabularies; 5. Notifying downstream applications such as the Prodiguer web portal; We will describe how the messaging platform has been implemented from a technical perspective and demonstrate the Prodiguer web portal receiving realtime notifications.

  6. Emotional flow in persuasive health messages.

    PubMed

    Nabi, Robin L

    2015-01-01

    Overwhelmingly, the literature on the persuasive influence of emotions has focused on individual emotions, fear in particular, though some recent attention has been given to mixed emotions in persuasive appeals. Building on this newer wave of research, this article argues that instead of focusing on singular emotional states or collections of emotions evoked by a message, it might prove valuable to explore the flow, or evolution, of emotional experience over the course of exposure to a health message. The article offers a brief introduction to the concept of emotion, followed by a review of the state of the literature on the use of emotion in health messages. The concept of emotional flow is then introduced along with a consideration of how it has been tacitly incorporated into the study of emotional health messages. Finally, the utility of the concept of emotional flow is elaborated by articulating the ways in which it might be harnessed to facilitate the creation of more effective health messages, individually as well as across campaigns. The article concludes with an agenda for future research.

  7. The message development tool: a case for effective operationalization of messaging in social marketing practice.

    PubMed

    Mattson, Marifran; Basu, Ambar

    2010-07-01

    That messages are essential, if not the most critical component of any communicative process, seems like an obvious claim. More so when the communication is about health--one of the most vital and elemental of human experiences (Babrow & Mattson, 2003). Any communication campaign that aims to change a target audience's health behaviors needs to centralize messages. Even though messaging strategies are an essential component of social marketing and are a widely used campaign model, health campaigns based on this framework have not always been able to effectively operationalize this key component, leading to cases where initiating and sustaining prescribed health behavior has been difficult (MacStravic, 2000). Based on an examination of the VERB campaign and an Australian breastfeeding promotion campaign, we propose a message development tool within the ambit of the social marketing framework that aims to extend the framework and ensure that the messaging component of the model is contextualized at the core of planning, implementation, and evaluation efforts.

  8. Dynamic hybrid algorithms for MAP inference in discrete MRFs.

    PubMed

    Alahari, Karteek; Kohli, Pushmeet; Torr, Philip H S

    2010-10-01

    In this paper, we present novel techniques that improve the computational and memory efficiency of algorithms for solving multilabel energy functions arising from discrete mrfs or crfs. These methods are motivated by the observations that the performance of minimization algorithms depends on: 1) the initialization used for the primal and dual variables and 2) the number of primal variables involved in the energy function. Our first method (dynamic alpha-expansion) works by "recycling" results from previous problem instances. The second method simplifies the energy function by "reducing" the number of unknown variables present in the problem. Further, we show that it can also be used to generate a good initialization for the dynamic alpha-expansion algorithm by "reusing" dual variables. We test the performance of our methods on energy functions encountered in the problems of stereo matching and color and object-based segmentation. Experimental results show that our methods achieve a substantial improvement in the performance of alpha-expansion, as well as other popular algorithms such as sequential tree-reweighted message passing and max-product belief propagation. We also demonstrate the applicability of our schemes for certain higher order energy functions, such as the one described in [1], for interactive texture-based image and video segmentation. In most cases, we achieve a 10-15 times speed-up in the computation time. Our modified alpha-expansion algorithm provides similar performance to Fast-PD, but is conceptually much simpler. Both alpha-expansion and Fast-PD can be made orders of magnitude faster when used in conjunction with the "reduce" scheme proposed in this paper.

  9. Risk-based scheduling of multiple search passes for UUVs

    NASA Astrophysics Data System (ADS)

    Baylog, John G.; Wettergren, Thomas A.

    2016-05-01

    This paper addresses selected computational aspects of collaborative search planning when multiple search agents seek to find hidden objects (i.e. mines) in operating environments where the detection process is prone to false alarms. A Receiver Operator Characteristic (ROC) analysis is applied to construct a Bayesian cost objective function that weighs and combines missed detection and false alarm probabilities. It is shown that for fixed ROC operating points and a validation criterion consisting of a prerequisite number of detection outcomes, an interval exists in the number of conducted search passes over which the risk objective function is supermodular. We show that this property is not retained beyond validation criterion boundaries. We investigate the use of greedy algorithms for distributing search effort and, in particular, examine the double greedy algorithm for its applicability under conditions of varying criteria. Numerical results are provided to demonstrate the effectiveness of the approach.

  10. Low Latency Messages on Distributed Memory Multiprocessors

    DOE PAGES

    Rosing, Matt; Saltz, Joel

    1995-01-01

    This article describes many of the issues in developing an efficient interface for communication on distributed memory machines. Although the hardware component of message latency is less than 1 ws on many distributed memory machines, the software latency associated with sending and receiving typed messages is on the order of 50 μs. The reason for this imbalance is that the software interface does not match the hardware. By changing the interface to match the hardware more closely, applications with fine grained communication can be put on these machines. This article describes several tests performed and many of the issues involvedmore » in supporting low latency messages on distributed memory machines.« less

  11. Messages about physical attractiveness in animated cartoons.

    PubMed

    Klein, Hugh; Shiffman, Kenneth S

    2006-12-01

    Relying upon a content analysis of one specific type of medium to which young people are exposed beginning at an early age, on a regular basis, and for many years (i.e., animated cartoons), the present study examines what types of messages are provided about being physically unattractive, physically attractive, and ordinary-looking. This research concerns itself with identifying the characteristics that tend to be associated with being good-looking or unattractive, and then discussing the implications of the findings. Results indicate that many variables were found to differ based on cartoon characters' physical attractiveness, including gender, age, intelligence, body weight, emotional states experienced, prosocial behaviors, antisocial behaviors, and overall goodness/badness. Whenever differences were found, the overriding tendency was for cartoons to provide positive messages about being attractive and negative messages about being unattractive.

  12. Broadcasting a message in a parallel computer

    DOEpatents

    Berg, Jeremy E.; Faraj, Ahmad A.

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  13. P-RnaPredict--a parallel evolutionary algorithm for RNA folding: effects of pseudorandom number quality.

    PubMed

    Wiese, Kay C; Hendriks, Andrew; Deschênes, Alain; Ben Youssef, Belgacem

    2005-09-01

    This paper presents a fully parallel version of RnaPredict, a genetic algorithm (GA) for RNA secondary structure prediction. The research presented here builds on previous work and examines the impact of three different pseudorandom number generators (PRNGs) on the GA's performance. The three generators tested are the C standard library PRNG RAND, a parallelized multiplicative congruential generator (MCG), and a parallelized Mersenne Twister (MT). A fully parallel version of RnaPredict using the Message Passing Interface (MPI) was implemented on a 128-node Beowulf cluster. The PRNG comparison tests were performed with known structures whose sequences are 118, 122, 468, 543, and 556 nucleotides in length. The effects of the PRNGs are investigated and the predicted structures are compared to known structures. Results indicate that P-RnaPredict demonstrated good prediction accuracy, particularly so for shorter sequences.

  14. EDITORIAL: Message from the Editor Message from the Editor

    NASA Astrophysics Data System (ADS)

    Thomas, Paul

    2010-02-01

    passing away of the following former members of the Board of Editors: Ravindra Sudan (1975 to 1984), Joe Di Marco (1984 to 1991) and Roy Bickerton (1975 to 1986). The Nuclear Fusion Office and IOP Publishing Just as the journal depends on the authors and referees, so its success is also due to the tireless and largely unsung efforts of the Nuclear Fusion Office in Vienna and IOP Publishing in Bristol. I would like to express my personal thanks to Maria Bergamini-Roedler, Katja Haslinger, Sophy Le Masurier, Yasmin McGlashan, Caroline Wilkinson, Sarah Ryder, Rachael Kriefman and Katie Gerrard for the support that they have given to me, the authors and the referees. Season's Greetings The January special edition delayed this editorial for a month. Nevertheless, I would like belatedly to wish our readers, authors, referees and Board of Editors the season's greetings and thank them for their contributions to Nuclear Fusion in 2009.

  15. Developing effective messages about potable recycled water: The importance of message structure and content

    NASA Astrophysics Data System (ADS)

    Price, J.; Fielding, K. S.; Gardner, J.; Leviston, Z.; Green, M.

    2015-04-01

    Community opposition is a barrier to potable recycled water schemes. Effective communication strategies about such schemes are needed. Drawing on social psychological literature, two experimental studies are presented, which explore messages that improve public perceptions of potable recycled water. The Elaboration-Likelihood Model of information processing and attitude change is tested and supported. Study 1 (N = 415) premeasured support for recycled water, and trust in government information at Time 1. Messages varied in complexity and sidedness were presented at Time 2 (3 weeks later), and support and trust were remeasured. Support increased after receiving information, provided that participants received complex rather than simple information. Trust in government was also higher after receiving information. There was tentative evidence of this in response to two-sided messages rather than one-sided messages. Initial attitudes to recycled water moderated responses to information. Those initially neutral or ambivalent responded differently to simple and one-sided messages, compared to participants with positive or negative attitudes. Study 2 (N = 957) tested the effectiveness of information about the low relative risks, and/or benefits of potable recycled water, compared to control groups. Messages about the low risks resulted in higher support when the issue of recycled water was relevant. Messages about benefits resulted in higher perceived issue relevance, but did not translate into greater support. The results highlight the importance of understanding people's motivation to process information, and need to tailor communication to match attitudes and stage of recycled water schemes' development.

  16. Secure Web-Site Access with Tickets and Message-Dependent Digests

    USGS Publications Warehouse

    Donato, David I.

    2008-01-01

    Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.

  17. 78 FR 1851 - Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P.; Notice of Intent To Prepare an...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-09

    ... Energy Regulatory Commission Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P.; Notice of Intent To... facilities for Sabine Pass Liquefaction LLC and Sabine Pass LNG (Sabine Pass) in Cameron County, Louisiana... HRU, condensate storage, and metering facilities would be located within the existing Sabine Pass...

  18. 77 FR 65546 - Sabine Pass Liquefaction, LLC; Sabine Pass LNG, L.P.; Notice of Petition To Amend Authorizations...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-29

    ... Energy Regulatory Commission Sabine Pass Liquefaction, LLC; Sabine Pass LNG, L.P.; Notice of Petition To... Pass Liquefaction, LLC and Sabine Pass LNG, L.P. (collectively, Sabine Pass), 700 Milam Street, Suite... and operate certain related facilities (Modification Project) at the existing Sabine Pass LNG...

  19. Automated Procedure for Roll Pass Design

    NASA Astrophysics Data System (ADS)

    Lambiase, F.; Langella, A.

    2009-04-01

    The aim of this work has been to develop an automatic roll pass design method, capable of minimizing the number of roll passes. The adoption of artificial intelligence technologies, particularly expert systems, and a hybrid model for the surface profile evaluation of rolled bars, has allowed us to model the search for the minimal sequence with a tree path search. This approach permitted a geometrical optimization of roll passes while allowing automation of the roll pass design process. Moreover, the heuristic nature of the inferential engine contributes a great deal toward reducing search time, thus allowing such a system to be employed for industrial purposes. Finally, this new approach was compared with other recently developed automatic systems to validate and measure possible improvements among them.

  20. Hurricane Sandy -- Pass 1, Oct. 29, 2012

    NASA Video Gallery

    Hurricane Sandy was viewed Monday morning from the International Space Station as it orbited 260 miles above the Atlantic Ocean. Sandy had sustained winds of 90 miles an hour as the station passed ...

  1. Hurricane Sandy -- Pass 2, Oct. 29, 2012

    NASA Video Gallery

    Hurricane Sandy was viewed Monday morning from the International Space Station as it orbited 260 miles above the Atlantic Ocean. Sandy had sustained winds of 90 miles an hour as the station passed ...

  2. Alcohol Messages in Prime-Time Television Series

    PubMed Central

    RUSSELL, CRISTEL ANTONIA; RUSSELL, DALE W.

    2010-01-01

    Alcohol messages contained in television programming serve as sources of information about drinking. To better understand the ways embedded messages about alcohol are communicated, it is crucial to objectively monitor and analyze television alcohol depictions. This article presents a content analysis of an eight-week sample of eighteen prime-time programs. Alcohol messages were coded based on modalities of presentation, level of plot connection, and valence. The analysis reveals that mixed messages about alcohol often coexist but the ways in which they are presented differ: whereas negative messages are tied to the plot and communicated verbally, positive messages are associated with subtle visual portrayals. PMID:21188281

  3. The Physical Therapy and Society Summit (PASS) Meeting: observations and opportunities.

    PubMed

    Kigin, Colleen M; Rodgers, Mary M; Wolf, Steven L

    2010-11-01

    The construct of delivering high-quality and cost-effective health care is in flux, and the profession must strategically plan how to meet the needs of society. In 2006, the House of Delegates of the American Physical Therapy Association passed a motion to convene a summit on "how physical therapists can meet current, evolving, and future societal health care needs." The Physical Therapy and Society Summit (PASS) meeting on February 27-28, 2009, in Leesburg, Virginia, sent a clear message that for physical therapists to be effective and thrive in the health care environment of the future, a paradigm shift is required. During the PASS meeting, participants reframed our traditional focus on the physical therapist and the patient/client (consumer) to one in which physical therapists are an integral part of a collaborative, multidisciplinary health care team with the health care consumer as its focus. The PASS Steering Committee recognized that some of the opportunities that surfaced during the PASS meeting may be disruptive or may not be within the profession's present strategic or tactical plans. Thus, adopting a framework that helps to establish the need for change that is provocative and potentially disruptive to our present care delivery, yet prioritizes opportunities, is a critical and essential step. Each of us in the physical therapy profession must take on post-PASS roles and responsibilities to accomplish the systemic change that is so intimately intertwined with our destiny. This article offers a perspective of the dynamic dialogue and suggestions that emerged from the PASS event, providing further opportunities for discussion and action within our profession.

  4. Using Instant Messaging for Online Reference Service

    ERIC Educational Resources Information Center

    Forster, Shirley

    2006-01-01

    Many libraries are using co-browsing chat products to provide reference services to their patrons, whilst their patrons are online and using the internet. The concept of such an online service is highly desirable, but many libraries are concerned that they will never be able to afford such a system. This may have changed: Instant Messaging (IM)…

  5. Sending and searching for interstellar messages

    NASA Astrophysics Data System (ADS)

    Zaitsev, Alexander L.

    2008-09-01

    There is a close interrelation between searching for extraterrestrial intelligence (SETI) and messaging to extraterrestrial intelligence (METI). For example, the answers to the questions "Where to search" and "Where to send" are equivalent, in that both require an identical selection from the same target star lists. Similar considerations lead to a strategy of time synchronization between sending and searching. Both SETI and METI use large reflectors. The concept of "magic frequencies" may be applicable to both SETI and METI. Efforts to understand an alien civilization's interstellar messages (IMs), and efforts to compose our own IMs so they will be easily understood by unfamiliar extraterrestrials, are mutually complementary. Furthermore, the METI-question: "How can we benefit from sending IMs, if a response may come only thousands of years later?" begs an equivalent SETI-question: "How can we benefit from searching, if it is impossible now to perceive the motivations and feelings of those who may have sent messages in the distant past?" A joint consideration of the theoretical and the practical aspects of both sending and searching for IMs, in the framework of a unified, disciplined scientific approach, can be quite fruitful. We seek to resolve the cultural disconnect between those who advocate sending interstellar messages, and others who anathematize those who would transmit.

  6. Educational Messages in Tevfik Fikret's Poems

    ERIC Educational Resources Information Center

    Erdal, Kelime

    2011-01-01

    Being in the education community for long years, Tevfik Fikret aims to educate children and teenagers with the works he has written while he is carrying out his profession. Knowing child's world very well, the poet gives messages which can be counted valid in today's education perception. Emphasizing the basic humanistic and moral values such as…

  7. Learning Messages Notification System to Mobile Devices

    ERIC Educational Resources Information Center

    Jimenez, M. Lourdes

    2005-01-01

    The work presents a new method to send educational messages in e-learning systems. The communication tools are one of the main characteristics of the virtual formative actions, in addition of the contents and the evaluation. The system must help to motivate the students, mainly those who do not leave the formative action and continue it until the…

  8. Challenges for Tailored Messaging in Health Education

    ERIC Educational Resources Information Center

    Stellefson, Michael L.; Hanik, Bruce W.; Chaney, Beth H.; Chaney, J. Don

    2008-01-01

    It is a health education truism that instructional material will be more effective when audience characteristics are taken into account at the outset of program development. One strategy for disseminating relevant health information to individuals is known as "tailored messaging," which accounts for intra-individual information processing needs.…

  9. Business Professionals Workplace Message Quality Perceptions

    ERIC Educational Resources Information Center

    Roach, Joy L.; Anderson, Marcia A.

    2007-01-01

    In light of today's large amount of written workplace communication, this study attempted to reveal information regarding the quality in which business messages are encoded on the job. Data were gathered through a questionnaire administered to a sample of 1994-2004 MBA graduates of three AACSB-accredited programs. Findings suggest that business…

  10. An approach for message exchange using archetypes.

    PubMed

    Moraes, João L C; Souza, Wanderley L; Cavalini, Luciana T; Pires, Luís F; Prado, Antonio F

    2013-01-01

    The application of ICT on the whole range of health sector activities, known as e-health, can simplify the access to health care services and will only be acceptable for realistic scenarios if it supports efficient information exchange amongst the caregivers and their patients. The aim of this paper is present an approach for message exchange to realistic scenarios.

  11. Message Integrity Model for Wireless Sensor Networks

    ERIC Educational Resources Information Center

    Qleibo, Haider W.

    2009-01-01

    WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…

  12. An Interpersonal Approach to Writing Negative Messages.

    ERIC Educational Resources Information Center

    Salerno, Douglas

    1988-01-01

    Asserts that textbook advice regarding buffers and negative messages is simplistic and frequently wrong, and analyses 22 job-refusal letters and their effectiveness. Claims that recent research on cognitive complexity and social perspective-taking suggests the need for more sophisticated audience analysis protocols for dealing with the negative…

  13. Type of Message and Attitude Change.

    ERIC Educational Resources Information Center

    Edwards, John; Smith-Bandy, Kerry

    A study compared people's reactions to different types of assertions concerning social issues. For purposes of the study, assertion was defined as having three components: a reference to the issue itself, an attribute having evaluative implications and a verb phrase linking the issue with the attribute. Eight types of messages were composed…

  14. Sending Them a Message: Electronic Bulletin Boards.

    ERIC Educational Resources Information Center

    LaRue, James

    1986-01-01

    This article discusses similarities between the local bulletin board system (BBS) and the public library. Highlights include components of the small BBS (system operator, host computer, "messaging" software, auto-answer device, connection to one or more phone lines); uploading and downloading; notes from the board; and the role of the…

  15. Instant Messaging Reference: How Does It Compare?

    ERIC Educational Resources Information Center

    Desai, Christina M.

    2003-01-01

    Compares a digital reference service that uses instant messaging with traditional, face-to-face reference based on experiences at the Southern Illinois University library. Addresses differences in reference questions asked, changes in the reference transaction, student expectations, bibliographic instruction, and librarian attitudes and procedures…

  16. Creating an Instant Messaging Reference System.

    ERIC Educational Resources Information Center

    Fagan, Jody Condit; Calloway, Michele

    2001-01-01

    Discussion of library digital reference services focuses on the features of instant messaging reference systems and the in-house development of a system that incorporates them at Southern Illinois University at Carbondale. Summarizes and evaluates library chat system features and compares commercial software that is available. (Author/LRW)

  17. 78 FR 64202 - Quantitative Messaging Research

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-28

    ... combines key findings from both the survey as well as other qualitative research. Findings from the summary... COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures Trading Commission. ACTION: Notice... financial fraud as part of a consumer-facing anti-fraud campaign. This survey will follow...

  18. 47 CFR 2.401 - Distress messages.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND REGULATIONS Distress, Disaster, and Emergency Communications § 2.401 Distress messages. Each... aircraft in distress; shall cease all sending on frequencies which will interfere with hearing...

  19. 47 CFR 2.401 - Distress messages.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND REGULATIONS Distress, Disaster, and Emergency Communications § 2.401 Distress messages. Each... aircraft in distress; shall cease all sending on frequencies which will interfere with hearing...

  20. 47 CFR 2.401 - Distress messages.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND REGULATIONS Distress, Disaster, and Emergency Communications § 2.401 Distress messages. Each... aircraft in distress; shall cease all sending on frequencies which will interfere with hearing...

  1. 47 CFR 2.401 - Distress messages.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND REGULATIONS Distress, Disaster, and Emergency Communications § 2.401 Distress messages. Each... aircraft in distress; shall cease all sending on frequencies which will interfere with hearing...

  2. 47 CFR 2.401 - Distress messages.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND REGULATIONS Distress, Disaster, and Emergency Communications § 2.401 Distress messages. Each... aircraft in distress; shall cease all sending on frequencies which will interfere with hearing...

  3. Princess Picture Books: Content and Messages

    ERIC Educational Resources Information Center

    Dale, Lourdes P.; Higgins, Brittany E.; Pinkerton, Nick; Couto, Michelle; Mansolillo, Victoria; Weisinger, Nica; Flores, Marci

    2016-01-01

    Because many girls develop their understanding of what it means to be a girl from books about princesses, the researchers coded the messages and content in 58 princess books (picture, fairy tales, and fractured fairy tales). Results indicate that gender stereotypes are present in the books--the princesses were more likely to be nurturing, in…

  4. Interactive source and message effects in persuasion.

    PubMed

    Siu, Wanda

    2010-04-01

    In this study, the influence of source and message frame on judgments of a public service announcement was examined. The participants in the experiment were 408 undergraduate students (126 men, 280 women, 2 unknown; M age=20.0, SD=2.5, range=18-23) of a Midwestern U.S. university. Message frame and source were manipulated in a between-subjects design. Two levels of the message frame were benefits of physical activity and costs of not engaging in regular physical activity; the source was a healthy or unhealthy individual. In the Healthy-source condition, "Kim Jones" set realistic goals for exercise and had a healthy lifestyle. Conversely, she was described as a sedentary individual who led an unhealthy lifestyle in the Sick-source condition. Results indicated that respondents in the conditions of gain frame-healthy source and cost frame-unhealthy source had more positive message judgment as compared to respondents in the conditions of gain frame-unhealthy source and cost frame-healthy source.

  5. A New Distributed Algorithm for Side-Chain Positioning in the Process of Protein Docking*

    PubMed Central

    Moghadasi, Mohammad; Kozakov, Dima; Vakili, Pirooz; Vajda, Sandor; Paschalidis, Ioannis Ch.

    2014-01-01

    Side-chain positioning (SCP) is an important component of computational protein docking methods. Existing SCP methods and available software have been designed for protein folding applications where side-chain positioning is also important. As a result they do not take into account significant special structure that SCP for docking exhibits. We propose a new algorithm which poses SCP as a Maximum Weighted Independent Set (MWIS) problem on an appropriately constructed graph. We develop an approximate algorithm which solves a relaxation of the MWIS and then rounds the solution to obtain a high-quality feasible solution to the problem. The algorithm is fully distributed and can be executed on a large network of processing nodes requiring only local information and message-passing between neighboring nodes. Motivated by the special structure in docking, we establish optimality guarantees for a certain class of graphs. Our results on a benchmark set of enzyme-inhibitor protein complexes show that our predictions are close to the native structure and are comparable to the ones obtained by a state-of-the-art method. The results are substantially improved if rotamers from unbound protein structures are included in the search. We also establish that the use of our SCP algorithm substantially improves docking results. PMID:24844567

  6. Unreasonable effectiveness of learning neural networks: From accessible states and robust ensembles to basic algorithmic schemes

    PubMed Central

    Borgs, Christian; Chayes, Jennifer T.; Ingrosso, Alessandro; Lucibello, Carlo; Saglietti, Luca; Zecchina, Riccardo

    2016-01-01

    In artificial neural networks, learning from data is a computationally demanding task in which a large number of connection weights are iteratively tuned through stochastic-gradient-based heuristic processes over a cost function. It is not well understood how learning occurs in these systems, in particular how they avoid getting trapped in configurations with poor computational performance. Here, we study the difficult case of networks with discrete weights, where the optimization landscape is very rough even for simple architectures, and provide theoretical and numerical evidence of the existence of rare—but extremely dense and accessible—regions of configurations in the network weight space. We define a measure, the robust ensemble (RE), which suppresses trapping by isolated configurations and amplifies the role of these dense regions. We analytically compute the RE in some exactly solvable models and also provide a general algorithmic scheme that is straightforward to implement: define a cost function given by a sum of a finite number of replicas of the original cost function, with a constraint centering the replicas around a driving assignment. To illustrate this, we derive several powerful algorithms, ranging from Markov Chains to message passing to gradient descent processes, where the algorithms target the robust dense states, resulting in substantial improvements in performance. The weak dependence on the number of precision bits of the weights leads us to conjecture that very similar reasoning applies to more conventional neural networks. Analogous algorithmic schemes can also be applied to other optimization problems. PMID:27856745

  7. Max-product algorithms for the generalized multiple-fault diagnosis problem.

    PubMed

    Le, Tung; Hadjicostis, Christoforos N

    2007-12-01

    In this paper, we study the application of the max-product algorithm (MPA) to the generalized multiple-fault diagnosis (GMFD) problem, which consists of components (to be diagnosed) and alarms/connections that can be unreliable. The MPA and the improved sequential MPA (SMPA) that we develop in this paper are local-message-passing algorithms that operate on the bipartite diagnosis graph (BDG) associated with the GMFD problem and converge to the maximum a posteriori probability (MAP) solution if this graph is acyclic (in addition, the MPA requires the MAP solution to be unique). Our simulations suggest that both the MPA and the SMPA perform well in more general systems that may exhibit cycles in the associated BDGs (the SMPA also appears to outperform the MPA in these more general systems). In this paper, we provide analytical results for acyclic BDGs and also assess the performance of both algorithms under particular patterns of alarm observations in general graphs; this allows us to obtain analytical bounds on the probability of making erroneous diagnosis with respect to the MAP solution. We also evaluate the performance of the MPA and the SMPA algorithms via simulations, and provide comparisons with previously developed heuristics for this type of diagnosis problems. We conclude that the MPA and the SMPA perform well under reasonable computational complexity when the underlying diagnosis graph is sparse.

  8. Para-GMRF: parallel algorithm for anomaly detection of hyperspectral image

    NASA Astrophysics Data System (ADS)

    Dong, Chao; Zhao, Huijie; Li, Na; Wang, Wei

    2007-12-01

    The hyperspectral imager is capable of collecting hundreds of images corresponding to different wavelength channels for the observed area simultaneously, which make it possible to discriminate man-made objects from natural background. However, the price paid for the wealthy information is the enormous amounts of data, usually hundreds of Gigabytes per day. Turning the huge volume data into useful information and knowledge in real time is critical for geoscientists. In this paper, the proposed parallel Gaussian-Markov random field (Para-GMRF) anomaly detection algorithm is an attempt of applying parallel computing technology to solve the problem. Based on the locality of GMRF algorithm, we partition the 3-D hyperspectral image cube in spatial domain and distribute data blocks to multiple computers for concurrent detection. Meanwhile, to achieve load balance, a work pool scheduler is designed for task assignment. The Para-GMRF algorithm is organized in master-slave architecture, coded in C programming language using message passing interface (MPI) library and tested on a Beowulf cluster. Experimental results show that Para-GMRF algorithm successfully conquers the challenge and can be used in time sensitive areas, such as environmental monitoring and battlefield reconnaissance.

  9. Chaos pass filter: linear response of synchronized chaotic systems.

    PubMed

    Zeeb, Steffen; Kestler, Johannes; Kanter, Ido; Kinzel, Wolfgang

    2013-04-01

    The linear response of synchronized time-delayed chaotic systems to small external perturbations, i.e., the phenomenon of chaos pass filter, is investigated for iterated maps. The distribution of distances, i.e., the deviations between two synchronized chaotic units due to external perturbations on the transferred signal, is used as a measure of the linear response. It is calculated numerically and, for some special cases, analytically. Depending on the model parameters this distribution has power law tails in the region of synchronization leading to diverging moments of distances. This is a consequence of multiplicative and additive noise in the corresponding linear equations due to chaos and external perturbations. The linear response can also be quantified by the bit error rate of a transmitted binary message which perturbs the synchronized system. The bit error rate is given by an integral over the distribution of distances and is calculated analytically and numerically. It displays a complex nonmonotonic behavior in the region of synchronization. For special cases the distribution of distances has a fractal structure leading to a devil's staircase for the bit error rate as a function of coupling strength. The response to small harmonic perturbations shows resonances related to coupling and feedback delay times. A bidirectionally coupled chain of three units can completely filter out the perturbation. Thus the second moment and the bit error rate become zero.

  10. Creative Analytics of Mission Ops Event Messages

    NASA Technical Reports Server (NTRS)

    Smith, Dan

    2017-01-01

    Historically, tremendous effort has been put into processing and displaying mission health and safety telemetry data; and relatively little attention has been paid to extracting information from missions time-tagged event log messages. Todays missions may log tens of thousands of messages per day and the numbers are expected to dramatically increase as satellite fleets and constellations are launched, as security monitoring continues to evolve, and as the overall complexity of ground system operations increases. The logs may contain information about orbital events, scheduled and actual observations, device status and anomalies, when operators were logged on, when commands were resent, when there were data drop outs or system failures, and much much more. When dealing with distributed space missions or operational fleets, it becomes even more important to systematically analyze this data. Several advanced information systems technologies make it appropriate to now develop analytic capabilities which can increase mission situational awareness, reduce mission risk, enable better event-driven automation and cross-mission collaborations, and lead to improved operations strategies: Industry Standard for Log Messages. The Object Management Group (OMG) Space Domain Task Force (SDTF) standards organization is in the process of creating a formal standard for industry for event log messages. The format is based on work at NASA GSFC. Open System Architectures. The DoD, NASA, and others are moving towards common open system architectures for mission ground data systems based on work at NASA GSFC with the full support of the commercial product industry and major integration contractors. Text Analytics. A specific area of data analytics which applies statistical, linguistic, and structural techniques to extract and classify information from textual sources. This presentation describes work now underway at NASA to increase situational awareness through the collection of non

  11. Middleware for Processing Message Queues with Elasticity Support and Sequential Integrity of Asynchronous Message Processing

    NASA Astrophysics Data System (ADS)

    Henrique Teixeira, Eduardo; Patrícia Favacho de Araújo, Aletéia

    2015-10-01

    Elasticity in computing refers to dynamically adjusting the amount of allocated resources to process a distributed application. In order to achieve this, mechanisms are needed to avoid the phenomenon of the elasticity threshold detection moving constantly up or down. The existing work fails to deliver sequential integrity of asynchronous messages processing and the asymmetries of data distribution to achieve parallel consumption. This paper fills this gaps and proposes a middleware solution to dynamically analyze the flow of message queue, and a mechanism to increase the parallelized consumption based on the output behavior. An architecture for IOD (Increase On Demand) middleware is presented, with support for the increase and decrease of thread's to cope with the growth of message queues, using the technique of limit-based heuristics over a given period of time and grouping messages into sub-queues based on classification criteria.

  12. Symmetrical band-pass loudspeaker systems

    NASA Astrophysics Data System (ADS)

    Matusiak, Grzegorz Piotr

    2001-12-01

    Loudspeaker systems are analyzed in a doctoral dissertation. The dissertation concerns loudspeaker systems, which are known as subwoofers or band-pass loudspeaker systems. Their advantages include: high- quality sound reproduction in the low-frequency range, small dimensions, small nonlinear distortions and the fact that they can be placed anywhere in a room or car. Band-pass loudspeaker systems are used widely in the so- called Home Theatre as well as to provide sound in cinema, theatre, concert, discotheque, opera, operetta, philharmonic and amphitheater halls, at open-air concerts, and so on. Various designs are mass-produced by a large number of manufacturers. The study covers an analysis of band-pass loudspeaker systems to which the frequency transformation, i.e. the reactance transformation, has been applied. Since this is a symmetrical transformation, amplitude frequency responses of the studied band-pass systems are also symmetrical (logarithmic scale of a frequency). As a result, the high-pass loudspeaker system design method, known as the Thiele-Small, Benson analysis, can be employed. The investigations include the formulation of band-pass system equations (fourth, sixth and eighth-order polynomials) and the subsequent derivation of relations for the calculation of system parameters. The obtained results enable the calculation of optimum designs for prescribed alignments, e.g. (Chebyshev) equal-ripple, (Butterworth) maximally flat, or quasi-maximally flat (QB). The analysis covers fourth, sixth and eighth-order symmetrical systems. Eighth-order systems have been divided into three kinds according to three ways of physical realization. The doctoral dissertation includes band-pass loudspeaker systems, which can be designed with active or passive filters or without the filter. Designed systems consist of a loudspeaker whose front of a diaphragm is loaded with a Helmholtz resonator, i.e. an enclosure with a vent, which radiates sound outwards. The back is

  13. A Scheduling Algorithm for Minimizing Exclusive Window Durations in Time-Triggered Controller Area Network

    NASA Astrophysics Data System (ADS)

    Ryu, Minsoo

    Time-Triggered Controller Area Network is widely accepted as a viable solution for real-time communication systems such as in-vehicle communications. However, although TTCAN has been designed to support both periodic and sporadic real-time messages, previous studies mostly focused on providing deterministic real-time guarantees for periodic messages while barely addressing the performance issue of sporadic messages. In this paper, we present an O(n2) scheduling algorithm that can minimize the maximum duration of exclusive windows occupied by periodic messages, thereby minimizing the worst-case scheduling delays experienced by sporadic messages.

  14. Preventing messaging queue deadlocks in a DMA environment

    DOEpatents

    Blocksome, Michael A; Chen, Dong; Gooding, Thomas; Heidelberger, Philip; Parker, Jeff

    2014-01-14

    Embodiments of the invention may be used to manage message queues in a parallel computing environment to prevent message queue deadlock. A direct memory access controller of a compute node may determine when a messaging queue is full. In response, the DMA may generate and interrupt. An interrupt handler may stop the DMA and swap all descriptors from the full messaging queue into a larger queue (or enlarge the original queue). The interrupt handler then restarts the DMA. Alternatively, the interrupt handler stops the DMA, allocates a memory block to hold queue data, and then moves descriptors from the full messaging queue into the allocated memory block. The interrupt handler then restarts the DMA. During a normal messaging advance cycle, a messaging manager attempts to inject the descriptors in the memory block into other messaging queues until the descriptors have all been processed.

  15. Using Publish-Subscribe Messaging for System Status and Automation

    NASA Technical Reports Server (NTRS)

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  16. Effects of Instant Messaging on School Performance in Adolescents.

    PubMed

    Grover, Karan; Pecor, Keith; Malkowski, Michael; Kang, Lilia; Machado, Sasha; Lulla, Roshni; Heisey, David; Ming, Xue

    2016-06-01

    Instant messaging may compromise sleep quality and school performance in adolescents. We aimed to determine associations between nighttime messaging and daytime sleepiness, self-reported sleep parameters, and/or school performance. Students from 3 high schools in New Jersey completed anonymous questionnaires assessing sleep duration, daytime sleepiness, messaging habits, and academic performance. Of the 2,352 students sampled, 1,537 responses were contrasted among grades, sexes, and messaging duration, both before and after lights out. Students who reported longer duration of messaging after lights out were more likely to report a shorter sleep duration, higher rate of daytime sleepiness, and poorer academic performance. Messaging before lights out was not associated with higher rates of daytime sleepiness or poorer academic performance. Females reported more messaging, more daytime sleepiness, and better academic performance than males. There may be an association between text messaging and school performance in this cohort of students.

  17. 47 CFR 36.379 - Message processing expense.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Customer Operations Expenses § 36.379 Message processing expense. (a) This classification includes the... message tickets. (b) The expense assigned to this classification is divided into the subcategories...

  18. 47 CFR 36.379 - Message processing expense.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Customer Operations Expenses § 36.379 Message processing expense. (a) This classification includes the... message tickets. (b) The expense assigned to this classification is divided into the subcategories...

  19. 47 CFR 36.379 - Message processing expense.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Customer Operations Expenses § 36.379 Message processing expense. (a) This classification includes the... message tickets. (b) The expense assigned to this classification is divided into the subcategories...

  20. Improved multiple-pass Raman spectrometer

    NASA Astrophysics Data System (ADS)

    Kc, Utsav; Silver, Joel A.; Hovde, David C.; Varghese, Philip L.

    2011-08-01

    An improved Raman gain spectrometer for flame measurements of gas temperature and species concentrations is described. This instrument uses a multiple-pass optical cell to enhance the incident light intensity in the measurement volume. The Raman signal is 83 times larger than from a single pass, and the Raman signal-to-noise ratio (SNR) in room-temperature air of 153 is an improvement over that from a single-pass cell by a factor of 9.3 when the cell is operated with 100 passes and the signal is integrated over 20 laser shots. The SNR improvement with the multipass cell is even higher for flame measurements at atmospheric pressure, because detector readout noise is more significant for single-pass measurements when the gas density is lower. Raman scattering is collected and dispersed in a spectrograph with a transmission grating and recorded with a fast gated CCD array detector to help eliminate flame interferences. The instrument is used to record spontaneous Raman spectra from N2, CO2, O2, and CO in a methane--air flame. Curve fits of the recorded Raman spectra to detailed simulations of nitrogen spectra are used to determine the flame temperature from the shapes of the spectral signatures and from the ratio of the total intensities of the Stokes and anti-Stokes signals. The temperatures measured are in good agreement with radiation-corrected thermocouple measurements for a range of equivalence ratios.

  1. Comparison of Item Targeting Strategies for Pass/Fail Computer Adaptive Tests.

    ERIC Educational Resources Information Center

    Bergstrom, Betty A.; Gershon, Richard

    The most useful method of item selection for making pass-fail decisions with a Computerized Adaptive Test (CAT) was studied. Medical technology students (n=86) took a computer adaptive test in which items were targeted to the ability of the examinee. The adaptive algorithm that selected items and estimated person measures used the Rasch model and…

  2. 33 CFR 401.31 - Meeting and passing.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Meeting and passing. 401.31... passing. (a) The meeting and passing of vessels shall be governed by the Collision Regulations of Canada..., no vessel shall overtake and pass or attempt to overtake and pass another vessel— (1) In any...

  3. An improved coarse-grained parallel algorithm for computational acceleration of ordinary Kriging interpolation

    NASA Astrophysics Data System (ADS)

    Hu, Hongda; Shu, Hong

    2015-05-01

    Heavy computation limits the use of Kriging interpolation methods in many real-time applications, especially with the ever-increasing problem size. Many researchers have realized that parallel processing techniques are critical to fully exploit computational resources and feasibly solve computation-intensive problems like Kriging. Much research has addressed the parallelization of traditional approach to Kriging, but this computation-intensive procedure may not be suitable for high-resolution interpolation of spatial data. On the basis of a more effective serial approach, we propose an improved coarse-grained parallel algorithm to accelerate ordinary Kriging interpolation. In particular, the interpolation task of each unobserved point is considered as a basic parallel unit. To reduce time complexity and memory consumption, the large right hand side matrix in the Kriging linear system is transformed and fixed at only two columns and therefore no longer directly relevant to the number of unobserved points. The MPI (Message Passing Interface) model is employed to implement our parallel programs in a homogeneous distributed memory system. Experimentally, the improved parallel algorithm performs better than the traditional one in spatial interpolation of annual average precipitation in Victoria, Australia. For example, when the number of processors is 24, the improved algorithm keeps speed-up at 20.8 while the speed-up of the traditional algorithm only reaches 9.3. Likewise, the weak scaling efficiency of the improved algorithm is nearly 90% while that of the traditional algorithm almost drops to 40% with 16 processors. Experimental results also demonstrate that the performance of the improved algorithm is enhanced by increasing the problem size.

  4. Experimental Investigation of By-pass Transition

    NASA Astrophysics Data System (ADS)

    Sengupta, Tapan; Lim, T. T.; Chattopadhyay, Manojit

    2000-11-01

    By-pass transition, a phenomenon often encountered in nature and engineering devices, is a complex flow instability caused by moving disturbances over bodies. To date this phenomenon is not fully explained. In the present research a controlled experiment is performed to show that the violent breakdown during by-pass transition is dominated by a two-dimensional mechanism and the resultant broadband energy spectrum of the corresponding turbulent flow is excited at the receptivity stage itself by the primary instability. The experiment is conducted in a water tunnel using dye visualisation technique, and the by-pass transition is created by controlled motion of captive vortices. In the presentation, apart from showing video images of the phenomenon, the similarity of the observed events with secondary instability and fully developed turbulent flows will be discussed.

  5. Over-under double-pass interferometer

    NASA Technical Reports Server (NTRS)

    Schindler, R. A. (Inventor)

    1977-01-01

    An over-under double pass interferometer in which the beamsplitter area and thickness can be reduced to conform only with optical flatness considerations was achieved by offsetting the optical center line of one cat's-eye retroreflector relative to the optical center line of the other in order that one split beam be folded into a plane distinct from the other folded split beam. The beamsplitter is made transparent in one area for a first folded beam to be passed to a mirror for doubling back and is made totally reflective in another area for the second folded beam to be reflected to a mirror for doubling back. The two beams thus doubled back are combined in the central, beamsplitting area of the beamsplitting and passed to a detector. This makes the beamsplitter insensitive to minimum thickness requirements and selection of material.

  6. The Message Reporting System in the ATLAS DAQ System

    NASA Astrophysics Data System (ADS)

    Caprini, M.; Fedorko, I.; Kolos, S.

    2008-06-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process communication is achieved using the CORBA technology. The design, architecture and the used technology of MRS are reviewed in this paper.

  7. Message First: Using Films to Power the Point

    ERIC Educational Resources Information Center

    Jones, Gary H.

    2004-01-01

    Although students may aim for an oral presentation that is clearly organized, well supported, and effectively delivered, teachers recognize that the primary goal of a presentation is communication; that is, the message received should be as close as possible to the message sent. Tools of message transmission, such as PowerPoint, are just a means…

  8. Potential Nutrition Messages in Magazines Read by College Students.

    ERIC Educational Resources Information Center

    Hertzler, Ann A.; Grun, Ingolf

    1990-01-01

    Surveyed advertisements in magazines read by college students in nutrition class for hidden food and nutrition messages. Hidden messages for females could imply beauty through fashion products, beauty aids, and supplements but with nutrition slimming plan. Males may be receiving subtle message that food choices do not matter and that alcohol and…

  9. Lol: New Language and Spelling in Instant Messaging

    ERIC Educational Resources Information Center

    Varnhagen, Connie K.; McFall, G. Peggy; Pugh, Nicole; Routledge, Lisa; Sumida-MacDonald, Heather; Kwong, Trudy E.

    2010-01-01

    Written communication in instant messaging, text messaging, chat, and other forms of electronic communication appears to have generated a "new language" of abbreviations, acronyms, word combinations, and punctuation. In this naturalistic study, adolescents collected their instant messaging conversations for a 1-week period and then completed a…

  10. Children's Comprehension of Referential Communication: Decoding Ambiguous Messages.

    ERIC Educational Resources Information Center

    Bearison, David J.; Levey, Linda M.

    A sample of 90 children drawn from kindergarten, second grade, and fourth grade participated in a study of ability to decode ambiguous and unambiguous verbal messages. Subjects were read 12 message stems, each followed by a question pertaining to the contents of the stem. For half of the messages, the meaning of the questions was unambiguous; for…

  11. Teaching Students the Persuasive Message through Small Group Activity

    ERIC Educational Resources Information Center

    Creelman, Valerie

    2008-01-01

    Teaching students to write persuasive messages is a critical feature of any undergraduate business communications course. For the persuasive writing module in the author's course, students write a persuasive message on the basis of the four-part indirect pattern often used for sales or fund-raising messages. The course text she uses identifies…

  12. Message Efficient Checkpointing and Rollback Recovery in Heterogeneous Mobile Networks

    NASA Astrophysics Data System (ADS)

    Jaggi, Parmeet Kaur; Singh, Awadhesh Kumar

    2016-06-01

    Heterogeneous networks provide an appealing way of expanding the computing capability of mobile networks by combining infrastructure-less mobile ad-hoc networks with the infrastructure-based cellular mobile networks. The nodes in such a network range from low-power nodes to macro base stations and thus, vary greatly in their capabilities such as computation power and battery power. The nodes are susceptible to different types of transient and permanent failures and therefore, the algorithms designed for such networks need to be fault-tolerant. The article presents a checkpointing algorithm for the rollback recovery of mobile hosts in a heterogeneous mobile network. Checkpointing is a well established approach to provide fault tolerance in static and cellular mobile distributed systems. However, the use of checkpointing for fault tolerance in a heterogeneous environment remains to be explored. The proposed protocol is based on the results of zigzag paths and zigzag cycles by Netzer-Xu. Considering the heterogeneity prevalent in the network, an uncoordinated checkpointing technique is employed. Yet, useless checkpoints are avoided without causing a high message overhead.

  13. Content analysis of antismoking videos on YouTube: message sensation value, message appeals, and their relationships with viewer responses.

    PubMed

    Paek, Hye-Jin; Kim, Kyongseok; Hove, Thomas

    2010-12-01

    Focusing on several message features that are prominent in antismoking campaign literature, this content-analytic study examines 934 antismoking video clips on YouTube for the following characteristics: message sensation value (MSV) and three types of message appeal (threat, social and humor). These four characteristics are then linked to YouTube's interactive audience response mechanisms (number of viewers, viewer ratings and number of comments) to capture message reach, viewer preference and viewer engagement. The findings suggest the following: (i) antismoking messages are prevalent on YouTube, (ii) MSV levels of online antismoking videos are relatively low compared with MSV levels of televised antismoking messages, (iii) threat appeals are the videos' predominant message strategy and (iv) message characteristics are related to viewer reach and viewer preference.

  14. Efficient, Narrow-Pass-Band Optical Filters

    NASA Technical Reports Server (NTRS)

    Sandford, Stephen P.

    1996-01-01

    Optical filters with both narrow pass bands and high efficiencies fabricated to design specifications. Offer tremendous improvements in performance for number of optical (including infrared) systems. In fiber-optic and free-space communication systems, precise frequency discrimination afforded by narrow pass bands of filters provide higher channel capacities. In active and passive remote sensors like lidar and gas-filter-correlation radiometers, increased efficiencies afforded by filters enhance detection of small signals against large background noise. In addition, sizes, weights, and power requirements of many optical and infrared systems reduced by taking advantage of gains in signal-to-noise ratios delivered by filters.

  15. Act on travel passes, 11 May 1989.

    PubMed

    1989-01-01

    This Act provides that every Bulgarian citizen has a right to a travel pass in order freely to enter and leave the country, except for persons with state secrets, minors without parental approval, persons in the midst of legal proceedings or about to serve prison sentences, and persons with certain legal obligations that have not been fulfilled. The Act makes obtaining a pass easier by abolishing the requirement that persons wishing to leave the country prove that they have a certain amount of money for foreign currency. The offense of overstaying the authorized time of travel abroad has been reduced in seriousness and is henceforth punishable by fines set forth in the Act.

  16. House passes RCRA fix by wide margin

    SciTech Connect

    1996-02-07

    The House of Representatives has passed a bill to prevent expensive, court-ordered tightening of the Resource Conservation and Recovery Act`s (RCRA) land-disposal rules. The measure was initiated last March as part of the Clinton Administration`s {open_quotes}reinventing environmental regulation{close_quotes} initiative and was championed by House Republicans. It passed, 402 to 19, drawing overwhelming support from Democrats. CMA president and CEO Fred Webber hailed the bipartisan approach as the right way to legislate. {open_quotes}We hope this bill can serve as a model for Superfund and other pieces of unfinished business,{close_quotes} he says.

  17. Continuity of the San Andreas Fault at San Gorgonio Pass

    NASA Astrophysics Data System (ADS)

    Carena, S.; Suppe, J.

    2002-12-01

    The San Andreas fault at San Gorgonio Pass does not have a clear surface trace and is considered aseismic. Our findings suggest in fact that the existence of a through-going vertical or near-vertical San Andreas fault between Yucaipa and North Palm Springs is highly unlikely. We mapped over 70 faults in the San Gorgonio Pass-San Bernardino Mountains region using the catalog of 43,500 relocated 1975-1998 earthquakes of Richards-Dinger and Shearer (2000). A clustering algorithm was applied to the relocated earthquakes in order to obtain tighter earthquake clouds and thus better-defined fault surfaces. The earthquakes were then imported into Gocad, a 3D modeling software that allowed us to separate earthquakes into coplanar clusters associated with different faults and fault strands and to fit optimized surfaces to them. We also used the catalog of 13,000 focal mechanisms of Hauksson (2000) to confirm the nature of the mapped faults. We were able to constrain the 3D geometry of the San Andreas fault near San Gorgonio Pass from the 3D geometry of the fault network surrounding it. None of these faults show any displacement due to an hypothetical sub-vertical San Andreas. The San Andreas fault must therefore rotate to much shallower dips, or lose its continuity at depths between 3 and 15 km The most likely configuration is the one where the San Andreas fault merges into the shallow-dipping San Gorgonio Pass thrust W of North Palm Springs. Strike-slip motion is taken up by both the thrust (the slip vector on the N. Palm Springs segment is reverse/right-lateral strike-slip) and by a series of NW striking faults in the footwall of the thrust. The W termination of the most active part of the San Gorgonio Pass thrust coincides with one of these footwall faults at depth, and with the south bend in the San Andreas fault strand N of Banning. This boundary also marks a change in the stress field, with a dominant strike-slip regime to the E (and localized thrusting between San

  18. Text messaging for addiction: a review.

    PubMed

    Keoleian, Victoria; Polcin, Douglas; Galloway, Gantt P

    2015-01-01

    Individuals seeking treatment for addiction often experience barriers due to cost, lack of local treatment resources, or either school or work schedule conflicts. Text-messaging-based addiction treatment is inexpensive and has the potential to be widely accessible in real time. We conducted a comprehensive literature review identifying 11 published, randomized controlled trials (RCTs) evaluating text-messaging-based interventions for tobacco smoking, four studies for reducing alcohol consumption, one pilot study in former methamphetamine (MA) users, and one study based on qualitative interviews with cannabis users. Abstinence outcome results in RCTs of smokers willing to make a quit attempt have been positive overall in the short term and as far out as at six and 12 months. Studies aimed at reducing alcohol consumption have been promising. More data are needed to evaluate the feasibility, acceptability, and efficacy of this approach for other substance use problems.

  19. Mobile text messaging solutions for obesity prevention

    NASA Astrophysics Data System (ADS)

    Akopian, David; Jayaram, Varun; Aaleswara, Lakshmipathi; Esfahanian, Moosa; Mojica, Cynthia; Parra-Medina, Deborah; Kaghyan, Sahak

    2011-02-01

    Cellular telephony has become a bright example of co-evolution of human society and information technology. This trend has also been reflected in health care and health promotion projects which included cell phones in data collection and communication chain. While many successful projects have been realized, the review of phone-based data collection techniques reveals that the existing technologies do not completely address health promotion research needs. The paper presents approaches which close this gap by extending existing versatile platforms. The messaging systems are designed for a health-promotion research to prevent obesity and obesity-related health disparities among low-income Latino adolescent girls. Messaging and polling mechanisms are used to communicate and automatically process response data for the target constituency. Preliminary survey data provide an insight on phone availability and technology perception for the study group.

  20. Washington Commentary: Spinning the Message on NCLB

    ERIC Educational Resources Information Center

    Lewis, Anne C.

    2004-01-01

    This column is about a city with two tales--one of spin and the other of sputter. No matter who occupies the White House for the next four years, the past four have borne witness to some of the most ludicrous uses of taxpayer money ever, as the U.S. Department of Education (ED) has tried to spin its message on No Child Left Behind (NCLB) across…

  1. The perfect message at the perfect moment.

    PubMed

    Kalyanam, Kirthi; Zweben, Monte

    2005-11-01

    Marketers planning promotional campaigns ask questions to boost the odds that the messages will be accepted: Who should receive each message? What should be its content? How should we deliver it? The one question they rarely ask is, when should we deliver it? That's too bad, because in marketing, timing is arguably the most important variable of all. Indeed, there are moments in a customer's relationship with a business when she wants to communicate with that business because something has changed. If the company contacts her with the right message in the right format at the right time, there's a good chance of a warm reception. The question of "when" can be answered by a new computer-based model called "dialogue marketing," which is, to date, the highest rung on an evolutionary ladder that ascends from database marketing to relationship marketing to one-to-one marketing. Its principle advantages over older approaches are that it is completely interactive, exploits many communication channels, and is "relationship aware": that is, it continuously tracks every nuance of the customer's interaction with the business. Thus, dialogue marketing responds to each transition in that relationship at the moment the customer requires attention. Turning a traditional marketing strategy into a dialogue-marketing program is a straightforward matter. Begin by identifying the batch communications you make with customers, then ask yourself what events could trigger those communications to make them more timely. Add a question or call to action to each message and prepare a different treatment or response for each possible answer. Finally, create a series of increasingly urgent calls to action that kick in if the question or call to action goes unanswered by the customer. As dialogue marketing proliferates, it may provide the solid new footing that Madison Avenue seeks.

  2. Automatic Processing of Navy Message Narrative.

    DTIC Science & Technology

    1985-08-21

    1 Automatic Processing of Navy Message Narrative ELAME MARSH, JUDIT FROMCIBZ RALPH GRISHMAN, 0 HENRY HAmBURGER AND JoAN RACHENKo (0 Naw~ COW fojr...such as date-time groups. 2 I IM II II NRL REPORT 883 P 162305Z AUG 82 FM USS XXXXXXXX TO RUCLBDA/COMINEGRU TWO RUCBSAAICOMNAVSURFLANT NORFOLK VA ...RUCBSAA/CINCLANTFLT NORFOLK VA RUENAAAICNO WASHINGTON DC RUEOALAINAVSAFECEN NORFOLK VA RULSSAA/COMNAVSEASYSCOM WASHINGTON DC RULSSAA/CHNAVMAT WASHINGTON DC

  3. Overview of AMS (CCSDS Asynchronous Message Service)

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott

    2006-01-01

    This viewgraph presentation gives an overview of the Consultative Committee for Space Data Systems (CCSDS) Asynchronous Message Service (AMS). The topics include: 1) Key Features; 2) A single AMS continuum; 3) The AMS Protocol Suite; 4) A multi-continuum venture; 5) Constraining transmissions; 6) Security; 7) Fault Tolerance; 8) Performance of Reference Implementation; 9) AMS vs Multicast (1); 10) AMS vs Multicast (2); 11) RAMS testing exercise; and 12) Results.

  4. 77 FR 277 - Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P; Notice of Availability of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-04

    ... Energy Regulatory Commission Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P; Notice of... Sabine Pass LNG, L.P. (collectively referred to as Sabine Pass) in the above-referenced docket. Sabine... exportation of natural gas at the existing Sabine Pass LNG Import Terminal in Cameron Parish, Louisiana....

  5. 78 FR 66909 - Sabine Pass Liquefaction, LLC; Sabine Pass LNG, L.P.; Notice of Application to Amend...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-07

    ... Energy Regulatory Commission Sabine Pass Liquefaction, LLC; Sabine Pass LNG, L.P.; Notice of Application... Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P. (collectively, Sabine Pass), 700 Milam Street... No. CP13-2 on August 2, 2013, in order to increase the total LNG production capacity of...

  6. 78 FR 62319 - Golden Pass Products, LLC, Golden Pass Pipeline, LLC; Notice of Intent To Prepare an...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-16

    ... Prepare an Environmental Assessment for the Planned Golden Pass LNG Export Project and Golden Pass Export... operation of the Golden Pass Liquefied Natural Gas (LNG) Project and Golden Pass Export Pipeline Project, collectively called the Golden Pass LNG Export Project (Project) in Texas and Louisiana. The Project has...

  7. 75 FR 68347 - Sabine Pass Liquefaction LLC, and Sabine Pass LNG, L.P.; Notice of Intent To Prepare an...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-05

    ... Energy Regulatory Commission Sabine Pass Liquefaction LLC, and Sabine Pass LNG, L.P.; Notice of Intent To... facilities by Sabine Pass Liquefaction LLC, and Sabine Pass LNG, L.P. (collectively referred to as Sabine... responsibilities. DOE proposes to authorize Sabine Pass Liquefaction, LLC to export liquefied natural gas...

  8. 76 FR 9573 - Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Energy Regulatory Commission Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P.; Notice of Application Take notice that on January 31, 2011, Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P... (Liquefaction Project) at the existing Sabine Pass LNG Terminal, located in Cameron Parish, Louisiana....

  9. Encoding and decoding messages with chaotic lasers

    SciTech Connect

    Alsing, P.M.; Gavrielides, A.; Kovanis, V.; Roy, R.; Thornburg, K.S. Jr.

    1997-12-01

    We investigate the structure of the strange attractor of a chaotic loss-modulated solid-state laser utilizing return maps based on a combination of intensity maxima and interspike intervals, as opposed to those utilizing Poincar{acute e} sections defined by the intensity maxima of the laser ({dot I}=0,{umlt I}{lt}0) alone. We find both experimentally and numerically that a simple, intrinsic relationship exists between an intensity maximum and the pair of preceding and succeeding interspike intervals. In addition, we numerically investigate encoding messages on the output of a chaotic transmitter laser and its subsequent decoding by a similar receiver laser. By exploiting the relationship between the intensity maxima and the interspike intervals, we demonstrate that the method utilized to encode the message is vital to the system{close_quote}s ability to hide the signal from unwanted deciphering. In this work alternative methods are studied in order to encode messages by modulating the magnitude of pumping of the transmitter laser and also by driving its loss modulation with more than one frequency. {copyright} {ital 1997} {ital The American Physical Society}

  10. Message routing in HARTS with faulty components

    NASA Technical Reports Server (NTRS)

    Olson, Alan; Shin, Kang G.

    1989-01-01

    It is important to design a distributed system which is capable of delivering messages even in the presence of faulty components between their source and destination nodes. A routing scheme is developed in two steps for a wrapped hexagonal mesh, called HARTS (Hexagonal Architecture for Real-Time Systems), which assures the delivery of every message as long as there is a path between its source and destination. The proposed scheme can also detect the nonexistence of path between a pair of nodes in a finite amount of time. Moreover, the scheme requires each node in HARTS to know only the state (faulty or not) of each of its own links. The performance of the simple routing scheme is simulated for 3- and 5-dimensional H-meshes while varying the physical distribution of faulty components. It is shown that a shortest path between the source and destination of each message is taken with a high probability and a path, if it exists, is usually found very quickly.

  11. Low latency messages on distributed memory multiprocessors

    NASA Technical Reports Server (NTRS)

    Rosing, Matthew; Saltz, Joel

    1993-01-01

    Many of the issues in developing an efficient interface for communication on distributed memory machines are described and a portable interface is proposed. Although the hardware component of message latency is less than one microsecond on many distributed memory machines, the software latency associated with sending and receiving typed messages is on the order of 50 microseconds. The reason for this imbalance is that the software interface does not match the hardware. By changing the interface to match the hardware more closely, applications with fine grained communication can be put on these machines. Based on several tests that were run on the iPSC/860, an interface that will better match current distributed memory machines is proposed. The model used in the proposed interface consists of a computation processor and a communication processor on each node. Communication between these processors and other nodes in the system is done through a buffered network. Information that is transmitted is either data or procedures to be executed on the remote processor. The dual processor system is better suited for efficiently handling asynchronous communications compared to a single processor system. The ability to send data or procedure is very flexible for minimizing message latency, based on the type of communication being performed. The test performed and the proposed interface are described.

  12. Leveraging messages and corporations: the Philippine experience.

    PubMed

    Rimon Jg

    1989-12-01

    A project using the entertainment media was developed to promote responsible sexual behavior of young people in the Philippines. Music videos by Lea Salonga and the group Menudo were used to sell the message of responsible sexual behavior and to encourage counseling for discussing and solving their problems. There were 2 parts: a commercial phase to make the songs hits with a social message, and an institutional phase to develop counseling centers and a telephone counseling service. The project was planned to use cost sharing with private corporations, and over $1.4 million was obtained from corporate sponsorship. Surveys after the project began showed that 92% of the young people heard the song and 90% like it. Over 51% stated that it had an impact on them, 44% talked to their parents about it, and 25% asked for contraceptive information. Of those surveyed, 83% said they were aware of the telephone counseling service offered. There were over 8,000 calls answered by the counselors. The lessons learned from this project were that the use of professionals and top materials can help gain corporate support and access to the media. By planning to use cost sharing and cost recovery methods, a challenge is presented to the staff to use creative approaches. The use of the right celebrities can aid visibility, credibility and excitement to the project. This approach can be a useful method to promote a social message and get the interest of the private sector.

  13. Passing the Bond Issue (with Related Video)

    ERIC Educational Resources Information Center

    Erickson, Paul W.

    2011-01-01

    When a bond referendum comes around for a school district, it often is the culmination of years of planning, strategizing and communicating to the public. Especially in these economic times, passing a building referendum is challenging. Complete transparency among the superintendent, school board and community is essential to communicate the…

  14. 27 CFR 9.88 - Pacheco Pass.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Pacheco Pass. 9.88 Section 9.88 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY ALCOHOL AMERICAN VITICULTURAL AREAS Approved American Viticultural Areas § 9.88...

  15. Educational Programs for By-Passed Populations.

    ERIC Educational Resources Information Center

    Morgan, Don A., Ed.

    The objective of the symposium from which this document resulted was to give visibility to some worthwhile programs for mobile and "by-passed" populations, in order to allow those in attendance at the symposium and those exposed to the published proceedings to capitalize on what has been learned through these programs. The conference report points…

  16. The Physics of "String Passing through Ice"

    ERIC Educational Resources Information Center

    Mohazzabi, Pirooz

    2011-01-01

    One of the oldest yet interesting experiments related to heat and thermodynamics is placing a string on a block of ice and hanging two masses from the ends of the string. Sometime later, it is discovered that the string has passed through the ice without cutting it in half. A simple explanation of this effect is that the pressure caused by the…

  17. PASS: Creating Physically Active School Systems

    ERIC Educational Resources Information Center

    Ciotto, Carol M.; Fede, Marybeth H.

    2014-01-01

    PASS, a Physically Active School System, is a program by which school districts and schools utilize opportunities for school-based physical activity that enhance overall fitness and cognition, which can be broken down into four integral parts consisting of connecting, communicating, collaborating, and cooperating. There needs to be an…

  18. Generalizing Galileo's Passe-Dix Game

    ERIC Educational Resources Information Center

    Hombas, Vassilios

    2012-01-01

    This article shows a generalization of Galileo's "passe-dix" game. The game was born following one of Galileo's [G. Galileo, "Sopra le Scoperte dei Dadi" (Galileo, Opere, Firenze, Barbera, Vol. 8). Translated by E.H. Thorne, 1898, pp. 591-594] explanations on a paradox that occurred in the experiment of tossing three fair "six-sided" dice.…

  19. The prototype message broadcast system for the superconducting super collider

    SciTech Connect

    Low, K.; Skegg, R. )

    1991-04-01

    This paper presents a prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system.

  20. The prototype message broadcast system for the Superconducting Super Collider

    SciTech Connect

    Low, K.; Skegg, R.

    1990-11-01

    A prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider is presented. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system. A simple version of this system is to be used in the Accelerator Systems String Test (ASST) at the SSC site in 1991. 3 refs., 6 figs., 1 tab.

  1. Source Similarity and Social Media Health Messages: Extending Construal Level Theory to Message Sources.

    PubMed

    Young, Rachel

    2015-09-01

    Social media users post messages about health goals and behaviors to online social networks. Compared with more traditional sources of health communication such as physicians or health journalists, peer sources are likely to be perceived as more socially close or similar, which influences how messages are processed. This experimental study uses construal level theory of psychological distance to predict how mediated health messages from peers influence health-related cognition and behavioral intention. Participants were exposed to source cues that identified peer sources as being either highly attitudinally and demographically similar to or different from participants. As predicted by construal level theory, participants who perceived sources of social media health messages as highly similar listed a greater proportion of beliefs about the feasibility of health behaviors and a greater proportion of negative beliefs, while participants who perceived sources as more dissimilar listed a greater proportion of positive beliefs about the health behaviors. Results of the study could be useful in determining how health messages from peers could encourage individuals to set realistic health goals.

  2. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-02-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme.

  3. Single Pass Streaming BLAST on FPGAs*†

    PubMed Central

    Herbordt, Martin C.; Model, Josh; Sukhwani, Bharat; Gu, Yongfeng; VanCourt, Tom

    2008-01-01

    Approximate string matching is fundamental to bioinformatics and has been the subject of numerous FPGA acceleration studies. We address issues with respect to FPGA implementations of both BLAST- and dynamic-programming- (DP) based methods. Our primary contribution is a new algorithm for emulating the seeding and extension phases of BLAST. This operates in a single pass through a database at streaming rate, and with no preprocessing other than loading the query string. Moreover, it emulates parameters turned to maximum possible sensitivity with no slowdown. While current DP-based methods also operate at streaming rate, generating results can be cumbersome. We address this with a new structure for data extraction. We present results from several implementations showing order of magnitude acceleration over serial reference code. A simple extension assures compatibility with NCBI BLAST. PMID:19081828

  4. Effects of subliminal backward-recorded messages on attitudes.

    PubMed

    Swart, L C; Morgan, C L

    1992-12-01

    This study was designed to measure the effects of subliminal backward messages on attitudes. It was hypothesized that subliminal backward-recorded messages would influence the attitudes of listeners. Three subliminal backward-recorded messages from a popular song were used. 82 undergraduates were randomly assigned to one of four conditions: a three-message group heard a tape containing the backward messages recorded three times in succession, a six-message group heard a tape with the same backward messages recorded six times in succession, two control groups heard nonbackward recorded music. No statistically significant differences were found between the groups on a posttape attitude questionnaire. The results are discussed in terms of unconscious processing and the tricomponent theory of attitudes and attitude change.

  5. Evaluating the Sustained Performance of COTS-based Messaging Systems

    SciTech Connect

    Tran, Phong; Gosper, Jeff; Gorton, Ian

    2003-12-01

    Messaging systems, which include message brokers built on top of message-oriented middleware, have been used as middleware components in many enterprise application integration projects. There are many COTS-based messaging systems on the market, but there is little concrete understanding in the software industry on the performance of these different technologies. The authors have carried out a scenario-based evaluation of three leading messaging systems to provide insight into performance issues. The evaluation process includes a study of the sustained performance of the system under load. The result of this study is used to derive a generic metric for quantifying a messaging systems performance. The paper describes a synthetic transactional scenario, which is used for load tests and performance measurement. The results from executing this test scenario with three messaging systems are then presented and explained.

  6. Assessing clarity of message communication for mandated USEPA drinking water quality reports.

    PubMed

    Phetxumphou, Katherine; Roy, Siddhartha; Davy, Brenda M; Estabrooks, Paul A; You, Wen; Dietrich, Andrea M

    2016-04-01

    The United States Environmental Protection Agency mandates that community water systems (CWSs), or drinking water utilities, provide annual consumer confidence reports (CCRs) reporting on water quality, compliance with regulations, source water, and consumer education. While certain report formats are prescribed, there are no criteria ensuring that consumers understand messages in these reports. To assess clarity of message, trained raters evaluated a national sample of 30 CCRs using the Centers for Disease Control Clear Communication Index (Index) indices: (1) Main Message/Call to Action; (2) Language; (3) Information Design; (4) State of the Science; (5) Behavioral Recommendations; (6) Numbers; and (7) Risk. Communication materials are considered qualifying if they achieve a 90% Index score. Overall mean score across CCRs was 50 ± 14% and none scored 90% or higher. CCRs did not differ significantly by water system size. State of the Science (3 ± 15%) and Behavioral Recommendations (77 ± 36%) indices were the lowest and highest, respectively. Only 63% of CCRs explicitly stated if the water was safe to drink according to federal and state standards and regulations. None of the CCRs had passing Index scores, signaling that CWSs are not effectively communicating with their consumers; thus, the Index can serve as an evaluation tool for CCR effectiveness and a guide to improve water quality communications.

  7. Corpus Linguistics and the Design of a Response Message

    NASA Astrophysics Data System (ADS)

    Atwell, E.

    2002-01-01

    Most research related to SETI, the Search for Extra-Terrestrial Intelligence, is focussed on techniques for detection of possible incoming signals from extra-terrestrial intelligent sources (e.g. Turnbull et al. 1999), and algorithms for analysis of these signals to identify intelligent language-like characteristics (e.g. Elliott and Atwell 1999, 2000). However, another issue for research and debate is the nature of our response, should a signal arrive and be detected. The design of potentially the most significant communicative act in history should not be decided solely by astrophysicists; the Corpus Linguistics research community has a contribution to make to what is essentially a Corpus design and implementation project. (Vakoch 1998) advocated that the message constructed to transmit to extraterrestrials should include a broad, representative collection of perspectives rather than a single viewpoint or genre; this should strike a chord with Corpus Linguists for whom a central principle is that a corpus must be "balanced" to be representative (Meyer 2001). One idea favoured by SETI researchers is to transmit an encyclopaedia summarising human knowledge, such as the Encyclopaedia Britannica, to give ET communicators an overview and "training set" key to analysis of subsequent messages. Furthermore, this should be sent in several versions in parallel: the text; page-images, to include illustrations left out of the text-file and perhaps some sort of abstract linguistic representation of the text, using a functional or logic language (Ollongren 1999, Freudenthal 1960). The idea of "enriching" the message corpus with annotations at several levels should also strike a chord with Corpus Linguists who have long known that Natural language exhibits highly complex multi-layering sequencing, structural and functional patterns, as difficult to model as sequences and structures found in more traditional physical and biological sciences. Some corpora have been annotated with

  8. Message generalizations that support evidence-based persuasive message design: specifying the evidentiary requirements.

    PubMed

    O'Keefe, Daniel J

    2015-01-01

    Evidence-based persuasive message design can be informed by dependable research-based generalizations about the relative persuasiveness of alternative message-design options. Five propositions are offered as specifying what constitutes the best evidence to underwrite such generalizations: (1) The evidence should take the form of replicated randomized trials in which message features are varied. (2) Results should be described in terms of effect sizes and confidence intervals, not statistical significance. (3) The results should be synthesized using random-effects meta-analytic procedures. (4) The analysis should treat attitudinal, intention, and behavioral assessments as yielding equivalent indices of relative persuasiveness. (5) The replications included in research syntheses should not be limited to published studies or to English-language studies.

  9. Collective Influence Algorithm to find influencers via optimal percolation in massively large social media

    PubMed Central

    Morone, Flaviano; Min, Byungjoon; Bo, Lin; Mari, Romain; Makse, Hernán A.

    2016-01-01

    We elaborate on a linear-time implementation of Collective-Influence (CI) algorithm introduced by Morone, Makse, Nature 524, 65 (2015) to find the minimal set of influencers in networks via optimal percolation. The computational complexity of CI is O(N log N) when removing nodes one-by-one, made possible through an appropriate data structure to process CI. We introduce two Belief-Propagation (BP) variants of CI that consider global optimization via message-passing: CI propagation (CIP) and Collective-Immunization-Belief-Propagation algorithm (CIBP) based on optimal immunization. Both identify a slightly smaller fraction of influencers than CI and, remarkably, reproduce the exact analytical optimal percolation threshold obtained in Random Struct. Alg. 21, 397 (2002) for cubic random regular graphs, leaving little room for improvement for random graphs. However, the small augmented performance comes at the expense of increasing running time to O(N2), rendering BP prohibitive for modern-day big-data. For instance, for big-data social networks of 200 million users (e.g., Twitter users sending 500 million tweets/day), CI finds influencers in 2.5 hours on a single CPU, while all BP algorithms (CIP, CIBP and BDP) would take more than 3,000 years to accomplish the same task. PMID:27455878

  10. Collective Influence Algorithm to find influencers via optimal percolation in massively large social media.

    PubMed

    Morone, Flaviano; Min, Byungjoon; Bo, Lin; Mari, Romain; Makse, Hernán A

    2016-07-26

    We elaborate on a linear-time implementation of Collective-Influence (CI) algorithm introduced by Morone, Makse, Nature 524, 65 (2015) to find the minimal set of influencers in networks via optimal percolation. The computational complexity of CI is O(N log N) when removing nodes one-by-one, made possible through an appropriate data structure to process CI. We introduce two Belief-Propagation (BP) variants of CI that consider global optimization via message-passing: CI propagation (CIP) and Collective-Immunization-Belief-Propagation algorithm (CIBP) based on optimal immunization. Both identify a slightly smaller fraction of influencers than CI and, remarkably, reproduce the exact analytical optimal percolation threshold obtained in Random Struct. Alg. 21, 397 (2002) for cubic random regular graphs, leaving little room for improvement for random graphs. However, the small augmented performance comes at the expense of increasing running time to O(N(2)), rendering BP prohibitive for modern-day big-data. For instance, for big-data social networks of 200 million users (e.g., Twitter users sending 500 million tweets/day), CI finds influencers in 2.5 hours on a single CPU, while all BP algorithms (CIP, CIBP and BDP) would take more than 3,000 years to accomplish the same task.

  11. Collective Influence Algorithm to find influencers via optimal percolation in massively large social media

    NASA Astrophysics Data System (ADS)

    Morone, Flaviano; Min, Byungjoon; Bo, Lin; Mari, Romain; Makse, Hernán A.

    2016-07-01

    We elaborate on a linear-time implementation of Collective-Influence (CI) algorithm introduced by Morone, Makse, Nature 524, 65 (2015) to find the minimal set of influencers in networks via optimal percolation. The computational complexity of CI is O(N log N) when removing nodes one-by-one, made possible through an appropriate data structure to process CI. We introduce two Belief-Propagation (BP) variants of CI that consider global optimization via message-passing: CI propagation (CIP) and Collective-Immunization-Belief-Propagation algorithm (CIBP) based on optimal immunization. Both identify a slightly smaller fraction of influencers than CI and, remarkably, reproduce the exact analytical optimal percolation threshold obtained in Random Struct. Alg. 21, 397 (2002) for cubic random regular graphs, leaving little room for improvement for random graphs. However, the small augmented performance comes at the expense of increasing running time to O(N2), rendering BP prohibitive for modern-day big-data. For instance, for big-data social networks of 200 million users (e.g., Twitter users sending 500 million tweets/day), CI finds influencers in 2.5 hours on a single CPU, while all BP algorithms (CIP, CIBP and BDP) would take more than 3,000 years to accomplish the same task.

  12. Tobacco industry manipulation messages in anti-smoking public service announcements: the effect of explicitly versus implicitly delivering messages.

    PubMed

    Shadel, William G; Fryer, Craig S; Tharp-Taylor, Shannah

    2010-05-01

    Message content in anti-smoking public service announcements (PSAs) can be delivered explicitly (directly with concrete statements) or implicitly (indirectly via metaphor), and the method of delivery may affect the efficacy of those PSAs. The purpose of this study was to conduct an initial test of this idea using tobacco industry manipulation PSAs in adolescents. A 2 (age: 11-14 years old; 15-17 years old)x2 (message delivery: implicit, explicit) mixed model design was used. There was a significant main effect of message delivery: Tobacco industry manipulation PSAs that delivered their messages explicitly were associated with stronger levels of smoking resistance self-efficacy compared to tobacco industry manipulation PSAs that delivered their messages implicitly. No significant main effects of age were found nor were any interactions between age and message delivery. These results suggest that message delivery factors should be taken into account when designing anti-smoking PSAs.

  13. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages.

    PubMed

    Cole, Galen E; Keller, Punam A; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-03-01

    The Centers for Disease Control and Prevention's Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces.

  14. When Communications Collide With Recipients’ Actions: Effects of Post-Message Behavior on Intentions to Follow the Message Recommendation

    PubMed Central

    Albarracín, Dolores; Cohen, Joel B.; Kumkale, G. Tarcan

    2013-01-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance. PMID:15018672

  15. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages

    PubMed Central

    Cole, Galen E.; Keller, Punam A.; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-01-01

    The Centers for Disease Control and Prevention’s Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces. PMID:26877714

  16. Massively parallel algorithm and implementation of RI-MP2 energy calculation for peta-scale many-core supercomputers.

    PubMed

    Katouda, Michio; Naruse, Akira; Hirano, Yukihiko; Nakajima, Takahito

    2016-11-15

    A new parallel algorithm and its implementation for the RI-MP2 energy calculation utilizing peta-flop-class many-core supercomputers are presented. Some improvements from the previous algorithm (J. Chem. Theory Comput. 2013, 9, 5373) have been performed: (1) a dual-level hierarchical parallelization scheme that enables the use of more than 10,000 Message Passing Interface (MPI) processes and (2) a new data communication scheme that reduces network communication overhead. A multi-node and multi-GPU implementation of the present algorithm is presented for calculations on a central processing unit (CPU)/graphics processing unit (GPU) hybrid supercomputer. Benchmark results of the new algorithm and its implementation using the K computer (CPU clustering system) and TSUBAME 2.5 (CPU/GPU hybrid system) demonstrate high efficiency. The peak performance of 3.1 PFLOPS is attained using 80,199 nodes of the K computer. The peak performance of the multi-node and multi-GPU implementation is 514 TFLOPS using 1349 nodes and 4047 GPUs of TSUBAME 2.5. © 2016 Wiley Periodicals, Inc.

  17. Getting your message out with social marketing.

    PubMed

    Manoff, R K

    1997-09-01

    This article was based on a speech presented at a Plenary Session of the 1996 Annual Meeting of the American Society of Tropical Medicine and Hygiene. The address describes the nature of social marketing with examples and some lessons learned in developing countries. The earliest social marketers were Moses with the Ten Commandments of God and Indian religious authorities with fertility motifs inscribed on temple walls. Modern marketers of beer and snack food preempted the ancients and made social marketing more ingenious. The strategy shifted to supplying a product to satisfy a consumer want. Messages became a two-way process that minimized feedback shock. Focus groups were used to probe consumers' thoughts. Research must probe the total environment of the "problem." In Brazil, breast feeding promotions revealed that the perceived problem may not be the real problem, and there was no single magic solution. Most tropical disease prevention approaches do not rely on multistage strategies. The oral rehydration therapy (ORT) strategy became a world-wide model when strategists realized that the formula had to be easy to remember, diarrhea had to be recognized as a disease, and the function of ORT had to be clearly defined. The Bangladesh Social Marketing Campaign was successful in getting men to discuss family planning with their wives and establishing the family planning worker as a heroine. Effective messages must uncover points of resistance to the message. Public health advances in the 19th century were due to social policy to improve water supply, sanitation, and nutrition. The iodization of salt in Ecuador was possible with political will, public awareness, redirection of perception, and motivation of demand. Social marketing resources exist in all countries nowadays. Only medical and scientific professionals can promote concern about tropical diseases and raise the prevention priority on the public agenda.

  18. HyperPASS, a New Aeroassist Tool

    NASA Technical Reports Server (NTRS)

    Gates, Kristin; McRonald, Angus; Nock, Kerry

    2005-01-01

    A new software tool designed to perform aeroassist studies has been developed by Global Aerospace Corporation (GAC). The Hypersonic Planetary Aeroassist Simulation System (HyperPASS) [1] enables users to perform guided aerocapture, guided ballute aerocapture, aerobraking, orbit decay, or unguided entry simulations at any of six target bodies (Venus, Earth, Mars, Jupiter, Titan, or Neptune). HyperPASS is currently being used for trade studies to investigate (1) aerocapture performance with alternate aeroshell types, varying flight path angle and entry velocity, different gload and heating limits, and angle of attack and angle of bank variations; (2) variable, attached ballute geometry; (3) railgun launched projectile trajectories, and (4) preliminary orbit decay evolution. After completing a simulation, there are numerous visualization options in which data can be plotted, saved, or exported to various formats. Several analysis examples will be described.

  19. Geothermal temperature gradient core drill, Santiam Pass

    SciTech Connect

    Not Available

    1989-01-01

    DOE is proposing to share in the cost of drilling a 3000-ft core hole to evaluate temperature gradients, subsurface geology and the geothermal potential of an area in the Cascade Mountains. The proposed core hole will be located in the Deschutes National Forest in Oregon, near Santiam Pass. The proposed action has been described in the Environmental Assessment (EA) for Geothermal Temperature Gradient Core Drill Santiam Pass Area (No. OR-050-9-51) prepared by the US Bureau of Land Management (BLM). DOE has determined that the BLM EA adequately addresses the impacts of the proposal and is hereby adopting the EA in partial fulfillment of its NEPA responsibilities. Based upon a review of the EA and an independent analysis, DOE has concluded that the proposed corehole drilling project does not constitute a major federal action significantly affecting the quality of the human environment within the meaning of NEPA. Therefore, an environmental impact statement will not be prepared.

  20. Battery Cell By-Pass Circuit

    NASA Technical Reports Server (NTRS)

    Evers, Jeffrey (Inventor); Gelger, Ronald V. (Inventor)

    2001-01-01

    The invention is a circuit and method of limiting the charging current voltage from a power supply net work applied to an individual cell of a plurality of cells making up a battery being charged in series. It is particularly designed for use with batteries that can be damaged by overcharging, such as Lithium-ion type batteries. In detail. the method includes the following steps: 1) sensing the actual voltage level of the individual cell; 2) comparing the actual voltage level of the individual cell with a reference value and providing an error signal representative thereof; and 3) by-passing the charging current around individual cell necessary to keep the individual cell voltage level generally equal a specific voltage level while continuing to charge the remaining cells. Preferably this is accomplished by by-passing the charging current around the individual cell if said actual voltage level is above the specific voltage level and allowing the charging current to the individual cell if the actual voltage level is equal or less than the specific voltage level. In the step of bypassing the charging current, the by-passed current is transferred at a proper voltage level to the power supply. The by-pass circuit a voltage comparison circuit is used to compare the actual voltage level of the individual cell with a reference value and to provide an error signal representative thereof. A third circuit, designed to be responsive to the error signal, is provided for maintaining the individual cell voltage level generally equal to the specific voltage level. Circuitry is provided in the third circuit for bypassing charging current around the individual cell if the actual voltage level is above the specific voltage level and transfers the excess charging current to the power supply net work. The circuitry also allows charging of the individual cell if the actual voltage level is equal or less than the specific voltage level.

  1. Pass-Fail: How Is It Working?

    ERIC Educational Resources Information Center

    Chase, Clinton I.; And Others

    This study investigates the pass/fail (P/F) grading system. A sample of 154 Indiana University students was interviewed. Half of the group, 77 students, had not taken any P/F courses. Of the remaining 77 students, 42% had taken only one P/F course and most of the rest from two to five courses. Results of the student interview questionnaire…

  2. Neuroscience and education: myths and messages.

    PubMed

    Howard-Jones, Paul A

    2014-12-01

    For several decades, myths about the brain - neuromyths - have persisted in schools and colleges, often being used to justify ineffective approaches to teaching. Many of these myths are biased distortions of scientific fact. Cultural conditions, such as differences in terminology and language, have contributed to a 'gap' between neuroscience and education that has shielded these distortions from scrutiny. In recent years, scientific communications across this gap have increased, although the messages are often distorted by the same conditions and biases as those responsible for neuromyths. In the future, the establishment of a new field of inquiry that is dedicated to bridging neuroscience and education may help to inform and to improve these communications.

  3. TE and TM pass integrated optic polarizers

    NASA Astrophysics Data System (ADS)

    Madaan, Divya; Kaur, Davinder; Sharma, V. K.; Kapoor, A.

    2016-05-01

    A four layer integrated optical waveguide is studied, in which a high index buffer is used along with the metal cladding. The structure can act both as TE and TM pass polarizer. We have designed it for λ=1.55 µm which corresponds to telecommunication wavelength. TiO2 is used as a buffer layer with Au as metal cladding. When metal clad optical waveguides with a high index buffer layer are used there is periodic coupling between lossless modes of waveguide and the lossy modes supported by high index buffer layer with metal clad. We present theoretical results of the effect of buffer thickness on the mode index and the losses. The TM Pass polarizer with TE and TM losses, 1029.19dB/cm and 59.67dB/cm respectively are obtained. Also, TE Pass polarizer with TM and TE losses 1444.74dB/cm and 238.51dB/cm respectively are obtained.

  4. 20 CFR 416.2099 - Compliance with pass-along.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Compliance with pass-along. 416.2099 Section... pass-along. (a) Information regarding compliance. Any State required to enter into a pass-along... Commissioner's satisfaction that the State is meeting the pass-along requirements. The information...

  5. 12 CFR 560.32 - Pass-through investments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Pass-through investments. 560.32 Section 560.32... Lending and Investment Powers for Federal Savings Associations § 560.32 Pass-through investments. (a) A federal savings association (“you”) may make pass-through investments. A pass-through investment...

  6. 36 CFR 13.918 - Sable Pass Wildlife Viewing Area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Sable Pass Wildlife Viewing... Preserve General Provisions § 13.918 Sable Pass Wildlife Viewing Area. (a) Entry into the Sable Pass...) The Sable Pass Wildlife Viewing Area means the area within one mile of the shoulder of the Park...

  7. 7 CFR 29.97 - Who shall pass upon appeals.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Who shall pass upon appeals. 29.97 Section 29.97... REGULATIONS TOBACCO INSPECTION Regulations Appeal § 29.97 Who shall pass upon appeals. Appeals shall be passed... Director, two or more appeal inspectors may jointly pass upon an appeal. The Division may authorize...

  8. 30 CFR 56.19018 - Overtravel by-pass switches.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Overtravel by-pass switches. 56.19018 Section... Hoisting Hoists § 56.19018 Overtravel by-pass switches. When an overtravel by-pass switch is installed, the... switch is held in the closed position by the hoistman. The overtravel by-pass switch shall...

  9. 30 CFR 57.19018 - Overtravel by-pass switches.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Overtravel by-pass switches. 57.19018 Section... Hoisting Hoists § 57.19018 Overtravel by-pass switches. When an overtravel by-pass switch is installed, the... switch is held in the closed position by the hoistman. The overtravel by-pass switch shall...

  10. Generalized electrical analysis of low-pass and high-pass birdcage resonators.

    PubMed

    Pascone, R J; Garcia, B J; Fitzgerald, T M; Vullo, T; Zipagan, R; Cahill, P T

    1991-01-01

    The radio-frequency 'birdcage resonator' has found wide use in MRI/MRS for its field homogeneity and signal-noise characteristics. This paper presents a general analysis, derived from lumped element transmission line theory, of the electrical behavior of unloaded, N-column birdcage resonators applicable to several versions of the basic design including low-pass and high-pass coils. Analytic expressions and computer results are presented for both types of coil describing resonant frequencies, input and characteristic impedances, dispersion relations, pass-bands, resonant peak bandwidth and Q. Theoretical expressions for normalized resonant frequency difference ratios independent of element values and resonator geometry have been developed for generic low- and high-pass coils. Experimental measurements of resonant frequencies were made for six coils, and the average agreement with theoretical predictions was approximately 4%.

  11. The Effectiveness of Heat Exchangers with One Shell Pass and Three Tube Passes.

    DTIC Science & Technology

    1985-06-01

    DOCUMENTATION PAGE READ COSTRUCTIONS 1. REPORT NUMBER 12. GOVT ACCESSION NO. 3. RECIPIENT’S CATALOG NUMBER 4. TITLE (and Subtitle) S. TYPE OF REPORT 6 PERIOD...COVERED 0 The Effectiveness of Heat Exchangers Master’s Thesis; With One Shell Pass and Three Tube June 1985 Passes S. PERFORMING ORG. REPORT NUMBER 7...AUTHORa) 8. CONTRACT OR GRANT NUMBER (.) Mark S. O’Hare . PERFORMING ORGANIZATION NAME AND ADDRESS t0. PROGRAM ELEMENT. PROJECT, TASK AREA & WORK UNIT

  12. Source entitativity and the elaboration of persuasive messages: the roles of perceived efficacy and message discrepancy.

    PubMed

    Clark, Jason K; Wegener, Duane T

    2009-07-01

    Compared with nonentitative groups, entitative targets are considered to elicit more elaborative processing because of the singularity or unity they represent. However, when groups serve as sources of persuasive messages, other dynamics may operate. The current research suggests that entitativity is intrinsically linked to perceptions of a group's efficacy related to the advocacy, and this efficacy combines with the position of the appeal to determine message elaboration. When messages are counterattitudinal, entitative (efficacious) sources should elicit greater processing than nonentitative groups because of concern that the entitative sources may be more likely to bring about the negative outcomes proposed. However, when appeals are proattitudinal, sources low in entitativity (nonefficacious) should initiate more elaboration due to concern that they may be unlikely to facilitate the positive outcomes proposed. These hypotheses were supported in a series of studies. Preliminary studies established the entitativity-efficacy relation (Studies 1A and 1B). Primary persuasion studies showed that manipulations of source entitativity (Studies 2 and 3) and source efficacy (Studies 4A and 4B) have opposite effects on processing as a function of message discrepancy.

  13. Language Implications for Advertising in International Markets: A Model for Message Content and Message Execution.

    ERIC Educational Resources Information Center

    Beard, John; Yaprak, Attila

    A content analysis model for assessing advertising themes and messages generated primarily for United States markets to overcome barriers in the cultural environment of international markets was developed and tested. The model is based on three primary categories for generating, evaluating, and executing advertisements: rational, emotional, and…

  14. Source Credibility in Tobacco Control Messaging

    PubMed Central

    Schmidt, Allison M.; Ranney, Leah M.; Pepper, Jessica K.; Goldstein, Adam O.

    2016-01-01

    Objectives Perceived credibility of a message’s source can affect persuasion. This paper reviews how beliefs about the source of tobacco control messages may encourage attitude and behavior change. Methods We conducted a series of searches of the peer-reviewed literature using terms from communication and public health fields. We reviewed research on source credibility, its underlying concepts, and its relation to the persuasiveness of tobacco control messages. Results We recommend an agenda for future research to bridge the gaps between communication literature on source credibility and tobacco control research. Our recommendations are to study the impact of source credibility on persuasion with long-term behavior change outcomes, in different populations and demographic groups, by developing new credibility measures that are topic- and organization-specific, by measuring how credibility operates across media platforms, and by identifying factors that enhance credibility and persuasion. Conclusions This manuscript reviews the state of research on source credibility and identifies gaps that are maximally relevant to tobacco control communication. Knowing first whether a source is perceived as credible, and second, how to enhance perceived credibility, can inform the development of future tobacco control campaigns and regulatory communications. PMID:27525298

  15. Comics: a medium for today's development messages.

    PubMed

    Opilas, E A

    1978-03-01

    Filipino illustrated magazines, or the comics, may yet prove to be the most effective media, if not the most effective, for spreading the country's development messages. Long criticized by intellectuals and the social elite, the comics have been grossly underrated in their potential to inform, persuade, and even influence the life-style of the people. The government's Commission on Population (Popcom) has developed an information-education-communication program using the comics, among other media, to disseminate stories on family planning, responsible parenthood, and related topics. Its best quality is popular appeal, and for publishers and distribution outlets, the comics provide good business. A review of these materials shows that their themes reflect the following topics or issues: 1) population trends and consequences; 2) socioeconomic benefits of family planning; 3) customs which influence family planning; 4) family planning concepts; 5) family planning methods; 6) human sexuality and reproduction; 7) the husband-wife relationship; 8) guides for family planning motivation or communication; and 9) guides for teaching family planning. The materials were developed with 4 qualities in mind so as to attract audience or reader interest: simplicity, familiarity, realism, and attractiveness of materials. The consensus is that in the comics, population and development agencies may have found a "secret weapon" in getting these messages across, and that this new-found use for the illustrated magazines may be giving them a new respectability without in any way diminishing their popular appeal.

  16. Music carries a message to youths.

    PubMed

    Coleman, P L

    1986-01-01

    The most widely played song in Mexico in March 1986 is a special record designed to encourage young people to be sexually responsible and not to bring into the world children they cannot care for. "It's OK to say 'no,'" is the message of a unique new family planning and health communication project designed to reach young people in 11 Spanish speaking countries of Latin America and the Caribbean. What makes this ambitious regional project so unique is not just the message or the remarkable success of the 1st song but the combination of materials that were produced, the way they were produced, and how they are now being used throughout the region. The Population Communication Services project in the Johns Hopkins School of Hygiene and Public Health (JHU/PCS) has been working in Latin America and elsewhere for 4 years to support innovative family planning communication projects. It became evident that 1 key group was not being reached, i.e., young people aged 13-18 who comprise approximately 30% of the total population in Latin America. The fertility and sexual behavior of young people have a significant impact on their own lives, their community, their country, and the region. Early pregnancy is a major health and social problem throughout the region and the world. To address this problem, the JHU/PCS decided to develop a regional Latin American project to make young people more sharply aware of the personal advantages to them of responsible parenthood. JHU/PCS put together a financial, marketing, and institutional package. The US Agency for International Development (USAID) provided the finances. Analysis showed that the common denominator for young people throughout the region is music. The decision was made to produce 2 songs, each with a music video, pressed on each side of 45 rpm single records and enclosed in a full-size, full-color, 2-sided record jacket which folds out into a poster. The next step was to refine the general message of sexual responsibility to

  17. Effect of Ball Mass on Dribble, Pass, and Pass Reception in 9-11-Year-Old Boys' Basketball

    ERIC Educational Resources Information Center

    Arias, Jose L.; Argudo, Francisco M.; Alonso, Jose I.

    2012-01-01

    The objective of the study was to analyze the effect of ball mass on dribble, pass, and pass reception in real game situations in 9-11-year-old boys' basketball. Participants were 54 boys identified from six federated teams. The independent variable was ball mass, and dependent variables were number of dribbles, passes, and pass receptions. Three…

  18. On the Conceptual Ambiguity Surrounding Perceived Message Effectiveness

    PubMed Central

    Yzer, Marco; LoRusso, Susan; Nagler, Rebekah H.

    2015-01-01

    Health message quality is best understood in terms of a message’s ability to effectively produce change in the variables that it was designed to change. The importance of determining a message’s effectiveness in producing change prior to implementation is clear: The better a message’s potential effectiveness is understood, the better able interventionists are to distinguish effective from ineffective messages before allocating scarce resources to message implementation. For this purpose, research has relied on perceived message effectiveness measures as a proxy of a message’s potential effectiveness. Remarkably, however, very little conceptual work has been done on perceived message effectiveness, which renders its measures under-informed and inconsistent across studies. To encourage greater conceptual work on this important construct, we review several threats to the validity of existing measures and consider strategies for improving our understanding of perceived message effectiveness. PMID:25470437

  19. Breast cancer messaging for younger women: gender, femininity, and risk.

    PubMed

    Haines, Rebecca J; Bottorff, Joan L; Barclay McKeown, Stephanie; Ptolemy, Erin; Carey, Joanne; Sullivan, Kelli

    2010-06-01

    Evidence linking both active smoking and secondhand smoke exposure to premenopausal breast cancer makes the development of health messages specific to younger women a pressing priority. To determine how to communicate information about this modifiable breast cancer risk to young women, we analyzed a selection of 32 recent English-language breast cancer messages and campaigns that targeted young women. In addition, we obtained young women's responses to three breast cancer campaign images during focus group discussions. A visual analysis of messages points to an explicitly gendered discourse within contemporary campaigns, one that entails conflicting messages regarding breast cancer, health, feminine beauty, and risk. Although the intent might be to educate and empower young women to "fight" against breast cancer, paradoxically, the messages employ imagery that sexually objectifies young women's breasts and bodies. Recommendations are made for messaging about tobacco and breast cancer risk to avoid reproducing one-dimensional or stereotypical presentations of gender and femininity.

  20. Test Message Generator and Controller for AFSATCOM Testing.

    DTIC Science & Technology

    1983-03-01

    Schematic, Sheet 6 33 3-4 Computer-to-AFSATCOM I/0 Interface Schematic 35 3-5 Internal Wiring Harness Connecting Computer, AFSATCOM Interface, and Front ...ASR buffer repeatedly. The operator selects the number of times the message is sent and the delay time between messages by means of front panel...format. 10 SECTION 2 OPERATING INSTRUCTIONS Operation of the message controller has been kept as simple as possible. The only front panel controls are an

  1. Research in Parallel Algorithms and Software for Computational Aerosciences

    NASA Technical Reports Server (NTRS)

    Domel, Neal D.

    1996-01-01

    Phase I is complete for the development of a Computational Fluid Dynamics parallel code with automatic grid generation and adaptation for the Euler analysis of flow over complex geometries. SPLITFLOW, an unstructured Cartesian grid code developed at Lockheed Martin Tactical Aircraft Systems, has been modified for a distributed memory/massively parallel computing environment. The parallel code is operational on an SGI network, Cray J90 and C90 vector machines, SGI Power Challenge, and Cray T3D and IBM SP2 massively parallel machines. Parallel Virtual Machine (PVM) is the message passing protocol for portability to various architectures. A domain decomposition technique was developed which enforces dynamic load balancing to improve solution speed and memory requirements. A host/node algorithm distributes the tasks. The solver parallelizes very well, and scales with the number of processors. Partially parallelized and non-parallelized tasks consume most of the wall clock time in a very fine grain environment. Timing comparisons on a Cray C90 demonstrate that Parallel SPLITFLOW runs 2.4 times faster on 8 processors than its non-parallel counterpart autotasked over 8 processors.

  2. Research in Parallel Algorithms and Software for Computational Aerosciences

    NASA Technical Reports Server (NTRS)

    Domel, Neal D.

    1996-01-01

    Phase 1 is complete for the development of a computational fluid dynamics CFD) parallel code with automatic grid generation and adaptation for the Euler analysis of flow over complex geometries. SPLITFLOW, an unstructured Cartesian grid code developed at Lockheed Martin Tactical Aircraft Systems, has been modified for a distributed memory/massively parallel computing environment. The parallel code is operational on an SGI network, Cray J90 and C90 vector machines, SGI Power Challenge, and Cray T3D and IBM SP2 massively parallel machines. Parallel Virtual Machine (PVM) is the message passing protocol for portability to various architectures. A domain decomposition technique was developed which enforces dynamic load balancing to improve solution speed and memory requirements. A host/node algorithm distributes the tasks. The solver parallelizes very well, and scales with the number of processors. Partially parallelized and non-parallelized tasks consume most of the wall clock time in a very fine grain environment. Timing comparisons on a Cray C90 demonstrate that Parallel SPLITFLOW runs 2.4 times faster on 8 processors than its non-parallel counterpart autotasked over 8 processors.

  3. Tabletop Molecular Communication: Text Messages through Chemical Signals

    PubMed Central

    Farsad, Nariman; Guo, Weisi; Eckford, Andrew W.

    2013-01-01

    In this work, we describe the first modular, and programmable platform capable of transmitting a text message using chemical signalling – a method also known as molecular communication. This form of communication is attractive for applications where conventional wireless systems perform poorly, from nanotechnology to urban health monitoring. Using examples, we demonstrate the use of our platform as a testbed for molecular communication, and illustrate the features of these communication systems using experiments. By providing a simple and inexpensive means of performing experiments, our system fills an important gap in the molecular communication literature, where much current work is done in simulation with simplified system models. A key finding in this paper is that these systems are often nonlinear in practice, whereas current simulations and analysis often assume that the system is linear. However, as we show in this work, despite the nonlinearity, reliable communication is still possible. Furthermore, this work motivates future studies on more realistic modelling, analysis, and design of theoretical models and algorithms for these systems. PMID:24367571

  4. Event Driven Messaging with Role-Based Subscriptions

    NASA Technical Reports Server (NTRS)

    Bui, Tung; Bui, Bach; Malhotra, Shantanu; Chen, Fannie; Kim, rachel; Allen, Christopher; Luong, Ivy; Chang, George; Zendejas, Silvino; Sadaqathulla, Syed

    2009-01-01

    Event Driven Messaging with Role-Based Subscriptions (EDM-RBS) is a framework integrated into the Service Management Database (SMDB) to allow for role-based and subscription-based delivery of synchronous and asynchronous messages over JMS (Java Messaging Service), SMTP (Simple Mail Transfer Protocol), or SMS (Short Messaging Service). This allows for 24/7 operation with users in all parts of the world. The software classifies messages by triggering data type, application source, owner of data triggering event (mission), classification, sub-classification and various other secondary classifying tags. Messages are routed to applications or users based on subscription rules using a combination of the above message attributes. This program provides a framework for identifying connected users and their applications for targeted delivery of messages over JMS to the client applications the user is logged into. EDMRBS provides the ability to send notifications over e-mail or pager rather than having to rely on a live human to do it. It is implemented as an Oracle application that uses Oracle relational database management system intrinsic functions. It is configurable to use Oracle AQ JMS API or an external JMS provider for messaging. It fully integrates into the event-logging framework of SMDB (Subnet Management Database).

  5. Understanding public resistance to messages about health disparities.

    PubMed

    Gollust, Sarah E; Cappella, Joseph N

    2014-04-01

    Advocates and policymakers strategically communicate about health disparities in an effort to raise public awareness, often by emphasizing the social and economic factors that influence these disparities. Previous research suggests that predisposing political orientation and values related to self-reliance and personal responsibility may produce resistance to such messages. In this study, the authors culled 4 messages about the causes of disparities in life expectancy from public discourse and randomly presented them to a nationally representative sample of 732 Americans. Three indicators of message resistance were measured: belief that messages are weak, elicitation of anger, and production of counterarguments. Expected political differences in message resistance were identified, with Republicans perceiving messages to be weaker, arousing less anger, and eliciting more counterarguing than for Democrats. Among 3 messages that described the social determinants of health disparities, a message that identified the role of personal choices (explicitly acknowledging personal responsibility) produced the least anger and counterarguing among Republicans. Political differences in anger arousal and counterarguing can be explained, in part, by predisposing values toward personal responsibility. These findings have relevance for policy advocates seeking to bridge public divides surrounding health disparities and for scholars advancing theories of reactance to policy-relevant health messaging.

  6. A uGNI-Based Asynchronous Message-driven Runtime System for Cray Supercomputers with Gemini Interconnect

    SciTech Connect

    Sun, Yanhua; Zheng, Gengbin; Olson, Ryan M; Jones, Terry R; Kale, Laxmikant V

    2012-01-01

    Gemini as the network for new Cray XE/XT systems features low latency, high bandwidth and strong scalability. Its hardware support for remote direct memory access enables efficient implementation of the global address space programming languages. Although the Generic Network Interface (GNI) is designed to support message-passing applications, it is still challenging to attain good performance for applications written in alternative programming models, such as the message-driven programming model. In our earlier work we showed that CHARM++, an object-oriented message-driven programming model, scales up to the full Jaguar Cray machine. In this paper, we describe a general and light-weight asynchronous Low-level RunTime System (LRTS) for CHARM+, and its implementation on the uGNI software stack for Cray XE systems. Several techniques are presented to exploit the uGNI capability by reducing memory copy and registration overhead, taking advantage of persistent communication, and improving intra-node communication. Our micro-benchmark results demonstrate that the uGNI-based runtime system outperforms the MPI-based implementation by up to 50% in terms of message latency. For communication intensive applications such as N-Queens, this implementation scales up to 15,360 cores of a Cray XE6 machine and is 70% faster than an MPI-based implementation. In molecular dynamics application NAMD, the performance is also considerably improved by as high as 18%.

  7. Design of transimpedance low-pass filters

    NASA Astrophysics Data System (ADS)

    Tan, Lingling; Li, Qiang; Li, Ruijie; Teng, Jianfu

    2013-02-01

    The input of a transimpedance filter is a current signal, while its output is a voltage signal. In this article, a design method for a transimpedance filter is introduced. Also, the topologies and calculation methods of the parameters of three biquadratic transimpedance low-pass (LP) filter circuits are presented in detail, according to the value of Q which is low or medium or high. As for the high-order filter, it can be designed by transimpedance LP biquad section as first stage cascaded with voltage-mode LP filters. Finally, to verify the effectiveness of the design, a design example of a high-order transimpedance LP filter is given.

  8. Application of Feedforward Adaptive Active-Noise Control for Reducing Blade Passing Noise in Centrifugal Fans

    NASA Astrophysics Data System (ADS)

    WU, J.-D.; BAI, M. R.

    2001-02-01

    This paper describes two configurations of feedforward adaptive active-noise control (ANC) technique for reducing blade passing noise in centrifugal fans. In one configuration, the control speaker is installed at the cut-off region of the fan, while in the other configuration at the exit duct. The proposed ANC system is based on the filtered-x least-mean-squares (FXLMS) algorithm with multi-sine synthesized reference signal and frequency counting and is implemented by using a digital signal processor (DSP). Experiments are carried out to evaluate the proposed system for reducing the noise at the blade passing frequency (BPF) and its harmonics at various flow speeds. The results of the experiment indicated that the ANC technique is effective in reducing the blade passing noise for two configurations by using the feedforward adaptive control.

  9. ABM Drag_Pass Report Generator

    NASA Technical Reports Server (NTRS)

    Fisher, Forest; Gladden, Roy; Khanampornpan, Teerapat

    2008-01-01

    dragREPORT software was developed in parallel with abmREPORT, which is described in the preceding article. Both programs were built on the capabilities created during that process. This tool generates a drag_pass report that summarizes vital information from the MRO aerobreaking drag_pass build process to facilitate both sequence reviews and provide a high-level summarization of the sequence for mission management. The script extracts information from the ENV, SSF, FRF, SCMFmax, and OPTG files, presenting them in a single, easy-to-check report providing the majority of parameters needed for cross check and verification as part of the sequence review process. Prior to dragReport, all the needed information was spread across a number of different files, each in a different format. This software is a Perl script that extracts vital summarization information and build-process details from a number of source files into a single, concise report format used to aid the MPST sequence review process and to provide a high-level summarization of the sequence for mission management reference. This software could be adapted for future aerobraking missions to provide similar reports, review and summarization information.

  10. Cassini RADARs Penultimate Passes by Titan

    NASA Astrophysics Data System (ADS)

    Wall, Stephen D.; Cassini RADAR Science Team

    2016-10-01

    The Cassini spacecraft will be in its final year of operation as you read this abstract. The RADAR instrument will observe Titan on passes that occur (or occurred) June 27 (T120), July 25 (T121) and April 22, 2017 (T126), all including SAR imaging. T120 SAR, the only pass received at this writing, has revealed what is arguably the best example of Labrynthic terrain, a unit previously identified on about 2% of the observed surface of Titan (Lopes et al., 2016); extended our observations of "cookie cutter lakes" seen in SAR the very dark area described by Griffith et al (2012), and given added context to the equatorial wind-streak features (Malaska, 2016). The T121 SAR swath promises similar exciting data as it observes Hotei Regio, an area previously thought to be a candidate cryovolcano; Tui Regio (Barnes et al., 2006); and a last look at Xanadu's eastern flanks. We will review all new findings on T120 and T121 and also preview T126 SAR, where we will get a last look at the northern seas, including Titan's "Magic Island" (Hofgartner et al., 2015).This work was carried out at the Jet Propulsion Laboratory, California Insititue of Technology, under a contract with the National Aeronautics and Space Administration.

  11. Protocols for Handling Messages Between Simulation Computers

    NASA Technical Reports Server (NTRS)

    Balcerowski, John P.; Dunnam, Milton

    2006-01-01

    Practical Simulator Network (PSimNet) is a set of data-communication protocols designed especially for use in handling messages between computers that are engaging cooperatively in real-time or nearly-real-time training simulations. In a typical application, computers that provide individualized training at widely dispersed locations would communicate, by use of PSimNet, with a central host computer that would provide a common computational- simulation environment and common data. Originally intended for use in supporting interfaces between training computers and computers that simulate the responses of spacecraft scientific payloads, PSimNet could be especially well suited for a variety of other applications -- for example, group automobile-driver training in a classroom. Another potential application might lie in networking of automobile-diagnostic computers at repair facilities to a central computer that would compile the expertise of numerous technicians and engineers and act as an expert consulting technician.

  12. Bilingual Text Messaging Translation: Translating Text Messages From English Into Spanish for the Text4Walking Program

    PubMed Central

    Sandi, Giselle; Ingram, Diana; Welch, Mary Jane; Ocampo, Edith V

    2015-01-01

    Background Hispanic adults in the United States are at particular risk for diabetes and inadequate blood pressure control. Physical activity improves these health problems; however Hispanic adults also have a low rate of recommended aerobic physical activity. To address improving physical inactivity, one area of rapidly growing technology that can be utilized is text messaging (short message service, SMS). A physical activity research team, Text4Walking, had previously developed an initial database of motivational physical activity text messages in English that could be used for physical activity text messaging interventions. However, the team needed to translate these existing English physical activity text messages into Spanish in order to have culturally meaningful and useful text messages for those adults within the Hispanic population who would prefer to receive text messages in Spanish. Objective The aim of this study was to translate a database of English motivational physical activity messages into Spanish and review these text messages with a group of Spanish speaking adults to inform the use of these text messages in an intervention study. Methods The consent form and study documents, including the existing English physical activity text messages, were translated from English into Spanish, and received translation certification as well as Institutional Review Board approval. The translated text messages were placed into PowerPoint, accompanied by a set of culturally appropriate photos depicting barriers to walking, as well as walking scenarios. At the focus group, eligibility criteria for this study included being an adult between 30 to 65 years old who spoke Spanish as their primary language. After a general group introduction, participants were placed into smaller groups of two or three. Each small group was asked to review a segment of the translated text messages for accuracy and meaningfulness. After the break out, the group was brought back together

  13. A Vondrak low pass filter for IMU sensor initial alignment on a disturbed base.

    PubMed

    Li, Zengke; Wang, Jian; Gao, Jingxiang; Li, Binghao; Zhou, Feng

    2014-12-10

    The initial alignment of the Inertial Measurement Unit (IMU) is an important process of INS to determine the coordinate transformation matrix which is used in the integration of Global Positioning Systems (GPS) with Inertial Navigation Systems (INS). In this paper a novel alignment method for a disturbed base, such as a vehicle disturbed by wind outdoors, implemented with the aid of a Vondrak low pass filter, is proposed. The basic principle of initial alignment including coarse alignment and fine alignment is introduced first. The spectral analysis is processed to compare the differences between the characteristic error of INS force observation on a stationary base and on disturbed bases. In order to reduce the high frequency noise in the force observation more accurately and more easily, a Vondrak low pass filter is constructed based on the spectral analysis result. The genetic algorithms method is introduced to choose the smoothing factor in the Vondrak filter and the corresponding objective condition is built. The architecture of the proposed alignment method with the Vondrak low pass filter is shown. Furthermore, simulated experiments and actual experiments were performed to validate the new algorithm. The results indicate that, compared with the conventional alignment method, the Vondrak filter could eliminate the high frequency noise in the force observation and the proposed alignment method could improve the attitude accuracy. At the same time, only one parameter needs to be set, which makes the proposed method easier to implement than other low-pass filter methods.

  14. A Vondrak Low Pass Filter for IMU Sensor Initial Alignment on a Disturbed Base

    PubMed Central

    Li, Zengke; Wang, Jian; Gao, Jingxiang; Li, Binghao; Zhou, Feng

    2014-01-01

    The initial alignment of the Inertial Measurement Unit (IMU) is an important process of INS to determine the coordinate transformation matrix which is used in the integration of Global Positioning Systems (GPS) with Inertial Navigation Systems (INS). In this paper a novel alignment method for a disturbed base, such as a vehicle disturbed by wind outdoors, implemented with the aid of a Vondrak low pass filter, is proposed. The basic principle of initial alignment including coarse alignment and fine alignment is introduced first. The spectral analysis is processed to compare the differences between the characteristic error of INS force observation on a stationary base and on disturbed bases. In order to reduce the high frequency noise in the force observation more accurately and more easily, a Vondrak low pass filter is constructed based on the spectral analysis result. The genetic algorithms method is introduced to choose the smoothing factor in the Vondrak filter and the corresponding objective condition is built. The architecture of the proposed alignment method with the Vondrak low pass filter is shown. Furthermore, simulated experiments and actual experiments were performed to validate the new algorithm. The results indicate that, compared with the conventional alignment method, the Vondrak filter could eliminate the high frequency noise in the force observation and the proposed alignment method could improve the attitude accuracy. At the same time, only one parameter needs to be set, which makes the proposed method easier to implement than other low-pass filter methods. PMID:25513826

  15. Genetic algorithms

    NASA Technical Reports Server (NTRS)

    Wang, Lui; Bayer, Steven E.

    1991-01-01

    Genetic algorithms are mathematical, highly parallel, adaptive search procedures (i.e., problem solving methods) based loosely on the processes of natural genetics and Darwinian survival of the fittest. Basic genetic algorithms concepts are introduced, genetic algorithm applications are introduced, and results are presented from a project to develop a software tool that will enable the widespread use of genetic algorithm technology.

  16. Individual differences in drivers' cognitive processing of road safety messages.

    PubMed

    Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M

    2013-01-01

    Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message

  17. The medium is the message or is the message in the medium?

    PubMed

    Smith, Brian

    2010-08-01

    Our conversation was interrupted with a woman shouting at her husband, 'I told you that you had selective deafness, you only hear what you want to and when you want to'. The innocent remark was bellowed across the hospital restaurant as I sat discussing practice issues with four perioperative colleagues. Interestingly, the message immediately changed our discussion to story telling about how some of us have found communicating with deaf patients challenging.

  18. Message framing and credibility: application in dental services.

    PubMed

    Arora, R

    2000-01-01

    This study uses an experimental approach to test the influence of message framing and credibility on the attitude toward a dental exam and consumers' intention to use the dental office. The findings indicate a strong effect of credibility on attitude as well as intention. The influence of framing is also statistically significant. Implications for marketers in terms of message strategy are discussed.

  19. Getting Your Message out (And Why It's Not Enough)

    ERIC Educational Resources Information Center

    Johnson, Jean

    2015-01-01

    Sometimes, education leaders are so intent on getting their message out that they neglect the other side of the equation--listening. In this article, Jean Johnson of Public Agenda describes the conditions that make "messaging" a perilous undertaking today. "These are skeptical times," she explains, in which Americans are…

  20. 47 CFR 97.219 - Message forwarding system.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Message forwarding system. 97.219 Section 97.219 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO SERVICE Special Operations § 97.219 Message forwarding system. (a) Any amateur station...

  1. 47 CFR 97.219 - Message forwarding system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Message forwarding system. 97.219 Section 97.219 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO SERVICE Special Operations § 97.219 Message forwarding system. (a) Any amateur station...

  2. 47 CFR 97.219 - Message forwarding system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Message forwarding system. 97.219 Section 97.219 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO SERVICE Special Operations § 97.219 Message forwarding system. (a) Any amateur station...

  3. 47 CFR 97.219 - Message forwarding system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Message forwarding system. 97.219 Section 97.219 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO SERVICE Special Operations § 97.219 Message forwarding system. (a) Any amateur station...

  4. 47 CFR 97.219 - Message forwarding system.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Message forwarding system. 97.219 Section 97.219 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO SERVICE Special Operations § 97.219 Message forwarding system. (a) Any amateur station...

  5. Tracing how normative messages may influence physical activity intention

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Normative messages have been shown to increase intention to do physical activity (PA). We traced how 'positive' and 'negative' normative messages influenced PA intention by comparing constructs of the model of goal-directed behaviour with descriptive norms (MGDB+DN) across control and treatment grou...

  6. Gender and Student Reception of a Seminary's Dominant Messages

    ERIC Educational Resources Information Center

    Lincoln, Timothy D.

    2012-01-01

    Theological schools seek to educate both women and men to serve the church and promote the study of religion. This education involves constant messaging through multiple channels. This article explores the central messages received by theological students at one free-standing Presbyterian seminary in the United States. Women commonly reported two…

  7. And Now, a Message for Today's Students from Ben Franklin.

    ERIC Educational Resources Information Center

    Levy, Tedd

    1991-01-01

    Suggests that Benjamin Franklin's autobiography contains many useful messages for today's students. Discusses Franklin's list of virtues that he followed in an attempt at attaining moral perfection. Includes temperance, industry, justice, tranquillity, and humility. Describes the message of Franklin's lesson as one of achieving through effort…

  8. Messages from Parents of Children with Autism Spectrum Disorder (ASD)

    ERIC Educational Resources Information Center

    Bevan-Brown, Jill

    2010-01-01

    This article presents the results of an on-line questionnaire answered by 137 parents of children with ASD. The questionnaire sought parental opinion about what content and messages should be included in a DVD about ASD. Parents' predominant messages were that: ASD is not an illness that can be cured; children with ASD think and act differently;…

  9. Emotional Responses to Environmental Messages and Future Behavioral Intentions

    ERIC Educational Resources Information Center

    Perrin, Jeffrey L.

    2011-01-01

    The present research investigated effects of message framing (losses-framed or gains-framed), message modality (video with text or text-only) and emotional arousal on environmentally responsible behavioral intentions. The sample consisted of 161 college students. The present research did not find a significant difference in behavioral intentions…

  10. Prevention and screening efficacy messages in newspaper accounts of cancer.

    PubMed

    Moriarty, Cortney M; Stryker, Jo Ellen

    2008-06-01

    The news media are a primary source of cancer prevention and detection information for the general public, but little is known about the content of cancer prevention and detection messages in mainstream media. This study examines how cancer prevention and screening efficacy messages are presented in cancer news media coverage. Efficacy messages provide information about skills related to prevention and screening behaviors. Analysis of cancer-related stories in 44 major US daily newspapers during 2003 (n = 2448) reveals that efficacy messages were rarely present in cancer stories. Efficacy messages were less likely to appear in stories that had a 'local' angle, but efficacy messages were more likely to appear in stories that contained 'mobilizing information' (additional resources for readers) or stories that mentioned highly preventable cancers (lung, skin, esophagus and bladder). The discussion includes a theory of norms for effectively influencing cancer-related behaviors through news reports. Implications of this work extend to the lack of efficacy messages when highly detectable cancers are mentioned, thus the lack of actionable information when health risks are presented, and a dearth of efficacy messages when localized information is present, each of which represent key areas for encouraging health journalists to include more efficacy statements.

  11. Media Messages About Cancer: What Do People Understand?

    PubMed Central

    MAZOR, KATHLEEN M.; CALVI, JOSEPHINE; COWAN, REBECCA; COSTANZA, MARY E.; HAN, PAUL K. J.; GREENE, SARAH M.; SACCOCCIO, LAURA; COVE, ERICA; ROBLIN, DOUGLAS; WILLIAMS, ANDREW

    2010-01-01

    Health messages on television and other mass media have the potential to significantly influence the public’s health-related knowledge and behaviors, but little is known about people’s ability to comprehend such messages. To investigate whether people understood the spoken information in media messages about cancer prevention and screening, we recruited 44 adults from 3 sites to view 6 messages aired on television and the internet. Participants were asked to paraphrase main points and selected phrases. Qualitative analysis methods were used to identify what content was correctly and accurately recalled and paraphrased, and to describe misunderstandings and misconceptions. While most participants accurately recalled and paraphrased the gist of the messages used here, over-generalization (e.g., believing preventative behaviors to be more protective than stated), loss of details (e.g., misremembering the recommended age for screening) and confusion or misunderstandings around specific concepts (e.g., interpreting “early stage” as the stage in one’s life rather than cancer stage) were common. Variability in the public’s ability to understand spoken media messages may limit the effectiveness of both pubic health campaigns and provider-patient communication. Additional research is needed to identify message characteristics which enhance understandability and improve comprehension of spoken media messages around cancer. PMID:20845199

  12. Transmission of Correlated Messages over Interference Channels with Strong Interference

    NASA Astrophysics Data System (ADS)

    Choi, Suhan; Yoon, Eunchul; Moon, Hichan

    Transmission of correlated messages over interference channels with strong interference is considered. As a result, an achievable rate region is presented. It is shown that if the messages are correlated, the achievable rate region can be larger than the capacity region given by Costa and El Gamal. As an example, the Gaussian interference channel is considered.

  13. Effects of Targeted Sales Messages on Subscription Sales and Retention.

    ERIC Educational Resources Information Center

    Gamst, Glenn; And Others

    1987-01-01

    Investigates the effects of targeted sales messages on newspaper subscription sales and retention by combining two large research projects--a demographic market segmentation scheme, and a readership-lifestyle survey. Proposes that the content of sales messages influences new subscriptions but does not affect retention. (MM)

  14. Resonant Messages to Prevent Prescription Drug Misuse by Teens

    ERIC Educational Resources Information Center

    Twombly, Eric C.; Holtz, Kristen D.; Agnew, Christine B.

    2011-01-01

    Prescription drug misuse is a major health problem, particularly among teens. A key step in curbing misuse is the development of effective prescription drug prevention messages. This paper explores the elements of prescription drug misuse prevention messages that resonate with teens using data from focus groups with seventh and eighth grade…

  15. College Students' Text Messaging, Use of Textese and Literacy Skills

    ERIC Educational Resources Information Center

    Drouin, M. A.

    2011-01-01

    In this study, I examined reported frequency of text messaging, use of textese and literacy skills (reading accuracy, spelling and reading fluency) in a sample of American college students. Participants reported using text messaging, social networking sites and textese more often than was reported in previous (2009) research, and their frequency…

  16. Preservice Teachers' Perceptions of Instant Messaging in Two Educational Contexts

    ERIC Educational Resources Information Center

    Doering, Aaron; Lewis, Cynthia; Veletsianos, George; Nichols-Besel, Kristen

    2008-01-01

    Using an activity theory framework, we investigate how preservice teachers and middle school students utilized instant messaging in educational contexts and the impact of instant messaging on the development of community among preservice teachers. Qualitative results from six focus groups and two personal interviews indicate that instant messaging…

  17. Trust and Reactions to Messages of Intent in Social Dilemmas.

    ERIC Educational Resources Information Center

    Parks, Craig D.; And Others

    1996-01-01

    Examines how low- and high-trust individuals (n=111) react to messages of intended behavior in a social dilemma situation. Subjects played a two-person prisoner's dilemma; the opponent was a reciprocal strategy programmed by the experimenter. During the game, subjects received a message status that the opponent planned to be cooperative or…

  18. International Students, University Health Centers, and Memorable Messages about Health

    ERIC Educational Resources Information Center

    Carmack, Heather J.; Bedi, Shireen; Heiss, Sarah N.

    2016-01-01

    International students entering US universities often experience a variety of important socialization messages. One important message is learning about and using the US health system. International students often first encounter the US health system through their experiences with university health centers. The authors explore the memorable…

  19. Toward a Hierarchical Processing Model of Audio Advertising Messages.

    ERIC Educational Resources Information Center

    Stacks, Don W.; Melson, William H.

    Research shows that information received by one brain hemisphere (e.g., auditory messages entering the right ear) is processed and transferred to the other, interpretation being a combination of right and left brain processing, with high intensity messages shifting control from the left to the right brain. If information is received by one…

  20. Effective Compiler Error Message Enhancement for Novice Programming Students

    ERIC Educational Resources Information Center

    Becker, Brett A.; Glanville, Graham; Iwashima, Ricardo; McDonnell, Claire; Goslin, Kyle; Mooney, Catherine

    2016-01-01

    Programming is an essential skill that many computing students are expected to master. However, programming can be difficult to learn. Successfully interpreting compiler error messages (CEMs) is crucial for correcting errors and progressing toward success in programming. Yet these messages are often difficult to understand and pose a barrier to…