Support Expressed in Congress for U.S. High-Performance Computing
NASA Astrophysics Data System (ADS)
Showstack, Randy
2004-06-01
Advocates for a stronger U.S. position in high-performance computing-which could help with a number of grand challenges in the Earth sciences and other disciplines-hope that legislation recently introduced in the House of Representatives, and, will help to revitalize U.S. efforts. The High-Performance Computing Revitalization Act of 2004 would amend the earlier High-Performance Computing Act of 1991 (Public Law 102-194), which is partially credited with helping to strengthen U.S. capabilities in this area. The bill has the support of the Bush administration.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Senate Committee on Commerce, Science, and Transportation.
This hearing before the Senate Subcommittee on Science, Technology, and Space focuses on S. 272, the High-Performance Computing and Communications Act of 1991, a bill that provides for a coordinated federal research and development program to ensure continued U.S. leadership in this area. Performance computing is defined as representing the…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-24
...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... computer matching involving the Federal government could be performed and adding certain protections for...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-03
... 1021 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...
Code of Federal Regulations, 2012 CFR
2012-04-01
... performed by an individual as a volunteer or volunteer leader within the meaning of the Peace Corps Act. 31... Provisions § 31.3121(i)-3 Computation of remuneration for service performed by an individual as a volunteer or volunteer leader within the meaning of the Peace Corps Act. In the case of an individual...
Code of Federal Regulations, 2011 CFR
2011-04-01
... performed by an individual as a volunteer or volunteer leader within the meaning of the Peace Corps Act. 31... Provisions § 31.3121(i)-3 Computation of remuneration for service performed by an individual as a volunteer or volunteer leader within the meaning of the Peace Corps Act. In the case of an individual...
Code of Federal Regulations, 2013 CFR
2013-04-01
... performed by an individual as a volunteer or volunteer leader within the meaning of the Peace Corps Act. 31... Provisions § 31.3121(i)-3 Computation of remuneration for service performed by an individual as a volunteer or volunteer leader within the meaning of the Peace Corps Act. In the case of an individual...
Code of Federal Regulations, 2014 CFR
2014-04-01
... performed by an individual as a volunteer or volunteer leader within the meaning of the Peace Corps Act. 31... Provisions § 31.3121(i)-3 Computation of remuneration for service performed by an individual as a volunteer or volunteer leader within the meaning of the Peace Corps Act. In the case of an individual...
Code of Federal Regulations, 2010 CFR
2010-04-01
... performed by an individual as a volunteer or volunteer leader within the meaning of the Peace Corps Act. 31... Provisions § 31.3121(i)-3 Computation of remuneration for service performed by an individual as a volunteer or volunteer leader within the meaning of the Peace Corps Act. In the case of an individual...
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Senate Committee on Commerce, Science, and Transportation.
This report discusses Senate Bill no. 272, which provides for a coordinated federal research and development program to ensure continued U.S. leadership in high-performance computing. High performance computing is defined as representing the leading edge of technological advancement in computing, i.e., the most sophisticated computer chips, the…
NASA Technical Reports Server (NTRS)
Hanks, G. W.; Shomber, H. A.; Dethman, H. A.; Gratzer, L. B.; Maeshiro, A.; Gangsaas, D.; Blight, J. D.; Buchan, S. M.; Crumb, C. B.; Dorwart, R. J.
1981-01-01
An active controls technology (ACT) system architecture was selected based on current technology system elements and optimal control theory was evaluated for use in analyzing and synthesizing ACT multiple control laws. The system selected employs three redundant computers to implement all of the ACT functions, four redundant smaller computers to implement the crucial pitch-augmented stability function, and a separate maintenance and display computer. The reliability objective of probability of crucial function failure of less than 1 x 10 to the -9th power per flight of 1 hr can be met with current technology system components, if the software is assumed fault free and coverage approaching 1.0 can be provided. The optimal control theory approach to ACT control law synthesis yielded comparable control law performance much more systematically and directly than the classical s-domain approach. The ACT control law performance, although somewhat degraded by the inclusion of representative nonlinearities, remained quite effective. Certain high-frequency gust-load alleviation functions may require increased surface rate capability.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Senate Committee on Energy and Natural Resources.
The purpose of the bill (S. 343), as reported by the Senate Committee on Energy and Natural Resources, is to establish a federal commitment to the advancement of high-performance computing, improve interagency planning and coordination of federal high-performance computing and networking activities, authorize a national high-speed computer…
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Science, Space and Technology.
This document contains the transcript of three hearings on the High Speed Performance Computing and High Speed Networking Applications Act of 1993 (H.R. 1757). The hearings were designed to obtain specific suggestions for improvements to the legislation and alternative or additional application areas that should be pursued. Testimony and prepared…
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Senate Committee on Commerce, Science, and Transportation.
This committee report is intended to accompany S. 1067, a bill designed to provide for a coordinated federal research program in high-performance computing (HPC). The primary objective of the legislation is given as the acceleration of research, development, and application of the most advanced computing technology in research, education, and…
Akoglu, Haldun; Akoglu, Ebru Unal; Evman, Serdar; Akoglu, Tayfun; Denizbasi, Arzu; Guneysel, Ozlem; Onur, Ozge; Onur, Ender
2012-10-01
Small pneumothoraces (PXs), which are not initially recognized with a chest x-ray film and diagnosed by a thoracic computed tomography (CT), are described as occult PX (OCPX). The objective of this study was to evaluate cervival spine (C-spine) and abdominal CT (ACT) for diagnosing OCPX and overt PX (OVPX). All patients with blunt trauma who presented consecutively to the emergency department during a 26-months period were included. Among all the chest CTs (CCTs) (6,155 patients) conducted during that period, 254 scans were confirmed to have a true PX. The findings in their C-spine CT and ACT were compared with the findings in CCTs. Among these patients, 254 had a diagnosis of PX confirmed with CCT. OCPXs were identified on the chest computed tomographic scan of 128 patients (70.3%), whereas OVPXs were evident in 54 patients (29.7%). Computed tomographic imaging of the C-spine was performed in 74% of patients with OCPX and 66.7% of patients with OVPX trauma. Only 45 (35.2%) cases of OCPX and 42 (77.8%) cases of OVPX were detected by C-spine CT. ACT was performed in almost all patients, and 121 (95.3%) of 127 of these correctly identified an existing OCPX. Sensitivity of C-spine CT and ACT was 35.1% and 96.5%, respectively; specificity was 100% and 100%, respectively. Almost all OCPXs, regardless of intrathoracic location, could be detected by ACT or by combining C-spine and abdominal computed tomographic screening for patients. If the junction of the first and second vertebra is used as the caudad extent, C-spine CT does not have sufficient power to diagnose more than a third of the cases. Diagnostic study, level III.
Final Report Extreme Computing and U.S. Competitiveness DOE Award. DE-FG02-11ER26087/DE-SC0008764
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mustain, Christopher J.
The Council has acted on each of the grant deliverables during the funding period. The deliverables are: (1) convening the Council’s High Performance Computing Advisory Committee (HPCAC) on a bi-annual basis; (2) broadening public awareness of high performance computing (HPC) and exascale developments; (3) assessing the industrial applications of extreme computing; and (4) establishing a policy and business case for an exascale economy.
29 CFR 4.178 - Computation of hours worked.
Code of Federal Regulations, 2011 CFR
2011-07-01
... in which the employee is suffered or permitted to work whether or not required to do so, and all time... performance of a covered contract, a computation of their hours worked in each workweek when such work under... in which the employee is engaged in performing work on contracts subject to the Act. However, unless...
A computational cognitive model of self-efficacy and daily adherence in mHealth.
Pirolli, Peter
2016-12-01
Mobile health (mHealth) applications provide an excellent opportunity for collecting rich, fine-grained data necessary for understanding and predicting day-to-day health behavior change dynamics. A computational predictive model (ACT-R-DStress) is presented and fit to individual daily adherence in 28-day mHealth exercise programs. The ACT-R-DStress model refines the psychological construct of self-efficacy. To explain and predict the dynamics of self-efficacy and predict individual performance of targeted behaviors, the self-efficacy construct is implemented as a theory-based neurocognitive simulation of the interaction of behavioral goals, memories of past experiences, and behavioral performance.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Science, Space and Technology.
This hearing focused on H. R. 656, companion bill of S. 272, which calls for high performance computing legislation. This is one of several initiatives to provide for a coordinated federal research program to ensure continued U.S. leadership in high performance computing. The bill authorizes the development of a National Research and Education…
1987-11-01
assistance to the ATE test technicians by means of computer generated graphics on a 19" display terminal. The TEG presents colorized annotations on ACCA ...perform outstanding acts to meet goals. Savings and goals are auditable from reports, charts, SPC, and Oregon Matrix. COMPUTER-AIDED MANUFACTURING
2010-09-01
the flies.”) or a present tense verb when describing what an airplane does (“An airplane flies.”) This disambiguation is, in general, computationally...as part-of-speech and dialog-act tagging, and yet the volume of data created makes human analysis impractical. We present a cross-genre part-of...acceptable automatic dialog-act determination. Furthermore, we show that a simple naı̈ve Bayes classifier achieves the same performance in a fraction of
Gruzelier, John; Inoue, Atsuko; Smart, Roger; Steed, Anthony; Steffert, Tony
2010-08-16
Actors were trained in sensory-motor rhythm (SMR) neurofeedback interfaced with a computer rendition of a theatre auditorium. Enhancement of SMR led to changes in the lighting while inhibition of theta and high beta led to a reduction in intrusive audience noise. Participants were randomised to a virtual reality (VR) representation in a ReaCTor, with surrounding image projection seen through glasses, or to a 2D computer screen, which is the conventional neurofeedback medium. In addition there was a no-training comparison group. Acting performance was evaluated by three experts from both filmed, studio monologues and Hamlet excerpts on the stage of Shakespeare's Globe Theatre. Neurofeedback learning reached an asymptote earlier as did identification of the required mental state following training in the ReaCTor training compared with the computer screen, though groups reached the same asymptote. These advantages were paralleled by higher ratings of acting performance overall, well-rounded performance, and especially the creativity subscale including imaginative expression, conviction and characterisation. On the Flow State scales both neurofeedback groups scored higher than the no-training controls on self-ratings of sense of control, confidence and feeling at-one. This is the first demonstration of enhancement of artistic performance with eyes-open neurofeedback training, previously demonstrated only with eyes-closed slow-wave training. Efficacy is attributed to psychological engagement through the ecologically relevant learning context of the acting-space, putatively allowing transfer to the real world otherwise achieved with slow-wave training through imaginative visualisation. The immersive VR technology was more successful than a 2D rendition. Copyright 2010 Elsevier Ireland Ltd. All rights reserved.
Visualization of unsteady computational fluid dynamics
NASA Astrophysics Data System (ADS)
Haimes, Robert
1994-11-01
A brief summary of the computer environment used for calculating three dimensional unsteady Computational Fluid Dynamic (CFD) results is presented. This environment requires a super computer as well as massively parallel processors (MPP's) and clusters of workstations acting as a single MPP (by concurrently working on the same task) provide the required computational bandwidth for CFD calculations of transient problems. The cluster of reduced instruction set computers (RISC) is a recent advent based on the low cost and high performance that workstation vendors provide. The cluster, with the proper software can act as a multiple instruction/multiple data (MIMD) machine. A new set of software tools is being designed specifically to address visualizing 3D unsteady CFD results in these environments. Three user's manuals for the parallel version of Visual3, pV3, revision 1.00 make up the bulk of this report.
Visualization of unsteady computational fluid dynamics
NASA Technical Reports Server (NTRS)
Haimes, Robert
1994-01-01
A brief summary of the computer environment used for calculating three dimensional unsteady Computational Fluid Dynamic (CFD) results is presented. This environment requires a super computer as well as massively parallel processors (MPP's) and clusters of workstations acting as a single MPP (by concurrently working on the same task) provide the required computational bandwidth for CFD calculations of transient problems. The cluster of reduced instruction set computers (RISC) is a recent advent based on the low cost and high performance that workstation vendors provide. The cluster, with the proper software can act as a multiple instruction/multiple data (MIMD) machine. A new set of software tools is being designed specifically to address visualizing 3D unsteady CFD results in these environments. Three user's manuals for the parallel version of Visual3, pV3, revision 1.00 make up the bulk of this report.
A view of Kanerva's sparse distributed memory
NASA Technical Reports Server (NTRS)
Denning, P. J.
1986-01-01
Pentti Kanerva is working on a new class of computers, which are called pattern computers. Pattern computers may close the gap between capabilities of biological organisms to recognize and act on patterns (visual, auditory, tactile, or olfactory) and capabilities of modern computers. Combinations of numeric, symbolic, and pattern computers may one day be capable of sustaining robots. The overview of the requirements for a pattern computer, a summary of Kanerva's Sparse Distributed Memory (SDM), and examples of tasks this computer can be expected to perform well are given.
2009-05-14
11 Next Generation Internet Research Act of 1998...performance computing R&D and called for increased interagency planning and coordination. The second, the Next Generation Internet Research Act of...law is available at http://www.nitrd.gov/congressional/laws/pl_102-194.html. 19 Next Generation Internet Research Act of 1998, P.L. 105-305, 15 U.S.C
2006-08-01
ABSTRACT This report describes how changes in architectural parameters in the Adaptive Control of Thought – Rational (ACT-R) can be used to understand...Computational Models of Cognition Cognitive architectures like the Adaptive Control of Thought – Rational (ACT-R) and Soar provide an alternative to...Belavkin (2001) to simulate the role of emotion in decision making; and by Ritter and colleagues (2004) to simulate pre-task appraisal and anxiety
ERIC Educational Resources Information Center
Hardman, Joanne
2005-01-01
Because computers potentially transform pedagogy, much has been made of their ability to impact positively on student performance, particularly in subjects such as mathematics and science. However, there is currently a dearth of research regarding exactly how the computer acts as a transformative tool in disadvantaged schools. Drawing on a…
29 CFR 4.178 - Computation of hours worked.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Compliance with Compensation Standards § 4.178 Computation of hours worked. Since employees subject to the... such hours are adequately segregated, as indicated in § 4.179, compensation in accordance with the Act will be required for all hours of work in any workweek in which the employee performs any work in...
Assessment & Commitment Tracking System (ACTS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bryant, Robert A.; Childs, Teresa A.; Miller, Michael A.
2004-12-20
The ACTS computer code provides a centralized tool for planning and scheduling assessments, tracking and managing actions associated with assessments or that result from an event or condition, and "mining" data for reporting and analyzing information for improving performance. The ACTS application is designed to work with the MS SQL database management system. All database interfaces are written in SQL. The following software is used to develop and support the ACTS application: Cold Fusion HTML JavaScript Quest TOAD Microsoft Visual Source Safe (VSS) HTML Mailer for sending email Microsoft SQL Microsoft Internet Information Server
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-15
... RAILROAD RETIREMENT BOARD Computer Matching and Privacy Protection Act of 1988; Report of Matching... Railroad Retirement Act. SUMMARY: As required by the Computer Matching and Privacy Protection Act of [[Page...: Under certain circumstances, the Computer Matching and Privacy Protection Act of 1988, Public Law 100...
Applying Mathematical Optimization Methods to an ACT-R Instance-Based Learning Model.
Said, Nadia; Engelhart, Michael; Kirches, Christian; Körkel, Stefan; Holt, Daniel V
2016-01-01
Computational models of cognition provide an interface to connect advanced mathematical tools and methods to empirically supported theories of behavior in psychology, cognitive science, and neuroscience. In this article, we consider a computational model of instance-based learning, implemented in the ACT-R cognitive architecture. We propose an approach for obtaining mathematical reformulations of such cognitive models that improve their computational tractability. For the well-established Sugar Factory dynamic decision making task, we conduct a simulation study to analyze central model parameters. We show how mathematical optimization techniques can be applied to efficiently identify optimal parameter values with respect to different optimization goals. Beyond these methodological contributions, our analysis reveals the sensitivity of this particular task with respect to initial settings and yields new insights into how average human performance deviates from potential optimal performance. We conclude by discussing possible extensions of our approach as well as future steps towards applying more powerful derivative-based optimization methods.
High performance computing and communications: FY 1997 implementation plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1996-12-01
The High Performance Computing and Communications (HPCC) Program was formally authorized by passage, with bipartisan support, of the High-Performance Computing Act of 1991, signed on December 9, 1991. The original Program, in which eight Federal agencies participated, has now grown to twelve agencies. This Plan provides a detailed description of the agencies` FY 1996 HPCC accomplishments and FY 1997 HPCC plans. Section 3 of this Plan provides an overview of the HPCC Program. Section 4 contains more detailed definitions of the Program Component Areas, with an emphasis on the overall directions and milestones planned for each PCA. Appendix A providesmore » a detailed look at HPCC Program activities within each agency.« less
ERIC Educational Resources Information Center
Executive Office of the President, 2010
2010-01-01
This report is prepared by the President's Council of Advisors on Science and Technology (PCAST) acting in its role as the President's Innovation and Technology Advisory Council (PITAC). This report fulfills PCAST's responsibilities under Executive Order 13539 and the High-Performance Computing Act of 1991 (Public Law 102-194) as amended by the…
A software control system for the ACTS high-burst-rate link evaluation terminal
NASA Technical Reports Server (NTRS)
Reinhart, Richard C.; Daugherty, Elaine S.
1991-01-01
Control and performance monitoring of NASA's High Burst Rate Link Evaluation Terminal (HBR-LET) is accomplished by using several software control modules. Different software modules are responsible for controlling remote radio frequency (RF) instrumentation, supporting communication between a host and a remote computer, controlling the output power of the Link Evaluation Terminal and data display. Remote commanding of microwave RF instrumentation and the LET digital ground terminal allows computer control of various experiments, including bit error rate measurements. Computer communication allows system operators to transmit and receive from the Advanced Communications Technology Satellite (ACTS). Finally, the output power control software dynamically controls the uplink output power of the terminal to compensate for signal loss due to rain fade. Included is a discussion of each software module and its applications.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-02
... of the Matching Program A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L.... 100-503, the Computer Matching and Privacy Protection Act (CMPPA) of 1988), the Office of Management... 1974; CMS Computer Match No. 2010-03, HHS Computer Match No. 1003, SSA Computer Match No. 1048, IRS...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-05
... RAILROAD RETIREMENT BOARD Computer Matching and Privacy Protection Act of 1988; Report of Matching.... General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), amended the Privacy... of an existing computer matching program due to expire on August 12, 2012. SUMMARY: The Privacy Act...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-17
...; Computer Matching Program (SSA/ Law Enforcement Agencies (LEA)) Match Number 5001 AGENCY: Social Security... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... accordance with the Privacy Act of 1974, as amended by the Computer Matching and Privacy Protection Act of...
77 FR 62059 - Privacy Act of 1974, as Amended; Revisions to Existing Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-11
... and forms, microfilm or microfiche, and in computer processable storage media such as personnel system... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986... apply: The Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer...
Combining high performance simulation, data acquisition, and graphics display computers
NASA Technical Reports Server (NTRS)
Hickman, Robert J.
1989-01-01
Issues involved in the continuing development of an advanced simulation complex are discussed. This approach provides the capability to perform the majority of tests on advanced systems, non-destructively. The controlled test environments can be replicated to examine the response of the systems under test to alternative treatments of the system control design, or test the function and qualification of specific hardware. Field tests verify that the elements simulated in the laboratories are sufficient. The digital computer is hosted by a Digital Equipment Corp. MicroVAX computer with an Aptec Computer Systems Model 24 I/O computer performing the communication function. An Applied Dynamics International AD100 performs the high speed simulation computing and an Evans and Sutherland PS350 performs on-line graphics display. A Scientific Computer Systems SCS40 acts as a high performance FORTRAN program processor to support the complex, by generating numerous large files from programs coded in FORTRAN that are required for the real time processing. Four programming languages are involved in the process, FORTRAN, ADSIM, ADRIO, and STAPLE. FORTRAN is employed on the MicroVAX host to initialize and terminate the simulation runs on the system. The generation of the data files on the SCS40 also is performed with FORTRAN programs. ADSIM and ADIRO are used to program the processing elements of the AD100 and its IOCP processor. STAPLE is used to program the Aptec DIP and DIA processors.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Senate Committee on Commerce, Science, and Transportation.
This collection of statements focuses on Title 2 of S. 1067, which calls for the National Science Foundation to establish a National Research and Education Network (NREN) by 1996. This is one of several titles in a bill to provide for a coordinated federal research program to ensure continued U.S. leadership in high performance computing. The…
76 FR 11435 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-02
... Security Administration. SUMMARY: Pursuant to the Computer Matching and Privacy Protection Act of 1988, Public Law 100-503, the Computer Matching and Privacy Protections Amendments of 1990, Pub. L. 101-508... Interpreting the Provisions of Public Law 100-503, the Computer Matching and Privacy Protection Act of 1988...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Report of Requests for Restrictive Trade Practice or Boycott—Single or Multiple Transactions part 760 and § 762.2(b). 0694-0013 Computers and Related Equipment EAR Supplement 2 to Part 748 part 774. 0694-0016... §§ 762.2(b) and 764.5. 0694-0073 Export Controls of High Performance Computers Supplement No. 2 to part...
Code of Federal Regulations, 2012 CFR
2012-01-01
... Report of Requests for Restrictive Trade Practice or Boycott—Single or Multiple Transactions part 760 and § 762.2(b). 0694-0013 Computers and Related Equipment EAR Supplement 2 to Part 748 part 774. 0694-0016... §§ 762.2(b) and 764.5. 0694-0073 Export Controls of High Performance Computers Supplement No. 2 to part...
Code of Federal Regulations, 2013 CFR
2013-01-01
... Report of Requests for Restrictive Trade Practice or Boycott—Single or Multiple Transactions part 760 and § 762.2(b). 0694-0013 Computers and Related Equipment EAR Supplement 2 to Part 748 part 774. 0694-0016... §§ 762.2(b) and 764.5. 0694-0073 Export Controls of High Performance Computers Supplement No. 2 to part...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-30
... report of this computer-matching program with the Committee on Homeland Security and Governmental Affairs... INFORMATION: A. General The Computer-Matching and Privacy Protection Act of 1988, (Pub. L. 100-503), amended... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as Amended; Notice of Computer-Matching Program...
76 FR 77015 - Privacy Act of 1974; Computer Matching Agreement
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-09
... 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L... DEPARTMENT OF JUSTICE [AAG/A Order No. 001/2011] Privacy Act of 1974; Computer Matching Agreement AGENCY: Department of Justice. ACTION: Notice--computer matching between the Department of Justice and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-21
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0067] Privacy Act of 1974; Computer Matching... Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...
Reliability model of a monopropellant auxiliary propulsion system
NASA Technical Reports Server (NTRS)
Greenberg, J. S.
1971-01-01
A mathematical model and associated computer code has been developed which computes the reliability of a monopropellant blowdown hydrazine spacecraft auxiliary propulsion system as a function of time. The propulsion system is used to adjust or modify the spacecraft orbit over an extended period of time. The multiple orbit corrections are the multiple objectives which the auxiliary propulsion system is designed to achieve. Thus the reliability model computes the probability of successfully accomplishing each of the desired orbit corrections. To accomplish this, the reliability model interfaces with a computer code that models the performance of a blowdown (unregulated) monopropellant auxiliary propulsion system. The computer code acts as a performance model and as such gives an accurate time history of the system operating parameters. The basic timing and status information is passed on to and utilized by the reliability model which establishes the probability of successfully accomplishing the orbit corrections.
77 FR 2299 - Office of Child Support Enforcement; Privacy Act of 1974; Computer Matching Agreement
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... Support Enforcement; Privacy Act of 1974; Computer Matching Agreement AGENCY: Office of Child Support Enforcement (OCSE), ACF, HHS. ACTION: Notice of a Computer Matching Program. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 522a), as amended, OCSE is publishing notice of a computer matching program...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-28
...; Computer Matching Program (SSA Internal Match)--Match Number 1014 AGENCY: Social Security Administration... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching....C. 552a, as amended, and the provisions of the Computer Matching and Privacy Protection Act of 1988...
77 FR 74019 - Office of Child Support Enforcement; Privacy Act of 1974; Computer Matching Agreement
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-12
... Support Enforcement; Privacy Act of 1974; Computer Matching Agreement AGENCY: Office of Child Support Enforcement (OCSE), ACF, HHS. ACTION: Notice of a Computer Matching Program. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 522a), as amended, OCSE is publishing notice of a computer matching program...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-27
... will file a report of this computer-matching program with the Committee on Homeland Security and... . SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988, (Pub. L. 100-503... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as Amended; Notice of Computer Matching Program...
75 FR 29774 - Office of Child Support Enforcement; Privacy Act of 1974; Computer Matching Agreement
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-27
... Support Enforcement; Privacy Act of 1974; Computer Matching Agreement AGENCY: Office of Child Support Enforcement (OCSE), ACF, HHS. ACTION: Notice of a computer matching program. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 522a), as amended, OCSE is publishing notice of a computer matching program...
75 FR 31457 - Office of Child Support Enforcement; Privacy Act of 1974; Computer Matching Agreement
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-03
... Support Enforcement; Privacy Act of 1974; Computer Matching Agreement AGENCY: Office of Child Support Enforcement (OCSE), ACF, HHS. ACTION: Notice of a Computer Matching Program. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 522a), as amended, OCSE is publishing notice of a computer matching program...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching... savings securities. C. Authority for Conducting the Matching Program This computer matching agreement sets... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-31
... Matching and Privacy Protection Act of 1988 (Pub. L. 100-503) and the Computer Matching and Privacy... DEPARTMENT OF EDUCATION Privacy Act of 1974, as Amended; Renewal of Computer Matching Program.... ACTION: Notice. SUMMARY: This document provides notice of the renewal of the computer matching program...
75 FR 18841 - Office for Civil Rights; Privacy Act of 1974, Amended System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... Privacy Act of 1974, Federal Information Security Management Act of 2002, Computer Security Act of 1987... 1974, Federal Information Security Management Act of 2002, Computer Security Act of 1987, the Paperwork... Oversight, the Chair of the Senate Committee on Homeland Security and Governmental Affairs, and the...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chiang, Patrick
2014-01-31
The research goal of this CAREER proposal is to develop energy-efficient, VLSI interconnect circuits and systems that will facilitate future massively-parallel, high-performance computing. Extreme-scale computing will exhibit massive parallelism on multiple vertical levels, from thou sands of computational units on a single processor to thousands of processors in a single data center. Unfortunately, the energy required to communicate between these units at every level (on chip, off-chip, off-rack) will be the critical limitation to energy efficiency. Therefore, the PI's career goal is to become a leading researcher in the design of energy-efficient VLSI interconnect for future computing systems.
78 FR 15731 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0011] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy Act of 1974; Computer Matching Program...
78 FR 15732 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0007] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy Act of 1974; Computer Matching Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-05
... of a Computer Matching Program Between the Department of Housing and Urban Development (HUD) and the...: Notice of a computer matching program between the HUD and ED. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection Act of 1988 (Pub...
77 FR 74518 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-14
... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program AGENCY: Office of Personnel Management. ACTION: Notice--computer matching between the Office of Personnel Management and the Social Security Administration. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as...
78 FR 35647 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-13
... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program AGENCY: Office of Personnel Management. ACTION: Notice of computer matching between the Office of Personnel Management and the Social Security Administration (CMA 1045). SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C...
75 FR 17788 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-07
... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program AGENCY: Office of Personnel Management. ACTION: Notice--computer matching between the Office of Personnel Management and the Social Security Administration. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as...
75 FR 31819 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program AGENCY: Office of Personnel Management. AGENCY: Notice--computer matching between the Office of Personnel Management and the Social Security Administration. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-15
... 1021 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of existing computer... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0073] Privacy Act of 1974, as Amended...
75 FR 54162 - Privacy Act of 1974
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-03
... Program A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), amended the... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Medicare and Medicaid Services [CMS Computer Match No. 2010-01; HHS Computer Match No. 1006] Privacy Act of 1974 AGENCY: Department of Health and...
75 FR 30411 - Privacy Act of 1974; Report of a Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-01
... Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse... Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance Portability... systems and data files necessary for compliance with Title XI, Part C of the Social Security Act because...
Detectors for the Atacama Cosmology Telescope
NASA Astrophysics Data System (ADS)
Marriage, Tobias Andrew
The Atacama Cosmology Telescope (ACT) will make measurements of the brightness temperature anisotropy in the Cosmic Microwave Background (CMB) on degree to arcminute angular scales. The ACT observing site is located 5200 m near the top of Cerro Toco in the Atacama Desert of northern Chile. This thesis presents research on the detectors which capture the image of the CMB formed at ACT's focal plane. In the first chapter, the primary brightness temperature fluctuations in the Cosmic Microwave Background are reviewed. In Chapter 2, a calculation shows how the CMB brightness is translated by ACT to an input power to the detectors. Chapter 3 describes the ACT detectors in detail and presents the response and sensitivity of the detectors to the input power computed in Chapter 2. Chapter 4 describes the detector fabrication at NASA Goddard Space Flight Center. Chapter 5 summarizes experiments which characterize the ACT detector performance.
Optoelectronic Inner-Product Neural Associative Memory
NASA Technical Reports Server (NTRS)
Liu, Hua-Kuang
1993-01-01
Optoelectronic apparatus acts as artificial neural network performing associative recall of binary images. Recall process is iterative one involving optical computation of inner products between binary input vector and one or more reference binary vectors in memory. Inner-product method requires far less memory space than matrix-vector method.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-17
...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer-matching... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0021] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-09
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-29
... Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0002] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-08
...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0010] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-20
... 1016 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0022] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-25
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0084] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1003 AGENCY: Social Security... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-09
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0066] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match 1305 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-25
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0083] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1015 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-12
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0015] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match Number 1016 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-28
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0040] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Railroad Retirement Board (RRB))--Match Number 1006 AGENCY: Social Security...: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L.) 100-503), amended the...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Malony, Allen D; Shende, Sameer
The primary goal of the University of Oregon's DOE "ÃÂcompetitiveness" project was to create performance technology that embodies and supports knowledge of performance data, analysis, and diagnosis in parallel performance problem solving. The target of our development activities was the TAU Performance System and the technology accomplishments reported in this and prior reports have all been incorporated in the TAU open software distribution. In addition, the project has been committed to maintaining strong interactions with the DOE SciDAC Performance Engineering Research Institute (PERI) and Center for Technology for Advanced Scientific Component Software (TASCS). This collaboration has proved valuable for translationmore » of our knowledge-based performance techniques to parallel application development and performance engineering practice. Our outreach has also extended to the DOE Advanced CompuTational Software (ACTS) collection and project. Throughout the project we have participated in the PERI and TASCS meetings, as well as the ACTS annual workshops.« less
76 FR 21373 - Privacy Act of 1974; Report of a New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-15
... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986... established by State law; (3) support litigation involving the Agency; (4) combat fraud, waste, and abuse in...
76 FR 50198 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-12
... DEPARTMENT OF EDUCATION Privacy Act of 1974; Computer Matching Program AGENCY: Office of the Inspector General, U.S. Department of Education. ACTION: Notice of computer matching between the U.S... conduct of computer matching programs, notice is hereby given of the establishment of a computer matching...
15 CFR Appendix B to Part 30 - AES Filing Codes
Code of Federal Regulations, 2011 CFR
2011-01-01
... exemptions: Currency Airline tickets Bank notes Internal revenue stamps State liquor stamps Advertising...—Trans-Alaska Pipeline Authorization Act C50ENC—Encryption Commodities and Software C51AGR—License Exception Agricultural Commodities C53APP—Adjusted Peak Performance (Computers) C54SS-WRC—Western Red Cedar...
15 CFR Appendix B to Part 30 - AES Filing Codes
Code of Federal Regulations, 2010 CFR
2010-01-01
... exemptions: Currency Airline tickets Bank notes Internal revenue stamps State liquor stamps Advertising...—Trans-Alaska Pipeline Authorization Act C50ENC—Encryption Commodities and Software C51AGR—License Exception Agricultural Commodities C53APP—Adjusted Peak Performance (Computers) C54SS-WRC—Western Red Cedar...
ERIC Educational Resources Information Center
MacCabe, Bruce
The Literacy Learning Center Project, a project of the Meriden Public Library (Connecticut), targeted the educationally underserved and functionally illiterate, and involved recruitment, retention, space renovation, coalition building, public awareness, training, basic literacy, collection development, tutoring, computer assisted services, and…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-05
.... Description of the Matching Program A. General The Computer Matching and Privacy Protection Act of 1988 (Pub... 1974: CMS Computer Matching Program Match No. 2013-01; HHS Computer Matching Program Match No. 1312...). ACTION: Notice of Computer Matching Program (CMP). SUMMARY: In accordance with the requirements of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-26
... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), amended... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0052] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ U.S. Department of Health and Human Services (HHS), Administration for...
77 FR 38610 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-28
... DEPARTMENT OF EDUCATION Privacy Act of 1974; Computer Matching Program AGENCY: Department of Education. ACTION: Notice--Computer matching agreement between the Department of Education and the Department of Defense. SUMMARY: This document provides notice of the continuation of the computer matching...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lucas, Robert; Ang, James; Bergman, Keren
2014-02-10
Exascale computing systems are essential for the scientific fields that will transform the 21st century global economy, including energy, biotechnology, nanotechnology, and materials science. Progress in these fields is predicated on the ability to perform advanced scientific and engineering simulations, and analyze the deluge of data. On July 29, 2013, ASCAC was charged by Patricia Dehmer, the Acting Director of the Office of Science, to assemble a subcommittee to provide advice on exascale computing. This subcommittee was directed to return a list of no more than ten technical approaches (hardware and software) that will enable the development of a systemmore » that achieves the Department's goals for exascale computing. Numerous reports over the past few years have documented the technical challenges and the non¬-viability of simply scaling existing computer designs to reach exascale. The technical challenges revolve around energy consumption, memory performance, resilience, extreme concurrency, and big data. Drawing from these reports and more recent experience, this ASCAC subcommittee has identified the top ten computing technology advancements that are critical to making a capable, economically viable, exascale system.« less
A Boundary Delineation System for the Bureau of Ocean Energy Management
NASA Astrophysics Data System (ADS)
Vandegraft, Douglas L.
2018-05-01
Federal government mapping of the offshore areas of the United States in support of the development of oil and gas resources began in 1954. The first mapping system utilized a network of rectangular blocks defined by State Plane coordinates which was later revised to utilize the Universal Transverse Mercator grid. Creation of offshore boundaries directed by the Submerged Lands Act and Outer Continental Shelf Lands Act were mathematically determined using early computer programs that performed the required computations, but required many steps. The Bureau of Ocean Energy Management has revised these antiquated methods using GIS technology which provide the required accuracy and produce the mapping products needed for leasing of energy resources, including renewable energy projects, on the outer continental shelf. (Note: this is an updated version of a paper of the same title written and published in 2015).
32 CFR 505.13 - Computer Matching Agreement Program.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 3 2013-07-01 2013-07-01 false Computer Matching Agreement Program. 505.13... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.13 Computer Matching Agreement Program. (a) General provisions. (1) Pursuant to the Privacy Act and this part, DA records may be subject to computer...
32 CFR 505.13 - Computer Matching Agreement Program.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 3 2012-07-01 2009-07-01 true Computer Matching Agreement Program. 505.13... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.13 Computer Matching Agreement Program. (a) General provisions. (1) Pursuant to the Privacy Act and this part, DA records may be subject to computer...
32 CFR 505.13 - Computer Matching Agreement Program.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 3 2014-07-01 2014-07-01 false Computer Matching Agreement Program. 505.13... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.13 Computer Matching Agreement Program. (a) General provisions. (1) Pursuant to the Privacy Act and this part, DA records may be subject to computer...
78 FR 50146 - Privacy Act of 1974: Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... DEPARTMENT OF VETERANS AFFAIRS Privacy Act of 1974: Computer Matching Program AGENCY: Department of Veterans Affairs. ACTION: Notice of Computer Match Program. SUMMARY: Pursuant to 5 U.S.C. 552a... to conduct a computer matching program with the Internal Revenue Service (IRS). Data from the...
76 FR 47299 - Privacy Act of 1974: Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-04
... DEPARTMENT OF VETERANS AFFAIRS Privacy Act of 1974: Computer Matching Program AGENCY: Department of Veterans Affairs. ACTION: Notice of Computer Match Program. SUMMARY: Pursuant to 5 U.S.C. 552a... to conduct a computer matching program with the Internal Revenue Service (IRS). Data from the...
32 CFR 505.13 - Computer Matching Agreement Program.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Computer Matching Agreement Program. 505.13... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.13 Computer Matching Agreement Program. (a) General provisions. (1) Pursuant to the Privacy Act and this part, DA records may be subject to computer...
Optimizing the Usability of Brain-Computer Interfaces.
Zhang, Yin; Chase, Steve M
2018-05-01
Brain-computer interfaces are in the process of moving from the laboratory to the clinic. These devices act by reading neural activity and using it to directly control a device, such as a cursor on a computer screen. An open question in the field is how to map neural activity to device movement in order to achieve the most proficient control. This question is complicated by the fact that learning, especially the long-term skill learning that accompanies weeks of practice, can allow subjects to improve performance over time. Typical approaches to this problem attempt to maximize the biomimetic properties of the device in order to limit the need for extensive training. However, it is unclear if this approach would ultimately be superior to performance that might be achieved with a nonbiomimetic device once the subject has engaged in extended practice and learned how to use it. Here we approach this problem using ideas from optimal control theory. Under the assumption that the brain acts as an optimal controller, we present a formal definition of the usability of a device and show that the optimal postlearning mapping can be written as the solution of a constrained optimization problem. We then derive the optimal mappings for particular cases common to most brain-computer interfaces. Our results suggest that the common approach of creating biomimetic interfaces may not be optimal when learning is taken into account. More broadly, our method provides a blueprint for optimal device design in general control-theoretic contexts.
Tracking Students' Cognitive Processes during Program Debugging--An Eye-Movement Approach
ERIC Educational Resources Information Center
Lin, Yu-Tzu; Wu, Cheng-Chih; Hou, Ting-Yun; Lin, Yu-Chih; Yang, Fang-Ying; Chang, Chia-Hu
2016-01-01
This study explores students' cognitive processes while debugging programs by using an eye tracker. Students' eye movements during debugging were recorded by an eye tracker to investigate whether and how high- and low-performance students act differently during debugging. Thirty-eight computer science undergraduates were asked to debug two C…
ERIC Educational Resources Information Center
Smyth, Carol B.; Grannell, Dorothy S.; Moore, Miriam
The Literacy Resource Center project, a program of the Wayne Township Public Library also known as the Morrisson-Reeves Library (Richmond, Indiana), involved recruitment, retention, coalition building, public awareness, training, basic literacy, collection development, tutoring, computer-assisted, other technology, employment oriented,…
ERIC Educational Resources Information Center
Nevels, Vada Germaine
The Hopkinsville-Christian County Library (Kentucky) conducted a project that involved recruitment, public awareness, basic literacy, collection development, tutoring, computer-assisted, other technology, and intergenerational/family programs. The project served a community of 50,000-100,000 people, and targeted the learning disabled,…
ERIC Educational Resources Information Center
Cole, Lucy; Fraser, Ruth
The Columbia County Public Library (Lake City, Florida) conducted a project that involved recruitment, retention, public awareness, training, basic literacy, collection development, tutoring, computer- assisted, other technology, intergenerational/family, and English as a Second Language (ESL) programs. The project served a community of…
The Role of Agent Age and Gender for Middle-Grade Girls
ERIC Educational Resources Information Center
Kim, Yanghee
2016-01-01
Compared to boys, many girls are more aware of a social context in the learning process and perform better when the environment supports frequent interactions and social relationships. For these girls, embodied agents (animated on-screen characters acting as tutors) could afford simulated social interactions in computer-based learning and thereby…
Pagan, Marino
2014-01-01
Finding sought objects requires the brain to combine visual and target signals to determine when a target is in view. To investigate how the brain implements these computations, we recorded neural responses in inferotemporal cortex (IT) and perirhinal cortex (PRH) as macaque monkeys performed a delayed-match-to-sample target search task. Our data suggest that visual and target signals were combined within or before IT in the ventral visual pathway and then passed onto PRH, where they were reformatted into a more explicit target match signal over ∼10–15 ms. Accounting for these dynamics in PRH did not require proposing dynamic computations within PRH itself but, rather, could be attributed to instantaneous PRH computations performed upon an input representation from IT that changed with time. We found that the dynamics of the IT representation arose from two commonly observed features: individual IT neurons whose response preferences were not simply rescaled with time and variable response latencies across the population. Our results demonstrate that these types of time-varying responses have important consequences for downstream computation and suggest that dynamic representations can arise within a feedforward framework as a consequence of instantaneous computations performed upon time-varying inputs. PMID:25122904
NASA Technical Reports Server (NTRS)
DeMott, Diana
2013-01-01
Compared to equipment designed to perform the same function over and over, humans are just not as reliable. Computers and machines perform the same action in the same way repeatedly getting the same result, unless equipment fails or a human interferes. Humans who are supposed to perform the same actions repeatedly often perform them incorrectly due to a variety of issues including: stress, fatigue, illness, lack of training, distraction, acting at the wrong time, not acting when they should, not following procedures, misinterpreting information or inattention to detail. Why not use robots and automatic controls exclusively if human error is so common? In an emergency or off normal situation that the computer, robotic element, or automatic control system is not designed to respond to, the result is failure unless a human can intervene. The human in the loop may be more likely to cause an error, but is also more likely to catch the error and correct it. When it comes to unexpected situations, or performing multiple tasks outside the defined mission parameters, humans are the only viable alternative. Human Reliability Assessments (HRA) identifies ways to improve human performance and reliability and can lead to improvements in systems designed to interact with humans. Understanding the context of the situation that can lead to human errors, which include taking the wrong action, no action or making bad decisions provides additional information to mitigate risks. With improved human reliability comes reduced risk for the overall operation or project.
Assessment of medical communication skills by computer: assessment method and student experiences.
Hulsman, R L; Mollema, E D; Hoos, A M; de Haes, J C J M; Donnison-Speijer, J D
2004-08-01
A computer-assisted assessment (CAA) program for communication skills designated ACT was developed using the objective structured video examination (OSVE) format. This method features assessment of cognitive scripts underlying communication behaviour, a broad range of communication problems covered in 1 assessment, highly standardised assessment and rating procedures, and large group assessments without complex organisation. The Academic Medical Centre (AMC) at the University of Amsterdam, the Netherlands. Aims To describe the development of the AMC Communication Test (ACT); to describe our experiences with the examination and rating procedures; to present test score descriptives, and to present the students' opinions of ACT. The ACT presents films on history taking, breaking bad news and shared decision making. Each film is accompanied by 3 types of short essay questions derived from our assessment model: "knows", "knows why/when" and "knows how". Evaluation questions about ACT were integrated into the assessment. Participants A total of 210 third year medical undergraduates were assessed. This study reports on the 110 (53%) students who completed all evaluation questions. Marking 210 examinations took about 17 days. The test score matched a normal distribution and showed a good level of discrimination of the students. About 75% passed the examination. Some support for the validity of our assessment model was found in the students' differential performance on the 3 types of questions. The ACT was well received. Student evaluations confirmed our efforts to develop realistic films that related well to the communication training programme. The ACT is a useful assessment method which complements interpersonal assessment methods for the evaluation of the medical communication skills of undergraduates.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-21
... DEPARTMENT OF EDUCATION Privacy Act of 1974; Computer Matching Program Between the Department of... document provides notice of the continuation of a computer matching program between the Department of... 5301, the Department of Justice and the Department of Education implemented a computer matching program...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-30
... notice of its renewal of an ongoing computer-matching program with the Social Security Administration... computer-matching program with the Committee on Homeland Security and Governmental Affairs of the Senate... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as amended; Notice of Computer Matching Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-10
... notice of its renewal of an ongoing computer-matching program with the Social Security Administration... computer-matching program with the Committee on Homeland Security and Governmental Affairs of the Senate... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as Amended; Notice of Computer Matching Program...
77 FR 74020 - Office of Child Support Enforcement; Privacy Act of 1974; Computer Matching Agreement
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-12
... 29, 2012, sent a report of a Computer Matching Program to the Committee on Homeland Security and... Support Enforcement; Privacy Act of 1974; Computer Matching Agreement AGENCY: Office of Child Support Enforcement (OCSE), ACF, HHS. ACTION: Notice of a Computer Matching Program. SUMMARY: In accordance with the...
13 CFR 102.40 - Computer matching.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.40 Computer...) Matching agreements. SBA will comply with the Computer Matching and Privacy Protection Act of 1988 (5 U.S.C... 13 Business Credit and Assistance 1 2013-01-01 2013-01-01 false Computer matching. 102.40 Section...
13 CFR 102.40 - Computer matching.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.40 Computer...) Matching agreements. SBA will comply with the Computer Matching and Privacy Protection Act of 1988 (5 U.S.C... 13 Business Credit and Assistance 1 2014-01-01 2014-01-01 false Computer matching. 102.40 Section...
13 CFR 102.40 - Computer matching.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.40 Computer...) Matching agreements. SBA will comply with the Computer Matching and Privacy Protection Act of 1988 (5 U.S.C... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Computer matching. 102.40 Section...
13 CFR 102.40 - Computer matching.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.40 Computer...) Matching agreements. SBA will comply with the Computer Matching and Privacy Protection Act of 1988 (5 U.S.C... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Computer matching. 102.40 Section...
13 CFR 102.40 - Computer matching.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.40 Computer...) Matching agreements. SBA will comply with the Computer Matching and Privacy Protection Act of 1988 (5 U.S.C... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Computer matching. 102.40 Section...
ACTS 118x: High Speed TCP Interoperability Testing
NASA Technical Reports Server (NTRS)
Brooks, David E.; Buffinton, Craig; Beering, Dave R.; Welch, Arun; Ivancic, William D.; Zernic, Mike; Hoder, Douglas J.
1999-01-01
With the recent explosion of the Internet and the enormous business opportunities available to communication system providers, great interest has developed in improving the efficiency of data transfer over satellite links using the Transmission Control Protocol (TCP) of the Internet Protocol (IP) suite. The NASA's ACTS experiments program initiated a series of TCP experiments to demonstrate scalability of TCP/IP and determine to what extent the protocol can be optimized over a 622 Mbps satellite link. Through partnerships with the government technology oriented labs, computer, telecommunication, and satellite industries NASA Glenn was able to: (1) promote the development of interoperable, high-performance TCP/IP implementations across multiple computing / operating platforms; (2) work with the satellite industry to answer outstanding questions regarding the use of standard protocols (TCP/IP and ATM) for the delivery of advanced data services, and for use in spacecraft architectures; and (3) conduct a series of TCP/IP interoperability tests over OC12 ATM over a satellite network in a multi-vendor environment using ACTS. The experiments' various network configurations and the results are presented.
40 CFR 124.20 - Computation of time.
Code of Federal Regulations, 2012 CFR
2012-07-01
... scheduled to begin on the occurrence of an act or event shall begin on the day after the act or event. (b) Any time period scheduled to begin before the occurrence of an act or event shall be computed so that the period ends on the day before the act or event. (c) If the final day of any time period falls on a...
40 CFR 124.20 - Computation of time.
Code of Federal Regulations, 2014 CFR
2014-07-01
... scheduled to begin on the occurrence of an act or event shall begin on the day after the act or event. (b) Any time period scheduled to begin before the occurrence of an act or event shall be computed so that the period ends on the day before the act or event. (c) If the final day of any time period falls on a...
40 CFR 124.20 - Computation of time.
Code of Federal Regulations, 2010 CFR
2010-07-01
... scheduled to begin on the occurrence of an act or event shall begin on the day after the act or event. (b) Any time period scheduled to begin before the occurrence of an act or event shall be computed so that the period ends on the day before the act or event. (c) If the final day of any time period falls on a...
40 CFR 124.20 - Computation of time.
Code of Federal Regulations, 2013 CFR
2013-07-01
... scheduled to begin on the occurrence of an act or event shall begin on the day after the act or event. (b) Any time period scheduled to begin before the occurrence of an act or event shall be computed so that the period ends on the day before the act or event. (c) If the final day of any time period falls on a...
40 CFR 124.20 - Computation of time.
Code of Federal Regulations, 2011 CFR
2011-07-01
... scheduled to begin on the occurrence of an act or event shall begin on the day after the act or event. (b) Any time period scheduled to begin before the occurrence of an act or event shall be computed so that the period ends on the day before the act or event. (c) If the final day of any time period falls on a...
78 FR 49525 - Privacy Act of 1974; CMS Computer Match No. 2013-06; HHS Computer Match No. 1308
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-14
... Care Act of 2010 (Pub. L. 111-148), as amended by the Health Care and Education Reconciliation Act of..., 2009). INCLUSIVE DATES OF THE MATCH: The CMP will become effective no sooner than 40 days after the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-09
... of a Computer Matching Program Between HUD and the United States Department of Veterans Affairs (VA) AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice of a computer matching program... the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), and the Office of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-29
... DEPARTMENT OF EDUCATION Privacy Act of 1974; Computer Matching Program between the U.S. Department.... ACTION: Notice. SUMMARY: Notice is hereby given of the renewal of the computer matching program between... (VA) (source agency). After the ED and VA Data Integrity Boards approve a new computer matching...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-21
... RAILROAD RETIREMENT BOARD Computer Matching and Privacy Protection Act of 1988; Report of Matching...: Notice of a renewal of an existing computer matching program due to expire on May 24, 2013. SUMMARY: As... of its intent to renew an ongoing computer matching program. In this match, we provide certain...
76 FR 50460 - Privacy Act of 1974; Notice of a Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-15
...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, Department of Defense (DoD). ACTION: Notice of a Computer Matching Program. SUMMARY: Subsection (e)(12) of the Privacy Act of 1974, as amended, (5 U.S.C. 552a) requires agencies to publish advance notice of any proposed or revised computer...
76 FR 77811 - Privacy Act of 1974; Notice of a Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-14
...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, Department of Defense (DoD). ACTION: Notice of a Computer Matching Program. SUMMARY: Subsection (e)(12) of the Privacy Act of 1974, as amended, (5 U.S.C. 552a) requires agencies to publish advance notice of any proposed or revised computer...
ERIC Educational Resources Information Center
Mooney, Sharon Lopez
The West Marin Literacy Project, a project of the Marin County Free Library (San Rafael, California), involved recruitment, retention, coalition building, public awareness, training, rural oriented, tutoring, computer- assisted, intergenerational/family, and English as a Second Language (ESL) programs. The project served a community of under…
Wide-Area Network Resources for Teacher Education.
ERIC Educational Resources Information Center
Aust, Ronald
A central feature of the High Performance Computing Act of 1991 is the establishment of a National Research and Education Network (NREN). The level of access that teachers and teacher educators will need to benefit from the NREN and the types of network resources that are most useful for educators are explored, along with design issues that are…
ERIC Educational Resources Information Center
Hess, Therese M.
The Martinsburg-Berkeley County Public Library (West Virginia) conducted a project that involved recruitment, retention, coalition building, public awareness, training, basic literacy, collection development, tutoring, computer assisted, other technology, and English as a Second Language (ESL) programs. The project served a three-county community…
A MATLAB based 3D modeling and inversion code for MT data
NASA Astrophysics Data System (ADS)
Singh, Arun; Dehiya, Rahul; Gupta, Pravin K.; Israil, M.
2017-07-01
The development of a MATLAB based computer code, AP3DMT, for modeling and inversion of 3D Magnetotelluric (MT) data is presented. The code comprises two independent components: grid generator code and modeling/inversion code. The grid generator code performs model discretization and acts as an interface by generating various I/O files. The inversion code performs core computations in modular form - forward modeling, data functionals, sensitivity computations and regularization. These modules can be readily extended to other similar inverse problems like Controlled-Source EM (CSEM). The modular structure of the code provides a framework useful for implementation of new applications and inversion algorithms. The use of MATLAB and its libraries makes it more compact and user friendly. The code has been validated on several published models. To demonstrate its versatility and capabilities the results of inversion for two complex models are presented.
A computational model of spatial visualization capacity.
Lyon, Don R; Gunzelmann, Glenn; Gluck, Kevin A
2008-09-01
Visualizing spatial material is a cornerstone of human problem solving, but human visualization capacity is sharply limited. To investigate the sources of this limit, we developed a new task to measure visualization accuracy for verbally-described spatial paths (similar to street directions), and implemented a computational process model to perform it. In this model, developed within the Adaptive Control of Thought-Rational (ACT-R) architecture, visualization capacity is limited by three mechanisms. Two of these (associative interference and decay) are longstanding characteristics of ACT-R's declarative memory. A third (spatial interference) is a new mechanism motivated by spatial proximity effects in our data. We tested the model in two experiments, one with parameter-value fitting, and a replication without further fitting. Correspondence between model and data was close in both experiments, suggesting that the model may be useful for understanding why visualizing new, complex spatial material is so difficult.
78 FR 15734 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0010] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...
78 FR 15733 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0008] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...
78 FR 32711 - Privacy Act of 1974: Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-31
... DEPARTMENT OF VETERANS AFFAIRS Privacy Act of 1974: Computer Matching Program AGENCY: Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Department of Veterans Affairs (VA) provides notice that it intends to conduct a recurring computer-matching program matching Internal Revenue Service (IRS...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-31
... program for the purpose of income verifications and computer matching. DATES: Effective Date: The... additional verification to identify inappropriate (excess or insufficient) rental assistance, and perhaps... Act, the Native American Housing Assistance and Self-Determination Act of 1996, and the Quality...
Development and validation of spray models for investigating diesel engine combustion and emissions
NASA Astrophysics Data System (ADS)
Som, Sibendu
Diesel engines intrinsically generate NOx and particulate matter which need to be reduced significantly in order to comply with the increasingly stringent regulations worldwide. This motivates the diesel engine manufacturers to gain fundamental understanding of the spray and combustion processes so as to optimize these processes and reduce engine emissions. Strategies being investigated to reduce engine's raw emissions include advancements in fuel injection systems, efficient nozzle orifice design, injection and combustion control strategies, exhaust gas recirculation, use of alternative fuels such as biodiesel etc. This thesis explores several of these approaches (such as nozzle orifice design, injection control strategy, and biodiesel use) by performing computer modeling of diesel engine processes. Fuel atomization characteristics are known to have a significant effect on the combustion and emission processes in diesel engines. Primary fuel atomization is induced by aerodynamics in the near nozzle region as well as cavitation and turbulence from the injector nozzle. The breakup models that are currently used in diesel engine simulations generally consider aerodynamically induced breakup using the Kelvin-Helmholtz (KH) instability model, but do not account for inner nozzle flow effects. An improved primary breakup (KH-ACT) model incorporating cavitation and turbulence effects along with aerodynamically induced breakup is developed and incorporated in the computational fluid dynamics code CONVERGE. The spray simulations using KH-ACT model are "quasi-dynamically" coupled with inner nozzle flow (using FLUENT) computations. This presents a novel tool to capture the influence of inner nozzle flow effects such as cavitation and turbulence on spray, combustion, and emission processes. Extensive validation is performed against the non-evaporating spray data from Argonne National Laboratory. Performance of the KH and KH-ACT models is compared against the evaporating and combusting data from Sandia National Laboratory. The KH-ACT model is observed to provide better predictions for spray dispersion, axial velocity decay, sauter mean diameter, and liquid and lift-off length interplay which is attributed to the enhanced primary breakup predicted by this model. In addition, experimentally observed trends with changing nozzle conicity could only be captured by the KH-ACT model. Results further indicate that the combustion under diesel engine conditions is characterized by a double-flame structure with a rich premixed reaction zone near the flame stabilization region and a non-premixed reaction zone further downstream. Finally, the differences in inner nozzle flow and spray characteristics of petrodiesel and biodiesel are quantified. The improved modeling capability developed in this work can be used for extensive diesel engine simulations to further optimize injection, spray, combustion, and emission processes.
78 FR 38724 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-27
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0006] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... Agreement that establishes a computer matching program between the Department of Homeland Security/U.S...
NASA Technical Reports Server (NTRS)
Reinhart, Richard C.
1992-01-01
The Experiment Control and Monitor (EC&M) software was developed at NASA Lewis Research Center to support the Advanced Communications Technology Satellite (ACTS) High Burst Rate Link Evaluation Terminal (HBR-LET). The HBR-LET is an experimenter's terminal to communicate with the ACTS for various investigations by government agencies, universities, and industry. The EC&M software is one segment of the Control and Performance Monitoring (C&PM) software system of the HBR-LET. The EC&M software allows users to initialize, control, and monitor the instrumentation within the HBR-LET using a predefined sequence of commands. Besides instrument control, the C&PM software system is also responsible for computer communication between the HBR-LET and the ACTS NASA Ground Station and for uplink power control of the HBR-LET to demonstrate power augmentation during rain fade events. The EC&M Software User's Guide, Version 1.0 (NASA-CR-189160) outlines the commands required to install and operate the EC&M software. Input and output file descriptions, operator commands, and error recovery procedures are discussed in the document. The EC&M Software Maintenance Manual, Version 1.0 (NASA-CR-189161) is a programmer's guide that describes current implementation of the EC&M software from a technical perspective. An overview of the EC&M software, computer algorithms, format representation, and computer hardware configuration are included in the manual.
Data Recording Room in the 10-by 10-Foot Supersonic Wind Tunnel
1973-04-21
The test data recording equipment located in the office building of the 10-by 10-Foot Supersonic Wind Tunnel at the NASA Lewis Research Center. The data system was the state of the art when the facility began operating in 1955 and was upgraded over time. NASA engineers used solenoid valves to measure pressures from different locations within the test section. Up 48 measurements could be fed into a single transducer. The 10-by 10 data recorders could handle up to 200 data channels at once. The Central Automatic Digital Data Encoder (CADDE) converted this direct current raw data from the test section into digital format on magnetic tape. The digital information was sent to the Lewis Central Computer Facility for additional processing. It could also be displayed in the control room via strip charts or oscillographs. The 16-by 56-foot long ERA 1103 UNIVAC mainframe computer processed most of the digital data. The paper tape with the raw data was fed into the ERA 1103 which performed the needed calculations. The information was then sent back to the control room. There was a lag of several minutes before the computed information was available, but it was exponentially faster than the hand calculations performed by the female computers. The 10- by 10-foot tunnel, which had its official opening in May 1956, was built under the Congressional Unitary Plan Act which coordinated wind tunnel construction at the NACA, Air Force, industry, and universities. The 10- by 10 was the largest of the three NACA tunnels built under the act.
40 CFR 270.215 - How are time periods in the requirements in this subpart and my RAP computed?
Code of Federal Regulations, 2012 CFR
2012-07-01
... the occurrence of an act or event must begin on the day after the act or event. (For example, if your... before the occurrence of an act or event must be computed so that the period ends on the day before the act or event. (For example, if you are transferring ownership or operational control of your site, and...
40 CFR 270.215 - How are time periods in the requirements in this subpart and my RAP computed?
Code of Federal Regulations, 2010 CFR
2010-07-01
... the occurrence of an act or event must begin on the day after the act or event. (For example, if your... before the occurrence of an act or event must be computed so that the period ends on the day before the act or event. (For example, if you are transferring ownership or operational control of your site, and...
40 CFR 270.215 - How are time periods in the requirements in this subpart and my RAP computed?
Code of Federal Regulations, 2011 CFR
2011-07-01
... the occurrence of an act or event must begin on the day after the act or event. (For example, if your... before the occurrence of an act or event must be computed so that the period ends on the day before the act or event. (For example, if you are transferring ownership or operational control of your site, and...
40 CFR 270.215 - How are time periods in the requirements in this subpart and my RAP computed?
Code of Federal Regulations, 2014 CFR
2014-07-01
... the occurrence of an act or event must begin on the day after the act or event. (For example, if your... before the occurrence of an act or event must be computed so that the period ends on the day before the act or event. (For example, if you are transferring ownership or operational control of your site, and...
40 CFR 270.215 - How are time periods in the requirements in this subpart and my RAP computed?
Code of Federal Regulations, 2013 CFR
2013-07-01
... the occurrence of an act or event must begin on the day after the act or event. (For example, if your... before the occurrence of an act or event must be computed so that the period ends on the day before the act or event. (For example, if you are transferring ownership or operational control of your site, and...
When does a physical system compute?
Horsman, Clare; Stepney, Susan; Wagner, Rob C; Kendon, Viv
2014-09-08
Computing is a high-level process of a physical system. Recent interest in non-standard computing systems, including quantum and biological computers, has brought this physical basis of computing to the forefront. There has been, however, no consensus on how to tell if a given physical system is acting as a computer or not; leading to confusion over novel computational devices, and even claims that every physical event is a computation. In this paper, we introduce a formal framework that can be used to determine whether a physical system is performing a computation. We demonstrate how the abstract computational level interacts with the physical device level, in comparison with the use of mathematical models in experimental science. This powerful formulation allows a precise description of experiments, technology, computation and simulation, giving our central conclusion: physical computing is the use of a physical system to predict the outcome of an abstract evolution . We give conditions for computing, illustrated using a range of non-standard computing scenarios. The framework also covers broader computing contexts, where there is no obvious human computer user. We introduce the notion of a 'computational entity', and its critical role in defining when computing is taking place in physical systems.
When does a physical system compute?
Horsman, Clare; Stepney, Susan; Wagner, Rob C.; Kendon, Viv
2014-01-01
Computing is a high-level process of a physical system. Recent interest in non-standard computing systems, including quantum and biological computers, has brought this physical basis of computing to the forefront. There has been, however, no consensus on how to tell if a given physical system is acting as a computer or not; leading to confusion over novel computational devices, and even claims that every physical event is a computation. In this paper, we introduce a formal framework that can be used to determine whether a physical system is performing a computation. We demonstrate how the abstract computational level interacts with the physical device level, in comparison with the use of mathematical models in experimental science. This powerful formulation allows a precise description of experiments, technology, computation and simulation, giving our central conclusion: physical computing is the use of a physical system to predict the outcome of an abstract evolution. We give conditions for computing, illustrated using a range of non-standard computing scenarios. The framework also covers broader computing contexts, where there is no obvious human computer user. We introduce the notion of a ‘computational entity’, and its critical role in defining when computing is taking place in physical systems. PMID:25197245
Evolution of a designless nanoparticle network into reconfigurable Boolean logic
NASA Astrophysics Data System (ADS)
Bose, S. K.; Lawrence, C. P.; Liu, Z.; Makarenko, K. S.; van Damme, R. M. J.; Broersma, H. J.; van der Wiel, W. G.
2015-12-01
Natural computers exploit the emergent properties and massive parallelism of interconnected networks of locally active components. Evolution has resulted in systems that compute quickly and that use energy efficiently, utilizing whatever physical properties are exploitable. Man-made computers, on the other hand, are based on circuits of functional units that follow given design rules. Hence, potentially exploitable physical processes, such as capacitive crosstalk, to solve a problem are left out. Until now, designless nanoscale networks of inanimate matter that exhibit robust computational functionality had not been realized. Here we artificially evolve the electrical properties of a disordered nanomaterials system (by optimizing the values of control voltages using a genetic algorithm) to perform computational tasks reconfigurably. We exploit the rich behaviour that emerges from interconnected metal nanoparticles, which act as strongly nonlinear single-electron transistors, and find that this nanoscale architecture can be configured in situ into any Boolean logic gate. This universal, reconfigurable gate would require about ten transistors in a conventional circuit. Our system meets the criteria for the physical realization of (cellular) neural networks: universality (arbitrary Boolean functions), compactness, robustness and evolvability, which implies scalability to perform more advanced tasks. Our evolutionary approach works around device-to-device variations and the accompanying uncertainties in performance. Moreover, it bears a great potential for more energy-efficient computation, and for solving problems that are very hard to tackle in conventional architectures.
Bonavita, S; Sacco, R; Della Corte, M; Esposito, S; Sparaco, M; d'Ambrosio, A; Docimo, R; Bisecco, A; Lavorgna, L; Corbo, D; Cirillo, S; Gallo, A; Esposito, F; Tedeschi, G
2015-01-01
To better understand the effects of short-term computer-based cognitive rehabilitation (cCR) on cognitive performances and default mode network (DMN) intrinsic functional connectivity (FC) in cognitively impaired relapsing remitting (RR) multiple sclerosis (MS) patients. Eighteen cognitively impaired RRMS patients underwent neuropsychological evaluation by the Rao's brief repeatable battery and resting-state functional magnetic resonance imaging to evaluate FC of the DMN before and after a short-term (8 weeks, twice a week) cCR. A control group of 14 cognitively impaired RRMS patients was assigned to an aspecific cognitive training (aCT), and underwent the same study protocol. Correlations between DMN and cognitive performances were also tested. After cCR, there was a significant improvement of the following tests: SDMT (p < 0.01), PASAT 3" (p < 0.00), PASAT 2" (p < 0.03), SRT-D (p < 0.02), and 10/36 SPART-D (p < 0.04); as well as a significant increase of the FC of the DMN in the posterior cingulate cortex (PCC) and bilateral inferior parietal cortex (IPC). After cCR, a significant negative correlation between Stroop Color-Word Interference Test and FC in the PCC emerged. After aCT, the control group did not show any significant effect either on FC or neuropsychological tests. No significant differences were found in brain volumes and lesion load in both groups when comparing data acquired at baseline and after cCR or aCT. In cognitively impaired RRMS patients, cCR improves cognitive performances (i.e., processing speed and visual and verbal sustained memory), and increases FC in the PCC and IPC of the DMN. This exploratory study suggests that cCR may induce adaptive cortical reorganization favoring better cognitive performances, thus strengthening the value of cognitive exercise in the general perspective of building either cognitive or brain reserve.
20 CFR 225.22 - Employee RIB PIA used in survivor annuities.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... This PIA is computed in accordance with section 215 of the Social Security Act using the deceased... RETIREMENT ACT PRIMARY INSURANCE AMOUNT DETERMINATIONS PIA's Used in Computing Survivor Annuities and the... Employee Retirement Insurance Benefit PIA (Employee RIB PIA) is used to compute the employee RIB amount...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... safeguards for disclosure of Social Security benefit information to OPM via direct computer link for the... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and Social Security Administration AGENCY: Office of Personnel Management...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-16
... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and Social Security Administration AGENCY: Office of Personnel Management...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-05
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0052] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1003 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-21
... 1310 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0007] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-18
... 1310 AGENCY: Social Security Administration (SSA) ACTION: Notice of a renewal of an existing computer..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0035] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0059] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Centers for Medicare & Medicaid Services (CMS))--Match Number 1076 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-14
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0022] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Centers for Medicare & Medicaid Services (CMS))--Match Number 1076 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching...
40 CFR 72.11 - Computation of time.
Code of Federal Regulations, 2014 CFR
2014-07-01
... event shall begin on the day the act or event occurs. (b) Unless otherwise stated, any time period scheduled, under the Acid Rain Program, to begin before the occurrence of an act or event shall be computed so that the period ends on the day before the act or event occurs. (c) Unless otherwise stated, if...
40 CFR 72.11 - Computation of time.
Code of Federal Regulations, 2010 CFR
2010-07-01
... event shall begin on the day the act or event occurs. (b) Unless otherwise stated, any time period scheduled, under the Acid Rain Program, to begin before the occurrence of an act or event shall be computed so that the period ends on the day before the act or event occurs. (c) Unless otherwise stated, if...
40 CFR 72.11 - Computation of time.
Code of Federal Regulations, 2011 CFR
2011-07-01
... event shall begin on the day the act or event occurs. (b) Unless otherwise stated, any time period scheduled, under the Acid Rain Program, to begin before the occurrence of an act or event shall be computed so that the period ends on the day before the act or event occurs. (c) Unless otherwise stated, if...
40 CFR 72.11 - Computation of time.
Code of Federal Regulations, 2013 CFR
2013-07-01
... event shall begin on the day the act or event occurs. (b) Unless otherwise stated, any time period scheduled, under the Acid Rain Program, to begin before the occurrence of an act or event shall be computed so that the period ends on the day before the act or event occurs. (c) Unless otherwise stated, if...
40 CFR 72.11 - Computation of time.
Code of Federal Regulations, 2012 CFR
2012-07-01
... event shall begin on the day the act or event occurs. (b) Unless otherwise stated, any time period scheduled, under the Acid Rain Program, to begin before the occurrence of an act or event shall be computed so that the period ends on the day before the act or event occurs. (c) Unless otherwise stated, if...
20 CFR 234.20 - Computation of the employee's 1937 Act LSDP basic amount.
Code of Federal Regulations, 2010 CFR
2010-04-01
... compensation and section 209 of the Social Security Act for a definition of creditable wages.) Closing date... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Computation of the employee's 1937 Act LSDP basic amount. 234.20 Section 234.20 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-14
... require additional verification to identify inappropriate or inaccurate rental assistance, and may provide... Affordable Housing Act, the Native American Housing Assistance and Self-Determination Act of 1996, and the... matching activities. The computer matching program will also provide for the verification of social...
2017-01-23
5e. TASK NUMBER N/A 5f. WORK UNIT NUMBER N/A 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) AND ADDRESS(ES) RDECOM-TARDEC-ACT Attn...occupant work space, central 90% of the Soldier population, encumbrance, posture and position, verification and validation, computer aided design...factors engineers could benefit by working with vehicle designers to perform virtual assessments in CAD when there is not enough time and/or funding to
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Education and Labor.
This report documents a hearing to amend the Vocational Education Act of 1963 to make incentive grants to the states for electronic and computer technician vocational education programs. The discucssion focused on the Electronic and Computer Technician Education Incentive Grants Act. Testimony included prepared statements, letters, and…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-09
... of a Computer Matching Program Between the Department of Housing and Urban Development (HUD) and the.... ACTION: Notice of a computer matching program between the HUD and the USDA. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-03
... of a Computer Matching Program Between the Department of Housing and Urban Development (HUD) and the.... ACTION: Notice of a computer matching program between the HUD and the SBA. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection...
Center for Advanced Computational Technology
NASA Technical Reports Server (NTRS)
Noor, Ahmed K.
2000-01-01
The Center for Advanced Computational Technology (ACT) was established to serve as a focal point for diverse research activities pertaining to application of advanced computational technology to future aerospace systems. These activities include the use of numerical simulations, artificial intelligence methods, multimedia and synthetic environments, and computational intelligence, in the modeling, analysis, sensitivity studies, optimization, design and operation of future aerospace systems. The Center is located at NASA Langley and is an integral part of the School of Engineering and Applied Science of the University of Virginia. The Center has four specific objectives: 1) conduct innovative research on applications of advanced computational technology to aerospace systems; 2) act as pathfinder by demonstrating to the research community what can be done (high-potential, high-risk research); 3) help in identifying future directions of research in support of the aeronautical and space missions of the twenty-first century; and 4) help in the rapid transfer of research results to industry and in broadening awareness among researchers and engineers of the state-of-the-art in applications of advanced computational technology to the analysis, design prototyping and operations of aerospace and other high-performance engineering systems. In addition to research, Center activities include helping in the planning and coordination of the activities of a multi-center team of NASA and JPL researchers who are developing an intelligent synthesis environment for future aerospace systems; organizing workshops and national symposia; as well as writing state-of-the-art monographs and NASA special publications on timely topics.
Institute for scientific computing research;fiscal year 1999 annual report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keyes, D
2000-03-28
Large-scale scientific computation, and all of the disciplines that support it and help to validate it, have been placed at the focus of Lawrence Livermore National Laboratory by the Accelerated Strategic Computing Initiative (ASCI). The Laboratory operates the computer with the highest peak performance in the world and has undertaken some of the largest and most compute-intensive simulations ever performed. Computers at the architectural extremes, however, are notoriously difficult to use efficiently. Even such successes as the Laboratory's two Bell Prizes awarded in November 1999 only emphasize the need for much better ways of interacting with the results of large-scalemore » simulations. Advances in scientific computing research have, therefore, never been more vital to the core missions of the Laboratory than at present. Computational science is evolving so rapidly along every one of its research fronts that to remain on the leading edge, the Laboratory must engage researchers at many academic centers of excellence. In FY 1999, the Institute for Scientific Computing Research (ISCR) has expanded the Laboratory's bridge to the academic community in the form of collaborative subcontracts, visiting faculty, student internships, a workshop, and a very active seminar series. ISCR research participants are integrated almost seamlessly with the Laboratory's Center for Applied Scientific Computing (CASC), which, in turn, addresses computational challenges arising throughout the Laboratory. Administratively, the ISCR flourishes under the Laboratory's University Relations Program (URP). Together with the other four Institutes of the URP, it must navigate a course that allows the Laboratory to benefit from academic exchanges while preserving national security. Although FY 1999 brought more than its share of challenges to the operation of an academic-like research enterprise within the context of a national security laboratory, the results declare the challenges well met and well worth the continued effort. A change of administration for the ISCR occurred during FY 1999. Acting Director John Fitzgerald retired from LLNL in August after 35 years of service, including the last two at helm of the ISCR. David Keyes, who has been a regular visitor in conjunction with ASCI scalable algorithms research since October 1997, overlapped with John for three months and serves half-time as the new Acting Director.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-06
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0015] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Centers for Medicare and Medicaid Services (CMS))--Match Number 1094 AGENCY: Social Security Administration (SSA). ACTION: Notice of a new computer matching program that will expire...
32 CFR Appendix E to Part 806b - Privacy Impact Assessment
Code of Federal Regulations, 2011 CFR
2011-07-01
... Systems Development System Privacy. Rapid advancements in computer technology make it possible to store...-503, The Computer Matching and Privacy Act of 1988. 13 13 http://www.defenselink.mil/privacy/1975OMB_PAGuide/jun1989.pdf. (2) Public Law 100-235, The Computer Security Act of 1987, 14 which establishes...
20 CFR 225.23 - Combined Earnings PIA used in survivor annuities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... section 215 of the Social Security Act as in effect on December 31, 1974. It is computed using the... RAILROAD RETIREMENT ACT PRIMARY INSURANCE AMOUNT DETERMINATIONS PIA's Used in Computing Survivor Annuities... annuities. The Combined Earnings PIA used in survivor annuities may be used in computing the tier II...
20 CFR 225.24 - SS Earnings PIA used in survivor annuities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Security Earnings PIA (SS Earnings PIA) used in survivor annuities may be used in computing the tier II... the Social Security Act as in effect on December 31, 1974. It is computed using the deceased employee... RETIREMENT ACT PRIMARY INSURANCE AMOUNT DETERMINATIONS PIA's Used in Computing Survivor Annuities and the...
29 CFR 783.43 - Computation of seaman's minimum wage.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR STATEMENTS... STANDARDS ACT TO EMPLOYEES EMPLOYED AS SEAMEN Computation of Wages and Hours § 783.43 Computation of seaman... all hours on duty in such period at the hourly rate prescribed for employees newly covered by the Act...
12 CFR 792.19 - How does NCUA calculate the fees for processing my request?
Code of Federal Regulations, 2012 CFR
2012-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED.... Searches may be done manually or by computer. Search does not include modification of an existing program... cost of operating the computer for computer searches for records. (c) NCUA will charge the following...
12 CFR 792.19 - How does NCUA calculate the fees for processing my request?
Code of Federal Regulations, 2010 CFR
2010-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED.... Searches may be done manually or by computer. Search does not include modification of an existing program... cost of operating the computer for computer searches for records. (c) NCUA will charge the following...
12 CFR 792.19 - How does NCUA calculate the fees for processing my request?
Code of Federal Regulations, 2013 CFR
2013-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED.... Searches may be done manually or by computer. Search does not include modification of an existing program... cost of operating the computer for computer searches for records. (c) NCUA will charge the following...
12 CFR 792.19 - How does NCUA calculate the fees for processing my request?
Code of Federal Regulations, 2011 CFR
2011-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED.... Searches may be done manually or by computer. Search does not include modification of an existing program... cost of operating the computer for computer searches for records. (c) NCUA will charge the following...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-01
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0089] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that...
12 CFR 792.19 - How does NCUA calculate the fees for processing my request?
Code of Federal Regulations, 2014 CFR
2014-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED.... Searches may be done manually or by computer. Search does not include modification of an existing program... cost of operating the computer for computer searches for records. (c) NCUA will charge the following...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-21
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0010] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Railroad Retirement Board (RRB))--Match Number 1006 AGENCY: Social Security Administration. ACTION: Notice of a renewal of an existing computer matching program that will expire on...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-08
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0102] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ the States); Match 6000 and 6003 AGENCY: Social Security Administration..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-07
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0034] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD))--Match Number 1304 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...
32 CFR Appendix E to Part 806b - Privacy Impact Assessment
Code of Federal Regulations, 2014 CFR
2014-07-01
... Systems Development System Privacy. Rapid advancements in computer technology make it possible to store...-503, The Computer Matching and Privacy Act of 1988. 13 13 http://www.defenselink.mil/privacy/1975OMB_PAGuide/jun1989.pdf. (2) Public Law 100-235, The Computer Security Act of 1987, 14 which establishes...
32 CFR Appendix E to Part 806b - Privacy Impact Assessment
Code of Federal Regulations, 2012 CFR
2012-07-01
... Systems Development System Privacy. Rapid advancements in computer technology make it possible to store...-503, The Computer Matching and Privacy Act of 1988. 13 13 http://www.defenselink.mil/privacy/1975OMB_PAGuide/jun1989.pdf. (2) Public Law 100-235, The Computer Security Act of 1987, 14 which establishes...
32 CFR Appendix E to Part 806b - Privacy Impact Assessment
Code of Federal Regulations, 2013 CFR
2013-07-01
... Systems Development System Privacy. Rapid advancements in computer technology make it possible to store...-503, The Computer Matching and Privacy Act of 1988. 13 13 http://www.defenselink.mil/privacy/1975OMB_PAGuide/jun1989.pdf. (2) Public Law 100-235, The Computer Security Act of 1987, 14 which establishes...
Visualization of Unsteady Computational Fluid Dynamics
NASA Technical Reports Server (NTRS)
Haimes, Robert
1997-01-01
The current compute environment that most researchers are using for the calculation of 3D unsteady Computational Fluid Dynamic (CFD) results is a super-computer class machine. The Massively Parallel Processors (MPP's) such as the 160 node IBM SP2 at NAS and clusters of workstations acting as a single MPP (like NAS's SGI Power-Challenge array and the J90 cluster) provide the required computation bandwidth for CFD calculations of transient problems. If we follow the traditional computational analysis steps for CFD (and we wish to construct an interactive visualizer) we need to be aware of the following: (1) Disk space requirements. A single snap-shot must contain at least the values (primitive variables) stored at the appropriate locations within the mesh. For most simple 3D Euler solvers that means 5 floating point words. Navier-Stokes solutions with turbulence models may contain 7 state-variables. (2) Disk speed vs. Computational speeds. The time required to read the complete solution of a saved time frame from disk is now longer than the compute time for a set number of iterations from an explicit solver. Depending, on the hardware and solver an iteration of an implicit code may also take less time than reading the solution from disk. If one examines the performance improvements in the last decade or two, it is easy to see that depending on disk performance (vs. CPU improvement) may not be the best method for enhancing interactivity. (3) Cluster and Parallel Machine I/O problems. Disk access time is much worse within current parallel machines and cluster of workstations that are acting in concert to solve a single problem. In this case we are not trying to read the volume of data, but are running the solver and the solver outputs the solution. These traditional network interfaces must be used for the file system. (4) Numerics of particle traces. Most visualization tools can work upon a single snap shot of the data but some visualization tools for transient problems require dealing with time.
ERIC Educational Resources Information Center
Hopf-Weichel, Rosemarie; And Others
This report describes results of the first year of a three-year program to develop and evaluate a new Adaptive Computerized Training System (ACTS) for electronics maintenance training. (ACTS incorporates an adaptive computer program that learns the student's diagnostic and decision value structure, compares it to that of an expert, and adapts the…
NASA Technical Reports Server (NTRS)
Barnett, Alan R.; Widrick, Timothy W.; Ludwiczak, Damian R.
1996-01-01
Solving for dynamic responses of free-free launch vehicle/spacecraft systems acted upon by buffeting winds is commonly performed throughout the aerospace industry. Due to the unpredictable nature of this wind loading event, these problems are typically solved using frequency response random analysis techniques. To generate dynamic responses for spacecraft with statically-indeterminate interfaces, spacecraft contractors prefer to develop models which have response transformation matrices developed for mode acceleration data recovery. This method transforms spacecraft boundary accelerations and displacements into internal responses. Unfortunately, standard MSC/NASTRAN modal frequency response solution sequences cannot be used to combine acceleration- and displacement-dependent responses required for spacecraft mode acceleration data recovery. External user-written computer codes can be used with MSC/NASTRAN output to perform such combinations, but these methods can be labor and computer resource intensive. Taking advantage of the analytical and computer resource efficiencies inherent within MS C/NASTRAN, a DMAP Alter has been developed to combine acceleration- and displacement-dependent modal frequency responses for performing spacecraft mode acceleration data recovery. The Alter has been used successfully to efficiently solve a common aerospace buffeting wind analysis.
NASA Technical Reports Server (NTRS)
Daigle, Matthew John; Goebel, Kai Frank
2010-01-01
Model-based prognostics captures system knowledge in the form of physics-based models of components, and how they fail, in order to obtain accurate predictions of end of life (EOL). EOL is predicted based on the estimated current state distribution of a component and expected profiles of future usage. In general, this requires simulations of the component using the underlying models. In this paper, we develop a simulation-based prediction methodology that achieves computational efficiency by performing only the minimal number of simulations needed in order to accurately approximate the mean and variance of the complete EOL distribution. This is performed through the use of the unscented transform, which predicts the means and covariances of a distribution passed through a nonlinear transformation. In this case, the EOL simulation acts as that nonlinear transformation. In this paper, we review the unscented transform, and describe how this concept is applied to efficient EOL prediction. As a case study, we develop a physics-based model of a solenoid valve, and perform simulation experiments to demonstrate improved computational efficiency without sacrificing prediction accuracy.
Evaluation of low wing-loading fuel conservative, short-haul transports
NASA Technical Reports Server (NTRS)
Pasley, L. H.; Waldeck, T. A.
1976-01-01
Fuel conservation that could be attained with two technology advancements, Q fan propulsion system and active control technology (ACT) was studied. Aircraft incorporating each technology were sized for a Federal Aviation Regulation (FAR) field length of 914 meters (3,000 feet), 148 passengers, and a 926 kilometer (500 nautical mile) mission. The cruise Mach number was .70 at 10100 meter (33,000 foot) altitude. The improvement resulting from application of the Q fan propulsion system was computed relative to an optimized fuel conservative transport design. The performance improvements resulting from application of ACT technology were relative to the optimized Q fan propulsion system configuration.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Senate Committee on the Judiciary.
A statement by Senator Orrin G. Hatch opened the hearing on The Computer Software Rental Amendments Act of 1988, a bill which would amend title 17, United States Code, the Copyright Act, to protect certain computer programs. The text of the bill is then presented, followed by the statements of four witnesses: (1) Dr. Alan C. Ashton, president,…
Dynamic Discharge Arc Driver. [computerized simulation
NASA Technical Reports Server (NTRS)
Dannenberg, R. E.; Slapnicar, P. I.
1975-01-01
A computer program using nonlinear RLC circuit analysis was developed to accurately model the electrical discharge performance of the Ames 1-MJ energy storage and arc-driver system. Solutions of circuit parameters are compared with experimental circuit data and related to shock speed measurements. Computer analysis led to the concept of a Dynamic Discharge Arc Driver (DDAD) capable of increasing the range of operation of shock-driven facilities. Utilization of mass addition of the driver gas offers a unique means of improving driver performance. Mass addition acts to increase the arc resistance, which results in better electrical circuit damping with more efficient Joule heating, producing stronger shock waves. Preliminary tests resulted in an increase in shock Mach number from 34 to 39 in air at an initial pressure of 2.5 torr.
NASA Technical Reports Server (NTRS)
Stevens, N. J.
1979-01-01
Cases where the charged-particle environment acts on the spacecraft (e.g., spacecraft charging phenomena) and cases where a system on the spacecraft causes the interaction (e.g., high voltage space power systems) are considered. Both categories were studied in ground simulation facilities to understand the processes involved and to measure the pertinent parameters. Computer simulations are based on the NASA Charging Analyzer Program (NASCAP) code. Analytical models are developed in this code and verified against the experimental data. Extrapolation from the small test samples to space conditions are made with this code. Typical results from laboratory and computer simulations are presented for both types of interactions. Extrapolations from these simulations to performance in space environments are discussed.
29 CFR 778.313 - Computing overtime pay under the Act for employees compensated on task basis.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 3 2010-07-01 2010-07-01 false Computing overtime pay under the Act for employees compensated on task basis. 778.313 Section 778.313 Labor Regulations Relating to Labor (Continued) WAGE AND... TO REGULATIONS OVERTIME COMPENSATION Special Problems âtaskâ Basis of Payment § 778.313 Computing...
78 FR 40541 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA)-Match Number 1014
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-05
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0019] Privacy Act of 1974, as Amended; Computer Matching Program (SSA)--Match Number 1014 AGENCY: Social Security Administration (SSA). [[Page 40542
Modeling the Effects of Two Behavior Moderators in ACT-R
2002-01-10
11(2), 93-100. Kelsey, R. M., Blascovich , J ., Leitten, C. L., Schneider, T. R., Tomaka , J ., & Wiens, S. (2000). Cardiovascular reactivity and...Computer Studies, 55, 85-107. Tomaka , J ., Blascovich , J ., Kelsey, R. M., & Leitten, C. L. (1993). Subjective, physiological, and behavioral effects of...performance and more solution attempts than neutral situations (Kelsey, Blascovich , Leitten, Schneider, Tomaka , & Wiens, 2000; Quigley, Barret, & Weinstein
Expected orbit determination performance for the TOPEX/Poseidon mission
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nerem, R.S.; Putney, B.H.; Marshall, J.A.
1993-03-01
The TOPEX/Poseidon (T/P) mission, launched during the summer of 1992, has the requirement that the radial component of its orbit must be computed to an accuracy of 13 cm root-mean-square (rms) or better, allowing measurements of the sea surface height to be computed to similar accuracy when the satellite height is differenced with the altimeter measurements. This will be done by combining precise satellite tracking measurements with precise models of the forces acting on the satellite. The Space Geodesy Branch at Goddard Space Flight Center (GSFC), as part of the T/P precision orbit determination (POD) Team, has the responsibility withinmore » NASA for the T/P precise orbit computations. The prelaunch activities of the T/P POD Team have been mainly directed towards developing improved models of the static and time-varying gravitational forces acting on T/P and precise models for the non-conservative forces perturbing the orbit of T/P such as atmospheric drag, solar and Earth radiation pressure, and thermal imbalances. The radial orbit error budget for T/P allows 10 cm rms error due to gravity field mismodeling, 3 cm due to solid Earth and ocean tides, 6 cm due to radiative forces, and 3 cm due to atmospheric drag. A prelaunch assessment of the current modeling accuracies for these forces indicates that the radial orbit error requirements can be achieved with the current models, and can probably be surpassed once T/P tracking data are used to fine tune the models. Provided that the performance of the T/P spacecraft is nominal, the precise orbits computed by the T/P POD Team should be accurate to 13 cm or better radially.« less
32 CFR 505.8 - Training requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... managers, computer systems development personnel, computer systems operations personnel, statisticians... Act requires all heads of Army Staff agencies, field operating agencies, direct reporting units, Major... in the design, development, operation, and maintenance of any Privacy Act system of records and to...
32 CFR 505.8 - Training requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... managers, computer systems development personnel, computer systems operations personnel, statisticians... Act requires all heads of Army Staff agencies, field operating agencies, direct reporting units, Major... in the design, development, operation, and maintenance of any Privacy Act system of records and to...
32 CFR 505.8 - Training requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... managers, computer systems development personnel, computer systems operations personnel, statisticians... Act requires all heads of Army Staff agencies, field operating agencies, direct reporting units, Major... in the design, development, operation, and maintenance of any Privacy Act system of records and to...
32 CFR 505.8 - Training requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... managers, computer systems development personnel, computer systems operations personnel, statisticians... Act requires all heads of Army Staff agencies, field operating agencies, direct reporting units, Major... in the design, development, operation, and maintenance of any Privacy Act system of records and to...
The Regulation of Medical Computer Software as a “Device” under the Food, Drug, and Cosmetic Act
Brannigan, Vincent
1986-01-01
Recent developments in computer software have raised the possibility that federal regulators may claim to control medical computer software as a “device” under the Food, Drug and Cosmetic Act. The purpose of this paper is to analyze the FDCA to determine whether computer software is included in the statutory scheme, examine constitutional arguments relating to computer software, and discuss regulatory principles that should be taken into account when deciding appropriate regulation. This paper is limited to computer program output used by humans in deciding appropriate medical therapy for a patient.
Inexact hardware for modelling weather & climate
NASA Astrophysics Data System (ADS)
Düben, Peter D.; McNamara, Hugh; Palmer, Tim
2014-05-01
The use of stochastic processing hardware and low precision arithmetic in atmospheric models is investigated. Stochastic processors allow hardware-induced faults in calculations, sacrificing exact calculations in exchange for improvements in performance and potentially accuracy and a reduction in power consumption. A similar trade-off is achieved using low precision arithmetic, with improvements in computation and communication speed and savings in storage and memory requirements. As high-performance computing becomes more massively parallel and power intensive, these two approaches may be important stepping stones in the pursuit of global cloud resolving atmospheric modelling. The impact of both, hardware induced faults and low precision arithmetic is tested in the dynamical core of a global atmosphere model. Our simulations show that both approaches to inexact calculations do not substantially affect the quality of the model simulations, provided they are restricted to act only on smaller scales. This suggests that inexact calculations at the small scale could reduce computation and power costs without adversely affecting the quality of the simulations.
Outside influence: The sense of agency takes into account what is in our surroundings.
Hon, Nicholas; Seow, Yin-Yi; Pereira, Don
2018-05-01
We are quite capable of distinguishing those outcomes we cause from those we do not. This ability to sense self-agency is thought to be produced by a comparison between a predictive representation of an outcome and the actual outcome that occurs. It is unclear, though, specifically what types of information can be entered into agency computations. Here, we demonstrate that information from non-target stimuli (stimuli that are not directly acted upon) incidentally present in our surroundings can influence predictions of outcomes, consequently modulating the sense of agency over clearly-defined target outcomes (those that occur to acted-upon stimuli). This provides the first evidence that our sense of agency is contextualized with respect to what is in our immediate visual environment. Furthermore, our data suggest that agency computations, instead of just a single comparison, may involve comparisons performed in stages, with different stages involving different types/classes of information. A model of such multi-stage comparisons is described. Copyright © 2018 Elsevier B.V. All rights reserved.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Senate Committee on the Judiciary.
The Computer Pornography and Child Exploitation Prevention Act would establish criminal penalties for the transmission by computer of obscene matter, or by computer or other means, of matter pertaining to the sexual exploitation of children. Opening statements by Senators Trible, Denton, Specter, and McConnell are presented. The text of the bill…
Global information infrastructure.
Lindberg, D A
1994-01-01
The High Performance Computing and Communications Program (HPCC) is a multiagency federal initiative under the leadership of the White House Office of Science and Technology Policy, established by the High Performance Computing Act of 1991. It has been assigned a critical role in supporting the international collaboration essential to science and to health care. Goals of the HPCC are to extend USA leadership in high performance computing and networking technologies; to improve technology transfer for economic competitiveness, education, and national security; and to provide a key part of the foundation for the National Information Infrastructure. The first component of the National Institutes of Health to participate in the HPCC, the National Library of Medicine (NLM), recently issued a solicitation for proposals to address a range of issues, from privacy to 'testbed' networks, 'virtual reality,' and more. These efforts will build upon the NLM's extensive outreach program and other initiatives, including the Unified Medical Language System (UMLS), MEDLARS, and Grateful Med. New Internet search tools are emerging, such as Gopher and 'Knowbots'. Medicine will succeed in developing future intelligent agents to assist in utilizing computer networks. Our ability to serve patients is so often restricted by lack of information and knowledge at the time and place of medical decision-making. The new technologies, properly employed, will also greatly enhance our ability to serve the patient.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Science and Technology.
This legislative report offers testimony and related materials concerning two bills that address the issues of the computer in the classroom as an educational tool, access to computers, teacher training, and software development through the establishment of a National Computer Educational Software Corporation. Testimony of the following witnesses…
Development of the Tensoral Computer Language
NASA Technical Reports Server (NTRS)
Ferziger, Joel; Dresselhaus, Eliot
1996-01-01
The research scientist or engineer wishing to perform large scale simulations or to extract useful information from existing databases is required to have expertise in the details of the particular database, the numerical methods and the computer architecture to be used. This poses a significant practical barrier to the use of simulation data. The goal of this research was to develop a high-level computer language called Tensoral, designed to remove this barrier. The Tensoral language provides a framework in which efficient generic data manipulations can be easily coded and implemented. First of all, Tensoral is general. The fundamental objects in Tensoral represent tensor fields and the operators that act on them. The numerical implementation of these tensors and operators is completely and flexibly programmable. New mathematical constructs and operators can be easily added to the Tensoral system. Tensoral is compatible with existing languages. Tensoral tensor operations co-exist in a natural way with a host language, which may be any sufficiently powerful computer language such as Fortran, C, or Vectoral. Tensoral is very-high-level. Tensor operations in Tensoral typically act on entire databases (i.e., arrays) at one time and may, therefore, correspond to many lines of code in a conventional language. Tensoral is efficient. Tensoral is a compiled language. Database manipulations are simplified optimized and scheduled by the compiler eventually resulting in efficient machine code to implement them.
Predicting Development of Mathematical Word Problem Solving Across the Intermediate Grades
Tolar, Tammy D.; Fuchs, Lynn; Cirino, Paul T.; Fuchs, Douglas; Hamlett, Carol L.; Fletcher, Jack M.
2012-01-01
This study addressed predictors of the development of word problem solving (WPS) across the intermediate grades. At beginning of 3rd grade, 4 cohorts of students (N = 261) were measured on computation, language, nonverbal reasoning skills, and attentive behavior and were assessed 4 times from beginning of 3rd through end of 5th grade on 2 measures of WPS at low and high levels of complexity. Language skills were related to initial performance at both levels of complexity and did not predict growth at either level. Computational skills had an effect on initial performance in low- but not high-complexity problems and did not predict growth at either level of complexity. Attentive behavior did not predict initial performance but did predict growth in low-complexity, whereas it predicted initial performance but not growth for high-complexity problems. Nonverbal reasoning predicted initial performance and growth for low-complexity WPS, but only growth for high-complexity WPS. This evidence suggests that although mathematical structure is fixed, different cognitive resources may act as limiting factors in WPS development when the WPS context is varied. PMID:23325985
Particle Identification on an FPGA Accelerated Compute Platform for the LHCb Upgrade
NASA Astrophysics Data System (ADS)
Fäerber, Christian; Schwemmer, Rainer; Machen, Jonathan; Neufeld, Niko
2017-07-01
The current LHCb readout system will be upgraded in 2018 to a “triggerless” readout of the entire detector at the Large Hadron Collider collision rate of 40 MHz. The corresponding bandwidth from the detector down to the foreseen dedicated computing farm (event filter farm), which acts as the trigger, has to be increased by a factor of almost 100 from currently 500 Gb/s up to 40 Tb/s. The event filter farm will preanalyze the data and will select the events on an event by event basis. This will reduce the bandwidth down to a manageable size to write the interesting physics data to tape. The design of such a system is a challenging task, and the reason why different new technologies are considered and have to be investigated for the different parts of the system. For the usage in the event building farm or in the event filter farm (trigger), an experimental field programmable gate array (FPGA) accelerated computing platform is considered and, therefore, tested. FPGA compute accelerators are used more and more in standard servers such as for Microsoft Bing search or Baidu search. The platform we use hosts a general Intel CPU and a high-performance FPGA linked via the high-speed Intel QuickPath Interconnect. An accelerator is implemented on the FPGA. It is very likely that these platforms, which are built, in general, for high-performance computing, are also very interesting for the high-energy physics community. First, the performance results of smaller test cases performed at the beginning are presented. Afterward, a part of the existing LHCb RICH particle identification is tested and is ported to the experimental FPGA accelerated platform. We have compared the performance of the LHCb RICH particle identification running on a normal CPU with the performance of the same algorithm, which is running on the Xeon-FPGA compute accelerator platform.
Navier-Stokes predictions of pitch damping for axisymmetric shell using steady coning motion
NASA Technical Reports Server (NTRS)
Weinacht, Paul; Sturek, Walter B.; Schiff, Lewis B.
1991-01-01
Previous theoretical investigations have proposed that the side force and moment acting on a body of revolution in steady coning motion could be related to the pitch-damping force and moment. In the current research effort, this approach is applied to produce predictions of the pitch damping for axisymmetric shell. The flow fields about these projectiles undergoing steady coning motion are successfully computed using a parabolized Navier-Stokes computational approach which makes use of a rotating coordinate frame. The governing equations are modified to include the centrifugal and Coriolis force terms due to the rotating coordinate frame. From the computed flow field, the side moments due to coning motion, spinning motion, and combined spinning and coning motion are used to determine the pitch-damping coefficients. Computations are performed for two generic shell configurations, a secant-ogive-cylinder and a secant-ogive-cylinder-boattail.
Developing a Complete and Effective ACT-R Architecture
2008-01-01
of computational primitives , as contrasted with the predominant “one-off” and “grab-bag” cognitive models in the field. These architectures have...transport/ semaphore protocols connected via a glue script. Both protocols rely on the fact that file rename and file remove operations are atomic...the Trial Log file until just prior to processing the next input request. Thus, to perform synchronous identifications it is necessary to run an
NASA Astrophysics Data System (ADS)
Chou, Cheng-Ying; Anastasio, Mark A.
2016-04-01
In propagation-based X-ray phase-contrast (PB XPC) imaging, the measured image contains a mixture of absorption- and phase-contrast. To obtain separate images of the projected absorption and phase (i.e., refractive) properties of a sample, phase retrieval methods can be employed. It has been suggested that phase-retrieval can always improve image quality in PB XPC imaging. However, when objective (task-based) measures of image quality are employed, this is not necessarily true and phase retrieval can be detrimental. In this work, signal detection theory is utilized to quantify the performance of a Hotelling observer (HO) for detecting a known signal in a known background. Two cases are considered. In the first case, the HO acts directly on the measured intensity data. In the second case, the HO acts on either the retrieved phase or absorption image. We demonstrate that the performance of the HO is superior when acting on the measured intensity data. The loss of task-specific information induced by phase-retrieval is quantified by computing the efficiency of the HO as the ratio of the test statistic signal-to-noise ratio (SNR) for the two cases. The effect of the system geometry on this efficiency is systematically investigated. Our findings confirm that phase-retrieval can impair signal detection performance in XPC imaging.
Computers, Technology, and Disability. [Update.
ERIC Educational Resources Information Center
American Council on Education, Washington, DC. HEATH Resource Center.
This paper describes programs and resources that focus on access of postsecondary students with disabilities to computers and other forms of technology. Increased access to technological devices and services is provided to students with disabilities under the Technology-Related Assistance for Individuals with Disabilities Act (Tech Act). Section…
78 FR 49524 - Privacy Act of 1974; CMS Computer Match No. 2013-08; HHS Computer Match No. 1309
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-14
... by the Health Care and Education Reconciliation Act of 2010 (Pub. L. 111-152) (collectively, the ACA...). INCLUSIVE DATES OF THE MATCH: The CMP will become effective no sooner than 40 days after the report of the...
78 FR 50419 - Privacy Act of 1974; CMS Computer Match No. 2013-10; HHS Computer Match No. 1310
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-19
... (Pub. L. 111- 148), as amended by the Health Care and Education Reconciliation Act of 2010 (Pub. L. 111... Entitlements Program System of Records Notice, 77 FR 47415 (August 8, 2012). Inclusive Dates of the Match: The...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-01
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration (SSA). ACTION: Notice of renewal of an existing...
High performance cellular level agent-based simulation with FLAME for the GPU.
Richmond, Paul; Walker, Dawn; Coakley, Simon; Romano, Daniela
2010-05-01
Driven by the availability of experimental data and ability to simulate a biological scale which is of immediate interest, the cellular scale is fast emerging as an ideal candidate for middle-out modelling. As with 'bottom-up' simulation approaches, cellular level simulations demand a high degree of computational power, which in large-scale simulations can only be achieved through parallel computing. The flexible large-scale agent modelling environment (FLAME) is a template driven framework for agent-based modelling (ABM) on parallel architectures ideally suited to the simulation of cellular systems. It is available for both high performance computing clusters (www.flame.ac.uk) and GPU hardware (www.flamegpu.com) and uses a formal specification technique that acts as a universal modelling format. This not only creates an abstraction from the underlying hardware architectures, but avoids the steep learning curve associated with programming them. In benchmarking tests and simulations of advanced cellular systems, FLAME GPU has reported massive improvement in performance over more traditional ABM frameworks. This allows the time spent in the development and testing stages of modelling to be drastically reduced and creates the possibility of real-time visualisation for simple visual face-validation.
Sixth Annual Conference on Computers, Freedom, and Privacy: The RealAudio Proceedings.
ERIC Educational Resources Information Center
Glover, Barbara; Meernik, Mary
1996-01-01
Reviews the sixth Conference on Computers, Freedom, and Privacy (CFP) held in March 1996. Highlights include the Communications Decency Act, part of the 1996 Telecommunications Reform Act; European views; Internet service providers; limiting online speech on campus; cryptography; the global information infrastructure; copyright; and China and the…
78 FR 39730 - Privacy Act of 1974; CMS Computer Match No. 2013-11; HHS Computer Match No. 1302
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-02
... (Pub. L. 111-148), as amended by the Health Care and Education Reconciliation Act of 2010 (Pub. L. 111... 78 FR 32256 on May 29, 2013. Inclusive Dates of the Match: The CMP shall become effective no sooner...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-18
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0055] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration. ACTION: Notice of a renewal of an existing...
Hassani, S. A.; Oemisch, M.; Balcarras, M.; Westendorff, S.; Ardid, S.; van der Meer, M. A.; Tiesinga, P.; Womelsdorf, T.
2017-01-01
Noradrenaline is believed to support cognitive flexibility through the alpha 2A noradrenergic receptor (a2A-NAR) acting in prefrontal cortex. Enhanced flexibility has been inferred from improved working memory with the a2A-NA agonist Guanfacine. But it has been unclear whether Guanfacine improves specific attention and learning mechanisms beyond working memory, and whether the drug effects can be formalized computationally to allow single subject predictions. We tested and confirmed these suggestions in a case study with a healthy nonhuman primate performing a feature-based reversal learning task evaluating performance using Bayesian and Reinforcement learning models. In an initial dose-testing phase we found a Guanfacine dose that increased performance accuracy, decreased distractibility and improved learning. In a second experimental phase using only that dose we examined the faster feature-based reversal learning with Guanfacine with single-subject computational modeling. Parameter estimation suggested that improved learning is not accounted for by varying a single reinforcement learning mechanism, but by changing the set of parameter values to higher learning rates and stronger suppression of non-chosen over chosen feature information. These findings provide an important starting point for developing nonhuman primate models to discern the synaptic mechanisms of attention and learning functions within the context of a computational neuropsychiatry framework. PMID:28091572
Subramaniam, Rathan M; Janowitz, Warren R; Johnson, Geoffrey B; Lodge, Martin A; Parisi, Marguerite T; Ferguson, Mark R; Hellinger, Jeffrey C; Gladish, Gregory W; Gupta, Narainder K
2017-12-01
This clinical practice parameter has been developed collaboratively by the American College of Radiology (ACR), the Society for Pediatric Radiology (SPR), and the Society of Thoracic Radiology (STR). This document is intended to act as a guide for physicians performing and interpreting positron emission tomography-computed tomography (PET/CT) of cardiac diseases in adults and children. The primary value of cardiac PET/CT imaging include evaluation of perfusion, function, viability, inflammation, anatomy, and risk stratification for cardiac-related events such as myocardial infarction and death. Optimum utility of cardiac PET/CT is achieved when images are interpreted in conjunction with clinical information and laboratory data. Measurement of myocardial blood flow, coronary flow reserve and detection of balanced ischemia are significant advantages of cardiac PET perfusion studies. Increasingly cardiac PET/CT is used in diagnosis and treatment response assessment for cardiac sarcoidosis.
Entangling qubits by Heisenberg spin exchange and anyon braiding
NASA Astrophysics Data System (ADS)
Zeuch, Daniel
As the discovery of quantum mechanics signified a revolution in the world of physics more than one century ago, the notion of a quantum computer in 1981 marked the beginning of a drastic change of our understanding of information and computability. In a quantum computer, information is stored using quantum bits, or qubits, which are described by a quantum-mechanical superposition of the quantum states 0 and 1. Computation then proceeds by acting with unitary operations on these qubits. These operations are referred to as quantum logic gates, in analogy to classical computation where bits are acted on by classical logic gates. In order to perform universal quantum computation it is, in principle, sufficient to carry out single-qubit gates and two-qubit gates, where the former act on individual qubits and the latter, acting on two qubits, are used to entangle qubits with each other. The present thesis is divided into two main parts. In the first, we are concerned with spin-based quantum computation. In a spin-based quantum computer, qubits are encoded into the Hilbert space spanned by spin-1/2 particles, such as electron spins trapped in semiconductor quantum dots. For a suitable qubit encoding, turning on-and-off, or "pulsing,'' the isotropic Heisenberg exchange Hamiltonian JSi · Sj allows for universal quantum computation and it is this scheme, known as exchange-only quantum computation, which we focus on. In the second part of this thesis, we consider a topological quantum computer in which qubits are encoded using so-called Fibonacci anyons, exotic quasiparticle excitations that obey non-Abelian statistics, and which may emerge in certain two-dimensional topological systems such as fractional quantum-Hall states. Quantum gates can then be carried out by moving these particles around one another, a process that can be viewed as braiding their 2+1 dimensional worldlines. The subject of the present thesis is the development and theoretical understanding of procedures used for entangling qubits. We begin by presenting analytical constructions of pulse sequences which can be used to carry out two-qubit gates that are locally equivalent to a controlled-PHASE gate. The corresponding phase can be arbitrarily chosen, and for one particular choice this gate is equivalent to controlled-NOT. While the constructions of these sequences are relatively lengthy and cumbersome, we further provide a straightforward and intuitive derivation of the shortest known two-qubit pulse sequence for carrying out a controlled-NOT gate. This derivation is carried out completely analytically through a novel "elevation'' of a simple three-spin pulse sequence to a more complicated five-spin pulse sequence. In the case of topological quantum computation with Fibonacci anyons, we present a new method for constructing entangling two-qubit braids. Our construction is based on an iterative procedure, established by Reichardt, which can be used to systematically generate braids whose corresponding operations quickly converge towards an operation that has a diagonal matrix representation in a particular natural basis. After describing this iteration procedure we show how the resulting braids can be used in two explicit constructions for two-qubit braids. Compared to two-qubit braids that can be found using other methods, the braids generated here are among the most efficient and can be obtained straightforwardly without computational overhead.
The Gain of Resource Delegation in Distributed Computing Environments
NASA Astrophysics Data System (ADS)
Fölling, Alexander; Grimme, Christian; Lepping, Joachim; Papaspyrou, Alexander
In this paper, we address job scheduling in Distributed Computing Infrastructures, that is a loosely coupled network of autonomous acting High Performance Computing systems. In contrast to the common approach of mutual workload exchange, we consider the more intuitive operator's viewpoint of load-dependent resource reconfiguration. In case of a site's over-utilization, the scheduling system is able to lease resources from other sites to keep up service quality for its local user community. Contrary, the granting of idle resources can increase utilization in times of low local workload and thus ensure higher efficiency. The evaluation considers real workload data and is done with respect to common service quality indicators. For two simple resource exchange policies and three basic setups we show the possible gain of this approach and analyze the dynamics in workload-adaptive reconfiguration behavior.
Incorporating time and spatial-temporal reasoning into situation management
NASA Astrophysics Data System (ADS)
Jakobson, Gabriel
2010-04-01
Spatio-temporal reasoning plays a significant role in situation management that is performed by intelligent agents (human or machine) by affecting how the situations are recognized, interpreted, acted upon or predicted. Many definitions and formalisms for the notion of spatio-temporal reasoning have emerged in various research fields including psychology, economics and computer science (computational linguistics, data management, control theory, artificial intelligence and others). In this paper we examine the role of spatio-temporal reasoning in situation management, particularly how to resolve situations that are described by using spatio-temporal relations among events and situations. We discuss a model for describing context sensitive temporal relations and show have the model can be extended for spatial relations.
76 FR 4456 - Privacy Act of 1974; Report of Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
..., computer systems analysis and computer programming services. The contractors promptly return data entry... Use Disclosures of Data in the System The Privacy Act allows us to disclose information without an...) for which the information was collected. Any such compatible use of data is known as a ``routine use...
Questioning Mechanisms During Tutoring, Conversation, and Human-Computer Interaction
1992-10-14
project on the grant, we are analyzing sequences of speech act categories in dialogues between children. The 90 dialogues occur in the context of free ... play , a puzzle task, versus a 20-questions game. Our goal is to assess the extent to which various computational models can predict speech act category N
America COMPETES Act and the FY2010 Budget
2009-06-29
Outstanding Junior Investigator, Fusion Energy Sciences Plasma Physics Junior Faculty Development; Advanced Scientific Computing Research Early Career...the Fusion Energy Sciences Graduate Fellowships.2 If members of Congress agree with this contention, these America COMPETES Act programs were...Physics Outstanding Junior Investigator, Fusion Energy Sciences Plasma Physics Junior Faculty Development; Advanced Scientific Computing Research Early
Calvão-Santos, Gil; Borges, Cristina; Nunes, Sandrina; Salgado-Borges, José; Duarte, Lilianne
2011-01-01
To compare the efficacy of 3 different artificial tears (AT) acting primarily in one of the 3 tear film layers (Tears Again®, lipidic; Opticol®, aqueous; Optive®, mucin) in recovering the tear film changes in patients with dry eye symptoms due to external causes. A total of 27 patients, with dry eye symptoms associated with extra hours of computer or contact lenses use, were randomized to 4 treatment groups: A received Tears Again®; B received Optive®; C received Opticol®; D received no treatment (control). Patients were observed in 3 visits: day 0, day 7, and day 30. Tear break-up time (TBUT) and Schirmer tests and the Ocular Surface Disease Index were performed. Data analysis was performed. There were no significant differences between the groups. From day 0 to day 30, there was a decrease in the number of eyes with abnormal TBUT (not significant) and Schirmer (significant in A, B, D; p<0.031). There was an increase in the average TBUT for all groups (significant in A, C; p<0.001) and a decrease in the average Schirmer value in groups B, C, and D (not significant) and an increase in group A (p = 0.002). There was a decrease in the average Ocular Surface Disease Index value in all groups (p<0.045). All AT were efficient at recovering the tear film, but those acting primarily on the internal and intermediate layer led to a mild decline on lachrymal production. An association of different kinds of AT acting on each layer can be the best treatment for corneal surface diseases affecting eye lubrication.
NASA Astrophysics Data System (ADS)
Fleury, Gérard; Mistrot, Pierre
2006-12-01
While driving off-road vehicles, operators are exposed to whole-body vibration acting in the fore-and-aft direction. Seat manufacturers supply products equipped with fore-and-aft suspension but only a few studies report on their performance. This work proposes a computational approach to design fore-and-aft suspensions for wheel loader seats. Field tests were conducted in a quarry to analyse the nature of vibration to which the driver was exposed. Typical input signals were recorded to be reproduced in the laboratory. Technical specifications are defined for the suspension. In order to evaluate the suspension vibration attenuation performance, a model of a sitting human body was developed and coupled to a seat model. The seat model combines the models of each suspension component. A linear two-degree-of-freedom model is used to describe the dynamic behaviour of the sitting driver. Model parameters are identified by fitting the computed apparent mass frequency response functions to the measured values. Model extensions are proposed to investigate postural effects involving variations in hands and feet positions and interaction of the driver's back with the backrest. Suspension design parameters are firstly optimized by computing the seat/man model response to sinusoidal acceleration. Four criteria including transmissibility, interaction force between the driver's back and the backrest and relative maximal displacement of the suspension are computed. A new suspension design with optimized features is proposed. Its performance is checked from calculations of the response of the seat/man model subjected to acceleration measured on the wheel loader during real work conditions. On the basis of the computed values of the SEAT factors, it is found possible to design a suspension that would increase the attenuation provided by the seat by a factor of two.
Computational Cognitive Modeling of Adaptive Choice Behavior in a Dynamic Decision Paradigm
2006-02-01
Cognitive Psychology (Fu & Gray, in press), an exploration of the limits of ACT-R’s credit assignment mechanism published in the Cognitive System Research...Macmillan & Creelman , 2004) to "determine the optimal performance in a task, given the physical properties of the environment and stimuli" (Geisler, 2004...allocation for interactive behavior. Psychological Review, in press. Gray, W. D. 0., & Myers, C. W. (2005). From models to methods to models: Tools and
Conductivity of Nanowire Arrays under Random and Ordered Orientation Configurations
Jagota, Milind; Tansu, Nelson
2015-01-01
A computational model was developed to analyze electrical conductivity of random metal nanowire networks. It was demonstrated for the first time through use of this model that a performance gain in random metal nanowire networks can be achieved by slightly restricting nanowire orientation. It was furthermore shown that heavily ordered configurations do not outperform configurations with some degree of randomness; randomness in the case of metal nanowire orientations acts to increase conductivity. PMID:25976936
Takagi, Hideki; Nakashima, Motomu; Ozaki, Takashi; Matsuuchi, Kazuo
2014-04-11
This study aims to clarify the mechanisms by which unsteady hydrodynamic forces act on the hand of a swimmer during a crawl stroke. Measurements were performed for a hand attached to a robotic arm with five degrees of freedom independently controlled by a computer. The computer was programmed so the hand and arm mimicked a human performing the stroke. We directly measured forces on the hand and pressure distributions around it at 200 Hz; flow fields underwater near the hand were obtained via 2D particle image velocimetry (PIV). The data revealed two mechanisms that generate unsteady forces during a crawl stroke. One is the unsteady lift force generated when hand movement changes direction during the stroke, leading to vortex shedding and bound vortex created around it. This bound vortex circulation results in a lift that contributes to the thrust. The other occurs when the hand moves linearly with a large angle of attack, creating a Kármán vortex street. This street alternatively sheds clockwise and counterclockwise vortices, resulting in a quasi-steady drag contributing to the thrust. We presume that professional swimmers benefit from both mechanisms. Further studies are necessary in which 3D flow fields are measured using a 3D PIV system and a human swimmer. Copyright © 2014 Elsevier Ltd. All rights reserved.
Data collection with the ACTS propagation terminal
NASA Technical Reports Server (NTRS)
Remaklus, Will
1993-01-01
Viewgraphs on data collection with the ACTS propagation terminal are included. Topics covered include: DACS system overview; DACS board; APT data collection computer; APT software downloading; data storage for APT; and ACTS propagation experiment data flow.
29 CFR 794.124 - Computations on a fiscal year basis.
Code of Federal Regulations, 2010 CFR
2010-07-01
... STANDARDS ACT Exemption From Overtime Pay Requirements Under Section 7(b)(3) of the Act Annual Gross Volume of Sales § 794.124 Computations on a fiscal year basis. Some enterprises operate on a fiscal year, consisting of an annual period different from the calendar year, for income tax or sales or other accounting...
ERIC Educational Resources Information Center
Prata, David Nadler; Baker, Ryan S. J. d.; Costa, Evandro d. B.; Rose, Carolyn P.; Cui, Yue; de Carvalho, Adriana M. J. B.
2009-01-01
This paper presents a model which can automatically detect a variety of student speech acts as students collaborate within a computer supported collaborative learning environment. In addition, an analysis is presented which gives substantial insight as to how students' learning is associated with students' speech acts, knowledge that will…
Fearing Prying U.S. Eyes, Canada's Colleges Crack Down On Computing
ERIC Educational Resources Information Center
Carnevale, Dan
2007-01-01
The USA Patriot Act is having far-reaching effects on the kinds of data that wind up on some academics' computers in Canada. Canadian colleges, responding to provincial laws passed in reaction to the Patriot Act, are preventing professors from entering the United States with students' private data on their laptops and limiting the locations of…
The Job Training Partnership Act and Computer-Assisted Instruction. Research Report 88-13.
ERIC Educational Resources Information Center
Education Turnkey Systems, Inc., Falls Church, VA.
A study sought to (1) determine the current and potential instructional application of computers in Job Training Partnership Act (JTPA) Titles II, III, and IV programs; and (2) present policy options that would increase the effective use of this technology in employment and training programs. Research methodology involved conducting an assessment…
29 CFR 779.253 - What is included in computing the total annual inflow volume.
Code of Federal Regulations, 2010 CFR
2010-07-01
... FAIR LABOR STANDARDS ACT AS APPLIED TO RETAILERS OF GOODS OR SERVICES Employment to Which the Act May... taxes and other charges which the enterprise must pay for such goods. Generally, all charges will be... computing the total annual inflow volume. The goods which the establishment purchases or receives for resale...
ERIC Educational Resources Information Center
Kosunen, Riitta
2009-01-01
This paper presents a macro speech act analysis of computer-mediated conferencing on a university course on language pedagogy. Students read scholarly articles on language learning and discussed them online, in order to make sense of them collaboratively in preparation for a reflective essay. The study explores how the course participants made use…
Use of Standardized Test Scores to Predict Success in a Computer Applications Course
ERIC Educational Resources Information Center
Harris, Robert V.; King, Stephanie B.
2016-01-01
The purpose of this study was to see if a relationship existed between American College Testing (ACT) scores (i.e., English, reading, mathematics, science reasoning, and composite) and student success in a computer applications course at a Mississippi community college. The study showed that while the ACT scores were excellent predictors of…
40 CFR 96.207 - Computation of time.
Code of Federal Regulations, 2010 CFR
2010-07-01
... BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS FOR STATE IMPLEMENTATION PLANS CAIR SO2... period scheduled, under the CAIR SO2 Trading Program, to begin on the occurrence of an act or event shall... the CAIR SO2 Trading Program, to begin before the occurrence of an act or event shall be computed so...
Gentili, Rodolphe J.; Papaxanthis, Charalambos; Ebadzadeh, Mehdi; Eskiizmirliler, Selim; Ouanezar, Sofiane; Darlot, Christian
2009-01-01
Background Several authors suggested that gravitational forces are centrally represented in the brain for planning, control and sensorimotor predictions of movements. Furthermore, some studies proposed that the cerebellum computes the inverse dynamics (internal inverse model) whereas others suggested that it computes sensorimotor predictions (internal forward model). Methodology/Principal Findings This study proposes a model of cerebellar pathways deduced from both biological and physical constraints. The model learns the dynamic inverse computation of the effect of gravitational torques from its sensorimotor predictions without calculating an explicit inverse computation. By using supervised learning, this model learns to control an anthropomorphic robot arm actuated by two antagonists McKibben artificial muscles. This was achieved by using internal parallel feedback loops containing neural networks which anticipate the sensorimotor consequences of the neural commands. The artificial neural networks architecture was similar to the large-scale connectivity of the cerebellar cortex. Movements in the sagittal plane were performed during three sessions combining different initial positions, amplitudes and directions of movements to vary the effects of the gravitational torques applied to the robotic arm. The results show that this model acquired an internal representation of the gravitational effects during vertical arm pointing movements. Conclusions/Significance This is consistent with the proposal that the cerebellar cortex contains an internal representation of gravitational torques which is encoded through a learning process. Furthermore, this model suggests that the cerebellum performs the inverse dynamics computation based on sensorimotor predictions. This highlights the importance of sensorimotor predictions of gravitational torques acting on upper limb movements performed in the gravitational field. PMID:19384420
NASA Astrophysics Data System (ADS)
Schwörer, Magnus; Lorenzen, Konstantin; Mathias, Gerald; Tavan, Paul
2015-03-01
Recently, a novel approach to hybrid quantum mechanics/molecular mechanics (QM/MM) molecular dynamics (MD) simulations has been suggested [Schwörer et al., J. Chem. Phys. 138, 244103 (2013)]. Here, the forces acting on the atoms are calculated by grid-based density functional theory (DFT) for a solute molecule and by a polarizable molecular mechanics (PMM) force field for a large solvent environment composed of several 103-105 molecules as negative gradients of a DFT/PMM hybrid Hamiltonian. The electrostatic interactions are efficiently described by a hierarchical fast multipole method (FMM). Adopting recent progress of this FMM technique [Lorenzen et al., J. Chem. Theory Comput. 10, 3244 (2014)], which particularly entails a strictly linear scaling of the computational effort with the system size, and adapting this revised FMM approach to the computation of the interactions between the DFT and PMM fragments of a simulation system, here, we show how one can further enhance the efficiency and accuracy of such DFT/PMM-MD simulations. The resulting gain of total performance, as measured for alanine dipeptide (DFT) embedded in water (PMM) by the product of the gains in efficiency and accuracy, amounts to about one order of magnitude. We also demonstrate that the jointly parallelized implementation of the DFT and PMM-MD parts of the computation enables the efficient use of high-performance computing systems. The associated software is available online.
Comparing Experiment and Computation of Hypersonic Laminar Boundary Layers with Isolated Roughness
NASA Technical Reports Server (NTRS)
Bathel, Brett F.; Iyer, Prahladh S.; Mahesh, Krishnan; Danehy, Paul M.; Inman, Jennifer A.; Jones, Stephen B.; Johansen, Craig T.
2014-01-01
Streamwise velocity profile behavior in a hypersonic laminar boundary layer in the presence of an isolated roughness element is presented for an edge Mach number of 8.2. Two different roughness element types are considered: a 2-mm tall, 4-mm diameter cylinder, and a 2-mm radius hemisphere. Measurements of the streamwise velocity behavior using nitric oxide (NO) planar laser-induced fluorescence (PLIF) molecular tagging velocimetry (MTV) have been performed on a 20-degree wedge model. The top surface of this model acts as a flat-plate and is oriented at 5 degrees with respect to the freestream flow. Computations using direct numerical simulation (DNS) of these flows have been performed and are compared to the measured velocity profiles. Particular attention is given to the characteristics of velocity profiles immediately upstream and downstream of the roughness elements. In these regions, the streamwise flow can experience strong deceleration or acceleration. An analysis in which experimentally measured MTV profile displacements are compared with DNS particle displacements is performed to determine if the assumption of constant velocity over the duration of the MTV measurement is valid. This assumption is typically made when reporting MTV-measured velocity profiles, and may result in significant errors when comparing MTV measurements to computations in regions with strong deceleration or acceleration. The DNS computations with the cylindrical roughness element presented in this paper were performed with and without air injection from a rectangular slot upstream of the cylinder. This was done to determine the extent to which gas seeding in the MTV measurements perturbs the boundary layer flowfield.
7 CFR 272.12 - Computer matching requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 4 2014-01-01 2014-01-01 false Computer matching requirements. 272.12 Section 272.12... Computer matching requirements. (a) General purpose. The Computer Matching and Privacy Protection Act (CMA) of 1988, as amended, addresses the use of information from computer matching programs that involve a...
7 CFR 272.12 - Computer matching requirements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 4 2013-01-01 2013-01-01 false Computer matching requirements. 272.12 Section 272.12... Computer matching requirements. (a) General purpose. The Computer Matching and Privacy Protection Act (CMA) of 1988, as amended, addresses the use of information from computer matching programs that involve a...
Serial network simplifies the design of multiple microcomputer systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Folkes, D.
1981-01-01
Recently there has been a lot of interest in developing network communication schemes for carrying digital data between locally distributed computing stations. Many of these schemes have focused on distributed networking techniques for data processing applications. These applications suggest the use of a serial, multipoint bus, where a number of remote intelligent units act as slaves to a central or host computer. Each slave would be serially addressable from the host and would perform required operations upon being addressed by the host. Based on an MK3873 single-chip microcomputer, the SCU 20 is designed to be such a remote slave device.more » The capabilities of the SCU 20 and its use in systems applications are examined.« less
Adaptive quantum computation in changing environments using projective simulation
NASA Astrophysics Data System (ADS)
Tiersch, M.; Ganahl, E. J.; Briegel, H. J.
2015-08-01
Quantum information processing devices need to be robust and stable against external noise and internal imperfections to ensure correct operation. In a setting of measurement-based quantum computation, we explore how an intelligent agent endowed with a projective simulator can act as controller to adapt measurement directions to an external stray field of unknown magnitude in a fixed direction. We assess the agent’s learning behavior in static and time-varying fields and explore composition strategies in the projective simulator to improve the agent’s performance. We demonstrate the applicability by correcting for stray fields in a measurement-based algorithm for Grover’s search. Thereby, we lay out a path for adaptive controllers based on intelligent agents for quantum information tasks.
Adaptive quantum computation in changing environments using projective simulation
Tiersch, M.; Ganahl, E. J.; Briegel, H. J.
2015-01-01
Quantum information processing devices need to be robust and stable against external noise and internal imperfections to ensure correct operation. In a setting of measurement-based quantum computation, we explore how an intelligent agent endowed with a projective simulator can act as controller to adapt measurement directions to an external stray field of unknown magnitude in a fixed direction. We assess the agent’s learning behavior in static and time-varying fields and explore composition strategies in the projective simulator to improve the agent’s performance. We demonstrate the applicability by correcting for stray fields in a measurement-based algorithm for Grover’s search. Thereby, we lay out a path for adaptive controllers based on intelligent agents for quantum information tasks. PMID:26260263
75 FR 9887 - Advanced Scientific Computing Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-04
... DEPARTMENT OF ENERGY Advanced Scientific Computing Advisory Committee AGENCY: Department of Energy... Advanced Scientific Computing Advisory Committee (ASCAC). Federal Advisory Committee Act (Pub. L. 92-463... INFORMATION CONTACT: Melea Baker, Office of Advanced Scientific Computing Research; SC-21/Germantown Building...
76 FR 9765 - Advanced Scientific Computing Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-22
... DEPARTMENT OF ENERGY Advanced Scientific Computing Advisory Committee AGENCY: Office of Science... Advanced Scientific Computing Advisory Committee (ASCAC). The Federal Advisory Committee Act (Pub. L. 92... INFORMATION CONTACT: Melea Baker, Office of Advanced Scientific Computing Research, SC-21/Germantown Building...
77 FR 45345 - DOE/Advanced Scientific Computing Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-31
... Recompetition results for Scientific Discovery through Advanced Computing (SciDAC) applications Co-design Public... DEPARTMENT OF ENERGY DOE/Advanced Scientific Computing Advisory Committee AGENCY: Office of... the Advanced Scientific Computing Advisory Committee (ASCAC). The Federal Advisory Committee Act (Pub...
75 FR 64720 - DOE/Advanced Scientific Computing Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-20
... DEPARTMENT OF ENERGY DOE/Advanced Scientific Computing Advisory Committee AGENCY: Department of... the Advanced Scientific Computing Advisory Committee (ASCAC). Federal Advisory Committee Act (Pub. L.... FOR FURTHER INFORMATION CONTACT: Melea Baker, Office of Advanced Scientific Computing Research; SC-21...
Grafe, Victor G.; Hoch, James E.
1993-01-01
A sequencing and data fanout mechanism is provided for a dataflow processor is activated by an input token which causes a sequence of operations to occur by initiating a first instruction to act on data contained within the token and then executing a sequential thread of instructions identified by either a repeat count and an offset within the token, or by an offset within each preceding instruction.
28 CFR 75.2 - Maintenance of records.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CHILD PROTECTION RESTORATION AND PENALTIES ENHANCEMENT ACT OF 1990; PROTECT ACT; ADAM WALSH CHILD PROTECTION AND SAFETY ACT OF 2006; RECORDKEEPING AND..., periodical, film, videotape, digitally- or computer-manipulated image, digital image, picture, or other...
28 CFR 75.2 - Maintenance of records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CHILD PROTECTION RESTORATION AND PENALTIES ENHANCEMENT ACT OF 1990; PROTECT ACT; ADAM WALSH CHILD PROTECTION AND SAFETY ACT OF 2006; RECORDKEEPING AND..., periodical, film, videotape, digitally- or computer-manipulated image, digital image, picture, or other...
28 CFR 75.2 - Maintenance of records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CHILD PROTECTION RESTORATION AND PENALTIES ENHANCEMENT ACT OF 1990; PROTECT ACT; ADAM WALSH CHILD PROTECTION AND SAFETY ACT OF 2006; RECORDKEEPING AND..., periodical, film, videotape, digitally- or computer-manipulated image, digital image, picture, or other...
28 CFR 75.2 - Maintenance of records.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CHILD PROTECTION RESTORATION AND PENALTIES ENHANCEMENT ACT OF 1990; PROTECT ACT; ADAM WALSH CHILD PROTECTION AND SAFETY ACT OF 2006; RECORDKEEPING AND..., periodical, film, videotape, digitally- or computer-manipulated image, digital image, picture, or other...
28 CFR 75.2 - Maintenance of records.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CHILD PROTECTION RESTORATION AND PENALTIES ENHANCEMENT ACT OF 1990; PROTECT ACT; ADAM WALSH CHILD PROTECTION AND SAFETY ACT OF 2006; RECORDKEEPING AND..., periodical, film, videotape, digitally- or computer-manipulated image, digital image, picture, or other...
75 FR 43518 - Advanced Scientific Computing Advisory Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... DEPARTMENT OF ENERGY Advanced Scientific Computing Advisory Committee; Meeting AGENCY: Office of... Scientific Computing Advisory Committee (ASCAC). Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat. 770...: Melea Baker, Office of Advanced Scientific Computing Research; SC-21/Germantown Building; U. S...
Computing Game-Theoretic Solutions for Security in the Medium Term
This project concerns the design of algorithms for computing game- theoretic solutions . (Game theory concerns how to act in a strategically optimal...way in environments with other agents who also seek to act optimally but have different , and possibly opposite, interests .) Such algorithms have...recently found application in a number of real-world security applications, including among others airport security, scheduling Federal Air Marshals, and
ERIC Educational Resources Information Center
Rands, Sean A.
2012-01-01
Models are an important tool in science: not only do they act as a convenient device for describing a system or problem, but they also act as a conceptual tool for framing and exploring hypotheses. Models, and in particular computer simulations, are also an important education tool for training scientists, but it is difficult to teach students the…
Iterative methods for 3D implicit finite-difference migration using the complex Padé approximation
NASA Astrophysics Data System (ADS)
Costa, Carlos A. N.; Campos, Itamara S.; Costa, Jessé C.; Neto, Francisco A.; Schleicher, Jörg; Novais, Amélia
2013-08-01
Conventional implementations of 3D finite-difference (FD) migration use splitting techniques to accelerate performance and save computational cost. However, such techniques are plagued with numerical anisotropy that jeopardises the correct positioning of dipping reflectors in the directions not used for the operator splitting. We implement 3D downward continuation FD migration without splitting using a complex Padé approximation. In this way, the numerical anisotropy is eliminated at the expense of a computationally more intensive solution of a large-band linear system. We compare the performance of the iterative stabilized biconjugate gradient (BICGSTAB) and that of the multifrontal massively parallel direct solver (MUMPS). It turns out that the use of the complex Padé approximation not only stabilizes the solution, but also acts as an effective preconditioner for the BICGSTAB algorithm, reducing the number of iterations as compared to the implementation using the real Padé expansion. As a consequence, the iterative BICGSTAB method is more efficient than the direct MUMPS method when solving a single term in the Padé expansion. The results of both algorithms, here evaluated by computing the migration impulse response in the SEG/EAGE salt model, are of comparable quality.
20 CFR 226.62 - Computing average monthly compensation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Computing average monthly compensation. 226... RETIREMENT ACT COMPUTING EMPLOYEE, SPOUSE, AND DIVORCED SPOUSE ANNUITIES Years of Service and Average Monthly Compensation § 226.62 Computing average monthly compensation. The employee's average monthly compensation is...
A computer simulation experiment of supervisory control of remote manipulation. M.S. Thesis
NASA Technical Reports Server (NTRS)
Mccandlish, S. G.
1966-01-01
A computer simulation of a remote manipulation task and a rate-controlled manipulator is described. Some low-level automatic decision making ability which could be used at the operator's discretion to augment his direct continuous control was built into the manipulator. Experiments were made on the effect of transmission delay, dynamic lag, and intermittent vision on human manipulative ability. Delay does not make remote manipulation impossible. Intermittent visual feedback, and the absence of rate information in the display presented to the operator do not seem to impair the operator's performance. A small-capacity visual feedback channel may be sufficient for remote manipulation tasks, or one channel might be time-shared between several operators. In other experiments the operator called in sequence various on-site automatic control programs of the machine, and thereby acted as a supervisor. The supervisory mode of operation has some advantages when the task to be performed is difficult for a human controlling directly.
iDASH: integrating data for analysis, anonymization, and sharing
Bafna, Vineet; Boxwala, Aziz A; Chapman, Brian E; Chapman, Wendy W; Chaudhuri, Kamalika; Day, Michele E; Farcas, Claudiu; Heintzman, Nathaniel D; Jiang, Xiaoqian; Kim, Hyeoneui; Kim, Jihoon; Matheny, Michael E; Resnic, Frederic S; Vinterbo, Staal A
2011-01-01
iDASH (integrating data for analysis, anonymization, and sharing) is the newest National Center for Biomedical Computing funded by the NIH. It focuses on algorithms and tools for sharing data in a privacy-preserving manner. Foundational privacy technology research performed within iDASH is coupled with innovative engineering for collaborative tool development and data-sharing capabilities in a private Health Insurance Portability and Accountability Act (HIPAA)-certified cloud. Driving Biological Projects, which span different biological levels (from molecules to individuals to populations) and focus on various health conditions, help guide research and development within this Center. Furthermore, training and dissemination efforts connect the Center with its stakeholders and educate data owners and data consumers on how to share and use clinical and biological data. Through these various mechanisms, iDASH implements its goal of providing biomedical and behavioral researchers with access to data, software, and a high-performance computing environment, thus enabling them to generate and test new hypotheses. PMID:22081224
iDASH: integrating data for analysis, anonymization, and sharing.
Ohno-Machado, Lucila; Bafna, Vineet; Boxwala, Aziz A; Chapman, Brian E; Chapman, Wendy W; Chaudhuri, Kamalika; Day, Michele E; Farcas, Claudiu; Heintzman, Nathaniel D; Jiang, Xiaoqian; Kim, Hyeoneui; Kim, Jihoon; Matheny, Michael E; Resnic, Frederic S; Vinterbo, Staal A
2012-01-01
iDASH (integrating data for analysis, anonymization, and sharing) is the newest National Center for Biomedical Computing funded by the NIH. It focuses on algorithms and tools for sharing data in a privacy-preserving manner. Foundational privacy technology research performed within iDASH is coupled with innovative engineering for collaborative tool development and data-sharing capabilities in a private Health Insurance Portability and Accountability Act (HIPAA)-certified cloud. Driving Biological Projects, which span different biological levels (from molecules to individuals to populations) and focus on various health conditions, help guide research and development within this Center. Furthermore, training and dissemination efforts connect the Center with its stakeholders and educate data owners and data consumers on how to share and use clinical and biological data. Through these various mechanisms, iDASH implements its goal of providing biomedical and behavioral researchers with access to data, software, and a high-performance computing environment, thus enabling them to generate and test new hypotheses.
Quinzio, Lorenzo; Blazek, Michael; Hartmann, Bernd; Röhrig, Rainer; Wille, Burkhard; Junger, Axel; Hempelmann, Gunter
2005-01-01
Computers are becoming increasingly visible in operating rooms (OR) and intensive care units (ICU) for use in bedside documentation. Recently, they have been suspected as possibly acting as reservoirs for microorganisms and vehicles for the transfer of pathogens to patients, causing nosocomial infections. The purpose of this study was to examine the microbiological (bacteriological and mycological) contamination of the central unit of computers used in an OR, a surgical and a pediatric ICU of a tertiary teaching hospital. Sterile swab samples were taken from five sites in each of 13 computers stationed at the two ICUs and 12 computers at the OR. Sample sites within the chassis housing of the computer processing unit (CPU) included the CPU fan, ventilator, and metal casing. External sites were the ventilator and the bottom of the computer tower. Quantitative and qualitative microbiological analyses were performed according to commonly used methods. One hundred and ninety sites were cultured for bacteria and fungi. Analyses of swabs taken at five equivalent sites inside and outside the computer chassis did not find any significant-number of potentially pathogenic bacteria or fungi. This can probably be attributed to either the absence or the low number of pathogens detected on the surfaces. Microbial contamination in the CPU of OR and ICU computers is too low for designating them as a reservoir for microorganisms.
Computer-Based Training: Will it Replace You?
ERIC Educational Resources Information Center
Hudson, William J.
1982-01-01
Examines myths and fears about computer-based training (displaces trainers, dehumanizes learners), lists what computers cannot do (analyze needs, formulate objectives, act as subject experts), and what they can do effectively (handle knowledge transfer, provide simulation). (SK)
78 FR 1275 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-08
... Social Security Administration (Computer Matching Agreement 1071). SUMMARY: In accordance with the... of its new computer matching program with the Social Security Administration (SSA). DATES: OPM will... conditions under which SSA will disclose Social Security benefit data to OPM via direct computer link. OPM...
RSTensorFlow: GPU Enabled TensorFlow for Deep Learning on Commodity Android Devices
Alzantot, Moustafa; Wang, Yingnan; Ren, Zhengshuang; Srivastava, Mani B.
2018-01-01
Mobile devices have become an essential part of our daily lives. By virtue of both their increasing computing power and the recent progress made in AI, mobile devices evolved to act as intelligent assistants in many tasks rather than a mere way of making phone calls. However, popular and commonly used tools and frameworks for machine intelligence are still lacking the ability to make proper use of the available heterogeneous computing resources on mobile devices. In this paper, we study the benefits of utilizing the heterogeneous (CPU and GPU) computing resources available on commodity android devices while running deep learning models. We leveraged the heterogeneous computing framework RenderScript to accelerate the execution of deep learning models on commodity Android devices. Our system is implemented as an extension to the popular open-source framework TensorFlow. By integrating our acceleration framework tightly into TensorFlow, machine learning engineers can now easily make benefit of the heterogeneous computing resources on mobile devices without the need of any extra tools. We evaluate our system on different android phones models to study the trade-offs of running different neural network operations on the GPU. We also compare the performance of running different models architectures such as convolutional and recurrent neural networks on CPU only vs using heterogeneous computing resources. Our result shows that although GPUs on the phones are capable of offering substantial performance gain in matrix multiplication on mobile devices. Therefore, models that involve multiplication of large matrices can run much faster (approx. 3 times faster in our experiments) due to GPU support. PMID:29629431
RSTensorFlow: GPU Enabled TensorFlow for Deep Learning on Commodity Android Devices.
Alzantot, Moustafa; Wang, Yingnan; Ren, Zhengshuang; Srivastava, Mani B
2017-06-01
Mobile devices have become an essential part of our daily lives. By virtue of both their increasing computing power and the recent progress made in AI, mobile devices evolved to act as intelligent assistants in many tasks rather than a mere way of making phone calls. However, popular and commonly used tools and frameworks for machine intelligence are still lacking the ability to make proper use of the available heterogeneous computing resources on mobile devices. In this paper, we study the benefits of utilizing the heterogeneous (CPU and GPU) computing resources available on commodity android devices while running deep learning models. We leveraged the heterogeneous computing framework RenderScript to accelerate the execution of deep learning models on commodity Android devices. Our system is implemented as an extension to the popular open-source framework TensorFlow. By integrating our acceleration framework tightly into TensorFlow, machine learning engineers can now easily make benefit of the heterogeneous computing resources on mobile devices without the need of any extra tools. We evaluate our system on different android phones models to study the trade-offs of running different neural network operations on the GPU. We also compare the performance of running different models architectures such as convolutional and recurrent neural networks on CPU only vs using heterogeneous computing resources. Our result shows that although GPUs on the phones are capable of offering substantial performance gain in matrix multiplication on mobile devices. Therefore, models that involve multiplication of large matrices can run much faster (approx. 3 times faster in our experiments) due to GPU support.
Computational Psychometrics for the Measurement of Collaborative Problem Solving Skills
Polyak, Stephen T.; von Davier, Alina A.; Peterschmidt, Kurt
2017-01-01
This paper describes a psychometrically-based approach to the measurement of collaborative problem solving skills, by mining and classifying behavioral data both in real-time and in post-game analyses. The data were collected from a sample of middle school children who interacted with a game-like, online simulation of collaborative problem solving tasks. In this simulation, a user is required to collaborate with a virtual agent to solve a series of tasks within a first-person maze environment. The tasks were developed following the psychometric principles of Evidence Centered Design (ECD) and are aligned with the Holistic Framework developed by ACT. The analyses presented in this paper are an application of an emerging discipline called computational psychometrics which is growing out of traditional psychometrics and incorporates techniques from educational data mining, machine learning and other computer/cognitive science fields. In the real-time analysis, our aim was to start with limited knowledge of skill mastery, and then demonstrate a form of continuous Bayesian evidence tracing that updates sub-skill level probabilities as new conversation flow event evidence is presented. This is performed using Bayes' rule and conversation item conditional probability tables. The items are polytomous and each response option has been tagged with a skill at a performance level. In our post-game analysis, our goal was to discover unique gameplay profiles by performing a cluster analysis of user's sub-skill performance scores based on their patterns of selected dialog responses. PMID:29238314
Computational Psychometrics for the Measurement of Collaborative Problem Solving Skills.
Polyak, Stephen T; von Davier, Alina A; Peterschmidt, Kurt
2017-01-01
This paper describes a psychometrically-based approach to the measurement of collaborative problem solving skills, by mining and classifying behavioral data both in real-time and in post-game analyses. The data were collected from a sample of middle school children who interacted with a game-like, online simulation of collaborative problem solving tasks. In this simulation, a user is required to collaborate with a virtual agent to solve a series of tasks within a first-person maze environment. The tasks were developed following the psychometric principles of Evidence Centered Design (ECD) and are aligned with the Holistic Framework developed by ACT. The analyses presented in this paper are an application of an emerging discipline called computational psychometrics which is growing out of traditional psychometrics and incorporates techniques from educational data mining, machine learning and other computer/cognitive science fields. In the real-time analysis, our aim was to start with limited knowledge of skill mastery, and then demonstrate a form of continuous Bayesian evidence tracing that updates sub-skill level probabilities as new conversation flow event evidence is presented. This is performed using Bayes' rule and conversation item conditional probability tables. The items are polytomous and each response option has been tagged with a skill at a performance level. In our post-game analysis, our goal was to discover unique gameplay profiles by performing a cluster analysis of user's sub-skill performance scores based on their patterns of selected dialog responses.
78 FR 45513 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-29
...; Computer Matching Program AGENCY: Defense Manpower Data Center (DMDC), DoD. ACTION: Notice of a Computer... individual's privacy, and would result in additional delay in determining eligibility and, if applicable, the... Defense. NOTICE OF A COMPUTER MATCHING PROGRAM AMONG THE DEFENSE MANPOWER DATA CENTER, THE DEPARTMENT OF...
76 FR 1410 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-10
...; Computer Matching Program AGENCY: Defense Manpower Data Center (DMDC), DoD. ACTION: Notice of a Computer... administrative burden, constitute a greater intrusion of the individual's privacy, and would result in additional... Liaison Officer, Department of Defense. Notice of a Computer Matching Program Among the Defense Manpower...
24 CFR 14.100 - Time computation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Time computation. 14.100 Section 14... IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN ADMINISTRATIVE PROCEEDINGS General Provisions § 14.100 Time computation. Time periods stated in this part shall be computed in accordance with the Department's rules with...
24 CFR 14.100 - Time computation.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Time computation. 14.100 Section 14... IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN ADMINISTRATIVE PROCEEDINGS General Provisions § 14.100 Time computation. Time periods stated in this part shall be computed in accordance with the Department's rules with...
24 CFR 14.100 - Time computation.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Time computation. 14.100 Section 14... IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN ADMINISTRATIVE PROCEEDINGS General Provisions § 14.100 Time computation. Time periods stated in this part shall be computed in accordance with the Department's rules with...
24 CFR 14.100 - Time computation.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Time computation. 14.100 Section 14... IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN ADMINISTRATIVE PROCEEDINGS General Provisions § 14.100 Time computation. Time periods stated in this part shall be computed in accordance with the Department's rules with...
24 CFR 14.100 - Time computation.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Time computation. 14.100 Section 14... IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN ADMINISTRATIVE PROCEEDINGS General Provisions § 14.100 Time computation. Time periods stated in this part shall be computed in accordance with the Department's rules with...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-06
...: Computer Matching Program AGENCY: Treasury Inspector General for Tax Administration, Treasury. ACTION... Internal Revenue Service (IRS) concerning the conduct of TIGTA's computer matching program. DATES... INFORMATION: TIGTA's computer matching program assists in the detection and deterrence of fraud, waste, and...
2010-02-02
Act of 1991.................................................................... 11 Next Generation Internet Research Act of 1998...Computing Act of 1991 P.L. 102-194) and the Next Generation Internet Research Act of 1998 (P.L. 105-305). The laws call for a President’s Information...planning and coordination. The second, the Next Generation Internet Research Act of 1998, P.L. 105-305,21 amended the original law to expand the mission of
Shaping up nucleic acid computation.
Chen, Xi; Ellington, Andrew D
2010-08-01
Nucleic acid-based nanotechnology has always been perceived as novel, but has begun to move from theoretical demonstrations to practical applications. In particular, the large address spaces available to nucleic acids can be exploited to encode algorithms and/or act as circuits and thereby process molecular information. In this review we not only revisit several milestones in the field of nucleic acid-based computation, but also highlight how the prospects for nucleic acid computation go beyond just a large address space. Functional nucleic acid elements (aptamers, ribozymes, and deoxyribozymes) can serve as inputs and outputs to the environment, and can act as logical elements. Into the future, the chemical dynamics of nucleic acids may prove as useful as hybridization for computation. Copyright © 2010 Elsevier Ltd. All rights reserved.
Mathematical Theory of Generalized Duality Quantum Computers Acting on Vector-States
NASA Astrophysics Data System (ADS)
Cao, Huai-Xin; Long, Gui-Lu; Guo, Zhi-Hua; Chen, Zheng-Li
2013-06-01
Following the idea of duality quantum computation, a generalized duality quantum computer (GDQC) acting on vector-states is defined as a tuple consisting of a generalized quantum wave divider (GQWD) and a finite number of unitary operators as well as a generalized quantum wave combiner (GQWC). It is proved that the GQWD and GQWC of a GDQC are an isometry and a co-isometry, respectively, and mutually dual. It is also proved that every GDQC gives a contraction, called a generalized duality quantum gate (GDQG). A classification of GDQCs is given and the properties of GDQGs are discussed. Some applications are obtained, including two orthogonal duality quantum computer algorithms for unsorted database search and an understanding of the Mach-Zehnder interferometer.
29 CFR 5.32 - Overtime payments.
Code of Federal Regulations, 2011 CFR
2011-07-01
... THE CONTRACT WORK HOURS AND SAFETY STANDARDS ACT) Interpretation of the Fringe Benefits Provisions of... Contract Work Hours and Safety Standards Act, and the Walsh-Healey Public Contracts Act whenever the... computed on a regular or basic rate of $3.00 an hour. However, in some cases a question of fact may be...
29 CFR 5.32 - Overtime payments.
Code of Federal Regulations, 2010 CFR
2010-07-01
... THE CONTRACT WORK HOURS AND SAFETY STANDARDS ACT) Interpretation of the Fringe Benefits Provisions of... Contract Work Hours and Safety Standards Act, and the Walsh-Healey Public Contracts Act whenever the... computed on a regular or basic rate of $3.00 an hour. However, in some cases a question of fact may be...
76 FR 44332 - Privacy Act of 1974; Notice of Updated Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-25
... are safeguarded in accordance with the requirements of the Privacy Act, the Computer Security Act, and... Security Numbers, birth dates and credit card numbers or other banking information, and (2) contract... bidders and buyers, including, but not limited to, names, phone numbers, addresses, Social Security...
Multisensor surveillance data augmentation and prediction with optical multipath signal processing
NASA Astrophysics Data System (ADS)
Bush, G. T., III
1980-12-01
The spatial characteristics of an oil spill on the high seas are examined in the interest of determining whether linear-shift-invariant data processing implemented on an optical computer would be a useful tool in analyzing spill behavior. Simulations were performed on a digital computer using data obtained from a 25,000 gallon spill of soy bean oil in the open ocean. Marked changes occurred in the observed spatial frequencies when the oil spill was encountered. An optical detector may readily be developed to sound an alarm automatically when this happens. The average extent of oil spread between sequential observations was quantified by a simulation of non-holographic optical computation. Because a zero crossover was available in this computation, it may be possible to construct a system to measure automatically the amount of spread. Oil images were subjected to deconvolutional filtering to reveal the force field which acted upon the oil to cause spreading. Some features of spill-size prediction were observed. Calculations based on two sequential photos produced an image which exhibited characteristics of the third photo in that sequence.
Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.
Caruso, Ronald D
2003-01-01
Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003
Samsi, Siddharth; Krishnamurthy, Ashok K.; Gurcan, Metin N.
2012-01-01
Follicular Lymphoma (FL) is one of the most common non-Hodgkin Lymphoma in the United States. Diagnosis and grading of FL is based on the review of histopathological tissue sections under a microscope and is influenced by human factors such as fatigue and reader bias. Computer-aided image analysis tools can help improve the accuracy of diagnosis and grading and act as another tool at the pathologist’s disposal. Our group has been developing algorithms for identifying follicles in immunohistochemical images. These algorithms have been tested and validated on small images extracted from whole slide images. However, the use of these algorithms for analyzing the entire whole slide image requires significant changes to the processing methodology since the images are relatively large (on the order of 100k × 100k pixels). In this paper we discuss the challenges involved in analyzing whole slide images and propose potential computational methodologies for addressing these challenges. We discuss the use of parallel computing tools on commodity clusters and compare performance of the serial and parallel implementations of our approach. PMID:22962572
Evaluating Isolation Behaviors by Nurses Using Mobile Computer Workstations at the Bedside.
Beam, Elizabeth L; Gibbs, Shawn G; Hewlett, Angela L; Iwen, Peter C; Nuss, Suzanne L; Smith, Philip W
2016-09-01
This secondary analysis from a larger mixed methods study with a sequential explanatory design investigates the clinical challenges for nurses providing patient care, in an airborne and contact isolation room, while using a computer on wheels for medication administration in a simulated setting. Registered nurses, who regularly work in clinical care at the patient bedside, were recruited as study participants in the simulation and debriefing experience. A live volunteer acted as the standardized patient who needed assessment and intravenous pain medication. The simulation was video recorded in a typical hospital room to observe participating nurses conducting patient care in an airborne and contact isolation situation. Participants then reviewed their performance with study personnel in a formal, audio-recorded debriefing. Isolation behaviors were scored by an expert panel, and the debriefing sessions were analyzed. Considerable variation was found in behaviors related to using a computer on wheels while caring for a patient in isolation. Currently, no nursing care guidelines exist on the use of computers on wheels in an airborne and contact isolation room. Specific education is needed on nursing care processes for the proper disinfection of computers on wheels and the reduction of the potential for disease transmission from environmental contamination.
76 FR 49753 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-11
... Defense. DHA 14 System name: Computer/Electronics Accommodations Program for People with Disabilities... with ``Computer/Electronic Accommodations Program.'' System location: Delete entry and replace with ``Computer/Electronic Accommodations Program, Skyline 5, Suite 302, 5111 Leesburg Pike, Falls Church, VA...
Dissociating 'what' and 'how' in visual form agnosia: a computational investigation.
Vecera, S P
2002-01-01
Patients with visual form agnosia exhibit a profound impairment in shape perception (what an object is) coupled with intact visuomotor functions (how to act on an object), demonstrating a dissociation between visual perception and action. How can these patients act on objects that they cannot perceive? Although two explanations of this 'what-how' dissociation have been offered, each explanation has shortcomings. A 'pathway information' account of the 'what-how' dissociation is presented in this paper. This account hypothesizes that 'where' and 'how' tasks require less information than 'what' tasks, thereby allowing 'where/how' to remain relatively spared in the face of neurological damage. Simulations with a neural network model test the predictions of the pathway information account. Following damage to an input layer common to the 'what' and 'where/how' pathways, the model performs object identification more poorly than spatial localization. Thus, the model offers a parsimonious explanation of differential 'what-how' performance in visual form agnosia. The simulation results are discussed in terms of their implications for visual form agnosia and other neuropsychological syndromes.
Dynamic analysis of Apollo-Salyut/Soyuz docking
NASA Technical Reports Server (NTRS)
Schliesing, J. A.
1972-01-01
The use of a docking-system computer program in analyzing the dynamic environment produced by two impacting spacecraft and the attitude control systems is discussed. Performance studies were conducted to determine the mechanism load and capture sensitivity to parametric changes in the initial impact conditions. As indicated by the studies, capture latching is most sensitive to vehicle angular-alinement errors and is least sensitive to lateral-miss error. As proved by load-sensitivity studies, peak loads acting on the Apollo spacecraft are considerably lower than the Apollo design-limit loads.
Effect of spiral outlet hydraulic passage geometrics on the radial thrust
NASA Astrophysics Data System (ADS)
Lugova, S. O.; Ignateva, P. I.
2017-08-01
The article presents the results of investigation of the effect of geometrics of a double-volute outlet hydraulic passage on the magnitude and direction of acting of the radial reaction forces in a between-bearings single-stage centrifugal pump with a double entry impeller. The investigation has been performed with the use of a computing experiment. Characteristic curves as well as values and directions of the radial thrust have been compared for three variants of outlet hydraulic passages differing in the width at their entrance.
NASA Astrophysics Data System (ADS)
Gorbunova, I.; Khabibullin, R.; Chernyakin, S.; Starinova, O.
2016-04-01
This paper discusses the research of functioning of different construction types for the spacecraft with a solar sail. Two types of the solar sail are considered, such as frame-type and rotary-type. The research is performed by means of application of the computer-assisted design system. The movement simulation of the spacecraft center mass and the forces acting on the solar sail is described. The finite element models of the two solar sail constructions are developed and compared.
NASA Astrophysics Data System (ADS)
Campagne-Ibarcq, P.; Zalys-Geller, E.; Narla, A.; Shankar, S.; Reinhold, P.; Burkhart, L.; Axline, C.; Pfaff, W.; Frunzio, L.; Schoelkopf, R. J.; Devoret, M. H.
2018-05-01
Large-scale quantum information processing networks will most probably require the entanglement of distant systems that do not interact directly. This can be done by performing entangling gates between standing information carriers, used as memories or local computational resources, and flying ones, acting as quantum buses. We report the deterministic entanglement of two remote transmon qubits by Raman stimulated emission and absorption of a traveling photon wave packet. We achieve a Bell state fidelity of 73%, well explained by losses in the transmission line and decoherence of each qubit.
Campagne-Ibarcq, P; Zalys-Geller, E; Narla, A; Shankar, S; Reinhold, P; Burkhart, L; Axline, C; Pfaff, W; Frunzio, L; Schoelkopf, R J; Devoret, M H
2018-05-18
Large-scale quantum information processing networks will most probably require the entanglement of distant systems that do not interact directly. This can be done by performing entangling gates between standing information carriers, used as memories or local computational resources, and flying ones, acting as quantum buses. We report the deterministic entanglement of two remote transmon qubits by Raman stimulated emission and absorption of a traveling photon wave packet. We achieve a Bell state fidelity of 73%, well explained by losses in the transmission line and decoherence of each qubit.
20 CFR 340.7 - Deduction in computation of death benefit.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Deduction in computation of death benefit... UNEMPLOYMENT INSURANCE ACT RECOVERY OF BENEFITS § 340.7 Deduction in computation of death benefit. In computing... as benefits accrued to the individual but not paid at death. [57 FR 1379, Jan. 14, 1992] ...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-02
...: Paper records are stored in file folders, binders, computer files (eLaw) and computer disks. Electronic records, including computer files, are stored on the Commission's network and other electronic media as... physical security measures. Technical security measures within CFTC include restrictions on computer access...
26 CFR 1.9001-4 - Adjustments required in computing excess-profits credit.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 13 2010-04-01 2010-04-01 false Adjustments required in computing excess... Adjustments required in computing excess-profits credit. (a) In general. Subsection (f) of the Act provides adjustments required to be made in computing the excess-profits credit for any taxable year under the Excess...
29 CFR 102.111 - Time computation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 2 2010-07-01 2010-07-01 false Time computation. 102.111 Section 102.111 Labor Regulations... Papers § 102.111 Time computation. (a) In computing any period of time prescribed or allowed by these rules, the day of the act, event, or default after which the designated period of time begins to run is...
29 CFR 102.111 - Time computation.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 29 Labor 2 2014-07-01 2014-07-01 false Time computation. 102.111 Section 102.111 Labor Regulations... Papers § 102.111 Time computation. (a) In computing any period of time prescribed or allowed by these rules, the day of the act, event, or default after which the designated period of time begins to run is...
12 CFR 1209.17 - Time computations.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 10 2014-01-01 2014-01-01 false Time computations. 1209.17 Section 1209.17... PROCEDURE Rules of Practice and Procedure § 1209.17 Time computations. (a) General rule. In computing any period of time prescribed or allowed under this part, the date of the act or event that commences the...
29 CFR 102.111 - Time computation.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 2 2012-07-01 2012-07-01 false Time computation. 102.111 Section 102.111 Labor Regulations... Papers § 102.111 Time computation. (a) In computing any period of time prescribed or allowed by these rules, the day of the act, event, or default after which the designated period of time begins to run is...
29 CFR 102.111 - Time computation.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 29 Labor 2 2013-07-01 2013-07-01 false Time computation. 102.111 Section 102.111 Labor Regulations... Papers § 102.111 Time computation. (a) In computing any period of time prescribed or allowed by these rules, the day of the act, event, or default after which the designated period of time begins to run is...
12 CFR 1209.17 - Time computations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Time computations. 1209.17 Section 1209.17... PROCEDURE Rules of Practice and Procedure § 1209.17 Time computations. (a) General rule. In computing any period of time prescribed or allowed under this part, the date of the act or event that commences the...
10 CFR 76.74 - Computation and extension of time.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Computation and extension of time. 76.74 Section 76.74 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Certification § 76.74 Computation and extension of time. (a) In computing any period of time, the day of the act...
10 CFR 76.74 - Computation and extension of time.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Computation and extension of time. 76.74 Section 76.74 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Certification § 76.74 Computation and extension of time. (a) In computing any period of time, the day of the act...
10 CFR 76.74 - Computation and extension of time.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Computation and extension of time. 76.74 Section 76.74 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Certification § 76.74 Computation and extension of time. (a) In computing any period of time, the day of the act...
10 CFR 76.74 - Computation and extension of time.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Computation and extension of time. 76.74 Section 76.74 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Certification § 76.74 Computation and extension of time. (a) In computing any period of time, the day of the act...
10 CFR 76.74 - Computation and extension of time.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Computation and extension of time. 76.74 Section 76.74 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Certification § 76.74 Computation and extension of time. (a) In computing any period of time, the day of the act...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-07
...; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD))--Match Number 1038 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... containing SSNs extracted from the Supplemental Security Record database. Exchanges for this computer...
75 FR 8311 - Privacy Act of 1974; Notice of a Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-24
...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, DoD. ACTION: Notice of a... hereby giving notice to the record subjects of a computer matching program between the Department of... conduct a computer matching program between the agencies. The purpose of this agreement is to verify an...
12 CFR 1209.17 - Time computations.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 9 2012-01-01 2012-01-01 false Time computations. 1209.17 Section 1209.17... PROCEDURE Rules of Practice and Procedure § 1209.17 Time computations. (a) General rule. In computing any period of time prescribed or allowed under this part, the date of the act or event that commences the...
20 CFR 340.7 - Deduction in computation of death benefit.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 1 2012-04-01 2012-04-01 false Deduction in computation of death benefit... UNEMPLOYMENT INSURANCE ACT RECOVERY OF BENEFITS § 340.7 Deduction in computation of death benefit. In computing... as benefits accrued to the individual but not paid at death. [57 FR 1379, Jan. 14, 1992] ...
20 CFR 340.7 - Deduction in computation of death benefit.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 1 2013-04-01 2012-04-01 true Deduction in computation of death benefit. 340... UNEMPLOYMENT INSURANCE ACT RECOVERY OF BENEFITS § 340.7 Deduction in computation of death benefit. In computing... as benefits accrued to the individual but not paid at death. [57 FR 1379, Jan. 14, 1992] ...
20 CFR 340.7 - Deduction in computation of death benefit.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 1 2011-04-01 2011-04-01 false Deduction in computation of death benefit... UNEMPLOYMENT INSURANCE ACT RECOVERY OF BENEFITS § 340.7 Deduction in computation of death benefit. In computing... as benefits accrued to the individual but not paid at death. [57 FR 1379, Jan. 14, 1992] ...
20 CFR 340.7 - Deduction in computation of death benefit.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 1 2014-04-01 2012-04-01 true Deduction in computation of death benefit. 340... UNEMPLOYMENT INSURANCE ACT RECOVERY OF BENEFITS § 340.7 Deduction in computation of death benefit. In computing... as benefits accrued to the individual but not paid at death. [57 FR 1379, Jan. 14, 1992] ...
10 CFR 727.4 - Is there any expectation of privacy applicable to a DOE computer?
Code of Federal Regulations, 2012 CFR
2012-01-01
... Communications Privacy Act of 1986), no user of a DOE computer shall have any expectation of privacy in the use... computer? 727.4 Section 727.4 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.4 Is there any expectation of privacy applicable to a DOE computer...
10 CFR 727.4 - Is there any expectation of privacy applicable to a DOE computer?
Code of Federal Regulations, 2014 CFR
2014-01-01
... Communications Privacy Act of 1986), no user of a DOE computer shall have any expectation of privacy in the use... computer? 727.4 Section 727.4 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.4 Is there any expectation of privacy applicable to a DOE computer...
10 CFR 727.4 - Is there any expectation of privacy applicable to a DOE computer?
Code of Federal Regulations, 2013 CFR
2013-01-01
... Communications Privacy Act of 1986), no user of a DOE computer shall have any expectation of privacy in the use... computer? 727.4 Section 727.4 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.4 Is there any expectation of privacy applicable to a DOE computer...
10 CFR 727.4 - Is there any expectation of privacy applicable to a DOE computer?
Code of Federal Regulations, 2010 CFR
2010-01-01
... Communications Privacy Act of 1986), no user of a DOE computer shall have any expectation of privacy in the use... computer? 727.4 Section 727.4 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.4 Is there any expectation of privacy applicable to a DOE computer...
10 CFR 727.4 - Is there any expectation of privacy applicable to a DOE computer?
Code of Federal Regulations, 2011 CFR
2011-01-01
... Communications Privacy Act of 1986), no user of a DOE computer shall have any expectation of privacy in the use... computer? 727.4 Section 727.4 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.4 Is there any expectation of privacy applicable to a DOE computer...
20 CFR 704.103 - Removal of certain minimums when computing or paying compensation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Removal of certain minimums when computing or... PROVISIONS FOR LHWCA EXTENSIONS Defense Base Act § 704.103 Removal of certain minimums when computing or... benefits are to be computed under section 9 of the LHWCA, 33 U.S.C. 909, shall not apply in computing...
ERIC Educational Resources Information Center
Hausman, Carl R.
1985-01-01
To be creative, an act must have as its outcome something new in the way it is intelligible and valuable. Computers have restricted contexts of information and have no ability to weigh bits of information. Computer optimists presuppose either determinism or indeterminism, either of which abandons creativity. (MT)
Code of Federal Regulations, 2014 CFR
2014-07-01
... Secretary, has waived certain requirements of the Computer Matching and Privacy Protection Act of 1988, 5 U... process known as centralized salary offset computer matching, identify Federal employees who owe delinquent nontax debt to the United States. Centralized salary offset computer matching is the computerized...
Cloud Infrastructures for In Silico Drug Discovery: Economic and Practical Aspects
Clematis, Andrea; Quarati, Alfonso; Cesini, Daniele; Milanesi, Luciano; Merelli, Ivan
2013-01-01
Cloud computing opens new perspectives for small-medium biotechnology laboratories that need to perform bioinformatics analysis in a flexible and effective way. This seems particularly true for hybrid clouds that couple the scalability offered by general-purpose public clouds with the greater control and ad hoc customizations supplied by the private ones. A hybrid cloud broker, acting as an intermediary between users and public providers, can support customers in the selection of the most suitable offers, optionally adding the provisioning of dedicated services with higher levels of quality. This paper analyses some economic and practical aspects of exploiting cloud computing in a real research scenario for the in silico drug discovery in terms of requirements, costs, and computational load based on the number of expected users. In particular, our work is aimed at supporting both the researchers and the cloud broker delivering an IaaS cloud infrastructure for biotechnology laboratories exposing different levels of nonfunctional requirements. PMID:24106693
Image processing for navigation on a mobile embedded platform
NASA Astrophysics Data System (ADS)
Preuss, Thomas; Gentsch, Lars; Rambow, Mark
2006-02-01
Mobile computing devices such as PDAs or cellular phones may act as "Personal Multimedia Exchanges", but they are limited in their processing power as well as in their connectivity. Sensors as well as cellular phones and PDAs are able to gather multimedia data, e. g. images, but leak computing power to process that data on their own. Therefore, it is necessary, that these devices connect to devices with more performance, which provide e.g. image processing services. In this paper, a generic approach is presented that connects different kinds of clients with each other and allows them to interact with more powerful devices. This architecture, called BOSPORUS, represents a communication framework for dynamic peer-to-peer computing. Each peer offers and uses services in this network and communicates loosely coupled and asynchronously with the others. These features make BOSPORUS a service oriented network architecture (SONA). A mobile embedded system, which uses external services for image processing based on the BOSPORUS Framework is shown as an application of the BOSPORUS framework.
NASA Astrophysics Data System (ADS)
Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-01
Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.
Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-01
Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. PMID:26823196
Development of computer-based analytical tool for assessing physical protection system
NASA Astrophysics Data System (ADS)
Mardhi, Alim; Pengvanich, Phongphaeth
2016-01-01
Assessment of physical protection system effectiveness is the priority for ensuring the optimum protection caused by unlawful acts against a nuclear facility, such as unauthorized removal of nuclear materials and sabotage of the facility itself. Since an assessment based on real exercise scenarios is costly and time-consuming, the computer-based analytical tool can offer the solution for approaching the likelihood threat scenario. There are several currently available tools that can be used instantly such as EASI and SAPE, however for our research purpose it is more suitable to have the tool that can be customized and enhanced further. In this work, we have developed a computer-based analytical tool by utilizing the network methodological approach for modelling the adversary paths. The inputs are multi-elements in security used for evaluate the effectiveness of the system's detection, delay, and response. The tool has capability to analyze the most critical path and quantify the probability of effectiveness of the system as performance measure.
Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-29
Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.
[Problem of bioterrorism under modern conditions].
Vorob'ev, A A; Boev, B V; Bondarenko, V M; Gintsburg, A L
2002-01-01
It is practically impossible to discuss the problem of bioterrorism (BT) and to develop effective programs of decreasing the losses and expenses suffered by the society from the BT acts without evaluation of the threat and prognosis of consequences based on research and empiric data. Stained international situation following the act of terrorism (attack on the USA) on September 11, 2001, makes the scenarios of the bacterial weapon use (the causative agents of plague, smallpox, anthrax, etc.) by international terrorists most probable. In this connection studies on the analysis and prognostication of the consequences of BT, including mathematical and computer modelling, are necessary. The authors present the results of initiative studies on the analysis and prognostication of the consequences of the hypothetical act of BT with the use of the smallpox causative agent in a city with the population of about 1,000,000 inhabitants. The analytical prognostic studies on the operative analysis and prognostication of the consequences of the BT act with the use of the smallpox causative agent has demonstrated that the mathematical (computer) model of the epidemic outbreak of smallpox is an effective instrument of calculation studies. Prognostic evaluations of the consequences of the act of BT under the conditions of different reaction of public health services (time of detection, interventions) have been obtained with the use of modelling. In addition, the computer model is necessary for training health specialists to react adequately to the acts of BT with the use of different kinds of bacteriological weapons.
STEM Education Act of 2015 (Public Law 114-59)
ERIC Educational Resources Information Center
US Congress, 2015
2015-01-01
The STEM Education Act of 2015 (Public Law 114-59) was put in place to define Science Technology Engineering and Mathematics (STEM) education to include computer science, and to support existing STEM education programs at the National Science Foundation. The act is organized into the following sections: (1) Short Title; (2) Definition of STEM…
Design of a Production System for Cognitive Modeling #1. Technical Report 77-2.
ERIC Educational Resources Information Center
Anderson, John R.; Kline, Paul J.
This report describes several of the design decisions underlying ACT, a production system model of human cognition. ACT can be considered a high level computer programming language as well as a theory of the cognitive mechanisms underlying human information processing. ACT design decisions were based on both psychological and artificial…
NASA Technical Reports Server (NTRS)
Reinhart, Richard C.
1992-01-01
The Experiment Control and Monitor (EC&M) software was developed at NASA Lewis Research Center to support the Advanced Communications Technology Satellite (ACTS) High Burst Rate Link Evaluation Terminal (HBR-LET). The HBR-LET is an experimenter's terminal to communicate with the ACTS for various investigations by government agencies, universities, and industry. The EC&M software is one segment of the Control and Performance Monitoring (C&PM) software system of the HBR-LET. The EC&M software allows users to initialize, control, and monitor the instrumentation within the HBR-LET using a predefined sequence of commands. Besides instrument control, the C&PM software system is also responsible for computer communication between the HBR-LET and the ACTS NASA Ground Station and for uplink power control of the HBR-LET to demonstrate power augmentation during rain fade events. The EC&M Software User's Guide, Version 1.0 (NASA-CR-189160) outlines the commands required to install and operate the EC&M software. Input and output file descriptions, operator commands, and error recovery procedures are discussed in the document.
76 FR 43278 - Privacy Act; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-20
... computer (PC). The Security Management Officer's office remains locked when not in use. RETENTION AND... records to include names, addresses, social security numbers, service computation dates, leave usage data... that resides on a desktop computer. RETRIEVABILITY: Records maintained in file folders are indexed and...
78 FR 15730 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... 1974; Computer Matching Program AGENCY: U.S. Citizenship and Immigration Services, Department of... Matching Program between the Department of Homeland Security, U.S. Citizenship and Immigration Services and... computer matching program between the Department of Homeland Security, U.S. Citizenship and Immigration...
Code of Federal Regulations, 2010 CFR
2010-07-01
... requirements of the Computer Matching and Privacy Protection Act of 1988, 5 U.S.C. 552a, as amended, for... known as centralized salary offset computer matching, identify Federal employees who owe delinquent nontax debt to the United States. Centralized salary offset computer matching is the computerized...
Code of Federal Regulations, 2011 CFR
2011-07-01
... requirements of the Computer Matching and Privacy Protection Act of 1988, 5 U.S.C. 552a, as amended, for... known as centralized salary offset computer matching, identify Federal employees who owe delinquent nontax debt to the United States. Centralized salary offset computer matching is the computerized...
Code of Federal Regulations, 2012 CFR
2012-07-01
... requirements of the Computer Matching and Privacy Protection Act of 1988, 5 U.S.C. 552a, as amended, for... known as centralized salary offset computer matching, identify Federal employees who owe delinquent nontax debt to the United States. Centralized salary offset computer matching is the computerized...
Code of Federal Regulations, 2013 CFR
2013-07-01
... requirements of the Computer Matching and Privacy Protection Act of 1988, 5 U.S.C. 552a, as amended, for... known as centralized salary offset computer matching, identify Federal employees who owe delinquent nontax debt to the United States. Centralized salary offset computer matching is the computerized...
Code of Federal Regulations, 2011 CFR
2011-07-01
... International Investment and Trade in Services Survey Act ((formerly the International Investment Survey Act of... computing and analyzing the United States balance of payments. ... and Finance: Treasury Regulations Relating to Money and Finance MONETARY OFFICES, DEPARTMENT OF THE...
Yañez, Fernando; Chianella, Iva; Piletsky, Sergey A; Concheiro, Angel; Alvarez-Lorenzo, Carmen
2010-02-05
This work has focused on the rational development of polymers capable of acting as traps of bile salts. Computational modeling was combined with molecular imprinting technology to obtain networks with high affinity for cholate salts in aqueous medium. The screening of a virtual library of 18 monomers, which are commonly used for imprinted networks, identified N-(3-aminopropyl)-methacrylate hydrochloride (APMA.HCl), N,N-diethylamino ethyl methacrylate (DEAEM) and ethyleneglycol methacrylate phosphate (EGMP) as suitable functional monomers with medium-to-high affinity for cholic acid. The polymers were prepared with a fix cholic acid:functional monomer mole ratio of 1:4, but with various cross-linking densities. Compared to polymers prepared without functional monomer, both imprinted and non-imprinted microparticles showed a high capability to remove sodium cholate from aqueous medium. High affinity APMA-based particles even resembled the performance of commercially available cholesterol-lowering granules. The imprinting effect was evident in most of the networks prepared, showing that computational modeling and molecular imprinting can act synergistically to improve the performance of certain polymers. Nevertheless, both the imprinted and non-imprinted networks prepared with the best monomer (APMA.HCl) identified by the modeling demonstrated such high affinity for the template that the imprinting effect was less important. The fitting of adsorption isotherms to the Freundlich model indicated that, in general, imprinting increases the population of high affinity binding sites, except when the affinity of the functional monomer for the target molecule is already very high. The cross-linking density was confirmed as a key parameter that determines the accessibility of the binding points to sodium cholate. Materials prepared with 9% mol APMA and 91% mol cross-linker showed enough affinity to achieve binding levels of up to 0.4 mmol g(-1) (i.e., 170 mg g(-1)) under flow (1 mL min(-1)) of 0.2 mM sodium cholate solution. Copyright 2009 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Anderson, John R.; Boyle, C. Franklin; Reiser, Brian J.
1985-04-01
Cognitive psychology, artificial intelligence, and computer technology have advanced to the point where it is feasible to build computer systems that are as effective as intelligent human tutors. Computer tutors based on a set of pedagogical principles derived from the ACT theory of cognition have been developed for teaching students to do proofs in geometry and to write computer programs in the language LISP.
Anderson, J R; Boyle, C F; Reiser, B J
1985-04-26
Cognitive psychology, artificial intelligence, and computer technology have advanced to the point where it is feasible to build computer systems that are as effective as intelligent human tutors. Computer tutors based on a set of pedagogical principles derived from the ACT theory of cognition have been developed for teaching students to do proofs in geometry and to write computer programs in the language LISP.
43 CFR 45.3 - How are time periods computed?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false How are time periods computed? 45.3... IN FERC HYDROPOWER LICENSES General Provisions § 45.3 How are time periods computed? (a) General. Time periods are computed as follows: (1) The day of the act or event from which the period begins to...
76 FR 14669 - Privacy Act of 1974; CMS Computer Match No. 2011-02; HHS Computer Match No. 1007
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-17
... (CMS); and Department of Defense (DoD), Manpower Data Center (DMDC), Defense Enrollment and Eligibility... the results of the computer match and provide the information to TMA for use in its matching program... under TRICARE. DEERS will receive the results of the computer match and provide the information provided...
12 CFR 908.27 - Computing time.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Computing time. 908.27 Section 908.27 Banks and... PRACTICE AND PROCEDURE IN HEARINGS ON THE RECORD General Rules § 908.27 Computing time. (a) General rule. In computing any period of time prescribed or allowed by this subpart, the date of the act or event...
29 CFR 18.4 - Time computations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 1 2012-07-01 2012-07-01 false Time computations. 18.4 Section 18.4 Labor Office of the... ADMINISTRATIVE LAW JUDGES General § 18.4 Time computations. (a) Generally. In computing any period of time under these rules or in an order issued hereunder the time begins with the day following the act, event, or...
29 CFR 18.4 - Time computations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 1 2011-07-01 2011-07-01 false Time computations. 18.4 Section 18.4 Labor Office of the... ADMINISTRATIVE LAW JUDGES General § 18.4 Time computations. (a) Generally. In computing any period of time under these rules or in an order issued hereunder the time begins with the day following the act, event, or...
12 CFR 908.27 - Computing time.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Computing time. 908.27 Section 908.27 Banks and... PRACTICE AND PROCEDURE IN HEARINGS ON THE RECORD General Rules § 908.27 Computing time. (a) General rule. In computing any period of time prescribed or allowed by this subpart, the date of the act or event...
29 CFR 18.4 - Time computations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 29 Labor 1 2013-07-01 2013-07-01 false Time computations. 18.4 Section 18.4 Labor Office of the... ADMINISTRATIVE LAW JUDGES General § 18.4 Time computations. (a) Generally. In computing any period of time under these rules or in an order issued hereunder the time begins with the day following the act, event, or...
Self-service for software development projects and HPC activities
NASA Astrophysics Data System (ADS)
Husejko, M.; Høimyr, N.; Gonzalez, A.; Koloventzos, G.; Asbury, D.; Trzcinska, A.; Agtzidis, I.; Botrel, G.; Otto, J.
2014-05-01
This contribution describes how CERN has implemented several essential tools for agile software development processes, ranging from version control (Git) to issue tracking (Jira) and documentation (Wikis). Running such services in a large organisation like CERN requires many administrative actions both by users and service providers, such as creating software projects, managing access rights, users and groups, and performing tool-specific customisation. Dealing with these requests manually would be a time-consuming task. Another area of our CERN computing services that has required dedicated manual support has been clusters for specific user communities with special needs. Our aim is to move all our services to a layered approach, with server infrastructure running on the internal cloud computing infrastructure at CERN. This contribution illustrates how we plan to optimise the management of our of services by means of an end-user facing platform acting as a portal into all the related services for software projects, inspired by popular portals for open-source developments such as Sourceforge, GitHub and others. Furthermore, the contribution will discuss recent activities with tests and evaluations of High Performance Computing (HPC) applications on different hardware and software stacks, and plans to offer a dynamically scalable HPC service at CERN, based on affordable hardware.
Temporal response improvement for computed tomography fluoroscopy
NASA Astrophysics Data System (ADS)
Hsieh, Jiang
1997-10-01
Computed tomography fluoroscopy (CTF) has attracted significant attention recently. This is mainly due to the growing clinical application of CTF in interventional procedures, such as guided biopsy. Although many studies have been conducted for its clinical efficacy, little attention has been paid to the temporal response and the inherent limitations of the CTF system. For example, during a biopsy operation, when needle is inserted at a relatively high speed, the true needle position will not be correctly depicted in the CTF image due to the time delay. This could result in an overshoot or misplacement of the biopsy needle by the operator. In this paper, we first perform a detailed analysis of the temporal response of the CTF by deriving a set of equations to describe the average location of a moving object observed by the CTF system. The accuracy of the equations is verified by computer simulations and experiments. We show that the CT reconstruction process acts as a low pass filter to the motion function. As a result, there is an inherent time delay in the CTF process to the true biopsy needle motion and locations. Based on this study, we propose a generalized underscan weighting scheme which significantly improve the performance of CTF in terms of time lag and delay.
29 CFR 1921.22 - Computation of time.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 7 2010-07-01 2010-07-01 false Computation of time. 1921.22 Section 1921.22 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR... WORKERS' COMPENSATION ACT Miscellaneous § 1921.22 Computation of time. Sundays and holidays shall be...
75 FR 32915 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-10
... used to authenticate authorized desktop and laptop computer users. Computer servers are scanned monthly... data is also used for management and statistical reports and studies. Routine uses of records... duties. The computer files are password protected with access restricted to authorized users. Records are...
Measuring, managing and maximizing performance of mineral processing plants
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bascur, O.A.; Kennedy, J.P.
1995-12-31
The implementation of continuous quality improvement is the confluence of Total Quality Management, People Empowerment, Performance Indicators and Information Engineering. The supporting information technologies allow a mineral processor to narrow the gap between management business objectives and the process control level. One of the most important contributors is the user friendliness and flexibility of the personal computer in a client/server environment. This synergistic combination when used for real time performance monitoring translates into production cost savings, improved communications and enhanced decision support. Other savings come from reduced time to collect data and perform tedious calculations, act quickly with fresh newmore » data, generate and validate data to be used by others. This paper presents an integrated view of plant management. The selection of the proper tools for continuous quality improvement are described. The process of selecting critical performance monitoring indices for improved plant performance are discussed. The importance of a well balanced technological improvement, personnel empowerment, total quality management and organizational assets are stressed.« less
NASA Astrophysics Data System (ADS)
De Rosis, Alessandro
2014-11-01
In this paper, the fluid dynamics induced by a rigid lamina undergoing harmonic oscillations in a non-Newtonian calm fluid is investigated. The fluid is modelled through the lattice Boltzmann method and the flow is assumed to be nearly incompressible. An iterative viscosity-correction based procedure is proposed to properly account for the non-Newtonian fluid feature and its accuracy is evaluated. In order to handle the mutual interaction between the lamina and the encompassing fluid, the Immersed Boundary method is adopted. A numerical campaign is performed. In particular, the effect of the non-Newtonian feature is highlighted by investigating the fluid forces acting on a harmonically oscillating lamina for different values of the Reynolds number. The findings prove that the non-Newtonian feature can drastically influence the behaviour of the fluid and, as a consequence, the forces acting upon the lamina. Several considerations are carried out on the time history of the drag coefficient and the results are used to compute the added mass through the hydrodynamic function. Moreover, the computational cost involved in the numerical simulations is discussed. Finally, two applications concerning water resources are investigated: the flow through an obstructed channel and the particle sedimentation. Present findings highlight a strong coupling between the body shape, the Reynolds number, and the flow behaviour index.
NASA Astrophysics Data System (ADS)
Vilagosh, Zoltan; Lajevardipour, Alireza; Wood, Andrew
2018-01-01
Finite-difference time-domain (FDTD) computational phantoms aid the analysis of THz radiation interaction with human skin. The presented computational phantoms have accurate anatomical layering and electromagnetic properties. A novel "large sheet" simulation technique is used allowing for a realistic representation of lateral absorption and reflection of in-vivo measurements. Simulations carried out to date have indicated that hair follicles act as THz propagation channels and confirms the possible role of melanin, both in nevi and skin pigmentation, to act as a significant absorber of THz radiation. A novel freezing technique has promise in increasing the depth of skin penetration of THz radiation to aid diagnostic imaging.
Nishijima, Daniel K.; Holmes, James F.; Dayan, Peter S.; Kuppermann, Nathan
2016-01-01
IMPORTANCE Increased use of computed tomography (CT) in children is concerning owing to the cancer risk from ionizing radiation, particularly in children younger than 2 years. A guardian report that a child is acting abnormally is a risk factor for clinically important traumatic brain injury (ciTBI) and may be a driving factor for CT use in the emergency department. OBJECTIVE To determine the prevalence of ciTBIs and TBIs in children younger than 2 years with minor blunt head trauma and a guardian report of acting abnormally with (1) no other findings or (2) other concerning findings for TBI. DESIGN, SETTING, AND PARTICIPANTS Secondary analysis of a large, prospective, multicenter cohort study that included 43 399 children younger than 18 years with minor blunt head trauma evaluated in 25 emergency departments. The study was conducted on data obtained between June 2004 and September 2006. Data analysis was performed between August 21, 2014, and March 9, 2015. EXPOSURES A guardian report that the child was acting abnormally after minor blunt head trauma. MAIN OUTCOMES AND MEASURES The prevalence of ciTBI (defined as death, neurosurgery, intubation for >24 hours, or hospitalization for ≥2 nights in association with TBI on CT imaging) and TBI on CT imaging in children with a guardian report of acting abnormally with (1) no other findings and (2) other concerning findings for TBI. RESULTS Of 43 399 children in the cohort study, a total of 1297 children had reports of acting abnormally, of whom 411 (31.7%) had this report as their only finding. Reported as percentage (95% CI), 1 of 411 (0.2% [0–1.3%]) had a ciTBI, and 4 TBIs were noted on the CT scans in 185 children who underwent imaging (2.2% [0.6%–5.4%]). In children with reports of acting abnormally and other concerning findings for TBI, 29 of 886 (3.3% [2.2%–4.7%]) had ciTBIs and 66 of 674 (9.8% [7.7%–12.3%]) had TBIs on CT. CONCLUSIONS AND RELEVANCE Clinically important TBIs are very uncommon, and TBIs noted on CT are uncommon in children younger than 2 years with minor blunt head trauma and guardian reports of the child acting abnormally with no other clinical findings suspicious for TBI. Computed tomographic scans are generally not indicated in these children although observation in the emergency department may be warranted. PMID:26502172
Extreme Scale Computing to Secure the Nation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, D L; McGraw, J R; Johnson, J R
2009-11-10
Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national securitymore » requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the absence of nuclear testing, a progam to: (1) Support a focused, multifaceted program to increase the understanding of the enduring stockpile; (2) Predict, detect, and evaluate potential problems of the aging of the stockpile; (3) Refurbish and re-manufacture weapons and components, as required; and (4) Maintain the science and engineering institutions needed to support the nation's nuclear deterrent, now and in the future'. This program continues to fulfill its national security mission by adding significant new capabilities for producing scientific results through large-scale computational simulation coupled with careful experimentation, including sub-critical nuclear experiments permitted under the CTBT. To develop the computational science and the computational horsepower needed to support its mission, SBSS initiated the Accelerated Strategic Computing Initiative, later renamed the Advanced Simulation & Computing (ASC) program (sidebar: 'History of ASC Computing Program Computing Capability'). The modern 3D computational simulation capability of the ASC program supports the assessment and certification of the current nuclear stockpile through calibration with past underground test (UGT) data. While an impressive accomplishment, continued evolution of national security mission requirements will demand computing resources at a significantly greater scale than we have today. In particular, continued observance and potential Senate confirmation of the Comprehensive Test Ban Treaty (CTBT) together with the U.S administration's promise for a significant reduction in the size of the stockpile and the inexorable aging and consequent refurbishment of the stockpile all demand increasing refinement of our computational simulation capabilities. Assessment of the present and future stockpile with increased confidence of the safety and reliability without reliance upon calibration with past or future test data is a long-term goal of the ASC program. This will be accomplished through significant increases in the scientific bases that underlie the computational tools. Computer codes must be developed that replace phenomenology with increased levels of scientific understanding together with an accompanying quantification of uncertainty. These advanced codes will place significantly higher demands on the computing infrastructure than do the current 3D ASC codes. This article discusses not only the need for a future computing capability at the exascale for the SBSS program, but also considers high performance computing requirements for broader national security questions. For example, the increasing concern over potential nuclear terrorist threats demands a capability to assess threats and potential disablement technologies as well as a rapid forensic capability for determining a nuclear weapons design from post-detonation evidence (nuclear counterterrorism).« less
Quantum Search in Hilbert Space
NASA Technical Reports Server (NTRS)
Zak, Michail
2003-01-01
A proposed quantum-computing algorithm would perform a search for an item of information in a database stored in a Hilbert-space memory structure. The algorithm is intended to make it possible to search relatively quickly through a large database under conditions in which available computing resources would otherwise be considered inadequate to perform such a task. The algorithm would apply, more specifically, to a relational database in which information would be stored in a set of N complex orthonormal vectors, each of N dimensions (where N can be exponentially large). Each vector would constitute one row of a unitary matrix, from which one would derive the Hamiltonian operator (and hence the evolutionary operator) of a quantum system. In other words, all the stored information would be mapped onto a unitary operator acting on a quantum state that would represent the item of information to be retrieved. Then one could exploit quantum parallelism: one could pose all search queries simultaneously by performing a quantum measurement on the system. In so doing, one would effectively solve the search problem in one computational step. One could exploit the direct- and inner-product decomposability of the unitary matrix to make the dimensionality of the memory space exponentially large by use of only linear resources. However, inasmuch as the necessary preprocessing (the mapping of the stored information into a Hilbert space) could be exponentially expensive, the proposed algorithm would likely be most beneficial in applications in which the resources available for preprocessing were much greater than those available for searching.
32 CFR 505.13 - Computer Matching Agreement Program.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Computer Matching Agreement Program. 505.13 Section 505.13 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.13 Computer Matching Agreement Program. (a...
15 CFR 904.4 - Computation of time periods.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE GENERAL REGULATIONS CIVIL PROCEDURES General § 904.4 Computation of time periods. For a NOVA, NOPS or NIDP, the 30 day response period... business day. This method of computing time periods also applies to any act, such as paying a civil penalty...
15 CFR 904.4 - Computation of time periods.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE GENERAL REGULATIONS CIVIL PROCEDURES General § 904.4 Computation of time periods. For a NOVA, NOPS or NIDP, the 30 day response period... business day. This method of computing time periods also applies to any act, such as paying a civil penalty...
20 CFR 410.510 - Computation of benefits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Computation of benefits. 410.510 Section 410.510 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV-BLACK LUNG BENEFITS (1969- ) Payment of Benefits § 410.510 Computation of benefits. (a) Basic...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
...), Defense Manpower Data Center (DMDC) and the Office of the Assistant Secretary of Defense (Health Affairs.../TRICARE. DMDC will receive the results of the computer match and provide the information to TMA for use in...
17 CFR 171.4 - Computation of time.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Computation of time. 171.4 Section 171.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... computing any period of time prescribed by these rules or allowed by the Commission, the day of the act...
20 CFR 229.65 - Initial reduction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... wage (see § 225.2 of this chapter) used to compute the DIB O/M under the Social Security Act rules... that exceed the maximum used in computing social security benefits) for the 5 consecutive years after... earnings that exceed the maximum used in computing social security benefits) for the year of highest...
78 FR 63196 - Privacy Act System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... Technology Center (ITC) staff and contractors, who maintain the FCC's computer network. Other FCC employees... and Offices (B/ Os); 2. Electronic data, records, and files that are stored in the FCC's computer.... Access to the FACA electronic records, files, and data, which are housed in the FCC's computer network...
A computational NMR study on zigzag aluminum nitride nanotubes
NASA Astrophysics Data System (ADS)
Bodaghi, Ali; Mirzaei, Mahmoud; Seif, Ahmad; Giahi, Masoud
2008-12-01
A computational nuclear magnetic resonance (NMR) study is performed to investigate the electronic structure properties of the single-walled zigzag aluminum nitride nanotubes (AlNNTs). The chemical-shielding (CS) tensors are calculated at the sites of Al-27 and N-15 nuclei in three structural forms of AlNNT including H-saturated, Al-terminated, and N-terminated ones. The structural forms are firstly optimized and then the calculated CS tensors in the optimized structures are converted to chemical-shielding isotropic (CSI) and chemical-shielding anisotropic (CSA) parameters. The calculated parameters reveal that various Al-27 and N-15 nuclei are divided into some layers with equivalent electrostatic properties; furthermore, Al and N can act as Lewis base and acid, respectively. In the Al-terminated and N-terminated forms of AlNNT, in which one mouth of the nanotube is terminated by aluminum and nitrogen nuclei, respectively, just the CS tensors of the nearest nuclei to the mouth of the nanotube are significantly changed due to removal of saturating hydrogen atoms. Density functional theory (DFT) calculations are performed using GAUSSIAN 98 package of program.
Sedig, Kamran; Parsons, Paul; Dittmer, Mark; Ola, Oluwakemi
2012-01-01
Public health professionals work with a variety of information sources to carry out their everyday activities. In recent years, interactive computational tools have become deeply embedded in such activities. Unlike the early days of computational tool use, the potential of tools nowadays is not limited to simply providing access to information; rather, they can act as powerful mediators of human-information discourse, enabling rich interaction with public health information. If public health informatics tools are designed and used properly, they can facilitate, enhance, and support the performance of complex cognitive activities that are essential to public health informatics, such as problem solving, forecasting, sense-making, and planning. However, the effective design and evaluation of public health informatics tools requires an understanding of the cognitive and perceptual issues pertaining to how humans work and think with information to perform such activities. This paper draws on research that has examined some of the relevant issues, including interaction design, complex cognition, and visual representations, to offer some human-centered design and evaluation considerations for public health informatics tools.
An MM and QM Study of Biomimetic Catalysis of Diels-Alder Reactions Using Cyclodextrins
Chen, Wei; Sun, Lipeng; Tang, Zhiye; Ali, Zulfikhar A.; Wong, Bryan M.; Chang, Chia-en A.
2018-01-01
We performed a computational investigation of the mechanism by which cyclodextrins (CDs) catalyze Diels-Alder reactions between 9-anthracenemethanol and N-cyclohexylmaleimide. Hydrogen bonds (Hbonds) between N-cyclohexylmaleimide and the hydroxyl groups of cyclodextrins were suggested to play an important role in this catalytic process. However, our free energy calculations and molecular dynamics simulations showed that these Hbonds are not stable, and quantum mechanical calculations suggested that the reaction is not promoted by these Hbonds. The binding of 9-anthracenemethanol and N-cyclohexylmaleimide to cyclodextrins was the key to the catalytic process. Cyclodextrins act as a container to hold the two reactants in the cavity, pre-organize them for the reactions, and thus reduce the entropy penalty to the activation free energy. Dimethyl-β-CD was a better catalyst for this specific reaction than β-CD because of its stronger van der Waals interaction with the pre-organized reactants and its better performance in reducing the activation energy. This computational work sheds light on the mechanism of the catalytic reaction by cyclodextrins and introduces new perspectives of supramolecular catalysis. PMID:29938117
Periodic component analysis as a spatial filter for SSVEP-based brain-computer interface.
Kiran Kumar, G R; Reddy, M Ramasubba
2018-06-08
Traditional Spatial filters used for steady-state visual evoked potential (SSVEP) extraction such as minimum energy combination (MEC) require the estimation of the background electroencephalogram (EEG) noise components. Even though this leads to improved performance in low signal to noise ratio (SNR) conditions, it makes such algorithms slow compared to the standard detection methods like canonical correlation analysis (CCA) due to the additional computational cost. In this paper, Periodic component analysis (πCA) is presented as an alternative spatial filtering approach to extract the SSVEP component effectively without involving extensive modelling of the noise. The πCA can separate out components corresponding to a given frequency of interest from the background electroencephalogram (EEG) by capturing the temporal information and does not generalize SSVEP based on rigid templates. Data from ten test subjects were used to evaluate the proposed method and the results demonstrate that the periodic component analysis acts as a reliable spatial filter for SSVEP extraction. Statistical tests were performed to validate the results. The experimental results show that πCA provides significant improvement in accuracy compared to standard CCA and MEC in low SNR conditions. The results demonstrate that πCA provides better detection accuracy compared to CCA and on par with that of MEC at a lower computational cost. Hence πCA is a reliable and efficient alternative detection algorithm for SSVEP based brain-computer interface (BCI). Copyright © 2018. Published by Elsevier B.V.
12 CFR 516.10 - How does OTS compute time periods under this part?
Code of Federal Regulations, 2010 CFR
2010-01-01
... APPLICATION PROCESSING PROCEDURES § 516.10 How does OTS compute time periods under this part? In computing time periods under this part, OTS does not include the day of the act or event that commences the time... 12 Banks and Banking 5 2010-01-01 2010-01-01 false How does OTS compute time periods under this...
ERIC Educational Resources Information Center
Albanese, Andrew R.; Oder, Norman; Rogers, Michael; St. Lifer, Evan; Jay, M. Ellen; Milliot, Jim
2001-01-01
Includes three articles that discuss the top stories from "Library Journal", including the demand for librarians, the Digital Millennium Copyright Act, library education, database publishers, electronic research services, the Uniform Computer Information Transactions Act (UCITA), Internet filtering, and electronic reference; the school…
29 CFR 794.125 - Grace period of 1 month for compliance.
Code of Federal Regulations, 2010 CFR
2010-07-01
... STANDARDS ACT Exemption From Overtime Pay Requirements Under Section 7(b)(3) of the Act Annual Gross Volume of Sales § 794.125 Grace period of 1 month for compliance. Where it is not practicable to compute the annual gross volume of sales under § 794.123 or § 794.124 in time to determine obligations under the Act...
20 CFR 725.311 - Communications with respect to claims; time computations.
Code of Federal Regulations, 2011 CFR
2011-04-01
... OF LABOR FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, AS AMENDED CLAIMS FOR BENEFITS UNDER PART C OF TITLE IV OF THE FEDERAL MINE SAFETY AND HEALTH ACT, AS AMENDED Filing of Claims § 725.311... adjudication officer, the day of the act or event from which the designated period of time begins to run shall...
Computational Analysis of Stresses Acting on Intermodular Junctions in Thoracic Aortic Endografts
Prasad, Anamika; To, Lillian K.; Gorrepati, Madhu L.; Zarins, Christopher K.; Figueroa, C. Alberto
2011-01-01
Purpose: To evaluate the biomechanical and hemodynamic forces acting on the intermodular junctions of a multi-component thoracic endograft and elucidate their influence on the development of type III endoleak due to disconnection of stent-graft segments. Methods: Three-dimensional computer models of the thoracic aorta and a 4-component thoracic endograft were constructed using postoperative (baseline) and follow-up computed tomography (CT) data from a 69-year-old patient who developed type III endoleak 4 years after stent-graft placement. Computational fluid dynamics (CFD) techniques were used to quantitate the displacement forces acting on the device. The contact stresses between the different modules of the graft were then quantified using computational solid mechanics (CSM) techniques. Lastly, the intermodular junction frictional stability was evaluated using a Coulomb model. Results: The CFD analysis revealed that curvature and length are key determinants of the displacement forces experienced by each endograft and that the first 2 modules were exposed to displacement forces acting in opposite directions in both the lateral and longitudinal axes. The CSM analysis revealed that the highest concentration of stresses occurred at the junction between the first and second modules of the device. Furthermore, the frictional analysis demonstrated that most of the surface area (53%) of this junction had unstable contact. The predicted critical zone of intermodular stress concentration and frictional instability matched the location of the type III endoleak observed in the 4-year follow-up CT image. Conclusion: The region of larger intermodular stresses and highest frictional instability correlated with the zone where a type III endoleak developed 4 years after thoracic stent-graft placement. Computational techniques can be helpful in evaluating the risk of endograft migration and potential for modular disconnection and may be useful in improving device placement strategies and endograft design. PMID:21861748
20 CFR 226.13 - Cost-of-living increase in employee vested dual benefit.
Code of Federal Regulations, 2010 CFR
2010-04-01
... RAILROAD RETIREMENT ACT COMPUTING EMPLOYEE, SPOUSE, AND DIVORCED SPOUSE ANNUITIES Computing an Employee... increase is based on the cost-of-living increases in social security benefits during the period from...
LabVIEW Serial Driver Software for an Electronic Load
NASA Technical Reports Server (NTRS)
Scullin, Vincent; Garcia, Christopher
2003-01-01
A LabVIEW-language computer program enables monitoring and control of a Transistor Devices, Inc., Dynaload WCL232 (or equivalent) electronic load via an RS-232 serial communication link between the electronic load and a remote personal computer. (The electronic load can operate at constant voltage, current, power consumption, or resistance.) The program generates a graphical user interface (GUI) at the computer that looks and acts like the front panel of the electronic load. Once the electronic load has been placed in remote-control mode, this program first queries the electronic load for the present values of all its operational and limit settings, and then drops into a cycle in which it reports the instantaneous voltage, current, and power values in displays that resemble those on the electronic load while monitoring the GUI images of pushbuttons for control actions by the user. By means of the pushbutton images and associated prompts, the user can perform such operations as changing limit values, the operating mode, or the set point. The benefit of this software is that it relieves the user of the need to learn one method for operating the electronic load locally and another method for operating it remotely via a personal computer.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Opalka, K.O.
1989-08-01
The construction of a large test facility has been proposed for simulating the blast and thermal environment resulting from nuclear explosions. This facility would be used to test the survivability and vulnerability of military equipment such as trucks, tanks, and helicopters in a simulated thermal and blast environment, and to perform research into nuclear blast phenomenology. The proposed advanced design concepts, heating of driver gas and fast-acting throat valves for wave shaping, are described and the results of CFD studies to advance these new technical concepts fro simulating decaying blast waves are reported.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li, Yaquin; Karnowski, Thomas Paul; Tobin Jr, Kenneth William
2011-01-01
In this article, we present the design and implementation of a regional ocular telehealth network for remote assessment and management of diabetic retinopathy (DR), including the design requirements, network topology, protocol design, system work flow, graphics user interfaces, and performance evaluation. The Telemedical Retinal Image Analysis and Diagnosis Network is a computer-aided, image analysis telehealth paradigm for the diagnosis of DR and other retinal diseases using fundus images acquired from primary care end users delivering care to underserved patient populations in the mid-South and southeastern United States.
Li, Yaqin; Karnowski, Thomas P; Tobin, Kenneth W; Giancardo, Luca; Morris, Scott; Sparrow, Sylvia E; Garg, Seema; Fox, Karen; Chaum, Edward
2011-10-01
In this article, we present the design and implementation of a regional ocular telehealth network for remote assessment and management of diabetic retinopathy (DR), including the design requirements, network topology, protocol design, system work flow, graphics user interfaces, and performance evaluation. The Telemedical Retinal Image Analysis and Diagnosis Network is a computer-aided, image analysis telehealth paradigm for the diagnosis of DR and other retinal diseases using fundus images acquired from primary care end users delivering care to underserved patient populations in the mid-South and southeastern United States.
Expected orbit determination performance for the TOPEX/Poseidon mission
NASA Technical Reports Server (NTRS)
Nerem, R. S.; Putney, Barbara H.; Marshall, J. A.; Lerch, Francis J.; Pavlis, Erricos C.; Klosko, Steven M.; Luthcke, Scott B.; Patel, Girish B.; Williamson, Ronald G.; Zelensky, Nikita P.
1993-01-01
Each of the components required for the computation of precise orbits for the TOPEX/Poseidon (T/P) spacecraft - gravity field modeling, nonconservative force modeling, and satellite tracking technologies - is examined. The research conducted in the Space Geodesy Branch at Goddard Space Flight Center in preparation for meeting the 13-cm radial orbit accuracy requirement for the T/P mission is outlined. New developments in modeling the earth's gravitational field and modeling the complex nonconservative forces acting on T/P are highlighted. The T/P error budget is reviewed, and a prelaunch assessment of the predicted orbit determination accuracies is summarized.
Agent-based computational models to explore diffusion of medical innovations among cardiologists.
Borracci, Raul A; Giorgi, Mariano A
2018-04-01
Diffusion of medical innovations among physicians rests on a set of theoretical assumptions, including learning and decision-making under uncertainty, social-normative pressures, medical expert knowledge, competitive concerns, network performance effects, professional autonomy or individualism and scientific evidence. The aim of this study was to develop and test four real data-based, agent-based computational models (ABM) to qualitatively and quantitatively explore the factors associated with diffusion and application of innovations among cardiologists. Four ABM were developed to study diffusion and application of medical innovations among cardiologists, considering physicians' network connections, leaders' opinions, "adopters' categories", physicians' autonomy, scientific evidence, patients' pressure, affordability for the end-user population, and promotion from companies. Simulations demonstrated that social imitation among local cardiologists was sufficient for innovation diffusion, as long as opinion leaders did not act as detractors of the innovation. Even in the absence of full scientific evidence to support innovation, up to one-fifth of cardiologists could accept it when local leaders acted as promoters. Patients' pressure showed a large effect size (Cohen's d > 1.2) on the proportion of cardiologists applying an innovation. Two qualitative patterns (speckled and granular) appeared associated to traditional Gompertz and sigmoid cumulative distributions. These computational models provided a semiquantitative insight on the emergent collective behavior of a physician population facing the acceptance or refusal of medical innovations. Inclusion in the models of factors related to patients' pressure and accesibility to medical coverage revealed the contrast between accepting and effectively adopting a new product or technology for population health care. Copyright © 2018 Elsevier B.V. All rights reserved.
Botvinick, Matthew M.; Buxbaum, Laurel J.; Bylsma, Lauren M.; Jax, Steven A.
2014-01-01
The act of reaching for and acting upon an object involves two forms of selection: selection of the object as a target, and selection of the action to be performed. While these two forms of selection are logically dissociable, and are evidently subserved by separable neural pathways, they must also be closely coordinated. We examine the nature of this coordination by developing and analyzing a computational model of object and action selection first proposed by Ward [Ward, R. (1999). Interactions between perception and action systems: a model for selective action. In G. W. Humphreys, J. Duncan, & A. Treisman (Eds.), Attention, Space and Action: Studies in Cognitive Neuroscience. Oxford: Oxford University Press]. An interesting tenet of this account, which we explore in detail, is that the interplay between object and action selection depends critically on top-down inputs representing the current task set or plan of action. A concrete manifestation of this, established through a series of simulations, is that the impact of distractor objects on reaching times can vary depending on the nature of the current action plan. In order to test the model's predictions in this regard, we conducted two experiments, one involving direct object manipulation, the other involving tool-use. In both experiments we observed the specific interaction between task set and distractor type predicted by the model. Our findings provide support for the computational model, and more broadly for an interactive account of object and action selection. PMID:19100758
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nicolae, Bogdan; Riteau, Pierre; Keahey, Kate
Storage elasticity on IaaS clouds is a crucial feature in the age of data-intensive computing, especially when considering fluctuations of I/O throughput. This paper provides a transparent solution that automatically boosts I/O bandwidth during peaks for underlying virtual disks, effectively avoiding over-provisioning without performance loss. The authors' proposal relies on the idea of leveraging short-lived virtual disks of better performance characteristics (and thus more expensive) to act during peaks as a caching layer for the persistent virtual disks where the application data is stored. Furthermore, they introduce a performance and cost prediction methodology that can be used both independently tomore » estimate in advance what trade-off between performance and cost is possible, as well as an optimization technique that enables better cache size selection to meet the desired performance level with minimal cost. The authors demonstrate the benefits of their proposal both for microbenchmarks and for two real-life applications using large-scale experiments.« less
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2012 CFR
2012-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2013 CFR
2013-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2010 CFR
2010-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2014 CFR
2014-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2011 CFR
2011-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
Code of Federal Regulations, 2010 CFR
2010-04-01
... financial reporting and monthly computation by futures commission merchants and introducing brokers. 1.18... UNDER THE COMMODITY EXCHANGE ACT Minimum Financial and Related Reporting Requirements § 1.18 Records for and relating to financial reporting and monthly computation by futures commission merchants and...
26 CFR 302.1-4 - Computation of taxes.
Code of Federal Regulations, 2010 CFR
2010-04-01
... ADMINISTRATION TAXES UNDER THE INTERNATIONAL CLAIMS SETTLEMENT ACT, AS AMENDED AUGUST 9, 1955 § 302.1-4 Computation of taxes. (a) Detail of employees of the Internal Revenue Service. The Commissioner will detail... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Computation of taxes. 302.1-4 Section 302.1-4...
The Role of Context-Related Parameters in Adults' Mental Computational Acts
ERIC Educational Resources Information Center
Naresh, Nirmala; Presmeg, Norma
2012-01-01
Researchers who have carried out studies pertaining to mental computation and everyday mathematics point out that adults and children reason intuitively based upon experiences within specific contexts; they use invented strategies of their own to solve real-life problems. We draw upon research areas of mental computation and everyday mathematics…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-04
... NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting In accordance with Federal Advisory Committee Act (Pub. L. 92-463, as amended... Committee for Computer and Information Science and Engineering (1115). Date/Time: Oct 31, 2013: 12:30 p.m...
77 FR 34941 - Privacy Act of 1974; Notice of a Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-12
...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, DoD. ACTION: Notice of a... computer matching program are the Department of Veterans Affairs (VA) and the Defense Manpower Data Center... identified as DMDC 01, entitled ``Defense Manpower Data Center Data Base,'' last published in the Federal...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-13
... the Defense Manpower Data Center, Department of Defense AGENCY: Postal Service TM . ACTION: Notice of Computer Matching Program--United States Postal Service and the Defense Manpower Data Center, Department of... as the recipient agency in a computer matching program with the Defense Manpower Data Center (DMDC...
12 CFR 1780.11 - Computing time.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Computing time. 1780.11 Section 1780.11 Banks... time. (a) General rule. In computing any period of time prescribed or allowed by this subpart, the date of the act or event that commences the designated period of time is not included. The last day so...
12 CFR 1780.11 - Computing time.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Computing time. 1780.11 Section 1780.11 Banks... time. (a) General rule. In computing any period of time prescribed or allowed by this subpart, the date of the act or event that commences the designated period of time is not included. The last day so...
Computer Software: Copyright and Licensing Considerations for Schools and Libraries. ERIC Digest.
ERIC Educational Resources Information Center
Reed, Mary Hutchings
This digest notes that the terms and conditions of computer software package license agreements control the use of software in schools and libraries, and examines the implications of computer software license agreements for classroom use and for library lending policies. Guidelines are provided for interpreting the Copyright Act, and insuring the…
40 CFR 721.91 - Computation of estimated surface water concentrations: Instructions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 32 2012-07-01 2012-07-01 false Computation of estimated surface water concentrations: Instructions. 721.91 Section 721.91 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT SIGNIFICANT NEW USES OF CHEMICAL SUBSTANCES Certain Significant New Uses § 721.91 Computation of...
40 CFR 721.91 - Computation of estimated surface water concentrations: Instructions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 32 2013-07-01 2013-07-01 false Computation of estimated surface water concentrations: Instructions. 721.91 Section 721.91 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT SIGNIFICANT NEW USES OF CHEMICAL SUBSTANCES Certain Significant New Uses § 721.91 Computation of...
76 FR 7818 - Announcing a Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-11
... will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L. 100..., --Presentation on Science of Security relating to computer security research, --Presentation on Access of..., --A panel of Inspector Generals regarding privacy and security, and --Update on NIST Computer Security...
Code of Federal Regulations, 2011 CFR
2011-04-01
... financial reporting and monthly computation by futures commission merchants and introducing brokers. 1.18... UNDER THE COMMODITY EXCHANGE ACT Minimum Financial and Related Reporting Requirements § 1.18 Records for and relating to financial reporting and monthly computation by futures commission merchants and...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Del Ben, Mauro, E-mail: mauro.delben@chem.uzh.ch; Hutter, Jürg, E-mail: hutter@chem.uzh.ch; VandeVondele, Joost, E-mail: Joost.VandeVondele@mat.ethz.ch
The forces acting on the atoms as well as the stress tensor are crucial ingredients for calculating the structural and dynamical properties of systems in the condensed phase. Here, these derivatives of the total energy are evaluated for the second-order Møller-Plesset perturbation energy (MP2) in the framework of the resolution of identity Gaussian and plane waves method, in a way that is fully consistent with how the total energy is computed. This consistency is non-trivial, given the different ways employed to compute Coulomb, exchange, and canonical four center integrals, and allows, for example, for energy conserving dynamics in various ensembles.more » Based on this formalism, a massively parallel algorithm has been developed for finite and extended system. The designed parallel algorithm displays, with respect to the system size, cubic, quartic, and quintic requirements, respectively, for the memory, communication, and computation. All these requirements are reduced with an increasing number of processes, and the measured performance shows excellent parallel scalability and efficiency up to thousands of nodes. Additionally, the computationally more demanding quintic scaling steps can be accelerated by employing graphics processing units (GPU’s) showing, for large systems, a gain of almost a factor two compared to the standard central processing unit-only case. In this way, the evaluation of the derivatives of the RI-MP2 energy can be performed within a few minutes for systems containing hundreds of atoms and thousands of basis functions. With good time to solution, the implementation thus opens the possibility to perform molecular dynamics (MD) simulations in various ensembles (microcanonical ensemble and isobaric-isothermal ensemble) at the MP2 level of theory. Geometry optimization, full cell relaxation, and energy conserving MD simulations have been performed for a variety of molecular crystals including NH{sub 3}, CO{sub 2}, formic acid, and benzene.« less
ACTS: from ATLAS software towards a common track reconstruction software
NASA Astrophysics Data System (ADS)
Gumpert, C.; Salzburger, A.; Kiehn, M.; Hrdinka, J.; Calace, N.; ATLAS Collaboration
2017-10-01
Reconstruction of charged particles’ trajectories is a crucial task for most particle physics experiments. The high instantaneous luminosity achieved at the LHC leads to a high number of proton-proton collisions per bunch crossing, which has put the track reconstruction software of the LHC experiments through a thorough test. Preserving track reconstruction performance under increasingly difficult experimental conditions, while keeping the usage of computational resources at a reasonable level, is an inherent problem for many HEP experiments. Exploiting concurrent algorithms and using multivariate techniques for track identification are the primary strategies to achieve that goal. Starting from current ATLAS software, the ACTS project aims to encapsulate track reconstruction software into a generic, framework- and experiment-independent software package. It provides a set of high-level algorithms and data structures for performing track reconstruction tasks as well as fast track simulation. The software is developed with special emphasis on thread-safety to support parallel execution of the code and data structures are optimised for vectorisation to speed up linear algebra operations. The implementation is agnostic to the details of the detection technologies and magnetic field configuration which makes it applicable to many different experiments.
Characterization of the Protein Unfolding Processes Induced by Urea and Temperature
Rocco, Alessandro Guerini; Mollica, Luca; Ricchiuto, Piero; Baptista, António M.; Gianazza, Elisabetta; Eberini, Ivano
2008-01-01
Correct folding is critical for the biological activities of proteins. As a contribution to a better understanding of the protein (un)folding problem, we studied the effect of temperature and of urea on peptostreptococcal Protein L destructuration. We performed standard molecular dynamics simulations at 300 K, 350 K, 400 K, and 480 K, both in 10 M urea and in water. Protein L followed at least two alternative unfolding pathways. Urea caused the loss of secondary structure acting preferentially on the β-sheets, while leaving the α-helices almost intact; on the contrary, high temperature preserved the β-sheets and led to a complete loss of the α-helices. These data suggest that urea and high temperature act through different unfolding mechanisms, and protein secondary motives reveal a differential sensitivity to various denaturant treatments. As further validation of our results, replica-exchange molecular dynamics simulations of the temperature-induced unfolding process in the presence of urea were performed. This set of simulations allowed us to compute the thermodynamical parameters of the process and confirmed that, in the configurational space of Protein L unfolding, both of the above pathways are accessible, although to a different relative extent. PMID:18065481
Examining the architecture of cellular computing through a comparative study with a computer
Wang, Degeng; Gribskov, Michael
2005-01-01
The computer and the cell both use information embedded in simple coding, the binary software code and the quadruple genomic code, respectively, to support system operations. A comparative examination of their system architecture as well as their information storage and utilization schemes is performed. On top of the code, both systems display a modular, multi-layered architecture, which, in the case of a computer, arises from human engineering efforts through a combination of hardware implementation and software abstraction. Using the computer as a reference system, a simplistic mapping of the architectural components between the two is easily detected. This comparison also reveals that a cell abolishes the software–hardware barrier through genomic encoding for the constituents of the biochemical network, a cell's ‘hardware’ equivalent to the computer central processing unit (CPU). The information loading (gene expression) process acts as a major determinant of the encoded constituent's abundance, which, in turn, often determines the ‘bandwidth’ of a biochemical pathway. Cellular processes are implemented in biochemical pathways in parallel manners. In a computer, on the other hand, the software provides only instructions and data for the CPU. A process represents just sequentially ordered actions by the CPU and only virtual parallelism can be implemented through CPU time-sharing. Whereas process management in a computer may simply mean job scheduling, coordinating pathway bandwidth through the gene expression machinery represents a major process management scheme in a cell. In summary, a cell can be viewed as a super-parallel computer, which computes through controlled hardware composition. While we have, at best, a very fragmented understanding of cellular operation, we have a thorough understanding of the computer throughout the engineering process. The potential utilization of this knowledge to the benefit of systems biology is discussed. PMID:16849179
Examining the architecture of cellular computing through a comparative study with a computer.
Wang, Degeng; Gribskov, Michael
2005-06-22
The computer and the cell both use information embedded in simple coding, the binary software code and the quadruple genomic code, respectively, to support system operations. A comparative examination of their system architecture as well as their information storage and utilization schemes is performed. On top of the code, both systems display a modular, multi-layered architecture, which, in the case of a computer, arises from human engineering efforts through a combination of hardware implementation and software abstraction. Using the computer as a reference system, a simplistic mapping of the architectural components between the two is easily detected. This comparison also reveals that a cell abolishes the software-hardware barrier through genomic encoding for the constituents of the biochemical network, a cell's "hardware" equivalent to the computer central processing unit (CPU). The information loading (gene expression) process acts as a major determinant of the encoded constituent's abundance, which, in turn, often determines the "bandwidth" of a biochemical pathway. Cellular processes are implemented in biochemical pathways in parallel manners. In a computer, on the other hand, the software provides only instructions and data for the CPU. A process represents just sequentially ordered actions by the CPU and only virtual parallelism can be implemented through CPU time-sharing. Whereas process management in a computer may simply mean job scheduling, coordinating pathway bandwidth through the gene expression machinery represents a major process management scheme in a cell. In summary, a cell can be viewed as a super-parallel computer, which computes through controlled hardware composition. While we have, at best, a very fragmented understanding of cellular operation, we have a thorough understanding of the computer throughout the engineering process. The potential utilization of this knowledge to the benefit of systems biology is discussed.
Abbey, Craig K.; Zemp, Roger J.; Liu, Jie; Lindfors, Karen K.; Insana, Michael F.
2009-01-01
We investigate and extend the ideal observer methodology developed by Smith and Wagner to detection and discrimination tasks related to breast sonography. We provide a numerical approach for evaluating the ideal observer acting on radio-frequency (RF) frame data, which involves inversion of large nonstationary covariance matrices, and we describe a power-series approach to computing this inverse. Considering a truncated power series suggests that the RF data be Wiener-filtered before forming the final envelope image. We have compared human performance for Wiener-filtered and conventional B-mode envelope images using psychophysical studies for 5 tasks related to breast cancer classification. We find significant improvements in visual detection and discrimination efficiency in four of these five tasks. We also use the Smith-Wagner approach to distinguish between human and processing inefficiencies, and find that generally the principle limitation comes from the information lost in computing the final envelope image. PMID:16468454
Code of Federal Regulations, 2012 CFR
2012-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. ANSI stands for... required documents. Electronic media means: (1) Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. ANSI stands for... required documents. Electronic media means: (1) Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. ANSI stands for... required documents. Electronic media means: (1) Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk...
The registration of new chemicals under the Toxicological Substances Control Act (TSCA) and new pesticides under the Federal Insecticide, Fungicide, and Rodenticide Act (FIFRA) requires knowledge of the process science underlying the transformation of organic chemicals in natural...
Space Communications Artificial Intelligence for Link Evaluation Terminal (SCAILET)
NASA Technical Reports Server (NTRS)
Shahidi, Anoosh
1991-01-01
A software application to assis end-users of the Link Evaluation Terminal (LET) for satellite communication is being developed. This software application incorporates artificial intelligence (AI) techniques and will be deployed as an interface to LET. The high burst rate (HBR) LET provides 30 GHz transmitting/20 GHz receiving, 220/110 Mbps capability for wideband communications technology experiments with the Advanced Communications Technology Satellite (ACTS). The HBR LET and ACTS are being developed at the NASA Lewis Research Center. The HBR LET can monitor and evaluate the integrity of the HBR communications uplink and downlink to the ACTS satellite. The uplink HBR transmission is performed by bursting the bit-pattern as a modulated signal to the satellite. By comparing the transmitted bit pattern with the received bit pattern, HBR LET can determine the bit error rate BER) under various atmospheric conditions. An algorithm for power augmentation is applied to enhance the system's BER performance at reduced signal strength caused by adverse conditions. Programming scripts, defined by the design engineer, set up the HBR LET terminal by programming subsystem devices through IEEE488 interfaces. However, the scripts are difficult to use, require a steep learning curve, are cryptic, and are hard to maintain. The combination of the learning curve and the complexities involved with editing the script files may discourage end-users from utilizing the full capabilities of the HBR LET system. An intelligent assistant component of SCAILET that addresses critical end-user needs in the programming of the HBR LET system as anticipated by its developers is described. A close look is taken at the various steps involved in writing ECM software for a C&P, computer and at how the intelligent assistant improves the HBR LET system and enhances the end-user's ability to perform the experiments.
NASA Technical Reports Server (NTRS)
Ludwig, Kimberly; Mackin, Michael; Wright, Theodore
1991-01-01
The Ada language software development to perform the electrical system monitoring functions for the NASA Lewis Research Center's Power Management and Distribution (PMAD) DC testbed is described. The results of the effort to implement this monitor are presented. The PMAD DC testbed is a reduced-scale prototype of the electrical power system to be used in the Space Station Freedom. The power is controlled by smart switches known as power control components (or switchgear). The power control components are currently coordinated by five Compaq 382/20e computers connected through an 802.4 local area network. One of these computers is designated as the control node with the other four acting as subsidiary controllers. The subsidiary controllers are connected to the power control components with a Mil-Std-1553 network. An operator interface is supplied by adding a sixth computer. The power system monitor algorithm is comprised of several functions including: periodic data acquisition, data smoothing, system performance analysis, and status reporting. Data is collected from the switchgear sensors every 100 milliseconds, then passed through a 2 Hz digital filter. System performance analysis includes power interruption and overcurrent detection. The reporting mechanism notifies an operator of any abnormalities in the system. Once per second, the system monitor provides data to the control node for further processing, such as state estimation. The system monitor required a hardware time interrupt to activate the data acquisition function. The execution time of the code was optimized using an assembly language routine. The routine allows direct vectoring of the processor to Ada language procedures that perform periodic control activities. A summary of the advantages and side effects of this technique are discussed.
NASA Technical Reports Server (NTRS)
1997-01-01
Under a Space Act Agreement between the Kirby company and Lewis Research Center, NASA technology was applied to a commercial vacuum cleaner product line. Kirby engineers were interested in advanced operational concepts, such as particle flow behavior and vibration, critical factors to improve vacuum cleaner performance. An evaluation of the company 1994 home care system, the Kirby G4, led to the refinement of the new G5 and future models. Under the cooperative agreement, Kirby had access to Lewis' holography equipment, which added insight into how long a vacuum cleaner fan would perform, as well as advanced computer software that can simulate the flow of air through fans. The collaboration resulted in several successes including fan blade redesign and continuing dialogue on how to improve air-flow traits in various nozzle designs.
Want a Tip? Service Performance as a Function of Emotion Regulation and Extraversion
ERIC Educational Resources Information Center
Chi, Nai-Wen; Grandey, Alicia A.; Diamond, Jennifer A.; Krimmel, Kathleen Royer
2011-01-01
Surface acting and deep acting with customers are strategies for service performance, but evidence for their effectiveness is limited and mixed. We propose that deep acting is an effective strategy for most employees, whereas surface acting's effect on performance effectiveness depends on employee extraversion. In Study 1, restaurant servers who…
Budak, Erdal; Fernández Sánchez, Manuel; Bellver, José; Cerveró, Ana; Simón, Carlos; Pellicer, Antonio
2006-06-01
To summarize the effects of novel hormones (leptin, ghrelin, adiponectin, resistin, and PYY3-36) secreted from adipose tissue and the gastrointestinal tract that have been discovered to exert different effects on several reproductive functions, such as the hypothalamic-pituitary-gonadal axis, embryo development, implantation physiology, and clinically relevant conditions. A MEDLINE computer search was performed to identify relevant articles. Leptin and ghrelin exert important roles on body weight regulation, eating behavior, and reproduction, acting on the central nervous system and target reproductive organs. As a marker of adequate nutritional stores, these hormones may act on the central nervous system to initiate the complex process of puberty and maintain normal reproductive function. In addition, leptin and ghrelin and their receptors are involved in reproductive events such as gonadal function, embryo development, and embryo-endometrial interaction. Leptin and ghrelin and other adipose tissue-secreted hormones have significant effects on reproduction. Acting through the brain, these hormones may serve as links between adipose tissue and the reproductive system to supply and regulate energy needs for normal reproduction and pregnancy. Future studies are needed to further clarify the role of these hormones in reproductive events and other related gynecological conditions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Code of Federal Regulations, 2013 CFR
2013-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Code of Federal Regulations, 2012 CFR
2012-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Code of Federal Regulations, 2014 CFR
2014-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
28 CFR 51.9 - Computation of time.
Code of Federal Regulations, 2010 CFR
2010-07-01
... THE VOTING RIGHTS ACT OF 1965, AS AMENDED General Provisions § 51.9 Computation of time. (a) The... voting. (b) Except as specified in §§ 51.37, 51.39, and 51.42 the 60-day period shall commence upon...
ERIC Educational Resources Information Center
Abelson, Hal; Goldenberg, Paul
This experimental curriculum unit suggests how dramatic innovations in classroom content may be achieved through use of computers. The computational perspective is viewed as one which can enrich and transform traditional curricula, act as a focus for integrating insights from diverse disciplines, and enable learning to become more active and…
Pilot trial of spirometer games for airway clearance practice in cystic fibrosis.
Bingham, Peter M; Lahiri, Thomas; Ashikaga, Taka
2012-08-01
Many children with cystic fibrosis (CF) adhere poorly to airway clearance techniques (ACTs), and would rather play video games that challenge their dexterity and visual tracking skills. We developed gaming technology that encourages forced expiratory maneuvers. Following interviews regarding recreational activities and subjects' practice of ACTs, we conducted a pilot trial of spirometer games in 13 adolescents with CF, to test the hypothesis that games could increase subjects' engagement with forced expiratory breathing maneuvers and improve pulmonary function tests (PFTs). After baseline PFTs, subjects were provided with digital spirometers and computers set up as "game only" or "control" devices. After the first of 2 periods (each > 2 weeks), the computer was set-up for the alternate condition for period 2. The t test and non-parametric correlation analyses examined use, number of expiratory high flow events (HFEs), and change in PFTs, identifying trends at P ≤ .1, significance at P < .05. Interviews disclosed minimal awareness of ACTs among our pediatric CF patients. Subjects used games and control software a similar percentage of days during the game (26%) and control periods (32%). There was a trend toward more minutes with the game versus control setup (P = .07), though HFE count did not differ between the 2 conditions (P = .71). Game play showed no overall effect on FEV(1), though correlation analysis showed a modest relation between minutes of play and change in FEV(1) from baseline (r = 0.50, P = .09). The game period showed a trend to increased vital capacity (P = .05). Spirometer games elicit forced expiratory breath maneuvers in pediatric CF patients. Improvement in PFTs may be due to improved test performance technique, though improved obstructive/restrictive lung function due to game play cannot be excluded. A formal clinical trial of this approach is planned.
NASA Technical Reports Server (NTRS)
Reinhart, Richard C.
1993-01-01
The Power Control and Rain Fade Software was developed at the NASA Lewis Research Center to support the Advanced Communications Technology Satellite High Burst Rate Link Evaluation Terminal (ACTS HBR-LET). The HBR-LET is an experimenters terminal to communicate with the ACTS for various experiments by government, university, and industry agencies. The Power Control and Rain Fade Software is one segment of the Control and Performance Monitor (C&PM) Software system of the HBR-LET. The Power Control and Rain Fade Software automatically controls the LET uplink power to compensate for signal fades. Besides power augmentation, the C&PM Software system is also responsible for instrument control during HBR-LET experiments, control of the Intermediate Frequency Switch Matrix on board the ACTS to yield a desired path through the spacecraft payload, and data display. The Power Control and Rain Fade Software User's Guide, Version 1.0 outlines the commands and procedures to install and operate the Power Control and Rain Fade Software. The Power Control and Rain Fade Software Maintenance Manual, Version 1.0 is a programmer's guide to the Power Control and Rain Fade Software. This manual details the current implementation of the software from a technical perspective. Included is an overview of the Power Control and Rain Fade Software, computer algorithms, format representations, and computer hardware configuration. The Power Control and Rain Fade Test Plan provides a step-by-step procedure to verify the operation of the software using a predetermined signal fade event. The Test Plan also provides a means to demonstrate the capability of the software.
NASA Technical Reports Server (NTRS)
Reinhart, Richard C.
1993-01-01
The Communication Protocol Software was developed at the NASA Lewis Research Center to support the Advanced Communications Technology Satellite High Burst Rate Link Evaluation Terminal (ACTS HBR-LET). The HBR-LET is an experimenters terminal to communicate with the ACTS for various experiments by government, university, and industry agencies. The Communication Protocol Software is one segment of the Control and Performance Monitor (C&PM) Software system of the HBR-LET. The Communication Protocol Software allows users to control and configure the Intermediate Frequency Switch Matrix (IFSM) on board the ACTS to yield a desired path through the spacecraft payload. Besides IFSM control, the C&PM Software System is also responsible for instrument control during HBR-LET experiments, uplink power control of the HBR-LET to demonstrate power augmentation during signal fade events, and data display. The Communication Protocol Software User's Guide, Version 1.0 (NASA CR-189162) outlines the commands and procedures to install and operate the Communication Protocol Software. Configuration files used to control the IFSM, operator commands, and error recovery procedures are discussed. The Communication Protocol Software Maintenance Manual, Version 1.0 (NASA CR-189163, to be published) is a programmer's guide to the Communication Protocol Software. This manual details the current implementation of the software from a technical perspective. Included is an overview of the Communication Protocol Software, computer algorithms, format representations, and computer hardware configuration. The Communication Protocol Software Test Plan (NASA CR-189164, to be published) provides a step-by-step procedure to verify the operation of the software. Included in the Test Plan is command transmission, telemetry reception, error detection, and error recovery procedures.
10 CFR 2.1017 - Computation of time.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Computation of time. In computing any period of time, the day of the act, event, or default after which the... unless it is a Saturday, Sunday, or legal holiday at the place where the action or event is to occur, in which event the period runs until the end of the next day which is neither a Saturday, Sunday, nor...
10 CFR 2.1017 - Computation of time.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Computation of time. In computing any period of time, the day of the act, event, or default after which the... unless it is a Saturday, Sunday, or legal holiday at the place where the action or event is to occur, in which event the period runs until the end of the next day which is neither a Saturday, Sunday, nor...
10 CFR 2.306 - Computation of time.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Hearings § 2.306 Computation of time. (a) In computing any period of time, the day of the act, event, or... where the action or event is to occur, or a day upon which, because of an emergency closure of the Federal government in Washington, DC, NRC Headquarters does not open for business, in which event the...
10 CFR 2.306 - Computation of time.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Hearings § 2.306 Computation of time. (a) In computing any period of time, the day of the act, event, or... where the action or event is to occur, or a day upon which, because of an emergency closure of the Federal government in Washington, DC, NRC Headquarters does not open for business, in which event the...
26 CFR 7.57(d)-1 - Election with respect to straight line recovery of intangibles.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Tax Reform Act of 1976. Under this election taxpayers may use cost depletion to compute straight line... wells to which the election applies, cost depletion to compute straight line recovery of intangibles for... whether or not the taxpayer uses cost depletion in computing taxable income. (5) The election is made by a...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... Wesolowski, Director, Verifications Policy & Operations Branch, Division of Eligibility and Enrollment Policy..., electronic interfaces and an on-line system for the verification of eligibility. PURPOSE(S) OF THE MATCHING... Security number (SSN) verifications, (2) a death indicator, (3) an indicator of a finding of disability by...
A Computer Based Program to Improve Reading and Mathematics Scores for High School Students.
ERIC Educational Resources Information Center
Bond, Carole L.; And Others
A study examined the effect on reading achievement, mathematics achievement, and ACT scores when computer based instruction (CBI) was compressed into a 6-week period of time. In addition, the effects of learning style and receptive language deficits on these scores were studied. Computer based instruction is a primary source of instruction that…
20 CFR 725.520 - Computation of benefits.
Code of Federal Regulations, 2011 CFR
2011-04-01
... FEDERAL MINE SAFETY AND HEALTH ACT, AS AMENDED Payment of Benefits Benefit Rates § 725.520 Computation of benefits. (a) Basic rate. The amount of benefits payable to a beneficiary for a month is determined, in the first instance, by computing the “basic rate.” The basic rate is equal to 371/2 percent of the monthly...
20 CFR 725.520 - Computation of benefits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... MINE SAFETY AND HEALTH ACT, AS AMENDED Payment of Benefits Benefit Rates § 725.520 Computation of benefits. (a) Basic rate. The amount of benefits payable to a beneficiary for a month is determined, in the first instance, by computing the “basic rate.” The basic rate is equal to 371/2 percent of the monthly...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-03
... Engineering; Notice of Meeting In accordance with the Federal Advisory Committee Act (Pub. L. 92- 463, as... Computer and Information Science and Engineering (1115). Date and Time: November 1, 2011 from 12 p.m.-5:30... Computer and Information Science and Engineering, National Science Foundation, 4201 Wilson Blvd., Suite...
76 FR 56744 - Privacy Act of 1974; Notice of a Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-14
...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, Department of Defense (DoD... (SSA) and DoD Defense Manpower Data Center (DMDC) that their records are being matched by computer. The... intrusion of the individual's privacy and would result in additional delay in the eventual SSI payment and...
States Move toward Computer Science Standards. Policy Update. Vol. 23, No. 17
ERIC Educational Resources Information Center
Tilley-Coulson, Eve
2016-01-01
While educators and parents recognize computer science as a key skill for career readiness, only five states have adopted learning standards in this area. Tides are changing, however, as the Every Student Succeeds Act (ESSA) recognizes with its call on states to provide a "well-rounded education" for students, to include computer science…
Studies on the ionospheric-thermospheric coupling mechanisms using SLR
NASA Astrophysics Data System (ADS)
Panzetta, Francesca; Erdogan, Eren; Bloßfeld, Mathis; Schmidt, Michael
2016-04-01
Several Low Earth Orbiters (LEOs) have been used by different research groups to model the thermospheric neutral density distribution at various altitudes performing Precise Orbit Determination (POD) in combination with satellite accelerometry. This approach is, in principle, based on satellite drag analysis, driven by the fact that the drag force is one of the major perturbing forces acting on LEOs. The satellite drag itself is physically related to the thermospheric density. The present contribution investigates the possibility to compute the thermospheric density from Satellite Laser Ranging (SLR) observations. SLR is commonly used to compute very accurate satellite orbits. As a prerequisite, a very high precise modelling of gravitational and non-gravitational accelerations is necessary. For this investigation, a sensitivity study of SLR observations to thermospheric density variations is performed using the DGFI Orbit and Geodetic parameter estimation Software (DOGS). SLR data from satellites at altitudes lower than 500 km are processed adopting different thermospheric models. The drag coefficients which describe the interaction of the satellite surfaces with the atmosphere are analytically computed in order to obtain scaling factors purely related to the thermospheric density. The results are reported and discussed in terms of estimates of scaling coefficients of the thermospheric density. Besides, further extensions and improvements in thermospheric density modelling obtained by combining a physics-based approach with ionospheric observations are investigated. For this purpose, the coupling mechanisms between the thermosphere and ionosphere are studied.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lottes, Steven A.; Bojanowski, Cezary
Resurfacing of urban roads with concurrent repairs and replacement of sections of curb and sidewalk may require pedestrian ramps that are compliant with the American Disabilities Act (ADA), and when street drains are in close proximity to the walkway, ADA compliant street grates may also be required. The Minnesota Department of Transportation ADA Operations Unit identified a foundry with an available grate that meets ADA requirements. Argonne National Laboratory’s Transportation Research and Analysis Computing Center used full scale three dimensional computational fluid dynamics to determine the performance of the ADA compliant grate and compared it to that of a standardmore » vane grate. Analysis of a parametric set of cases was carried out, including variation in longitudinal, gutter, and cross street slopes and the water spread from the curb. The performance of the grates was characterized by the fraction of the total volume flow approaching the grate from the upstream that was captured by the grate and diverted into the catch basin. The fraction of the total flow entering over the grate from the side and the fraction of flow directly over a grate diverted into the catch basin were also quantities of interest that aid in understanding the differences in performance of the grates. The ADA compliant grate performance lagged that of the vane grate, increasingly so as upstream Reynolds number increased. The major factor leading to the performance difference between the two grates was the fraction of flow directly over the grates that is captured by the grates.« less
Yang, J C; Noble, J
1990-01-01
This study investigated the validity of three American College Testing-Proficiency Examination Program (ACT-PEP) tests (Maternal and Child Nursing, Psychiatric/Mental Health Nursing, Adult Nursing) for predicting the academic performance of registered nurses (RNs) enrolled in bachelor's degree BSN programs nationwide. This study also examined RN students' performance on the ACT-PEP tests by their demographic characteristics: student's age, sex, race, student status (full- or part-time), and employment status (full- or part-time). The total sample for the three tests comprised 2,600 students from eight institutions nationwide. The median correlation coefficients between the three ACT-PEP tests and the semester grade point averages ranged from .36 to .56. Median correlation coefficients increased over time, supporting the stability of ACT-PEP test scores for predicting academic performance over time. The relative importance of selected independent variables for predicting academic performance was also examined; the most important variable for predicting academic performance was typically the ACT-PEP test score. Across the institutions, student demographic characteristics did not contribute significantly to explaining academic performance, over and above ACT-PEP scores.
ERIC Educational Resources Information Center
De Felice, Rachele; Deane, Paul
2012-01-01
This study proposes an approach to automatically score the "TOEIC"® Writing e-mail task. We focus on one component of the scoring rubric, which notes whether the test-takers have used particular speech acts such as requests, orders, or commitments. We developed a computational model for automated speech act identification and tested it…
Improved Helicopter Rotor Performance Prediction through Loose and Tight CFD/CSD Coupling
NASA Astrophysics Data System (ADS)
Ickes, Jacob C.
Helicopters and other Vertical Take-Off or Landing (VTOL) vehicles exhibit an interesting combination of structural dynamic and aerodynamic phenomena which together drive the rotor performance. The combination of factors involved make simulating the rotor a challenging and multidisciplinary effort, and one which is still an active area of interest in the industry because of the money and time it could save during design. Modern tools allow the prediction of rotorcraft physics from first principles. Analysis of the rotor system with this level of accuracy provides the understanding necessary to improve its performance. There has historically been a divide between the comprehensive codes which perform aeroelastic rotor simulations using simplified aerodynamic models, and the very computationally intensive Navier-Stokes Computational Fluid Dynamics (CFD) solvers. As computer resources become more available, efforts have been made to replace the simplified aerodynamics of the comprehensive codes with the more accurate results from a CFD code. The objective of this work is to perform aeroelastic rotorcraft analysis using first-principles simulations for both fluids and structural predictions using tools available at the University of Toledo. Two separate codes are coupled together in both loose coupling (data exchange on a periodic interval) and tight coupling (data exchange each time step) schemes. To allow the coupling to be carried out in a reliable and efficient way, a Fluid-Structure Interaction code was developed which automatically performs primary functions of loose and tight coupling procedures. Flow phenomena such as transonics, dynamic stall, locally reversed flow on a blade, and Blade-Vortex Interaction (BVI) were simulated in this work. Results of the analysis show aerodynamic load improvement due to the inclusion of the CFD-based airloads in the structural dynamics analysis of the Computational Structural Dynamics (CSD) code. Improvements came in the form of improved peak/trough magnitude prediction, better phase prediction of these locations, and a predicted signal with a frequency content more like the flight test data than the CSD code acting alone. Additionally, a tight coupling analysis was performed as a demonstration of the capability and unique aspects of such an analysis. This work shows that away from the center of the flight envelope, the aerodynamic modeling of the CSD code can be replaced with a more accurate set of predictions from a CFD code with an improvement in the aerodynamic results. The better predictions come at substantially increased computational costs between 1,000 and 10,000 processor-hours.
48 CFR 22.1003-2 - Geographical coverage of the Act.
Code of Federal Regulations, 2010 CFR
2010-10-01
... REGULATION SOCIOECONOMIC PROGRAMS APPLICATION OF LABOR LAWS TO GOVERNMENT ACQUISITIONS Service Contract Act of 1965, as Amended 22.1003-2 Geographical coverage of the Act. The Act applies to service contracts performed in the United States (see 22.1001). The Act does not apply to contracts performed outside the...
ERIC Educational Resources Information Center
Neal, James G.
2000-01-01
Discusses objections in the library community to the Uniform Computer Information Transactions Act (UCITA), a legal framework being considered by state governments regarding computer information, transactions, and software. Topics include copyright issues; user needs for access to information; license agreements; and costs that may prevent…
DOT National Transportation Integrated Search
1996-01-01
The RISKIND computer program was developed for the analysis of radiological consequences and health risks to individuals and the collective population from exposures associated with the transportation of spent nuclear fuel (SNF) or other radioactive ...
The Secret Life of Quarks, Final Report for the University of North Carolina at Chapel Hill
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fowler, Robert J.
This final report summarizes activities and results at the University of North Carolina as part of the the SciDAC-2 Project The Secret Life of Quarks: National Computational Infrastructure for Lattice Quantum Chromodynamics. The overall objective of the project is to construct the software needed to study quantum chromo- dynamics (QCD), the theory of the strong interactions of subatomic physics, and similar strongly coupled gauge theories anticipated to be of importance in the LHC era. It built upon the successful efforts of the SciDAC-1 project National Computational Infrastructure for Lattice Gauge Theory, in which a QCD Applications Programming Interface (QCD API)more » was developed that enables lat- tice gauge theorists to make effective use of a wide variety of massively parallel computers. In the SciDAC-2 project, optimized versions of the QCD API were being created for the IBM Blue- Gene/L (BG/L) and BlueGene/P (BG/P), the Cray XT3/XT4 and its successors, and clusters based on multi-core processors and Infiniband communications networks. The QCD API is being used to enhance the performance of the major QCD community codes and to create new applications. Software libraries of physics tools have been expanded to contain sharable building blocks for inclusion in application codes, performance analysis and visualization tools, and software for au- tomation of physics work flow. New software tools were designed for managing the large data sets generated in lattice QCD simulations, and for sharing them through the International Lattice Data Grid consortium. As part of the overall project, researchers at UNC were funded through ASCR to work in three general areas. The main thrust has been performance instrumentation and analysis in support of the SciDAC QCD code base as it evolved and as it moved to new computation platforms. In support of the performance activities, performance data was to be collected in a database for the purpose of broader analysis. Third, the UNC work was done at RENCI (Renaissance Computing Institute), which has extensive expertise and facilities for scientific data visualization, so we acted in an ongoing consulting and support role in that area.« less
75 FR 40770 - Creation of a New Computer Matching Program That Will Expire on December 31, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-14
... and Privacy Protection Act of 1988 (Pub. L. 100-503), amended the Privacy Act (5 U.S.C. 552a) by... Ross, Chief of Staff, Office of the Secretary, Department of Agriculture. [FR Doc. 2010-17284 Filed 7...
29 CFR 5.8 - Liquidated damages under the Contract Work Hours and Safety Standards Act.
Code of Federal Regulations, 2014 CFR
2014-07-01
... or mechanics shall be paid wages at a rate not less than one and one-half times the basic rate of pay... liquidated damages, computed with respect to each laborer or mechanic employed in violation of the Act in the...
29 CFR 5.8 - Liquidated damages under the Contract Work Hours and Safety Standards Act.
Code of Federal Regulations, 2012 CFR
2012-07-01
... or mechanics shall be paid wages at a rate not less than one and one-half times the basic rate of pay... liquidated damages, computed with respect to each laborer or mechanic employed in violation of the Act in the...
29 CFR 5.8 - Liquidated damages under the Contract Work Hours and Safety Standards Act.
Code of Federal Regulations, 2013 CFR
2013-07-01
... or mechanics shall be paid wages at a rate not less than one and one-half times the basic rate of pay... liquidated damages, computed with respect to each laborer or mechanic employed in violation of the Act in the...
Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).
NASA Astrophysics Data System (ADS)
Zapoměl, J.; Ferfecki, P.
2016-09-01
A frequently used technological solution for minimization of undesirable effects caused by vibration of rotating machines consists in placing damping devices in the rotor supports. The application of magnetorheological squeeze film dampers enables their optimum performance to be achieved in a wide range of rotating speeds by adapting their damping effect to the current operating conditions. The damping force, which is produced by squeezing the layer of magnetorheological oil, can be controlled by changing magnetic flux passing through the lubricant. The force acting between the rotor and its frame is transmitted through the rolling element bearing, the lubricating layer and the squirrel spring. The loading of the bearing produces a time variable friction moment, energy losses, uneven rotor running, and has an influence on the rotor service life and the current fluctuation in electric circuits. The carried out research consisted in the development of a mathematical model of a magnetorheological squeeze film damper, its implementation into the computational models of rotor systems, and in performing the study on the dependence of the energy losses and variation of the friction moment on the damping force and its control. The new and computationally stable mathematical model of a magnetorheological squeeze film damper, its implementation in the computational models of rigid rotors and learning more on the energy losses generated in the rotor supports in dependence on the damping effect are the principal contributions of this paper. The results of the computational simulations prove that a suitable control of the damping force enables the energy losses to be reduced in a wide velocity range.
Monitoring of computing resource utilization of the ATLAS experiment
NASA Astrophysics Data System (ADS)
Rousseau, David; Dimitrov, Gancho; Vukotic, Ilija; Aidel, Osman; Schaffer, Rd; Albrand, Solveig
2012-12-01
Due to the good performance of the LHC accelerator, the ATLAS experiment has seen higher than anticipated levels for both the event rate and the average number of interactions per bunch crossing. In order to respond to these changing requirements, the current and future usage of CPU, memory and disk resources has to be monitored, understood and acted upon. This requires data collection at a fairly fine level of granularity: the performance of each object written and each algorithm run, as well as a dozen per-job variables, are gathered for the different processing steps of Monte Carlo generation and simulation and the reconstruction of both data and Monte Carlo. We present a system to collect and visualize the data from both the online Tier-0 system and distributed grid production jobs. Around 40 GB of performance data are expected from up to 200k jobs per day, thus making performance optimization of the underlying Oracle database of utmost importance.
POEM: Identifying Joint Additive Effects on Regulatory Circuits.
Botzman, Maya; Nachshon, Aharon; Brodt, Avital; Gat-Viks, Irit
2016-01-01
Expression Quantitative Trait Locus (eQTL) mapping tackles the problem of identifying variation in DNA sequence that have an effect on the transcriptional regulatory network. Major computational efforts are aimed at characterizing the joint effects of several eQTLs acting in concert to govern the expression of the same genes. Yet, progress toward a comprehensive prediction of such joint effects is limited. For example, existing eQTL methods commonly discover interacting loci affecting the expression levels of a module of co-regulated genes. Such "modularization" approaches, however, are focused on epistatic relations and thus have limited utility for the case of additive (non-epistatic) effects. Here we present POEM (Pairwise effect On Expression Modules), a methodology for identifying pairwise eQTL effects on gene modules. POEM is specifically designed to achieve high performance in the case of additive joint effects. We applied POEM to transcription profiles measured in bone marrow-derived dendritic cells across a population of genotyped mice. Our study reveals widespread additive, trans-acting pairwise effects on gene modules, characterizes their organizational principles, and highlights high-order interconnections between modules within the immune signaling network. These analyses elucidate the central role of additive pairwise effect in regulatory circuits, and provide computational tools for future investigations into the interplay between eQTLs. The software described in this article is available at csgi.tau.ac.il/POEM/.
POEM: Identifying Joint Additive Effects on Regulatory Circuits
Botzman, Maya; Nachshon, Aharon; Brodt, Avital; Gat-Viks, Irit
2016-01-01
Motivation: Expression Quantitative Trait Locus (eQTL) mapping tackles the problem of identifying variation in DNA sequence that have an effect on the transcriptional regulatory network. Major computational efforts are aimed at characterizing the joint effects of several eQTLs acting in concert to govern the expression of the same genes. Yet, progress toward a comprehensive prediction of such joint effects is limited. For example, existing eQTL methods commonly discover interacting loci affecting the expression levels of a module of co-regulated genes. Such “modularization” approaches, however, are focused on epistatic relations and thus have limited utility for the case of additive (non-epistatic) effects. Results: Here we present POEM (Pairwise effect On Expression Modules), a methodology for identifying pairwise eQTL effects on gene modules. POEM is specifically designed to achieve high performance in the case of additive joint effects. We applied POEM to transcription profiles measured in bone marrow-derived dendritic cells across a population of genotyped mice. Our study reveals widespread additive, trans-acting pairwise effects on gene modules, characterizes their organizational principles, and highlights high-order interconnections between modules within the immune signaling network. These analyses elucidate the central role of additive pairwise effect in regulatory circuits, and provide computational tools for future investigations into the interplay between eQTLs. Availability: The software described in this article is available at csgi.tau.ac.il/POEM/. PMID:27148351
Use of computer-assisted drug therapy outside the operating room.
Singh, Preet Mohinder; Borle, Anuradha; Goudra, Basavana G
2016-08-01
The number of procedures performed in the out-of-operating room setting under sedation has increased many fold in recent years. Sedation techniques aim to achieve rapid patient turnover through the use of short-acting drugs with minimal residual side-effects (mainly propofol and opioids). Even for common procedures, the practice of sedation delivery varies widely among providers. Computer-based sedation models have the potential to assist sedation providers and offer a more consistent and safer sedation experience for patients. Target-controlled infusions using propofol and other short-acting opioids for sedation have shown promising results in terms of increasing patient safety and allowing for more rapid wake-up times. Target-controlled infusion systems with real-time patient monitoring can titrate drug doses automatically to maintain optimal depth of sedation. The best recent example of this is the propofol-based Sedasys sedation system. Sedasys redefined individualized sedation by the addition of an automated clinical parameter that monitors depth of sedation. However, because of poor adoption and cost issues, it has been recently withdrawn by the manufacturer. Present automated drug delivery systems can assist in the provision of sedation for out-of-operating room procedures but cannot substitute for anesthesia providers. Use of the available technology has the potential to improve patient outcomes, decrease provider workload, and have a long-term economic impact on anesthesia care delivery outside of the operating room.
Virtual fixtures as tools to enhance operator performance in telepresence environments
NASA Astrophysics Data System (ADS)
Rosenberg, Louis B.
1993-12-01
This paper introduces the notion of virtual fixtures for use in telepresence systems and presents an empirical study which demonstrates that such virtual fixtures can greatly enhance operator performance within remote environments. Just as tools and fixtures in the real world can enhance human performance by guiding manual operations, providing localizing references, and reducing the mental processing required to perform a task, virtual fixtures are computer generated percepts overlaid on top of the reflection of a remote workspace which can provide similar benefits. Like a ruler guiding a pencil in a real manipulation task, a virtual fixture overlaid on top of a remote workspace can act to reduce the mental processing required to perform a task, limit the workload of certain sensory modalities, and most of all allow precision and performance to exceed natural human abilities. Because such perceptual overlays are virtual constructions they can be diverse in modality, abstract in form, and custom tailored to individual task or user needs. This study investigates the potential of virtual fixtures by implementing simple combinations of haptic and auditory sensations as perceptual overlays during a standardized telemanipulation task.
Cheng, Nai-Ming; Fang, Yu-Hua Dean; Tsan, Din-Li
2016-01-01
Purpose We compared attenuation correction of PET images with helical CT (PET/HCT) and respiration-averaged CT (PET/ACT) in patients with non-small-cell lung cancer (NSCLC) with the goal of investigating the impact of respiration-averaged CT on 18F FDG PET texture parameters. Materials and Methods A total of 56 patients were enrolled. Tumors were segmented on pretreatment PET images using the adaptive threshold. Twelve different texture parameters were computed: standard uptake value (SUV) entropy, uniformity, entropy, dissimilarity, homogeneity, coarseness, busyness, contrast, complexity, grey-level nonuniformity, zone-size nonuniformity, and high grey-level large zone emphasis. Comparisons of PET/HCT and PET/ACT were performed using Wilcoxon signed-rank tests, intraclass correlation coefficients, and Bland-Altman analysis. Receiver operating characteristic (ROC) curves as well as univariate and multivariate Cox regression analyses were used to identify the parameters significantly associated with disease-specific survival (DSS). A fixed threshold at 45% of the maximum SUV (T45) was used for validation. Results SUV maximum and total lesion glycolysis (TLG) were significantly higher in PET/ACT. However, texture parameters obtained with PET/ACT and PET/HCT showed a high degree of agreement. The lowest levels of variation between the two modalities were observed for SUV entropy (9.7%) and entropy (9.8%). SUV entropy, entropy, and coarseness from both PET/ACT and PET/HCT were significantly associated with DSS. Validation analyses using T45 confirmed the usefulness of SUV entropy and entropy in both PET/HCT and PET/ACT for the prediction of DSS, but only coarseness from PET/ACT achieved the statistical significance threshold. Conclusions Our results indicate that 1) texture parameters from PET/ACT are clinically useful in the prediction of survival in NSCLC patients and 2) SUV entropy and entropy are robust to attenuation correction methods. PMID:26930211
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Ways and Means.
This hearing on legislation designed to encourage contributions of computers and computer equipment to elementary and secondary schools emphasizes California's experience with a state-level program. Testimony is included from the following witnesses: Kay Pacheco, Alameda County Office of Education; Michael D. Rashkin, Apple Computer, Inc.; Barbara…
29 CFR 778.208 - Inclusion and exclusion of bonuses in computing the “regular rate.”
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 3 2012-07-01 2012-07-01 false Inclusion and exclusion of bonuses in computing the... Inclusion and exclusion of bonuses in computing the “regular rate.” Section 7(e) of the Act requires the inclusion in the regular rate of all remuneration for employment except eight specified types of payments...
29 CFR 778.208 - Inclusion and exclusion of bonuses in computing the “regular rate.”
Code of Federal Regulations, 2014 CFR
2014-07-01
... 29 Labor 3 2014-07-01 2014-07-01 false Inclusion and exclusion of bonuses in computing the... Inclusion and exclusion of bonuses in computing the “regular rate.” Section 7(e) of the Act requires the inclusion in the regular rate of all remuneration for employment except eight specified types of payments...
29 CFR 778.208 - Inclusion and exclusion of bonuses in computing the “regular rate.”
Code of Federal Regulations, 2013 CFR
2013-07-01
... 29 Labor 3 2013-07-01 2013-07-01 false Inclusion and exclusion of bonuses in computing the... Inclusion and exclusion of bonuses in computing the “regular rate.” Section 7(e) of the Act requires the inclusion in the regular rate of all remuneration for employment except eight specified types of payments...
ERIC Educational Resources Information Center
Woodruff, David; Traynor, Anne; Cui, Zhongmin; Fang, Yu
2013-01-01
Professional standards for educational testing recommend that both the overall standard error of measurement and the conditional standard error of measurement (CSEM) be computed on the score scale used to report scores to examinees. Several methods have been developed to compute scale score CSEMs. This paper compares three methods, based on…
29 CFR 778.208 - Inclusion and exclusion of bonuses in computing the “regular rate.”
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 3 2010-07-01 2010-07-01 false Inclusion and exclusion of bonuses in computing the... Inclusion and exclusion of bonuses in computing the “regular rate.” Section 7(e) of the Act requires the inclusion in the regular rate of all remuneration for employment except seven specified types of payments...
29 CFR 778.208 - Inclusion and exclusion of bonuses in computing the “regular rate.”
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 3 2011-07-01 2011-07-01 false Inclusion and exclusion of bonuses in computing the... Inclusion and exclusion of bonuses in computing the “regular rate.” Section 7(e) of the Act requires the inclusion in the regular rate of all remuneration for employment except eight specified types of payments...
Willighagen, Egon L; Mayfield, John W; Alvarsson, Jonathan; Berg, Arvid; Carlsson, Lars; Jeliazkova, Nina; Kuhn, Stefan; Pluskal, Tomáš; Rojas-Chertó, Miquel; Spjuth, Ola; Torrance, Gilleain; Evelo, Chris T; Guha, Rajarshi; Steinbeck, Christoph
2017-06-06
The Chemistry Development Kit (CDK) is a widely used open source cheminformatics toolkit, providing data structures to represent chemical concepts along with methods to manipulate such structures and perform computations on them. The library implements a wide variety of cheminformatics algorithms ranging from chemical structure canonicalization to molecular descriptor calculations and pharmacophore perception. It is used in drug discovery, metabolomics, and toxicology. Over the last 10 years, the code base has grown significantly, however, resulting in many complex interdependencies among components and poor performance of many algorithms. We report improvements to the CDK v2.0 since the v1.2 release series, specifically addressing the increased functional complexity and poor performance. We first summarize the addition of new functionality, such atom typing and molecular formula handling, and improvement to existing functionality that has led to significantly better performance for substructure searching, molecular fingerprints, and rendering of molecules. Second, we outline how the CDK has evolved with respect to quality control and the approaches we have adopted to ensure stability, including a code review mechanism. This paper highlights our continued efforts to provide a community driven, open source cheminformatics library, and shows that such collaborative projects can thrive over extended periods of time, resulting in a high-quality and performant library. By taking advantage of community support and contributions, we show that an open source cheminformatics project can act as a peer reviewed publishing platform for scientific computing software. Graphical abstract CDK 2.0 provides new features and improved performance.
Code of Federal Regulations, 2010 CFR
2010-04-01
... RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE When... annuity rate under the overall minimum. A spouse's inclusion in the computation of the overall minimum...
75 FR 39003 - SAFRA Act Payments to Loan Servicers for Job Retention
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-07
... obtain this document in an accessible format (e.g., braille, large print, audiotape, or computer diskette... Executive Order 12866 and its overall requirement of reducing regulatory burden that might result from these.../index.html . Waiver of Rulemaking and Delayed Effective Date Under the Administrative Procedure Act (APA...
76 FR 79216 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-21
... of Prisons (Bureau) facilities, any location operated by a contractor authorized to provide computer... DEPARTMENT OF JUSTICE [CPCLO Order No. 005-2011] Privacy Act of 1974; System of Records AGENCY: Federal Bureau of Prisons, Department of Justice. ACTION: Notice of Modification of a System of Records...
76 FR 79216 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-21
...) facilities nationwide, at any location operated by a contractor authorized to provide computer and/or... DEPARTMENT OF JUSTICE [CPCLO Order No. 006-2011] Privacy Act of 1974; System of Records AGENCY: Federal Bureau of Prisons, Department of Justice. ACTION: Notice of Modification of a System of Records...
The Telecom Act, the Internet, and Higher Education.
ERIC Educational Resources Information Center
Hundt, Reed
1999-01-01
Explains political factors in the development of the 1966 Telecommunications Act and how it helped elementary and secondary education in acquiring computers to connect to the Internet; describes the communications revolution; considers the role of government; and discusses how the Internet is changing the entire system of higher education. (LRW)
18 CFR 33.8 - Number of copies.
Code of Federal Regulations, 2012 CFR
2012-04-01
... ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT APPLICATIONS UNDER FEDERAL POWER ACT SECTION 203 § 33.8 Number of copies. The applicant must submit the application or petition to the Secretary of the..., the applicant must submit all such information in electronic format (e.g., on computer diskette or on...
18 CFR 33.8 - Number of copies.
Code of Federal Regulations, 2011 CFR
2011-04-01
... ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT APPLICATIONS UNDER FEDERAL POWER ACT SECTION 203 § 33.8 Number of copies. The applicant must submit the application or petition to the Secretary of the..., the applicant must submit all such information in electronic format (e.g., on computer diskette or on...
18 CFR 33.8 - Number of copies.
Code of Federal Regulations, 2010 CFR
2010-04-01
... ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT APPLICATIONS UNDER FEDERAL POWER ACT SECTION 203 § 33.8 Number of copies. An original and eight copies of the application under this part must be submitted. If..., the applicant must submit all such information in electronic format (e.g., on computer diskette or on...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2011-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2013-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2012-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
5 CFR 919.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2012 CFR
2012-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
5 CFR 919.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2014 CFR
2014-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
41 CFR 105-68.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2012 CFR
2012-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...