Sample records for programmable secure coprocessors

  1. Spring 2006. Industry Study. Information Technology Industry

    DTIC Science & Technology

    2006-01-01

    unclassified c . THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 i Information Technology 2006 ABSTRACT...integration of processors, coprocessors, memory, storage, etc. into a user-programmable final product. C . Software (Apple, Oracle): These firms...able to support the U.S. national security interests. C . Manufacturing: The personal computer manufacturing industry has also changed considerably

  2. A programmable controller based on CAN field bus embedded microprocessor and FPGA

    NASA Astrophysics Data System (ADS)

    Cai, Qizhong; Guo, Yifeng; Chen, Wenhei; Wang, Mingtao

    2008-10-01

    One kind of new programmable controller(PLC) is introduced in this paper. The advanced embedded microprocessor and Field-Programmable Gate Array (FPGA) device are applied in the PLC system. The PLC system structure was presented in this paper. It includes 32 bits Advanced RISC Machines (ARM) embedded microprocessor as control core, FPGA as control arithmetic coprocessor and CAN bus as data communication criteria protocol connected the host controller and its various extension modules. It is detailed given that the circuits and working principle, IiO interface circuit between ARM and FPGA and interface circuit between ARM and FPGA coprocessor. Furthermore the interface circuit diagrams between various modules are written. In addition, it is introduced that ladder chart program how to control the transfer info of control arithmetic part in FPGA coprocessor. The PLC, through nearly two months of operation to meet the design of the basic requirements.

  3. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks

    PubMed Central

    Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.

    2018-01-01

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921

  4. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.

    PubMed

    Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P

    2018-01-16

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  5. Low-power cryptographic coprocessor for autonomous wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Olszyna, Jakub; Winiecki, Wiesław

    2013-10-01

    The concept of autonomous wireless sensor networks involves energy harvesting, as well as effective management of system resources. Public-key cryptography (PKC) offers the advantage of elegant key agreement schemes with which a secret key can be securely established over unsecure channels. In addition to solving the key management problem, the other major application of PKC is digital signatures, with which non-repudiation of messages exchanges can be achieved. The motivation for studying low-power and area efficient modular arithmetic algorithms comes from enabling public-key security for low-power devices that can perform under constrained environment like autonomous wireless sensor networks. This paper presents a cryptographic coprocessor tailored to the autonomous wireless sensor networks constraints. Such hardware circuit is aimed to support the implementation of different public-key cryptosystems based on modular arithmetic in GF(p) and GF(2m). Key components of the coprocessor are described as GEZEL models and can be easily transformed to VHDL and implemented in hardware.

  6. Neuromorphic Computing: A Post-Moore's Law Complementary Architecture

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schuman, Catherine D; Birdwell, John Douglas; Dean, Mark

    2016-01-01

    We describe our approach to post-Moore's law computing with three neuromorphic computing models that share a RISC philosophy, featuring simple components combined with a flexible and programmable structure. We envision these to be leveraged as co-processors, or as data filters to provide in situ data analysis in supercomputing environments.

  7. High Speed Oblivious Random Access Memory (HS-ORAM)

    DTIC Science & Technology

    2015-09-01

    Bryan Parno, “Non-interactive verifiable computing: Outsourcing computation to untrusted workers”, 30th International Cryptology Conference, pp. 465...holder or any other person or corporation; or convey any rights or permission to manufacture , use, or sell any patented invention that may relate to...secure outsourced data access protocols. HS-ORAM deploys a number of server- side software components running inside tamper-proof secure coprocessors

  8. A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors

    DTIC Science & Technology

    2012-01-01

    and mobile phones, lottery ticket vending machines , and various electronic payment systems. The main reason for their use in such applications is that...military applications such as secure communication links. However, the proliferation of Automated Teller Machines (ATMs) in the ’80s introduced them to...commercial applications. Today many popular consumer devices have cryptographic processors in them, for example, smart- cards for pay-TV access machines

  9. FPGA Acceleration of the phylogenetic likelihood function for Bayesian MCMC inference methods.

    PubMed

    Zierke, Stephanie; Bakos, Jason D

    2010-04-12

    Likelihood (ML)-based phylogenetic inference has become a popular method for estimating the evolutionary relationships among species based on genomic sequence data. This method is used in applications such as RAxML, GARLI, MrBayes, PAML, and PAUP. The Phylogenetic Likelihood Function (PLF) is an important kernel computation for this method. The PLF consists of a loop with no conditional behavior or dependencies between iterations. As such it contains a high potential for exploiting parallelism using micro-architectural techniques. In this paper, we describe a technique for mapping the PLF and supporting logic onto a Field Programmable Gate Array (FPGA)-based co-processor. By leveraging the FPGA's on-chip DSP modules and the high-bandwidth local memory attached to the FPGA, the resultant co-processor can accelerate ML-based methods and outperform state-of-the-art multi-core processors. We use the MrBayes 3 tool as a framework for designing our co-processor. For large datasets, we estimate that our accelerated MrBayes, if run on a current-generation FPGA, achieves a 10x speedup relative to software running on a state-of-the-art server-class microprocessor. The FPGA-based implementation achieves its performance by deeply pipelining the likelihood computations, performing multiple floating-point operations in parallel, and through a natural log approximation that is chosen specifically to leverage a deeply pipelined custom architecture. Heterogeneous computing, which combines general-purpose processors with special-purpose co-processors such as FPGAs and GPUs, is a promising approach for high-performance phylogeny inference as shown by the growing body of literature in this field. FPGAs in particular are well-suited for this task because of their low power consumption as compared to many-core processors and Graphics Processor Units (GPUs).

  10. Transparently Interposing User Code at the System Interface

    DTIC Science & Technology

    1992-09-01

    trademarks of Symantec Corporation. AFS is a trademark of Transarc Corporation. PC-cillin is a trademark of Trend Micro Devices, Incorporated. Scribe is a...communication. Finally, both the Norton AntiVirus [Symantec 91b] and PC-cillin [ Trend 90] anti-virus applications intercept destructive file operations made... Trend Micro Devices, Incorporated, 1990. [Tygar & Yee 91] J. D. Tygar, Bennet Yee. Dyad: A System for Using Physically Secure Coprocessors

  11. Using Secure Coprocessors

    DTIC Science & Technology

    1994-05-01

    can easily envision using a microkernel such as Mach 3.0 [31], the NT executive [20], or QNX [40]. We only need to add a communications server and...of the system software architecture. Both hardware subsytems run the CMU Mach 3.0 microkernel [311: the host has special device drivers to support...in the Mach microkernel and a higher- level driver in the Unix server. The low-level drivers handle interrupts and simple device data transfers to

  12. Optimizing legacy molecular dynamics software with directive-based offload

    NASA Astrophysics Data System (ADS)

    Michael Brown, W.; Carrillo, Jan-Michael Y.; Gavhane, Nitin; Thakkar, Foram M.; Plimpton, Steven J.

    2015-10-01

    Directive-based programming models are one solution for exploiting many-core coprocessors to increase simulation rates in molecular dynamics. They offer the potential to reduce code complexity with offload models that can selectively target computations to run on the CPU, the coprocessor, or both. In this paper, we describe modifications to the LAMMPS molecular dynamics code to enable concurrent calculations on a CPU and coprocessor. We demonstrate that standard molecular dynamics algorithms can run efficiently on both the CPU and an x86-based coprocessor using the same subroutines. As a consequence, we demonstrate that code optimizations for the coprocessor also result in speedups on the CPU; in extreme cases up to 4.7X. We provide results for LAMMPS benchmarks and for production molecular dynamics simulations using the Stampede hybrid supercomputer with both Intel® Xeon Phi™ coprocessors and NVIDIA GPUs. The optimizations presented have increased simulation rates by over 2X for organic molecules and over 7X for liquid crystals on Stampede. The optimizations are available as part of the "Intel package" supplied with LAMMPS.

  13. Optimizing legacy molecular dynamics software with directive-based offload

    DOE PAGES

    Michael Brown, W.; Carrillo, Jan-Michael Y.; Gavhane, Nitin; ...

    2015-05-14

    The directive-based programming models are one solution for exploiting many-core coprocessors to increase simulation rates in molecular dynamics. They offer the potential to reduce code complexity with offload models that can selectively target computations to run on the CPU, the coprocessor, or both. In our paper, we describe modifications to the LAMMPS molecular dynamics code to enable concurrent calculations on a CPU and coprocessor. We also demonstrate that standard molecular dynamics algorithms can run efficiently on both the CPU and an x86-based coprocessor using the same subroutines. As a consequence, we demonstrate that code optimizations for the coprocessor also resultmore » in speedups on the CPU; in extreme cases up to 4.7X. We provide results for LAMMAS benchmarks and for production molecular dynamics simulations using the Stampede hybrid supercomputer with both Intel (R) Xeon Phi (TM) coprocessors and NVIDIA GPUs: The optimizations presented have increased simulation rates by over 2X for organic molecules and over 7X for liquid crystals on Stampede. The optimizations are available as part of the "Intel package" supplied with LAMMPS. (C) 2015 Elsevier B.V. All rights reserved.« less

  14. Automated Software Acceleration in Programmable Logic for an Efficient NFFT Algorithm Implementation: A Case Study.

    PubMed

    Rodríguez, Manuel; Magdaleno, Eduardo; Pérez, Fernando; García, Cristhian

    2017-03-28

    Non-equispaced Fast Fourier transform (NFFT) is a very important algorithm in several technological and scientific areas such as synthetic aperture radar, computational photography, medical imaging, telecommunications, seismic analysis and so on. However, its computation complexity is high. In this paper, we describe an efficient NFFT implementation with a hardware coprocessor using an All-Programmable System-on-Chip (APSoC). This is a hybrid device that employs an Advanced RISC Machine (ARM) as Processing System with Programmable Logic for high-performance digital signal processing through parallelism and pipeline techniques. The algorithm has been coded in C language with pragma directives to optimize the architecture of the system. We have used the very novel Software Develop System-on-Chip (SDSoC) evelopment tool that simplifies the interface and partitioning between hardware and software. This provides shorter development cycles and iterative improvements by exploring several architectures of the global system. The computational results shows that hardware acceleration significantly outperformed the software based implementation.

  15. Automated Software Acceleration in Programmable Logic for an Efficient NFFT Algorithm Implementation: A Case Study

    PubMed Central

    Rodríguez, Manuel; Magdaleno, Eduardo; Pérez, Fernando; García, Cristhian

    2017-01-01

    Non-equispaced Fast Fourier transform (NFFT) is a very important algorithm in several technological and scientific areas such as synthetic aperture radar, computational photography, medical imaging, telecommunications, seismic analysis and so on. However, its computation complexity is high. In this paper, we describe an efficient NFFT implementation with a hardware coprocessor using an All-Programmable System-on-Chip (APSoC). This is a hybrid device that employs an Advanced RISC Machine (ARM) as Processing System with Programmable Logic for high-performance digital signal processing through parallelism and pipeline techniques. The algorithm has been coded in C language with pragma directives to optimize the architecture of the system. We have used the very novel Software Develop System-on-Chip (SDSoC) evelopment tool that simplifies the interface and partitioning between hardware and software. This provides shorter development cycles and iterative improvements by exploring several architectures of the global system. The computational results shows that hardware acceleration significantly outperformed the software based implementation. PMID:28350358

  16. Toward a formal verification of a floating-point coprocessor and its composition with a central processing unit

    NASA Technical Reports Server (NTRS)

    Pan, Jing; Levitt, Karl N.; Cohen, Gerald C.

    1991-01-01

    Discussed here is work to formally specify and verify a floating point coprocessor based on the MC68881. The HOL verification system developed at Cambridge University was used. The coprocessor consists of two independent units: the bus interface unit used to communicate with the cpu and the arithmetic processing unit used to perform the actual calculation. Reasoning about the interaction and synchronization among processes using higher order logic is demonstrated.

  17. A floating-point/multiple-precision processor for airborne applications

    NASA Technical Reports Server (NTRS)

    Yee, R.

    1982-01-01

    A compact input output (I/O) numerical processor capable of performing floating-point, multiple precision and other arithmetic functions at execution times which are at least 100 times faster than comparable software emulation is described. The I/O device is a microcomputer system containing a 16 bit microprocessor, a numerical coprocessor with eight 80 bit registers running at a 5 MHz clock rate, 18K random access memory (RAM) and 16K electrically programmable read only memory (EPROM). The processor acts as an intelligent slave to the host computer and can be programmed in high order languages such as FORTRAN and PL/M-86.

  18. List-mode PET image reconstruction for motion correction using the Intel XEON PHI co-processor

    NASA Astrophysics Data System (ADS)

    Ryder, W. J.; Angelis, G. I.; Bashar, R.; Gillam, J. E.; Fulton, R.; Meikle, S.

    2014-03-01

    List-mode image reconstruction with motion correction is computationally expensive, as it requires projection of hundreds of millions of rays through a 3D array. To decrease reconstruction time it is possible to use symmetric multiprocessing computers or graphics processing units. The former can have high financial costs, while the latter can require refactoring of algorithms. The Xeon Phi is a new co-processor card with a Many Integrated Core architecture that can run 4 multiple-instruction, multiple data threads per core with each thread having a 512-bit single instruction, multiple data vector register. Thus, it is possible to run in the region of 220 threads simultaneously. The aim of this study was to investigate whether the Xeon Phi co-processor card is a viable alternative to an x86 Linux server for accelerating List-mode PET image reconstruction for motion correction. An existing list-mode image reconstruction algorithm with motion correction was ported to run on the Xeon Phi coprocessor with the multi-threading implemented using pthreads. There were no differences between images reconstructed using the Phi co-processor card and images reconstructed using the same algorithm run on a Linux server. However, it was found that the reconstruction runtimes were 3 times greater for the Phi than the server. A new version of the image reconstruction algorithm was developed in C++ using OpenMP for mutli-threading and the Phi runtimes decreased to 1.67 times that of the host Linux server. Data transfer from the host to co-processor card was found to be a rate-limiting step; this needs to be carefully considered in order to maximize runtime speeds. When considering the purchase price of a Linux workstation with Xeon Phi co-processor card and top of the range Linux server, the former is a cost-effective computation resource for list-mode image reconstruction. A multi-Phi workstation could be a viable alternative to cluster computers at a lower cost for medical imaging applications.

  19. Coprocessors for quantum devices

    NASA Astrophysics Data System (ADS)

    Kay, Alastair

    2018-03-01

    Quantum devices, from simple fixed-function tools to the ultimate goal of a universal quantum computer, will require high-quality, frequent repetition of a small set of core operations, such as the preparation of entangled states. These tasks are perfectly suited to realization by a coprocessor or supplementary instruction set, as is common practice in modern CPUs. In this paper, we present two quintessentially quantum coprocessor functions: production of a Greenberger-Horne-Zeilinger state and implementation of optimal universal (asymmetric) quantum cloning. Both are based on the evolution of a fixed Hamiltonian. We introduce a technique for deriving the parameters of these Hamiltonians based on the numerical integration of Toda-like flows.

  20. Acceleration of boundary element method for linear elasticity

    NASA Astrophysics Data System (ADS)

    Zapletal, Jan; Merta, Michal; Čermák, Martin

    2017-07-01

    In this work we describe the accelerated assembly of system matrices for the boundary element method using the Intel Xeon Phi coprocessors. We present a model problem, provide a brief overview of its discretization and acceleration of the system matrices assembly using the coprocessors, and test the accelerated version using a numerical benchmark.

  1. DFT algorithms for bit-serial GaAs array processor architectures

    NASA Technical Reports Server (NTRS)

    Mcmillan, Gary B.

    1988-01-01

    Systems and Processes Engineering Corporation (SPEC) has developed an innovative array processor architecture for computing Fourier transforms and other commonly used signal processing algorithms. This architecture is designed to extract the highest possible array performance from state-of-the-art GaAs technology. SPEC's architectural design includes a high performance RISC processor implemented in GaAs, along with a Floating Point Coprocessor and a unique Array Communications Coprocessor, also implemented in GaAs technology. Together, these data processors represent the latest in technology, both from an architectural and implementation viewpoint. SPEC has examined numerous algorithms and parallel processing architectures to determine the optimum array processor architecture. SPEC has developed an array processor architecture with integral communications ability to provide maximum node connectivity. The Array Communications Coprocessor embeds communications operations directly in the core of the processor architecture. A Floating Point Coprocessor architecture has been defined that utilizes Bit-Serial arithmetic units, operating at very high frequency, to perform floating point operations. These Bit-Serial devices reduce the device integration level and complexity to a level compatible with state-of-the-art GaAs device technology.

  2. School Security Assessment Programme in Australia

    ERIC Educational Resources Information Center

    Marrapodi, John

    2007-01-01

    This article describes a successful security risk management programme in Australia. The state-wide programme follows a structured risk management approach focusing on the safety and security of people, information, provision, and assets in the school environment. To assist school principals, a Security Risk Assessment Programme was developed on a…

  3. LDPC decoder with a limited-precision FPGA-based floating-point multiplication coprocessor

    NASA Astrophysics Data System (ADS)

    Moberly, Raymond; O'Sullivan, Michael; Waheed, Khurram

    2007-09-01

    Implementing the sum-product algorithm, in an FPGA with an embedded processor, invites us to consider a tradeoff between computational precision and computational speed. The algorithm, known outside of the signal processing community as Pearl's belief propagation, is used for iterative soft-decision decoding of LDPC codes. We determined the feasibility of a coprocessor that will perform product computations. Our FPGA-based coprocessor (design) performs computer algebra with significantly less precision than the standard (e.g. integer, floating-point) operations of general purpose processors. Using synthesis, targeting a 3,168 LUT Xilinx FPGA, we show that key components of a decoder are feasible and that the full single-precision decoder could be constructed using a larger part. Soft-decision decoding by the iterative belief propagation algorithm is impacted both positively and negatively by a reduction in the precision of the computation. Reducing precision reduces the coding gain, but the limited-precision computation can operate faster. A proposed solution offers custom logic to perform computations with less precision, yet uses the floating-point format to interface with the software. Simulation results show the achievable coding gain. Synthesis results help theorize the the full capacity and performance of an FPGA-based coprocessor.

  4. Heterogeneous computing architecture for fast detection of SNP-SNP interactions.

    PubMed

    Sluga, Davor; Curk, Tomaz; Zupan, Blaz; Lotric, Uros

    2014-06-25

    The extent of data in a typical genome-wide association study (GWAS) poses considerable computational challenges to software tools for gene-gene interaction discovery. Exhaustive evaluation of all interactions among hundreds of thousands to millions of single nucleotide polymorphisms (SNPs) may require weeks or even months of computation. Massively parallel hardware within a modern Graphic Processing Unit (GPU) and Many Integrated Core (MIC) coprocessors can shorten the run time considerably. While the utility of GPU-based implementations in bioinformatics has been well studied, MIC architecture has been introduced only recently and may provide a number of comparative advantages that have yet to be explored and tested. We have developed a heterogeneous, GPU and Intel MIC-accelerated software module for SNP-SNP interaction discovery to replace the previously single-threaded computational core in the interactive web-based data exploration program SNPsyn. We report on differences between these two modern massively parallel architectures and their software environments. Their utility resulted in an order of magnitude shorter execution times when compared to the single-threaded CPU implementation. GPU implementation on a single Nvidia Tesla K20 runs twice as fast as that for the MIC architecture-based Xeon Phi P5110 coprocessor, but also requires considerably more programming effort. General purpose GPUs are a mature platform with large amounts of computing power capable of tackling inherently parallel problems, but can prove demanding for the programmer. On the other hand the new MIC architecture, albeit lacking in performance reduces the programming effort and makes it up with a more general architecture suitable for a wider range of problems.

  5. Heterogeneous computing architecture for fast detection of SNP-SNP interactions

    PubMed Central

    2014-01-01

    Background The extent of data in a typical genome-wide association study (GWAS) poses considerable computational challenges to software tools for gene-gene interaction discovery. Exhaustive evaluation of all interactions among hundreds of thousands to millions of single nucleotide polymorphisms (SNPs) may require weeks or even months of computation. Massively parallel hardware within a modern Graphic Processing Unit (GPU) and Many Integrated Core (MIC) coprocessors can shorten the run time considerably. While the utility of GPU-based implementations in bioinformatics has been well studied, MIC architecture has been introduced only recently and may provide a number of comparative advantages that have yet to be explored and tested. Results We have developed a heterogeneous, GPU and Intel MIC-accelerated software module for SNP-SNP interaction discovery to replace the previously single-threaded computational core in the interactive web-based data exploration program SNPsyn. We report on differences between these two modern massively parallel architectures and their software environments. Their utility resulted in an order of magnitude shorter execution times when compared to the single-threaded CPU implementation. GPU implementation on a single Nvidia Tesla K20 runs twice as fast as that for the MIC architecture-based Xeon Phi P5110 coprocessor, but also requires considerably more programming effort. Conclusions General purpose GPUs are a mature platform with large amounts of computing power capable of tackling inherently parallel problems, but can prove demanding for the programmer. On the other hand the new MIC architecture, albeit lacking in performance reduces the programming effort and makes it up with a more general architecture suitable for a wider range of problems. PMID:24964802

  6. FPGA Coprocessor for Accelerated Classification of Images

    NASA Technical Reports Server (NTRS)

    Pingree, Paula J.; Scharenbroich, Lucas J.; Werne, Thomas A.

    2008-01-01

    An effort related to that described in the preceding article focuses on developing a spaceborne processing platform for fast and accurate onboard classification of image data, a critical part of modern satellite image processing. The approach again has been to exploit the versatility of recently developed hybrid Virtex-4FX field-programmable gate array (FPGA) to run diverse science applications on embedded processors while taking advantage of the reconfigurable hardware resources of the FPGAs. In this case, the FPGA serves as a coprocessor that implements legacy C-language support-vector-machine (SVM) image-classification algorithms to detect and identify natural phenomena such as flooding, volcanic eruptions, and sea-ice break-up. The FPGA provides hardware acceleration for increased onboard processing capability than previously demonstrated in software. The original C-language program demonstrated on an imaging instrument aboard the Earth Observing-1 (EO-1) satellite implements a linear-kernel SVM algorithm for classifying parts of the images as snow, water, ice, land, or cloud or unclassified. Current onboard processors, such as on EO-1, have limited computing power, extremely limited active storage capability and are no longer considered state-of-the-art. Using commercially available software that translates C-language programs into hardware description language (HDL) files, the legacy C-language program, and two newly formulated programs for a more capable expanded-linear-kernel and a more accurate polynomial-kernel SVM algorithm, have been implemented in the Virtex-4FX FPGA. In tests, the FPGA implementations have exhibited significant speedups over conventional software implementations running on general-purpose hardware.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Luszczek, Piotr R; Tomov, Stanimire Z; Dongarra, Jack J

    We present an efficient and scalable programming model for the development of linear algebra in heterogeneous multi-coprocessor environments. The model incorporates some of the current best design and implementation practices for the heterogeneous acceleration of dense linear algebra (DLA). Examples are given as the basis for solving linear systems' algorithms - the LU, QR, and Cholesky factorizations. To generate the extreme level of parallelism needed for the efficient use of coprocessors, algorithms of interest are redesigned and then split into well-chosen computational tasks. The tasks execution is scheduled over the computational components of a hybrid system of multi-core CPUs andmore » coprocessors using a light-weight runtime system. The use of lightweight runtime systems keeps scheduling overhead low, while enabling the expression of parallelism through otherwise sequential code. This simplifies the development efforts and allows the exploration of the unique strengths of the various hardware components.« less

  8. Accelerating gravitational microlensing simulations using the Xeon Phi coprocessor

    NASA Astrophysics Data System (ADS)

    Chen, B.; Kantowski, R.; Dai, X.; Baron, E.; Van der Mark, P.

    2017-04-01

    Recently Graphics Processing Units (GPUs) have been used to speed up very CPU-intensive gravitational microlensing simulations. In this work, we use the Xeon Phi coprocessor to accelerate such simulations and compare its performance on a microlensing code with that of NVIDIA's GPUs. For the selected set of parameters evaluated in our experiment, we find that the speedup by Intel's Knights Corner coprocessor is comparable to that by NVIDIA's Fermi family of GPUs with compute capability 2.0, but less significant than GPUs with higher compute capabilities such as the Kepler. However, the very recently released second generation Xeon Phi, Knights Landing, is about 5.8 times faster than the Knights Corner, and about 2.9 times faster than the Kepler GPU used in our simulations. We conclude that the Xeon Phi is a very promising alternative to GPUs for modern high performance microlensing simulations.

  9. Fast 2D FWI on a multi and many-cores workstation.

    NASA Astrophysics Data System (ADS)

    Thierry, Philippe; Donno, Daniela; Noble, Mark

    2014-05-01

    Following the introduction of x86 co-processors (Xeon Phi) and the performance increase of standard 2-socket workstations using the latest 12 cores E5-v2 x86-64 CPU, we present here a MPI + OpenMP implementation of an acoustic 2D FWI (full waveform inversion) code which simultaneously runs on the CPUs and on the co-processors installed in a workstation. The main advantage of running a 2D FWI on a workstation is to be able to quickly evaluate new features such as more complicated wave equations, new cost functions, finite-difference stencils or boundary conditions. Since the co-processor is made of 61 in-order x86 cores, each of them having up to 4 threads, this many-core can be seen as a shared memory SMP (symmetric multiprocessing) machine with its own IP address. Depending on the vendor, a single workstation can handle several co-processors making the workstation as a personal cluster under the desk. The original Fortran 90 CPU version of the 2D FWI code is just recompiled to get a Xeon Phi x86 binary. This multi and many-core configuration uses standard compilers and associated MPI as well as math libraries under Linux; therefore, the cost of code development remains constant, while improving computation time. We choose to implement the code with the so-called symmetric mode to fully use the capacity of the workstation, but we also evaluate the scalability of the code in native mode (i.e running only on the co-processor) thanks to the Linux ssh and NFS capabilities. Usual care of optimization and SIMD vectorization is used to ensure optimal performances, and to analyze the application performances and bottlenecks on both platforms. The 2D FWI implementation uses finite-difference time-domain forward modeling and a quasi-Newton (with L-BFGS algorithm) optimization scheme for the model parameters update. Parallelization is achieved through standard MPI shot gathers distribution and OpenMP for domain decomposition within the co-processor. Taking advantage of the 16 GB of memory available on the co-processor we are able to keep wavefields in memory to achieve the gradient computation by cross-correlation of forward and back-propagated wavefields needed by our time-domain FWI scheme, without heavy traffic on the i/o subsystem and PCIe bus. In this presentation we will also review some simple methodologies to determine performance expectation compared to real performances in order to get optimization effort estimation before starting any huge modification or rewriting of research codes. The key message is the ease of use and development of this hybrid configuration to reach not the absolute peak performance value but the optimal one that ensures the best balance between geophysical and computer developments.

  10. Flexible digital signal processing architecture for narrowband and spread-spectrum lock-in detection in multiphoton microscopy and time-resolved spectroscopy

    PubMed Central

    Wilson, Jesse W.; Park, Jong Kang; Warren, Warren S.

    2015-01-01

    The lock-in amplifier is a critical component in many different types of experiments, because of its ability to reduce spurious or environmental noise components by restricting detection to a single frequency and phase. One example application is pump-probe microscopy, a multiphoton technique that leverages excited-state dynamics for imaging contrast. With this application in mind, we present here the design and implementation of a high-speed lock-in amplifier on the field-programmable gate array (FPGA) coprocessor of a data acquisition board. The most important advantage is the inherent ability to filter signals based on more complex modulation patterns. As an example, we use the flexibility of the FPGA approach to enable a novel pump-probe detection scheme based on spread-spectrum communications techniques. PMID:25832238

  11. Flexible digital signal processing architecture for narrowband and spread-spectrum lock-in detection in multiphoton microscopy and time-resolved spectroscopy.

    PubMed

    Wilson, Jesse W; Park, Jong Kang; Warren, Warren S; Fischer, Martin C

    2015-03-01

    The lock-in amplifier is a critical component in many different types of experiments, because of its ability to reduce spurious or environmental noise components by restricting detection to a single frequency and phase. One example application is pump-probe microscopy, a multiphoton technique that leverages excited-state dynamics for imaging contrast. With this application in mind, we present here the design and implementation of a high-speed lock-in amplifier on the field-programmable gate array (FPGA) coprocessor of a data acquisition board. The most important advantage is the inherent ability to filter signals based on more complex modulation patterns. As an example, we use the flexibility of the FPGA approach to enable a novel pump-probe detection scheme based on spread-spectrum communications techniques.

  12. Leveraging Safety Programs to Improve and Support Security Programs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leach, Janice; Snell, Mark K.; Pratt, R.

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  13. HECWRC, Flood Flow Frequency Analysis Computer Program 723-X6-L7550

    DTIC Science & Technology

    1989-02-14

    AGENCY NAME AND ADDRESS, ORDER NO., ETC. (1 NTS sells, leave blank) 11. PRICE INFORMA-ION Price includes documentation: Price code: DO1 $50.00 12 ...required is 256 K. Math coprocessor (8087/80287/80387) is highly recommended but not required. 16. DATA FILE TECHNICAL DESCRIPTION The software is...disk drive (360 KB or 1.2 MB). A 10 MB or larger hard disk is recommended. Math coprocessor (8087/80287/80387) is highly recommended but not renuired

  14. Implementing Legacy-C Algorithms in FPGA Co-Processors for Performance Accelerated Smart Payloads

    NASA Technical Reports Server (NTRS)

    Pingree, Paula J.; Scharenbroich, Lucas J.; Werne, Thomas A.; Hartzell, Christine

    2008-01-01

    Accurate, on-board classification of instrument data is used to increase science return by autonomously identifying regions of interest for priority transmission or generating summary products to conserve transmission bandwidth. Due to on-board processing constraints, such classification has been limited to using the simplest functions on a small subset of the full instrument data. FPGA co-processor designs for SVM1 classifiers will lead to significant improvement in on-board classification capability and accuracy.

  15. Low-power coprocessor for Haar-like feature extraction with pixel-based pipelined architecture

    NASA Astrophysics Data System (ADS)

    Luo, Aiwen; An, Fengwei; Fujita, Yuki; Zhang, Xiangyu; Chen, Lei; Jürgen Mattausch, Hans

    2017-04-01

    Intelligent analysis of image and video data requires image-feature extraction as an important processing capability for machine-vision realization. A coprocessor with pixel-based pipeline (CFEPP) architecture is developed for real-time Haar-like cell-based feature extraction. Synchronization with the image sensor’s pixel frequency and immediate usage of each input pixel for the feature-construction process avoids the dependence on memory-intensive conventional strategies like integral-image construction or frame buffers. One 180 nm CMOS prototype can extract the 1680-dimensional Haar-like feature vectors, applied in the speeded up robust features (SURF) scheme, using an on-chip memory of only 96 kb (kilobit). Additionally, a low power dissipation of only 43.45 mW at 1.8 V supply voltage is achieved during VGA video procession at 120 MHz frequency with more than 325 fps. The Haar-like feature-extraction coprocessor is further evaluated by the practical application of vehicle recognition, achieving the expected high accuracy which is comparable to previous work.

  16. GPU-Accelerated Molecular Modeling Coming Of Age

    PubMed Central

    Stone, John E.; Hardy, David J.; Ufimtsev, Ivan S.

    2010-01-01

    Graphics processing units (GPUs) have traditionally been used in molecular modeling solely for visualization of molecular structures and animation of trajectories resulting from molecular dynamics simulations. Modern GPUs have evolved into fully programmable, massively parallel co-processors that can now be exploited to accelerate many scientific computations, typically providing about one order of magnitude speedup over CPU code and in special cases providing speedups of two orders of magnitude. This paper surveys the development of molecular modeling algorithms that leverage GPU computing, the advances already made and remaining issues to be resolved, and the continuing evolution of GPU technology that promises to become even more useful to molecular modeling. Hardware acceleration with commodity GPUs is expected to benefit the overall computational biology community by bringing teraflops performance to desktop workstations and in some cases potentially changing what were formerly batch-mode computational jobs into interactive tasks. PMID:20675161

  17. GPU-accelerated molecular modeling coming of age.

    PubMed

    Stone, John E; Hardy, David J; Ufimtsev, Ivan S; Schulten, Klaus

    2010-09-01

    Graphics processing units (GPUs) have traditionally been used in molecular modeling solely for visualization of molecular structures and animation of trajectories resulting from molecular dynamics simulations. Modern GPUs have evolved into fully programmable, massively parallel co-processors that can now be exploited to accelerate many scientific computations, typically providing about one order of magnitude speedup over CPU code and in special cases providing speedups of two orders of magnitude. This paper surveys the development of molecular modeling algorithms that leverage GPU computing, the advances already made and remaining issues to be resolved, and the continuing evolution of GPU technology that promises to become even more useful to molecular modeling. Hardware acceleration with commodity GPUs is expected to benefit the overall computational biology community by bringing teraflops performance to desktop workstations and in some cases potentially changing what were formerly batch-mode computational jobs into interactive tasks. (c) 2010 Elsevier Inc. All rights reserved.

  18. Evaluating the transport layer of the ALFA framework for the Intel® Xeon Phi™ Coprocessor

    NASA Astrophysics Data System (ADS)

    Santogidis, Aram; Hirstius, Andreas; Lalis, Spyros

    2015-12-01

    The ALFA framework supports the software development of major High Energy Physics experiments. As part of our research effort to optimize the transport layer of ALFA, we focus on profiling its data transfer performance for inter-node communication on the Intel Xeon Phi Coprocessor. In this article we present the collected performance measurements with the related analysis of the results. The optimization opportunities that are discovered, help us to formulate the future plans of enabling high performance data transfer for ALFA on the Intel Xeon Phi architecture.

  19. Security mechanism based on Hospital Authentication Server for secure application of implantable medical devices.

    PubMed

    Park, Chang-Seop

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  20. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    PubMed Central

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

  1. GPs' role security and therapeutic commitment in managing alcohol problems: a randomised controlled trial of a tailored improvement programme.

    PubMed

    Keurhorst, Myrna; van Beurden, Ivonne; Anderson, Peter; Heinen, Maud; Akkermans, Reinier; Wensing, Michel; Laurant, Miranda

    2014-04-17

    General practitioners with more positive role security and therapeutic commitment towards patients with hazardous or harmful alcohol consumption are more involved and manage more alcohol-related problems than others. In this study we evaluated the effects of our tailored multi-faceted improvement implementation programme on GPs' role security and therapeutic commitment and, in addition, which professional related factors influenced the impact of the implementation programme. In a cluster randomised controlled trial, 124 GPs from 82 Dutch general practices were randomised to either the intervention or control group. The tailored, multi-faceted programme included combined physician, organisation, and patient directed alcohol-specific implementation strategies to increase role security and therapeutic commitment in GPs. The control group was mailed the national guideline and patients received feedback letters. Questionnaires were completed before and 12 months after start of the programme. We performed linear multilevel regression analysis to evaluate effects of the implementation programme. Participating GPs were predominantly male (63%) and had received very low levels of alcohol related education before start of the study (0.4 h). The programme increased therapeutic commitment (p = 0.005; 95%-CI 0.13 - 0.73) but not role security (p = 0.58; 95%-CI -0.31 - 0.54). How important GPs thought it was to improve their care for problematic alcohol consumption, and the GPs' reported proportion of patients asked about alcohol consumption at baseline, contributed to the effect of the programme on therapeutic commitment. A tailored, multi-faceted programme aimed at improving GP management of patients with hazardous and harmful alcohol consumption improved GPs' therapeutic commitment towards patients with alcohol-related problems, but failed to improve GPs' role security. How important GPs thought it was to improve their care for problematic alcohol consumption, and the GPs' reported proportion of patients asked about alcohol consumption at baseline, both increased the impact of the programme on therapeutic commitment. It might be worthwhile to monitor proceeding of role security and therapeutic commitment throughout the year after the implementation programme, to see whether the programme is effective on short term but faded out on the longer term. ClinicalTrials.gov Identifier: NCT00298220.

  2. Parallel Mutual Information Based Construction of Genome-Scale Networks on the Intel® Xeon Phi™ Coprocessor.

    PubMed

    Misra, Sanchit; Pamnany, Kiran; Aluru, Srinivas

    2015-01-01

    Construction of whole-genome networks from large-scale gene expression data is an important problem in systems biology. While several techniques have been developed, most cannot handle network reconstruction at the whole-genome scale, and the few that can, require large clusters. In this paper, we present a solution on the Intel Xeon Phi coprocessor, taking advantage of its multi-level parallelism including many x86-based cores, multiple threads per core, and vector processing units. We also present a solution on the Intel® Xeon® processor. Our solution is based on TINGe, a fast parallel network reconstruction technique that uses mutual information and permutation testing for assessing statistical significance. We demonstrate the first ever inference of a plant whole genome regulatory network on a single chip by constructing a 15,575 gene network of the plant Arabidopsis thaliana from 3,137 microarray experiments in only 22 minutes. In addition, our optimization for parallelizing mutual information computation on the Intel Xeon Phi coprocessor holds out lessons that are applicable to other domains.

  3. Quantum-classical interface based on single flux quantum digital logic

    NASA Astrophysics Data System (ADS)

    McDermott, R.; Vavilov, M. G.; Plourde, B. L. T.; Wilhelm, F. K.; Liebermann, P. J.; Mukhanov, O. A.; Ohki, T. A.

    2018-04-01

    We describe an approach to the integrated control and measurement of a large-scale superconducting multiqubit array comprising up to 108 physical qubits using a proximal coprocessor based on the Single Flux Quantum (SFQ) digital logic family. Coherent control is realized by irradiating the qubits directly with classical bitstreams derived from optimal control theory. Qubit measurement is performed by a Josephson photon counter, which provides access to the classical result of projective quantum measurement at the millikelvin stage. We analyze the power budget and physical footprint of the SFQ coprocessor and discuss challenges and opportunities associated with this approach.

  4. Rapid geodesic mapping of brain functional connectivity: implementation of a dedicated co-processor in a field-programmable gate array (FPGA) and application to resting state functional MRI.

    PubMed

    Minati, Ludovico; Cercignani, Mara; Chan, Dennis

    2013-10-01

    Graph theory-based analyses of brain network topology can be used to model the spatiotemporal correlations in neural activity detected through fMRI, and such approaches have wide-ranging potential, from detection of alterations in preclinical Alzheimer's disease through to command identification in brain-machine interfaces. However, due to prohibitive computational costs, graph-based analyses to date have principally focused on measuring connection density rather than mapping the topological architecture in full by exhaustive shortest-path determination. This paper outlines a solution to this problem through parallel implementation of Dijkstra's algorithm in programmable logic. The processor design is optimized for large, sparse graphs and provided in full as synthesizable VHDL code. An acceleration factor between 15 and 18 is obtained on a representative resting-state fMRI dataset, and maps of Euclidean path length reveal the anticipated heterogeneous cortical involvement in long-range integrative processing. These results enable high-resolution geodesic connectivity mapping for resting-state fMRI in patient populations and real-time geodesic mapping to support identification of imagined actions for fMRI-based brain-machine interfaces. Copyright © 2013 IPEM. Published by Elsevier Ltd. All rights reserved.

  5. Extension of the AMBER molecular dynamics software to Intel's Many Integrated Core (MIC) architecture

    NASA Astrophysics Data System (ADS)

    Needham, Perri J.; Bhuiyan, Ashraf; Walker, Ross C.

    2016-04-01

    We present an implementation of explicit solvent particle mesh Ewald (PME) classical molecular dynamics (MD) within the PMEMD molecular dynamics engine, that forms part of the AMBER v14 MD software package, that makes use of Intel Xeon Phi coprocessors by offloading portions of the PME direct summation and neighbor list build to the coprocessor. We refer to this implementation as pmemd MIC offload and in this paper present the technical details of the algorithm, including basic models for MPI and OpenMP configuration, and analyze the resultant performance. The algorithm provides the best performance improvement for large systems (>400,000 atoms), achieving a ∼35% performance improvement for satellite tobacco mosaic virus (1,067,095 atoms) when 2 Intel E5-2697 v2 processors (2 ×12 cores, 30M cache, 2.7 GHz) are coupled to an Intel Xeon Phi coprocessor (Model 7120P-1.238/1.333 GHz, 61 cores). The implementation utilizes a two-fold decomposition strategy: spatial decomposition using an MPI library and thread-based decomposition using OpenMP. We also present compiler optimization settings that improve the performance on Intel Xeon processors, while retaining simulation accuracy.

  6. Automatic translation of MPI source into a latency-tolerant, data-driven form

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nguyen, Tan; Cicotti, Pietro; Bylaska, Eric

    Hiding communication behind useful computation is an important performance programming technique but remains an inscrutable programming exercise even for the expert. We present Bamboo, a code transformation framework that can realize communication overlap in applications written in MPI without the need to intrusively modify the source code. We reformulate MPI source into a task dependency graph representation, which partially orders the tasks, enabling the program to execute in a data-driven fashion under the control of an external runtime system. Experimental results demonstrate that Bamboo significantly reduces communication delays while requiring only modest amounts of programmer annotation for a variety ofmore » applications and platforms, including those employing co-processors and accelerators. Moreover, Bamboo’s performance meets or exceeds that of labor-intensive hand coding. As a result, the translator is more than a means of hiding communication costs automatically; it demonstrates the utility of semantic level optimization against a well-known library.« less

  7. Automatic translation of MPI source into a latency-tolerant, data-driven form

    DOE PAGES

    Nguyen, Tan; Cicotti, Pietro; Bylaska, Eric; ...

    2017-03-06

    Hiding communication behind useful computation is an important performance programming technique but remains an inscrutable programming exercise even for the expert. We present Bamboo, a code transformation framework that can realize communication overlap in applications written in MPI without the need to intrusively modify the source code. We reformulate MPI source into a task dependency graph representation, which partially orders the tasks, enabling the program to execute in a data-driven fashion under the control of an external runtime system. Experimental results demonstrate that Bamboo significantly reduces communication delays while requiring only modest amounts of programmer annotation for a variety ofmore » applications and platforms, including those employing co-processors and accelerators. Moreover, Bamboo’s performance meets or exceeds that of labor-intensive hand coding. As a result, the translator is more than a means of hiding communication costs automatically; it demonstrates the utility of semantic level optimization against a well-known library.« less

  8. Automatic translation of MPI source into a latency-tolerant, data-driven form

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nguyen, Tan; Cicotti, Pietro; Bylaska, Eric

    Hiding communication behind useful computation is an important performance programming technique but remains an inscrutable programming exercise even for the expert. We present Bamboo, a code transformation framework that can realize communication overlap in applications written in MPI without the need to intrusively modify the source code. Bamboo reformulates MPI source into the form of a task dependency graph that expresses a partial ordering among tasks, enabling the program to execute in a data-driven fashion under the control of an external runtime system. Experimental results demonstrate that Bamboo significantly reduces communication delays while requiring only modest amounts of programmer annotationmore » for a variety of applications and platforms, including those employing co-processors and accelerators. Moreover, Bamboo's performance meets or exceeds that of labor-intensive hand coding. The translator is more than a means of hiding communication costs automatically; it demonstrates the utility of semantic level optimization against a wellknown library.« less

  9. A Linked List-Based Algorithm for Blob Detection on Embedded Vision-Based Sensors.

    PubMed

    Acevedo-Avila, Ricardo; Gonzalez-Mendoza, Miguel; Garcia-Garcia, Andres

    2016-05-28

    Blob detection is a common task in vision-based applications. Most existing algorithms are aimed at execution on general purpose computers; while very few can be adapted to the computing restrictions present in embedded platforms. This paper focuses on the design of an algorithm capable of real-time blob detection that minimizes system memory consumption. The proposed algorithm detects objects in one image scan; it is based on a linked-list data structure tree used to label blobs depending on their shape and node information. An example application showing the results of a blob detection co-processor has been built on a low-powered field programmable gate array hardware as a step towards developing a smart video surveillance system. The detection method is intended for general purpose application. As such, several test cases focused on character recognition are also examined. The results obtained present a fair trade-off between accuracy and memory requirements; and prove the validity of the proposed approach for real-time implementation on resource-constrained computing platforms.

  10. Digitally Controlled ’Programmable’ Active Filters.

    DTIC Science & Technology

    1985-12-01

    Advisor: Sherif Michael Approved for public release; distribution is unlimited. U - ~ .%~ ~ % %’.4 ~ -. 4-. " %’ -. .4. z. . 4, ,4°*-4° -o - ’ SECURITY ...CLASSIFICATION O THI PAGE ff ,’- -""" REPORT DOCUMENTATION PAGE Ia REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2a SECURITY CLASSIFICATION...ELEMENT NO. NO NO. ACCESSION NO. S 11 TITLE (Include Security ClassWfication) , DIGITALLY CONTROLLED "PROGRAMMABLE" ACTIVE FILTERS 1 PERSONAL AUTHOR

  11. MATCHED FILTER COMPUTATION ON FPGA, CELL, AND GPU

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    BAKER, ZACHARY K.; GOKHALE, MAYA B.; TRIPP, JUSTIN L.

    2007-01-08

    The matched filter is an important kernel in the processing of hyperspectral data. The filter enables researchers to sift useful data from instruments that span large frequency bands. In this work, they evaluate the performance of a matched filter algorithm implementation on accelerated co-processor (XD1000), the IBM Cell microprocessor, and the NVIDIA GeForce 6900 GTX GPU graphics card. They provide extensive discussion of the challenges and opportunities afforded by each platform. In particular, they explore the problems of partitioning the filter most efficiently between the host CPU and the co-processor. Using their results, they derive several performance metrics that providemore » the optimal solution for a variety of application situations.« less

  12. Implementation of High-Order Multireference Coupled-Cluster Methods on Intel Many Integrated Core Architecture.

    PubMed

    Aprà, E; Kowalski, K

    2016-03-08

    In this paper we discuss the implementation of multireference coupled-cluster formalism with singles, doubles, and noniterative triples (MRCCSD(T)), which is capable of taking advantage of the processing power of the Intel Xeon Phi coprocessor. We discuss the integration of two levels of parallelism underlying the MRCCSD(T) implementation with computational kernels designed to offload the computationally intensive parts of the MRCCSD(T) formalism to Intel Xeon Phi coprocessors. Special attention is given to the enhancement of the parallel performance by task reordering that has improved load balancing in the noniterative part of the MRCCSD(T) calculations. We also discuss aspects regarding efficient optimization and vectorization strategies.

  13. Requirements analysis for a hardware, discrete-event, simulation engine accelerator

    NASA Astrophysics Data System (ADS)

    Taylor, Paul J., Jr.

    1991-12-01

    An analysis of a general Discrete Event Simulation (DES), executing on the distributed architecture of an eight mode Intel PSC/2 hypercube, was performed. The most time consuming portions of the general DES algorithm were determined to be the functions associated with message passing of required simulation data between processing nodes of the hypercube architecture. A behavioral description, using the IEEE standard VHSIC Hardware Description and Design Language (VHDL), for a general DES hardware accelerator is presented. The behavioral description specifies the operational requirements for a DES coprocessor to augment the hypercube's execution of DES simulations. The DES coprocessor design implements the functions necessary to perform distributed discrete event simulations using a conservative time synchronization protocol.

  14. Vectorization for Molecular Dynamics on Intel Xeon Phi Corpocessors

    NASA Astrophysics Data System (ADS)

    Yi, Hongsuk

    2014-03-01

    Many modern processors are capable of exploiting data-level parallelism through the use of single instruction multiple data (SIMD) execution. The new Intel Xeon Phi coprocessor supports 512 bit vector registers for the high performance computing. In this paper, we have developed a hierarchical parallelization scheme for accelerated molecular dynamics simulations with the Terfoff potentials for covalent bond solid crystals on Intel Xeon Phi coprocessor systems. The scheme exploits multi-level parallelism computing. We combine thread-level parallelism using a tightly coupled thread-level and task-level parallelism with 512-bit vector register. The simulation results show that the parallel performance of SIMD implementations on Xeon Phi is apparently superior to their x86 CPU architecture.

  15. Multi-Kepler GPU vs. multi-Intel MIC for spin systems simulations

    NASA Astrophysics Data System (ADS)

    Bernaschi, M.; Bisson, M.; Salvadore, F.

    2014-10-01

    We present and compare the performances of two many-core architectures: the Nvidia Kepler and the Intel MIC both in a single system and in cluster configuration for the simulation of spin systems. As a benchmark we consider the time required to update a single spin of the 3D Heisenberg spin glass model by using the Over-relaxation algorithm. We present data also for a traditional high-end multi-core architecture: the Intel Sandy Bridge. The results show that although on the two Intel architectures it is possible to use basically the same code, the performances of a Intel MIC change dramatically depending on (apparently) minor details. Another issue is that to obtain a reasonable scalability with the Intel Phi coprocessor (Phi is the coprocessor that implements the MIC architecture) in a cluster configuration it is necessary to use the so-called offload mode which reduces the performances of the single system. As to the GPU, the Kepler architecture offers a clear advantage with respect to the previous Fermi architecture maintaining exactly the same source code. Scalability of the multi-GPU implementation remains very good by using the CPU as a communication co-processor of the GPU. All source codes are provided for inspection and for double-checking the results.

  16. WATEQ4F - a personal computer Fortran translation of the geochemical model WATEQ2 with revised data base

    USGS Publications Warehouse

    Ball, J.W.; Nordstrom, D. Kirk; Zachmann, D.W.

    1987-01-01

    A FORTRAN 77 version of the PL/1 computer program for the geochemical model WATEQ2, which computes major and trace element speciation and mineral saturation for natural waters has been developed. The code (WATEQ4F) has been adapted to execute on an IBM PC or compatible microcomputer. Two versions of the code are available, one operating with IBM Professional FORTRAN and an 8087 or 89287 numeric coprocessor, and one which operates without a numeric coprocessor using Microsoft FORTRAN 77. The calculation procedure is identical to WATEQ2, which has been installed on many mainframes and minicomputers. Limited data base revisions include the addition of the following ions: AlHS04(++), BaS04, CaHS04(++), FeHS04(++), NaF, SrC03, and SrHCO3(+). This report provides the reactions and references for the data base revisions, instructions for program operation, and an explanation of the input and output files. Attachments contain sample output from three water analyses used as test cases and the complete FORTRAN source listing. U.S. Geological Survey geochemical simulation program PHREEQE and mass balance program BALANCE also have been adapted to execute on an IBM PC or compatible microcomputer with a numeric coprocessor and the IBM Professional FORTRAN compiler. (Author 's abstract)

  17. Chapter 13. Exploring Use of the Reserved Core

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Holmen, John; Humphrey, Alan; Berzins, Martin

    2015-07-29

    In this chapter, we illustrate benefits of thinking in terms of thread management techniques when using a centralized scheduler model along with interoperability of MPI and PThread. This is facilitated through an exploration of thread placement strategies for an algorithm modeling radiative heat transfer with special attention to the 61st core. This algorithm plays a key role within the Uintah Computational Framework (UCF) and current efforts taking place at the University of Utah to model next-generation, large-scale clean coal boilers. In such simulations, this algorithm models the dominant form of heat transfer and consumes a large portion of compute time.more » Exemplified by a real-world example, this chapter presents our early efforts in porting a key portion of a scalability-centric codebase to the Intel Xeon Phi coprocessor. Specifically, this chapter presents results from our experiments profiling the native execution of a reverse Monte-Carlo ray tracing-based radiation model on a single coprocessor. These results demonstrate that our fastest run configurations utilized the 61st core and that performance was not profoundly impacted when explicitly oversubscribing the coprocessor operating system thread. Additionally, this chapter presents a portion of radiation model source code, a MIC-centric UCF cross-compilation example, and less conventional thread management technique for developers utilizing the PThreads threading model.« less

  18. Exact diagonalization of quantum lattice models on coprocessors

    NASA Astrophysics Data System (ADS)

    Siro, T.; Harju, A.

    2016-10-01

    We implement the Lanczos algorithm on an Intel Xeon Phi coprocessor and compare its performance to a multi-core Intel Xeon CPU and an NVIDIA graphics processor. The Xeon and the Xeon Phi are parallelized with OpenMP and the graphics processor is programmed with CUDA. The performance is evaluated by measuring the execution time of a single step in the Lanczos algorithm. We study two quantum lattice models with different particle numbers, and conclude that for small systems, the multi-core CPU is the fastest platform, while for large systems, the graphics processor is the clear winner, reaching speedups of up to 7.6 compared to the CPU. The Xeon Phi outperforms the CPU with sufficiently large particle number, reaching a speedup of 2.5.

  19. B-MIC: An Ultrafast Three-Level Parallel Sequence Aligner Using MIC.

    PubMed

    Cui, Yingbo; Liao, Xiangke; Zhu, Xiaoqian; Wang, Bingqiang; Peng, Shaoliang

    2016-03-01

    Sequence alignment is the central process for sequence analysis, where mapping raw sequencing data to reference genome. The large amount of data generated by NGS is far beyond the process capabilities of existing alignment tools. Consequently, sequence alignment becomes the bottleneck of sequence analysis. Intensive computing power is required to address this challenge. Intel recently announced the MIC coprocessor, which can provide massive computing power. The Tianhe-2 is the world's fastest supercomputer now equipped with three MIC coprocessors each compute node. A key feature of sequence alignment is that different reads are independent. Considering this property, we proposed a MIC-oriented three-level parallelization strategy to speed up BWA, a widely used sequence alignment tool, and developed our ultrafast parallel sequence aligner: B-MIC. B-MIC contains three levels of parallelization: firstly, parallelization of data IO and reads alignment by a three-stage parallel pipeline; secondly, parallelization enabled by MIC coprocessor technology; thirdly, inter-node parallelization implemented by MPI. In this paper, we demonstrate that B-MIC outperforms BWA by a combination of those techniques using Inspur NF5280M server and the Tianhe-2 supercomputer. To the best of our knowledge, B-MIC is the first sequence alignment tool to run on Intel MIC and it can achieve more than fivefold speedup over the original BWA while maintaining the alignment precision.

  20. Semantically Aware Foundation Environment (SAFE) for Clean-Slate Design of Resilient, Adaptive Secure Hosts (CRASH)

    DTIC Science & Technology

    2016-02-01

    system consists of a high-fidelity hardware simulation using field programmable gate arrays (FPGAs), with a set of runtime services (ConcreteWare...perimeter protection, patch, and pray” is not aligned with the threat. Programmers will not bail us out of this situation (by writing defect free code...hosted on a Field Programmable Gate Array (FPGA), with a set of runtime services (concreteware) running on the hardware. Secure applications can be

  1. An object-oriented, coprocessor-accelerated model for ice sheet simulations

    NASA Astrophysics Data System (ADS)

    Seddik, H.; Greve, R.

    2013-12-01

    Recently, numerous models capable of modeling the thermo-dynamics of ice sheets have been developed within the ice sheet modeling community. Their capabilities have been characterized by a wide range of features with different numerical methods (finite difference or finite element), different implementations of the ice flow mechanics (shallow-ice, higher-order, full Stokes) and different treatments for the basal and coastal areas (basal hydrology, basal sliding, ice shelves). Shallow-ice models (SICOPOLIS, IcIES, PISM, etc) have been widely used for modeling whole ice sheets (Greenland and Antarctica) due to the relatively low computational cost of the shallow-ice approximation but higher order (ISSM, AIF) and full Stokes (Elmer/Ice) models have been recently used to model the Greenland ice sheet. The advance in processor speed and the decrease in cost for accessing large amount of memory and storage have undoubtedly been the driving force in the commoditization of models with higher capabilities, and the popularity of Elmer/Ice (http://elmerice.elmerfem.com) with an active user base is a notable representation of this trend. Elmer/Ice is a full Stokes model built on top of the multi-physics package Elmer (http://www.csc.fi/english/pages/elmer) which provides the full machinery for the complex finite element procedure and is fully parallel (mesh partitioning with OpenMPI communication). Elmer is mainly written in Fortran 90 and targets essentially traditional processors as the code base was not initially written to run on modern coprocessors (yet adding support for the recently introduced x86 based coprocessors is possible). Furthermore, a truly modular and object-oriented implementation is required for quick adaptation to fast evolving capabilities in hardware (Fortran 2003 provides an object-oriented programming model while not being clean and requiring a tricky refactoring of Elmer code). In this work, the object-oriented, coprocessor-accelerated finite element code Sainou is introduced. Sainou is an Elmer fork which is reimplemented in Objective C and used for experimenting with ice sheet models running on coprocessors, essentially GPU devices. GPUs are highly parallel processors that provide opportunities for fine-grained parallelization of the full Stokes problem using the standard OpenCL language (http://www.khronos.org/opencl/) to access the device. Sainou is built upon a collection of Objective C base classes that service a modular kernel (itself a base class) which provides the core methods to solve the finite element problem. An early implementation of Sainou will be presented with emphasis on the object architecture and the strategies of parallelizations. The computation of a simple heat conduction problem is used to test the implementation which also provides experimental support for running the global matrix assembly on GPU.

  2. Accelerating a MPEG-4 video decoder through custom software/hardware co-design

    NASA Astrophysics Data System (ADS)

    Díaz, Jorge L.; Barreto, Dacil; García, Luz; Marrero, Gustavo; Carballo, Pedro P.; Núñez, Antonio

    2007-05-01

    In this paper we present a novel methodology to accelerate an MPEG-4 video decoder using software/hardware co-design for wireless DAB/DMB networks. Software support includes the services provided by the embedded kernel μC/OS-II, and the application tasks mapped to software. Hardware support includes several custom co-processors and a communication architecture with bridges to the main system bus and with a dual port SRAM. Synchronization among tasks is achieved at two levels, by a hardware protocol and by kernel level scheduling services. Our reference application is an MPEG-4 video decoder composed of several software functions and written using a special C++ library named CASSE. Profiling and space exploration techniques were used previously over the Advanced Simple Profile (ASP) MPEG-4 decoder to determinate the best HW/SW partition developed here. This research is part of the ARTEMI project and its main goal is the establishment of methodologies for the design of real-time complex digital systems using Programmable Logic Devices with embedded microprocessors as target technology and the design of multimedia systems for broadcasting networks as reference application.

  3. A Linked List-Based Algorithm for Blob Detection on Embedded Vision-Based Sensors

    PubMed Central

    Acevedo-Avila, Ricardo; Gonzalez-Mendoza, Miguel; Garcia-Garcia, Andres

    2016-01-01

    Blob detection is a common task in vision-based applications. Most existing algorithms are aimed at execution on general purpose computers; while very few can be adapted to the computing restrictions present in embedded platforms. This paper focuses on the design of an algorithm capable of real-time blob detection that minimizes system memory consumption. The proposed algorithm detects objects in one image scan; it is based on a linked-list data structure tree used to label blobs depending on their shape and node information. An example application showing the results of a blob detection co-processor has been built on a low-powered field programmable gate array hardware as a step towards developing a smart video surveillance system. The detection method is intended for general purpose application. As such, several test cases focused on character recognition are also examined. The results obtained present a fair trade-off between accuracy and memory requirements; and prove the validity of the proposed approach for real-time implementation on resource-constrained computing platforms. PMID:27240382

  4. The research and application of multi-biometric acquisition embedded system

    NASA Astrophysics Data System (ADS)

    Deng, Shichao; Liu, Tiegen; Guo, Jingjing; Li, Xiuyan

    2009-11-01

    The identification technology based on multi-biometric can greatly improve the applicability, reliability and antifalsification. This paper presents a multi-biometric system bases on embedded system, which includes: three capture daughter boards are applied to obtain different biometric: one each for fingerprint, iris and vein of the back of hand; FPGA (Field Programmable Gate Array) is designed as coprocessor, which uses to configure three daughter boards on request and provides data path between DSP (digital signal processor) and daughter boards; DSP is the master processor and its functions include: control the biometric information acquisition, extracts feature as required and responsible for compare the results with the local database or data server through network communication. The advantages of this system were it can acquire three different biometric in real time, extracts complexity feature flexibly in different biometrics' raw data according to different purposes and arithmetic and network interface on the core-board will be the solution of big data scale. Because this embedded system has high stability, reliability, flexibility and fit for different data scale, it can satisfy the demand of multi-biometric recognition.

  5. Poverty alleviation programmes in India: a social audit.

    PubMed

    K Yesudian, C A

    2007-10-01

    The review highlights the poverty alleviation programmes of the government in the post-economic reform era to evaluate the contribution of these programmes towards reducing poverty in the country. The poverty alleviation programmes are classified into (i) self-employment programmes; (ii) wage employment programmes; (iii) food security programmes; (iv) social security programmes; and (v) urban poverty alleviation programmes. The parameter used for evaluation included utilization of allocated funds, change in poverty level, employment generation and number or proportion of beneficiaries. The paper attempts to go beyond the economic benefit of the programmes and analyzes the social impact of these programmes on the communities where the poor live, and concludes that too much of government involvement is actually an impediment. On the other hand, involvement of the community, especially the poor has led to better achievement of the goals of the programmes. Such endeavours not only reduced poverty but also empowered the poor to find their own solutions to their economic problems. There is a need for decentralization of the programmes by strengthening the panchayat raj institutions as poverty is not merely economic deprivation but also social marginalization that affects the poor most.

  6. Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants

    DTIC Science & Technology

    2017-02-12

    group . 15. SUBJECT TERMS Industrial control systems, cyber security 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS...currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (00-MM-YYYY) ,2. REPORT TYPE 3. DATES COVERED...From- To) 12/02/2017 Final 15 August 2015 - 12 February 2017 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Programmable Logic Controllers for Research

  7. Efficient Variational Quantum Simulator Incorporating Active Error Minimization

    NASA Astrophysics Data System (ADS)

    Li, Ying; Benjamin, Simon C.

    2017-04-01

    One of the key applications for quantum computers will be the simulation of other quantum systems that arise in chemistry, materials science, etc., in order to accelerate the process of discovery. It is important to ask the following question: Can this simulation be achieved using near-future quantum processors, of modest size and under imperfect control, or must it await the more distant era of large-scale fault-tolerant quantum computing? Here, we propose a variational method involving closely integrated classical and quantum coprocessors. We presume that all operations in the quantum coprocessor are prone to error. The impact of such errors is minimized by boosting them artificially and then extrapolating to the zero-error case. In comparison to a more conventional optimized Trotterization technique, we find that our protocol is efficient and appears to be fundamentally more robust against error accumulation.

  8. Implementation of the DAST ARW II control laws using an 8086 microprocessor and an 8087 floating-point coprocessor. [drones for aeroelasticity research

    NASA Technical Reports Server (NTRS)

    Kelly, G. L.; Berthold, G.; Abbott, L.

    1982-01-01

    A 5 MHZ single-board microprocessor system which incorporates an 8086 CPU and an 8087 Numeric Data Processor is used to implement the control laws for the NASA Drones for Aerodynamic and Structural Testing, Aeroelastic Research Wing II. The control laws program was executed in 7.02 msec, with initialization consuming 2.65 msec and the control law loop 4.38 msec. The software emulator execution times for these two tasks were 36.67 and 61.18, respectively, for a total of 97.68 msec. The space, weight and cost reductions achieved in the present, aircraft control application of this combination of a 16-bit microprocessor with an 80-bit floating point coprocessor may be obtainable in other real time control applications.

  9. Unobtrusive Software and System Health Management with R2U2 on a Parallel MIMD Coprocessor

    NASA Technical Reports Server (NTRS)

    Schumann, Johann; Moosbrugger, Patrick

    2017-01-01

    Dynamic monitoring of software and system health of a complex cyber-physical system requires observers that continuously monitor variables of the embedded software in order to detect anomalies and reason about root causes. There exists a variety of techniques for code instrumentation, but instrumentation might change runtime behavior and could require costly software re-certification. In this paper, we present R2U2E, a novel realization of our real-time, Realizable, Responsive, and Unobtrusive Unit (R2U2). The R2U2E observers are executed in parallel on a dedicated 16-core EPIPHANY co-processor, thereby avoiding additional computational overhead to the system under observation. A DMA-based shared memory access architecture allows R2U2E to operate without any code instrumentation or program interference.

  10. ASICs Approach for the Implementation of a Symmetric Triangular Fuzzy Coprocessor and Its Application to Adaptive Filtering

    NASA Technical Reports Server (NTRS)

    Starks, Scott; Abdel-Hafeez, Saleh; Usevitch, Bryan

    1997-01-01

    This paper discusses the implementation of a fuzzy logic system using an ASICs design approach. The approach is based upon combining the inherent advantages of symmetric triangular membership functions and fuzzy singleton sets to obtain a novel structure for fuzzy logic system application development. The resulting structure utilizes a fuzzy static RAM to store the rule-base and the end-points of the triangular membership functions. This provides advantages over other approaches in which all sampled values of membership functions for all universes must be stored. The fuzzy coprocessor structure implements the fuzzification and defuzzification processes through a two-stage parallel pipeline architecture which is capable of executing complex fuzzy computations in less than 0.55us with an accuracy of more than 95%, thus making it suitable for a wide range of applications. Using the approach presented in this paper, a fuzzy logic rule-base can be directly downloaded via a host processor to an onchip rule-base memory with a size of 64 words. The fuzzy coprocessor's design supports up to 49 rules for seven fuzzy membership functions associated with each of the chip's two input variables. This feature allows designers to create fuzzy logic systems without the need for additional on-board memory. Finally, the paper reports on simulation studies that were conducted for several adaptive filter applications using the least mean squared adaptive algorithm for adjusting the knowledge rule-base.

  11. Accelerating the Pace of Protein Functional Annotation With Intel Xeon Phi Coprocessors.

    PubMed

    Feinstein, Wei P; Moreno, Juana; Jarrell, Mark; Brylinski, Michal

    2015-06-01

    Intel Xeon Phi is a new addition to the family of powerful parallel accelerators. The range of its potential applications in computationally driven research is broad; however, at present, the repository of scientific codes is still relatively limited. In this study, we describe the development and benchmarking of a parallel version of eFindSite, a structural bioinformatics algorithm for the prediction of ligand-binding sites in proteins. Implemented for the Intel Xeon Phi platform, the parallelization of the structure alignment portion of eFindSite using pragma-based OpenMP brings about the desired performance improvements, which scale well with the number of computing cores. Compared to a serial version, the parallel code runs 11.8 and 10.1 times faster on the CPU and the coprocessor, respectively; when both resources are utilized simultaneously, the speedup is 17.6. For example, ligand-binding predictions for 501 benchmarking proteins are completed in 2.1 hours on a single Stampede node equipped with the Intel Xeon Phi card compared to 3.1 hours without the accelerator and 36.8 hours required by a serial version. In addition to the satisfactory parallel performance, porting existing scientific codes to the Intel Xeon Phi architecture is relatively straightforward with a short development time due to the support of common parallel programming models by the coprocessor. The parallel version of eFindSite is freely available to the academic community at www.brylinski.org/efindsite.

  12. Modern multicore and manycore architectures: Modelling, optimisation and benchmarking a multiblock CFD code

    NASA Astrophysics Data System (ADS)

    Hadade, Ioan; di Mare, Luca

    2016-08-01

    Modern multicore and manycore processors exhibit multiple levels of parallelism through a wide range of architectural features such as SIMD for data parallel execution or threads for core parallelism. The exploitation of multi-level parallelism is therefore crucial for achieving superior performance on current and future processors. This paper presents the performance tuning of a multiblock CFD solver on Intel SandyBridge and Haswell multicore CPUs and the Intel Xeon Phi Knights Corner coprocessor. Code optimisations have been applied on two computational kernels exhibiting different computational patterns: the update of flow variables and the evaluation of the Roe numerical fluxes. We discuss at great length the code transformations required for achieving efficient SIMD computations for both kernels across the selected devices including SIMD shuffles and transpositions for flux stencil computations and global memory transformations. Core parallelism is expressed through threading based on a number of domain decomposition techniques together with optimisations pertaining to alleviating NUMA effects found in multi-socket compute nodes. Results are correlated with the Roofline performance model in order to assert their efficiency for each distinct architecture. We report significant speedups for single thread execution across both kernels: 2-5X on the multicore CPUs and 14-23X on the Xeon Phi coprocessor. Computations at full node and chip concurrency deliver a factor of three speedup on the multicore processors and up to 24X on the Xeon Phi manycore coprocessor.

  13. Multiplying a Force for Good? the Impact of Security Sector Management Postgraduate Education in Ethiopia

    ERIC Educational Resources Information Center

    Macphee, Paula-Louise; Fitz-Gerald, Ann

    2014-01-01

    This paper argues for the importance, benefits and wider impact of a donor-funded, locally supported postgraduate programme in security sector management (SSM) for government officials in Ethiopia. With the exception of specialised education and training programmes within the field of peace and conflict studies, the role of education in…

  14. Nutrition and food security policy in the Islamic Republic of Iran: situation analysis and roadmap towards 2021.

    PubMed

    Damari, Behzad; Abdollahi, Zahra; Hajifaraji, Majid; Rezazadeh, Arezoo

    2018-05-03

    All government policies and programmes for food and nutrition security should include providing healthy food, as well as providing economic and social availability for all people. This study aimed to analyse the current situation of Iranian food and nutrition security and establish a road map towards 2021. The applied methods were situation analysis and a mixed qualitative-quantitative method. The conceptual method used for developing this national document encompassed three areas: sustainable food supply, food safety and nutrition. The outcomes of the Iranian food and nutrition security system in the past three decades include development of management infrastructure and improvement in food and nutrition security status. However, analysis of current programmes showed that there were some overlapping, intertwining and parallel works in the responsibilities of related organizations in the field of supervision of food safety (from production to supply). The national document produced as the outcome of this paper was communicated by the Iranian Ministry of Health in 2012 and has been running for 2 years. Selected ministries are responsible for implementation of 20 national programmes by the end of the 5th Economic, Social and Cultural Development Programme (2016-2011). The consensus of stakeholders by the end of the 6th Development Programme (2021) is to put all of the provinces in a safe or very safe situation in terms of food and nutrition security. The most important challenge in establishing national documents is to make them operational. This aim was achieved by an intersectoral nutrition and food security working group, which produced a general memorandum of understanding with the main organizations, the media, universities and private sector. Copyright © World Health Organization (WHO) 2018. Some rights reserved. This work is available under the CC BY-NC-SA 3.0 IGO license (https://creativecommons.org/licenses/by-nc-sa/3.0/igo).

  15. Long sequence correlation coprocessor

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.

    1994-09-01

    A long sequence correlation coprocessor (LSCC) accelerates the bitwise correlation of arbitrarily long digital sequences by calculating in parallel the correlation score for 16, for example, adjacent bit alignments between two binary sequences. The LSCC integrated circuit is incorporated into a computer system with memory storage buffers and a separate general purpose computer processor which serves as its controller. Each of the LSCC's set of sequential counters simultaneously tallies a separate correlation coefficient. During each LSCC clock cycle, computer enable logic associated with each counter compares one bit of a first sequence with one bit of a second sequence to increment the counter if the bits are the same. A shift register assures that the same bit of the first sequence is simultaneously compared to different bits of the second sequence to simultaneously calculate the correlation coefficient by the different counters to represent different alignments of the two sequences.

  16. Acceleration of Monte Carlo simulation of photon migration in complex heterogeneous media using Intel many-integrated core architecture.

    PubMed

    Gorshkov, Anton V; Kirillin, Mikhail Yu

    2015-08-01

    Over two decades, the Monte Carlo technique has become a gold standard in simulation of light propagation in turbid media, including biotissues. Technological solutions provide further advances of this technique. The Intel Xeon Phi coprocessor is a new type of accelerator for highly parallel general purpose computing, which allows execution of a wide range of applications without substantial code modification. We present a technical approach of porting our previously developed Monte Carlo (MC) code for simulation of light transport in tissues to the Intel Xeon Phi coprocessor. We show that employing the accelerator allows reducing computational time of MC simulation and obtaining simulation speed-up comparable to GPU. We demonstrate the performance of the developed code for simulation of light transport in the human head and determination of the measurement volume in near-infrared spectroscopy brain sensing.

  17. Single event effect testing of the Intel 80386 family and the 80486 microprocessor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moran, A.; LaBel, K.; Gates, M.

    The authors present single event effect test results for the Intel 80386 microprocessor, the 80387 coprocessor, the 82380 peripheral device, and on the 80486 microprocessor. Both single event upset and latchup conditions were monitored.

  18. Evaluation of the Intel Xeon Phi Co-processor to accelerate the sensitivity map calculation for PET imaging

    NASA Astrophysics Data System (ADS)

    Dey, T.; Rodrigue, P.

    2015-07-01

    We aim to evaluate the Intel Xeon Phi coprocessor for acceleration of 3D Positron Emission Tomography (PET) image reconstruction. We focus on the sensitivity map calculation as one computational intensive part of PET image reconstruction, since it is a promising candidate for acceleration with the Many Integrated Core (MIC) architecture of the Xeon Phi. The computation of the voxels in the field of view (FoV) can be done in parallel and the 103 to 104 samples needed to calculate the detection probability of each voxel can take advantage of vectorization. We use the ray tracing kernels of the Embree project to calculate the hit points of the sample rays with the detector and in a second step the sum of the radiological path taking into account attenuation is determined. The core components are implemented using the Intel single instruction multiple data compiler (ISPC) to enable a portable implementation showing efficient vectorization either on the Xeon Phi and the Host platform. On the Xeon Phi, the calculation of the radiological path is also implemented in hardware specific intrinsic instructions (so-called `intrinsics') to allow manually-optimized vectorization. For parallelization either OpenMP and ISPC tasking (based on pthreads) are evaluated.Our implementation achieved a scalability factor of 0.90 on the Xeon Phi coprocessor (model 5110P) with 60 cores at 1 GHz. Only minor differences were found between parallelization with OpenMP and the ISPC tasking feature. The implementation using intrinsics was found to be about 12% faster than the portable ISPC version. With this version, a speedup of 1.43 was achieved on the Xeon Phi coprocessor compared to the host system (HP SL250s Gen8) equipped with two Xeon (E5-2670) CPUs, with 8 cores at 2.6 to 3.3 GHz each. Using a second Xeon Phi card the speedup could be further increased to 2.77. No significant differences were found between the results of the different Xeon Phi and the Host implementations. The examination showed that a reasonable speedup of sensitivity map calculation could be achieved on the Xeon Phi either by a portable or a hardware specific implementation.

  19. Debugging Techniques Used by Experienced Programmers to Debug Their Own Code.

    DTIC Science & Technology

    1990-09-01

    IS. NUMBER OF PAGES code debugging 62 computer programmers 16. PRICE CODE debug programming 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 119...Davis, and Schultz (1987) also compared experts and novices, but focused on the way a computer program is represented cognitively and how that...of theories in the emerging computer programming domain (Fisher, 1987). In protocol analysis, subjects are asked to talk/think aloud as they solve

  20. High-performance floating-point image computing workstation for medical applications

    NASA Astrophysics Data System (ADS)

    Mills, Karl S.; Wong, Gilman K.; Kim, Yongmin

    1990-07-01

    The medical imaging field relies increasingly on imaging and graphics techniques in diverse applications with needs similar to (or more stringent than) those of the military, industrial and scientific communities. However, most image processing and graphics systems available for use in medical imaging today are either expensive, specialized, or in most cases both. High performance imaging and graphics workstations which can provide real-time results for a number of applications, while maintaining affordability and flexibility, can facilitate the application of digital image computing techniques in many different areas. This paper describes the hardware and software architecture of a medium-cost floating-point image processing and display subsystem for the NeXT computer, and its applications as a medical imaging workstation. Medical imaging applications of the workstation include use in a Picture Archiving and Communications System (PACS), in multimodal image processing and 3-D graphics workstation for a broad range of imaging modalities, and as an electronic alternator utilizing its multiple monitor display capability and large and fast frame buffer. The subsystem provides a 2048 x 2048 x 32-bit frame buffer (16 Mbytes of image storage) and supports both 8-bit gray scale and 32-bit true color images. When used to display 8-bit gray scale images, up to four different 256-color palettes may be used for each of four 2K x 2K x 8-bit image frames. Three of these image frames can be used simultaneously to provide pixel selectable region of interest display. A 1280 x 1024 pixel screen with 1: 1 aspect ratio can be windowed into the frame buffer for display of any portion of the processed image or images. In addition, the system provides hardware support for integer zoom and an 82-color cursor. This subsystem is implemented on an add-in board occupying a single slot in the NeXT computer. Up to three boards may be added to the NeXT for multiple display capability (e.g., three 1280 x 1024 monitors, each with a 16-Mbyte frame buffer). Each add-in board provides an expansion connector to which an optional image computing coprocessor board may be added. Each coprocessor board supports up to four processors for a peak performance of 160 MFLOPS. The coprocessors can execute programs from external high-speed microcode memory as well as built-in internal microcode routines. The internal microcode routines provide support for 2-D and 3-D graphics operations, matrix and vector arithmetic, and image processing in integer, IEEE single-precision floating point, or IEEE double-precision floating point. In addition to providing a library of C functions which links the NeXT computer to the add-in board and supports its various operational modes, algorithms and medical imaging application programs are being developed and implemented for image display and enhancement. As an extension to the built-in algorithms of the coprocessors, 2-D Fast Fourier Transform (FF1), 2-D Inverse FFF, convolution, warping and other algorithms (e.g., Discrete Cosine Transform) which exploit the parallel architecture of the coprocessor board are being implemented.

  1. Porting ONETEP to graphical processing unit-based coprocessors. 1. FFT box operations.

    PubMed

    Wilkinson, Karl; Skylaris, Chris-Kriton

    2013-10-30

    We present the first graphical processing unit (GPU) coprocessor-enabled version of the Order-N Electronic Total Energy Package (ONETEP) code for linear-scaling first principles quantum mechanical calculations on materials. This work focuses on porting to the GPU the parts of the code that involve atom-localized fast Fourier transform (FFT) operations. These are among the most computationally intensive parts of the code and are used in core algorithms such as the calculation of the charge density, the local potential integrals, the kinetic energy integrals, and the nonorthogonal generalized Wannier function gradient. We have found that direct porting of the isolated FFT operations did not provide any benefit. Instead, it was necessary to tailor the port to each of the aforementioned algorithms to optimize data transfer to and from the GPU. A detailed discussion of the methods used and tests of the resulting performance are presented, which show that individual steps in the relevant algorithms are accelerated by a significant amount. However, the transfer of data between the GPU and host machine is a significant bottleneck in the reported version of the code. In addition, an initial investigation into a dynamic precision scheme for the ONETEP energy calculation has been performed to take advantage of the enhanced single precision capabilities of GPUs. The methods used here result in no disruption to the existing code base. Furthermore, as the developments reported here concern the core algorithms, they will benefit the full range of ONETEP functionality. Our use of a directive-based programming model ensures portability to other forms of coprocessors and will allow this work to form the basis of future developments to the code designed to support emerging high-performance computing platforms. Copyright © 2013 Wiley Periodicals, Inc.

  2. Fast Fourier Transform Co-processor (FFTC), towards embedded GFLOPs

    NASA Astrophysics Data System (ADS)

    Kuehl, Christopher; Liebstueckel, Uwe; Tejerina, Isaac; Uemminghaus, Michael; Witte, Felix; Kolb, Michael; Suess, Martin; Weigand, Roland; Kopp, Nicholas

    2012-10-01

    Many signal processing applications and algorithms perform their operations on the data in the transform domain to gain efficiency. The Fourier Transform Co-Processor has been developed with the aim to offload General Purpose Processors from performing these transformations and therefore to boast the overall performance of a processing module. The IP of the commercial PowerFFT processor has been selected and adapted to meet the constraints of the space environment. In frame of the ESA activity "Fast Fourier Transform DSP Co-processor (FFTC)" (ESTEC/Contract No. 15314/07/NL/LvH/ma) the objectives were the following: • Production of prototypes of a space qualified version of the commercial PowerFFT chip called FFTC based on the PowerFFT IP. • The development of a stand-alone FFTC Accelerator Board (FTAB) based on the FFTC including the Controller FPGA and SpaceWire Interfaces to verify the FFTC function and performance. The FFTC chip performs its calculations with floating point precision. Stand alone it is capable computing FFTs of up to 1K complex samples in length in only 10μsec. This corresponds to an equivalent processing performance of 4.7 GFlops. In this mode the maximum sustained data throughput reaches 6.4Gbit/s. When connected to up to 4 EDAC protected SDRAM memory banks the FFTC can perform long FFTs with up to 1M complex samples in length or multidimensional FFT-based processing tasks. A Controller FPGA on the FTAB takes care of the SDRAM addressing. The instructions commanded via the Controller FPGA are used to set up the data flow and generate the memory addresses. The paper will give an overview on the project, including the results of the validation of the FFTC ASIC prototypes.

  3. Reviews.

    ERIC Educational Resources Information Center

    Journal of Chemical Education, 1988

    1988-01-01

    Reviews two computer programs: "Molecular Graphics," which allows molecule manipulation in three-dimensional space (requiring IBM PC with 512K, EGA monitor, and math coprocessor); and "Periodic Law," a database which contains up to 20 items of information on each of the first 103 elements (Apple II or IBM PC). (MVL)

  4. The Brazilian school feeding programme: an example of an integrated programme in support of food and nutrition security.

    PubMed

    Sidaner, Emilie; Balaban, Daniel; Burlandy, Luciene

    2013-06-01

    The present paper analyses the advances and challenges of the school feeding programme in Brazil (PNAE), as part of the Brazilian experience building up an integrated food and nutrition security national system. It explores the role of policy and regulatory frameworks in constructing quality service delivery and intersectoral integration. Review of PNAE and federal government technical documents and studies, legislation, minutes of meetings and official documents of the National Council of Food and Nutrition Security from 2003 to 2011. Food insecurity has decreased significantly in Brazil in the last decade, indicating that appropriate choices were made in terms of public policies and institutional arrangements, which other countries can learn from. Brazil food and nutrition security system; school feeding; school food. Brazil's integrated food and nutrition security policy approach promoted intersectorality in the food system, articulating actions to guarantee access to healthy food and to strengthen family farming. The quality of school meals has progressively improved; in particular, the availability of fruits and vegetables increased. However, national standards regarding menu composition have not yet been met. Regulations were an important factor, along with the policy approach linking food production, nutrition, health and education. Challenges are related to conflict of interests and to farmers' insufficient capacity to meet supply requirements and comply with technical procedures. Local food production, school meals and nutrition education can be linked through integrated programmes and policies, improving access to healthier foods. Government leadership, strong legislation, civil society participation and intersectoral decision making are determinant.

  5. Optimizing the updated Goddard shortwave radiation Weather Research and Forecasting (WRF) scheme for Intel Many Integrated Core (MIC) architecture

    NASA Astrophysics Data System (ADS)

    Mielikainen, Jarno; Huang, Bormin; Huang, Allen H.-L.

    2015-05-01

    Intel Many Integrated Core (MIC) ushers in a new era of supercomputing speed, performance, and compatibility. It allows the developers to run code at trillions of calculations per second using the familiar programming model. In this paper, we present our results of optimizing the updated Goddard shortwave radiation Weather Research and Forecasting (WRF) scheme on Intel Many Integrated Core Architecture (MIC) hardware. The Intel Xeon Phi coprocessor is the first product based on Intel MIC architecture, and it consists of up to 61 cores connected by a high performance on-die bidirectional interconnect. The co-processor supports all important Intel development tools. Thus, the development environment is familiar one to a vast number of CPU developers. Although, getting a maximum performance out of Xeon Phi will require using some novel optimization techniques. Those optimization techniques are discusses in this paper. The results show that the optimizations improved performance of the original code on Xeon Phi 7120P by a factor of 1.3x.

  6. An Impact Evaluation of the "FoodMate" Programme: Perspectives of Homeless Young People and Staff

    ERIC Educational Resources Information Center

    Meiklejohn, Sarah J.; Barbour, Liza; Palermo, Claire E.

    2017-01-01

    Objectives: Food insecurity remains an issue for vulnerable populations in developed countries. The potential dietary and food security impacts of nutrition education programmes in Australia remain largely undocumented. This study investigated the impacts of an eight-session nutrition education programme delivered within community case management…

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dondero, Rachel Elizabeth

    The increased use of Field Programmable Gate Arrays (FPGAs) in critical systems brings new challenges in securing the diversely programmable fabric from cyber-attacks. FPGAs are an inexpensive, efficient, and flexible alternative to Application Specific Integrated Circuits (ASICs), which are becoming increasingly expensive and impractical for low volume manufacturing as technology nodes continue to shrink. Unfortunately, FPGAs are not designed for high security applications, and their high-flexibility lends itself to low security and vulnerability to malicious attacks. Similar to securing an ASIC’s functionality, FPGA programmers can exploit the inherent randomness introduced into hardware structures during fabrication for security applications. Physically Unclonablemore » Functions (PUFs) are one such solution that uses the die specific variability in hardware fabrication for both secret key generation and verification. PUFs strive to be random, unique, and reliable. Throughout recent years many PUF structures have been presented to try and maximize these three design constraints, reliability being the most difficult of the three to achieve. This thesis presents a new PUF structure that combines two elementary PUF concepts (a bi-stable SRAM PUF and a delay-based arbiter PUF) to create a PUF with increased reliability, while maintaining both random and unique qualities. Properties of the new PUF will be discussed as well as the various design modifications that can be made to tweak the desired performance and overhead.« less

  8. Costs and outcomes of an intervention programme for offenders with personality disorders.

    PubMed

    Barrett, Barbara; Byford, Sarah

    2012-04-01

    The dangerous severe personality disorder programme was developed in high secure prisons and hospitals at great expense to identify and treat the most dangerous offenders with personality disorders. To evaluate whether the long-term costs of the programme are greater or less than the long-term outcomes. We used a Markov decision model with a cost-effectiveness analysis to determine the incremental cost of the programme per serious offence prevented and a cost-offset analysis to consider whether monetary benefits were greater than costs. Costs were consistently higher for the intervention programme and the cost per serious offence prevented was over £2 million, although there was some evidence that adjustments to the programme could lead to similar interventions becoming cost-effective. Little evidence was found to support the cost-effectiveness of the intervention programme for offenders with personality disorders, although delivery of the programme in a lower-cost prison would probably yield greater benefits than costs. There are frequent calls for mentally disordered offenders to be detained in secure hospitals rather than prisons; however, if reoffending remains the outcome of interest for policy makers, it is likely that the costs of detention in hospital will remain greater than the benefits for dangerous offenders with a personality disorder.

  9. Extending the BEAGLE library to a multi-FPGA platform.

    PubMed

    Jin, Zheming; Bakos, Jason D

    2013-01-19

    Maximum Likelihood (ML)-based phylogenetic inference using Felsenstein's pruning algorithm is a standard method for estimating the evolutionary relationships amongst a set of species based on DNA sequence data, and is used in popular applications such as RAxML, PHYLIP, GARLI, BEAST, and MrBayes. The Phylogenetic Likelihood Function (PLF) and its associated scaling and normalization steps comprise the computational kernel for these tools. These computations are data intensive but contain fine grain parallelism that can be exploited by coprocessor architectures such as FPGAs and GPUs. A general purpose API called BEAGLE has recently been developed that includes optimized implementations of Felsenstein's pruning algorithm for various data parallel architectures. In this paper, we extend the BEAGLE API to a multiple Field Programmable Gate Array (FPGA)-based platform called the Convey HC-1. The core calculation of our implementation, which includes both the phylogenetic likelihood function (PLF) and the tree likelihood calculation, has an arithmetic intensity of 130 floating-point operations per 64 bytes of I/O, or 2.03 ops/byte. Its performance can thus be calculated as a function of the host platform's peak memory bandwidth and the implementation's memory efficiency, as 2.03 × peak bandwidth × memory efficiency. Our FPGA-based platform has a peak bandwidth of 76.8 GB/s and our implementation achieves a memory efficiency of approximately 50%, which gives an average throughput of 78 Gflops. This represents a ~40X speedup when compared with BEAGLE's CPU implementation on a dual Xeon 5520 and 3X speedup versus BEAGLE's GPU implementation on a Tesla T10 GPU for very large data sizes. The power consumption is 92 W, yielding a power efficiency of 1.7 Gflops per Watt. The use of data parallel architectures to achieve high performance for likelihood-based phylogenetic inference requires high memory bandwidth and a design methodology that emphasizes high memory efficiency. To achieve this objective, we integrated 32 pipelined processing elements (PEs) across four FPGAs. For the design of each PE, we developed a specialized synthesis tool to generate a floating-point pipeline with resource and throughput constraints to match the target platform. We have found that using low-latency floating-point operators can significantly reduce FPGA area and still meet timing requirement on the target platform. We found that this design methodology can achieve performance that exceeds that of a GPU-based coprocessor.

  10. Accelerating finite-rate chemical kinetics with coprocessors: Comparing vectorization methods on GPUs, MICs, and CPUs

    NASA Astrophysics Data System (ADS)

    Stone, Christopher P.; Alferman, Andrew T.; Niemeyer, Kyle E.

    2018-05-01

    Accurate and efficient methods for solving stiff ordinary differential equations (ODEs) are a critical component of turbulent combustion simulations with finite-rate chemistry. The ODEs governing the chemical kinetics at each mesh point are decoupled by operator-splitting allowing each to be solved concurrently. An efficient ODE solver must then take into account the available thread and instruction-level parallelism of the underlying hardware, especially on many-core coprocessors, as well as the numerical efficiency. A stiff Rosenbrock and a nonstiff Runge-Kutta ODE solver are both implemented using the single instruction, multiple thread (SIMT) and single instruction, multiple data (SIMD) paradigms within OpenCL. Both methods solve multiple ODEs concurrently within the same instruction stream. The performance of these parallel implementations was measured on three chemical kinetic models of increasing size across several multicore and many-core platforms. Two separate benchmarks were conducted to clearly determine any performance advantage offered by either method. The first benchmark measured the run-time of evaluating the right-hand-side source terms in parallel and the second benchmark integrated a series of constant-pressure, homogeneous reactors using the Rosenbrock and Runge-Kutta solvers. The right-hand-side evaluations with SIMD parallelism on the host multicore Xeon CPU and many-core Xeon Phi co-processor performed approximately three times faster than the baseline multithreaded C++ code. The SIMT parallel model on the host and Phi was 13%-35% slower than the baseline while the SIMT model on the NVIDIA Kepler GPU provided approximately the same performance as the SIMD model on the Phi. The runtimes for both ODE solvers decreased significantly with the SIMD implementations on the host CPU (2.5-2.7 ×) and Xeon Phi coprocessor (4.7-4.9 ×) compared to the baseline parallel code. The SIMT implementations on the GPU ran 1.5-1.6 times faster than the baseline multithreaded CPU code; however, this was significantly slower than the SIMD versions on the host CPU or the Xeon Phi. The performance difference between the three platforms was attributed to thread divergence caused by the adaptive step-sizes within the ODE integrators. Analysis showed that the wider vector width of the GPU incurs a higher level of divergence than the narrower Sandy Bridge or Xeon Phi. The significant performance improvement provided by the SIMD parallel strategy motivates further research into more ODE solver methods that are both SIMD-friendly and computationally efficient.

  11. Recovery and concordance in a secure forensic psychiatry hospital - the self rated DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales.

    PubMed

    Davoren, Mary; Hennessy, Sarah; Conway, Catherine; Marrinan, Seamus; Gill, Pauline; Kennedy, Harry G

    2015-03-28

    Detention in a secure forensic psychiatric hospital may inhibit engagement and recovery. Having validated the clinician rated DUNDRUM-3 (programme completion) and DUNDRUM-4 (recovery) in a forensic hospital, we set out to draft and validate scales measuring the same programme completion and recovery items that patients could use to self-rate. Based on previous work, we hypothesised that self-rating scores might be predictors of objective progress including conditional discharge. We hypothesised also that the difference between patients' and clinicians' ratings of progress in treatment and other factors relevant to readiness for discharge (concordance) would diminish as patients neared discharge. We hypothesised also that this difference in matched scores would predict objective progress including conditional discharge. In a prospective naturalistic observational cohort study in a forensic hospital, we examined whether scores on the self-rated DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales or differences between clinician and patient ratings on the same scales (concordance) would predict moves between levels of therapeutic security and conditional discharge over the next twelve months. Both scales stratified along the recovery pathway of the hospital, but clinician ratings matched the level of therapeutic security more accurately than self ratings. The clinician rated scales predicted moves to less secure units and to more secure units and predicted conditional discharge but the self-rated scores did not. The difference between clinician and self-rated scores (concordance) predicted positive and negative moves and conditional discharge, but this was not always an independent predictor as shown by regression analysis. In regression analysis the DUNDRUM-3 predicted moves to less secure places though the HCR-20 C & R score dominated the model. Moves back to more secure places were predicted by lack of concordance on the DUNDRUM-4. Conditional discharge was predicted predominantly by the DUNDRUM-3. Patients accurately self-rate relative to other patients however their absolute ratings were consistently lower (better) than clinicians' ratings and were less accurate predictors of outcomes including conditional discharge. Quantifying concordance is a useful part of the recovery process and predicts outcomes but self-ratings are not accurate predictors.

  12. National tuberculosis programme review: experience over the period 1990-95.

    PubMed Central

    Pio, A.; Luelmo, F.; Kumaresan, J.; Spinaci, S.

    1997-01-01

    Since 1990 the WHO Global Tuberculosis Programme (GTB) has promoted the revision of national tuberculosis programmes to strengthen the focus on directly observed treatment, short-course (DOTS) and close monitoring of treatment outcomes. GTB has encouraged in-depth evaluation of activities through a comprehensive programme review. Over the period 1990-95, WHO supported 12 such programme reviews. The criteria for selection were as follows: large population (Bangladesh, Brazil, China, Ethiopia, India, Indonesia, Mexico, and Thailand); good prospects of developing a model programme for a region (Nepal, Zimbabwe); or at advanced stage of implementation of a model programme for a region (Guinea, Peru). The estimated combined incidence of smear-positive pulmonary tuberculosis was 82 per 100,000 population, about 43% of the global incidence. The prevalence of infection with human immunodeficiency virus (HIV) was variable, being very high in Ethiopia and Zimbabwe, but negligible in Bangladesh, China, Nepal and Peru. The programme reviews were conducted by teams of 15-35 experts representing a wide range of national and external institutions. After a 2-3-month preparatory period, the conduct of the review usually lasted 2-3 weeks, including a first phase of meetings with authorities and review of documents, a second phase for field visits, and a third phase of discussion of findings and recommendations. The main lessons learned from the programme reviews were as follows: programme review is a useful tool to secure government commitment, reorient the tuberculosis control policies and replan the activities on solid grounds; the involvement of public health and academic institutions, cooperating agencies, and nongovernmental organizations secured a broad support to the new policies; programme success is linked to a centralized direction which supports a decentralized implementation through the primary health care services; monitoring and evaluation of case management functions well if it is based on the right classification of cases and quarterly reports on cohorts of patients; a comprehensive programme review should include teaching about tuberculosis in medical, nursing, and laboratory workers' schools; good quality diagnosis and treatment are the essential requirements for expanding a programme beyond the pilot testing; and control targets cannot be achieved if private and social security patients are left outside the programme scope. The methodology of comprehensive programme review should be recommended to all countries which require programme reorientation; it is also appropriate for carrying out evaluations at 4-5-year intervals in countries that are implementing the correct tuberculosis control policies. PMID:9509630

  13. National tuberculosis programme review: experience over the period 1990-95.

    PubMed

    Pio, A; Luelmo, F; Kumaresan, J; Spinaci, S

    1997-01-01

    Since 1990 the WHO Global Tuberculosis Programme (GTB) has promoted the revision of national tuberculosis programmes to strengthen the focus on directly observed treatment, short-course (DOTS) and close monitoring of treatment outcomes. GTB has encouraged in-depth evaluation of activities through a comprehensive programme review. Over the period 1990-95, WHO supported 12 such programme reviews. The criteria for selection were as follows: large population (Bangladesh, Brazil, China, Ethiopia, India, Indonesia, Mexico, and Thailand); good prospects of developing a model programme for a region (Nepal, Zimbabwe); or at advanced stage of implementation of a model programme for a region (Guinea, Peru). The estimated combined incidence of smear-positive pulmonary tuberculosis was 82 per 100,000 population, about 43% of the global incidence. The prevalence of infection with human immunodeficiency virus (HIV) was variable, being very high in Ethiopia and Zimbabwe, but negligible in Bangladesh, China, Nepal and Peru. The programme reviews were conducted by teams of 15-35 experts representing a wide range of national and external institutions. After a 2-3-month preparatory period, the conduct of the review usually lasted 2-3 weeks, including a first phase of meetings with authorities and review of documents, a second phase for field visits, and a third phase of discussion of findings and recommendations. The main lessons learned from the programme reviews were as follows: programme review is a useful tool to secure government commitment, reorient the tuberculosis control policies and replan the activities on solid grounds; the involvement of public health and academic institutions, cooperating agencies, and nongovernmental organizations secured a broad support to the new policies; programme success is linked to a centralized direction which supports a decentralized implementation through the primary health care services; monitoring and evaluation of case management functions well if it is based on the right classification of cases and quarterly reports on cohorts of patients; a comprehensive programme review should include teaching about tuberculosis in medical, nursing, and laboratory workers' schools; good quality diagnosis and treatment are the essential requirements for expanding a programme beyond the pilot testing; and control targets cannot be achieved if private and social security patients are left outside the programme scope. The methodology of comprehensive programme review should be recommended to all countries which require programme reorientation; it is also appropriate for carrying out evaluations at 4-5-year intervals in countries that are implementing the correct tuberculosis control policies.

  14. A Spaceborne Synthetic Aperture Radar Partial Fixed-Point Imaging System Using a Field- Programmable Gate Array—Application-Specific Integrated Circuit Hybrid Heterogeneous Parallel Acceleration Technique

    PubMed Central

    Li, Bingyi; Chen, Liang; Wei, Chunpeng; Xie, Yizhuang; Chen, He; Yu, Wenyue

    2017-01-01

    With the development of satellite load technology and very large scale integrated (VLSI) circuit technology, onboard real-time synthetic aperture radar (SAR) imaging systems have become a solution for allowing rapid response to disasters. A key goal of the onboard SAR imaging system design is to achieve high real-time processing performance with severe size, weight, and power consumption constraints. In this paper, we analyse the computational burden of the commonly used chirp scaling (CS) SAR imaging algorithm. To reduce the system hardware cost, we propose a partial fixed-point processing scheme. The fast Fourier transform (FFT), which is the most computation-sensitive operation in the CS algorithm, is processed with fixed-point, while other operations are processed with single precision floating-point. With the proposed fixed-point processing error propagation model, the fixed-point processing word length is determined. The fidelity and accuracy relative to conventional ground-based software processors is verified by evaluating both the point target imaging quality and the actual scene imaging quality. As a proof of concept, a field- programmable gate array—application-specific integrated circuit (FPGA-ASIC) hybrid heterogeneous parallel accelerating architecture is designed and realized. The customized fixed-point FFT is implemented using the 130 nm complementary metal oxide semiconductor (CMOS) technology as a co-processor of the Xilinx xc6vlx760t FPGA. A single processing board requires 12 s and consumes 21 W to focus a 50-km swath width, 5-m resolution stripmap SAR raw data with a granularity of 16,384 × 16,384. PMID:28672813

  15. A Spaceborne Synthetic Aperture Radar Partial Fixed-Point Imaging System Using a Field- Programmable Gate Array-Application-Specific Integrated Circuit Hybrid Heterogeneous Parallel Acceleration Technique.

    PubMed

    Yang, Chen; Li, Bingyi; Chen, Liang; Wei, Chunpeng; Xie, Yizhuang; Chen, He; Yu, Wenyue

    2017-06-24

    With the development of satellite load technology and very large scale integrated (VLSI) circuit technology, onboard real-time synthetic aperture radar (SAR) imaging systems have become a solution for allowing rapid response to disasters. A key goal of the onboard SAR imaging system design is to achieve high real-time processing performance with severe size, weight, and power consumption constraints. In this paper, we analyse the computational burden of the commonly used chirp scaling (CS) SAR imaging algorithm. To reduce the system hardware cost, we propose a partial fixed-point processing scheme. The fast Fourier transform (FFT), which is the most computation-sensitive operation in the CS algorithm, is processed with fixed-point, while other operations are processed with single precision floating-point. With the proposed fixed-point processing error propagation model, the fixed-point processing word length is determined. The fidelity and accuracy relative to conventional ground-based software processors is verified by evaluating both the point target imaging quality and the actual scene imaging quality. As a proof of concept, a field- programmable gate array-application-specific integrated circuit (FPGA-ASIC) hybrid heterogeneous parallel accelerating architecture is designed and realized. The customized fixed-point FFT is implemented using the 130 nm complementary metal oxide semiconductor (CMOS) technology as a co-processor of the Xilinx xc6vlx760t FPGA. A single processing board requires 12 s and consumes 21 W to focus a 50-km swath width, 5-m resolution stripmap SAR raw data with a granularity of 16,384 × 16,384.

  16. Information security: where computer science, economics and psychology meet.

    PubMed

    Anderson, Ross; Moore, Tyler

    2009-07-13

    Until ca. 2000, information security was seen as a technological discipline, based on computer science but with mathematics helping in the design of ciphers and protocols. That perspective started to change as researchers and practitioners realized the importance of economics. As distributed systems are increasingly composed of machines that belong to principals with divergent interests, incentives are becoming as important to dependability as technical design. A thriving new field of information security economics provides valuable insights not just into 'security' topics such as privacy, bugs, spam and phishing, but into more general areas of system dependability and policy. This research programme has recently started to interact with psychology. One thread is in response to phishing, the most rapidly growing form of online crime, in which fraudsters trick people into giving their credentials to bogus websites; a second is through the increasing importance of security usability; and a third comes through the psychology-and-economics tradition. The promise of this multidisciplinary research programme is a novel framework for analysing information security problems-one that is both principled and effective.

  17. Mexico's conditional cash transfer programme increases cesarean section rates among the rural poor.

    PubMed

    Barber, Sarah L

    2010-08-01

    Caesarean section rates are increasing in Mexico and Latin America. This study evaluates the impact of a large-scale, conditional cash transfer programme in Mexico on caesarean section rates. The programme provides cash transfers to participating low income, rural households in Mexico conditional on accepting health care and nutrition supplements. The primary analyses uses retrospective reports from 979 women in poor rural communities participating in an effectiveness study and randomly assigned to incorporation into the programme in 1998 or 1999 across seven Mexican states. Using multivariate and instrumental variable analyses, we estimate the impact of the programme on caesarean sections and predict the adjusted mean rates by clinical setting. Programme participation is measured by beneficiary status, programme months and cash transfers. More than two-thirds of poor rural women delivered in a health facility. Beneficiary status is associated with a 5.1 percentage point increase in caesarean rates; this impact increases to 7.5 percentage points for beneficiaries enrolled in the programme for >or=6 months before delivery. Beneficiaries had significantly higher caesarean delivery rates in social security facilities (24.0 compared with 5.6% among non-beneficiaries) and in other government facilities (19.3 compared with 9.5%). The Oportunidades conditional cash transfer programme is associated with higher caesarean section rates in social security and government health facilities. This effect appears to be driven by the increases in disposable income from the cash transfer. These findings are relevant to other countries implementing conditional cash transfer programmes and health care requirements.

  18. Stream network and stream segment temperature models software

    USGS Publications Warehouse

    Bartholow, John

    2010-01-01

    This set of programs simulates steady-state stream temperatures throughout a dendritic stream network handling multiple time periods per year. The software requires a math co-processor and 384K RAM. Also included is a program (SSTEMP) designed to predict the steady state stream temperature within a single stream segment for a single time period.

  19. Dr. Sanger's Apprentice: A Computer-Aided Instruction to Protein Sequencing.

    ERIC Educational Resources Information Center

    Schmidt, Thomas G.; Place, Allen R.

    1985-01-01

    Modeled after the program "Mastermind," this program teaches students the art of protein sequencing. The program (written in Turbo Pascal for the IBM PC, requiring 128K, a graphics adapter, and an 8070 mathematics coprocessor) generates a polypeptide whose sequence and length can be user-defined (for practice) or computer-generated (for…

  20. 15 CFR 740.19 - Consumer Communications Devices (CCD).

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... EAR99 or classified under Export Control Classification Number (ECCN) 4A994.b that do not exceed an... classified under ECCN 5A992 or designated EAR99; (3) Input/output control units (other than industrial... coprocessors designated EAR99; (5) Monitors classified under ECCN 5A992 or designated EAR99; (6) Printers...

  1. 15 CFR 740.19 - Consumer Communications Devices (CCD).

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... EAR99 or classified under Export Control Classification Number (ECCN) 4A994.b that do not exceed an... classified under ECCN 5A992 or designated EAR99; (3) Input/output control units (other than industrial... coprocessors designated EAR99; (5) Monitors classified under ECCN 5A992 or designated EAR99; (6) Printers...

  2. 15 CFR 740.19 - Consumer Communications Devices (CCD).

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... EAR99 or classified under Export Control Classification Number (ECCN) 4A994.b that do not exceed an... classified under ECCN 5A992 or designated EAR99; (3) Input/output control units (other than industrial... coprocessors designated EAR99; (5) Monitors classified under ECCN 5A992 or designated EAR99; (6) Printers...

  3. 15 CFR 740.19 - Consumer Communications Devices (CCD).

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... EAR99 or classified under Export Control Classification Number (ECCN) 4A994.b that do not exceed an... classified under ECCN 5A992 or designated EAR99; (3) Input/output control units (other than industrial... coprocessors designated EAR99; (5) Monitors classified under ECCN 5A992 or designated EAR99; (6) Printers...

  4. Particle-in-Cell laser-plasma simulation on Xeon Phi coprocessors

    NASA Astrophysics Data System (ADS)

    Surmin, I. A.; Bastrakov, S. I.; Efimenko, E. S.; Gonoskov, A. A.; Korzhimanov, A. V.; Meyerov, I. B.

    2016-05-01

    This paper concerns the development of a high-performance implementation of the Particle-in-Cell method for plasma simulation on Intel Xeon Phi coprocessors. We discuss the suitability of the method for Xeon Phi architecture and present our experience in the porting and optimization of the existing parallel Particle-in-Cell code PICADOR. Direct porting without code modification gives performance on Xeon Phi close to that of an 8-core CPU on a benchmark problem with 50 particles per cell. We demonstrate step-by-step optimization techniques, such as improving data locality, enhancing parallelization efficiency and vectorization leading to an overall 4.2 × speedup on CPU and 7.5 × on Xeon Phi compared to the baseline version. The optimized version achieves 16.9 ns per particle update on an Intel Xeon E5-2660 CPU and 9.3 ns per particle update on an Intel Xeon Phi 5110P. For a real problem of laser ion acceleration in targets with surface grating, where a large number of macroparticles per cell is required, the speedup of Xeon Phi compared to CPU is 1.6 ×.

  5. A low power biomedical signal processor ASIC based on hardware software codesign.

    PubMed

    Nie, Z D; Wang, L; Chen, W G; Zhang, T; Zhang, Y T

    2009-01-01

    A low power biomedical digital signal processor ASIC based on hardware and software codesign methodology was presented in this paper. The codesign methodology was used to achieve higher system performance and design flexibility. The hardware implementation included a low power 32bit RISC CPU ARM7TDMI, a low power AHB-compatible bus, and a scalable digital co-processor that was optimized for low power Fast Fourier Transform (FFT) calculations. The co-processor could be scaled for 8-point, 16-point and 32-point FFTs, taking approximate 50, 100 and 150 clock circles, respectively. The complete design was intensively simulated using ARM DSM model and was emulated by ARM Versatile platform, before conducted to silicon. The multi-million-gate ASIC was fabricated using SMIC 0.18 microm mixed-signal CMOS 1P6M technology. The die area measures 5,000 microm x 2,350 microm. The power consumption was approximately 3.6 mW at 1.8 V power supply and 1 MHz clock rate. The power consumption for FFT calculations was less than 1.5 % comparing with the conventional embedded software-based solution.

  6. Discrete Particle Model for Porous Media Flow using OpenFOAM at Intel Xeon Phi Coprocessors

    NASA Astrophysics Data System (ADS)

    Shang, Zhi; Nandakumar, Krishnaswamy; Liu, Honggao; Tyagi, Mayank; Lupo, James A.; Thompson, Karten

    2015-11-01

    The discrete particle model (DPM) in OpenFOAM was used to study the turbulent solid particle suspension flows through the porous media of a natural dual-permeability rock. The 2D and 3D pore geometries of the porous media were generated by sphere packing with the radius ratio of 3. The porosity is about 38% same as the natural dual-permeability rock. In the 2D case, the mesh cells reach 5 million with 1 million solid particles and in the 3D case, the mesh cells are above 10 million with 5 million solid particles. The solid particles are distributed by Gaussian distribution from 20 μm to 180 μm with expectation as 100 μm. Through the numerical simulations, not only was the HPC studied using Intel Xeon Phi Coprocessors but also the flow behaviors of large scale solid suspension flows in porous media were studied. The authors would like to thank the support by IPCC@LSU-Intel Parallel Computing Center (LSU # Y1SY1-1) and the HPC resources at Louisiana State University (http://www.hpc.lsu.edu).

  7. Speeding-up Bioinformatics Algorithms with Heterogeneous Architectures: Highly Heterogeneous Smith-Waterman (HHeterSW).

    PubMed

    Gálvez, Sergio; Ferusic, Adis; Esteban, Francisco J; Hernández, Pilar; Caballero, Juan A; Dorado, Gabriel

    2016-10-01

    The Smith-Waterman algorithm has a great sensitivity when used for biological sequence-database searches, but at the expense of high computing-power requirements. To overcome this problem, there are implementations in literature that exploit the different hardware-architectures available in a standard PC, such as GPU, CPU, and coprocessors. We introduce an application that splits the original database-search problem into smaller parts, resolves each of them by executing the most efficient implementations of the Smith-Waterman algorithms in different hardware architectures, and finally unifies the generated results. Using non-overlapping hardware allows simultaneous execution, and up to 2.58-fold performance gain, when compared with any other algorithm to search sequence databases. Even the performance of the popular BLAST heuristic is exceeded in 78% of the tests. The application has been tested with standard hardware: Intel i7-4820K CPU, Intel Xeon Phi 31S1P coprocessors, and nVidia GeForce GTX 960 graphics cards. An important increase in performance has been obtained in a wide range of situations, effectively exploiting the available hardware.

  8. Fast Acceleration of 2D Wave Propagation Simulations Using Modern Computational Accelerators

    PubMed Central

    Wang, Wei; Xu, Lifan; Cavazos, John; Huang, Howie H.; Kay, Matthew

    2014-01-01

    Recent developments in modern computational accelerators like Graphics Processing Units (GPUs) and coprocessors provide great opportunities for making scientific applications run faster than ever before. However, efficient parallelization of scientific code using new programming tools like CUDA requires a high level of expertise that is not available to many scientists. This, plus the fact that parallelized code is usually not portable to different architectures, creates major challenges for exploiting the full capabilities of modern computational accelerators. In this work, we sought to overcome these challenges by studying how to achieve both automated parallelization using OpenACC and enhanced portability using OpenCL. We applied our parallelization schemes using GPUs as well as Intel Many Integrated Core (MIC) coprocessor to reduce the run time of wave propagation simulations. We used a well-established 2D cardiac action potential model as a specific case-study. To the best of our knowledge, we are the first to study auto-parallelization of 2D cardiac wave propagation simulations using OpenACC. Our results identify several approaches that provide substantial speedups. The OpenACC-generated GPU code achieved more than speedup above the sequential implementation and required the addition of only a few OpenACC pragmas to the code. An OpenCL implementation provided speedups on GPUs of at least faster than the sequential implementation and faster than a parallelized OpenMP implementation. An implementation of OpenMP on Intel MIC coprocessor provided speedups of with only a few code changes to the sequential implementation. We highlight that OpenACC provides an automatic, efficient, and portable approach to achieve parallelization of 2D cardiac wave simulations on GPUs. Our approach of using OpenACC, OpenCL, and OpenMP to parallelize this particular model on modern computational accelerators should be applicable to other computational models of wave propagation in multi-dimensional media. PMID:24497950

  9. The DUNDRUM Quartet: validation of structured professional judgement instruments DUNDRUM-3 assessment of programme completion and DUNDRUM-4 assessment of recovery in forensic mental health services

    PubMed Central

    2011-01-01

    Background Moving a forensic mental health patient from one level of therapeutic security to a lower level or to the community is influenced by more than risk assessment and risk management. We set out to construct and validate structured professional judgement instruments for consistency and transparency in decision making Methods Two instruments were developed, the seven-item DUNDRUM-3 programme completion instrument and the six item DUNDRUM-4 recovery instrument. These were assessed for all 95 forensic patients at Ireland's only forensic mental health hospital. Results The two instruments had good internal consistency (Cronbach's alpha 0.911 and 0.887). Scores distinguished those allowed no leave or accompanied leave from those with unaccompanied leave (ANOVA F = 38.1 and 50.3 respectively, p < 0.001). Scores also distinguished those in acute/high security units from those in medium or in low secure/pre-discharge units. Each individual item distinguished these levels of need significantly. The DUNDRUM-3 and DUNDRUM-4 correlated moderately with measures of dynamic risk and with the CANFOR staff rated unmet need (Spearman r = 0.5, p < 0.001). Conclusions The DUNDRUM-3 programme completion items distinguished significantly between levels of therapeutic security while the DUNDRUM-4 recovery items consistently distinguished those given unaccompanied leave outside the hospital and those in the lowest levels of therapeutic security. This data forms the basis for a prospective study of outcomes now underway. PMID:21722396

  10. A hospital-based child protection programme evaluation instrument: a modified Delphi study.

    PubMed

    Wilson, Denise; Koziol-McLain, Jane; Garrett, Nick; Sharma, Pritika

    2010-08-01

    Refine instrument for auditing hospital-based child abuse and neglect violence intervention programmes prior to field-testing. A modified Delphi study to identify and rate items and domains indicative of an effective and quality child abuse and neglect intervention programme. Experts participated in four Delphi rounds: two surveys, a one-day workshop and the opportunity to comment on the penultimate instrument. New Zealand. Twenty-four experts in the field of care and protection of children. Items with panel agreement >or=85% and mean importance rating >or=4.0 (scale from 1 (not important) to 5 (very important)). There was high-level consensus on items across Rounds 1 and 2 (89% and 85%, respectively). In Round 3 an additional domain (safety and security) was agreed upon and cultural issues, alert systems for children at risk, and collaboration among primary care, community, non-government and government agencies were discussed. The final instrument included nine domains ('policies and procedures', 'safety and security', 'collaboration', 'cultural environment', 'training of providers', 'intervention services', 'documentation' 'evaluation' and 'physical environment') and 64 items. The refined instrument represents the hallmarks of an ideal child abuse and neglect programme given current knowledge and experience. The instrument enables rigorous evaluations of hospital-based child abuse and neglect intervention programmes for quality improvement and benchmarking with other programmes.

  11. PC-BASED MIE SCATTERING PROGRAM FOR THEORETICAL INVESTIGATIONS OF THE OPTICAL PROPERTIES OF ATMOSPHERIC AEROSOLS AS A FUNCTION OF COMPOSITION AND RELATIVE HUMIDITY

    EPA Science Inventory

    Over the past decade there has been interest in exploring possible relationships between atmospheric visibility (extinction of light) and the chemical form of aerosols in the atmosphere. ser-friendly, menu-driven program for the personal computer (AT 286 with math co-processor or...

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jiang, Yunshan; DeVore, Peter T. S.; Jalali, Bahram

    Optical computing accelerators help alleviate bandwidth and power consumption bottlenecks in electronics. In this paper, we show an approach to implementing logarithmic-type analog co-processors in silicon photonics and use it to perform the exponentiation operation and the recovery of a signal in the presence of multiplicative distortion. Finally, the function is realized by exploiting nonlinear-absorption-enhanced Raman amplification saturation in a silicon waveguide.

  13. Software Security Knowledge: Training

    DTIC Science & Technology

    2011-05-01

    eliminating those erro~rs. It can be found at http:ffcwe.mitre.org/top25. Any programmer who writes C’Ode \\r-Vith~out betng aware of those proble ~ms a·nd...time on security. Ultimately, these reasons stem from an underlying problem in the software market . B~cause software is essentially a black·box, it is...security of software and start to effect change in the software market . Nevertheless, we still frequently get pushback when we advocate for security

  14. International Cooperation for the Training of Water Managers from Developing Countries

    NASA Astrophysics Data System (ADS)

    Aswathanarayana, U.

    2007-12-01

    Water is the key to the well being of a community. On one hand, water security is linked to food security, as food cannot be grown without water. On the other hand, water security is linked to environmental security, as water is needed to maintain the health of a community. International cooperation is proposed for the training in Hyderabad, India, with international faculty, of ~ 300 water managers from the developing countries at an estimated cost of ~USD 3300/- per candidate (including ~ USD 1800/- for international travel), through ten interactive and customized training programmes during the period of five years, to enable them to address two crucial issues affecting the poor in the developing countries, namely, access to affordable water and coping with water scarcity. Ways of Good governance and geographical targeting of poverty alleviation programmes are built into each training programme. Each training programme will be for about three weeks (inclusive of field work). Each course will have a component common to all, plus a component customized to the biophysical and socioeconomic situation in a candidate's country. Ten course manuals will be produced. which can later be published commercially as low-cost volumes, for the benefit of the readership in the Developing countries . Each candidate will be provided his own computer, and software, and individual faculty adviser. On the basis of the training received, a candidate should be able to carry with him at the end of the course a draft outline of techno-socio-economic action plan for his country/area in respect of the theme of the course, prepared by himself/herself. A copy of this outline would be provided to the World Bank, and relevant organizations for follow- up activity

  15. COPERNICUS - The European Union Earth Observation Programme - State of play and way ahead

    NASA Astrophysics Data System (ADS)

    Koch, Astrid-Christina

    2015-04-01

    Copernicus is the new name of the European Earth Observation Programme, GMES (Global Monitoring for Environment and Security). Copernicus or rather its predecessor was established as an EU programme. It covers all the activities for ensuring an uninterrupted provision of accurate and reliable data and information on environmental issues and security matters to users in charge of policy making, implementation and monitoring, in the EU and its Member States. Copernicus aims at providing Europe with a continuous, independent and reliable access to observation data and information. The EU investment aims at filling the observation gaps, providing access to existing assets and developing operational services. The data policy of the Copernicus programme supports an open, full and free of charge data access that is in line with the data sharing principles of the Group for Earth Observation (GEO). Copernicus is structured in six Services: Marine, Atmosphere, Land and Climate change monitoring as well as support to Emergency and Security. Copernicus uses data from satellites and in-situ sensors such as buoys, balloons or air sensors to provide timely and reliable added-value information and forecasting to support for example, agriculture and fisheries, land use and urban planning, the fight against forest fires, disaster response, maritime transport or air pollution monitoring. The need for continuing such observations is becoming critical, considering the increasing political pressure on public authorities to take informed decisions in the field of environment, security and climate change and the need to respect international agreements. Copernicus also contributes to economic stability and growth by boosting commercial applications (the so-called downstream services) in many different sectors through a full and open access to Copernicus observation data and information products. KEY WORDS: Sentinels, big data, data access, Emergency, Marine, Atmosphere.

  16. Extending the BEAGLE library to a multi-FPGA platform

    PubMed Central

    2013-01-01

    Background Maximum Likelihood (ML)-based phylogenetic inference using Felsenstein’s pruning algorithm is a standard method for estimating the evolutionary relationships amongst a set of species based on DNA sequence data, and is used in popular applications such as RAxML, PHYLIP, GARLI, BEAST, and MrBayes. The Phylogenetic Likelihood Function (PLF) and its associated scaling and normalization steps comprise the computational kernel for these tools. These computations are data intensive but contain fine grain parallelism that can be exploited by coprocessor architectures such as FPGAs and GPUs. A general purpose API called BEAGLE has recently been developed that includes optimized implementations of Felsenstein’s pruning algorithm for various data parallel architectures. In this paper, we extend the BEAGLE API to a multiple Field Programmable Gate Array (FPGA)-based platform called the Convey HC-1. Results The core calculation of our implementation, which includes both the phylogenetic likelihood function (PLF) and the tree likelihood calculation, has an arithmetic intensity of 130 floating-point operations per 64 bytes of I/O, or 2.03 ops/byte. Its performance can thus be calculated as a function of the host platform’s peak memory bandwidth and the implementation’s memory efficiency, as 2.03 × peak bandwidth × memory efficiency. Our FPGA-based platform has a peak bandwidth of 76.8 GB/s and our implementation achieves a memory efficiency of approximately 50%, which gives an average throughput of 78 Gflops. This represents a ~40X speedup when compared with BEAGLE’s CPU implementation on a dual Xeon 5520 and 3X speedup versus BEAGLE’s GPU implementation on a Tesla T10 GPU for very large data sizes. The power consumption is 92 W, yielding a power efficiency of 1.7 Gflops per Watt. Conclusions The use of data parallel architectures to achieve high performance for likelihood-based phylogenetic inference requires high memory bandwidth and a design methodology that emphasizes high memory efficiency. To achieve this objective, we integrated 32 pipelined processing elements (PEs) across four FPGAs. For the design of each PE, we developed a specialized synthesis tool to generate a floating-point pipeline with resource and throughput constraints to match the target platform. We have found that using low-latency floating-point operators can significantly reduce FPGA area and still meet timing requirement on the target platform. We found that this design methodology can achieve performance that exceeds that of a GPU-based coprocessor. PMID:23331707

  17. Radio Frequency Based Programmable Logic Controller Anomaly Detection

    DTIC Science & Technology

    2013-09-01

    include wireless radios, IEEE 802.15 Blue- tooth devices, cellular phones, and IEEE 802.11 WiFi networking devices. While wireless communication...MacKenzie, H. Shamoon Malware and SCADA Security What are the Im- pacts? . Technical Report, Tofino Security, Sep 2012. 61. Mateti,P. Hacking Techniques

  18. Optimizing meridional advection of the Advanced Research WRF (ARW) dynamics for Intel Xeon Phi coprocessor

    NASA Astrophysics Data System (ADS)

    Mielikainen, Jarno; Huang, Bormin; Huang, Allen H.-L.

    2015-05-01

    The most widely used community weather forecast and research model in the world is the Weather Research and Forecast (WRF) model. Two distinct varieties of WRF exist. The one we are interested is the Advanced Research WRF (ARW) is an experimental, advanced research version featuring very high resolution. The WRF Nonhydrostatic Mesoscale Model (WRF-NMM) has been designed for forecasting operations. WRF consists of dynamics code and several physics modules. The WRF-ARW core is based on an Eulerian solver for the fully compressible nonhydrostatic equations. In the paper, we optimize a meridional (north-south direction) advection subroutine for Intel Xeon Phi coprocessor. Advection is of the most time consuming routines in the ARW dynamics core. It advances the explicit perturbation horizontal momentum equations by adding in the large-timestep tendency along with the small timestep pressure gradient tendency. We will describe the challenges we met during the development of a high-speed dynamics code subroutine for MIC architecture. Furthermore, lessons learned from the code optimization process will be discussed. The results show that the optimizations improved performance of the original code on Xeon Phi 7120P by a factor of 1.2x.

  19. Mitigating risks by integrating business continuity and security.

    PubMed

    Shaw, Scott; Smith, Nicholas

    2010-11-01

    There has been much discussion regarding the topic of business continuity and security convergence. This paper provides a realistic overview of the union of the two disciplines and offers no/low-cost programme elements that may be used for organisations considering or in the midst of convergence efforts.

  20. Laboratory Experiments for Network Security Instruction

    ERIC Educational Resources Information Center

    Brustoloni, Jose Carlos

    2006-01-01

    We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gorton, Ian

    As the sun slowly sets of this first decade of the new millenium, it seems appropriate to update the sojourn of the real programmers as they adapt to their ever changing technical and business environment. Real Programmers were perfectly characterized and differentiated from their quiche-eating, Pascal programming brethren in Ed Post’s seminal “Real Programmers Don’t Use Pascal” (Datamation, 1983). My follow-up ("Real programmers do use Delphi," Software, IEEE , vol.12, no.6, pp.8, 10, 12-, Nov 1995) charted their evolution from FORTRAN-only programmers to embracing a wider range of mainstream languages and tools that still afforded ample opportunity for creativity, game-playing,more » irregular work hours, and importantly, long-term job security.« less

  2. How much does the Supplemental Nutrition Assistance Program alleviate food insecurity? Evidence from recent programme leavers.

    PubMed

    Nord, Mark

    2012-05-01

    To estimate the effect of the US Supplemental Nutrition Assistance Program (SNAP) on the food security (consistent access to adequate food) of recipients, net of the effect of the self-selection of more food-needy households into the programme. The food security of current SNAP recipients and recent leavers is compared in cross-sectional survey data, adjusting for economic and demographic differences using multivariate logistic regression methods. A similar analysis in 2-year longitudinal panels provides additional control for selection on unobserved variables based on food security status in the previous year. Household survey data collected for the US Department of Agriculture by the US Census Bureau. Households interviewed in the Current Population Survey Food Security Supplements from 2001 to 2009. The odds of very low food security among households that continued on SNAP through the end of a survey year were 28 % lower than among those that left SNAP prior to the 30-d period during which food security was assessed. In 2-year panels with controls for the severity of food insecurity in the previous year, the difference in odds was 45 %. The results are consistent with, or somewhat higher than, the estimates from the strongest previous research designs and suggest that the ameliorative effect of SNAP on very low food security is in the range of 20-50 %.

  3. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20.

    PubMed

    Davoren, Mary; O'Dwyer, Sarah; Abidin, Zareena; Naughton, Leena; Gibbons, Olivia; Doyle, Elaine; McDonnell, Kim; Monks, Stephen; Kennedy, Harry G

    2012-07-13

    We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Clinicians appear to decide moves based on combinations of current and imminent (dynamic) risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1) in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'.

  4. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20

    PubMed Central

    2012-01-01

    Background We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. Methods This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. Results There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Conclusions Clinicians appear to decide moves based on combinations of current and imminent (dynamic) risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1) in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'. PMID:22794187

  5. Conversations about Research Supervision--Enabling and Accrediting a Community of Practice Model for Research Degree Supervisor Development

    ERIC Educational Resources Information Center

    Hill, Geof; Vaughan, Sian

    2018-01-01

    The authors' lived experience of devising a professional development programme for research supervisors and securing SEDA (Staff and Educational Development Association) accreditation informs this paper. Our first purpose is to outline the programme and discuss its uniqueness in using a community of practice model in conjunction with practitioner…

  6. Academic Programme Development and the Participation of Relevant Interest Groups for Quality Manpower Production in Nigeria Higher Education

    ERIC Educational Resources Information Center

    Agabi, Ogar G.; Obasi, Kenneth K.; Ohia, Adanma N.

    2012-01-01

    Quality manpower production is not just essential for national development, but very critical to national security and quick economic recovery in most of today's fragile economies of the world. This paper assessed the participation of prospective employers as relevant interest groups in the development of academic programmes in tertiary…

  7. Toward Automating Web Protocol Configuration for a Programmable Logic Controller Emulator

    DTIC Science & Technology

    2014-06-19

    Security Risks for Industrial Control Systems ,” VDE 2004 Congress, Berlin, Germany, October 2004, pp. 1-7. [Cis12] Cisco, NetFlow Configuration Guide...Date 29 May 2014 Date AFIT-ENG-T-14-J-4 Abstract Industrial Control Systems (ICS) remain vulnerable through attack vectors that exist within programmable...5 2.2 Industrial Control Systems

  8. Scaling Support Vector Machines On Modern HPC Platforms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    You, Yang; Fu, Haohuan; Song, Shuaiwen

    2015-02-01

    We designed and implemented MIC-SVM, a highly efficient parallel SVM for x86 based multicore and many-core architectures, such as the Intel Ivy Bridge CPUs and Intel Xeon Phi co-processor (MIC). We propose various novel analysis methods and optimization techniques to fully utilize the multilevel parallelism provided by these architectures and serve as general optimization methods for other machine learning tools.

  9. Analog optical computing primitives in silicon photonics

    DOE PAGES

    Jiang, Yunshan; DeVore, Peter T. S.; Jalali, Bahram

    2016-03-15

    Optical computing accelerators help alleviate bandwidth and power consumption bottlenecks in electronics. In this paper, we show an approach to implementing logarithmic-type analog co-processors in silicon photonics and use it to perform the exponentiation operation and the recovery of a signal in the presence of multiplicative distortion. Finally, the function is realized by exploiting nonlinear-absorption-enhanced Raman amplification saturation in a silicon waveguide.

  10. Implementation and Assessment of Advanced Analog Vector-Matrix Processor

    NASA Technical Reports Server (NTRS)

    Gary, Charles K.; Bualat, Maria G.; Lum, Henry, Jr. (Technical Monitor)

    1994-01-01

    This paper discusses the design and implementation of an analog optical vecto-rmatrix coprocessor with a throughput of 128 Mops for a personal computer. Vector matrix calculations are inherently parallel, providing a promising domain for the use of optical calculators. However, to date, digital optical systems have proven too cumbersome to replace electronics, and analog processors have not demonstrated sufficient accuracy in large scale systems. The goal of the work described in this paper is to demonstrate a viable optical coprocessor for linear operations. The analog optical processor presented has been integrated with a personal computer to provide full functionality and is the first demonstration of an optical linear algebra processor with a throughput greater than 100 Mops. The optical vector matrix processor consists of a laser diode source, an acoustooptical modulator array to input the vector information, a liquid crystal spatial light modulator to input the matrix information, an avalanche photodiode array to read out the result vector of the vector matrix multiplication, as well as transport optics and the electronics necessary to drive the optical modulators and interface to the computer. The intent of this research is to provide a low cost, highly energy efficient coprocessor for linear operations. Measurements of the analog accuracy of the processor performing 128 Mops are presented along with an assessment of the implications for future systems. A range of noise sources, including cross-talk, source amplitude fluctuations, shot noise at the detector, and non-linearities of the optoelectronic components are measured and compared to determine the most significant source of error. The possibilities for reducing these sources of error are discussed. Also, the total error is compared with that expected from a statistical analysis of the individual components and their relation to the vector-matrix operation. The sufficiency of the measured accuracy of the processor is compared with that required for a range of typical problems. Calculations resolving alloy concentrations from spectral plume data of rocket engines are implemented on the optical processor, demonstrating its sufficiency for this problem. We also show how this technology can be easily extended to a 100 x 100 10 MHz (200 Cops) processor.

  11. Violent Extremism, National Security and Prevention. Institutional Discourses and Their Implications for Schooling

    ERIC Educational Resources Information Center

    Mattsson, Christer; Säljö, Roger

    2018-01-01

    Currently, threats to societal security from extremist groups are high on the political agenda in many countries. Politicians, policymakers at various levels and communities are searching for methods to counteract recruitment to violent organizations. These efforts are often referred to as Prevention of Violent Extremism (PVE-programmes). One of…

  12. From Charity to Security: The Emergence of the National School Lunch Program

    ERIC Educational Resources Information Center

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  13. A Service Evaluation of a 1-Year Dialectical Behaviour Therapy Programme for Women with Borderline Personality Disorder in a Low Secure Unit.

    PubMed

    Fox, Emily; Krawczyk, Kirsten; Staniford, Jessica; Dickens, Geoffrey L

    2015-11-01

    Previous studies about the effectiveness of Dialectical Behaviour Therapy for the treatment of Borderline Personality Disorder have had promising results. However, no previous studies have examined its effectiveness when delivered in low secure inpatient services for women. To evaluate clinical outcomes during and after a 1-year period of admission within a low secure unit for women offering a Dialectical Behaviour Therapy programme. A naturalistic, within subjects study of clinical data collected as part of routine practice was conducted. Participants were 18 consecutively admitted women who met the diagnostic criteria for Borderline Personality Disorder and had completed at least 1 year of treatment. Measures covered: risk behaviours; self-reported symptoms of Borderline Personality Disorder, and current mood and symptom experience; staff reports of clinical problems, needs and social functioning. Scores were compared between admission and at 6 months and 1 year. There was a statistically significant improvement on all 13 measures over the year's treatment. Most improvement was demonstrated between admission and 6 months. Engagement in1-year's treatment was associated with significant reduction in risk behaviours and both staff-rated and self-rated outcome measures. Some significant questions remain about which elements of the programme are most effective but the results are encouraging.

  14. Does the Reputation of a Faculty Member's Graduate Programme and Institution Matter for Labour Market Outcomes?

    ERIC Educational Resources Information Center

    Warshaw, Jarrett B.; Toutkoushian, Robert K.; Choi, Hyejin

    2017-01-01

    For a future faculty member the choice of which graduate programme and institution to attend is considered to have important implications for securing academic employment, developing skills to succeed in academia, and yielding positive returns on investment of time and money in education. Yet does it matter where a faculty member attends graduate…

  15. The Strategy to Increase Women Farmer's Participation in the Program of Village Food Barn in East Java

    ERIC Educational Resources Information Center

    Yuliatia, Yayuk; Iskaskar, Riyanti

    2016-01-01

    Food Barn Village Programme is one of the government's efforts in achieving household food security which includes four components. The purpose of this study was to develop a strategy to increase women's participation in the Food Barn Village Programme. This research was conducted in three villages in the district of Malang, namely: Village…

  16. Impact of a District-Wide Diabetes Prevention Programme Involving Health Education for Children and the Community

    ERIC Educational Resources Information Center

    Sheeladevi, Sethu; Sagar, Jayanthi; Pujari, Siddharth; Rani, Padmaja Kumari

    2014-01-01

    Objective: To present results from a district-wide diabetes prevention programme involving health education for school children and the local community. Method: The model of health education that was utilized aimed to secure lifestyle changes and the identification of diabetes risk by school children (aged 9-12 years). The children acted as health…

  17. Improving organisational resilience through enterprise security risk management.

    PubMed

    Petruzzi, John; Loyear, Rachelle

    Enterprise Security Risk Management (ESRM) is a new philosophy and method of managing security programmes through the use of traditional risk principles. As a philosophy and life cycle, ESRM is focused on creating a business partnership between security practitioners and business leaders to more effectively provide protection against security risks in line with acceptable risk tolerances as defined by business asset owners and stakeholders. This paper explores the basics of the ESRM philosophy and life cycle and also shows how embracing the ESRM philosophy and implementing a risk-based security management model in the business organisation can lead to higher levels of organisational resilience as desired by organisation leaders, executives and the board of directors.

  18. Educating the security forces, a high risk group in malaria elimination efforts: an example from Sri Lanka.

    PubMed

    Fernando, Sumadhya Deepika; Rodrigo, Chaturaka; de Silva, Nipun; Semege, Saveen; Rajapakse, Senaka; Samaranayake, Nilakashi; Senenayake, Sanath; Premaratne, Risintha Gayan

    2014-09-01

    The security forces are a high risk group for malaria transmission in Sri Lanka. Interrupting transmission and maintaining surveillance in this group is an important component of elimination efforts. The objective of the study was to develop a prototype educational programme on malaria for security forces serving in endemic areas. An interactive seminar was designed to deliver the required knowledge. The content was on current status, transmission, signs and symptoms and the role of security personnel in identification and prevention of malaria. Each seminar was preceded by a pre-test and followed by a post test to assess the improvement of knowledge. Fifty seminars were held in eight districts over 2 months with 2301 security forces personnel participating. Pre seminar knowledge on malaria was significantly better in the medical corps, those who had completed secondary education and in the Army compared to other security forces (p<0.001). Participation in the seminar resulted in an improvement in all domains tested as shown by test scores in post seminar assessment (p<0.001). Conducting a formal educational programme is an effective strategy to improve awareness on malaria amongst security forces personnel who are a high risk group for re-introduction of malaria into the country. © The Author 2014. Published by Oxford University Press on behalf of Royal Society of Tropical Medicine and Hygiene. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  19. The reasons students choose to undertake a nursing degree.

    PubMed

    Wilkes, Lesley; Cowin, Leanne; Johnson, Maree

    2015-01-01

    Determining the reasons people choose to study nursing may help educators and managers develop student-focussed and enticing nursing programmes. In Australia, little research has been undertaken with students entering nursing programmes and the reasons for their choice. The aim of this study was to determine why new students choose to enter nursing at university. A descriptive survey design. An urban university in Sydney, Australia. Undergraduate nursing students at the beginning of their first year of study. An open-ended question relating to the reasons for students' choice of a nursing programme was included in the survey. The transcribed textual data were content analysed for words related to the students' choice. The students' reasons for entering nursing programmes were both personal and career related, with personal being more dominant. The reasons to start nursing were: being able to help and care for people, job security, the ability to enter tertiary education and the enjoyment or love of nursing. Nursing remains a career of choice for young and mature students entering university. It is seen to provide security, interest and opportunity to help and care for others. Universities must focus on this as they develop programmes for a generation where multiple changes of career appear inevitable during their lifetime. The nursing profession needs to look at career pathways after graduation that provide these challenges within nursing itself.

  20. Seed Aid for Food Security? Some Lessons from Zimbabwe's Agricultural Recovery Programme

    ERIC Educational Resources Information Center

    Foti, Richard; Muringai, Violet; Mavunganidze, Zira

    2007-01-01

    Does agricultural input aid always lead to favourable food security outcomes? This paper describes Zimbabwe's agricultural recovery program for the 2003/2004 farming season and draws some lessons that can be used in the designing and implementation of future programs. Input aid was found to be most beneficial if it is packaged together with other…

  1. HPC Programming on Intel Many-Integrated-Core Hardware with MAGMA Port to Xeon Phi

    DOE PAGES

    Dongarra, Jack; Gates, Mark; Haidar, Azzam; ...

    2015-01-01

    This paper presents the design and implementation of several fundamental dense linear algebra (DLA) algorithms for multicore with Intel Xeon Phi coprocessors. In particular, we consider algorithms for solving linear systems. Further, we give an overview of the MAGMA MIC library, an open source, high performance library, that incorporates the developments presented here and, more broadly, provides the DLA functionality equivalent to that of the popular LAPACK library while targeting heterogeneous architectures that feature a mix of multicore CPUs and coprocessors. The LAPACK-compliance simplifies the use of the MAGMA MIC library in applications, while providing them with portably performant DLA.more » High performance is obtained through the use of the high-performance BLAS, hardware-specific tuning, and a hybridization methodology whereby we split the algorithm into computational tasks of various granularities. Execution of those tasks is properly scheduled over the heterogeneous hardware by minimizing data movements and mapping algorithmic requirements to the architectural strengths of the various heterogeneous hardware components. Our methodology and programming techniques are incorporated into the MAGMA MIC API, which abstracts the application developer from the specifics of the Xeon Phi architecture and is therefore applicable to algorithms beyond the scope of DLA.« less

  2. Catching the Early Walker: An Examination of Potential Antecedents of Rapid Student Exit from Business-Related Undergraduate Degree Programmes in a Post-1992 University

    ERIC Educational Resources Information Center

    Bennett, Roger; Kottasz, Rita; Nocciolino, Julia

    2007-01-01

    Outputs from a computerised touch pad turnstile security system that recorded business students' entries into and exits from a university's buildings revealed that a significant number of the institution's first-year intake withdrew from their (business) degree programmes within a few weeks of enrolment. Accordingly, a sample of these "early…

  3. SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor

    DTIC Science & Technology

    2016-11-01

    and excluding devices from a communicating group as they become trusted, or untrusted. An example of using rekeying to dynamically adjust group...algorithms, such as the Elliptic Curve Digital Signature Algorithm (ECDSA), work by computing a cryptographic hash of a message using, for example , the...material is based upon work supported by the Assistant Secretary of Defense for Research and Engineering under Air Force Contract No. FA8721- 05-C

  4. Large Scale Document Inversion using a Multi-threaded Computing System

    PubMed Central

    Jung, Sungbo; Chang, Dar-Jen; Park, Juw Won

    2018-01-01

    Current microprocessor architecture is moving towards multi-core/multi-threaded systems. This trend has led to a surge of interest in using multi-threaded computing devices, such as the Graphics Processing Unit (GPU), for general purpose computing. We can utilize the GPU in computation as a massive parallel coprocessor because the GPU consists of multiple cores. The GPU is also an affordable, attractive, and user-programmable commodity. Nowadays a lot of information has been flooded into the digital domain around the world. Huge volume of data, such as digital libraries, social networking services, e-commerce product data, and reviews, etc., is produced or collected every moment with dramatic growth in size. Although the inverted index is a useful data structure that can be used for full text searches or document retrieval, a large number of documents will require a tremendous amount of time to create the index. The performance of document inversion can be improved by multi-thread or multi-core GPU. Our approach is to implement a linear-time, hash-based, single program multiple data (SPMD), document inversion algorithm on the NVIDIA GPU/CUDA programming platform utilizing the huge computational power of the GPU, to develop high performance solutions for document indexing. Our proposed parallel document inversion system shows 2-3 times faster performance than a sequential system on two different test datasets from PubMed abstract and e-commerce product reviews. CCS Concepts •Information systems➝Information retrieval • Computing methodologies➝Massively parallel and high-performance simulations. PMID:29861701

  5. Large Scale Document Inversion using a Multi-threaded Computing System.

    PubMed

    Jung, Sungbo; Chang, Dar-Jen; Park, Juw Won

    2017-06-01

    Current microprocessor architecture is moving towards multi-core/multi-threaded systems. This trend has led to a surge of interest in using multi-threaded computing devices, such as the Graphics Processing Unit (GPU), for general purpose computing. We can utilize the GPU in computation as a massive parallel coprocessor because the GPU consists of multiple cores. The GPU is also an affordable, attractive, and user-programmable commodity. Nowadays a lot of information has been flooded into the digital domain around the world. Huge volume of data, such as digital libraries, social networking services, e-commerce product data, and reviews, etc., is produced or collected every moment with dramatic growth in size. Although the inverted index is a useful data structure that can be used for full text searches or document retrieval, a large number of documents will require a tremendous amount of time to create the index. The performance of document inversion can be improved by multi-thread or multi-core GPU. Our approach is to implement a linear-time, hash-based, single program multiple data (SPMD), document inversion algorithm on the NVIDIA GPU/CUDA programming platform utilizing the huge computational power of the GPU, to develop high performance solutions for document indexing. Our proposed parallel document inversion system shows 2-3 times faster performance than a sequential system on two different test datasets from PubMed abstract and e-commerce product reviews. •Information systems➝Information retrieval • Computing methodologies➝Massively parallel and high-performance simulations.

  6. The UK Government's global partnership programme - Its achievements over the past five years and challenges ahead

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heyes, Alan

    2007-07-01

    Through the Global Partnership the UK continues to make a significant contribution to improve national and global security. Over the past year the UK has continued to implement a wide range of projects across the breadth of its Global Partnership Programme. As well as ensuring the Programme is robust and capable of dealing with new challenges, the UK has cooperated with other donor countries to help them progress projects associated with submarine dismantling, scientist redirection, enhancing nuclear security and Chemical Weapons Destruction. The Global Partnership, although only five years old, has already achieved a great deal. Some 23 states, plusmore » the European Union, are now working closer together under the Global Partnership, and collectively have enhanced global regional and national security by reducing the availability of Weapons of Mass Destruction (WMD) materials and expertise to both states of concern and terrorists. Considerable progress has already been made in, for example: - Improving the security of fissile materials, dangerous biological agents and chemical weapons stocks; - Reducing the number of sites containing radioactive materials; - Working towards closure of reactors still producing weapon-grade plutonium; - Improving nuclear safety to reduce the risks of further, Chernobyl style accidents; - Constructing facilities for destroying Chemical Weapons stocks, and starting actual destruction; - Providing sustainable employment for former WMD scientists to reduce the risk that their expertise will be misused by states or terrorists. By contributing to many of these activities, the UK has helped to make the world safer. This paper reports on the UK's practical and sustainable contribution to the Global Partnership and identifies a number of challenges that remain if it is to have a wider impact on reducing the threats from WMD material. (authors)« less

  7. Looking beyond food aid to livelihoods, protection and partnerships: strategies for WFP in the Darfur states.

    PubMed

    Young, Helen

    2007-03-01

    The humanitarian crisis in Darfur remains extremely serious. The optimism that followed the signing of the Abuja Peace Accord was followed by a rapid deterioration in security on the ground in part associated with increasing factionalism in various rebel movements. This paper briefly reviews the evolution of the crisis, its impact on lives and livelihoods and the response by the World Food Programme (WFP) to June 2006. The major challenges and issues facing the food aid programme in the previous 18 months included: dealing with insecurity while maintaining or even extending programme outreach; the need to link protection with assistance more explicitly; and determining the wider impact of food aid programming on the processes and institutions linked with the conflict. The paper discusses the main strategic issues facing WFP in the future such as: integrating security and protection with needs assessments and operational decisions, broadening response strategies beyond food aid and bringing livelihoods to the fore, the need to review cost-efficiency, promoting partnerships and strengthening national and regional capacities.

  8. Effects of a free school breakfast programme on school attendance, achievement, psychosocial function, and nutrition: a stepped wedge cluster randomised trial

    PubMed Central

    2010-01-01

    Background Approximately 55,000 children in New Zealand do not eat breakfast on any given day. Regular breakfast skipping has been associated with poor diets, higher body mass index, and adverse effects on children's behaviour and academic performance. Research suggests that regular breakfast consumption can improve academic performance, nutrition and behaviour. This paper describes the protocol for a stepped wedge cluster randomised trial of a free school breakfast programme. The aim of the trial is to determine the effects of the breakfast intervention on school attendance, achievement, psychosocial function, dietary habits and food security. Methods/Design Sixteen primary schools in the North Island of New Zealand will be randomised in a sequential stepped wedge design to a free before-school breakfast programme consisting of non-sugar coated breakfast cereal, milk products, and/or toast and spreads. Four hundred children aged 5-13 years (approximately 25 per school) will be recruited. Data collection will be undertaken once each school term over the 2010 school year (February to December). The primary trial outcome is school attendance, defined as the proportion of students achieving an attendance rate of 95% or higher. Secondary outcomes are academic achievement (literacy, numeracy, self-reported grades), sense of belonging at school, psychosocial function, dietary habits, and food security. A concurrent process evaluation seeks information on parents', schools' and providers' perspectives of the breakfast programme. Discussion This randomised controlled trial will provide robust evidence of the effects of a school breakfast programme on students' attendance, achievement and nutrition. Furthermore the study provides an excellent example of the feasibility and value of the stepped wedge trial design in evaluating pragmatic public health intervention programmes. Trial Registration Number Australian New Zealand Clinical Trials Registry (ANZCTR) - ACTRN12609000854235 PMID:21114862

  9. Plant breeding can be made more efficient by having fewer, better crosses.

    PubMed

    Witcombe, John R; Gyawali, Sanjaya; Subedi, Madhu; Virk, Daljit S; Joshi, Krishna D

    2013-02-07

    Crop yields have to increase to provide food security for the world's growing population. To achieve these yield increases there will have to be a significant contribution from genetic gains made by conventional plant breeding. However, the breeding process is not efficient because crosses made between parental combinations that fail to produce useful varieties consume over 99% of the resources. We tested in a rice-breeding programme if its efficiency could be improved by using many fewer, but more judiciously chosen crosses than usual. In a 15-year programme in Nepal, with varietal testing also in India and Bangladesh, we made only six crosses that were stringently chosen on complementary parental performance. We evaluated their success by the adoption and official release of the varieties they produced. We then modelled optimum cross number using assumptions based on our experimental results.Four of the six crosses succeeded. This was a fifty-fold improvement over breeding programmes that employ many crosses where only about one, or fewer, crosses in 200 succeed. Based on these results, we modelled the optimum number of crosses by assuming there would be a decline in the reliability of the breeder's prediction of the value of each cross as more crosses were made (because there is progressively less information on the traits of the parents). Fewer-cross programmes were more likely to succeed and did so using fewer resources. Making more crosses reduced the overall probability of success of the breeding programme. The efficiency of national and international breeding programmes would be increased by making fewer crosses among more carefully chosen parents. This would increase the number of higher yielding varieties that are delivered to farmers and hence help to improve food security.

  10. Plant breeding can be made more efficient by having fewer, better crosses

    PubMed Central

    2013-01-01

    Background Crop yields have to increase to provide food security for the world’s growing population. To achieve these yield increases there will have to be a significant contribution from genetic gains made by conventional plant breeding. However, the breeding process is not efficient because crosses made between parental combinations that fail to produce useful varieties consume over 99% of the resources. Results We tested in a rice-breeding programme if its efficiency could be improved by using many fewer, but more judiciously chosen crosses than usual. In a 15-year programme in Nepal, with varietal testing also in India and Bangladesh, we made only six crosses that were stringently chosen on complementary parental performance. We evaluated their success by the adoption and official release of the varieties they produced. We then modelled optimum cross number using assumptions based on our experimental results. Four of the six crosses succeeded. This was a fifty-fold improvement over breeding programmes that employ many crosses where only about one, or fewer, crosses in 200 succeed. Based on these results, we modelled the optimum number of crosses by assuming there would be a decline in the reliability of the breeder’s prediction of the value of each cross as more crosses were made (because there is progressively less information on the traits of the parents). Fewer-cross programmes were more likely to succeed and did so using fewer resources. Making more crosses reduced the overall probability of success of the breeding programme. Conclusions The efficiency of national and international breeding programmes would be increased by making fewer crosses among more carefully chosen parents. This would increase the number of higher yielding varieties that are delivered to farmers and hence help to improve food security. PMID:23391262

  11. A Demonstration of a Trusted Computer Interface Between a Multilevel Secure Command and Control System and Untrusted Tactical Data Systems.

    DTIC Science & Technology

    1987-03-01

    information and work in a completely secure environment. Information used with today’s C3I systems must be protected. To better understand the role of...and security was of minor concern. The user either worked on his own behalf or as a programmer for someone else. The computer power was limited. With...Although the modules may be of the same classification level, the manager may want to limit each team’s access to the module on which they are working

  12. NEPP Update of Independent Single Event Upset Field Programmable Gate Array Testing

    NASA Technical Reports Server (NTRS)

    Berg, Melanie; Label, Kenneth; Campola, Michael; Pellish, Jonathan

    2017-01-01

    This presentation provides a NASA Electronic Parts and Packaging (NEPP) Program update of independent Single Event Upset (SEU) Field Programmable Gate Array (FPGA) testing including FPGA test guidelines, Microsemi RTG4 heavy-ion results, Xilinx Kintex-UltraScale heavy-ion results, Xilinx UltraScale+ single event effect (SEE) test plans, development of a new methodology for characterizing SEU system response, and NEPP involvement with FPGA security and trust.

  13. [Horizon 2020, new EU Framework programme for research and innovation, 2014-2020].

    PubMed

    Kinkorová, Judita

    2014-01-01

    Horizon 2020 is a financial instrument implementing the Innovation Union, a Europe 2020 flagship initiative aimed at securing Europes global competitiveness. Running from 2014 to 2020 with a budget of just over € 80 billion, the EUs new programme for research and innovation is part of the drive to create new growth and jobs in Europe. Societal challenge Health, demographic change and wellbeing is an important part of Horizon 2020.

  14. Introduction to FPGA Devices and The Challenges for Critical Application - A User's Perspective

    NASA Technical Reports Server (NTRS)

    Berg, Melanie; LaBel, Kenneth

    2015-01-01

    This presentation is an introduction to Field Programmable Gate Array (FPGA) devices and the challenges of critical application including: safety, reliability, availability, recoverability, and security.

  15. Dosimeter Design Program

    DTIC Science & Technology

    2015-01-05

    monitor the radiation environment in a geosynchronous satellite. 15. SUBJECT TERMS Radiation testing, Cobalt, Microcontroller 16. SECURITY...electronics including: an Aeroflex 8051 microcontroller , a Maxwell Electrically Erasable Programmable Read-Only Memory (EEPROM), Texas Instrument analog

  16. (M-CAT) Minor Caliber Weapons Trainer MK-19, 40mm Machine Gun

    DTIC Science & Technology

    1989-07-24

    microprocessor chip with an Intel 387 math coprocessor. The Nova 620 is a digital time base corrector. It is used to time base correct the video data...the circuit. After filtering, the horizontal and vertical position signals are converted to digital values by the Data Translation (DTX-311) analog...from the computer. Each frame of the video disk is individually digitized as to target size, location, and range. The guns azimuth and elevation are

  17. Cascaded VLSI neural network architecture for on-line learning

    NASA Technical Reports Server (NTRS)

    Thakoor, Anilkumar P. (Inventor); Duong, Tuan A. (Inventor); Daud, Taher (Inventor)

    1992-01-01

    High-speed, analog, fully-parallel, and asynchronous building blocks are cascaded for larger sizes and enhanced resolution. A hardware compatible algorithm permits hardware-in-the-loop learning despite limited weight resolution. A computation intensive feature classification application was demonstrated with this flexible hardware and new algorithm at high speed. This result indicates that these building block chips can be embedded as an application specific coprocessor for solving real world problems at extremely high data rates.

  18. Cascaded VLSI neural network architecture for on-line learning

    NASA Technical Reports Server (NTRS)

    Duong, Tuan A. (Inventor); Daud, Taher (Inventor); Thakoor, Anilkumar P. (Inventor)

    1995-01-01

    High-speed, analog, fully-parallel and asynchronous building blocks are cascaded for larger sizes and enhanced resolution. A hardware-compatible algorithm permits hardware-in-the-loop learning despite limited weight resolution. A comparison-intensive feature classification application has been demonstrated with this flexible hardware and new algorithm at high speed. This result indicates that these building block chips can be embedded as application-specific-coprocessors for solving real-world problems at extremely high data rates.

  19. GMES Space Component: Programme overview

    NASA Astrophysics Data System (ADS)

    Aschbacher, J.; Milagro-Perez, M. P.

    2012-04-01

    The European Union (EU) and the European Space Agency (ESA) have developed the Global Monitoring for Environment and Security (GMES) programme as Europe's answer to the vital need for joined-up data about our climate, environment and security. Through a unique combination of satellite, atmospheric and Earth-based monitoring systems, the initiative will provide new insight into the state of the land, sea and air, providing policymakers, scientists, businesses and the public with accurate and timely information. GMES capabilities include monitoring and forecasting of climatic change, flood risks, soil and coastal erosion, crop and fish resources, air pollution, greenhouse gases, iceberg distribution and snow cover, among others. To accomplish this, GMES has been divided into three main components: Space, In-situ and Services. The Space Component, led by ESA, comprises five types of new satellites called Sentinels that are being developed by ESA specifically to meet the needs of GMES, the first of which to be launched in 2013. These missions carry a range of technologies, such as radar and multi-spectral imaging instruments for land, ocean and atmospheric monitoring. In addition, access to data from the so-called Contributing Missions guarantees that European space infrastructure is fully used for GMES. An integrated Ground Segment ensures access to Sentinels and Contributing Missions data. The in-situ component, under the coordination of the European Environment Agency (EEA), is composed of atmospheric and Earth based monitoring systems, and based on established networks and programmes at European and international levels. The European Commission is in charge of implementing the services component of GMES and of leading GMES overall. GMES services, fed with data from the Space and In-situ components, will provide essential information in five main domains, atmosphere, ocean and land monitoring as well as emergency response and security. Climate change has been added as a new GMES service and cross-cuts all these domains. Even if GMES is built to primarily serve operational services, there is a large benefit for science users as well. In addition, science will be crucial to advance services and provide critical input to the definition of new observation systems. Access to Sentinel data is governed by the Sentinel data policy, which is part of a wider GMES data and information access policy. The Sentinel data policy envisages free and open access, subject to restrictions only if security or other European interests need to be preserved. The programme will enter the operational phase in 2014, when the first dedicated spacecraft, the Sentinel missions, will be in orbit. The main programmatic challenge is to ensure the programme's long-term sustainability. This session aims at informing users about the current programme's overall status and its potential for users in the services and scientific fields.

  20. Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.

    Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less

  1. Forestry as a possible solution to the environmental and energy difficulties facing semi-arid Africa. The case of Upper Volta

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weinstabel, P.E.; Zech, W.

    1982-01-01

    The total annual demand for wood in Upper Volta is about 4.2 million cubic m solid wood, 94% of the population depends on wood for energy (compared with 84% in the Sahel states as a whole), and more than 30% of income in urban areas is spent on acquiring wood. Any policy aimed at securing adequate food supplies for the population must therefore be accompanied by a programme for safeguarding energy supplies. Measures which should be included in an integrated energy programme are presented and details are given of Upper Volta's forestry programme. 21 references.

  2. Social problem-solving interventions in medium secure settings for women.

    PubMed

    Long, C G; Fulton, B; Dolley, O; Hollin, C R

    2011-10-01

    Problem-solving interventions are a feature of overall medium secure treatment programmes. However, despite the relevance of such treatment to personality disorder there are few descriptions of such interventions for women. Beneficial effects for women who completed social problem-solving group treatment were evident on a number of psychometric assessments. A treatment non-completion rate of one-third raises questions of both acceptability and timing of cognitive behavioural interventions.

  3. Arctic Planning Scenarios: Scenario #2 - Safety and Security Scenario

    DTIC Science & Technology

    2011-07-01

    the case within the security communities (DND, RCMP and CBSA) where the facility expansion programme fell behind the pace of socio -economic growth...became a political issue with many First Nations leaders protesting about the speed of progress not keeping pace with the socio -economic demands of...raised level of socio -political consciousness quickly gravitated across the Inuit bands of NWT and Nunavut. It also drew support from those Southern

  4. Environmental Security in the Danube River Basin: Policy Implications for the United States

    DTIC Science & Technology

    1999-01-01

    United Nations Environmental Programme and Centre for Human Settlements jointly formed a Balkans Task Force that has been conducting independent and...1199 V ACKNOWLEDGMENTS I would like to thank the United States Air Force Institute for National Security Studies (TNSS) and the Army Environmental...regularly scheduled course on Responsibilities of Military Forces in Environmental Protection. Mr. Robert Jarrett of AEPI provided valuable review

  5. [The role of health education in preventive medicine strategy of the Mexican Institute of Social Security].

    PubMed

    Rodríguez Véliz, A M

    1982-01-01

    This article presents the Mexican Institute for Social Security (IMSS) created in 1943 and describes its main features, its programmes and the role played by health education inside the programmes. It ends by explaining the present situation concerning health education and the changes which are presently envisaged. During its first twenty years, the IMSS promoted preventive medicine and trained health personnel. Since 1979 it has concerned itself mainly with some 10 million peasants and marginal groups. In the frame of a national development programme, a vaccination and detection campaign were implemented and the distribution system of potable water was extended. Mexico with a population of 73 million has the dual characteristics of a developed and a developing country (70 per cent of its population is urban, 30 per cent rural). The overcrowded cities contrast with the isolated rural areas where sanitary conditions are poor and life difficult. The main causes of mortality, in 1978, were: -in the towns: car accidents, cardiovascular diseases and suicide; -in rural areas, acute respiratory infections and intestinal infections. The 1978 Alma Ata international conference on primary health care and the meeting of Ministers of health convened in 1980 by the Pan American Health Organization endorsed the IMSS programmes which emphasize prevention, promote health education and community participation. The cost of preventive measures being cheaper than treatment, 203 million pesos were saved and allocated to the expansion of programmes. Systematic immunization has resulted in a sharp decline of diphteria, polio, rabies, typhoid, pertussis and measles. Early detection of tumours of cervix uteri has saved many lives.

  6. Top Tips for Senior Leaders in Schools and Colleges: How to Provide Meaningful Experience of the World of Work for Young People as Part of 16 to 19 Study Programmes

    ERIC Educational Resources Information Center

    National Foundation for Educational Research, 2015

    2015-01-01

    A core part of 16 to 19 study programmes is the provision of work experience for all young people. It is increasingly recognised that young people need to develop their employability skills, alongside qualifications, in preparation for the world of work and securing a job. This top tips guide offers advice to schools and colleges wishing to…

  7. Evaluation of a Constrained Facet Analysis Efficiency Model for Identifying the Efficiency of Medical Treatment Facilities in the Army Medical Department

    DTIC Science & Technology

    1990-07-31

    examples on their use is available with the PASS User Documentation Manual. 2 The data structure of PASS requires a three- lvel organizational...files, and missing control variables. A specific problem noted involved the absence of 8087 mathematical co-processor on the target IBM-XT 21 machine...System, required an operational understanding of the advanced mathematical technique used in the model. Problems with the original release of the PASS

  8. A SLAM II simulation model for analyzing space station mission processing requirements

    NASA Technical Reports Server (NTRS)

    Linton, D. G.

    1985-01-01

    Space station mission processing is modeled via the SLAM 2 simulation language on an IBM 4381 mainframe and an IBM PC microcomputer with 620K RAM, two double-sided disk drives and an 8087 coprocessor chip. Using a time phased mission (payload) schedule and parameters associated with the mission, orbiter (space shuttle) and ground facility databases, estimates for ground facility utilization are computed. Simulation output associated with the science and applications database is used to assess alternative mission schedules.

  9. Structural Dynamics of Maneuvering Aircraft.

    DTIC Science & Technology

    1987-09-01

    MANDYN. Written in Fortran 77, it was compiled and executed with Microsoft Fortran, Vers. 4.0 on an IBM PC-AT, with a co-processor, and a 20M hard disk...to the pivot area. Pre- sumably, the pivot area is a hard point in the wing structure. -41- NADC M1i4-0 ResulIts The final mass and flexural rigidity...lowest mode) is an important parameter. If it is less than three, the load factor approach can be problema - tical. In assessing the effect of one maneuver

  10. Floating-point function generation routines for 16-bit microcomputers

    NASA Technical Reports Server (NTRS)

    Mackin, M. A.; Soeder, J. F.

    1984-01-01

    Several computer subroutines have been developed that interpolate three types of nonanalytic functions: univariate, bivariate, and map. The routines use data in floating-point form. However, because they are written for use on a 16-bit Intel 8086 system with an 8087 mathematical coprocessor, they execute as fast as routines using data in scaled integer form. Although all of the routines are written in assembly language, they have been implemented in a modular fashion so as to facilitate their use with high-level languages.

  11. Functional Specification and Simulation of a Floating Point Co-Processor for SPUR

    DTIC Science & Technology

    1986-08-01

    depend on this state will not be stable until the next phase; this leaves the problem of how to control events that must occur on phi 1 of a cycle. The... problems with the structure of the chip description. The worst of these problems is the absence of Slang constructs for coding separate chip component...constructs such as UNK as well. Another related problem was the inability to explicitly declare the size of Slang node values. \\Vhile the correct

  12. Programmable Multi-Chip Module

    DOEpatents

    Kautz, David; Morgenstern, Howard; Blazek, Roy J.

    2005-05-24

    A multi-chip module comprising a low-temperature co-fired ceramic substrate having a first side on which are mounted active components and a second side on which are mounted passive components, wherein this segregation of components allows for hermetically sealing the active components with a cover while leaving accessible the passive components, and wherein the passive components are secured using a reflow soldering technique and are removable and replaceable so as to make the multi-chip module substantially programmable with regard to the passive components.

  13. Programmable Multi-Chip Module

    DOEpatents

    Kautz, David; Morgenstern, Howard; Blazek, Roy J.

    2004-11-16

    A multi-chip module comprising a low-temperature co-fired ceramic substrate having a first side on which are mounted active components and a second side on which are mounted passive components, wherein this segregation of components allows for hermetically sealing the active components with a cover while leaving accessible the passive components, and wherein the passive components are secured using a reflow soldering technique and are removable and replaceable so as to make the multi-chip module substantially programmable with regard to the passive components.

  14. Programmable multi-chip module

    DOEpatents

    Kautz, David; Morgenstern, Howard; Blazek, Roy J.

    2004-03-02

    A multi-chip module comprising a low-temperature co-fired ceramic substrate having a first side on which are mounted active components and a second side on which are mounted passive components, wherein this segregation of components allows for hermetically sealing the active components with a cover while leaving accessible the passive components, and wherein the passive components are secured using a reflow soldering technique and are removable and replaceable so as to make the multi-chip module substantially programmable with regard to the passive components.

  15. The Unified Floating Point Vector Coprocessor for Reconfigurable Hardware

    NASA Astrophysics Data System (ADS)

    Kathiara, Jainik

    There has been an increased interest recently in using embedded cores on FPGAs. Many of the applications that make use of these cores have floating point operations. Due to the complexity and expense of floating point hardware, these algorithms are usually converted to fixed point operations or implemented using floating-point emulation in software. As the technology advances, more and more homogeneous computational resources and fixed function embedded blocks are added to FPGAs and hence implementation of floating point hardware becomes a feasible option. In this research we have implemented a high performance, autonomous floating point vector Coprocessor (FPVC) that works independently within an embedded processor system. We have presented a unified approach to vector and scalar computation, using a single register file for both scalar operands and vector elements. The Hybrid vector/SIMD computational model of FPVC results in greater overall performance for most applications along with improved peak performance compared to other approaches. By parameterizing vector length and the number of vector lanes, we can design an application specific FPVC and take optimal advantage of the FPGA fabric. For this research we have also initiated designing a software library for various computational kernels, each of which adapts FPVC's configuration and provide maximal performance. The kernels implemented are from the area of linear algebra and include matrix multiplication and QR and Cholesky decomposition. We have demonstrated the operation of FPVC on a Xilinx Virtex 5 using the embedded PowerPC.

  16. Improving animal health for poverty alleviation and sustainable livelihoods.

    PubMed

    Stringer, Andy

    2014-11-29

    Animals are vital to ensuring food security for individuals, families and communities in countries around the world. In this, the latest article in Veterinary Record's series promoting One Health, Andy Stringer, director of veterinary programmes at the Society for the Protection of Animals Abroad, discusses how improving animal health, particularly of poultry and working equids, has the potential to reduce poverty and promote food security and sustainable livelihoods in low-income countries. British Veterinary Association.

  17. [Planning a Health Residence for Prison Security Measures, Tuscany (Italy)].

    PubMed

    Porfido, Eugenio; Colombai, Renato; Scarpa, Franco; Totaro, Michele; Tani, Luca; Baldini, Claudio; Baggiani, Angelo

    2016-01-01

    Health Residences for Prison Security Measures are facilities hosting psychotic persons who have committed crimes and providing them with personalized rehabilitation and treatment plans to promote their reinstatement in society. The aim of this study was to describe the criteria for planning and designing a prison health residence in the Tuscany region (Italy), to be managed by the regional healthcare service, in line with current regulations, with dedicated staff for providing specific treatment plans and programmes.

  18. [National health resources for highly specialised medicine].

    PubMed

    Bratlid, Dag; Rasmussen, Knut

    2005-11-03

    In order to monitor quality and efficiency in the use of health resources for highly specialised medicine, a National Professional Council has since 1990 advised the Norwegian health authorities on the establishing and localisation of such services. A comprehensive review of both the quality, economy and the geographical distribution of patients in each specialised service has been carried out. 33 defined national programmes were centralised to one hospital only and distributed among seven university hospitals. Eight multiregional programmes were centralised to two hospitals only and included four university hospitals. In 2001, a total of 2711 new patients were treated in these programmes. The system seems to have secured a sufficient patient flow to each programme so as to maintain quality. However, a geographically skewed distribution of patients was noted, particularly in some of the national programmes. In a small country like Norway, with 4.5 million inhabitants, a centralised monitoring of highly specialised medicine seems both rational and successful. By the same logic, however, international cooperation should probably be sought for the smallest patient groups.

  19. Separating higher-order nonlinearities in transient absorption microscopy

    NASA Astrophysics Data System (ADS)

    Wilson, Jesse W.; Anderson, Miguel; Park, Jong Kang; Fischer, Martin C.; Warren, Warren S.

    2015-08-01

    The transient absorption response of melanin is a promising optically-accessible biomarker for distinguishing malignant melanoma from benign pigmented lesions, as demonstrated by earlier experiments on thin sections from biopsied tissue. The technique has also been demonstrated in vivo, but the higher optical intensity required for detecting these signals from backscattered light introduces higher-order nonlinearities in the transient response of melanin. These components that are higher than linear with respect to the pump or the probe introduce intensity-dependent changes to the overall response that complicate data analysis. However, our data also suggest these nonlinearities might be advantageous to in vivo imaging, in that different types of melanins have different nonlinear responses. Therefore, methods to separate linear from nonlinear components in transient absorption measurements might provide additional information to aid in the diagnosis of melanoma. We will discuss numerical methods for analyzing the various nonlinear contributions to pump-probe signals, with the ultimate objective of real time analysis using digital signal processing techniques. To that end, we have replaced the lock-in amplifier in our pump-probe microscope with a high-speed data acquisition board, and reprogrammed the coprocessor field-programmable gate array (FPGA) to perform lock-in detection. The FPGA lock-in offers better performance than the commercial instrument, in terms of both signal to noise ratio and speed. In addition, the flexibility of the digital signal processing approach enables demodulation of more complicated waveforms, such as spread-spectrum sequences, which has the potential to accelerate microscopy methods that rely on slow relaxation phenomena, such as photo-thermal and phosphorescence lifetime imaging.

  20. Efficient Graph Based Assembly of Short-Read Sequences on Hybrid Core Architecture

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sczyrba, Alex; Pratap, Abhishek; Canon, Shane

    2011-03-22

    Advanced architectures can deliver dramatically increased throughput for genomics and proteomics applications, reducing time-to-completion in some cases from days to minutes. One such architecture, hybrid-core computing, marries a traditional x86 environment with a reconfigurable coprocessor, based on field programmable gate array (FPGA) technology. In addition to higher throughput, increased performance can fundamentally improve research quality by allowing more accurate, previously impractical approaches. We will discuss the approach used by Convey?s de Bruijn graph constructor for short-read, de-novo assembly. Bioinformatics applications that have random access patterns to large memory spaces, such as graph-based algorithms, experience memory performance limitations on cache-based x86more » servers. Convey?s highly parallel memory subsystem allows application-specific logic to simultaneously access 8192 individual words in memory, significantly increasing effective memory bandwidth over cache-based memory systems. Many algorithms, such as Velvet and other de Bruijn graph based, short-read, de-novo assemblers, can greatly benefit from this type of memory architecture. Furthermore, small data type operations (four nucleotides can be represented in two bits) make more efficient use of logic gates than the data types dictated by conventional programming models.JGI is comparing the performance of Convey?s graph constructor and Velvet on both synthetic and real data. We will present preliminary results on memory usage and run time metrics for various data sets with different sizes, from small microbial and fungal genomes to very large cow rumen metagenome. For genomes with references we will also present assembly quality comparisons between the two assemblers.« less

  1. Security in Full-Force

    NASA Technical Reports Server (NTRS)

    2002-01-01

    When fully developed for NASA, Vanguard Enforcer(TM) software-which emulates the activities of highly technical security system programmers, auditors, and administrators-was among the first intrusion detection programs to restrict human errors from affecting security, and to ensure the integrity of a computer's operating systems, as well as the protection of mission critical resources. Vanguard Enforcer was delivered in 1991 to Johnson Space Center and has been protecting systems and critical data there ever since. In August of 1999, NASA granted Vanguard exclusive rights to commercialize the Enforcer system for the private sector. In return, Vanguard continues to supply NASA with ongoing research, development, and support of Enforcer. The Vanguard Enforcer 4.2 is one of several surveillance technologies that make up the Vanguard Security Solutions line of products. Using a mainframe environment, Enforcer 4.2 achieves previously unattainable levels of automated security management.

  2. Evolutionary Aspects for Technology Policy: the Case of Galileo Public-Private Partnership

    NASA Astrophysics Data System (ADS)

    Zervos, Vasilis

    2002-01-01

    This paper examines the impact of strategic interactions on Private-Public Partnerships (PPPs) in space. Though there is substantial business and economics literature on PPPs, it is traditionally focused on the relationships within the partnerships (low level) and the respective factors affecting its success. The contribution of this paper is that it examines the political economy of PPPs, analysing how `high-level' strategic interactions across public-private sectors in Europe and the US determine their behaviour and success. Within this context, the European case of Galileo and other national space projects, such as the US plans for a space-based anti- missile defence, are each based on different types of PPPs, confined within the geographical borders of the two areas. The security and commercial benefits of such programmes for the respective space industries and economies have a direct impact on the other area's industry and sense of security. The paper shows that trans- Atlantic cooperation at public policy level is essential to allow the respective industries to explore the benefits of cross-border strategic research partnerships (SRPs). This will reduce the costs of the respective programmes, addressing security concerns.

  3. Antibiotics Smart Use: a workable model for promoting the rational use of medicines in Thailand.

    PubMed

    Sumpradit, Nithima; Chongtrakul, Pisonthi; Anuwong, Kunyada; Pumtong, Somying; Kongsomboon, Kedsenee; Butdeemee, Parichart; Khonglormyati, Jurairat; Chomyong, Santi; Tongyoung, Parnuchote; Losiriwat, Suraphol; Seesuk, Piyanooch; Suwanwaree, Pongthep; Tangcharoensathien, Viroj

    2012-12-01

    The Antibiotics Smart Use (ASU) programme was introduced in Thailand as a model to promote the rational use of medicines, starting with antibiotics. The programme's first phase consisted of assessing interventions intended to change prescribing practices; the second phase examined the feasibility of programme scale-up. Currently the programme is in its third phase, which centres on sustainability. This paper describes the concept behind ASU, the programme's functional modalities, the development of its conceptual framework and the implementation of its first and second phases. To change antibiotic prescription practices, multifaceted interventions at the individual and organizational levels were implemented; to maintain behaviour change and scale up the programme, interventions at the network and policy levels were used. The National Health Security Office has adopted ASU as a pay-for-performance criterion, a major achievement that has led to the programme's expansion nationwide. Despite limited resources, programme scale-up and sustainability have been facilitated by the promotion of local ownership and mutual recognition, which have generated pride and commitment. ASU is clearly a workable entry point for efforts to rationalize the use of medicines in Thailand. Its long-term sustainability will require continued local commitment and political support, effective auditing and integration of ASU into routine systems with appropriate financial incentives.

  4. The climate sensitivity of food security in Mali - a historical perspective on availability and access dimensions

    NASA Astrophysics Data System (ADS)

    Giannini, A.; Krishnamurthy, P. K.; Cousin, R.; Choularton, R. J.

    2011-12-01

    We present results based on an analysis of a 2005 livelihood survey of ~2000 rural households in ~200 villages scattered across Mali, a sparsely populated, large land-locked country in West Africa, to elucidate the role of climate variability and change in shaping availability and access dimensions of food security. The Comprehensive Food Security Vulnerability Analysis is a recurrent survey carried out by the World Food Programme and in-country partners to map out nutritional and socio-economic status during normal (~food secure) conditions in the hope of understanding underlying cause(s) and prevent the next food security crisis. We set the spatial characterization of food security that emerges from the CFSVA against the background of a varying climate, on intra-seasonal, interannual and multi-decadal time scales: through elucidation of the influence of climate on agricultural production we arrive at an interpretation of structural and conjunctural events affecting food security. We conclude with a discussion of possible interventions to reduce vulnerability.

  5. The development of a 'best practice' service for women in a medium-secure psychiatric setting: treatment components and evaluation.

    PubMed

    Long, Clive G; Fulton, Barbara; Hollin, Clive R

    2008-01-01

    The inadequacy of inpatient facilities for women with severe psychiatric and co-morbid difficulties has been repeatedly documented. The establishment of effective therapeutic programmes for women in medium psychiatric facilities is also in their infancy, and little research has been undertaken. This article describes the development of a 'best practice' psychological treatment programme for women with a dual diagnosis. Emphasis is placed on the need to develop further intensive gender-specific services using an established model for effective therapeutic service development. In addition to a detailed description of the group therapy programme, staff training initiatives, methods for ensuring treatment integrity and a methodology for service evaluation is given. Copyright (c) 2008 John Wiley & Sons, Ltd.

  6. INM. Integrated Noise Model Version 4.11. User’s Guide - Supplement

    DTIC Science & Technology

    1993-12-01

    KB of Random Access Memory (RAM) or 3 MB of RAM, if operating the INM from a RAM disk, as discussed in Section 1.2.1 below; 0 Math co-processor, Series... accessible from the Data Base using the ACDB11.EXE computer program, supplied with the Version 4.11 release. With the exception of INM airplane numbers 1, 6...9214 10760 -- -.-- 27 7053 6215 9470 10703 --- --- - 28 SS7 5940 SS94 729S . ... ... 29 4223 4884 7897 9214 10760 ..... 30 sots 6474 7939 8774

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Poivey, C.; Notebaert, O.; Garnier, P.

    The ARIANE5 On Board Computer (OBC) and Inertial Reference System (SRI) are based on Motorola MC68020 processor and MC68882 coprocessor. The SRI data acquisition board also uses the DSP TMS320C25 from Texas Instruments. These devices were characterized to proton induced SEUs. But representativeness of SEU test results on processors was questioned during ARIANE5 studies. Protons test of these devices were also performed in the actual equipments with flight (or representative of) softwares. The results show that the On Board Computer and the Inertial Reference System can satisfy the requirements of the ARIANE5 missions.

  8. International Aerospace and Ground Conference on Lightning and Static Electricity (15th) Held in Atlantic City, New Jersey on October 6 - 8, 1992. Addendum

    DTIC Science & Technology

    1992-11-01

    November 1992 1992 INTERNATIONAL AEROSPACE AND GROUND CONFERENCE 6. Perfrming Orgnis.aten Code ON LIGHTNING AND STATIC ELECTRICITY - ADDENDUM 111...October 6-8 1992 Program and the Federal Aviation Administration 14. Sponsoring Agency Code Technical Center ACD-230 15. Supplementary Metes The NICG...area]. The program runs well on an IBM PC or compatible 386 with a math co-processor 387 chip and a VGA monitor. For this study, streamers were added

  9. Enhanced recovery clinical education programme improves quality of post-operative care.

    PubMed

    McDonald, Ruth

    2015-01-01

    Quality is the driving principle of Enhanced Recovery (ER). It improves the patient experience by getting patients better sooner and changes clinical practice to make care safer and more efficient. As a consequence of ER patients spend less time in hospital. A successful ER programme began to fail after organisational restructuring and staff changes. Patients did not meet their ER goals and length of stay (LOS) increased. An ER nurse was appointed to get the programme back on track. This involved a multidisciplinary approach to an ER clinical education programme. The programme aimed to develop knowledge of the physiology of post-operative recovery and the evidence underpinning the interventions required. This was considered crucial to secure longer term staff engagement while avoiding unthinking protocol driven compliance. Success of the education programme was measured by improved outcomes in patient LOS and readmission statistics. During the four months of the clinical education programme there were no significant changes in monthly LOS. At six months post implementation of the programme there was a reduction in LOS of 0.6 days compared to the previous six months. At 12 months there was a reduction in 1.1 days compared with previous 12 months. There was a mean reduction of 28 day readmissions for all elective gynaecology surgery of 1.1 patients per month in the 12 months post programme implementation compared to the 12 months before. Delivering a multidisciplinary participatory education programme improved overall understanding of ER, and achieved sustained improvement in ER for patient benefit.

  10. Improving the Skill Component of Clothing and Textiles among Students in Second Cycle Institutions in Ghana and Its Effect on the Polytechnic Fashion Student. A Case Study of OLA Girls, Mawuko Girls and Mawuli Senior High School in Ho, Ghana

    ERIC Educational Resources Information Center

    Joana, Amankwa; Selase, Gbadegbe Richard; Selorm, Gbetodeme; Emefa, Agra Florence

    2015-01-01

    For a nation like Ghana to develop, it is necessary to pay much attention to Vocational and Technical Education. This is so because school programmes that place emphasis on theory courses or humanities are no longer useful to the nation.Graduates who offer such programmes find it very difficult to secure employment in the Ghanaian job market…

  11. Spanish Earth Observation Satellite System

    NASA Astrophysics Data System (ADS)

    Borges, A.; Cerezo, F.; Fernandez, M.; Lomba, J.; Lopez, M.; Moreno, J.; Neira, A.; Quintana, C.; Torres, J.; Trigo, R.; Urena, J.; Vega, E.; Vez, E.

    2010-12-01

    The Spanish Ministry of Industry, Tourism and Trade (MITyC) and the Ministry of Defense (MoD) signed an agreement in 2007 for the development of a "Spanish Earth Observation Satellite System" based, in first instance, on two satellites: a high resolution optical satellite, called SEOSAT/Ingenio, and a radar satellite based on SAR technology, called SEOSAR/Paz. SEOSAT/Ingenio is managed by MITyC through the Centre for the Development of Industrial Technology (CDTI), with technical and contractual support from the European Space Agency (ESA). HISDESA T together with the Spanish Instituto Nacional de Técnica Aeroespacial (INTA, National Institute for Aerospace Technology) will be responsible for the in-orbit operation and the commercial operation of both satellites, and for the technical management of SEOSAR/Paz on behalf of the MoD. In both cases EADS CASA Espacio (ECE) is the prime contractor leading the industrial consortia. The ground segment development will be assigned to a Spanish consortium. This system is the most important contribution of Spain to the European Programme Global Monitoring for Environment and Security, GMES. This paper presents the Spanish Earth Observation Satellite System focusing on SEOSA T/Ingenio Programme and with special emphasis in the potential contribution to the ESA Third Party Missions Programme and to the Global Monitoring for Environment and Security initiative (GMES) Data Access.

  12. Copernicus Earth observation programme

    NASA Astrophysics Data System (ADS)

    Žlebir, Silvo

    European Earth observation program Copernicus is an EU-wide programme that integrates satellite data, in-situ data and modeling to provide user-focused information services to support policymakers, researchers, businesses and citizens. Land monitoring service and Emergency service are fully operational already, Atmosphere monitoring service and Marine environment monitoring service are preoperational and will become fully operational in the following year, while Climate change service and Security service are in an earlier development phase. New series of a number of dedicated satellite missions will be launched in the following years, operated by the European Space Agency and EUMETSAT, starting with Sentinel 1A satellite early this year. Ground based, air-borne and sea-borne in-situ data are provided by different international networks and organizations, EU member states networks etc. European Union is devoting a particular attention to secure a sustainable long-term operational provision of the services. Copernicus is also stated as a European Union’s most important contribution to Global Earth Observation System of Systems (GEOSS). The status and the recent development of the Copernicus programme will be presented, together with its future perspective. As Copernicus services have already demonstrated their usability and effectiveness, some interesting cases of their deployment will be presented. Copernicus free and open data policy, supported by a recently adopted EU legislative act, will also be presented.

  13. Personnel and Vehicle Data Collection at Aberdeen Proving Ground (APG) and its Distribution for Research

    DTIC Science & Technology

    2015-10-01

    28 Magnetometer Applied Physics Model 1540-digital 3-axis fluxgate 5 Amplifiers Alligator Technologies USBPGF-S1 programmable instrumentation...Acoustic, Seismic, magnetic, footstep, vehicle, magnetometer , geophone, unattended ground sensor (UGS) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  14. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks

    PubMed Central

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-01-01

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller. PMID:28430155

  15. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    PubMed

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  16. Governance and Purchasing Function under Social Health Insurance in Nepal: Looking Back and Moving Forward.

    PubMed

    Sapkota, V P; Bhusal, U P

    2017-01-01

    Nepal is pursuing Social Health Insurance as a way of mobilizing revenues to achieve Universal Health Coverage. The Social Health Insurance governance encourages service providers to maintain quality and efficiency in services provision by practicing strategic purchasing. Social Health Security Programme is a social protection program which aspires to achieve the goals of Social Health Insurance. Social Health Security Development Committee needs to consider following experiences to function as a strategic purchaser. The Social Health Security Development Committee need to be an independent body instead of falling under Ministry of Health. Similarly, purchasing of health services needs to be made strategic, i.e., Social Health Security Development Committee should use its financial power to guide the provider behavior that will eventually contribute to achieving the goals of quality and efficiency in service provision. The other social health security funds should be merged with Social Health Security Development Committee and develop a single national fund. Finally, the state has to regulate and monitor the performance of the SHI agency.

  17. Microcredit participation and child health: results from a cross-sectional study in Peru.

    PubMed

    Moseson, H; Hamad, R; Fernald, L

    2014-12-01

    Childhood malnutrition is a major consequence of poverty worldwide. Microcredit programmes-which offer small loans, financial literacy and social support to low-income individuals-are increasingly promoted as a way to improve the health of clients and their families. This study evaluates the hypothesis that longer participation in a microcredit programme is associated with improvements in the health of children of microcredit clients. Cross-sectional data were collected in February 2007 from 511 clients of a microcredit organisation in Peru and 596 of their children under 5 years of age. The primary predictor variable was length of participation in the microcredit programme. Outcome variables included height, weight, anaemia, household food security and parent-reported indicators of child health. Multivariate linear and logistic regressions assessed the association between the number of loan cycles and child health outcomes. Pathways through which microcredit may have influenced health outcomes were also explored via mediation analyses. Longer participation in microcredit was associated with greater household food security and reduced likelihood of childhood anaemia. No significant associations were observed between microcredit participation and incidence of childhood illnesses or anthropometric indicators. Increased consumption of red meat may mediate the association between the number of loan cycles and food security, but not the association with anaemia. The effects of microcredit on the health of clients' children are understudied. Exploratory findings from this analysis suggest that microcredit may positively influence child health, and that diet may play a causal role. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  18. Adapting Nepal's polio eradication programme.

    PubMed

    Paudel, Krishna P; Hampton, Lee M; Gurung, Santosh; Bohara, Rajendra; Rai, Indra K; Anaokar, Sameer; Swift, Rachel D; Cochi, Stephen

    2017-03-01

    Many countries have weak disease surveillance and immunization systems. The elimination of polio creates an opportunity to use staff and assets from the polio eradication programme to control other vaccine-preventable diseases and improve disease surveillance and immunization systems. In 2003, the active surveillance system of Nepal's polio eradication programme began to report on measles and neonatal tetanus cases. Japanese encephalitis and rubella cases were added to the surveillance system in 2004. Staff from the programme aided the development and implementation of government immunization policies, helped launch vaccination campaigns, and trained government staff in reporting practices and vaccine management. Nepal eliminated indigenous polio in 2000, and controlled outbreaks caused by polio importations between 2005 and 2010. In 2014, the surveillance activities had expanded to 299 sites, with active surveillance for measles, rubella and neonatal tetanus, including weekly visits from 15 surveillance medical officers. Sentinel surveillance for Japanese encephalitis consisted of 132 sites. Since 2002, staff from the eradication programme have helped to introduce six new vaccines and helped to secure funding from Gavi, the Vaccine Alliance. Staff have also assisted in responding to other health events in the country. By expanding the activities of its polio eradication programme, Nepal has improved its surveillance and immunization systems and increased vaccination coverage of other vaccine-preventable diseases. Continued donor support, a close collaboration with the Expanded Programme on Immunization, and the retention of the polio eradication programme's skilled workforce were important for this expansion.

  19. The science of human security: a response from political science.

    PubMed

    Roberts, David

    2008-01-01

    The concept of human security has developed in significance in the last decade to the point that its meaning and validity is hotly contested in the field of international relations, security, and development studies. A key consideration relates to its ambiguity at best and its amorphousness at worst. Medical scholarship proposes approaches that may render more meaningful the concept. However, collaboration and co-operation between political scientists and medical practitioners offers even greater potential to this vital programme. The latter offer the technical and methodological skills and approaches lacking in political science, whilst the former develop political frameworks to shift the causal focus towards human, institutional and structural agency in mass avoidable global civilian mortality.

  20. Factors of importance to maintaining regular dental care after a behavioural intervention for adults with dental fear: a qualitative study.

    PubMed

    Morhed Hultvall, Majlis; Lundgren, Jesper; Gabre, Pia

    2010-11-01

    Dental phobia is prevalent in the general population and can be successfully treated through cognitive behavioural therapy, which results in patients being able to cope with dental treatments. The aim of this study was to increase the understanding of factors of importance for maintaining regular dental care after completion of a cognitive behavioural therapy programme. A qualitative study design was used. Fourteen individuals who had successfully completed the programme and had thereafter been referred to a general dental practitioner were interviewed. An interview guide with open-ended questions was used. The interviews were tape-recorded and transcribed verbatim. The texts were analysed using descriptive and qualitative content analysis (Grounded Theory). The manifest analysis identified four content areas: experience of dental care, content of the behavioural therapy programme, perception of therapy and impact on quality of life. The latent analysis identified influence on quality of life, security, activity and barriers to dental care as categories. Although all informants had successfully completed the dental fear treatment programme, only a few stated that they had an uncomplicated relation to dental care afterwards. Barriers to dental care were lack of money and fear. A sense of security was conclusive to coping with dental care, and a respectful approach on the part of the dental care personnel was essential to development of this sense. Confidence in one's own ability to cope with dental care and the right to guide the treatment were important. Thus the theme in the present study was self-efficacy and respectful dental care personnel.

  1. Commercial Activities and Copyright in Australian Universities

    ERIC Educational Resources Information Center

    Shelly, Marita

    2008-01-01

    With government funding for most Australian universities below 60% and falling a major strategic emphasis for universities has been on securing other sources of operating revenue, including commercial opportunities and partnerships. The implication of increasing commercial activities such as non-award and tailored professional programmes, contract…

  2. Post-conflict health reconstruction: search for a policy.

    PubMed

    Rubenstein, Leonard S

    2011-10-01

    Despite increasing experience in health reconstruction in societies emerging from conflict, the policy basis for investing in the development of equitable and effective health systems in the wake of war remains unsettled. Consideration of post-conflict health reconstruction is almost entirely absent in donor policies on global health. Practically by default, health programmes are seen increasingly as an element of stabilisation and security interventions in the aftermath of armed conflict. That perspective, however, lacks an evidence base and can skew health programmes towards short-term security and stabilisation goals that have a marginal impact and violate the principles of equity, non-discrimination, and quality, which are central to sound health systems and public acceptance of them. A better approach is to ground policy in legitimacy, viewing health both as a core social institution and one that, if developed according to human rights principles, including equity, non-discrimination, participation and accountability, can advance the effectiveness and the quality of governance in the emerging state. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  3. Revisiting Intel Xeon Phi optimization of Thompson cloud microphysics scheme in Weather Research and Forecasting (WRF) model

    NASA Astrophysics Data System (ADS)

    Mielikainen, Jarno; Huang, Bormin; Huang, Allen

    2015-10-01

    The Thompson cloud microphysics scheme is a sophisticated cloud microphysics scheme in the Weather Research and Forecasting (WRF) model. The scheme is very suitable for massively parallel computation as there are no interactions among horizontal grid points. Compared to the earlier microphysics schemes, the Thompson scheme incorporates a large number of improvements. Thus, we have optimized the speed of this important part of WRF. Intel Many Integrated Core (MIC) ushers in a new era of supercomputing speed, performance, and compatibility. It allows the developers to run code at trillions of calculations per second using the familiar programming model. In this paper, we present our results of optimizing the Thompson microphysics scheme on Intel Many Integrated Core Architecture (MIC) hardware. The Intel Xeon Phi coprocessor is the first product based on Intel MIC architecture, and it consists of up to 61 cores connected by a high performance on-die bidirectional interconnect. The coprocessor supports all important Intel development tools. Thus, the development environment is familiar one to a vast number of CPU developers. Although, getting a maximum performance out of MICs will require using some novel optimization techniques. New optimizations for an updated Thompson scheme are discusses in this paper. The optimizations improved the performance of the original Thompson code on Xeon Phi 7120P by a factor of 1.8x. Furthermore, the same optimizations improved the performance of the Thompson on a dual socket configuration of eight core Intel Xeon E5-2670 CPUs by a factor of 1.8x compared to the original Thompson code.

  4. Performance Study of Monte Carlo Codes on Xeon Phi Coprocessors — Testing MCNP 6.1 and Profiling ARCHER Geometry Module on the FS7ONNi Problem

    NASA Astrophysics Data System (ADS)

    Liu, Tianyu; Wolfe, Noah; Lin, Hui; Zieb, Kris; Ji, Wei; Caracappa, Peter; Carothers, Christopher; Xu, X. George

    2017-09-01

    This paper contains two parts revolving around Monte Carlo transport simulation on Intel Many Integrated Core coprocessors (MIC, also known as Xeon Phi). (1) MCNP 6.1 was recompiled into multithreading (OpenMP) and multiprocessing (MPI) forms respectively without modification to the source code. The new codes were tested on a 60-core 5110P MIC. The test case was FS7ONNi, a radiation shielding problem used in MCNP's verification and validation suite. It was observed that both codes became slower on the MIC than on a 6-core X5650 CPU, by a factor of 4 for the MPI code and, abnormally, 20 for the OpenMP code, and both exhibited limited capability of strong scaling. (2) We have recently added a Constructive Solid Geometry (CSG) module to our ARCHER code to provide better support for geometry modelling in radiation shielding simulation. The functions of this module are frequently called in the particle random walk process. To identify the performance bottleneck we developed a CSG proxy application and profiled the code using the geometry data from FS7ONNi. The profiling data showed that the code was primarily memory latency bound on the MIC. This study suggests that despite low initial porting e_ort, Monte Carlo codes do not naturally lend themselves to the MIC platform — just like to the GPUs, and that the memory latency problem needs to be addressed in order to achieve decent performance gain.

  5. Validity of the iPhone M7 motion co-processor as a pedometer for able-bodied ambulation.

    PubMed

    Major, Matthew J; Alford, Micah

    2016-12-01

    Physical activity benefits for disease prevention are well-established. Smartphones offer a convenient platform for community-based step count estimation to monitor and encourage physical activity. Accuracy is dependent on hardware-software platforms, creating a recurring challenge for validation, but the Apple iPhone® M7 motion co-processor provides a standardised method that helps address this issue. Validity of the M7 to record step count for level-ground, able-bodied walking at three self-selected speeds, and agreement with the StepWatch TM was assessed. Steps were measured concurrently with the iPhone® (custom application to extract step count), StepWatch TM and manual count. Agreement between iPhone® and manual/StepWatch TM count was estimated through Pearson correlation and Bland-Altman analyses. Data from 20 participants suggested that iPhone® step count correlations with manual and StepWatch TM were strong for customary (1.3 ± 0.1 m/s) and fast (1.8 ± 0.2 m/s) speeds, but weak for the slow (1.0 ± 0.1 m/s) speed. Mean absolute error (manual-iPhone®) was 21%, 8% and 4% for the slow, customary and fast speeds, respectively. The M7 accurately records step count during customary and fast walking speeds, but is prone to considerable inaccuracies at slow speeds which has important implications for certain patient groups. The iPhone® may be a suitable alternative to the StepWatch TM for only faster walking speeds.

  6. An evaluation of an employment pilot to support forensic mental health service users into work and vocational activities.

    PubMed

    Samele, Chiara; Forrester, Andrew; Bertram, Mark

    2018-02-01

    Few employment programmes exist to support forensic service users with severe mental health problems and a criminal history. Little is known about how best to achieve this. The Employment and Social Inclusion Project (ESIP) was developed and piloted to support forensic service users into employment and vocational activities. This pilot service evaluation aimed to assess the number of service users who secured employment/vocational activities and explored services users' and staff experiences. Quantitative data were collected to record the characteristics of participating service users and how many secured employment and engaged in vocational activities. Eighteen qualitative interviews were conducted with service users and staff. Fifty-seven service users engaged with the project, most were men (93.0%) and previously employed (82.5%). Four service users (7.0%) secured paid competitive employment. Eight (14.0%) gained other paid employment. Tailored one-to-one support to increase skills and build confidence was an important feature of the project. Creation of a painting and decorating programme offered training and paid/flexible work. This exploratory project achieved some success in assisting forensic service users into paid employment. Further research to identify what works well for this important group will be of great value.

  7. Enhanced recovery clinical education programme improves quality of post-operative care

    PubMed Central

    McDonald, Ruth

    2015-01-01

    Quality is the driving principle of Enhanced Recovery (ER). It improves the patient experience by getting patients better sooner and changes clinical practice to make care safer and more efficient. As a consequence of ER patients spend less time in hospital. A successful ER programme began to fail after organisational restructuring and staff changes. Patients did not meet their ER goals and length of stay (LOS) increased. An ER nurse was appointed to get the programme back on track. This involved a multidisciplinary approach to an ER clinical education programme. The programme aimed to develop knowledge of the physiology of post-operative recovery and the evidence underpinning the interventions required. This was considered crucial to secure longer term staff engagement while avoiding unthinking protocol driven compliance. Success of the education programme was measured by improved outcomes in patient LOS and readmission statistics. During the four months of the clinical education programme there were no significant changes in monthly LOS. At six months post implementation of the programme there was a reduction in LOS of 0.6 days compared to the previous six months. At 12 months there was a reduction in 1.1 days compared with previous 12 months. There was a mean reduction of 28 day readmissions for all elective gynaecology surgery of 1.1 patients per month in the 12 months post programme implementation compared to the 12 months before. Delivering a multidisciplinary participatory education programme improved overall understanding of ER, and achieved sustained improvement in ER for patient benefit. PMID:26734343

  8. A Generalized Escape System Simulation (GESS) Computer Program. Volume 2. GESS Programmer’s Manual. Version II.

    DTIC Science & Technology

    1984-04-01

    Directorate (Code 6032) V NAVAL AIR DEVELOPMENT CENTER Warminster, PA 18974 and I David A. Fender KETRON. INC. Warminster, PA 18974 DTlC APRIL 1984 ELECTE FINAL...A. D’Aulerio N62269-81-Z-0206 David A. Fender Task No. 630-1944 9. PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMEN1T PROJECT, TASKAREA A...0102LF01401UNCLASSIFIED SECURITY CLAWFICATION OF TNIS PAGE (011t1 Die pewed) UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE w JIMu D#& Ent:ed) 9. Continued Louis A

  9. 41. Upper level, electronic racks, left to rightprogrammer group, status ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    41. Upper level, electronic racks, left to right--programmer group, status command message processing group, UHF radio, impss rack security - Ellsworth Air Force Base, Delta Flight, Launch Facility, On County Road T512, south of Exit 116 off I-90, Interior, Jackson County, SD

  10. Scientific Literacy in Nigeria: The Role of Science Education Programmes.

    ERIC Educational Resources Information Center

    Olorundare, Solomon A.

    1988-01-01

    Delineates a concept of scientific literacy as it relates to the Nigerian situation. Examines the relevance and implications of scientific literacy to the educational system and national security. Suggests how scientific literacy can be encouraged through science programs, especially in elementary science education. (YP)

  11. The important role of food composition in policies and programmes for better public health: A South African case study.

    PubMed

    Schönfeldt, Hettie C; Hall, Nicolette; Pretorius, B

    2018-01-01

    Most governments have committed to the set of Sustainable Development Goals established by the United Nations (UN) to be achieved by 2030. Subsequently the governments have drafted, or are in process of drafting, policies and programmes which aim to answer to these global requests. South Africa provides a unique case study: despite economic growth, undernutrition has not improved when compared to other industrialised nations, while at the same time, diet-related non-communicable diseases and obesity have exponentially increased. Access to healthy food is a constitutional right of all South Africans, and towards increasing food security and improving population health, various policies, programmes and regulations have been developed and implemented by the government to rectify the situation. The paper presents an overview of food composition within these public health policies, programmes and regulations and unpacks the important role of accurate food composition data. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. The Catch-up Education Programme in Turkey: Opportunities and challenges

    NASA Astrophysics Data System (ADS)

    Börkan, Bengü; Ünlühisarcıklı, Özlem; Caner, H. Ayşe; Sart, Z. Hande

    2015-02-01

    Turkish children between the ages of 10-14 who either never enrolled in primary education, dropped out of school, or were at least three years behind their peers had the opportunity of joining an accelerated learning programme. It was developed by the Turkish Ministry of National Education General Directorate of Primary Education as a response to the urgent need to secure these children's right to education. The programme, called "Catch-up Education Programme" (CEP), was implemented between September 2008 and 2013 in collaboration with the United Nations Children's Fund (UNICEF) to enable those children to complete several grades in a short time and then to continue their education with their peers. This paper presents the findings of a study, conducted in 2010, reviewing the challenges and opportunities experienced during the implementation process from the points of view of beneficiaries (pupils and parents) and implementers. The results are discussed in relation to educational policy and its implementation in general.

  13. ICE: A Scalable, Low-Cost FPGA-Based Telescope Signal Processing and Networking System

    NASA Astrophysics Data System (ADS)

    Bandura, K.; Bender, A. N.; Cliche, J. F.; de Haan, T.; Dobbs, M. A.; Gilbert, A. J.; Griffin, S.; Hsyu, G.; Ittah, D.; Parra, J. Mena; Montgomery, J.; Pinsonneault-Marotte, T.; Siegel, S.; Smecher, G.; Tang, Q. Y.; Vanderlinde, K.; Whitehorn, N.

    2016-03-01

    We present an overview of the ‘ICE’ hardware and software framework that implements large arrays of interconnected field-programmable gate array (FPGA)-based data acquisition, signal processing and networking nodes economically. The system was conceived for application to radio, millimeter and sub-millimeter telescope readout systems that have requirements beyond typical off-the-shelf processing systems, such as careful control of interference signals produced by the digital electronics, and clocking of all elements in the system from a single precise observatory-derived oscillator. A new generation of telescopes operating at these frequency bands and designed with a vastly increased emphasis on digital signal processing to support their detector multiplexing technology or high-bandwidth correlators — data rates exceeding a terabyte per second — are becoming common. The ICE system is built around a custom FPGA motherboard that makes use of an Xilinx Kintex-7 FPGA and ARM-based co-processor. The system is specialized for specific applications through software, firmware and custom mezzanine daughter boards that interface to the FPGA through the industry-standard FPGA mezzanine card (FMC) specifications. For high density applications, the motherboards are packaged in 16-slot crates with ICE backplanes that implement a low-cost passive full-mesh network between the motherboards in a crate, allow high bandwidth interconnection between crates and enable data offload to a computer cluster. A Python-based control software library automatically detects and operates the hardware in the array. Examples of specific telescope applications of the ICE framework are presented, namely the frequency-multiplexed bolometer readout systems used for the South Pole Telescope (SPT) and Simons Array and the digitizer, F-engine, and networking engine for the Canadian Hydrogen Intensity Mapping Experiment (CHIME) and Hydrogen Intensity and Real-time Analysis eXperiment (HIRAX) radio interferometers.

  14. Real-time orthorectification by FPGA-based hardware acceleration

    NASA Astrophysics Data System (ADS)

    Kuo, David; Gordon, Don

    2010-10-01

    Orthorectification that corrects the perspective distortion of remote sensing imagery, providing accurate geolocation and ease of correlation to other images is a valuable first-step in image processing for information extraction. However, the large amount of metadata and the floating-point matrix transformations required to operate on each pixel make this a computation and I/O (Input/Output) intensive process. As result much imagery is either left unprocessed or loses timesensitive value in the long processing cycle. However, the computation on each pixel can be reduced substantially by using computational results of the neighboring pixels and accelerated by special pipelined hardware architecture in one to two orders of magnitude. A specialized coprocessor that is implemented inside an FPGA (Field Programmable Gate Array) chip and surrounded by vendorsupported hardware IP (Intellectual Property) shares the computation workload with CPU through PCI-Express interface. The ultimate speed of one pixel per clock (125 MHz) is achieved by the pipelined systolic array architecture. The optimal partition between software and hardware, the timing profile among image I/O and computation, and the highly automated GUI (Graphical User Interface) that fully exploits this speed increase to maximize overall image production throughput will also be discussed. The software that runs on a workstation with the acceleration hardware orthorectifies 16 Megapixels per second, which is 16 times faster than without the hardware. It turns the production time from months to days. A real-life successful story of an imaging satellite company that adopted such workstations for their orthorectified imagery production will be presented. The potential candidacy of the image processing computation that can be accelerated more efficiently by the same approach will also be analyzed.

  15. Ultra-Reliable Digital Avionics (URDA) processor

    NASA Astrophysics Data System (ADS)

    Branstetter, Reagan; Ruszczyk, William; Miville, Frank

    1994-10-01

    Texas Instruments Incorporated (TI) developed the URDA processor design under contract with the U.S. Air Force Wright Laboratory and the U.S. Army Night Vision and Electro-Sensors Directorate. TI's approach couples advanced packaging solutions with advanced integrated circuit (IC) technology to provide a high-performance (200 MIPS/800 MFLOPS) modular avionics processor module for a wide range of avionics applications. TI's processor design integrates two Ada-programmable, URDA basic processor modules (BPM's) with a JIAWG-compatible PiBus and TMBus on a single F-22 common integrated processor-compatible form-factor SEM-E avionics card. A separate, high-speed (25-MWord/second 32-bit word) input/output bus is provided for sensor data. Each BPM provides a peak throughput of 100 MIPS scalar concurrent with 400-MFLOPS vector processing in a removable multichip module (MCM) mounted to a liquid-flowthrough (LFT) core and interfacing to a processor interface module printed wiring board (PWB). Commercial RISC technology coupled with TI's advanced bipolar complementary metal oxide semiconductor (BiCMOS) application specific integrated circuit (ASIC) and silicon-on-silicon packaging technologies are used to achieve the high performance in a miniaturized package. A Mips R4000-family reduced instruction set computer (RISC) processor and a TI 100-MHz BiCMOS vector coprocessor (VCP) ASIC provide, respectively, the 100 MIPS of a scalar processor throughput and 400 MFLOPS of vector processing throughput for each BPM. The TI Aladdim ASIC chipset was developed on the TI Aladdin Program under contract with the U.S. Army Communications and Electronics Command and was sponsored by the Advanced Research Projects Agency with technical direction from the U.S. Army Night Vision and Electro-Sensors Directorate.

  16. Aging in the three-dimensional random-field Ising model

    NASA Astrophysics Data System (ADS)

    von Ohr, Sebastian; Manssen, Markus; Hartmann, Alexander K.

    2017-07-01

    We studied the nonequilibrium aging behavior of the random-field Ising model in three dimensions for various values of the disorder strength. This allowed us to investigate how the aging behavior changes across the ferromagnetic-paramagnetic phase transition. We investigated a large system size of N =2563 spins and up to 108 Monte Carlo sweeps. To reach these necessary long simulation times, we employed an implementation running on Intel Xeon Phi coprocessors, reaching single-spin-flip times as short as 6 ps. We measured typical correlation functions in space and time to extract a growing length scale and corresponding exponents.

  17. Household food insecurity in black-slaves descendant communities in Brazil: has the legacy of slavery truly ended?

    PubMed

    Gubert, Muriel B; Segall-Corrêa, Anna Maria; Spaniol, Ana Maria; Pedroso, Jessica; Coelho, Stefanie Eugênia Dos Anjos Campos; Pérez-Escamilla, Rafael

    2017-06-01

    To identify the factors associated with food insecurity among Quilombolas communities in Brazil. An analysis of secondary data assessed in the 2011 Quilombolas Census was performed. The Brazilian Food Insecurity Measurement Scale (Escala Brasileira de Insegurança Alimentar, EBIA) was used to assess household food security status. Sociodemographic conditions and access to social programmes and benefits were also evaluated. National survey census from recognized Quilombolas Brazilian territories. Quilombolas households (n 8846). About half (47·8 %) of the Quilombolas lived in severely food-insecure households, with the North and Northeast regions facing the most critical situation. Households located in North Brazil, whose head of the family had less than 4 years of education, with a monthly per capita income below $US 44, without adequate sanitation and without adequate water supply had the greatest chance of experiencing moderate or severe food insecurity. Households that had access to a water supply programme for dry regions (Programa Cisternas) and an agricultural harvest subsidy programme (Programa Garantia Safra) had less chance of experiencing moderate and severe food insecurity. Households that did not have access to health care (Programa Saúde da Família) had greater chance of suffering from moderate or severe food insecurity. Interventions are urgently needed to strengthen and promote public policies aimed to improve living conditions and food security in Quilombolas communities.

  18. Recent advances to address European Union Health Security from cross border chemical health threats.

    PubMed

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  19. Security Enhancement of Littoral Combat Ship Class Utilizing an Autonomous Mustering and Pier Monitoring System

    DTIC Science & Technology

    2010-03-01

    allows the programmer to use the English language in an expressive manor while still maintaining the logical structure of a programming language ( Pressman ...and Choudhury Tanzeem. 2000. Face Recognition for Smart Environments, IEEE Computer, pp. 50–55. Pressman , Roger. 2010. Software Engineering A

  20. LOGWAR 15: Analysis Report

    DTIC Science & Technology

    2016-04-01

    Sanitation, and Hygiene WFP World Food Programme WHO World Health Organization Unclassified Unclassified xii This page intentionally left blank...Insurgency Natural Disaster Contamination Visibility Disposition Distribution Sourcing Prioritization Security Financial U.S. Military Services Combatant...supply; restrictions on sourcing; contamination concerns (IV solutions) Small in size; multiple variants with limited interchangeability; requires

  1. Analysis of Voltage and Current Signal Processing in a Li-ion Battery Management System

    DTIC Science & Technology

    2010-09-01

    SUBJECT TERMS Pulsed Power, Charger, Buck Converter, Field Programmable Gate Array (FPGA), Lithium - ion Batteries 16. PRICE CODE 17. SECURITY...Congressional Research Service. July 31, 2000. [3] F. E. Filler, “A Pulsed Power System Design Using Lithium - ion Batteries and One Charger per Battery

  2. Developing the security culture at the SEISMED Reference Centres.

    PubMed

    Fowler, J

    1996-01-01

    The paper gives a brief summary of the SEISMED project and the particular role played by the Reference Centres. Details are given of the hardware and application systems in use in the Royal Hospitals (NHS) Trust (RHT), one of the SEISMED Reference Centres. It proposes, without verification, a definition of a Security Culture based on three criteria. These are suggested to be the "Awareness" the "Acceptance" and the "Actions" of the management and staff to improve Information Systems Security throughout the RHT. The way that "Awareness" was increased is shown by the specific initiatives commenced as a result of a CRAMM Risk Analysis and the management and staff training programmes. The specific initiatives mentioned include, an Information Systems Security Policy, a contingency and disaster recovery plan, improvements in the physical protection of equipment and changes to the method of access control. The "Acceptance" by the staff of these measures is considered and the success or failure of "Developing A Security Culture" examined. The role of SEISMED in this process is assessed.

  3. A life-cycle approach to food and nutrition security in India.

    PubMed

    Rai, Rajesh Kumar; Kumar, Sandhya; Sekher, Madhushree; Pritchard, Bill; Rammohan, Anu

    2015-04-01

    India's poor performance on critical food and nutrition security indicators despite substantial economic prosperity has been widely documented. These failings not only hamper national progress, but also contribute significantly to the global undernourished population, particularly children. While the recently passed National Food Security Act 2013 adopts a life-cycle approach to expand coverage of subsidized food grains to the most vulnerable households and address food security, there remains much to be desired in the legislation. Access to adequate food for 1.24 billion people is a multifaceted problem requiring an interconnected set of policy measures to tackle the various factors affecting food and nutrition security in India. In the present opinion paper, we discuss a fivefold strategy that incorporates a life-cycle approach, spanning reproductive health, bolstering citizen participation in existing national programmes, empowering women, advancing agriculture and better monitoring the Public Distribution System in order to fill the gaps in both access and adequacy of food and nutrition.

  4. Security risk assessment: applying the concepts of fuzzy logic.

    PubMed

    Bajpai, Shailendra; Sachdeva, Anish; Gupta, J P

    2010-01-15

    Chemical process industries (CPI) handling hazardous chemicals in bulk can be attractive targets for deliberate adversarial actions by terrorists, criminals and disgruntled employees. It is therefore imperative to have comprehensive security risk management programme including effective security risk assessment techniques. In an earlier work, it has been shown that security risk assessment can be done by conducting threat and vulnerability analysis or by developing Security Risk Factor Table (SRFT). HAZOP type vulnerability assessment sheets can be developed that are scenario based. In SRFT model, important security risk bearing factors such as location, ownership, visibility, inventory, etc., have been used. In this paper, the earlier developed SRFT model has been modified using the concepts of fuzzy logic. In the modified SRFT model, two linguistic fuzzy scales (three-point and four-point) are devised based on trapezoidal fuzzy numbers. Human subjectivity of different experts associated with previous SRFT model is tackled by mapping their scores to the newly devised fuzzy scale. Finally, the fuzzy score thus obtained is defuzzyfied to get the results. A test case of a refinery is used to explain the method and compared with the earlier work.

  5. Creating meaningful business continuity management programme metrics.

    PubMed

    Strong, Brian

    2010-11-01

    The popular axiom, 'what gets measured gets done', is often applied in the quality management and continuous improvement disciplines. This truism is also useful to business continuity practitioners as they continually strive to prove the value of their organisation's investment in a business continuity management (BCM) programme. BCM practitioners must also remain relevant to their organisations as executives focus on the bottom line and maintaining stakeholder confidence. It seems that executives always find a way, whether in a hallway or elevator, to ask BCM professionals about the company's level of readiness. When asked, they must be ready with an informed response. The establishment of a process to measure business continuity programme performance and organisational readiness has emerged as a key component of US Department of Homeland Security 'Voluntary Private Sector Preparedness (PS-Prep) Program' standards where the overarching goal is to improve private sector preparedness for disasters and emergencies. The purpose of this paper is two-fold: to introduce continuity professionals to best practices that should be considered when developing a BCM metrics programme as well as providing a case study of how a large health insurance company researched, developed and implemented a process to measure BCM programme performance and company readiness.

  6. Intel Many Integrated Core (MIC) architecture optimization strategies for a memory-bound Weather Research and Forecasting (WRF) Goddard microphysics scheme

    NASA Astrophysics Data System (ADS)

    Mielikainen, Jarno; Huang, Bormin; Huang, Allen H.

    2014-10-01

    The Goddard cloud microphysics scheme is a sophisticated cloud microphysics scheme in the Weather Research and Forecasting (WRF) model. The WRF is a widely used weather prediction system in the world. It development is a done in collaborative around the globe. The Goddard microphysics scheme is very suitable for massively parallel computation as there are no interactions among horizontal grid points. Compared to the earlier microphysics schemes, the Goddard scheme incorporates a large number of improvements. Thus, we have optimized the code of this important part of WRF. In this paper, we present our results of optimizing the Goddard microphysics scheme on Intel Many Integrated Core Architecture (MIC) hardware. The Intel Xeon Phi coprocessor is the first product based on Intel MIC architecture, and it consists of up to 61 cores connected by a high performance on-die bidirectional interconnect. The Intel MIC is capable of executing a full operating system and entire programs rather than just kernels as the GPU do. The MIC coprocessor supports all important Intel development tools. Thus, the development environment is familiar one to a vast number of CPU developers. Although, getting a maximum performance out of MICs will require using some novel optimization techniques. Those optimization techniques are discusses in this paper. The results show that the optimizations improved performance of the original code on Xeon Phi 7120P by a factor of 4.7x. Furthermore, the same optimizations improved performance on a dual socket Intel Xeon E5-2670 system by a factor of 2.8x compared to the original code.

  7. Performance tuning Weather Research and Forecasting (WRF) Goddard longwave radiative transfer scheme on Intel Xeon Phi

    NASA Astrophysics Data System (ADS)

    Mielikainen, Jarno; Huang, Bormin; Huang, Allen H.

    2015-10-01

    Next-generation mesoscale numerical weather prediction system, the Weather Research and Forecasting (WRF) model, is a designed for dual use for forecasting and research. WRF offers multiple physics options that can be combined in any way. One of the physics options is radiance computation. The major source for energy for the earth's climate is solar radiation. Thus, it is imperative to accurately model horizontal and vertical distribution of the heating. Goddard solar radiative transfer model includes the absorption duo to water vapor,ozone, ozygen, carbon dioxide, clouds and aerosols. The model computes the interactions among the absorption and scattering by clouds, aerosols, molecules and surface. Finally, fluxes are integrated over the entire longwave spectrum.In this paper, we present our results of optimizing the Goddard longwave radiative transfer scheme on Intel Many Integrated Core Architecture (MIC) hardware. The Intel Xeon Phi coprocessor is the first product based on Intel MIC architecture, and it consists of up to 61 cores connected by a high performance on-die bidirectional interconnect. The coprocessor supports all important Intel development tools. Thus, the development environment is familiar one to a vast number of CPU developers. Although, getting a maximum performance out of MICs will require using some novel optimization techniques. Those optimization techniques are discusses in this paper. The optimizations improved the performance of the original Goddard longwave radiative transfer scheme on Xeon Phi 7120P by a factor of 2.2x. Furthermore, the same optimizations improved the performance of the Goddard longwave radiative transfer scheme on a dual socket configuration of eight core Intel Xeon E5-2670 CPUs by a factor of 2.1x compared to the original Goddard longwave radiative transfer scheme code.

  8. AnRAD: A Neuromorphic Anomaly Detection Framework for Massive Concurrent Data Streams.

    PubMed

    Chen, Qiuwen; Luley, Ryan; Wu, Qing; Bishop, Morgan; Linderman, Richard W; Qiu, Qinru

    2018-05-01

    The evolution of high performance computing technologies has enabled the large-scale implementation of neuromorphic models and pushed the research in computational intelligence into a new era. Among the machine learning applications, unsupervised detection of anomalous streams is especially challenging due to the requirements of detection accuracy and real-time performance. Designing a computing framework that harnesses the growing computing power of the multicore systems while maintaining high sensitivity and specificity to the anomalies is an urgent research topic. In this paper, we propose anomaly recognition and detection (AnRAD), a bioinspired detection framework that performs probabilistic inferences. We analyze the feature dependency and develop a self-structuring method that learns an efficient confabulation network using unlabeled data. This network is capable of fast incremental learning, which continuously refines the knowledge base using streaming data. Compared with several existing anomaly detection approaches, our method provides competitive detection quality. Furthermore, we exploit the massive parallel structure of the AnRAD framework. Our implementations of the detection algorithm on the graphic processing unit and the Xeon Phi coprocessor both obtain substantial speedups over the sequential implementation on general-purpose microprocessor. The framework provides real-time service to concurrent data streams within diversified knowledge contexts, and can be applied to large problems with multiple local patterns. Experimental results demonstrate high computing performance and memory efficiency. For vehicle behavior detection, the framework is able to monitor up to 16000 vehicles (data streams) and their interactions in real time with a single commodity coprocessor, and uses less than 0.2 ms for one testing subject. Finally, the detection network is ported to our spiking neural network simulator to show the potential of adapting to the emerging neuromorphic architectures.

  9. Fast multipurpose Monte Carlo simulation for proton therapy using multi- and many-core CPU architectures.

    PubMed

    Souris, Kevin; Lee, John Aldo; Sterpin, Edmond

    2016-04-01

    Accuracy in proton therapy treatment planning can be improved using Monte Carlo (MC) simulations. However the long computation time of such methods hinders their use in clinical routine. This work aims to develop a fast multipurpose Monte Carlo simulation tool for proton therapy using massively parallel central processing unit (CPU) architectures. A new Monte Carlo, called MCsquare (many-core Monte Carlo), has been designed and optimized for the last generation of Intel Xeon processors and Intel Xeon Phi coprocessors. These massively parallel architectures offer the flexibility and the computational power suitable to MC methods. The class-II condensed history algorithm of MCsquare provides a fast and yet accurate method of simulating heavy charged particles such as protons, deuterons, and alphas inside voxelized geometries. Hard ionizations, with energy losses above a user-specified threshold, are simulated individually while soft events are regrouped in a multiple scattering theory. Elastic and inelastic nuclear interactions are sampled from ICRU 63 differential cross sections, thereby allowing for the computation of prompt gamma emission profiles. MCsquare has been benchmarked with the gate/geant4 Monte Carlo application for homogeneous and heterogeneous geometries. Comparisons with gate/geant4 for various geometries show deviations within 2%-1 mm. In spite of the limited memory bandwidth of the coprocessor simulation time is below 25 s for 10(7) primary 200 MeV protons in average soft tissues using all Xeon Phi and CPU resources embedded in a single desktop unit. MCsquare exploits the flexibility of CPU architectures to provide a multipurpose MC simulation tool. Optimized code enables the use of accurate MC calculation within a reasonable computation time, adequate for clinical practice. MCsquare also simulates prompt gamma emission and can thus be used also for in vivo range verification.

  10. Fast Fourier Transform Co-Processor (FFTC)- Towards Embedded GFLOPs

    NASA Astrophysics Data System (ADS)

    Kuehl, Christopher; Liebstueckel, Uwe; Tejerina, Isaac; Uemminghaus, Michael; Wite, Felix; Kolb, Michael; Suess, Martin; Weigand, Roland

    2012-08-01

    Many signal processing applications and algorithms perform their operations on the data in the transform domain to gain efficiency. The Fourier Transform Co- Processor has been developed with the aim to offload General Purpose Processors from performing these transformations and therefore to boast the overall performance of a processing module. The IP of the commercial PowerFFT processor has been selected and adapted to meet the constraints of the space environment.In frame of the ESA activity “Fast Fourier Transform DSP Co-processor (FFTC)” (ESTEC/Contract No. 15314/07/NL/LvH/ma) the objectives were the following:Production of prototypes of a space qualified version of the commercial PowerFFT chip called FFTC based on the PowerFFT IP.The development of a stand-alone FFTC Accelerator Board (FTAB) based on the FFTC including the Controller FPGA and SpaceWire Interfaces to verify the FFTC function and performance.The FFTC chip performs its calculations with floating point precision. Stand alone it is capable computing FFTs of up to 1K complex samples in length in only 10μsec. This corresponds to an equivalent processing performance of 4.7 GFlops. In this mode the maximum sustained data throughput reaches 6.4Gbit/s. When connected to up to 4 EDAC protected SDRAM memory banks the FFTC can perform long FFTs with up to 1M complex samples in length or multidimensional FFT- based processing tasks.A Controller FPGA on the FTAB takes care of the SDRAM addressing. The instructions commanded via the Controller FPGA are used to set up the data flow and generate the memory addresses.The presentation will give and overview on the project, including the results of the validation of the FFTC ASIC prototypes.

  11. Affordable Online Maths Tuition: Evaluation Report and Executive Summary

    ERIC Educational Resources Information Center

    Torgerson, Carole; Ainsworth, Hannah; Buckley, Hannah; Hampden-Thompson, Gillen; Hewitt, Catherine; Humphry, Deborah; Jefferson, Laura; Mitchell, Natasha; Torgerson, David

    2016-01-01

    "Affordable Online Maths Tuition" is a one-to-one tutoring programme where pupils receive maths tuition over the internet from trained maths graduates in India and Sri Lanka. It is delivered by the organisation Third Space Learning (TSL). Tutors and pupils communicate using video calling and a secure virtual classroom. Before each…

  12. Empowerment through Pedagogy: Positioning Service-Learning as an Early Childhood Pedagogy for Pre-Service Teachers

    ERIC Educational Resources Information Center

    Winterbottom, Christian; Mazzocco, Philip J.

    2015-01-01

    Over the past decade early childhood education (ECE) teachers have faced increasing pressures to implement standardised tests in order to secure external validation and funding. In response, many teacher education programmes now focus heavily on positivistic training approaches, as opposed to more developmentally appropriate pedagogies…

  13. Using safety crosses for patient self-reflection.

    PubMed

    Silverton, Sarah

    The Productive Mental Health Ward programme has been developed to improve efficiency and safety in the NHS. Patients in a medium-secure mental health unit used patient safety crosses as a tool for self-reflection as part of their recovery journey. This article describes how the project was set up as well as initial findings.

  14. Elements of ESA's policy on space and security

    NASA Astrophysics Data System (ADS)

    Giannopapa, Christina; Adriaensen, Maarten; Antoni, Ntorina; Schrogl, Kai-Uwe

    2018-06-01

    In the past decade Europe has been facing rising security threats, ranging from climate change, migrations, nearby conflicts and crises, to terrorism. The demand to tackle these critical challenges is increasing in Member States. Space is already contributing, and could further contribute with already existing systems and future ones. The increasing need for security in Europe and for safety and security of Europe's space activities has led to a growing number of activities in ESA in various domains. It has also driven new and strengthened partnerships with security stakeholders in Europe. At the European level, ESA is collaborating closely with the main European institutions dealing with space security. In addition, as an organisation ESA has evolved to conduct security-related projects and programmes and to address the threats to its own activities, thereby securing the investments of the Member States. Over the past years the Agency has set up a comprehensive regulatory framework in order to be able to cope with security related requirements. Over the past years, ESA has increased its exchanges with its Member States. The paper presents main elements of the ESA's policy on space and security. It introduces the current European context for space and security, the European goals in this domain and the specific objectives to which the Agency intends to contribute. Space and security in the ESA context is set out under two components: a) security from space and b) security in space, including the security of ESA's own activities (corporate security and the security of ESA's space missions). Subsequently, ESA's activities are elaborated around these two pillars, composed of different activities conducted in the most appropriate frameworks and in coordination with the relevant stakeholders and shareholders.

  15. Tobacco point‐of‐purchase promotion: examining tobacco industry documents

    PubMed Central

    Lavack, Anne M; Toth, Graham

    2006-01-01

    In the face of increasing media restrictions around the world, point‐of‐purchase promotion (also called point‐of‐sale merchandising, and frequently abbreviated as POP or POS) is now one of the most important tools that tobacco companies have for promoting tobacco products. Using tobacco industry documents, this paper demonstrates that tobacco companies have used point‐of‐purchase promotion in response to real or anticipated advertising restrictions. Their goal was to secure dominance in the retail setting, and this was achieved through well‐trained sales representatives who offered contracts for promotional incentive programmes to retailers, which included the use of point‐of‐sale displays and merchandising fixtures. Audit programmes played an important role in ensuring contract enforcement and compliance with a variety of tobacco company incentive programmes. Tobacco companies celebrated their merchandising successes, in recognition of the stiff competition that existed among tobacco companies for valuable retail display space. PMID:16998172

  16. Tobacco point-of-purchase promotion: examining tobacco industry documents.

    PubMed

    Lavack, Anne M; Toth, Graham

    2006-10-01

    In the face of increasing media restrictions around the world, point-of-purchase promotion (also called point-of-sale merchandising, and frequently abbreviated as POP or POS) is now one of the most important tools that tobacco companies have for promoting tobacco products. Using tobacco industry documents, this paper demonstrates that tobacco companies have used point-of-purchase promotion in response to real or anticipated advertising restrictions. Their goal was to secure dominance in the retail setting, and this was achieved through well-trained sales representatives who offered contracts for promotional incentive programmes to retailers, which included the use of point-of-sale displays and merchandising fixtures. Audit programmes played an important role in ensuring contract enforcement and compliance with a variety of tobacco company incentive programmes. Tobacco companies celebrated their merchandising successes, in recognition of the stiff competition that existed among tobacco companies for valuable retail display space.

  17. Successful public-private partnerships: The NYPD shield model.

    PubMed

    Amadeo, Vincent; Iannone, Stephen

    2017-12-01

    This article will identify the challenges that post 9/11 law enforcement faces regarding privatepublic partnerships and describe in detail the NYPD Shield programme, created to combat those challenges. Recommendations made by the 911 Commission included the incorporation of the private sector into future homeland security strategies. One such strategy is NYPD Shield. This programme is a nationally recognized award-winning public-private partnership dedicated to providing counterterrorism training and information sharing with government agencies, non-government organizations, private businesses, and the community. Information is shared through several platforms that include a dedicated website, instruction of counterterrorism training curricula, e-mail alerts, intelligence assessments and the hosting of quarterly conferences. This article also details how the NYPD Shield is providing its successful template to other law enforcement agencies enabling them to initiate similar programmes in their respective jurisdictions, and in doing so joining a National Shield Network.

  18. The role of welfare state principles and generosity in social policy programmes for public health: an international comparative study.

    PubMed

    Lundberg, Olle; Yngwe, Monica Aberg; Stjärne, Maria Kölegård; Elstad, Jon Ivar; Ferrarini, Tommy; Kangas, Olli; Norström, Thor; Palme, Joakim; Fritzell, Johan

    2008-11-08

    Many important social determinants of health are also the focus for social policies. Welfare states contribute to the resources available for their citizens through cash transfer programmes and subsidised services. Although all rich nations have welfare programmes, there are clear cross-national differences with respect to their design and generosity. These differences are evident in national variations in poverty rates, especially among children and elderly people. We investigated to what extent variations in family and pension policies are linked to infant mortality and old-age excess mortality. Infant mortality rates and old-age excess mortality rates were analysed in relation to social policy characteristics and generosity. We did pooled cross-sectional time-series analyses of 18 OECD (Organisation for Economic Co-operation and Development) countries during the period 1970-2000 for family policies and 1950-2000 for pension policies. Increased generosity in family policies that support dual-earner families is linked with lower infant mortality rates, whereas the generosity in family policies that support more traditional families with gainfully employed men and homemaking women is not. An increase by one percentage point in dual-earner support lowers infant mortality by 0.04 deaths per 1000 births. Generosity in basic security type of pensions is linked to lower old-age excess mortality, whereas the generosity of earnings-related income security pensions is not. An increase by one percentage point in basic security pensions is associated with a decrease in the old age excess mortality by 0.02 for men as well as for women. The ways in which social policies are designed, as well as their generosity, are important for health because of the increase in resources that social policies entail. Hence, social policies are of major importance for how we can tackle the social determinants of health.

  19. Support of Herschel Key Programme Teams at the NASA Herschel Science Center

    NASA Astrophysics Data System (ADS)

    Shupe, David L.; Appleton, P. N.; Ardila, D.; Bhattacharya, B.; Mei, Y.; Morris, P.; Rector, J.; NHSC Team

    2010-01-01

    The first science data from the Herschel Space Observatory were distributed to Key Programme teams in September 2009. This poster describes a number of resources that have been developed by the NASA Herschel Science Center (NHSC) to support the first users of the observatory. The NHSC webpages and Helpdesk serve as the starting point for information and queries from the US community. Details about the use of the Herschel Common Science Software can be looked up in the Helpdesk Knowledgebase. The capability of real-time remote support through desktop sharing has been implemented. The NHSC continues to host workshops on data analysis and observation planning. Key Programme teams have been provided Wiki sites upon request for their team's private use and for sharing information with other teams. A secure data storage area is in place for troubleshooting purposes and for use by visitors. The NHSC draws upon close working relationships with Instrument Control Centers and the Herschel Science Center in Madrid in order to have the necessary expertise on hand to assist Herschel observers, including both Key Programme teams and respondents to upcoming open time proposal calls.

  20. Managing personal health information in distributed research network environments.

    PubMed

    Bredfeldt, Christine E; Butani, Amy L; Pardee, Roy; Hitz, Paul; Padmanabhan, Sandy; Saylor, Gwyn

    2013-10-08

    Studying rare outcomes, new interventions and diverse populations often requires collaborations across multiple health research partners. However, transferring healthcare research data from one institution to another can increase the risk of data privacy and security breaches. A working group of multi-site research programmers evaluated the need for tools to support data security and data privacy. The group determined that data privacy support tools should: 1) allow for a range of allowable Protected Health Information (PHI); 2) clearly identify what type of data should be protected under the Health Insurance Portability and Accountability Act (HIPAA); and 3) help analysts identify which protected health information data elements are allowable in a given project and how they should be protected during data transfer. Based on these requirements we developed two performance support tools to support data programmers and site analysts in exchanging research data. The first tool, a workplan template, guides the lead programmer through effectively communicating the details of multi-site programming, including how to run the program, what output the program will create, and whether the output is expected to contain protected health information. The second performance support tool is a checklist that site analysts can use to ensure that multi-site program output conforms to expectations and does not contain protected health information beyond what is allowed under the multi-site research agreements. Together the two tools create a formal multi-site programming workflow designed to reduce the chance of accidental PHI disclosure.

  1. Accessibility of summer meals and the food insecurity of low-income households with children.

    PubMed

    Miller, Daniel P

    2016-08-01

    Almost no previous research has examined the impact of the US Department of Agriculture's (USDA) Summer Food Service Program and related Seamless Summer Option, which provide meals and snacks to low-income children over the summer. The present study investigated whether geographic accessibility of summer meals programme sites (a proxy for programme participation) was associated with food insecurity for low-income households. The study used data from the California Health Interview Survey (CHIS) and administrative data on summer meals sites in California. Geocoding was used to calculate driving time between CHIS households and nearby summer meals sites. Geographic accessibility was measured using a gravity model, which accounted for the spatially distributed supply of and demand for summer meals. Food insecurity and very low food security were measured using a standard six-item measure from the USDA. Low-income families with children (n 5394). A representative surveillance study of non-institutionalized households in California. Geographic accessibility was not associated with food insecurity. However, geographic accessibility was associated with a significantly lower probability of very low food security in the full sample and among households with younger children and those living in less urban areas. The USDA's summer meals programme may be effective at reducing the most severe form of food insecurity for low-income households with children. Expanding the number of summer meals sites, the number of meals served at sites and sites' hours of operation may be effective strategies to promote nutritional health over the summer months.

  2. Does the Intel Xeon Phi processor fit HEP workloads?

    NASA Astrophysics Data System (ADS)

    Nowak, A.; Bitzes, G.; Dotti, A.; Lazzaro, A.; Jarp, S.; Szostek, P.; Valsan, L.; Botezatu, M.; Leduc, J.

    2014-06-01

    This paper summarizes the five years of CERN openlab's efforts focused on the Intel Xeon Phi co-processor, from the time of its inception to public release. We consider the architecture of the device vis a vis the characteristics of HEP software and identify key opportunities for HEP processing, as well as scaling limitations. We report on improvements and speedups linked to parallelization and vectorization on benchmarks involving software frameworks such as Geant4 and ROOT. Finally, we extrapolate current software and hardware trends and project them onto accelerators of the future, with the specifics of offline and online HEP processing in mind.

  3. Surveillance of borders, coastlines, and harbours (SOBCAH): a European commission preparatory action on security research

    NASA Astrophysics Data System (ADS)

    Clarke, David J.; Davis, Eric; Varco, Alan G.

    2008-10-01

    Surveillance Of Borders Coastlines And Harbours (SOBCAH ) is becoming increasingly challenging in Europe due to the expansion of new European borders coupled with the increased risks from the potential quantity and variety of terrorist activities. SOBCAH was an 18-month programme undertaken as a European Commission funded Preparatory Action in the field of Security Research (PASR) initiative to identify and demonstrate improvements in security; initially focusing on techniques to maximise the surveillance and detection effectiveness of existing sensor systems and technologies. This paper discusses the rationale in identifying the requirements, establishing a system architecture and the findings of building a security system demonstrator that underwent trials in the Port of Genoa, Italy in July 2007. It will provide an overview of the main drivers for a European-wide concept to standardise the development of enhanced border security systems. The paper will focus on techniques employed in the demonstrator to maximise the intelligence gathered from many disparate sensor sources without burdening the work load of the operators; providing enhanced situational awareness of the threat environment.

  4. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    NASA Astrophysics Data System (ADS)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  5. Becoming an Academic: The Role of Doctoral Capital in the Field of Education

    ERIC Educational Resources Information Center

    Walker, Jude; Yoon, EeSeul

    2017-01-01

    This paper draws on Bourdieu's concepts of "field," "capital" and "habitus" to examine the learning and enculturation of alumni of a Canadian PhD programme in the discipline of Education. We introduce the concept of "doctoral capital" to help explain how and why some PhD graduates go on to secure faculty…

  6. Secure Heterogeneous Multicore Platform Through Diversity and Redundancy

    DTIC Science & Technology

    2012-03-31

    implementation detects synchronization in this way. If a programmer uses custom synchronization primitives , our approach assumes that such primitives ... synchronization primitives . Primitives such as barriers and spinlocks explicitly enforce a pre- determined ordering among threads. Therefore, the outcome of...these synchronization operations are deterministic. In the discussion, we will refer to these primitives as ordering synchronization operations. On the

  7. Protocol Programmability

    DTIC Science & Technology

    2013-12-01

    First, any subproject that involved an implementation shared some implementation infrastructure with other subprojects. For example, the Plaid backend ...very same language. We followed this advice in Plaid, and we therefore implemented the compiler backend in Plaid (code generation, type checker, Æminim...programming language aimed at enforcing security properties in web and mobile applications [Nistor et al., 2013]. Wyvern therefore provides an excellent

  8. Returns on Vocational Education over the Life Cycle: Between Immediate Labour Market Preparation and Lifelong Employability

    ERIC Educational Resources Information Center

    Lavrijsen, Jeroen; Nicaise, Ides

    2017-01-01

    An important issue in the design of secondary-level education is the balance between conveying general and occupation-specific (vocational) skills. On the one hand, vocationally oriented programmes, providing occupation-specific skills with immediate labour market relevance, have repeatedly been shown to secure safe pathways into employment. On…

  9. Engaging Secondary School Students in Food-Related Citizenship: Achievements and Challenges of a Multi-Component Programme

    ERIC Educational Resources Information Center

    Jones, Mat; Dailami, Narges; Weitkamp, Emma; Kimberlee, Richard; Salmon, Debra; Orme, Judy

    2012-01-01

    Global food security and sustainability, animal welfare, dietary health, and socially just relations of food production have become prominent societal issues. They are of particular concern for young people as their lives progress towards becoming independent consumers and citizens with the capacity to shape food systems of the future. This paper…

  10. Bringing Relevance to Elearning--A Gender Perspective

    ERIC Educational Resources Information Center

    Wallace, Ann; Panteli, Niki

    2018-01-01

    In this paper, we discuss the importance of relevance in the provision of eLearning for the pursuit of higher education (HE). In particular, we argue how the extant literature focuses on quality and security in the design of eLearning platforms, but pays scant attention to how relevant the platform and the programme contents are to the needs of…

  11. Antibiotics Smart Use: a workable model for promoting the rational use of medicines in Thailand

    PubMed Central

    Chongtrakul, Pisonthi; Anuwong, Kunyada; Pumtong, Somying; Kongsomboon, Kedsenee; Butdeemee, Parichart; Khonglormyati, Jurairat; Chomyong, Santi; Tongyoung, Parnuchote; Losiriwat, Suraphol; Seesuk, Piyanooch; Suwanwaree, Pongthep; Tangcharoensathien, Viroj

    2012-01-01

    Abstract The Antibiotics Smart Use (ASU) programme was introduced in Thailand as a model to promote the rational use of medicines, starting with antibiotics. The programme’s first phase consisted of assessing interventions intended to change prescribing practices; the second phase examined the feasibility of programme scale-up. Currently the programme is in its third phase, which centres on sustainability. This paper describes the concept behind ASU, the programme’s functional modalities, the development of its conceptual framework and the implementation of its first and second phases. To change antibiotic prescription practices, multifaceted interventions at the individual and organizational levels were implemented; to maintain behaviour change and scale up the programme, interventions at the network and policy levels were used. The National Health Security Office has adopted ASU as a pay-for-performance criterion, a major achievement that has led to the programme’s expansion nationwide. Despite limited resources, programme scale-up and sustainability have been facilitated by the promotion of local ownership and mutual recognition, which have generated pride and commitment. ASU is clearly a workable entry point for efforts to rationalize the use of medicines in Thailand. Its long-term sustainability will require continued local commitment and political support, effective auditing and integration of ASU into routine systems with appropriate financial incentives. PMID:23284196

  12. The Scottish Government's Rural and Environmental Science and Analytical Services Strategic Research Progamme

    NASA Astrophysics Data System (ADS)

    Dawson, Lorna; Bestwick, Charles

    2013-04-01

    The Strategic Research Programme focuses on the delivery of outputs and outcomes within the major policy agenda areas of climate change, land use and food security, and to impact on the 'Wealthier', 'Healthier' and 'Greener' strategic objectives of the Scottish Government. The research is delivered through two programmes: 'Environmental Change' and 'Food, Land and People'; the core strength of which is the collaboration between the Scottish Government's Main Research Providers-The James Hutton Institute, the Moredun Research Institute, Rowett Institute of Nutrition and Health University of Aberdeen, Scotland's Rural College, Biomathematics and Statistics Scotland and The Royal Botanic Gardens Edinburgh. The research actively seeks to inform and be informed by stakeholders from policy, farming, land use, water and energy supply, food production and manufacturing, non-governmental organisations, voluntary organisations, community groups and general public. This presentation will provide an overview of the programme's interdisciplinary research, through examples from across the programme's themes. Examples will exemplify impact within the Strategic Programme's priorities of supporting policy and practice, contributing to economic growth and innovation, enhancing collaborative and multidisciplinary research, growing scientific resilience and delivering scientific excellence. http://www.scotland.gov.uk/Topics/Research/About/EBAR/StrategicResearch/future-research-strategy/Themes/ http://www.knowledgescotland.org/news.php?article_id=295

  13. Very low food security in the USA is linked with exposure to violence.

    PubMed

    Chilton, Mariana M; Rabinowich, Jenny R; Woolf, Nicholas H

    2014-01-01

    To investigate characteristics of exposure to violence in relation to food security status among female-headed households. Ongoing mixed-method participatory action study. Questions addressed food insecurity, public assistance, and maternal and child health. Grounded theory analysis of qualitative themes related to violence was performed. These themes were then categorized by food security status. Homes of low-income families in Philadelphia, PA, USA. Forty-four mothers of children under 3 years of age participating in public assistance programmes. Forty women described exposure to violence ranging from fear of violence to personal experiences with rape. Exposure to violence affected mental health, ability to continue school and obtain work with living wages, and subsequently the ability to afford food. Exposure to violence during childhood and being a perpetrator of violence were both linked to very low food security status and depressive symptoms. Ten of seventeen (59%) participants reporting very low food security described life-changing violence, compared with three of fifteen (20%) participants reporting low food security and four of twelve (33%) reporting food security. Examples of violent experiences among the very low food secure group included exposure to child abuse, neglect and rape that suggest exposure to violence is an important factor in the experience of very low food security. Descriptions of childhood trauma and life-changing violence are linked with severe food security. Policy makers and clinicians should incorporate violence prevention efforts when addressing hunger.

  14. [Multiprofessional family-system training programme in psychiatry--effects on team cooperation and staff strain].

    PubMed

    Zwack, Julika; Schweitzer, Jochen

    2008-01-01

    How does the interdisciplinary cooperation of psychiatric staff members change after a multiprofessional family systems training programme? Semi-structured interviews were conducted with 49 staff members. Quantitative questionnaires were used to assess burnout (Maslach Burnout Inventory, MBI) and team climate (Team-Klima-Inventar, TKI). The multiprofessional training intensifies interdisciplinary cooperation. It results in an increased appreciation of the nurses involved and in a redistribution of therapeutic tasks between nurses, psychologists and physicians. Staff burnout decreased during the research period, while task orientation and participative security within teams increased. The multiprofessional family systems training appears suitable to improve quality of patient care and interdisciplinary cooperation and to reduce staff burnout.

  15. Secure TRNG with random phase stimulation

    NASA Astrophysics Data System (ADS)

    Wieczorek, Piotr Z.

    2017-08-01

    In this paper a novel TRNG concept is proposed which is a vital part of cryptographic systems. The proposed TRNG involves phase variability of a pair of ring oscillators (ROs) to force the multiple metastable events in a flip-flop (FF). In the solution, the ROs are periodically activated to ensure the violation of the FF timing and resultant state randomness, while the TRNG circuit adapts the structure of ROs to obtain the maximum entropy and circuit security. The TRNG can be implemented in inexpensive re-programmable devices (CPLDs or FPGAs) without the use of Digital Clock Managers (DCMs). Preliminary test results proved the circuit's immunity to the intentional frequency injection attacks.

  16. Earth Observations for Global Water Security

    NASA Technical Reports Server (NTRS)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  17. Civil and forensic patients in secure psychiatric settings: a comparison.

    PubMed

    Galappathie, Nuwan; Khan, Sobia Tamim; Hussain, Amina

    2017-06-01

    Aims and method To evaluate differences between male patients in secure psychiatric settings in the UK based on whether they are detained under civil or forensic sections of the Mental Health Act 1983. A cohort of patients discharged from a secure psychiatric hospital were evaluated for length of stay and frequency of risk-related incidents. Results Overall, 84 patients were included in the study: 52 in the forensic group and 32 in the civil group. Civil patients had more frequent incidents of aggression, sex offending, fire-setting and vulnerability, whereas forensic patients had more frequent episodes of self-harm. Clinical implications Secure hospitals should ensure treatment programmes are tailored to each patient's needs. Civil patients require greater emphasis on treatment of their mental illness, whereas forensic patients have additional offence-related treatment needs. Regular liaison between forensic and general adult services is essential to help ensure patients can return to appropriate settings at the earliest opportunity in their recovery.

  18. Global health diplomacy investments in Afghanistan: adaptations and outcomes of global fund malaria programs.

    PubMed

    Kevany, Sebastian; Sahak, Omar; Workneh, Nibretie Gobezie; Saeedzai, Sayed Ataullah

    2014-01-01

    Global health programmes require extensive adaptation for implementation in conflict and post-conflict settings. Without such adaptations, both implementation success and diplomatic, international relations and other indirect outcomes may be threatened. Conversely, diplomatic successes may be made through flexible and responsive programmes. We examine adaptations and associated outcomes for malaria treatment and prevention programmes in Afghanistan. In conjunction with the completion of monitoring and evaluation activities for the Global Fund to Fight AIDS, Tuberculosis and Malaria, we reviewed adaptations to the structure, design, selection, content and delivery of malaria-related interventions in Afghanistan. Interviews were conducted with programme implementers, service delivery providers, government representatives and local stakeholders, and site visits to service delivery points were completed. Programmes for malaria treatment and prevention require a range of adaptations for successful implementation in Afghanistan. These include (1) amendment of educational materials for rural populations, (2) religious awareness in gender groupings for health educational interventions, (3) recruitment of local staff, educated in languages and customs, for both quality assurance and service delivery, (4) alignment with diplomatic principles and, thereby, avoidance of confusion with broader strategic and military initiatives and (5) amendments to programme 'branding' procedures. The absence of provision for these adaptations made service delivery excessively challenging and increased the risk of tension between narrow programmatic and broader diplomatic goals. Conversely, adapted global health programmes displayed a unique capacity to access potentially extremist populations and groups in remote regions otherwise isolated from international activities. A range of diplomatic considerations when delivering global health programmes in conflict and post-conflict settings are required in order to ensure that health gains are not offset by broader international relations losses through challenges to local cultural, religious and social norms, as well as in order to ensure the security of programme staff. Conversely, when global health programmes are delivered with international relations considerations in mind, they have the potential to generate unquantified diplomatic outcomes.

  19. Assessing the relevance of neighbourhood characteristics to the household food security of low-income Toronto families.

    PubMed

    Kirkpatrick, Sharon I; Tarasuk, Valerie

    2010-07-01

    Although the sociodemographic characteristics of food-insecure households have been well documented, there has been little examination of neighbourhood characteristics in relation to this problem. In the present study we examined the association between household food security and neighbourhood features including geographic food access and perceived neighbourhood social capital. Cross-sectional survey and mapping of discount supermarkets and community food programmes. Twelve high-poverty neighbourhoods in Toronto, Ontario, Canada. Respondents from 484 low-income families who had children and who lived in rental accommodations. Food insecurity was pervasive, affecting two-thirds of families with about a quarter categorized as severely food insecure, indicative of food deprivation. Food insecurity was associated with household factors including income and income source. However, food security did not appear to be mitigated by proximity to food retail or community food programmes, and high rates of food insecurity were observed in neighbourhoods with good geographic food access. While low perceived neighbourhood social capital was associated with higher odds of food insecurity, this effect did not persist once we accounted for household sociodemographic factors. Our findings raise questions about the extent to which neighbourhood-level interventions to improve factors such as food access or social cohesion can mitigate problems of food insecurity that are rooted in resource constraints. In contrast, the results reinforce the importance of household-level characteristics and highlight the need for interventions to address the financial constraints that underlie problems of food insecurity.

  20. An update on EUMETSAT programmes and plans

    NASA Astrophysics Data System (ADS)

    Klaes, K. Dieter; Holmlund, Kenneth

    2016-09-01

    EUMETSAT is providing space based observations for operational meteorology and climate monitoring. The observations are measured by geostationary and sun-synchronous polar orbiting satellites in the frame of mandatory programmes. In the frame of optional programmes further observations for altimetry and oceanography are collected and disseminated. In the frame of third party programmes, EUMETSAT makes available data from other agencies' satellites to the user community. Since summer 2015 MSG-4 complements the current operational fleet of operational geostationary spacecraft, Meteosat-7, which is the last satellite of the first generation and the three satellites of the Second Generation of Meteosat, Meteosat-8, Meteosat-9 and Meteosat-10. MSG-4 became Meteosat-11 and was stored in orbit after successful commissioning. Two satellites of the EUMETSAT Polar System (EPS) provide data from sunsynchronous polar orbit. Metop-B, the second of a series of three satellites, launched in September 2012 and Metop-A, the first of the series, in orbit since October 2006 provide operational services. The satellites belong to the Initial Joint Polar System (IJPS) with the US. EUMETSAT's first optional programme continues to provide data from the Jason-2 satellite since summer 2008. As follow on the Jason-3 satellite was launched in January 2016 and is currently in commissioning. To assure continuity development of Meteosat Third Generation (MTG) is ongoing. The EPS-SG programme was fully approved in summer 2015. In the frame of the Copernicus Programme (formerly GMES (Global Monitoring for Environment and Security)) EUMETSAT will operate the marine part of the Sentinel-3 satellite. It was launched in February 2016 and is currently under commissioning.

  1. Food security and sustainability: can one exist without the other?

    PubMed

    Berry, Elliot M; Dernini, Sandro; Burlingame, Barbara; Meybeck, Alexandre; Conforti, Piero

    2015-09-01

    To position the concept of sustainability within the context of food security. An overview of the interrelationships between food security and sustainability based on a non-systematic literature review and informed discussions based principally on a quasi-historical approach from meetings and reports. International and global food security and nutrition. The Rome Declaration on World Food Security in 1996 defined its three basic dimensions as: availability, accessibility and utilization, with a focus on nutritional well-being. It also stressed the importance of sustainable management of natural resources and the elimination of unsustainable patterns of food consumption and production. In 2009, at the World Summit on Food Security, the concept of stability/vulnerability was added as the short-term time indicator of the ability of food systems to withstand shocks, whether natural or man-made, as part of the Five Rome Principles for Sustainable Global Food Security. More recently, intergovernmental processes have emphasized the importance of sustainability to preserve the environment, natural resources and agro-ecosystems (and thus the overlying social system), as well as the importance of food security as part of sustainability and vice versa. Sustainability should be considered as part of the long-term time dimension in the assessment of food security. From such a perspective the concept of sustainable diets can play a key role as a goal and a way of maintaining nutritional well-being and health, while ensuring the sustainability for future food security. Without integrating sustainability as an explicit (fifth?) dimension of food security, today's policies and programmes could become the very cause of increased food insecurity in the future.

  2. "The group" in integrated HIV and livelihoods programming: opportunity or challenge?

    PubMed

    Roopnaraine, Terry; Rawat, Rahul; Babirye, Frances; Ochai, Robert; Kadiyala, Suneetha

    2012-01-01

    HIV care and treatment providers across sub-Saharan Africa are integrating livelihood interventions to improve food security of their clientele. Many integrated HIV and livelihood programmes (IHLPs) require the formation and use of groups of HIV-infected/affected individuals as the operational target for programme interventions, indeed, virtually without exception the group is the focal point for material and intellectual inputs of IHLPs. We sought to critically examine the group approach to programming among IHLPs in Uganda, and to explore and problematise the assumptions underpinning this model. A case study approach to studying 16 IHLPs was adopted. Each IHLP was treated as a case comprising multiple in-depth interviews conducted with staff along the livelihood programme chain. Additionally, in-depth interviews were conducted with staff from The AIDS Support Organization (TASO), and with members of 71 HIV-infected TASO-registered client households. Our analysis reveals three important considerations in IHLP programming regarding the group-centred approach: (1) Group membership is widely held to confer benefits in the form of psycho-social and motivational support, particularly in empowering individuals to access HIV services and handle stigma. This is contrasted with the problem of stigma inherent in joining groups defined by HIV-status; (2) Membership in groups can bring economic benefits through the pooling of labour and resources. These benefits however need to be set against the costs of membership, when members are required to make contributions in the form of money, goods or labour; (3) Sharing of goods and labour in the context of group membership allow members to access benefits which would otherwise be inaccessible. In exchange, individual choice and control are diminished and problems of resources held in common can arise. While the group model can bring benefits to IHLP efficiency and by extension to food security, and other outcomes, its application needs to be carefully scrutinised at the individual programme level, in terms of whether it is an appropriate approach, and in terms of mitigating potentially adverse effects.

  3. Effectiveness of a regional self-study perinatal education programme: a successful adaptation in Yucatan, Mexico.

    PubMed

    Osorno, Lorenzo R; Campos, Miriam C; Cook, Lynn J; Vela, Gabriela R; Dávila, Jorge R

    2006-08-01

    To evaluate the effectiveness of the Perinatal Continuing Education Programme (PCEP) in a Latin American country. We carried out a study within secondary and tertiary care, and rural Mexican Institute of Social Security (IMSS) hospitals on the Yucatan Peninsula. Participants were doctors, nurses and nursing assistants working with pregnant women and newborns at each hospital. The PCEP was translated into Spanish and then implemented between January 1998 and December 2001. Two nurses at each hospital were trained to co-ordinate the programme and the personnel were invited to participate. Participation involved purchasing the self-teaching books, study outside work hours and participation in skills demonstration and practice sessions. Evaluation included the percentage of personnel who participated in and those who completed the programme, an opinion survey of the programme, level of pre- and post-intervention knowledge, and the quality of neonatal care according to expert-recommended routines. Results were analysed with chi-square and Student's t-tests. A total of 65.3% of the 1421 people in the study population began the programme and 72% of those completed it. Improvement was observed in 14 of 23 (P<0.05) evaluated neonatal care practices. Participants rated the written material as very clear and useful in daily practice. The PCEP is an effective strategy for improving the level of knowledge and perinatal care in all regional hospitals on the Yucatan Peninsula, Mexico. This initial application of the PCEP in a Spanish-speaking country was successful.

  4. Evaluating the implementation of a quality improvement process in General Practice using a realist evaluation framework.

    PubMed

    Moule, Pam; Clompus, Susan; Fieldhouse, Jon; Ellis-Jones, Julie; Barker, Jacqueline

    2018-05-25

    Underuse of anticoagulants in atrial fibrillation is known to increase the risk of stroke and is an international problem. The National Institute for Health Care and Excellence guidance CG180 seeks to reduce atrial fibrillation related strokes through prescriptions of Non-vitamin K antagonist Oral Anticoagulants. A quality improvement programme was established by the West of England Academic Health Science Network (West of England AHSN) to implement this guidance into General Practice. A realist evaluation identified whether the quality improvement programme worked, determining how and in what circumstances. Six General Practices in 1 region, became the case study sites. Quality improvement team, doctor, and pharmacist meetings within each of the General Practices were recorded at 3 stages: initial planning, review, and final. Additionally, 15 interviews conducted with the practice leads explored experiences of the quality improvement process. Observation and interview data were analysed and compared against the initial programme theory. The quality improvement resources available were used variably, with the training being valued by all. The initial programme theories were refined. In particular, local workload pressures and individual General Practitioner experiences and pre-conceived ideas were acknowledged. Where key motivators were in place, such as prior experience, the programme achieved optimal outcomes and secured a lasting quality improvement legacy. The employment of a quality improvement programme can deliver practice change and improvement legacy outcomes when particular mechanisms are employed and in contexts where there is a commitment to improve service. © 2018 John Wiley & Sons, Ltd.

  5. Designing Polyamide Inhibitors of TWIST 1 for Prosenescence Therapy

    DTIC Science & Technology

    2014-09-01

    Pyrrole -Imidazole Polyamides; TWIST1; KRAS; non-small cell lung cancer (NSCLC); senescence 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF... Pyrrole -Imidazole Polyamides (PIP) are a class of cell permeable programmable small-molecule heterocyclic amino acid oligomers that can be designed...The original specific aims are below: Specific Aim#1. Design and synthesize a TWIST1-inhibitory specific Pyrrole -Imidazole Polyamides (PIP

  6. "To See through Johnny and to See Johnny Through": The Guidance Movement in Interwar Australia

    ERIC Educational Resources Information Center

    Wright, Katie

    2012-01-01

    In the late 1920s and early 1930s, the guidance movement secured a foothold in the Australian educational landscape. Educators and psychologists looked to new initiatives in Britain and America in the hope that guidance programmes would provide solutions to a range of social, economic and educational problems: vocational guidance to help young…

  7. Sentinel-1 - the radar mission for GMES operational land and sea services

    NASA Astrophysics Data System (ADS)

    Attema, Evert; Bargellini, Pierre; Edwards, Peter; Levrini, Guido; Lokas, Svein; Moeller, Ludwig; Rosich-Tell, Betlem; Secchi, Patrizia; Torres, Ramon; Davidson, Malcolm; Snoeij, Paul

    2007-08-01

    The ESA Sentinels will be the first series of operational satellites to meet the Earth observation needs of the European Union - ESA Global Monitoring for Environment and Security (GMES) programme. Existing and planned space assets will be complemented by new developments from ESA. The first is Sentinel-1, a pair of synthetic aperture radar (SAR) imaging satellites.

  8. Comprehensive Sexuality Education, Culture and Gender: The Effect of the Cultural Setting on a Sexuality Education Programme in Ethiopia

    ERIC Educational Resources Information Center

    Browes, Natalie C.

    2015-01-01

    Comprehensive sexuality education (CSE) is recognised as an effective method of sexual health education, with the school identified as a fitting site of implementation. Its holistic and participatory nature endeavours to develop the knowledge, attitudes and life-skills of students to help them secure their sexual and reproductive health and rights…

  9. Decision Aids Using Heterogeneous Intelligence Analysis

    DTIC Science & Technology

    2010-08-20

    developing a Geocultural service, a software framework and inferencing engine for the Transparent Urban Structures program. The scope of the effort...has evolved as the program has matured and is including multiple data sources, as well as interfaces out to the ONR architectural framework . Tasks...Interface; Application Program Interface; Application Programmer Interface CAF Common Application Framework EDA Event Driven Architecture a 16. SECURITY

  10. Effective Practices to Address Implementation Challenges in IB Diploma Programmes in Michigan Schools

    ERIC Educational Resources Information Center

    Pascoe, Michael B.

    2016-01-01

    The 21st century learner resides in an advanced global society that is led by the waves of the economy, advances in the technological world, concern around our safety and security, as well as demographical changes (Carver & Markatos-Soriano, 2007). The trends suggest education needs to equip students with the attitudes that promote respect for…

  11. DCMS: A data analytics and management system for molecular simulation.

    PubMed

    Kumar, Anand; Grupcev, Vladimir; Berrada, Meryem; Fogarty, Joseph C; Tu, Yi-Cheng; Zhu, Xingquan; Pandit, Sagar A; Xia, Yuni

    Molecular Simulation (MS) is a powerful tool for studying physical/chemical features of large systems and has seen applications in many scientific and engineering domains. During the simulation process, the experiments generate a very large number of atoms and intend to observe their spatial and temporal relationships for scientific analysis. The sheer data volumes and their intensive interactions impose significant challenges for data accessing, managing, and analysis. To date, existing MS software systems fall short on storage and handling of MS data, mainly because of the missing of a platform to support applications that involve intensive data access and analytical process. In this paper, we present the database-centric molecular simulation (DCMS) system our team developed in the past few years. The main idea behind DCMS is to store MS data in a relational database management system (DBMS) to take advantage of the declarative query interface ( i.e. , SQL), data access methods, query processing, and optimization mechanisms of modern DBMSs. A unique challenge is to handle the analytical queries that are often compute-intensive. For that, we developed novel indexing and query processing strategies (including algorithms running on modern co-processors) as integrated components of the DBMS. As a result, researchers can upload and analyze their data using efficient functions implemented inside the DBMS. Index structures are generated to store analysis results that may be interesting to other users, so that the results are readily available without duplicating the analysis. We have developed a prototype of DCMS based on the PostgreSQL system and experiments using real MS data and workload show that DCMS significantly outperforms existing MS software systems. We also used it as a platform to test other data management issues such as security and compression.

  12. Japan's anti-nuclear weapons policy misses its target, even in the war on terrorism.

    PubMed

    DiFilippo, Anthony

    2003-01-01

    While actively working to promote the abolition of all nuclear weapons from the world since the end of the cold war, Japan's disarmament policies are not without problems. Promoting the elimination of nuclear weapons as Japan remains under the US nuclear umbrella creates a major credibility problem for Tokyo, since this decision maintains a Japanese deterrence policy at the same time that officials push for disarmament. Tokyo also advocates a gradual approach to the abolition of nuclear weapons, a decision that has had no effect on those countries that have been conducting sub-critical nuclear testing, nor stopped India and Pakistan from carrying out nuclear tests. Consistent with Article 9 of the Constitution, the Japanese war-renouncing constitutional clause, Tokyo toughened Japan's sizeable Official Development Assistance (ODA) programme in the early 1990s. Because of the anti-military guidelines included in Japan's ODA programme, Tokyo stopped new grant and loan aid to India and Pakistan in 1998 after these countries conducted nuclear tests. However, because of the criticism Japan faced from its failure to participate in the 1991 Gulf War, Tokyo has been seeking a new Japanese role in international security during the post-cold war period. Deepening its commitment to the security alliance with the US, Tokyo has become increasingly influenced by Washington's global polices, including the American war on terrorism. After Washington decided that Pakistan would be a key player in the US war on terrorism, Tokyo restored grant and loan aid to both Islamabad and New Delhi, despite the unequivocal restrictions of Japan's ODA programme.

  13. Communication and control in an integrated manufacturing system

    NASA Technical Reports Server (NTRS)

    Shin, Kang G.; Throne, Robert D.; Muthuswamy, Yogesh K.

    1987-01-01

    Typically, components in a manufacturing system are all centrally controlled. Due to possible communication bottlenecking, unreliability, and inflexibility caused by using a centralized controller, a new concept of system integration called an Integrated Multi-Robot System (IMRS) was developed. The IMRS can be viewed as a distributed real time system. Some of the current research issues being examined to extend the framework of the IMRS to meet its performance goals are presented. These issues include the use of communication coprocessors to enhance performance, the distribution of tasks and the methods of providing fault tolerance in the IMRS. An application example of real time collision detection, as it relates to the IMRS concept, is also presented and discussed.

  14. Performance of GeantV EM Physics Models

    NASA Astrophysics Data System (ADS)

    Amadio, G.; Ananya, A.; Apostolakis, J.; Aurora, A.; Bandieramonte, M.; Bhattacharyya, A.; Bianchini, C.; Brun, R.; Canal, P.; Carminati, F.; Cosmo, G.; Duhem, L.; Elvira, D.; Folger, G.; Gheata, A.; Gheata, M.; Goulas, I.; Iope, R.; Jun, S. Y.; Lima, G.; Mohanty, A.; Nikitina, T.; Novak, M.; Pokorski, W.; Ribon, A.; Seghal, R.; Shadura, O.; Vallecorsa, S.; Wenzel, S.; Zhang, Y.

    2017-10-01

    The recent progress in parallel hardware architectures with deeper vector pipelines or many-cores technologies brings opportunities for HEP experiments to take advantage of SIMD and SIMT computing models. Launched in 2013, the GeantV project studies performance gains in propagating multiple particles in parallel, improving instruction throughput and data locality in HEP event simulation on modern parallel hardware architecture. Due to the complexity of geometry description and physics algorithms of a typical HEP application, performance analysis is indispensable in identifying factors limiting parallel execution. In this report, we will present design considerations and preliminary computing performance of GeantV physics models on coprocessors (Intel Xeon Phi and NVidia GPUs) as well as on mainstream CPUs.

  15. Electromagnetic Physics Models for Parallel Computing Architectures

    NASA Astrophysics Data System (ADS)

    Amadio, G.; Ananya, A.; Apostolakis, J.; Aurora, A.; Bandieramonte, M.; Bhattacharyya, A.; Bianchini, C.; Brun, R.; Canal, P.; Carminati, F.; Duhem, L.; Elvira, D.; Gheata, A.; Gheata, M.; Goulas, I.; Iope, R.; Jun, S. Y.; Lima, G.; Mohanty, A.; Nikitina, T.; Novak, M.; Pokorski, W.; Ribon, A.; Seghal, R.; Shadura, O.; Vallecorsa, S.; Wenzel, S.; Zhang, Y.

    2016-10-01

    The recent emergence of hardware architectures characterized by many-core or accelerated processors has opened new opportunities for concurrent programming models taking advantage of both SIMD and SIMT architectures. GeantV, a next generation detector simulation, has been designed to exploit both the vector capability of mainstream CPUs and multi-threading capabilities of coprocessors including NVidia GPUs and Intel Xeon Phi. The characteristics of these architectures are very different in terms of the vectorization depth and type of parallelization needed to achieve optimal performance. In this paper we describe implementation of electromagnetic physics models developed for parallel computing architectures as a part of the GeantV project. Results of preliminary performance evaluation and physics validation are presented as well.

  16. Indian space transportation programme: Near term outlook and issues for commercialisation

    NASA Astrophysics Data System (ADS)

    Nagendra, Narayan Prasad

    2015-05-01

    The Indian space transportation programme has grown from strength to strength with the launching of sounding rockets in the 60's to the development of heavy lift vehicles for telecommunication satellites in the present decade. With the growing market confidence in Indian Space Research Organisation's ability to reliably deliver payloads to low Earth orbit with its Polar Satellite Launch Vehicle, there is an inherent opportunity for India to cater to the commercial market. The present work assesses the current launch capacity of India in retrospect of international launches and provides India's outlook for the space transportation in the current decade. Launch capacity correlation with the requirements within the Indian space programme as well as the current space transportation infrastructure have been considered to identify bottlenecks in catering to the current national requirements alongside securing a greater market share in the international launch market. The state of commercialisation of launch vehicle development has been presented to provide an overview of policy and organisational issues for commercialisation of space transportation in India.

  17. Advancing Early Childhood Development: from Science to Scale 1

    PubMed Central

    Black, Maureen M; Walker, Susan P; Fernald, Lia C H; Andersen, Christopher T; DiGirolamo, Ann M; Lu, Chunling; McCoy, Dana C; Fink, Günther; Shawar, Yusra R; Shiffman, Prof Jeremy; Devercelli, Amanda E; Wodon, Quentin T; Vargas-Barón, Emily; Grantham-McGregor, Sally

    2018-01-01

    Early childhood development programmes vary in coordination and quality, with inadequate and inequitable access, especially for children younger than 3 years. New estimates, based on proxy measures of stunting and poverty, indicate that 250 million children (43%) younger than 5 years in low-income and middle-income countries are at risk of not reaching their developmental potential. There is therefore an urgent need to increase multisectoral coverage of quality programming that incorporates health, nutrition, security and safety, responsive caregiving, and early learning. Equitable early childhood policies and programmes are crucial for meeting Sustainable Development Goals, and for children to develop the intellectual skills, creativity, and wellbeing required to become healthy and productive adults. In this paper, the first in a three part Series on early childhood development, we examine recent scientific progress and global commitments to early childhood development. Research, programmes, and policies have advanced substantially since 2000, with new neuroscientific evidence linking early adversity and nurturing care with brain development and function throughout the life course. PMID:27717614

  18. Issues in post-literacy

    NASA Astrophysics Data System (ADS)

    Dave, Ravindra H.; Ouane, Adama; Sutton, Peter

    1989-12-01

    While school enrolments have been rising, the absolute number of illiterates in the world has grown too. Eradication of adult illiteracy and universalization of primary education are hindered by high drop-out in schools and relapse into illiteracy among adults. Post-literacy programmes seek to stop this reversal by ensuring retention, application and continuation of literacy skills. The Unesco Institute for Education (UIE) has been researching and promoting post-literacy strategies since 1980, but finds that most projects do not include provision for post-literacy from the outset, despite the evident need. Those programmes which have been mounted use a variety of strategies, which UIE has analysed in 12 categories. The exact delimitation of the post-literacy stage in the lifelong education continuum differs from project to project, and the emphasis on individual or societal advance depends on local perceptions of the goals of development. Examples are given of successful programmes, and the challenges of increasing participation and motivation, securing adequate funding, and making efficient and flexible use of institutional facilities are discussed.

  19. Global health diplomacy, 'smart power', and the new world order.

    PubMed

    Kevany, Sebastian

    2014-01-01

    Both the theory and practice of foreign policy and diplomacy, including systems of hard and soft power, are undergoing paradigm shifts, with an increasing number of innovative actors and strategies contributing to international relations outcomes in the 'New World Order'. Concurrently, global health programmes continue to ascend the political spectrum in scale, scope and influence. This concatenation of circumstances has demanded a re-examination of the existing and potential effectiveness of global health programmes in the 'smart power' context, based on adherence to a range of design, implementation and assessment criteria, which may simultaneously optimise their humanitarian, foreign policy and diplomatic effectiveness. A synthesis of contemporary characteristics of 'global health diplomacy' and 'global health as foreign policy', grouped by common themes and generated in the context of related field experiences, are presented in the form of 'Top Ten' criteria lists for optimising both diplomatic and foreign policy effectiveness of global health programmes, and criteria are presented in concert with an examination of implications for programme design and delivery. Key criteria for global health programmes that are sensitised to both diplomatic and foreign policy goals include visibility, sustainability, geostrategic considerations, accountability, effectiveness and alignment with broader policy objectives. Though diplomacy is a component of foreign policy, criteria for 'diplomatically-sensitised' versus 'foreign policy-sensitised' global health programmes were not always consistent, and were occasionally in conflict, with each other. The desirability of making diplomatic and foreign policy criteria explicit, rather than implicit, in the context of global health programme design, delivery and evaluation are reflected in the identified implications for (1) international security, (2) programme evaluation, (3) funding and resource allocation decisions, (4) approval systems and (5) training. On this basis, global health programmes are shown to provide a valuable, yet underutilised, tool for diplomacy and foreign policy purposes, including their role in the pursuit of benign international influence. A corresponding alignment of resources between 'hard' and 'smart' power options is encouraged.

  20. The QUANTGRID Project (RO)—Quantum Security in GRID Computing Applications

    NASA Astrophysics Data System (ADS)

    Dima, M.; Dulea, M.; Petre, M.; Petre, C.; Mitrica, B.; Stoica, M.; Udrea, M.; Sterian, R.; Sterian, P.

    2010-01-01

    The QUANTGRID Project, financed through the National Center for Programme Management (CNMP-Romania), is the first attempt at using Quantum Crypted Communications (QCC) in large scale operations, such as GRID Computing, and conceivably in the years ahead in the banking sector and other security tight communications. In relation with the GRID activities of the Center for Computing & Communications (Nat.'l Inst. Nucl. Phys.—IFIN-HH), the Quantum Optics Lab. (Nat.'l Inst. Plasma and Lasers—INFLPR) and the Physics Dept. (University Polytechnica—UPB) the project will build a demonstrator infrastructure for this technology. The status of the project in its incipient phase is reported, featuring tests for communications in classical security mode: socket level communications under AES (Advanced Encryption Std.), both proprietary code in C++ technology. An outline of the planned undertaking of the project is communicated, highlighting its impact in quantum physics, coherent optics and information technology.

  1. Real time test bed development for power system operation, control and cyber security

    NASA Astrophysics Data System (ADS)

    Reddi, Ram Mohan

    The operation and control of the power system in an efficient way is important in order to keep the system secure, reliable and economical. With advancements in smart grid, several new algorithms have been developed for improved operation and control. These algorithms need to be extensively tested and validated in real time before applying to the real electric power grid. This work focuses on the development of a real time test bed for testing and validating power system control algorithms, hardware devices and cyber security vulnerability. The test bed developed utilizes several hardware components including relays, phasor measurement units, phasor data concentrator, programmable logic controllers and several software tools. Current work also integrates historian for power system monitoring and data archiving. Finally, two different power system test cases are simulated to demonstrate the applications of developed test bed. The developed test bed can also be used for power system education.

  2. A programmable palm-size gas analyzer for use in micro-autonomous systems

    NASA Astrophysics Data System (ADS)

    Gordenker, Robert J. M.; Wise, Kensall D.

    2012-06-01

    Gas analysis systems having small size, low power, and high selectivity are badly needed for defense (detection of explosives and chemical warfare agents), homeland security, health care, and environmental applications. This paper presents a palm-size gas chromatography system having analysis times of 5-50sec, detection limits less than 1ppb, and an average power dissipation less than one watt. It uses no consumables. The three-chip fluidic system consists of a preconcentrator, a 25cm-3m separation column, and a chemi-resistive detector and is supported by a microcomputer and circuitry for programmable temperature control. The entire system, including the mini-pump and battery, occupies less than 200cc and is configured for use on autonomous robotic vehicles.

  3. [Incentivising personal responsibility: conceptual clarification and evidence].

    PubMed

    Schmidt, Harald

    2012-01-01

    Two meanings of personal responsibility are distinguished, and different policy options for promoting health and responsibility are presented. Key insights from research seeking to promote personal responsibility through health information and incentives are outlined and discussed with regard to their potential to improve health and reduce cost. Data is presented on the socioeconomic characteristics of incentive programme users. It is concluded that due to different factors the availability of data regarding the effectiveness of incentive programmes is unsatisfactory. Evaluation requirements set out in the German Social Security Code (SGB V) should focus not only on cost, but should also extend to changes in health status and the socioeconomic status of users: provisions should be revised accordingly. Copyright © 2012. Published by Elsevier GmbH.

  4. Electronic health information system at an opioid treatment programme: roadblocks to implementation

    PubMed Central

    Louie, Ben; Kritz, Steven; Brown, Lawrence S.; Chu, Melissa; Madray, Charles; Zavala, Roberto

    2012-01-01

    Rationale Electronic health systems are commonly included in health care reform discussions. However, their embrace by the health care community has been slow. Methods At Addiction Research and Treatment Corporation, a methadone maintenance programme that also provides primary medical care, HIV medical care and case management, substance abuse counselling and vocational services, we describe our experience in implementing an electronic health information system that encompasses all of these areas. Results We describe the challenges and opportunities of this process in terms of change management, hierarchy of corporate objectives, process mastering, training issues, information technology governance, electronic security, and communication and collaboration. Conclusion This description may provide practical insights to other institutions seeking to pursue this technology. PMID:21414111

  5. Electronic health information system at an opioid treatment programme: roadblocks to implementation.

    PubMed

    Louie, Ben; Kritz, Steven; Brown, Lawrence S; Chu, Melissa; Madray, Charles; Zavala, Roberto

    2012-08-01

    Electronic health systems are commonly included in health care reform discussions. However, their embrace by the health care community has been slow. At Addiction Research and Treatment Corporation, a methadone maintenance programme that also provides primary medical care, HIV medical care and case management, substance abuse counselling and vocational services, we describe our experience in implementing an electronic health information system that encompasses all of these areas. We describe the challenges and opportunities of this process in terms of change management, hierarchy of corporate objectives, process mastering, training issues, information technology governance, electronic security, and communication and collaboration. This description may provide practical insights to other institutions seeking to pursue this technology. © 2011 Blackwell Publishing Ltd.

  6. Urology training in the developing world: The trainees’ perspective in Kurdistan, Iraq

    PubMed Central

    Friad, Goran; Sabah, Kawa; Ameen, Ismaeel Hama

    2013-01-01

    Objective To analyse the advanced systems of urology residency in the developed world, to compare them to a system in the developing world, and thereby identify the shortcomings and make recommendations to improve residency programmes for urology in the Kurdistan Region of Iraq. Methods A survey was conducted amongst the urology Residents (55) in the three governorates of the Kurdistan Region of Iraq, to assess the accessibility of the training programme, the types of the residency programmes, skills acquisition, the use of modern technology for teaching and assessment, the environment of the settings of practice, and the status of research in their training. Results An overwhelming majority (88%) of trainees reported difficulty in securing a training position. A high proportion (43%) felt disappointed at the beginning of their training. There is no unified curriculum of training, and more than two-thirds of the respondents reported a lack of a proper evidence-based medical education. There is no formal subspecialty training programme. Of the respondents, 65% referred to the difficulties in the environment for training, and that there was a low level of research involvement (12%). Conclusions Urology training is not easily accessible, there is no unified programme of residency, there are limited facilities, and a minimal assessment of practical skills. The environment for practice needs enormous improvements and a strong foundation for research should be created. PMID:26019913

  7. Urology training in the developing world: The trainees' perspective in Kurdistan, Iraq.

    PubMed

    Friad, Goran; Sabah, Kawa; Ameen, Ismaeel Hama

    2014-03-01

    To analyse the advanced systems of urology residency in the developed world, to compare them to a system in the developing world, and thereby identify the shortcomings and make recommendations to improve residency programmes for urology in the Kurdistan Region of Iraq. A survey was conducted amongst the urology Residents (55) in the three governorates of the Kurdistan Region of Iraq, to assess the accessibility of the training programme, the types of the residency programmes, skills acquisition, the use of modern technology for teaching and assessment, the environment of the settings of practice, and the status of research in their training. An overwhelming majority (88%) of trainees reported difficulty in securing a training position. A high proportion (43%) felt disappointed at the beginning of their training. There is no unified curriculum of training, and more than two-thirds of the respondents reported a lack of a proper evidence-based medical education. There is no formal subspecialty training programme. Of the respondents, 65% referred to the difficulties in the environment for training, and that there was a low level of research involvement (12%). Urology training is not easily accessible, there is no unified programme of residency, there are limited facilities, and a minimal assessment of practical skills. The environment for practice needs enormous improvements and a strong foundation for research should be created.

  8. Design and implementation of a high performance network security processor

    NASA Astrophysics Data System (ADS)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  9. A form of relapse prevention for men in a high security hospital.

    PubMed

    Newton, Liam; Coles, Dawn; Quayle, Marie

    2005-01-01

    Marlatt and Gordon's relapse prevention model has evolved, and been applied to many repetitive problem behaviours, including drug use, gambling and sexual offending. High security hospital patients often present with a number of such behaviours. To evaluate a relapse prevention group in one high security hospital. Nine patients were selected on clinical need for the group. In a naturalistic study design, each completed several self-report questionnaires pre- and post-group. Analysis of group results demonstrated a significant increase in guilt and acceptance of responsibility for offences (GBAI ratings), and reduced endorsement of pro-offending thinking styles (PICTS). Movement towards increased empathy, and decreased impulsivity and venturesomeness, did not reach significance. All participants showed some changes in desired directions but effects were small. Both relapse prevention and its evaluation are limited in high security hospitals by the restricted opportunities for testing out new skills. The feasibility of delivering an RP programme and evaluating it in high security has nevertheless been established. The small effects found may be promising, and suggest both justification and need for a randomized controlled trial of this approach in that setting. Copyright (c) 2005 John Wiley & Sons, Ltd.

  10. Situational analysis of infant and young child nutrition policies and programmatic activities in Mali.

    PubMed

    Wuehler, Sara E; Coulibaly, Mouctar

    2011-04-01

    Progress towards reducing mortality and malnutrition among children <5 years of age has been less than needed to achieve related Millennium Development Goals. Therefore, several international agencies joined to 'Reposition children's right to adequate nutrition in the Sahel', starting with a situational analysis of current activities related to infant and young child nutrition (IYCN). The main objectives of the situational analysis are to compile, analyse and interpret available information on infant and young child feeding, and the nutrition situation of children <2 years of age in Mali, as one of the six targeted countries. Between June and September 2008, key informants responsible for conducting IYCN-related activities in Mali were interviewed, and 117 documents were examined on the following themes: optimal breastfeeding and complementary feeding practices, prevention of micronutrient deficiencies, screening and management of acute malnutrition, prevention of mother-to-child transmission of HIV, food security, and hygienic practices. Most of the key IYCN topics were addressed in national policies, training materials, and programme documents. Information on the national coverage and impact of these programmes is generally not available. Exclusive breastfeeding (<6 months) has increased in Mali, but no studies identified the contributors to this increase. Despite improvements in breastfeeding practices, optimal infant, and young child feeding is still practiced among too few young children in Mali. Several research articles were identified, but few of these were linked to programme development. Some programme monitoring and evaluation reports were available, but few of these were rigorous enough to identify whether IYCN-specific programme components were implemented as designed or were achieving desired outcomes. Therefore, we could not confirm which programmes contributed to reported improvements. Monitoring of programmes managing malnutrition identified gaps in human and institutional capacities to fully carry out intended interventions and the government has recognized the overall lack of adequate numbers of health care providers to carry out necessary programmes in Mali, of which nutrition programmes are a part. The policy and programme framework is well established for support of optimal IYCN practices, but greater resources and capacity building are needed to: (i) conduct necessary research to adapt training materials and programme protocols to programmatic needs; (ii) implement rigorous monitoring and evaluation that identify effective programme components; and (iii) apply these findings in developing, expanding, and improving effective programmes. © 2011 Blackwell Publishing Ltd.

  11. The WHO AFRO external quality assessment programme (EQAP): Linking laboratory networks through EQA programmes.

    PubMed

    Boeras, Debrah I; Peeling, Rosanna W; Onyebujoh, Philip; Yahaya, Ali A; Gumede-Moeletsi, Hieronyma N; Ndihokubwayo, Jean B

    2016-01-01

    External Quality Assessment (EQA) surveys performed by the World Health Organization Regional Office for Africa (WHO AFRO) revealed the need for the strengthening of public health microbiology laboratories, particularly for testing of epidemic-prone diseases in the African Region. These surveys revealed common issues such as supply chain management, skilled personnel, logistical support and overall lack of quality standards. For sustainable improvements to health systems as well as global health security, deficiencies identified need to be actively corrected through robust quality assurance programmes and implementation of laboratory quality management systems. Given all the pathogens of public health importance, an external quality assessment programme with a focus on vaccine-preventable diseases and emerging and re-emerging dangerous pathogens is important, and should not be stand-alone, but integrated within laboratory networks as seen in polio, measles, yellow fever and rubella. In 2015, WHO AFRO collaborated with the US Centers for Disease Control and Prevention, the London School of Hygiene & Tropical Medicine and partners in a series of consultations with countries and national and regional EQA providers for the development of quality assurance models to support HIV point-of-care testing and monitoring. These consultations revealed similar challenges as seen in the WHO AFRO surveys. WHO AFRO brought forth its experience in implementing quality standards for health programmes, and also opened discussions on how lessons learned through such established programmes can be utilised to supporting and strengthening the introduction of early infant diagnosis of HIV and viral load point-of-care testing. An optimised external quality assessment programme will impact the ability of countries to meet core capacities, providing improved quality management systems, improving the confidence of diagnostic network services in Africa, and including capacities to detect events of international public health importance.

  12. The WHO AFRO external quality assessment programme (EQAP): Linking laboratory networks through EQA programmes

    PubMed Central

    Yahaya, Ali A.; Gumede-Moeletsi, Hieronyma N.

    2016-01-01

    External Quality Assessment (EQA) surveys performed by the World Health Organization Regional Office for Africa (WHO AFRO) revealed the need for the strengthening of public health microbiology laboratories, particularly for testing of epidemic-prone diseases in the African Region. These surveys revealed common issues such as supply chain management, skilled personnel, logistical support and overall lack of quality standards. For sustainable improvements to health systems as well as global health security, deficiencies identified need to be actively corrected through robust quality assurance programmes and implementation of laboratory quality management systems. Given all the pathogens of public health importance, an external quality assessment programme with a focus on vaccine-preventable diseases and emerging and re-emerging dangerous pathogens is important, and should not be stand-alone, but integrated within laboratory networks as seen in polio, measles, yellow fever and rubella. In 2015, WHO AFRO collaborated with the US Centers for Disease Control and Prevention, the London School of Hygiene & Tropical Medicine and partners in a series of consultations with countries and national and regional EQA providers for the development of quality assurance models to support HIV point-of-care testing and monitoring. These consultations revealed similar challenges as seen in the WHO AFRO surveys. WHO AFRO brought forth its experience in implementing quality standards for health programmes, and also opened discussions on how lessons learned through such established programmes can be utilised to supporting and strengthening the introduction of early infant diagnosis of HIV and viral load point-of-care testing. An optimised external quality assessment programme will impact the ability of countries to meet core capacities, providing improved quality management systems, improving the confidence of diagnostic network services in Africa, and including capacities to detect events of international public health importance. PMID:28879135

  13. Effect of ICT Skills on the Job Satisfaction of Teacher Educators: Evidence from the Universities of the Sindh Province of Pakistan

    ERIC Educational Resources Information Center

    Sahito, Zafarullah; Vaisanen, Pertti

    2017-01-01

    This research paper is a reflection of the results of collected data from Teacher Educators (TEs) regarding their skills and expertise in Information and Communication Technologies (ICT). Seven themes were inductively identified and called, 7Es like as: (a). Expertise in use of windows programmes; (b). Expertise in use of security measures; (c).…

  14. Firmware Modification Analysis in Programmable Logic Controllers

    DTIC Science & Technology

    2014-03-27

    security and operational requirements [18, 19]. Money is a factor for the DOD but not a driving one. With private industry, money is a primary influential... functions in the original firmware. A proof-of-concept experiment demonstrates the functionality of the analysis tool using different firmware versions...Opcode Difference Comparison . . . . . . . . . . . . . . 37 3.1.2.3 Function Difference Comparison . . . . . . . . . . . . . 37 3.1.2.4 Call Graph

  15. Development of seismic tomography software for hybrid supercomputers

    NASA Astrophysics Data System (ADS)

    Nikitin, Alexandr; Serdyukov, Alexandr; Duchkov, Anton

    2015-04-01

    Seismic tomography is a technique used for computing velocity model of geologic structure from first arrival travel times of seismic waves. The technique is used in processing of regional and global seismic data, in seismic exploration for prospecting and exploration of mineral and hydrocarbon deposits, and in seismic engineering for monitoring the condition of engineering structures and the surrounding host medium. As a consequence of development of seismic monitoring systems and increasing volume of seismic data, there is a growing need for new, more effective computational algorithms for use in seismic tomography applications with improved performance, accuracy and resolution. To achieve this goal, it is necessary to use modern high performance computing systems, such as supercomputers with hybrid architecture that use not only CPUs, but also accelerators and co-processors for computation. The goal of this research is the development of parallel seismic tomography algorithms and software package for such systems, to be used in processing of large volumes of seismic data (hundreds of gigabytes and more). These algorithms and software package will be optimized for the most common computing devices used in modern hybrid supercomputers, such as Intel Xeon CPUs, NVIDIA Tesla accelerators and Intel Xeon Phi co-processors. In this work, the following general scheme of seismic tomography is utilized. Using the eikonal equation solver, arrival times of seismic waves are computed based on assumed velocity model of geologic structure being analyzed. In order to solve the linearized inverse problem, tomographic matrix is computed that connects model adjustments with travel time residuals, and the resulting system of linear equations is regularized and solved to adjust the model. The effectiveness of parallel implementations of existing algorithms on target architectures is considered. During the first stage of this work, algorithms were developed for execution on supercomputers using multicore CPUs only, with preliminary performance tests showing good parallel efficiency on large numerical grids. Porting of the algorithms to hybrid supercomputers is currently ongoing.

  16. Intel Xeon Phi accelerated Weather Research and Forecasting (WRF) Goddard microphysics scheme

    NASA Astrophysics Data System (ADS)

    Mielikainen, J.; Huang, B.; Huang, A. H.-L.

    2014-12-01

    The Weather Research and Forecasting (WRF) model is a numerical weather prediction system designed to serve both atmospheric research and operational forecasting needs. The WRF development is a done in collaboration around the globe. Furthermore, the WRF is used by academic atmospheric scientists, weather forecasters at the operational centers and so on. The WRF contains several physics components. The most time consuming one is the microphysics. One microphysics scheme is the Goddard cloud microphysics scheme. It is a sophisticated cloud microphysics scheme in the Weather Research and Forecasting (WRF) model. The Goddard microphysics scheme is very suitable for massively parallel computation as there are no interactions among horizontal grid points. Compared to the earlier microphysics schemes, the Goddard scheme incorporates a large number of improvements. Thus, we have optimized the Goddard scheme code. In this paper, we present our results of optimizing the Goddard microphysics scheme on Intel Many Integrated Core Architecture (MIC) hardware. The Intel Xeon Phi coprocessor is the first product based on Intel MIC architecture, and it consists of up to 61 cores connected by a high performance on-die bidirectional interconnect. The Intel MIC is capable of executing a full operating system and entire programs rather than just kernels as the GPU does. The MIC coprocessor supports all important Intel development tools. Thus, the development environment is one familiar to a vast number of CPU developers. Although, getting a maximum performance out of MICs will require using some novel optimization techniques. Those optimization techniques are discussed in this paper. The results show that the optimizations improved performance of Goddard microphysics scheme on Xeon Phi 7120P by a factor of 4.7×. In addition, the optimizations reduced the Goddard microphysics scheme's share of the total WRF processing time from 20.0 to 7.5%. Furthermore, the same optimizations improved performance on Intel Xeon E5-2670 by a factor of 2.8× compared to the original code.

  17. Separable projection integrals for higher-order correlators of the cosmic microwave sky: Acceleration by factors exceeding 100

    NASA Astrophysics Data System (ADS)

    Briggs, J. P.; Pennycook, S. J.; Fergusson, J. R.; Jäykkä, J.; Shellard, E. P. S.

    2016-04-01

    We present a case study describing efforts to optimise and modernise "Modal", the simulation and analysis pipeline used by the Planck satellite experiment for constraining general non-Gaussian models of the early universe via the bispectrum (or three-point correlator) of the cosmic microwave background radiation. We focus on one particular element of the code: the projection of bispectra from the end of inflation to the spherical shell at decoupling, which defines the CMB we observe today. This code involves a three-dimensional inner product between two functions, one of which requires an integral, on a non-rectangular domain containing a sparse grid. We show that by employing separable methods this calculation can be reduced to a one-dimensional summation plus two integrations, reducing the overall dimensionality from four to three. The introduction of separable functions also solves the issue of the non-rectangular sparse grid. This separable method can become unstable in certain scenarios and so the slower non-separable integral must be calculated instead. We present a discussion of the optimisation of both approaches. We demonstrate significant speed-ups of ≈100×, arising from a combination of algorithmic improvements and architecture-aware optimisations targeted at improving thread and vectorisation behaviour. The resulting MPI/OpenMP hybrid code is capable of executing on clusters containing processors and/or coprocessors, with strong-scaling efficiency of 98.6% on up to 16 nodes. We find that a single coprocessor outperforms two processor sockets by a factor of 1.3× and that running the same code across a combination of both microarchitectures improves performance-per-node by a factor of 3.38×. By making bispectrum calculations competitive with those for the power spectrum (or two-point correlator) we are now able to consider joint analysis for cosmological science exploitation of new data.

  18. Fast multipurpose Monte Carlo simulation for proton therapy using multi- and many-core CPU architectures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Souris, Kevin, E-mail: kevin.souris@uclouvain.be; Lee, John Aldo; Sterpin, Edmond

    2016-04-15

    Purpose: Accuracy in proton therapy treatment planning can be improved using Monte Carlo (MC) simulations. However the long computation time of such methods hinders their use in clinical routine. This work aims to develop a fast multipurpose Monte Carlo simulation tool for proton therapy using massively parallel central processing unit (CPU) architectures. Methods: A new Monte Carlo, called MCsquare (many-core Monte Carlo), has been designed and optimized for the last generation of Intel Xeon processors and Intel Xeon Phi coprocessors. These massively parallel architectures offer the flexibility and the computational power suitable to MC methods. The class-II condensed history algorithmmore » of MCsquare provides a fast and yet accurate method of simulating heavy charged particles such as protons, deuterons, and alphas inside voxelized geometries. Hard ionizations, with energy losses above a user-specified threshold, are simulated individually while soft events are regrouped in a multiple scattering theory. Elastic and inelastic nuclear interactions are sampled from ICRU 63 differential cross sections, thereby allowing for the computation of prompt gamma emission profiles. MCsquare has been benchmarked with the GATE/GEANT4 Monte Carlo application for homogeneous and heterogeneous geometries. Results: Comparisons with GATE/GEANT4 for various geometries show deviations within 2%–1 mm. In spite of the limited memory bandwidth of the coprocessor simulation time is below 25 s for 10{sup 7} primary 200 MeV protons in average soft tissues using all Xeon Phi and CPU resources embedded in a single desktop unit. Conclusions: MCsquare exploits the flexibility of CPU architectures to provide a multipurpose MC simulation tool. Optimized code enables the use of accurate MC calculation within a reasonable computation time, adequate for clinical practice. MCsquare also simulates prompt gamma emission and can thus be used also for in vivo range verification.« less

  19. TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks

    NASA Astrophysics Data System (ADS)

    Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree

    2014-06-01

    The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.

  20. 'Never heard of it'- understanding the public's lack of awareness of a new electronic patient record.

    PubMed

    Bratan, Tanja; Stramer, Katja; Greenhalgh, Trisha

    2010-12-01

    The introduction of electronic patient records that are accessible by multiple providers raises security issues and requires informed consent - or at the very least, an opportunity to opt out. Introduction of the Summary Care Record (SCR) (a centrally stored electronic summary of a patient's medical record) in pilot sites in the UK was associated with low awareness, despite an intensive public information programme that included letters, posters, leaflets, and road shows. To understand why the public information programme had limited impact and to learn lessons for future programmes. Linguistic and communications analysis of components of the programme, contextualized within a wider mixed-method case study of the introduction of the SCR in pilot sites. Theoretical insights from linguistics and communication studies were applied. The context of the SCR pilots and the linked information programme created inherent challenges which were partially but not fully overcome by the efforts of campaigners. Much effort was put into designing the content of a mail merge letter, but less attention was given to its novelty, linguistic style, and rhetorical appeal. Many recipients viewed this letter as junk mail or propaganda and discarded it unread. Other components of the information programme were characterized by low visibility, partly because only restricted areas were participating in the pilot. Relatively little use was made of interpersonal communication channels. Despite ethical and legal imperatives, informed consent for the introduction of shared electronic records may be difficult to achieve through public information campaigns. Success may be more likely if established principles of effective mass and interpersonal communication are applied. © 2010 Blackwell Publishing Ltd.

  1. The benefits of working abroad for British General Practice trainee doctors: the London deanery out of programme experience in South Africa.

    PubMed

    Reardon, Candice; George, Gavin; Enigbokan, Oluwatobi

    2015-10-14

    The value of international health experience for doctors from developed nations is well recognised. Provisions have been made for medical staff in the United Kingdom to embark on work experiences abroad during their careers in the National Health Service. The London Deanery and Africa Health Placements provide an Out of Programme Experience for British General Practice trainee doctors wanting to work for a year in rural hospitals in South Africa. A qualitative study was conducted among fifteen British General Practice trainees who participated in the programme. The research aim was to understand the perceived benefit and value of their experience and their opinions about the structure of the programme. The data was analysed using thematic analysis. Their experience provided an accelerated year of learning and development that contributed to their professional and personal development. In addition to their general development, their improved ability to work in resource limited settings, enhancement of soft skills, a greater appreciation for the National Health Service and a better understanding of working within foreign health care systems were important gains. The timing of the experience, the security of re-employment on their return, assistance with administrative requirements of destination countries and the opportunity to gain varied, hands-on experience were highly valued components of the Out of Programme Experience. The value and benefits derived from the doctors' experience in South Africa are discussed in relation to another evaluation of the Out of Programme Experience, as well as issues of transferability of skills and competencies and future impacts on career decisions. This study provides evidence to suggest programmes such as the OOPE have the potential to create substantial benefits for trainee doctors, both in terms of their medical skills and competencies and through the development of softer skills. This programme, through the supply of scarce skills, further benefits the host country and specifically the health facilities and communities served by these trainee doctors.

  2. The interactive animated epilepsy education programme (IAEEP): how feasible, acceptable and practical is the technology to children?

    PubMed

    Lua, Pei Lin; Neni, Widiasmoro Selamat; Lee, Jimmy Kok Foo; Abd Aziz, Zariah

    2013-01-01

    Being well-informed and knowledgeable about their illnesses would be a great advantage to children with epilepsy (CWE). Subsequently, an effective education programme which could secure interest and simultaneously improve their awareness, knowledge and attitudes (AKA) is essential in enhancing well-being and health outcomes. To describe the development of a new interactive animated epilepsy education programme (IAEEP) for children and to assess its feasibility, acceptability and practicality. The IAEEP was developed by an interdisciplinary group of neurologist, paediatrician, pharmacist, biomedical scientist and educators which was based on two established epilepsy education programmes: the educational programme for patients with epilepsy and their relatives (MOSES) and the modular educational program for children with epilepsy and their parents (FAMOSES). CWE from paediatric department of three general hospitals in Terengganu were initially introduced to the IAEEP and were requested to complete an evaluation form assessing its feasibility, acceptability and practicality. Descriptive statistics were employed for data analyses (SPSS 20.0). Sixteen CWE (median age=13.0; male=56.2%; Malay=81.2%; secondary school=56.2%) and their corresponding parents were recruited. Each CWE owned at least a computer/notebook/tablet (100%). The cost of distribution of IAEEP (in compact disc form) among CWE was estimated at about MYR 17.99/USD 5.90 per CWE. The average time required to interact with the programme was 22.8 minutes (SD=3.3, range 18-28 minutes). The programme was 100% acceptable and received full support from both CWE and their parents (100%). The favourable findings from this study add to the growing evidence suggesting that investment in interactive and animated education programme would be both feasible, well-received by patients and could be a potentially valuable approach to increase access and effectiveness of epilepsy care especially among CWE.

  3. Confidence and authority through new knowledge: An evaluation of the national educational programme in paediatric oncology nursing in Sweden.

    PubMed

    Pergert, Pernilla; Af Sandeberg, Margareta; Andersson, Nina; Márky, Ildikó; Enskär, Karin

    2016-03-01

    There is a lack of nurse specialists in many paediatric hospitals in Sweden. This lack of competence is devastating for childhood cancer care because it is a highly specialised area that demands specialist knowledge. Continuing education of nurses is important to develop nursing practice and also to retain them. The aim of this study was to evaluate a Swedish national educational programme in paediatric oncology nursing. The nurses who participated came from all of the six paediatric oncology centres as well as from general paediatric wards. At the time of the evaluation, three groups of registered nurses (n=66) had completed this 2year, part-time educational programme. A study specific questionnaire, including closed and open-ended questions was sent to the 66 nurses and 54 questionnaires were returned. Answers were analysed using descriptive statistics and qualitative content analysis. The results show that almost all the nurses (93%) stayed in paediatric care after the programme. Furthermore, 31% had a position in management or as a consultant nurse after the programme. The vast majority of the nurses (98%) stated that the programme had made them more secure in their work. The nurses were equipped, through education, for paediatric oncology care which included: knowledge generating new knowledge; confidence and authority; national networks and resources. They felt increased confidence in their roles as paediatric oncology nurses as well as authority in their encounters with families and in discussions with co-workers. New networks and resources were appreciated and used in their daily work in paediatric oncology. The programme was of importance to the career of the individual nurse and also to the quality of care given to families in paediatric oncology. The national educational programme for nurses in Paediatric Oncology Care meets the needs of the highly specialised care. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Mobile Geospatial Information Systems for Land Force Operations: Analysis of Operational Needs and Research Opportunities

    DTIC Science & Technology

    2010-03-01

    Dynamics Itronix Duo-Touch II SmartPhones 1. Apple iPhone 2. Blackberry Smartphone 3. Cassiopeia E-105 4. Hewlett Packard (HP) iPAQ 910 Smartphone...Mobile GIS Page 2-39 Blackberry Smartphone Housekeeping Functions (internal device functionality, status, and security) 1 Maintain awareness of...sensor status and alarms SW (comments) 2 Plan storage SW 3 Development Environment Blackberry OS Can additional programmable

  5. The European Union Joint Procurement Agreement for cross-border health threats: what is the potential for this new mechanism of health system collaboration?

    PubMed

    Azzopardi-Muscat, Natasha; Schroder-Bäck, Peter; Brand, Helmut

    2017-01-01

    The Joint Procurement Agreement (JPA) is an innovative instrument for multi-country procurement of medical countermeasures against cross-border health threats. This paper aims to assess its potential performance. A literature review was conducted to identify key features of successful joint procurement programmes. Documentary analysis and a key informants' interview were carried out to analyse the European Union (EU) JPA. Ownership, equity, transparency, stable central financing, standardisation, flexibility and gradual development were identified as important prerequisites for successful establishment of multi-country joint procurement programmes in the literature while security of supply, favourable prices, reduction of operational costs and administrative burden and creation of professional expert networks were identified as desirable outcomes. The EU JPA appears to fulfil the criteria of ownership, transparency, equity, flexibility and gradual development. Standardisation is only partly fulfilled and central EU level financing is not provided. Security of supply is an important outcome for all EU Member States (MS). Price savings, reduction in administrative burden and creation of professional networks may be particularly attractive for the smaller MS. The JPA has the potential to increase health system collaboration and efficiency at EU level provided that the incentives for sustained commitment of larger MS are sufficiently attractive.

  6. The economics of optimal health and productivity in the commercial dairy.

    PubMed

    Galligan, D T

    1999-08-01

    Dairy production practices are changing; in order to remain viable, producers must optimise the health and productivity of dairy herds in economic terms. Health care is important in economic terms because disease can substantially reduce the productivity of individual animals. Preventive disease control programmes can thus result in economic gains for the dairy producer. The author describes new approaches to preventing postpartum diseases and dealing with fertility problems which can result from these diseases. Other aspects of dairy production are also changing, employing new technologies where these are judged to be profitable. Innovations include: the use of bovine somatotropin; systematic breeding/culling programmes; new mathematical modelling techniques to determine optimum feed composition and to define optimal growth levels for accelerated heifer-rearing programmes; the use of computers to collect, store and analyse data on animal production and health; and semen selection programmes. Increasing awareness of bio-security is also vital, not least because of the large investment present in dairy herds. Whatever practices are employed, they must offer economic returns to producers that compete with alternative uses of capital. Optimal levels of disease control must be determined for a particular production situation, taking into account not only the economic health of the producer, but also the well-being of the animals.

  7. The safe implementation of a prison-based methadone maintenance programme: 7 year time-series analysis of primary care prescribing data

    PubMed Central

    2014-01-01

    Background Internationally there is policy support for the introduction of methadone maintenance programmes into prison settings. Increasingly GPs are encouraged to undertake this work although concerns remain regarding the safety of such programmes. This study sought to evaluate the impact and safety of the introduction of a general practitioner with a special interest (GPsi) in substance misuse led methadone prescribing service into a UK prison between 2003 and 2010. Methods Time series analysis of secondary prescribing data pertaining to opiate maintenance therapies, opiate detoxification therapies and opiate related deaths for the time period 2003 to 2010. Results Results show that following introduction of a GPsi in substance misuse there was a statistically significant increase in both methadone maintenance and detoxification treatments. Over time the rate of methadone maintenance prescribing plateaued with a corresponding decrease in the rate of methadone detoxification prescribing. There were no methadone related deaths in prison over the study period. Conclusion The phased introduction of opiate replacement therapies into a busy remand prison did not result in any deaths within the prison for which opiate replacement was identified as the cause. GPsi led opiate prescribing programmes can be introduced safely into secure environments. PMID:24712316

  8. [Hardware for graphics systems].

    PubMed

    Goetz, C

    1991-02-01

    In all personal computer applications, be it for private or professional use, the decision of which "brand" of computer to buy is of central importance. In the USA Apple computers are mainly used in universities, while in Europe computers of the so-called "industry standard" by IBM (or clones thereof) have been increasingly used for many years. Independently of any brand name considerations, the computer components purchased must meet the current (and projected) needs of the user. Graphic capabilities and standards, processor speed, the use of co-processors, as well as input and output devices such as "mouse", printers and scanners are discussed. This overview is meant to serve as a decision aid. Potential users are given a short but detailed summary of current technical features.

  9. Electromagnetic physics models for parallel computing architectures

    DOE PAGES

    Amadio, G.; Ananya, A.; Apostolakis, J.; ...

    2016-11-21

    The recent emergence of hardware architectures characterized by many-core or accelerated processors has opened new opportunities for concurrent programming models taking advantage of both SIMD and SIMT architectures. GeantV, a next generation detector simulation, has been designed to exploit both the vector capability of mainstream CPUs and multi-threading capabilities of coprocessors including NVidia GPUs and Intel Xeon Phi. The characteristics of these architectures are very different in terms of the vectorization depth and type of parallelization needed to achieve optimal performance. In this paper we describe implementation of electromagnetic physics models developed for parallel computing architectures as a part ofmore » the GeantV project. Finally, the results of preliminary performance evaluation and physics validation are presented as well.« less

  10. Mold heating and cooling microprocessor conversion. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hoffman, D.P.

    Conversion of the microprocessors and software for the Mold Heating and Cooling (MHAC) pump package control systems was initiated to allow required system enhancements and provide data communications capabilities with the Plastics Information and Control System (PICS). The existing microprocessor-based control systems for the pump packages use an Intel 8088-based microprocessor board with a maximum of 64 Kbytes of program memory. The requirements for the system conversion were developed, and hardware has been selected to allow maximum reuse of existing hardware and software while providing the required additional capabilities and capacity. The new hardware will incorporate an Intel 80286-based microprocessormore » board with an 80287 math coprocessor, the system includes additional memory, I/O, and RS232 communication ports.« less

  11. CoreTSAR: Core Task-Size Adapting Runtime

    DOE PAGES

    Scogland, Thomas R. W.; Feng, Wu-chun; Rountree, Barry; ...

    2014-10-27

    Heterogeneity continues to increase at all levels of computing, with the rise of accelerators such as GPUs, FPGAs, and other co-processors into everything from desktops to supercomputers. As a consequence, efficiently managing such disparate resources has become increasingly complex. CoreTSAR seeks to reduce this complexity by adaptively worksharing parallel-loop regions across compute resources without requiring any transformation of the code within the loop. Lastly, our results show performance improvements of up to three-fold over a current state-of-the-art heterogeneous task scheduler as well as linear performance scaling from a single GPU to four GPUs for many codes. In addition, CoreTSAR demonstratesmore » a robust ability to adapt to both a variety of workloads and underlying system configurations.« less

  12. First experience of vectorizing electromagnetic physics models for detector simulation

    NASA Astrophysics Data System (ADS)

    Amadio, G.; Apostolakis, J.; Bandieramonte, M.; Bianchini, C.; Bitzes, G.; Brun, R.; Canal, P.; Carminati, F.; de Fine Licht, J.; Duhem, L.; Elvira, D.; Gheata, A.; Jun, S. Y.; Lima, G.; Novak, M.; Presbyterian, M.; Shadura, O.; Seghal, R.; Wenzel, S.

    2015-12-01

    The recent emergence of hardware architectures characterized by many-core or accelerated processors has opened new opportunities for concurrent programming models taking advantage of both SIMD and SIMT architectures. The GeantV vector prototype for detector simulations has been designed to exploit both the vector capability of mainstream CPUs and multi-threading capabilities of coprocessors including NVidia GPUs and Intel Xeon Phi. The characteristics of these architectures are very different in terms of the vectorization depth, parallelization needed to achieve optimal performance or memory access latency and speed. An additional challenge is to avoid the code duplication often inherent to supporting heterogeneous platforms. In this paper we present the first experience of vectorizing electromagnetic physics models developed for the GeantV project.

  13. RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code

    NASA Astrophysics Data System (ADS)

    Gonggrijp, Rop; Hengeveld, Willem-Jan; Hotting, Eelco; Schmidt, Sebastian; Weidemann, Frederik

    The Rijnland Internet Election System (RIES) is a system designed for voting in public elections over the internet. A rather cursory scan of the source code to RIES showed a significant lack of security-awareness among the programmers which - among other things - appears to have left RIES vulnerable to near-trivial attacks. If it had not been for independent studies finding problems, RIES would have been used in the 2008 Water Board elections, possibly handling a million votes or more. While RIES was more extensively studied to find cryptographic shortcomings, our work shows that more down-to-earth secure design practices can be at least as important, and the aspects need to be examined much sooner than right before an election.

  14. Literature research of the Nutrition Improvement Programme for Rural Compulsory Education Students in China.

    PubMed

    Zhang, Fan; Hu, Xiaoqi; Tian, Zuyin; Zhang, Qian; Ma, Guansheng

    2015-04-01

    To describe the Nutrition Improvement Programme for Rural Compulsory Education Students (NIPRCES) in China and to share the experiences of developing and implementing nationwide school meal programmes with other countries. The article is based on a literature review of technical documents and reports of NIPRCES and relevant national legislation, technical reports and studies on school nutrition, minutes of meetings and national conferences, and official documents of the National Office of Student Nutrition and the Chinese Center for Disease Control and Prevention. People's Republic of China. Published papers, national policies, legislation and unpublished official documents. A total of 23 million rural compulsory education students were covered by NIPRCES. In the development and implementation process of NIPRCES, fifteen ministries and national committees were involved and an efficient collaborative mechanism was established. All NIPRCES-covered schools were required to serve meals on a daily basis. By the end of June 2012, the proportions of students choosing 'school feeding', 'food package' and 'family feeding' modes were respectively 64.0 %, 32.0 % and 4.0 %. The central government subsidized school meals annually by more than $US 2.5 billion and invested $US 4.8 billion on school kitchens to support this programme. The NIPRCES is a significant movement of governmental nutritional intervention in China. Food safety, financial security, decentralization and other potential concerns should be considered and lessons can be learned from other countries. Further relevant research and a nationwide monitoring and evaluation programme are needed.

  15. Situational analysis of infant and young child nutrition policies and programmatic activities in Niger.

    PubMed

    Wuehler, Sara E; Biga Hassoumi, Abdoulazize

    2011-04-01

    Due to limited progress towards reducing mortality and malnutrition among children <5 years of age, an alliance of international agencies joined to 'Reposition children's right to adequate nutrition in the Sahel,' starting with a situational analysis of current activities related to infant and young child nutrition (IYCN). The main objectives of this analysis are to compile, analyse, and interpret available information on infant and child feeding and the nutrition situation of children <2 years of age in Niger, as one of the six targeted countries. Between August and November 2008, key informants responsible for conducting IYCN-related activities in Niger were interviewed, and 90 documents were examined on: optimal breastfeeding and complementary feeding practices, prevention of micronutrient deficiencies, prevention of mother-to-child transmission of HIV, management of acute malnutrition, food security, and hygienic practices. The results reported are limited by the availability of documents for review. Mortality rates are on track to reaching the Millennium Development Goal to reduce mortality among young children by two-thirds by 2015, but there has been no change in undernutrition, and total mortality rates are still high among young children. Nearly all of the key IYCN topics were addressed, specifically or generally, in national policy documents, training materials, and programmes. A national nutrition council meets regularly to coordinate programme activities nationally. Many of the IYCN-related programmes are intended for national coverage, but few reach this coverage. Monitoring and impact evaluations were conducted on some programmes, but few of these reported on whether the specific IYCN components of the programme were implemented as designed or compared outcomes with non-intervention sites. Human resources have been identified as inadequate to fully carry out nutrition programmes in Niger. Due to these limitations, we could not confirm whether the lack of progress in reducing malnutrition was due to ineffective or inadequately implemented programmes, though both of these were likely contributors. The policy framework is well established for the promotion of optimal IYCN practices, but greater resources and capacity building are needed to: (i) increase human capacities to carry out nutrition programmes; (ii) expand and track the implementation of evidence-based programmes nationally; (iii) improve and carry out monitoring and evaluation that identify effective and ineffective programmes; and (iv) apply these findings in developing, expanding, and improving effective programmes. © 2011 Blackwell Publishing Ltd.

  16. All-optical central-frequency-programmable and bandwidth-tailorable radar

    PubMed Central

    Zou, Weiwen; Zhang, Hao; Long, Xin; Zhang, Siteng; Cui, Yuanjun; Chen, Jianping

    2016-01-01

    Radar has been widely used for military, security, and rescue purposes, and modern radar should be reconfigurable at multi-bands and have programmable central frequencies and considerable bandwidth agility. Microwave photonics or photonics-assisted radio-frequency technology is a unique solution to providing such capabilities. Here, we demonstrate an all-optical central-frequency-programmable and bandwidth-tailorable radar architecture that provides a coherent system and utilizes one mode-locked laser for both signal generation and reception. Heterodyning of two individually filtered optical pulses that are pre-chirped via wavelength-to-time mapping generates a wideband linearly chirped radar signal. The working bands can be flexibly tailored with the desired bandwidth at a user-preferred carrier frequency. Radar echoes are first modulated onto the pre-chirped optical pulse, which is also used for signal generation, and then stretched in time or compressed in frequency several fold based on the time-stretch principle. Thus, digitization is facilitated without loss of detection ability. We believe that our results demonstrate an innovative radar architecture with an ultra-high-range resolution. PMID:26795596

  17. The Ocean Surface Topography JASON-CS/SENTINEL-6 Mission

    NASA Astrophysics Data System (ADS)

    Cullen, R.; Francis, R.

    2014-12-01

    The Jason-CS/Sentinel-6 programme will consist of 2 spacecraft and will be the latest in a series of ocean surface topography missions that will span nearly three decades. They follow the altimeters on-board TOPEX/Poseidon through to Jason-3 (expected March 2015). Jason-CS will continue to fulfil objectives of the reference series whilst introducing a major enhancement in capability providing the operational and science oceanographic community with the state of the art in terms of platform, measurement instrumentation design thus securing optimal operational and science data return. The programme is a part of the EC Copernicus initiative, whose objective is to support Europe's goals regarding sustainable development and global governance of the environment by providing timely and quality data, information, services and knowledge. The programme brings together: ESA for development, procurement & early orbit activities; EUMETSAT for mission management, ground segment, flight ops, contributing funding of the 1st satellite and participation in funding for the 2nd satellite; NOAA for US payload instruments, launcher, ground stations & operations; NASA for developing the US payload, launcher procurement and funding US science; EU for funding the operations and participation in funding (with EUMETSAT) for the 2nd satellite; CNES for mission expertise and provision of POD. The consortium plan to procure 2 satellites with the 1st planned for launch readiness in the 1st half of 2020 with the 2nd satellite 5 years later. The first major commitment to funding was given by the ESA member states that approved the programme in June 2014 and in addition the European Union funding is also secure. The design will be based on a platform derived from CryoSat-2 but adjusted to the specific requirements of the higher orbit. The principle payload instrument is a high precision Ku/C band radar altimeter with retrieval of geophysical parameters (surface elevation, wind speed and SWH) from the altimeter data require supporting measurements: a DORIS receiver for POD; The Climate Quality Advanced Microwave Radiometer (AMR-C) provided by JPL for high stability path delay correction. Orbit tracking data are also provided by GPS & LRA. An additional US GPS receiver, GNSS-RO, will be dedicated to radio-occultation measurements.

  18. Prospective study of factors influencing conditional discharge from a forensic hospital: the DUNDRUM-3 programme completion and DUNDRUM-4 recovery structured professional judgement instruments and risk

    PubMed Central

    2013-01-01

    Background We set out to examine whether structured professional judgement instruments DUNDRUM-3 programme completion (D-3) and DUNDRUM-4 recovery (D-4) scales along with measures of risk, mental state and global function could distinguish between those forensic patients detained in a secure forensic hospital (not guilty by reason of insanity or unfit to stand trial) who were subsequently discharged by a mental health review board. We also examined the interaction between these measures and risk, need for therapeutic security and eventual conditional discharge. Methods A naturalistic observational cohort study was carried out for 56 patients newly eligible for conditional discharge. Patients were rated using the D-3, D-4 and other scales including HCR-20, S-RAMM, START, SAPROF, PANSS and GAF and then observed over a period of twenty three months during which they were considered for conditional discharge by an independent Mental Health Review Board. Results The D-3 distinguished which patients were subsequently discharged by the Mental Health Review board (AUC = 0.902, p < 0.001) as did the D-4 (AUC = 0.848, p < 0.001). Item to outcome analysis showed each item of the D-3 and D-4 scales performed significantly better than random. The HCR-20 also distinguished those later discharged (AUC = 0.838, p < 0.001) as did the S-RAMM, START, SAPROF, PANSS and GAF. The D-3 and D-4 scores remained significantly lower (better) for those discharged even when corrected for the HCR-20 total score. Item to outcome analyses and logistic regression analysis showed that the strongest antecedents of discharge were the GAF and the DUNDRUM-3 programme completion scores. Conclusions Structured professional judgement instruments should improve the quality, consistency and transparency of clinical recommendations and decision making at mental health review boards. Further research is required to determine whether the DUNDRUM-3 programme completion and DUNDRUM-4 recovery instruments predict those who are or are not recalled or re-offend after conditional discharge. PMID:23837697

  19. Evaluation of anger management groups in a high-security hospital.

    PubMed

    Wilson, Claire; Gandolfi, Stacy; Dudley, Alison; Thomas, Brian; Tapp, James; Moore, Estelle

    2013-12-01

    Anger management programmes for offenders typically aim to improve the management of emotion associated with aggressive and antisocial behaviour. Such programmes have been quite extensively evaluated in prison and probation settings, but there is less published research in forensic mental health settings. This study aimed to evaluate anger management groups in a high-security hospital. Eighty-six patients were referred for a 20-session anger management intervention. Outcomes were self-reported experiences of anger and changes in institutionally documented incidents of aggression. Incident rates were retrospectively reviewed for all group graduates, where data were available, including a comparison group of graduates who acted as their own controls. Group graduates reported sustained reductions in feelings of anger and positive changes in their use of aggression in reaction to provocation. Some reduction in incidents of physical aggression was noted when group completers were compared with non-completers. Incidents of verbal aggression were observed to increase for graduates. There was also a trend towards improvement when treated men were compared with men on the waiting list. Our findings contribute to the growing evidence for anger management groups for aggressive men, although the low-base rate of incidents, typical of such a containing and therapeutic hospital setting, rendered the analysis of behavioural outcomes difficult. Anger management sessions for male forensic psychiatric patients can be effective in reducing incidents of physical aggression in response to provocation. Evaluation of treatments for anger is particularly difficult in secure and protective settings, where the aim is to keep incidents of actual physical aggression to a minimum. Further research of this kind is needed to test the value of self-reported reduction in angry feelings as an indicator of clinically useful progress. Copyright © 2013 John Wiley & Sons, Ltd.

  20. Food security and development in South Sudan: a call to action.

    PubMed

    Tappis, Hannah; Doocy, Shannon; Paul, Amy; Funna, Sonya

    2013-09-01

    To examine household food insecurity and coping mechanisms in two relatively politically stable states of South Sudan. Cross-sectional assessment including structured interviews and focus group discussions with food aid programme beneficiaries and staff. Structured interview findings were analysed with descriptive statistics using the statistical software package STATA version 11. Rural households in four payams (sub-county administrative districts) benefiting from a multi-year assistance programme funded by the US Agency for International Development. The study was conducted in January 2012, six months after independence. Study subjects included eighty mothers of children aged 6–23 months in structured interviews and eight focus groups, each with six to ten participants, of mothers of children aged 6–23 months. Ninety-three per cent of households surveyed in Warrap and 100% of households in Northern Bahr el Ghazal states were severely food access insecure. Nearly all households (97?5%) surveyed in both states reported there were months in 2011 without enough food to eat. The majority of households (88%) reported sometimes or often going to bed hungry in the month preceding the study. A number of coping mechanisms were used when households did not have enough food, including reduced meal size, skipping meals, selling assets and engaging in some kind business in order to generate money to buy food. Given the highly volatile political, economic and humanitarian situation in South Sudan, the priorities of the international community are understandably focused on securing greater stability in South Sudan and preventing humanitarian needs from escalating significantly. There is a need, however, for simultaneous emphasis on food assistance and longer-term development strategies throughout South Sudan, particularly in areas of agriculture, livelihoods and food security.

  1. High resolution earth observation satellites and services in the next decade a European perspective

    NASA Astrophysics Data System (ADS)

    Schreier, Gunter; Dech, Stefan

    2005-07-01

    Projects to use very high resolution optical satellite sensor data started in the late 90s and are believed to be the major driver for the commercialisation of earth observation. The global political security situation and updated legislative frameworks created new opportunities for high resolution, dual use satellite systems. In addition to new optical sensors, very high resolution synthetic aperture radars will become in the next few years an important component in the imaging satellite fleet. The paper will review the development in this domain so far, and give perspectives on future emerging markets and opportunities. With dual-use satellite initiatives and new political frameworks agreed between the European Commission and the European Space Agency (ESA), the European market becomes very attractive for both service suppliers and customers. The political focus on "Global Monitoring for Environment and Security" (GMES) and the "European Defence and Security Policy" drive and amplify this demand which ranges from low resolution climate monitoring to very high resolution reconnaissance tasks. In order to create an operational and sustainable GMES in Europe by 2007, the European infrastructure need to be adapted and extended. This includes the ESA SENTINEL and OXYGEN programmes, aiming for a fleet of earth observation satellites and an open and operational earth observation ground segment. The harmonisation of national and regional geographic information is driven by the European Commission's INSPIRE programme. The necessary satellite capacity to complement existing systems in the delivery of space based data required for GMES is currently under definition. Embedded in a market with global competition and in the global political framework of a Global Earth Observation System of Systems, European companies, agencies and research institutions are now contributing to this joint undertaking. The paper addresses the chances, risks and options for the future.

  2. ‘Never heard of it’– Understanding the public’s lack of awareness of a new electronic patient record

    PubMed Central

    Bratan, Tanja; Stramer, Katja; Greenhalgh, Trisha

    2010-01-01

    Abstract Background  The introduction of electronic patient records that are accessible by multiple providers raises security issues and requires informed consent – or at the very least, an opportunity to opt out. Introduction of the Summary Care Record (SCR) (a centrally stored electronic summary of a patient’s medical record) in pilot sites in the UK was associated with low awareness, despite an intensive public information programme that included letters, posters, leaflets, and road shows. Aim  To understand why the public information programme had limited impact and to learn lessons for future programmes. Methods  Linguistic and communications analysis of components of the programme, contextualized within a wider mixed‐method case study of the introduction of the SCR in pilot sites. Theoretical insights from linguistics and communication studies were applied. Results  The context of the SCR pilots and the linked information programme created inherent challenges which were partially but not fully overcome by the efforts of campaigners. Much effort was put into designing the content of a mail merge letter, but less attention was given to its novelty, linguistic style, and rhetorical appeal. Many recipients viewed this letter as junk mail or propaganda and discarded it unread. Other components of the information programme were characterized by low visibility, partly because only restricted areas were participating in the pilot. Relatively little use was made of interpersonal communication channels. Conclusion  Despite ethical and legal imperatives, informed consent for the introduction of shared electronic records may be difficult to achieve through public information campaigns. Success may be more likely if established principles of effective mass and interpersonal communication are applied. PMID:20579117

  3. Targeted social protection in a pastoralist economy: case study from Kenya.

    PubMed

    Janzen, S A; Jensen, N D; Mude, A G

    2016-11-01

    Social protection programmes are designed to help vulnerable populations - including pastoralists - maintain a basic level of well-being, manage risk, and cope with negative shocks. Theory suggests that differential targeting according to poverty status can increase the reach and effectiveness of budgeted social protection programmes. Chronically poor households benefit most from social protection designed to help them meet their basic needs and make vital investments necessary to graduate from poverty. Vulnerable non-destitute households benefit from protection against costly temporary shocks, but do not necessarily need regular assistance. Welfare gains occur when a comprehensive social protection programme considers the needs of both types of households. The authors use evidence-based understanding of poverty dynamics in the pastoralist-based economy of northern Kenya's arid and semi-arid lands as a case study to discuss and compare the observed impacts of two different social protection schemes on heterogeneous pastoralist households: a targeted, unconditional, cash-transfer programme designed to support the poorest, and an index-based livestock insurance programme, which acts as a productive 'safety net' to help stem a descent into poverty and increase resilience. Both types of social protection scheme have been shown to decrease poverty, improve food security and protect child health. However, the behavioural response for asset accumulation varies with the type of protection and the household's unique situation. Poor households that receive cash transfers retain and accumulate assets quickly. Insured households, who are typically vulnerable yet not destitute, protect existing herds and invest more in the livestock they already own. The authors argue that differential targeting increases programme efficiency, and discuss Kenya's current approach to implementing differentially targeted social protection.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cohen, J; Dossa, D; Gokhale, M

    Critical data science applications requiring frequent access to storage perform poorly on today's computing architectures. This project addresses efficient computation of data-intensive problems in national security and basic science by exploring, advancing, and applying a new form of computing called storage-intensive supercomputing (SISC). Our goal is to enable applications that simply cannot run on current systems, and, for a broad range of data-intensive problems, to deliver an order of magnitude improvement in price/performance over today's data-intensive architectures. This technical report documents much of the work done under LDRD 07-ERD-063 Storage Intensive Supercomputing during the period 05/07-09/07. The following chapters describe:more » (1) a new file I/O monitoring tool iotrace developed to capture the dynamic I/O profiles of Linux processes; (2) an out-of-core graph benchmark for level-set expansion of scale-free graphs; (3) an entity extraction benchmark consisting of a pipeline of eight components; and (4) an image resampling benchmark drawn from the SWarp program in the LSST data processing pipeline. The performance of the graph and entity extraction benchmarks was measured in three different scenarios: data sets residing on the NFS file server and accessed over the network; data sets stored on local disk; and data sets stored on the Fusion I/O parallel NAND Flash array. The image resampling benchmark compared performance of software-only to GPU-accelerated. In addition to the work reported here, an additional text processing application was developed that used an FPGA to accelerate n-gram profiling for language classification. The n-gram application will be presented at SC07 at the High Performance Reconfigurable Computing Technologies and Applications Workshop. The graph and entity extraction benchmarks were run on a Supermicro server housing the NAND Flash 40GB parallel disk array, the Fusion-io. The Fusion system specs are as follows: SuperMicro X7DBE Xeon Dual Socket Blackford Server Motherboard; 2 Intel Xeon Dual-Core 2.66 GHz processors; 1 GB DDR2 PC2-5300 RAM (2 x 512); 80GB Hard Drive (Seagate SATA II Barracuda). The Fusion board is presently capable of 4X in a PCIe slot. The image resampling benchmark was run on a dual Xeon workstation with NVIDIA graphics card (see Chapter 5 for full specification). An XtremeData Opteron+FPGA was used for the language classification application. We observed that these benchmarks are not uniformly I/O intensive. The only benchmark that showed greater that 50% of the time in I/O was the graph algorithm when it accessed data files over NFS. When local disk was used, the graph benchmark spent at most 40% of its time in I/O. The other benchmarks were CPU dominated. The image resampling benchmark and language classification showed order of magnitude speedup over software by using co-processor technology to offload the CPU-intensive kernels. Our experiments to date suggest that emerging hardware technologies offer significant benefit to boosting the performance of data-intensive algorithms. Using GPU and FPGA co-processors, we were able to improve performance by more than an order of magnitude on the benchmark algorithms, eliminating the processor bottleneck of CPU-bound tasks. Experiments with a prototype solid state nonvolative memory available today show 10X better throughput on random reads than disk, with a 2X speedup on a graph processing benchmark when compared to the use of local SATA disk.« less

  5. The promise of acceptance as an NGO security management approach.

    PubMed

    Fast, Larissa; Freeman, Faith; O'Neill, Michael; Rowley, Elizabeth

    2015-04-01

    This paper explores three questions related to acceptance as a security management approach. Acceptance draws upon relationships with community members, authorities, belligerents and other stakeholders to provide consent for the presence and activities of a non-governmental organisation (NGO), thereby reducing threats from these actors. Little is documented about how NGOs gain and maintain acceptance, how they assess and monitor the presence and degree of acceptance, or how they determine whether acceptance is effective in a particular context. Based on field research conducted in April 2011 in Kenya, South Sudan and Uganda, we address each of these three issues and argue that acceptance must be actively sought as both a programme and a security management strategy. In the paper we delineate elements common to all three contexts as well as missed opportunities, which identify areas that NGOs can and should address as part of an acceptance approach. © 2015 The Author(s). Disasters © Overseas Development Institute, 2015.

  6. Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks

    NASA Astrophysics Data System (ADS)

    Navare, Jyoti; Gemikonakli, Orhan

    Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.

  7. LOGAM (Logistic Analysis Model). Volume 3. Technical/Programmer Manual.

    DTIC Science & Technology

    1982-08-01

    ADDRESS(If different from Controlling Office) 15. SECURITY CLASS. (of this report) UNCLASS IF I ED IS. DECL ASSI FICATI ON/ DOWNGRADING SCHEDULE 16...It different from Report) S0. SUPPLEMENTARY NOTES It. KEY WOROS (Continue an rvereoe side It necesary end identify by block numiber) Logistics... different even though the concepts developed have the same support levels. For example, lets assume one wants to model a typical 4 level maintenance concept

  8. Challenges to Malaysia’s National Security

    DTIC Science & Technology

    1990-04-09

    be noted that the fall of Melaka did not mark the end of the regime, for it had been embedded in Malay political culture, it was the institution of...of Malaysia marked the beginning of a long term territorial expansion programme whereby eventually even Indonesia would have to merge with Malaysia...Malaysia. Malaysia’s new government was legitimate and world recognition was in order. From February till mid April 1962, Lord Cobbold , a former Governor

  9. Sentinel-3a: commissioning phase results of its optical payload

    NASA Astrophysics Data System (ADS)

    Nieke, J.; Mavrocordatos, C.

    2017-09-01

    The Sentinel-3 (S3) is a Global Land and Ocean Mission [1] currently in development as part of the European Commission's Copernicus programme (former: Global Monitoring for Environment and Security (GMES) [2]). The multi-instrument Sentinel-3 mission measures sea-surface topography, sea- and land-surface temperature, ocean colour and land colour to support ocean forecasting systems, as well as environmental and climate monitoring with near-real time data.

  10. Programmable Logic Controller Modification Attacks for use in Detection Analysis

    DTIC Science & Technology

    2014-03-27

    and J. Lowe, “The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems ,” in Proceedings of the VDE Kongress, vol. 116, 2004. [13...Feb 2014 Date 20 Feb 2014 Date 20 Feb 2014 Date AFIT-ENG-14-M-66 Abstract Unprotected Supervisory Control and Data Acquisition (SCADA) systems offer...control and monitor physical industrial processes. Although attacks targeting SCADA systems have increased, there has been little work exploring the

  11. [KIPKEL--an interdisciplinary ambulatory prevention project for children with mentally ill parents].

    PubMed

    Staets, S; Hipp, M

    2001-09-01

    Children of psychiatrically ill parents up to now have hardly been perceived as a risk group. In order to prevent these children form becoming psychiatrically ill the practice for art-therapy and psychotherapy and the social psychiatric service of the city of Hilden have developed a programme for parents having children under 18 years of age in which at least one parent suffers from endogenous psychosis or severe personality disorder. The two initiators of the KIPKEL project describe the experiences they had during the preparatory phase and while securing the financial basis and building up solid structures of cooperation. The conceptual basis of the project and problems of practical realization are presented. Finally an example of a family who participated in the programme is given. It illustrates the complex arrangement of interpersonal relationship and the course of the carework.

  12. Veterinary vaccines and their use in developing countries.

    PubMed

    Lubroth, J; Rweyemamu, M M; Viljoen, G; Diallo, A; Dungu, B; Amanfu, W

    2007-04-01

    The burden of infectious diseases in livestock and other animals continues to be a major constraint to sustained agricultural development, food security, and participation of developing and in-transition countries in the economic benefits of international trade in livestock commodities. Targeted measures must be instituted in those countries to reduce the occurrence of infectious diseases. Quality veterinary vaccines used strategically can and should be part of government sanctioned-programmes. Vaccination campaigns must be part of comprehensive disease control programmes, which, in the case of transboundary animal diseases, require a regional approach if they are to be successful. This paper focuses on the salient transboundary animal diseases and examines current vaccine use, promising vaccine research, innovative technologies that can be applied in countries in some important developing regions of the world, and the role of public/private partnerships.

  13. Situational analysis of infant and young child nutrition policies and programmatic activities in Burkina Faso.

    PubMed

    Wuehler, Sara E; Ouedraogo, Albertine Wendpagnagdé

    2011-04-01

    Progress towards reducing mortality and malnutrition among children < 5 years of age has been less than needed to achieve related Millennium Development Goals. Therefore, several international agencies joined to 'Reposition children's right to adequate nutrition in the Sahel', starting with an analysis of current activities related to infant and young child nutrition (IYCN). The objectives of the present paper are to compare relevant national policies, training materials, programmes, and monitoring and evaluation activities with internationally accepted IYCN recommendations. These findings are available to assist countries in identifying inconsistencies and filling gaps in current programming. Between August and November 2008, key informants responsible for conducting IYCN-related activities in Burkina Faso were interviewed, and 153 documents were examined on the following themes: optimal breastfeeding and complementary feeding practices, prevention of micronutrient deficiencies, screening and treatment of acute malnutrition, prevention of mother-to-child transmission of HIV, food security and hygienic practices. National policy documents addressed nearly all of the key IYCN topics, specifically or generally. Formative research has identified some local barriers and beliefs related to general breastfeeding and complementary feeding practices, and other formative research addressed about half of the IYCN topics included in this review. However, there was little evidence that this formative research was being utilized in developing training materials and designing programme interventions. Nevertheless, the training materials that were reviewed do provide specific guidance for nearly all of the key IYCN topics. Although many of the IYCN programmes are intended for national coverage, we could only confirm with available reports that programme coverage extended to certain regions. Some programme monitoring and evaluation were conducted, but few of these provided information on whether the specific IYCN programme components were implemented as designed. Most surveys that were identified reported on general nutrition status indicators, but did not provide the detail necessary for programme impact evaluations. The policy framework is well established for optimal IYCN practices, but greater resources and capacity building are needed to: (i) conduct necessary research and adapt training materials and programme protocols to local needs; (ii) improve, carry out, and document monitoring and evaluation that highlight effective and ineffective programme components; and (iii) apply these findings in developing, expanding, and improving effective programmes. © 2011 Blackwell Publishing Ltd.

  14. Pulse-shape discrimination scintillators for homeland security applications

    NASA Astrophysics Data System (ADS)

    Ellis, Mark E.; Duroe, Kirk; Kendall, Paul A.

    2016-09-01

    An extensive programme of research has been conducted for scintillation liquids and plastics capable of neutron-gamma discrimination for deployment in future passive and active Homeland Security systems to provide protection against radiological and nuclear threats. The more established detection materials such as EJ-301 and EJ-309 are compared with novel materials such as EJ-299-33 and p-terphenyl. This research also explores the benefits that can be gained from improvements in the analogue-to-digital sampling rate and sample bit resolution. Results are presented on the Pulse Shape Discrimination performance of various detector and data acquisition combinations and how optimum configurations from these studies have been developed into field-ready detector arrays. Early results from application-specific experimental configurations of multi-element detector arrays are presented.

  15. Household food security and infant feeding practices in rural Bangladesh.

    PubMed

    Owais, Aatekah; Kleinbaum, David G; Suchdev, Parminder S; Faruque, Asg; Das, Sumon K; Schwartz, Benjamin; Stein, Aryeh D

    2016-07-01

    To determine the association between household food security and infant complementary feeding practices in rural Bangladesh. Prospective, cohort study using structured home interviews during pregnancy and 3 and 9 months after delivery. We used two indicators of household food security at 3-months' follow-up: maternal Food Composition Score (FCS), calculated via the World Food Programme method, and an HHFS index created from an eleven-item food security questionnaire. Infant feeding practices were characterized using WHO definitions. Two rural sub-districts of Kishoreganj, Bangladesh. Mother-child dyads (n 2073) who completed the 9-months' follow-up. Complementary feeding was initiated at age ≤4 months for 7 %, at 5-6 months for 49 % and at ≥7 months for 44 % of infants. Based on 24 h dietary recall, 98 % of infants were still breast-feeding at age 9 months, and 16 % received ≥4 food groups and ≥4 meals (minimally acceptable diet) in addition to breast milk. Mothers' diet was more diverse than infants'. The odds of receiving a minimally acceptable diet for infants living in most food-secure households were three times those for infants living in least food-secure households (adjusted OR=3·0; 95 % CI 2·1, 4·3). Socio-economic status, maternal age, literacy, parity and infant sex were not associated with infant diet. HHFS and maternal FCS were significant predictors of subsequent infant feeding practices. Nevertheless, even the more food-secure households had poor infant diet. Interventions aimed at improving infant nutritional status need to focus on both complementary food provision and education.

  16. Monitoring community mobilisation and organisational capacity among high-risk groups in a large-scale HIV prevention programme in India: selected findings using a Community Ownership and Preparedness Index.

    PubMed

    Narayanan, Pradeep; Moulasha, K; Wheeler, Tisha; Baer, James; Bharadwaj, Sowmyaa; Ramanathan, T V; Thomas, Tom

    2012-10-01

    In a participatory approach to health and development interventions, defining and measuring community mobilisation is important, but it is challenging to do this effectively, especially at scale. A cross-sectional, participatory monitoring tool was administered in 2008-2009 and 2009-2010 across a representative sample of 25 community-based groups (CBGs) formed under the Avahan India AIDS Initiative, to assess their progress in mobilisation, and to inform efforts to strengthen the groups and make them sustainable. The survey used a weighted index to capture both qualitative and quantitative data in numeric form. The index permitted broad, as well as highly detailed, analysis of community mobilisation, relevant at the level of individual groups, as well as state-wide and across the whole programme. The survey demonstrated that leadership and programme management were the strongest areas among the CBGs, confirming the programme's investment in these areas. Discussion of the Round 1 results led to efforts to strengthen governance and democratic decision making in the groups, and progress was reflected in the Round 2 survey results. CBG engagement with state authorities to gain rights and entitlements and securing the long-term financial stability of groups remain a challenge. The survey has proven useful for informing the managers of programmes about what is happening on the ground, and it has opened spaces for discussion within community groups about the nature of leadership, decision making and their goals, which is leading to accelerated progress. The tool provided useful data to manage community mobilisation in Avahan.

  17. MIC-SVM: Designing A Highly Efficient Support Vector Machine For Advanced Modern Multi-Core and Many-Core Architectures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    You, Yang; Song, Shuaiwen; Fu, Haohuan

    2014-08-16

    Support Vector Machine (SVM) has been widely used in data-mining and Big Data applications as modern commercial databases start to attach an increasing importance to the analytic capabilities. In recent years, SVM was adapted to the field of High Performance Computing for power/performance prediction, auto-tuning, and runtime scheduling. However, even at the risk of losing prediction accuracy due to insufficient runtime information, researchers can only afford to apply offline model training to avoid significant runtime training overhead. To address the challenges above, we designed and implemented MICSVM, a highly efficient parallel SVM for x86 based multi-core and many core architectures,more » such as the Intel Ivy Bridge CPUs and Intel Xeon Phi coprocessor (MIC).« less

  18. FPGA-based coprocessor for matrix algorithms implementation

    NASA Astrophysics Data System (ADS)

    Amira, Abbes; Bensaali, Faycal

    2003-03-01

    Matrix algorithms are important in many types of applications including image and signal processing. These areas require enormous computing power. A close examination of the algorithms used in these, and related, applications reveals that many of the fundamental actions involve matrix operations such as matrix multiplication which is of O (N3) on a sequential computer and O (N3/p) on a parallel system with p processors complexity. This paper presents an investigation into the design and implementation of different matrix algorithms such as matrix operations, matrix transforms and matrix decompositions using an FPGA based environment. Solutions for the problem of processing large matrices have been proposed. The proposed system architectures are scalable, modular and require less area and time complexity with reduced latency when compared with existing structures.

  19. PyPWA: A partial-wave/amplitude analysis software framework

    NASA Astrophysics Data System (ADS)

    Salgado, Carlos

    2016-05-01

    The PyPWA project aims to develop a software framework for Partial Wave and Amplitude Analysis of data; providing the user with software tools to identify resonances from multi-particle final states in photoproduction. Most of the code is written in Python. The software is divided into two main branches: one general-shell where amplitude's parameters (or any parametric model) are to be estimated from the data. This branch also includes software to produce simulated data-sets using the fitted amplitudes. A second branch contains a specific realization of the isobar model (with room to include Deck-type and other isobar model extensions) to perform PWA with an interface into the computer resources at Jefferson Lab. We are currently implementing parallelism and vectorization using the Intel's Xeon Phi family of coprocessors.

  20. Tempest: Accelerated MS/MS database search software for heterogeneous computing platforms

    PubMed Central

    Adamo, Mark E.; Gerber, Scott A.

    2017-01-01

    MS/MS database search algorithms derive a set of candidate peptide sequences from in-silico digest of a protein sequence database, and compute theoretical fragmentation patterns to match these candidates against observed MS/MS spectra. The original Tempest publication described these operations mapped to a CPU-GPU model, in which the CPU generates peptide candidates that are asynchronously sent to a discrete GPU to be scored against experimental spectra in parallel (Milloy et al., 2012). The current version of Tempest expands this model, incorporating OpenCL to offer seamless parallelization across multicore CPUs, GPUs, integrated graphics chips, and general-purpose coprocessors. Three protocols describe how to configure and run a Tempest search, including discussion of how to leverage Tempest's unique feature set to produce optimal results. PMID:27603022

  1. Door latching recognition apparatus and process

    DOEpatents

    Eakle, Jr., Robert F.

    2012-05-15

    An acoustic door latch detector is provided in which a sound recognition sensor is integrated into a door or door lock mechanism. The programmable sound recognition sensor can be trained to recognize the acoustic signature of the door and door lock mechanism being properly engaged and secured. The acoustic sensor will signal a first indicator indicating that proper closure was detected or sound an alarm condition if the proper acoustic signature is not detected within a predetermined time interval.

  2. Polio Eradication–Lessons from the Past and Future Perspective

    PubMed Central

    P, Basavaraj; Singh, Shilpi; Singla, Ashish; Kundu, Hansa; Singh, Khushboo

    2014-01-01

    Background: India has recently achieved the “Polio free status” by WHO with stringent efforts of the Health Ministry to control its spread. However, we should not forget the lessons learnt from the failure of National malaria eradication Programme and National Tuberculosis control Programme which creates a need to assess the probable barriers for the various National Health Programmes. The present article presents an overview of the Polio Eradication programme in India highlighting the lessons learnt from the past. Also, it evaluates the reality behind full participation of Pulse Polio Programme. Materials and Methods: The study results of a cross-sectional survey conducted with an aim to assess the probable reasons and barriers behind non compliance of Pulse Polio Programme among parents of children (1-5 yr of age) of Modinagar area have also been discussed. The survey instrument was a structured, 10 item, closed ended questionnaire. Statistical analysis used: Chi-square test was used to analyze the difference between proportions of individual responses for each question and multiple logistic regression was used to assess relation between socio demographic parameter and absence from Polio Ravivaar. Results: The study reveals a surprising 68% attendance of Pulse Polio programme which is far behind the desired goal. Most of the parents who did not attend polio ravivaar considered that there was no need for the repetition of Polio vaccine (76.9%) followed by their fear that the vaccine might get contaminated during transportation (74.5%). A significant positive association was found between older age group of the eligible children (4-5 yr, O.R.1.52), female gender, illiterate parents, distance of more than one km from residence to vaccination and lack of source of information (O.R. 1.47). Conclusion: Efforts should be done to investigate the probable reasons behind non compliance for various immunization programmes to analyse the current situation in detail and formulate appropriate programs for coming years so that the efforts so far don’t go in vain and we secure a healthy Polio free nation for our future generations. PMID:25177640

  3. Low Power S-Box Architecture for AES Algorithm using Programmable Second Order Reversible Cellular Automata: An Application to WBAN.

    PubMed

    Gangadari, Bhoopal Rao; Ahamed, Shaik Rafi

    2016-12-01

    In this paper, we presented a novel approach of low energy consumption architecture of S-Box used in Advanced Encryption Standard (AES) algorithm using programmable second order reversible cellular automata (RCA 2 ). The architecture entails a low power implementation with minimal delay overhead and the performance of proposed RCA 2 based S-Box in terms of security is evaluated using the cryptographic properties such as nonlinearity, correlation immunity bias, strict avalanche criteria, entropy and also found that the proposed architecture is secure enough for cryptographic applications. Moreover, the proposed AES algorithm architecture simulation studies show that energy consumption of 68.726 nJ, power dissipation of 3.856 mW for 0.18- μm at 13.69 MHz and energy consumption of 29.408 nJ, power dissipation of 1.65 mW for 0.13- μm at 13.69 MHz. The proposed AES algorithm with RCA 2 based S-Box shows a reduction power consumption by 50 % and energy consumption by 5 % compared to best classical S-Box and composite field arithmetic based AES algorithm. Apart from that, it is also shown that RCA 2 based S-Boxes are dynamic in nature, invertible, low power dissipation compared to that of LUT based S-Box and hence suitable for Wireless Body Area Network (WBAN) applications.

  4. Improving community development by linking agriculture, nutrition and education: design of a randomised trial of "home-grown" school feeding in Mali.

    PubMed

    Masset, Edoardo; Gelli, Aulo

    2013-02-21

    Providing food through schools has well documented effects in terms of the education, health and nutrition of school children. However, there is limited evidence in terms of the benefits of providing a reliable market for small-holder farmers through "home-grown" school feeding approaches. This study aims to evaluate the impact of school feeding programmes sourced from small-holder farmers on small-holder food security, as well as on school children's education, health and nutrition in Mali. In addition, this study will examine the links between social accountability and programme performance. This is a field experiment planned around the scale-up of the national school feeding programme, involving 116 primary schools in 58 communities in food insecure areas of Mali. The randomly assigned interventions are: 1) a school feeding programme group, including schools and villages where the standard government programme is implemented; 2) a "home-grown" school feeding and social accountability group, including schools and villages where the programme is implemented in addition to training of community based organisations and local government; and 3) the control group, including schools and household from villages where the intervention will be delayed by at least two years, preferably without informing schools and households. Primary outcomes include small-holder farmer income, school participation and learning, and community involvement in the programme. Other outcomes include nutritional status and diet-diversity. The evaluation will follow a mixed method approach, including household, school and village level surveys as well as focus group discussions with small-holder farmers, school children, parents and community members. The impact evaluation will be incorporated within the national monitoring and evaluation (M&E) system strengthening activities that are currently underway in Mali. Baselines surveys are planned for 2012. A monthly process monitoring visits, spot checks and quarterly reporting will be undertaken as part of the regular programme monitoring activities. Evaluation surveys are planned for 2014. National governments in sub-Saharan Africa have demonstrated strong leadership in the response to the recent food and financial crises by scaling-up school feeding programmes. "Home-grown" school feeding programmes have the potential to link the increased demand for school feeding goods and services to community-based stakeholders, including small-holder farmers and women's groups. Alongside assessing the more traditional benefits to school children, this evaluation will be the first to examine the impact of linking school food service provision to small-holder farmer income, as well as the link between community level engagement and programme performance. ISRCTN76705891.

  5. Returns on vocational education over the life cycle: Between immediate labour market preparation and lifelong employability

    NASA Astrophysics Data System (ADS)

    Lavrijsen, Jeroen; Nicaise, Ides

    2017-04-01

    An important issue in the design of secondary-level education is the balance between conveying general and occupation-specific (vocational) skills. On the one hand, vocationally oriented programmes, providing occupation-specific skills with immediate labour market relevance, have repeatedly been shown to secure safe pathways into employment. On the other hand, these programmes tend to put less emphasis on developing general knowledge, skills and competencies, including numeracy and literacy, which are foundational to lifelong learning. Hence, when the needs of the labour market change, employees who opted for a vocational track when they were at secondary school risk being less flexible in adapting to such changes later in their career. The authors of this article examine whether this results in a trade-off between short-term gains and long-term losses by considering differences in the labour market careers of vocationally and generally educated respondents in the 2012 Programme for the International Assessment of Adult Competencies (PIAAC). Their results suggest that early labour market benefits of vocational specialisation decrease over time; the authors relate this to its lower ability to equip secondary school students - future employees - with skills for lifelong learning.

  6. Capability Development among the Ultra-poor in Bangladesh: A Case Study

    PubMed Central

    2009-01-01

    Microcredit is advocated as a development tool that has the potential to reduce poverty, empower participants, and improve health. Results of several studies have shown that the extreme poor, or the ultra-poor, often are unable to benefit from traditional microcredit programmes and can, as a result of taking a loan they cannot repay, sink deeper into economic and social poverty. This case study describes an intervention directed at enabling the ultra-poor rural populations to pull themselves out of poverty. The intervention integrates multiple components, including asset grants for income generation, skills training, a time-bound monthly stipend for subsistence, social development and mobilization of local elite, and health support. Results of an evaluation showed that, after 18 months, the programme positively impacted livelihood, economic, social and health status to the extent that 63% of households (n=5,000) maintained asset growth and joined (or intended to join) a regular microcredit programme. Impacts included improved income, improved food security, and improved health knowledge and behaviour. Applying a social exclusion framework to the intervention helps identify the different dynamic forces that can exclude or include the ultra-poor in Bangladesh in development interventions such as microcredit. PMID:19761086

  7. Capability development among the ultra-poor in Bangladesh: a case study.

    PubMed

    Ahmed, Syed Masud

    2009-08-01

    Microcredit is advocated as a development tool that has the potential to reduce poverty, empower participants, and improve health. Results of several studies have shown that the extreme poor, or the ultra-poor, often are unable to benefit from traditional microcredit programmes and can, as a result of taking a loan they cannot repay, sink deeper into economic and social poverty. This case study describes an intervention directed at enabling the ultra-poor rural populations to pull themselves out of poverty. The intervention integrates multiple components, including asset grants for income generation, skills training, a time-bound monthly stipend for subsistence, social development and mobilization of local elite, and health support. Results of an evaluation showed that, after 18 months, the programme positively impacted livelihood, economic, social and health status to the extent that 63% of households (n=5,000) maintained asset growth and joined (or intended to join) a regular microcredit programme. Impacts included improved income, improved food security, and improved health knowledge and behaviour. Applying a social exclusion framework to the intervention helps identify the different dynamic forces that can exclude or include the ultra-poor in Bangladesh in development interventions such as microcredit.

  8. [Medical ethics in prison medicine].

    PubMed

    Bernheim, J

    1980-11-01

    A series of situations and decisions involving medical ethics in a prison medical service are discussed. The doctor's independence is considered in relation to his contract with administrative authorities. In contrast with most private doctor-patient relationships, there is usually no possibility for prisoners to choose their doctor and vice-versa. Freedom of consent on the part of the patient may also imply a right to no-treatment. Medical care in prison is not easy to delineate, also because patients often try to involve the doctor in non-medical demands. A prison doctor should avoid taking part in decisions which ought to be made by the judiciary or by administrative authorities. Programmes involving preventive medicine and sociotherapy imply collaboration between therapeutic and security staff. The continuous interplay and readjustment between powers based on public authority, on the rights of each individual prisoner and on the medical programmes makes it possible for some sort of therapeutic freedom to exist in the prison.

  9. a method of gravity and seismic sequential inversion and its GPU implementation

    NASA Astrophysics Data System (ADS)

    Liu, G.; Meng, X.

    2011-12-01

    In this abstract, we introduce a gravity and seismic sequential inversion method to invert for density and velocity together. For the gravity inversion, we use an iterative method based on correlation imaging algorithm; for the seismic inversion, we use the full waveform inversion. The link between the density and velocity is an empirical formula called Gardner equation, for large volumes of data, we use the GPU to accelerate the computation. For the gravity inversion method , we introduce a method based on correlation imaging algorithm,it is also a interative method, first we calculate the correlation imaging of the observed gravity anomaly, it is some value between -1 and +1, then we multiply this value with a little density ,this value become the initial density model. We get a forward reuslt with this initial model and also calculate the correaltion imaging of the misfit of observed data and the forward data, also multiply the correaltion imaging result a little density and add it to the initial model, then do the same procedure above , at last ,we can get a inversion density model. For the seismic inveron method ,we use a mothod base on the linearity of acoustic wave equation written in the frequency domain,with a intial velociy model, we can get a good velocity result. In the sequential inversion of gravity and seismic , we need a link formula to convert between density and velocity ,in our method , we use the Gardner equation. Driven by the insatiable market demand for real time, high-definition 3D images, the programmable NVIDIA Graphic Processing Unit (GPU) as co-processor of CPU has been developed for high performance computing. Compute Unified Device Architecture (CUDA) is a parallel programming model and software environment provided by NVIDIA designed to overcome the challenge of using traditional general purpose GPU while maintaining a low learn curve for programmers familiar with standard programming languages such as C. In our inversion processing, we use the GPU to accelerate our gravity and seismic inversion. Taking the gravity inversion as an example, its kernels are gravity forward simulation and correlation imaging, after the parallelization in GPU, in 3D case,the inversion module, the original five CPU loops are reduced to three,the forward module the original five CPU loops are reduced to two. Acknowledgments We acknowledge the financial support of Sinoprobe project (201011039 and 201011049-03), the Fundamental Research Funds for the Central Universities (2010ZY26 and 2011PY0183), the National Natural Science Foundation of China (41074095) and the Open Project of State Key Laboratory of Geological Processes and Mineral Resources (GPMR0945).

  10. A Secure and Reliable High-Performance Field Programmable Gate Array for Information Processing

    DTIC Science & Technology

    2012-03-01

    receives a data token from its control input (shown as a horizontal arrow above). The value of this data token is used to select an input port. The input...dual of a merge. It receives a data token from its control input (shown as a horizontal arrow above). The value of this data token is used to select...Transactions on Computer-Aided Design of Intergrated Circuits and Systems, Vol. 26, No. 2, February 2007. [12] Cadence Design Systems, “Clock Domain

  11. Automated Software Vulnerability Analysis

    NASA Astrophysics Data System (ADS)

    Sezer, Emre C.; Kil, Chongkyung; Ning, Peng

    Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

  12. Performance Evaluation of a Field Programmable Gate Array-Based System for Detecting and Tracking Peer-to-Peer Protocols on a Gigabit Ethernet Network

    DTIC Science & Technology

    2010-06-01

    Ron’s Code 4 . . . . . . . . . . . . . . . . . . . 18 2.3.3 Virtual Private Network and Secure Shell Tunnels 19 2.3.4 Darknets ...created using Iodine. 2.2 Analyzing and Classifying Network Traffic Before the advent of Darknets and anonymizers like Tor (see Section 2.3), ana... darknets , and the Tor network. 2.3.1 Byte Padding. Byte padding is the most primitive obfuscation method used to hide payloads in network traffic. When byte

  13. Operations Research / Operations Analysis Orientation Course Curriculum for NATO Nations (Programme d’initiation a la recherche / l’analyse operationnelle pour les pays de l’OTAN)

    DTIC Science & Technology

    2014-09-01

    The NATO Science and Technology Organization Science & Technology (S& T ) in the NATO context is defined as the selective and rigorous...generation and application of state-of-the-art, validated knowledge for defence and security purposes. S& T activities embrace scientific research...engineering, operational research and analysis, synthesis, integration and validation of knowledge derived through the scientific method. In NATO, S& T is

  14. 105KE Basin Area Radiation Monitor System (ARMS) Acceptance Test Procedure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    KINKEL, C.C.

    1999-12-14

    This procedure is intended for the Area Radiation Monitoring System, ARMS, that is replacing the existing Programmable Input-Output Processing System, PIOPS, radiation monitoring system in the 105KE basin. The new system will be referred to as the 105KE ARMS, 105KE Area Radiation Monitoring System. This ATP will ensure calibration integrity of the 105KE radiation detector loops. Also, this ATP will test and document the display, printing, alarm output, alarm acknowledgement, upscale check, and security functions. This ATP test is to be performed after completion of the 105KE ARMS installation. The alarm outputs of the 105KE ARMS will be connected tomore » the basin detector alarms, basin annunciator system, and security Alarm Monitoring System, AMS, located in the 200 area Central Alarm Station (CAS).« less

  15. Security Recommendations for mHealth Apps: Elaboration of a Developer's Guide.

    PubMed

    Morera, Enrique Pérez; de la Torre Díez, Isabel; Garcia-Zapirain, Begoña; López-Coronado, Miguel; Arambarri, Jon

    2016-06-01

    Being the third fastest-growing app category behind games and utilities, mHealth apps are changing the healthcare model, as medicine today involves the data they compile and analyse, information known as Big Data. However, the majority of apps are lacking in security when gathering and dealing with the information, which becomes a serious problem. This article presents a guide regarding security solution, intended to be of great use for developers of mHealth apps. In August 2015 current mobile health apps were sought out in virtual stores such as Android Google Play, Apple iTunes App Store etc., in order to classify them in terms of usefulness. After this search, the most widespread weaknesses in the field of security in the development of these mobile apps were examined, based on sources such as the "OWASP Mobile Security Project, the initiative recently launched by the Office of Civil Rights (OCR), and other articles of scientific interest. An informative, elemental guide has been created for the development of mHealth apps. It includes information about elements of security and its implementation on different levels for all types of mobile health apps based on the data that each app manipulates, the associated calculated risk as a result of the likelihood of occurrence and the threat level resulting from its vulnerabilities - high level (apps for monitoring, diagnosis, treatment and care) from 6 ≤ 9, medium level (calculator, localizer and alarm) from 3 ≤ 6 and low level (informative and educational apps) from 0 ≤ 3. The guide aims to guarantee and facilitate security measures in the development of mobile health applications by programmers unconnected to the ITC and professional health areas.

  16. Interdisciplinary assessment of sea-level rise and climate change impacts on the lower Nile delta, Egypt.

    PubMed

    Sušnik, Janez; Vamvakeridou-Lyroudia, Lydia S; Baumert, Niklas; Kloos, Julia; Renaud, Fabrice G; La Jeunesse, Isabelle; Mabrouk, Badr; Savić, Dragan A; Kapelan, Zoran; Ludwig, Ralf; Fischer, Georg; Roson, Roberto; Zografos, Christos

    2015-01-15

    CLImate-induced changes on WAter and SECurity (CLIWASEC) was a cluster of three complementary EC-FP7 projects assessing climate-change impacts throughout the Mediterranean on: hydrological cycles (CLIMB - CLimate-Induced changes on the hydrology of Mediterranean Basins); water security (WASSERMed - Water Availability and Security in Southern EuRope and the Mediterranean) and human security connected with possible hydro-climatic conflicts (CLICO - CLImate change hydro-COnflicts and human security). The Nile delta case study was common between the projects. CLIWASEC created an integrated forum for modelling and monitoring to understand potential impacts across sectors. This paper summarises key results from an integrated assessment of potential challenges to water-related security issues, focusing on expected sea-level rise impacts by the middle of the century. We use this common focus to illustrate the added value of project clustering. CLIWASEC pursued multidisciplinary research by adopting a single research objective: sea-level rise related water security threats, resulting in a more holistic view of problems and potential solutions. In fragmenting research, policy-makers can fail to understand how multiple issues can materialize from one driver. By combining efforts, an integrated assessment of water security threats in the lower Nile is formulated, offering policy-makers a clearer picture of inter-related issues to society and environment. The main issues identified by each project (land subsidence, saline intrusion - CLIMB; water supply overexploitation, land loss - WASSERMed; employment and housing security - CLICO), are in fact related. Water overexploitation is exacerbating land subsidence and saline intrusion, impacting on employment and placing additional pressure on remaining agricultural land and the underdeveloped housing market. All these have wider implications for regional development. This richer understanding could be critical in making better policy decisions when attempting to mitigate climate and social change impacts. The CLIWASEC clustering offers an encouraging path for the new European Commission Horizon 2020 programme to follow. Copyright © 2014 Elsevier B.V. All rights reserved.

  17. Global health security: the wider lessons from the west African Ebola virus disease epidemic

    PubMed Central

    Heymann, David L; Chen, Lincoln; Takemi, Keizo; Fidler, David P; Tappero, Jordan W; Thomas, Mathew J; Kenyon, Thomas A; Frieden, Thomas R; Yach, Derek; Nishtar, Sania; Kalache, Alex; Olliaro, Piero L; Horby, Peter; Torreele, Els; Gostin, Lawrence O; Ndomondo-Sigonda, Margareth; Carpenter, Daniel; Rushton, Simon; Lillywhite, Louis; Devkota, Bhimsen; Koser, Khalid; Yates, Rob; Dhillon, Ranu S; Rannan-Eliya, Ravi P

    2018-01-01

    The Ebola virus disease outbreak in West Africa was unprecedented in both its scale and impact. Out of this human calamity has come renewed attention to global health security—its definition, meaning, and the practical implications for programmes and policy. For example, how does a government begin to strengthen its core public health capacities, as demanded by the International Health Regulations? What counts as a global health security concern? In the context of the governance of global health, including WHO reform, it will be important to distil lessons learned from the Ebola outbreak. The Lancet invited a group of respected global health practitioners to reflect on these lessons, to explore the idea of global health security, and to offer suggestions for next steps. Their contributions describe some of the major threats to individual and collective human health, as well as the values and recommendations that should be considered to counteract such threats in the future. Many different perspectives are proposed. Their common goal is a more sustainable and resilient society for human health and wellbeing. PMID:25987157

  18. Effectiveness of a single day induction programme in changing medical students’ attitudes towards the speciality of forensic psychiatry

    PubMed Central

    Archer, Ann; Guliani, Joshana; Johns, Francesca; McCartney, Emily; Smith, E Naomi; Ross, Callum C; Sengupta, Samrat; Das, Mrigendra

    2016-01-01

    Objectives: We aimed to investigate the effectiveness of a day visit in changing attitudes towards a high-security forensic psychiatric hospital, with regard to the current recruitment difficulties in psychiatry. Methods: Broadmoor Hospital, a UK high-security psychiatric hospital, runs day visits for medical students, led by doctors. At the beginning and the end of the day students wrote their responses to the question, ‘What do you think of Broadmoor?’ Attitudes and themes were identified, and their prevalence was analysed. Results: The responses of 296 students were initially analysed; however, 19 responses had to be excluded because they were illegible or incomplete. Before the visit, 15 responses were rated as positive, 169 neutral and 93 negative. After the visit, 205 responses were positive, 69 neutral and three negative. The themes that changed markedly following the visit were those indicating a change to favourable attitude. Conclusions: A single day visit was shown to be effective in altering the attitudes of medical students towards forensic psychiatry within a high-security psychiatric hospital. PMID:27683656

  19. Household food security status and associated factors among high-school students in Esfahan, Iran.

    PubMed

    Mohammadzadeh, Assieh; Dorosty, Ahmadreza; Eshraghian, Mohammadreza

    2010-10-01

    The present study was designed to determine household food security status and factors associated with food insecurity among high-school students in Esfahan, Iran. Cross-sectional surveys. The present study was conducted in autumn 2008 in Esfahan, Iran. The samples were selected using systematic cluster sampling. Socio-economic questionnaires, food security questionnaires and FFQ were filled out during face-to-face interviews. In addition, data on participants' weights and heights were collected. A total of 580 students (261 boys and 319 girls) aged 14-17 years from forty high schools in Esfahan, Iran, were selected. The prevalence of household food insecurity according to the US Department of Agriculture food security questionnaire was 36.6 % (95 % CI 0.33, 0.40). Food insecurity was positively associated with number of members in the household (P < 0.05) and negatively associated with parental education level and job status and household economic status (P < 0.05). Moreover, students living in food-insecure households more frequently consumed bread, macaroni, potato and egg (P < 0.05), while they less frequently consumed rice, red meat, sausage and hamburger, poultry, fish, green vegetables, root and bulb (coloured) vegetables, melons, apples and oranges, milk and yoghurt (P < 0.05). Food insecurity was prevalent among households in Esfahan, Iran, and food security status was associated with socio-economic factors. Students who belonged to food-secure households more frequently consumed healthy foods (except sausage and hamburger), whereas those living in food-insecure households more frequently consumed cheap foods containing high energy per kilogram. The present study suggests that intervention programmes be designed and carried out.

  20. Developing INFOMAR's Seabed Mapping Data to Support a Sustainable Marine Economy

    NASA Astrophysics Data System (ADS)

    Judge, M. T.; Guinan, J.

    2016-02-01

    As Ireland's national seabed mapping programme, INFOMAR1 (INtegrated mapping FOr the sustainable development of Ireland's MARine resource) enters its eleventh year it continues to provide pivotal seabed mapping data products, e.g. databases, charts and physical habitat maps to support Ireland's Integrated Marine Plan. The programme, jointly coordinated by the Geological Survey of Ireland and the Marine Institute, has gained a world class reputation for developing seabed mapping technologies, infrastructure and expertise. In the government's current Integrated Marine Plan, the programme's critical role in marine spatial planning enabling infrastructural development, research and education has been cited2. INFOMAR's free data policy supports a thriving maritime economy by promoting easy access to seabed mapping datasets that underpin; maritime safety, security and surveillance, governance, business development, research and technology innovation and infrastructure. The first hydrographic surveys of the national marine mapping programme mapped the extent of Ireland's deepest offshore area, whilst in recent years the focus has been to map the coastal and shallow areas. Targeted coastal areas include 26 bays and 3 priority areas for which specialised equipment, techniques and vessels are required. This talk will discuss how the INFOMAR programme has evolved to address the scientific and technological challenges of seabed mapping across a range of water depths; particularly the challenges associated with addressing inshore data gaps. It will describe how the data converts to bathymetric and geological maps detailing seabed characteristics and habitats. We will expand on how maps are: incorporated into collaborative marine projects such as EMODnet, commercialised to identify marine resources and used as marine decision support tools that drive policy and promote protection of the vastly under discovered marine area.

  1. Challenges to evidence-based health promotion: a case study of a Food Security Coalition in Ontario, Canada.

    PubMed

    Meyer, Samantha B; Edge, Sara S; Beatty, Jocelyn; Leatherdale, Scott; Perlman, Chris; Dean, Jennifer; Ward, Paul R; Kirkpatrick, Sharon I

    2017-03-30

    Developing the evidence base for health promotion can be challenging because interventions often have to target competing determinants of health, including social, structural, environmental and political determinants; all of which are difficult to measure and thus evaluate. Drawing on a case study of food insecurity, which refers to inadequate access to food due to financial constraints, we illustrate the challenges faced by community-based organizations in collecting data to form an evidence base for the development and evaluation of collective programmes aimed at addressing food insecurity. Interviews were conducted with members of a multi-stakeholder coalition (n = 22 interviewees; n = 10 organizations) who collectively work to address food insecurity in their community through a range of community-based programmes and services. Member organizations also provided a list of measures currently used to inform programme and service development and evaluation. Data were collected in a city in Southern Ontario, Canada between May and September 2015. Participants identified four barriers to collecting data: Organizational needs and philosophies; concerns surrounding clientele wellbeing and dignity; issues of feasibility; and restrictive requirements imposed by funding bodies. Participants also discussed their previous successes in collecting meaningful data for identifying impact. Our results point to the challenge of generating data suitable for developing and evaluating programmes aimed at broader determinants of health, while maintaining the primary goal of meeting clients' needs. Documenting change at intermediate- and macro-levels would provide evidence for the collective effectiveness of current programmes and services offered. However, appropriate resources need to be invested to allow for scientific evaluation. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  2. Lessons learned from stakeholder-driven sustainability analysis of six national HIV programmes.

    PubMed

    Katz, Itamar; Glandon, Douglas; Wong, Wendy; Kargbo, Brima; Ombam, Regina; Singh, Shanti; Ramsammy, Leslie; Tal-Dia, Anta; Seck, Ibrahima; Osika, John S

    2014-05-01

    In light of the decline in donor HIV funding, HIV programmes increasingly need to assess their available and potential resources and maximize their utilization. This article presents lessons learned related to how countries have addressed the sustainability of HIV programmes in a stakeholder-driven sustainability analysis. During HIV/AIDS Programme Sustainability Analysis Tool (HAPSAT) applications in six countries (Benin, Guyana, Kenya, Lesotho, Sierra Leone and South Sudan), stakeholders identified key sustainability challenges for their HIV responses. Possible policy approaches were prepared, and those related to prioritization and resource mobilization are analysed in this article. The need to prioritize evidence-based interventions and apply efficiency measures is being accepted by countries. Five of the six countries in this study requested that the HAPSAT team prepare 'prioritization' strategies. Countries recognize the need to prepare for an alternative to 'universal access by 2015', acknowledging that their capacity might be insufficient to reach such high-coverage levels by then. There is further acceptance of the importance of reaching the most-at-risk, marginalized populations, as seen, for example, in South Sudan and Sierra Leone. However, the pace at which resources are shifting towards these populations is slow. Finally, only two of the six countries, Kenya and Benin, chose to examine options for generating additional financial resources beyond donor funding. In Kenya, three non-donor sources were recommended, yet even if all were to be implemented, it would cover only 25% of the funding needed. Countries are increasingly willing to address the challenges of HIV programme sustainability, yet in different ways and with varying urgency. To secure achievements made to date and maximize future impact, countries would benefit from strengthening their strategic plans, operational plans and funding proposals with concrete timelines and responsibilities for addressing sustainability issues.

  3. Occupational health in Brazil.

    PubMed

    Bedrikow, B; Algranti, E; Buschinelli, J T; Morrone, L C

    1997-01-01

    Brazil is a recently industrialised country with marked contrasts in social and economic development. The availability of public/private services in its different regions also varies. Health indicators follow these trends. Occupational health is a vast new field, as in other developing countries. Occupational medicine is a required subject in graduation courses for physicians. Specialisation courses for university graduated professionals have more than 700 hours of lectures and train occupational health physicians, safety engineers and nursing staff. At the technical level, there are courses with up to 1300 hours for the training of safety inspectors. Until 1986 about 19,000 occupational health physicians, 18,000 safety engineers and 51,000 safety inspectors had been officially registered. Although in its infancy, postgraduation has attracted professionals at university level, through residence programmes as well as masters and doctors degrees, whereby at least a hundred good-quality research studies have been produced so far. Occupational health activities are controlled by law. Undertakings with higher risks and larger number of employees are required to hire specialised technical staff. In 1995 the Ministry of Labour demanded programmes of medical control of occupational health (PCMSO) for every worker as well as a programme of prevention of environmental hazards (PPRA). This was considered as a positive measure for the improvement of working conditions and health at work. Physicians specialising in occupational medicine are the professionals more often hired by the enterprises. Reference centres (CRSTs) for workers' health are connected to the State or City Health Secretariat primary health care units. They exist in more populated areas and are accepted by workers as the best way to accomplish the diagnosis of occupational diseases. There is important participation by the trade unions in the management of these reference centres. For 30 years now employers organisations have also kept specialised services for safety and occupational health. Although they are better equipped they are less well used by the workers than the CRSTs. At the federal level, activities concerned with occupational health are connected to three ministries: Labour, Health and Social Security. The Ministry of Labour enacts legislation on hygiene, safety and occupational medicine, performs inspections through its regional units and runs a number of research projects. The Ministry of Health provides medical care for workers injured or affected by occupational diseases and also has surveillance programmes for certain occupational diseases. The Ministry of Social Security provides rehabilitation and compensation for registered workers. In spite of a decrease in the number of accidents at work during the past 25 years, working conditions have not improved. Changes in the laws of social security in the 1970s discouraged registration and reporting of occupational injuries and diseases. In consequence death rates due to accidents increased. With the implementation of the CRSTs, the recorded incidence of occupational diseases has risen, not only because of improved diagnosis, but also because of stronger pressure from the unions and better organisation of public services and enterprises.

  4. Evaluating Multi-core Architectures through Accelerating the Three-Dimensional Lax–Wendroff Correction

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    You, Yang; Fu, Haohuan; Song, Shuaiwen

    2014-07-18

    Wave propagation forward modeling is a widely used computational method in oil and gas exploration. The iterative stencil loops in such problems have broad applications in scientific computing. However, executing such loops can be highly time time-consuming, which greatly limits application’s performance and power efficiency. In this paper, we accelerate the forward modeling technique on the latest multi-core and many-core architectures such as Intel Sandy Bridge CPUs, NVIDIA Fermi C2070 GPU, NVIDIA Kepler K20x GPU, and the Intel Xeon Phi Co-processor. For the GPU platforms, we propose two parallel strategies to explore the performance optimization opportunities for our stencil kernels.more » For Sandy Bridge CPUs and MIC, we also employ various optimization techniques in order to achieve the best.« less

  5. Heterogeneous High Throughput Scientific Computing with APM X-Gene and Intel Xeon Phi

    NASA Astrophysics Data System (ADS)

    Abdurachmanov, David; Bockelman, Brian; Elmer, Peter; Eulisse, Giulio; Knight, Robert; Muzaffar, Shahzad

    2015-05-01

    Electrical power requirements will be a constraint on the future growth of Distributed High Throughput Computing (DHTC) as used by High Energy Physics. Performance-per-watt is a critical metric for the evaluation of computer architectures for cost- efficient computing. Additionally, future performance growth will come from heterogeneous, many-core, and high computing density platforms with specialized processors. In this paper, we examine the Intel Xeon Phi Many Integrated Cores (MIC) co-processor and Applied Micro X-Gene ARMv8 64-bit low-power server system-on-a-chip (SoC) solutions for scientific computing applications. We report our experience on software porting, performance and energy efficiency and evaluate the potential for use of such technologies in the context of distributed computing systems such as the Worldwide LHC Computing Grid (WLCG).

  6. Flight code validation simulator

    NASA Astrophysics Data System (ADS)

    Sims, Brent A.

    1996-05-01

    An End-To-End Simulation capability for software development and validation of missile flight software on the actual embedded computer has been developed utilizing a 486 PC, i860 DSP coprocessor, embedded flight computer and custom dual port memory interface hardware. This system allows real-time interrupt driven embedded flight software development and checkout. The flight software runs in a Sandia Digital Airborne Computer and reads and writes actual hardware sensor locations in which Inertial Measurement Unit data resides. The simulator provides six degree of freedom real-time dynamic simulation, accurate real-time discrete sensor data and acts on commands and discretes from the flight computer. This system was utilized in the development and validation of the successful premier flight of the Digital Miniature Attitude Reference System in January of 1995 at the White Sands Missile Range on a two stage attitude controlled sounding rocket.

  7. Evaluation of the Xeon phi processor as a technology for the acceleration of real-time control in high-order adaptive optics systems

    NASA Astrophysics Data System (ADS)

    Barr, David; Basden, Alastair; Dipper, Nigel; Schwartz, Noah; Vick, Andy; Schnetler, Hermine

    2014-08-01

    We present wavefront reconstruction acceleration of high-order AO systems using an Intel Xeon Phi processor. The Xeon Phi is a coprocessor providing many integrated cores and designed for accelerating compute intensive, numerical codes. Unlike other accelerator technologies, it allows virtually unchanged C/C++ to be recompiled to run on the Xeon Phi, giving the potential of making development, upgrade and maintenance faster and less complex. We benchmark the Xeon Phi in the context of AO real-time control by running a matrix vector multiply (MVM) algorithm. We investigate variability in execution time and demonstrate a substantial speed-up in loop frequency. We examine the integration of a Xeon Phi into an existing RTC system and show that performance improvements can be achieved with limited development effort.

  8. A CPU/MIC Collaborated Parallel Framework for GROMACS on Tianhe-2 Supercomputer.

    PubMed

    Peng, Shaoliang; Yang, Shunyun; Su, Wenhe; Zhang, Xiaoyu; Zhang, Tenglilang; Liu, Weiguo; Zhao, Xingming

    2017-06-16

    Molecular Dynamics (MD) is the simulation of the dynamic behavior of atoms and molecules. As the most popular software for molecular dynamics, GROMACS cannot work on large-scale data because of limit computing resources. In this paper, we propose a CPU and Intel® Xeon Phi Many Integrated Core (MIC) collaborated parallel framework to accelerate GROMACS using the offload mode on a MIC coprocessor, with which the performance of GROMACS is improved significantly, especially with the utility of Tianhe-2 supercomputer. Furthermore, we optimize GROMACS so that it can run on both the CPU and MIC at the same time. In addition, we accelerate multi-node GROMACS so that it can be used in practice. Benchmarking on real data, our accelerated GROMACS performs very well and reduces computation time significantly. Source code: https://github.com/tianhe2/gromacs-mic.

  9. A distributed microcomputer-controlled system for data acquisition and power spectral analysis of EEG.

    PubMed

    Vo, T D; Dwyer, G; Szeto, H H

    1986-04-01

    A relatively powerful and inexpensive microcomputer-based system for the spectral analysis of the EEG is presented. High resolution and speed is achieved with the use of recently available large-scale integrated circuit technology with enhanced functionality (INTEL Math co-processors 8087) which can perform transcendental functions rapidly. The versatility of the system is achieved with a hardware organization that has distributed data acquisition capability performed by the use of a microprocessor-based analog to digital converter with large resident memory (Cyborg ISAAC-2000). Compiled BASIC programs and assembly language subroutines perform on-line or off-line the fast Fourier transform and spectral analysis of the EEG which is stored as soft as well as hard copy. Some results obtained from test application of the entire system in animal studies are presented.

  10. Modeling of Radiotherapy Linac Source Terms Using ARCHER Monte Carlo Code: Performance Comparison for GPU and MIC Parallel Computing Devices

    NASA Astrophysics Data System (ADS)

    Lin, Hui; Liu, Tianyu; Su, Lin; Bednarz, Bryan; Caracappa, Peter; Xu, X. George

    2017-09-01

    Monte Carlo (MC) simulation is well recognized as the most accurate method for radiation dose calculations. For radiotherapy applications, accurate modelling of the source term, i.e. the clinical linear accelerator is critical to the simulation. The purpose of this paper is to perform source modelling and examine the accuracy and performance of the models on Intel Many Integrated Core coprocessors (aka Xeon Phi) and Nvidia GPU using ARCHER and explore the potential optimization methods. Phase Space-based source modelling for has been implemented. Good agreements were found in a tomotherapy prostate patient case and a TrueBeam breast case. From the aspect of performance, the whole simulation for prostate plan and breast plan cost about 173s and 73s with 1% statistical error.

  11. Implementation of a school-based social and emotional learning intervention: understanding diffusion processes within complex systems.

    PubMed

    Evans, Rhiannon; Murphy, Simon; Scourfield, Jonathan

    2015-07-01

    Sporadic and inconsistent implementation remains a significant challenge for social and emotional learning (SEL) interventions. This may be partly explained by the dearth of flexible, causative models that capture the multifarious determinants of implementation practices within complex systems. This paper draws upon Rogers (2003) Diffusion of Innovations Theory to explain the adoption, implementation and discontinuance of a SEL intervention. A pragmatic, formative process evaluation was conducted in alignment with phase 1 of the UK Medical Research Council's framework for Developing and Evaluating Complex Interventions. Employing case-study methodology, qualitative data were generated with four socio-economically and academically contrasting secondary schools in Wales implementing the Student Assistance Programme. Semi-structured interviews were conducted with 15 programme stakeholders. Data suggested that variation in implementation activity could be largely attributed to four key intervention reinvention points, which contributed to the transformation of the programme as it interacted with contextual features and individual needs. These reinvention points comprise the following: intervention training, which captures the process through which adopters acquire knowledge about a programme and delivery expertise; intervention assessment, which reflects adopters' evaluation of an intervention in relation to contextual needs; intervention clarification, which comprises the cascading of knowledge through an organisation in order to secure support in delivery; and intervention responsibility, which refers to the process of assigning accountability for sustainable delivery. Taken together, these points identify opportunities to predict and intervene with potential implementation problems. Further research would benefit from exploring additional reinvention activity.

  12. Household perceptions and subjective valuations of indoor residual spraying programmes to control malaria in northern Uganda.

    PubMed

    Brown, Zachary S; Kramer, Randall A; Ocan, David; Oryema, Christine

    2016-10-06

    Insecticide-based tools remain critical for controlling vector-borne diseases in Uganda. Securing public support from targeted populations for such tools is an important component in sustaining their long-run effectiveness. Yet little quantitative evidence is available on the perceived benefits and costs of vector control programmes among targeted households. A survey was administered to a clustered random sample of 612 households in Gulu and Oyam districts of northern Uganda during a period of very high malaria transmission and following a pilot indoor residual spray (IRS) programme. A discrete choice experiment was conducted within the survey, in which respondents indicated their preferences for different IRS programmes relative to money compensation in a series of experimentally controlled, hypothetical choice sets. The data were analysed using conditional logit regression models to estimate respondents' willingness to accept (WTA) some amount of money compensation in lieu of foregone malaria risk reductions. Latent class models were used to analyse whether respondent characteristics predicted WTA. Average WTA is estimated at $8.94 annually for a 10 % reduction in malaria risk, and additional co-benefits of IRS were estimated to be worth on average $54-$56 (depending on insecticide type) per round of IRS. Significant heterogeneity is observed: Four in five household heads in northern Uganda have high valuations for IRS programmes, while the remaining 20 % experience costly side effects of IRS (valued at between $2 and $3 per round). Statistically significant predictors of belonging to the high-value group include respondent gender, mean age of household members, participation in previous IRS, basic knowledge of mosquito reproduction, and the number of mosquito nets owned. Proxies for household income and wealth are not found to be statistically significant predictors of WTA. This study suggests that the majority of people in areas of high malaria transmission like northern Uganda place a high value on vector control programmes using IRS. However, there is significant heterogeneity in terms of the perceived side effects (positive and negative). This has implications for sustaining public support for these programmes in the long-term.

  13. Indicators of food and water security in an Arctic Health context--results from an international workshop discussion.

    PubMed

    Nilsson, Lena Maria; Berner, James; Dudarev, Alexey A; Mulvad, Gert; Odland, Jon Øyvind; Parkinson, Alan; Rautio, Arja; Tikhonov, Constantine; Evengård, Birgitta

    2013-01-01

    In August 2012, a literature search with the aim of describing indicators on food and water security in an Arctic health context was initialized in collaboration between the Arctic Human Health Expert Group, SDWG/AHHEG and the AMAP (Arctic Monitoring and Assessment Programme within the Arctic Council) Human Health Assessment Group, AMAP/HHAG. In December 2012, workshop discussions were performed with representatives from both of these organizations, including 7 Arctic countries. The aim of this article is to describe the workshop discussions and the rational for the 12 indicators selected and the 9 rejected and to discuss the potential feasibility of these. Advantages and disadvantages of candidate indicators were listed. Informative value and costs for collecting were estimated separately on a 3-level scale: low, medium and high. Based on these reviews, the final selection of promoted and rejected indicators was performed and summarized in tables. Among 10 suggested indicators of food security, 6 were promoted: healthy weight, traditional food proportion in diet, monetary food costs, non-monetary food accessibility, food-borne diseases and food-related contaminants. Four were rejected: per-person dietary energy supply, food security modules, self-estimated food safety and healthy eating. Among 10 suggested indicators of water security, 6 were promoted: per-capita renewable water, accessibility of running water, waterborne diseases, drinking-water-related contaminants, authorized water quality assurance and water safety plans. Four were rejected: water consumption, types of water sources, periodic water shortages and household water costs.

  14. Implantable electronics: emerging design issues and an ultra light-weight security solution.

    PubMed

    Narasimhan, Seetharam; Wang, Xinmu; Bhunia, Swarup

    2010-01-01

    Implantable systems that monitor biological signals require increasingly complex digital signal processing (DSP) electronics for real-time in-situ analysis and compression of the recorded signals. While it is well-known that such signal processing hardware needs to be implemented under tight area and power constraints, new design requirements emerge with their increasing complexity. Use of nanoscale technology shows tremendous benefits in implementing these advanced circuits due to dramatic improvement in integration density and power dissipation per operation. However, it also brings in new challenges such as reliability and large idle power (due to higher leakage current). Besides, programmability of the device as well as security of the recorded information are rapidly becoming major design considerations of such systems. In this paper, we analyze the emerging issues associated with the design of the DSP unit in an implantable system. Next, we propose a novel ultra light-weight solution to address the information security issue. Unlike the conventional information security approaches like data encryption, which come at large area and power overhead and hence are not amenable for resource-constrained implantable systems, we propose a multilevel key-based scrambling algorithm, which exploits the nature of the biological signal to effectively obfuscate it. Analysis of the proposed algorithm in the context of neural signal processing and its hardware implementation shows that we can achieve high level of security with ∼ 13X lower power and ∼ 5X lower area overhead than conventional cryptographic solutions.

  15. Indicators of food and water security in an Arctic Health context – results from an international workshop discussion

    PubMed Central

    Nilsson, Lena Maria; Berner, James; Dudarev, Alexey A.; Mulvad, Gert; Odland, Jon Øyvind; Parkinson, Alan; Rautio, Arja; Tikhonov, Constantine; Evengård, Birgitta

    2013-01-01

    In August 2012, a literature search with the aim of describing indicators on food and water security in an Arctic health context was initialized in collaboration between the Arctic Human Health Expert Group, SDWG/AHHEG and the AMAP (Arctic Monitoring and Assessment Programme within the Arctic Council) Human Health Assessment Group, AMAP/HHAG. In December 2012, workshop discussions were performed with representatives from both of these organizations, including 7 Arctic countries. The aim of this article is to describe the workshop discussions and the rational for the 12 indicators selected and the 9 rejected and to discuss the potential feasibility of these. Advantages and disadvantages of candidate indicators were listed. Informative value and costs for collecting were estimated separately on a 3-level scale: low, medium and high. Based on these reviews, the final selection of promoted and rejected indicators was performed and summarized in tables. Among 10 suggested indicators of food security, 6 were promoted: healthy weight, traditional food proportion in diet, monetary food costs, non-monetary food accessibility, food-borne diseases and food-related contaminants. Four were rejected: per-person dietary energy supply, food security modules, self-estimated food safety and healthy eating. Among 10 suggested indicators of water security, 6 were promoted: per-capita renewable water, accessibility of running water, waterborne diseases, drinking-water-related contaminants, authorized water quality assurance and water safety plans. Four were rejected: water consumption, types of water sources, periodic water shortages and household water costs. PMID:23940840

  16. Modernization of B-2 Data, Video, and Control Systems Infrastructure

    NASA Technical Reports Server (NTRS)

    Cmar, Mark D.; Maloney, Christian T.; Butala, Vishal D.

    2012-01-01

    The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) Plum Brook Station (PBS) Spacecraft Propulsion Research Facility, commonly referred to as B-2, is NASA s third largest thermal-vacuum facility with propellant systems capability. B-2 has completed a modernization effort of its facility legacy data, video and control systems infrastructure to accommodate modern integrated testing and Information Technology (IT) Security requirements. Integrated systems tests have been conducted to demonstrate the new data, video and control systems functionality and capability. Discrete analog signal conditioners have been replaced by new programmable, signal processing hardware that is integrated with the data system. This integration supports automated calibration and verification of the analog subsystem. Modern measurement systems analysis (MSA) tools are being developed to help verify system health and measurement integrity. Legacy hard wired digital data systems have been replaced by distributed Fibre Channel (FC) network connected digitizers where high speed sampling rates have increased to 256,000 samples per second. Several analog video cameras have been replaced by digital image and storage systems. Hard-wired analog control systems have been replaced by Programmable Logic Controllers (PLC), fiber optic networks (FON) infrastructure and human machine interface (HMI) operator screens. New modern IT Security procedures and schemes have been employed to control data access and process control flows. Due to the nature of testing possible at B-2, flexibility and configurability of systems has been central to the architecture during modernization.

  17. Modernization of B-2 Data, Video, and Control Systems Infrastructure

    NASA Technical Reports Server (NTRS)

    Cmar, Mark D.; Maloney, Christian T.; Butala, Vishal D.

    2012-01-01

    The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) Plum Brook Station (PBS) Spacecraft Propulsion Research Facility, commonly referred to as B-2, is NASA's third largest thermal-vacuum facility with propellant systems capability. B-2 has completed a modernization effort of its facility legacy data, video and control systems infrastructure to accommodate modern integrated testing and Information Technology (IT) Security requirements. Integrated systems tests have been conducted to demonstrate the new data, video and control systems functionality and capability. Discrete analog signal conditioners have been replaced by new programmable, signal processing hardware that is integrated with the data system. This integration supports automated calibration and verification of the analog subsystem. Modern measurement systems analysis (MSA) tools are being developed to help verify system health and measurement integrity. Legacy hard wired digital data systems have been replaced by distributed Fibre Channel (FC) network connected digitizers where high speed sampling rates have increased to 256,000 samples per second. Several analog video cameras have been replaced by digital image and storage systems. Hard-wired analog control systems have been replaced by Programmable Logic Controllers (PLC), fiber optic networks (FON) infrastructure and human machine interface (HMI) operator screens. New modern IT Security procedures and schemes have been employed to control data access and process control flows. Due to the nature of testing possible at B-2, flexibility and configurability of systems has been central to the architecture during modernization.

  18. Improving community development by linking agriculture, nutrition and education: design of a randomised trial of “home-grown” school feeding in Mali

    PubMed Central

    2013-01-01

    Background Providing food through schools has well documented effects in terms of the education, health and nutrition of school children. However, there is limited evidence in terms of the benefits of providing a reliable market for small-holder farmers through “home-grown” school feeding approaches. This study aims to evaluate the impact of school feeding programmes sourced from small-holder farmers on small-holder food security, as well as on school children’s education, health and nutrition in Mali. In addition, this study will examine the links between social accountability and programme performance. Design This is a field experiment planned around the scale-up of the national school feeding programme, involving 116 primary schools in 58 communities in food insecure areas of Mali. The randomly assigned interventions are: 1) a school feeding programme group, including schools and villages where the standard government programme is implemented; 2) a “home-grown” school feeding and social accountability group, including schools and villages where the programme is implemented in addition to training of community based organisations and local government; and 3) the control group, including schools and household from villages where the intervention will be delayed by at least two years, preferably without informing schools and households. Primary outcomes include small-holder farmer income, school participation and learning, and community involvement in the programme. Other outcomes include nutritional status and diet-diversity. The evaluation will follow a mixed method approach, including household, school and village level surveys as well as focus group discussions with small-holder farmers, school children, parents and community members. The impact evaluation will be incorporated within the national monitoring and evaluation (M&E) system strengthening activities that are currently underway in Mali. Baselines surveys are planned for 2012. A monthly process monitoring visits, spot checks and quarterly reporting will be undertaken as part of the regular programme monitoring activities. Evaluation surveys are planned for 2014. Discussion National governments in sub-Saharan Africa have demonstrated strong leadership in the response to the recent food and financial crises by scaling-up school feeding programmes. “Home-grown” school feeding programmes have the potential to link the increased demand for school feeding goods and services to community-based stakeholders, including small-holder farmers and women’s groups. Alongside assessing the more traditional benefits to school children, this evaluation will be the first to examine the impact of linking school food service provision to small-holder farmer income, as well as the link between community level engagement and programme performance. Trial registration ISRCTN76705891 PMID:23433395

  19. Design of a system based on DSP and FPGA for video recording and replaying

    NASA Astrophysics Data System (ADS)

    Kang, Yan; Wang, Heng

    2013-08-01

    This paper brings forward a video recording and replaying system with the architecture of Digital Signal Processor (DSP) and Field Programmable Gate Array (FPGA). The system achieved encoding, recording, decoding and replaying of Video Graphics Array (VGA) signals which are displayed on a monitor during airplanes and ships' navigating. In the architecture, the DSP is a main processor which is used for a large amount of complicated calculation during digital signal processing. The FPGA is a coprocessor for preprocessing video signals and implementing logic control in the system. In the hardware design of the system, Peripheral Device Transfer (PDT) function of the External Memory Interface (EMIF) is utilized to implement seamless interface among the DSP, the synchronous dynamic RAM (SDRAM) and the First-In-First-Out (FIFO) in the system. This transfer mode can avoid the bottle-neck of the data transfer and simplify the circuit between the DSP and its peripheral chips. The DSP's EMIF and two level matching chips are used to implement Advanced Technology Attachment (ATA) protocol on physical layer of the interface of an Integrated Drive Electronics (IDE) Hard Disk (HD), which has a high speed in data access and does not rely on a computer. Main functions of the logic on the FPGA are described and the screenshots of the behavioral simulation are provided in this paper. In the design of program on the DSP, Enhanced Direct Memory Access (EDMA) channels are used to transfer data between the FIFO and the SDRAM to exert the CPU's high performance on computing without intervention by the CPU and save its time spending. JPEG2000 is implemented to obtain high fidelity in video recording and replaying. Ways and means of acquiring high performance for code are briefly present. The ability of data processing of the system is desirable. And smoothness of the replayed video is acceptable. By right of its design flexibility and reliable operation, the system based on DSP and FPGA for video recording and replaying has a considerable perspective in analysis after the event, simulated exercitation and so forth.

  20. Quantum key distribution session with 16-dimensional photonic states.

    PubMed

    Etcheverry, S; Cañas, G; Gómez, E S; Nogueira, W A T; Saavedra, C; Xavier, G B; Lima, G

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.

  1. First imagery generated by near-field real-time aperture synthesis passive millimetre wave imagers at 94 GHz and 183 GHz

    NASA Astrophysics Data System (ADS)

    Salmon, Neil A.; Mason, Ian; Wilkinson, Peter; Taylor, Chris; Scicluna, Peter

    2010-10-01

    The first passive millimetre wave (PMMW) imagery is presented from two proof-of-concept aperture synthesis demonstrators, developed to investigate the use of aperture synthesis for personnel security screening and all weather flying at 94 GHz, and satellite based earth observation at 183 GHz [1]. Emission from point noise sources and discharge tubes are used to examine the coherence on system baselines and to measure the point spread functions, making comparisons with theory. Image quality is examined using near field aperture synthesis and G-matrix calibration imaging algorithms. The radiometric sensitivity is measured using the emission from absorbers at elevated temperatures acting as extended sources and compared with theory. Capabilities of the latest Field Programmable Gate Arrays (FPGA) technologies for aperture synthesis PMMW imaging in all-weather and security screening applications are examined.

  2. Design and implementation of website information disclosure assessment system.

    PubMed

    Cho, Ying-Chiang; Pan, Jen-Yi

    2015-01-01

    Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail address and network database leakages. These leakages have many causes. For example, malicious users can steal database contents, taking advantage of mistakes made by programmers and administrators. In order to mitigate this type of abuse, a website information disclosure assessment system is proposed in this study. This system utilizes a series of technologies, such as web crawler algorithms, SQL injection attack detection, and web vulnerability mining, to assess a website's information disclosure. Thirty websites, randomly sampled from the top 50 world colleges, were used to collect leakage information. This testing showed the importance of increasing the security and privacy of website information for academic websites.

  3. Quantum key distribution session with 16-dimensional photonic states

    NASA Astrophysics Data System (ADS)

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-07-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.

  4. [Forms of management of the national school meals program].

    PubMed

    Dos Santos, Sérgio Ribeiro; de Sousa Costa, Maria Bernadete; Torres de Paiva Bandeira, Geovanna

    2016-04-01

    The National School Meals Programme (PNAE in Portuguese initials) is a supplementary program to education that aims to provide school meals for pupils across the school system enrolled in public and philanthropic schools of primary education, secondary education, youth education, adult education and comprehensive education. The principles of the program are the universality and the expansion of student services in order to meet the Organic Law on Food and Nutritional Security (LOSAN), as well as the Food Security and Nutrition System. The objective of this study is to discuss forms of PNAE management to ensure that the students' right to school meals. This study is a reflection on how the resources of school meals are being managed, be it with a centralized, decentralized, semi-centralized or outsourced model. We conclude that the knowledge of the different forms of managing federal resources for food for school communities allows for making an informed choice regarding implementation and enforcement of PNAE.

  5. Quantum key distribution session with 16-dimensional photonic states

    PubMed Central

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD. PMID:23897033

  6. Effects of a weight-gain restriction programme for obese pregnant women on sickness absence and pregnancy benefits.

    PubMed

    Sydsjö, Gunilla; Monfils, Wiktor Gustafsson; de Keyser, Nicholas; Claesson, Ing-Marie; Sydsjö, Adam; Josefsson, Ann

    2013-06-01

    To evaluate the effect of a weight-gain restriction programme for obese pregnant women on sickness absence days and pregnancy benefit days during pregnancy and postpartum. A prospective, controlled intervention study. The Swedish Social Security Agency's records were utilized to compile sickness absence and pregnancy benefit information. Antenatal care clinics in the south-east of Sweden. One hundred fifty-five obese pregnant women who participated in a weight restriction program with weekly structured motivational and behavioural talks combined with aqua-aerobics during pregnancy. A total of 193 obese pregnant women with no intervention served as controls. Sickness absence benefits and pregnancy benefits expressed as a percentage. On average women in the intervention group had 76.68 total full days of sickness absence benefit compared with 53.09 days in the control group. Total full days of pregnancy benefits were 39.66% days and 41.41% for the intervention and control groups respectively. For the women who were on sick leave there were no differences between the groups in the amount of days taken. Given the complexity of factors that have an influence on sickness absence leave, it is possible that programmes that do not address the influence of social aspects and attitudes towards sickness absence have limited effect.

  7. The relationship between childhood adversity and food insecurity: 'It's like a bird nesting in your head'.

    PubMed

    Chilton, Mariana; Knowles, Molly; Rabinowich, Jenny; Arnold, Kimberly T

    2015-10-01

    Adverse childhood experiences, including abuse, neglect and household instability, affect lifelong health and economic potential. The present study investigates how adverse childhood experiences are associated with food insecurity by exploring caregivers' perceptions of the impact of their childhood adversity on educational attainment, employment and mental health. Semi-structured audio-recorded in-person interviews that included (i) quantitative measures of maternal and child health, adverse childhood experiences (range: 0-10) and food security using the US Household Food Security Survey Module; and (ii) qualitative audio-recorded investigations of experiences with abuse, neglect, violence and hunger over participants' lifetimes. Households in Philadelphia, PA, USA. Thirty-one mothers of children <4 years old who reported low or very low household food security. Twenty-one caregivers (68 %) reported four or more adverse childhood experiences, and this severity was significantly associated with reports of very low food security (Fisher's exact P=0·021). Mothers reporting emotional and physical abuse were more likely to report very low food security (Fisher's exact P=0·032). Qualitatively, participants described the impact of childhood adverse experiences with emotional and physical abuse/neglect, and household substance abuse, on their emotional health, school performance and ability to maintain employment. In turn, these experiences negatively affected their ability to protect their children from food insecurity. The associations between mothers' adverse experiences in childhood and reports of current household food security should inspire researchers, advocates and policy makers to comprehensively address family hardship through greater attention to the emotional health of caregivers. Programmes meant to address nutritional deprivation and financial hardship should include trauma-informed approaches that integrate behavioural interventions.

  8. Results from the REFLEX Cluster Survey

    NASA Astrophysics Data System (ADS)

    Bohringer, H.; Guzzo, L.; Collins, C. A.; Neumann, D. M.; Schindler, S.; Schuecker, P.; Cruddace, R.; Chincarini, G.; de Grandi, S.; Edge, A. C.; MacGillivray, H. T.; Shaver, P.; Vettolani, G.; Voges, W.

    Based on the ROSAT All-Sky Survey we have conducted a large redshift survey as an ESO key programme to identify and secure redshifts for the X-ray brightest clusters found in the southern hemisphere. We present first results for a highly controlled sample for a flux limit of 3cdot 10^{-12} erg s^{-1} cm^{-2} (0.1 - 2.4 keV) comprising 475 clusters (87% with redshifts). The logN-logS function of the sample shows an almost perfect Euclidian slope and a preliminary X-ray luminosity function is presented.

  9. Proposed concept and preliminary design for the sentinel-5 UVNs spectrometer

    NASA Astrophysics Data System (ADS)

    Windpassinger, R.; Schubert, J.; Kampf, D.

    2017-11-01

    Sentinel-5 is an atmospheric monitoring mission within the European Copernicus programme, formerly GMES (Global Monitoring for Environment and Security). Its main objective is trace-gas and aerosol optical depth measurements for air quality and climate monitoring and forecast with daily global coverage. Constituents of interest are O3, SO2, HCHO (formaldehyde), BrO, NO2, CHCHO (glyoxal), O2, CH4 (methane), and CO. Sentinel-5 will complement the Sentinel-4 GEO data over Europe. Both Sentinel-4 and -5 are intended to start operation in 2020.

  10. Incipient fault detection and power system protection for spaceborne systems

    NASA Technical Reports Server (NTRS)

    Russell, B. Don; Hackler, Irene M.

    1987-01-01

    A program was initiated to study the feasibility of using advanced terrestrial power system protection techniques for spacecraft power systems. It was designed to enhance and automate spacecraft power distribution systems in the areas of safety, reliability and maintenance. The proposed power management/distribution system is described as well as security assessment and control, incipient and low current fault detection, and the proposed spaceborne protection system. It is noted that the intelligent remote power controller permits the implementation of digital relaying algorithms with both adaptive and programmable characteristics.

  11. Parent-infant psychotherapy for improving parental and infant mental health.

    PubMed

    Barlow, Jane; Bennett, Cathy; Midgley, Nick; Larkin, Soili K; Wei, Yinghui

    2015-01-08

    Parent-infant psychotherapy (PIP) is a dyadic intervention that works with parent and infant together, with the aim of improving the parent-infant relationship and promoting infant attachment and optimal infant development. PIP aims to achieve this by targeting the mother's view of her infant, which may be affected by her own experiences, and linking them to her current relationship to her child, in order to improve the parent-infant relationship directly. 1. To assess the effectiveness of PIP in improving parental and infant mental health and the parent-infant relationship.2. To identify the programme components that appear to be associated with more effective outcomes and factors that modify intervention effectiveness (e.g. programme duration, programme focus). We searched the following electronic databases on 13 January 2014: Cochrane Central Register of Controlled Trials (CENTRAL, 2014, Issue 1), Ovid MEDLINE, EMBASE, CINAHL, PsycINFO, BIOSIS Citation Index, Science Citation Index, ERIC, and Sociological Abstracts. We also searched the metaRegister of Controlled Trials, checked reference lists, and contacted study authors and other experts. Two review authors assessed study eligibility independently. We included randomised controlled trials (RCT) and quasi-randomised controlled trials (quasi-RCT) that compared a PIP programme directed at parents with infants aged 24 months or less at study entry, with a control condition (i.e. waiting-list, no treatment or treatment-as-usual), and used at least one standardised measure of parental or infant functioning. We also included studies that only used a second treatment group. We adhered to the standard methodological procedures of The Cochrane Collaboration. We standardised the treatment effect for each outcome in each study by dividing the mean difference (MD) in post-intervention scores between the intervention and control groups by the pooled standard deviation. We presented standardised mean differences (SMDs) and 95% confidence intervals (CI) for continuous data, and risk ratios (RR) for dichotomous data. We undertook meta-analysis using a random-effects model. We included eight studies comprising 846 randomised participants, of which four studies involved comparisons of PIP with control groups only. Four studies involved comparisons with another treatment group (i.e. another PIP, video-interaction guidance, psychoeducation, counselling or cognitive behavioural therapy (CBT)), two of these studies included a control group in addition to an alternative treatment group. Samples included women with postpartum depression, anxious or insecure attachment, maltreated, and prison populations. We assessed potential bias (random sequence generation, allocation concealment, incomplete outcome data, selective reporting, blinding of participants and personnel, blinding of outcome assessment, and other bias). Four studies were at low risk of bias in four or more domains. Four studies were at high risk of bias for allocation concealment, and no study blinded participants or personnel to the intervention. Five studies did not provide adequate information for assessment of risk of bias in at least one domain (rated as unclear).Six studies contributed data to the PIP versus control comparisons producing 19 meta-analyses of outcomes measured at post-intervention or follow-up, or both, for the primary outcomes of parental depression (both dichotomous and continuous data); measures of parent-child interaction (i.e. maternal sensitivity, child involvement and parent engagement; infant attachment category (secure, avoidant, disorganised, resistant); attachment change (insecure to secure, stable secure, secure to insecure, stable insecure); infant behaviour and secondary outcomes (e.g. infant cognitive development). The results favoured neither PIP nor control for incidence of parental depression (RR 0.74, 95% CI 0.52 to 1.04, 3 studies, 278 participants, low quality evidence) or parent-reported levels of depression (SMD -0.22, 95% CI -0.46 to 0.02, 4 studies, 356 participants, low quality evidence). There were improvements favouring PIP in the proportion of infants securely attached at post-intervention (RR 8.93, 95% CI 1.25 to 63.70, 2 studies, 168 participants, very low quality evidence); a reduction in the number of infants with an avoidant attachment style at post-intervention (RR 0.48, 95% CI 0.24 to 0.95, 2 studies, 168 participants, low quality evidence); fewer infants with disorganised attachment at post-intervention (RR 0.32, 95% CI 0.17 to 0.58, 2 studies, 168 participants, low quality evidence); and an increase in the proportion of infants moving from insecure to secure attachment at post-intervention (RR 11.45, 95% CI 3.11 to 42.08, 2 studies, 168 participants, low quality evidence). There were no differences between PIP and control in any of the meta-analyses for the remaining primary outcomes (i.e. adverse effects), or secondary outcomes.Four studies contributed data at post-intervention or follow-up to the PIP versus alternative treatment analyses producing 15 meta-analyses measuring parent mental health (depression); parent-infant interaction (maternal sensitivity); infant attachment category (secure, avoidant, resistant, disorganised) and attachment change (insecure to secure, stable secure, secure to insecure, stable insecure); infant behaviour and infant cognitive development. None of the remaining meta-analyses of PIP versus alternative treatment for primary outcomes (i.e. adverse effects), or secondary outcomes showed differences in outcome or any adverse changes.We used the Grades of Recommendation, Assessment, Development and Evaluation Working Group (GRADE) approach to rate the overall quality of the evidence. For all comparisons, we rated the evidence as low or very low quality for parental depression and secure or disorganised infant attachment. Where we downgraded the evidence, it was because there was risk of bias in the study design or execution of the trial. The included studies also involved relatively few participants and wide CI values (imprecision), and, in some cases, we detected clinical and statistical heterogeneity (inconsistency). Lower quality evidence resulted in lower confidence in the estimate of effect for those outcomes. Although the findings of the current review suggest that PIP is a promising model in terms of improving infant attachment security in high-risk families, there were no significant differences compared with no treatment or treatment-as-usual for other parent-based or relationship-based outcomes, and no evidence that PIP is more effective than other methods of working with parents and infants. Further rigorous research is needed to establish the impact of PIP on potentially important mediating factors such as parental mental health, reflective functioning, and parent-infant interaction.

  12. Rising food costs & global food security: key issues & relevance for India.

    PubMed

    Gustafson, Daniel J

    2013-09-01

    Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers' incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country's reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all.

  13. Rising food costs & global food security: Key issues & relevance for India

    PubMed Central

    Gustafson, Daniel J.

    2013-01-01

    Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers’ incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country's reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all. PMID:24135190

  14. Global action to prevent war: a programme for government and grassroots efforts to stop war, genocide and other forms of deadly conflict.

    PubMed

    Dean, J; Forsberg, R C; Mendlovitz, S

    2000-01-01

    At the end of history's bloodiest century and the outset of a new millennium, we have an opportunity to fulfil one of humanity's oldest dreams: making the world largely free of war. Global changes make this goal achievable. Nuclear weapons have shown the folly of war. For the first time, there is no war and no immediate prospect of war among the main military powers. For the first time, many proven measures to prevent armed conflict, distilled in the crucible of this century's wars, are available. If systematically applied, these measures can sharply decrease the frequency and violence of war, genocide, and other forms of deadly conflict. To seize the opportunity, nations should adopt a comprehensive programme to reduce conventional armaments and armed conflict. This programme will complement and strengthen efforts to eliminate nuclear arms. To assure its ongoing worldwide implementation, the conventional reduction programme should be placed in a treaty framework. We propose a four-phased process, with three treaties, each lasting five to ten years, to lay the groundwork for the fourth treaty, which will establish a permanent international security system. The main objectives of the treaties are to achieve: 1. A verified commitment to provide full transparency on conventional armed forces and military spending, not to increase forces during negotiations on arms reductions, and to increase the resources allocated to multilateral conflict prevention and peacekeeping. 2. Substantial worldwide cuts in national armed forces and military spending and further strengthening of United Nations and regional peacekeeping and peace-enforcement capabilities. 3. A trial of a watershed commitment by participating nations, including the major powers, not to deploy their armed forces beyond national borders except in a multilateral action under UN or regional auspices. 4. A permanent transfer to the UN and regional security organizations of the authority and capability for armed intervention to prevent or end war, accompanied by further substantial cuts in national armed forces and increases in UN and regional forces. This programme offers many valuable features: a global framework for conventional forces that parallels the nuclear Non-Proliferation Treaty; a verified no-increase commitment for national armed forces based on full data exchange; a commitment to undertake prescribed confidence-building measures, including limits on force activities and deployments; a commitment to a specified plan for increased funding of UN and regional peacekeeping capabilities; a commitment to strengthen international legal institutions; and after a trial period, a lasting commitment by each participant not to unilaterally deploy its armed forces beyond its borders, but instead to give the responsibility for peacekeeping and peace enforcement to international institutions. This programme of phased steps to reduce armed forces and strengthen peacekeeping institutions will make war rare. It will foster the spread of zones of peace like those in North America and Western Europe where, after centuries of violence, international and civil war have given way to the peaceful settlement of disputes.

  15. On-board attitude determination for the Explorer Platform satellite

    NASA Technical Reports Server (NTRS)

    Jayaraman, C.; Class, B.

    1992-01-01

    This paper describes the attitude determination algorithm for the Explorer Platform satellite. The algorithm, which is baselined on the Landsat code, is a six-element linear quadratic state estimation processor, in the form of a Kalman filter augmented by an adaptive filter process. Improvements to the original Landsat algorithm were required to meet mission pointing requirements. These consisted of a more efficient sensor processing algorithm and the addition of an adaptive filter which acts as a check on the Kalman filter during satellite slew maneuvers. A 1750A processor will be flown on board the satellite for the first time as a coprocessor (COP) in addition to the NASA Standard Spacecraft Computer. The attitude determination algorithm, which will be resident in the COP's memory, will make full use of its improved processing capabilities to meet mission requirements. Additional benefits were gained by writing the attitude determination code in Ada.

  16. Kernel optimization for short-range molecular dynamics

    NASA Astrophysics Data System (ADS)

    Hu, Changjun; Wang, Xianmeng; Li, Jianjiang; He, Xinfu; Li, Shigang; Feng, Yangde; Yang, Shaofeng; Bai, He

    2017-02-01

    To optimize short-range force computations in Molecular Dynamics (MD) simulations, multi-threading and SIMD optimizations are presented in this paper. With respect to multi-threading optimization, a Partition-and-Separate-Calculation (PSC) method is designed to avoid write conflicts caused by using Newton's third law. Serial bottlenecks are eliminated with no additional memory usage. The method is implemented by using the OpenMP model. Furthermore, the PSC method is employed on Intel Xeon Phi coprocessors in both native and offload models. We also evaluate the performance of the PSC method under different thread affinities on the MIC architecture. In the SIMD execution, we explain the performance influence in the PSC method, considering the "if-clause" of the cutoff radius check. The experiment results show that our PSC method is relatively more efficient compared to some traditional methods. In double precision, our 256-bit SIMD implementation is about 3 times faster than the scalar version.

  17. Wireless augmented reality communication system

    NASA Technical Reports Server (NTRS)

    Devereaux, Ann (Inventor); Agan, Martin (Inventor); Jedrey, Thomas (Inventor)

    2006-01-01

    The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.

  18. Heterogeneous high throughput scientific computing with APM X-Gene and Intel Xeon Phi

    DOE PAGES

    Abdurachmanov, David; Bockelman, Brian; Elmer, Peter; ...

    2015-05-22

    Electrical power requirements will be a constraint on the future growth of Distributed High Throughput Computing (DHTC) as used by High Energy Physics. Performance-per-watt is a critical metric for the evaluation of computer architectures for cost- efficient computing. Additionally, future performance growth will come from heterogeneous, many-core, and high computing density platforms with specialized processors. In this paper, we examine the Intel Xeon Phi Many Integrated Cores (MIC) co-processor and Applied Micro X-Gene ARMv8 64-bit low-power server system-on-a-chip (SoC) solutions for scientific computing applications. As a result, we report our experience on software porting, performance and energy efficiency and evaluatemore » the potential for use of such technologies in the context of distributed computing systems such as the Worldwide LHC Computing Grid (WLCG).« less

  19. An optical Fourier transform coprocessor with direct phase determination.

    PubMed

    Macfaden, Alexander J; Gordon, George S D; Wilkinson, Timothy D

    2017-10-20

    The Fourier transform is a ubiquitous mathematical operation which arises naturally in optics. We propose and demonstrate a practical method to optically evaluate a complex-to-complex discrete Fourier transform. By implementing the Fourier transform optically we can overcome the limiting O(nlogn) complexity of fast Fourier transform algorithms. Efficiently extracting the phase from the well-known optical Fourier transform is challenging. By appropriately decomposing the input and exploiting symmetries of the Fourier transform we are able to determine the phase directly from straightforward intensity measurements, creating an optical Fourier transform with O(n) apparent complexity. Performing larger optical Fourier transforms requires higher resolution spatial light modulators, but the execution time remains unchanged. This method could unlock the potential of the optical Fourier transform to permit 2D complex-to-complex discrete Fourier transforms with a performance that is currently untenable, with applications across information processing and computational physics.

  20. Semiempirical Quantum Chemical Calculations Accelerated on a Hybrid Multicore CPU-GPU Computing Platform.

    PubMed

    Wu, Xin; Koslowski, Axel; Thiel, Walter

    2012-07-10

    In this work, we demonstrate that semiempirical quantum chemical calculations can be accelerated significantly by leveraging the graphics processing unit (GPU) as a coprocessor on a hybrid multicore CPU-GPU computing platform. Semiempirical calculations using the MNDO, AM1, PM3, OM1, OM2, and OM3 model Hamiltonians were systematically profiled for three types of test systems (fullerenes, water clusters, and solvated crambin) to identify the most time-consuming sections of the code. The corresponding routines were ported to the GPU and optimized employing both existing library functions and a GPU kernel that carries out a sequence of noniterative Jacobi transformations during pseudodiagonalization. The overall computation times for single-point energy calculations and geometry optimizations of large molecules were reduced by one order of magnitude for all methods, as compared to runs on a single CPU core.

  1. A GaAs vector processor based on parallel RISC microprocessors

    NASA Astrophysics Data System (ADS)

    Misko, Tim A.; Rasset, Terry L.

    A vector processor architecture based on the development of a 32-bit microprocessor using gallium arsenide (GaAs) technology has been developed. The McDonnell Douglas vector processor (MVP) will be fabricated completely from GaAs digital integrated circuits. The MVP architecture includes a vector memory of 1 megabyte, a parallel bus architecture with eight processing elements connected in parallel, and a control processor. The processing elements consist of a reduced instruction set CPU (RISC) with four floating-point coprocessor units and necessary memory interface functions. This architecture has been simulated for several benchmark programs including complex fast Fourier transform (FFT), complex inner product, trigonometric functions, and sort-merge routine. The results of this study indicate that the MVP can process a 1024-point complex FFT at a speed of 112 microsec (389 megaflops) while consuming approximately 618 W of power in a volume of approximately 0.1 ft-cubed.

  2. Wireless Augmented Reality Communication System

    NASA Technical Reports Server (NTRS)

    Jedrey, Thomas (Inventor); Agan, Martin (Inventor); Devereaux, Ann (Inventor)

    2014-01-01

    The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.

  3. Wireless Augmented Reality Communication System

    NASA Technical Reports Server (NTRS)

    Agan, Martin (Inventor); Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor)

    2016-01-01

    The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.

  4. Non-Boolean computing with nanomagnets for computer vision applications

    NASA Astrophysics Data System (ADS)

    Bhanja, Sanjukta; Karunaratne, D. K.; Panchumarthy, Ravi; Rajaram, Srinath; Sarkar, Sudeep

    2016-02-01

    The field of nanomagnetism has recently attracted tremendous attention as it can potentially deliver low-power, high-speed and dense non-volatile memories. It is now possible to engineer the size, shape, spacing, orientation and composition of sub-100 nm magnetic structures. This has spurred the exploration of nanomagnets for unconventional computing paradigms. Here, we harness the energy-minimization nature of nanomagnetic systems to solve the quadratic optimization problems that arise in computer vision applications, which are computationally expensive. By exploiting the magnetization states of nanomagnetic disks as state representations of a vortex and single domain, we develop a magnetic Hamiltonian and implement it in a magnetic system that can identify the salient features of a given image with more than 85% true positive rate. These results show the potential of this alternative computing method to develop a magnetic coprocessor that might solve complex problems in fewer clock cycles than traditional processors.

  5. High performance flight computer developed for deep space applications

    NASA Technical Reports Server (NTRS)

    Bunker, Robert L.

    1993-01-01

    The development of an advanced space flight computer for real time embedded deep space applications which embodies the lessons learned on Galileo and modern computer technology is described. The requirements are listed and the design implementation that meets those requirements is described. The development of SPACE-16 (Spaceborne Advanced Computing Engine) (where 16 designates the databus width) was initiated to support the MM2 (Marine Mark 2) project. The computer is based on a radiation hardened emulation of a modern 32 bit microprocessor and its family of support devices including a high performance floating point accelerator. Additional custom devices which include a coprocessor to improve input/output capabilities, a memory interface chip, and an additional support chip that provide management of all fault tolerant features, are described. Detailed supporting analyses and rationale which justifies specific design and architectural decisions are provided. The six chip types were designed and fabricated. Testing and evaluation of a brass/board was initiated.

  6. Tempest: Accelerated MS/MS Database Search Software for Heterogeneous Computing Platforms.

    PubMed

    Adamo, Mark E; Gerber, Scott A

    2016-09-07

    MS/MS database search algorithms derive a set of candidate peptide sequences from in silico digest of a protein sequence database, and compute theoretical fragmentation patterns to match these candidates against observed MS/MS spectra. The original Tempest publication described these operations mapped to a CPU-GPU model, in which the CPU (central processing unit) generates peptide candidates that are asynchronously sent to a discrete GPU (graphics processing unit) to be scored against experimental spectra in parallel. The current version of Tempest expands this model, incorporating OpenCL to offer seamless parallelization across multicore CPUs, GPUs, integrated graphics chips, and general-purpose coprocessors. Three protocols describe how to configure and run a Tempest search, including discussion of how to leverage Tempest's unique feature set to produce optimal results. © 2016 by John Wiley & Sons, Inc. Copyright © 2016 John Wiley & Sons, Inc.

  7. Filling the implementation gap: a community-academic partnership approach to early intervention in psychosis.

    PubMed

    Hardy, Kate V; Moore, Melissa; Rose, Demian; Bennett, Robert; Jackson-Lane, Carletta; Gause, Michael; Jackson, Alma; Loewy, Rachel

    2011-11-01

    The aim of this study was to describe the development of a sustainable community early psychosis programme created through an academic-community partnership in the United States to other parties interested in implementing early psychosis services founded upon evidence-based practices within community settings. The service was developed around a sustainable core of key components, founded upon evidence-based practice, with additional flexible elements that could be adapted to the needs of the individual commissioning county. This paper describes the ways in which funding was sourced and secured as well as the partnerships developed through this process. Successful development of the Prevention and Recovery from Early Psychosis (PREP) programme in San Francisco County, California. PREP clinicians have received extensive training in the evidence-based approaches that are available through the programme and treated 30 clients and their families in the first year of operation. Development of a sustainable community programme of this type in a non-universal health-care setting, which is historically seen as non-integrated, required extensive partnering with agencies familiar with local resources. Implementation of the community-academic partnership bridged the gap between research and practice with successful integration of fidelity practice at the community level. The community partners were effective in sourcing funding and allocating resources, while the academic side of the partnership provided training in evidence-based models and oversight of clinical implementation of the model. Stringent evaluation of the impact of the service is our next focus. © 2011 Blackwell Publishing Asia Pty Ltd.

  8. Design of programmable intelligent cell phone jammer

    NASA Astrophysics Data System (ADS)

    Elangovan, Divya; Ravi, Aswin

    2011-12-01

    The usage of cell phones has increased enormously; at present silence and security is the need of the hour in many places. This can be done by using cell phone jammer, which blocks all the signals. This paper describes the design of an enhanced technique for jamming the cell phone signals. Our main objective is to concentrate on a specific band of frequency, which makes communication possible, by jamming this frequency we block out the specific signal that are responsible for making the call. This method enables the jammer to be more precise and effective, so precise that it can focus on specific area and allowing the programmer to define the area. The major advancement will be that emergency services can be availed which is very crucial in case of any calamity, they are intelligent devices as they act only after they receive signals and also it has a lesser power consumption than existing models. This technique has infinite potentials and sure can this be modified to match all our imaginations.

  9. A 1.3 giga pixels focal plane for GAIA

    NASA Astrophysics Data System (ADS)

    Laborie, Anouk; Pouny, Pierre; Vetel, Cyril; Collados, Emmanuel; Rougier, Gilles; Davancens, Robert; Zayer, Igor; Perryman, Michael; Pace, Oscar

    2004-06-01

    The astrometric mission GAIA is a cornerstone mission of the European Space Agency, due for launch in the 2010 time frame. Requiring extremely demanding performance GAIA calls for the development of an unprecedented large focal plane featuring innovative technologies. For securing the very challenging GAIA development, a significant number of technology activities have been initiated by ESA through a competitive selection process. In this context, an industrial consortium led by EADS-Astrium (France) with e2v technologies (UK) as major subcontractor was selected for the GAIA CCD and Focal Plane Technology Demonstrators programme, which is by far the most significant and the most critical GAIA pre-development for all aspects: science performance, development schedule and cost. This programme has started since August 2002 and will end early 2005 prior to commencement of the GAIA Phase B. While the GAIA payload will host three instruments and related focal planes, the major mission objectives are assigned to the Astrometric (ASTRO) Focal Plane, which is the subject of this presentation.

  10. [Public health stewardship and governance regarding the Colombian healthcare system, 2012-2013].

    PubMed

    Roth-Deubel, André N; Molina-Marín, Gloria

    2013-01-01

    Analysing decision-making concerning public health issues regarding the Colombian healthcare system from a market economy-based approach. This study involved applying Glaser and Strauss's grounded theory in six Colombian cities during 2012: Bogotá, Barranquilla, Bucaramanga, Leticia, Medellin and Pasto. 120 individual interviews were conducted with professionals involved in decision-making, running public healthcare programmes and making policy within public and private institutions. Fourteen focus groups were held with community organisation leaders. The findings suggested national and municipal health authorities' weak stewardship and ineffective governance regarding public healthcare policy and programmes, related to a lack of staff trained in public health management issues. In turn, this was related to political parties' interference and private insurers' particular interests and the structural fragmentation of functions and actors within the health system, thereby limiting public health development. A new axiology is necessary for achieving effective governance (I.e. cooperation between Colombian Healthcare Social Security System actors) to overcome current incompetence and financial self-interest predominating within the Colombian healthcare system.

  11. Antibiotic policies and the role of strategic hospital leadership.

    PubMed

    Masterson, R G

    1999-12-01

    Operational aspects, programme construction and implementation are all essential components of antimicrobial control but are not the direct remit of management and must rest with the professional provider. Hospital leaders can influence antibiotic control through the priority they give it. This must not be purely financially driven and must incorporate an awareness of issues surrounding patient care. Such attitudes should encompass the consequences of poor prescribing practices in both human and corporate terms. A leader's recognition of these elements can be expressed through securing resources in terms of both the human and hardware components. The best signalling of the status of this activity is through ensuring its inclusion in clinical governance and organisational Board reports. The goals for hospital leaders should be evidence of effective working practices and the execution of their own responsibilities by championing robust structures and procedures are in place. Potent hospital leadership delivered to the focus of antimicrobial control programmes is a major tool for their success.

  12. AES Cardless Automatic Teller Machine (ATM) Biometric Security System Design Using FPGA Implementation

    NASA Astrophysics Data System (ADS)

    Ahmad, Nabihah; Rifen, A. Aminurdin M.; Helmy Abd Wahab, Mohd

    2016-11-01

    Automated Teller Machine (ATM) is an electronic banking outlet that allows bank customers to complete a banking transactions without the aid of any bank official or teller. Several problems are associated with the use of ATM card such card cloning, card damaging, card expiring, cast skimming, cost of issuance and maintenance and accessing customer account by third parties. The aim of this project is to give a freedom to the user by changing the card to biometric security system to access the bank account using Advanced Encryption Standard (AES) algorithm. The project is implemented using Field Programmable Gate Array (FPGA) DE2-115 board with Cyclone IV device, fingerprint scanner, and Multi-Touch Liquid Crystal Display (LCD) Second Edition (MTL2) using Very High Speed Integrated Circuit Hardware (VHSIC) Description Language (VHDL). This project used 128-bits AES for recommend the device with the throughput around 19.016Gbps and utilized around 520 slices. This design offers a secure banking transaction with a low rea and high performance and very suited for restricted space environments for small amounts of RAM or ROM where either encryption or decryption is performed.

  13. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education.

    PubMed

    Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K

    2013-08-09

    Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy.

  14. The relationship between food insecurity and overweight/obesity differs by birthplace and length of US residence.

    PubMed

    Ryan-Ibarra, Suzanne; Sanchez-Vaznaugh, Emma V; Leung, Cindy; Induni, Marta

    2017-03-01

    To examine whether the cross-sectional association between food insecurity and overweight/obesity varied according to birthplace and length of residence in the USA among California women. Using cross-sectional, population-based data from the California Women's Health Survey (CWHS) 2009-2012, we examined whether the association between food insecurity and overweight or obesity varied by birthplace-length of US residence. California, USA. Women (n 16 008) aged 18 years or older. Among US-born women, very low food security (prevalence ratio (PR)=1·21; 95 % CI 1·11, 1·31) and low food security (PR=1·19; 95 % CI 1·10, 1·28) were significantly associated with higher prevalence of overweight/obesity, after controlling for age, marital status, race/ethnicity, poverty and education. Among immigrant women who lived in the USA for 10 years or longer, very low food security was significantly associated with higher prevalence of overweight/obesity, after controlling for covariates (PR=1·16; 95 % CI 1·07, 1·27). Among immigrant women who had lived in the USA for less than 10 years, low and very low food security were not significantly associated with overweight/obesity, after controlling for covariates. Food insecurity may be an important pathway through which weight may increase with longer US residence among immigrant women. Public health programmes and policies should focus on increasing food security for all women, including immigrant women, as one strategy to reduce the prevalence of overweight/obesity.

  15. Situational analysis of infant and young child nutrition policies and programmatic activities in the Islamic Republic of Mauritania.

    PubMed

    Wuehler, Sara E; El Hafed Ould Dehah, Cheikh Mohamed

    2011-04-01

    Progress towards reducing mortality and malnutrition among children <5 years of age has been less than needed to achieve related Millennium Development Goals (MDGs), so several international agencies joined to 'reposition children's right to adequate nutrition in the Sahel', starting with an analysis of current activities related to infant and young child nutrition (IYCN). The main objectives of the situational analysis are to compile, analyse, and interpret available information on infant and child feeding, and the nutrition and health situation of children <2 years of age in Mauritania as one of the six target countries (Burkina Faso, Chad, Mali, Mauritania, Niger, Senegal). These findings are available to assist countries in identifying inconsistencies and filling gaps in current programming. Between August and November of 2008, key informants responsible for conducting IYCN-related activities in Mauritania were interviewed, and 46 documents were examined on the following themes: optimal breastfeeding and complementary feeding practices, prevention of micronutrient deficiencies, prevention of mother-to-child transmission of human immunodeficiency virus (HIV), management of acute malnutrition, food security, and hygienic practices. Mauritania is on track to reaching the MDG of halving undernutrition among children <5 years of age by 2015. National policy documents, training guides, and programmes address nearly all of the key IYCN topics, specifically or generally. Exceptions are the use of zinc supplements in diarrhoea treatment, prevention of zinc deficiency, and dietary guidelines for preventing mother-to-child transmission of HIV. Substantial infrastructure capacity building was also recently implemented in nutritionally high-risk regions, and increases were reported in exclusive breastfeeding rates among children <6 months. The recent National Behaviour Change Communication Strategy is intended to address the needs of adapting programme activities to local needs. Despite these noteworthy accomplishments, the prevalence of acute malnutrition remains high, mortality rates did not decrease as malnutrition rates decreased, the overall prevalence of desirable nutrition-related practices is low, and human resources are reportedly insufficient to carry out all nutrition-related programme activities. Very little nutrition research has been conducted in Mauritania, and key informants identified gaps in adapting international programmes to local needs. Monitoring and evaluation reports have not been rigorous enough to identify which programme activities were implemented as designed or whether programmes were effective at improving nutritional and health status of young children. Therefore, we could not confirm which programmes might have been responsible for the reported improvements, or if other population-wide changes contributed to these changes. The policy framework is supportive of optimal IYCN practices, but greater resources and capacity building are needed to (i) support activities to adapt training materials and programme protocols to fit local needs, (ii) expand and track the implementation of evidence-based programmes nationally, (iii) improve and carry out monitoring and evaluation that identify effective and ineffective programmes, and (iv) apply these findings in developing, disseminating, and improving effective programmes. © 2011 Blackwell Publishing Ltd.

  16. How does context influence performance of community health workers in low- and middle-income countries? Evidence from the literature.

    PubMed

    Kok, Maryse C; Kane, Sumit S; Tulloch, Olivia; Ormel, Hermen; Theobald, Sally; Dieleman, Marjolein; Taegtmeyer, Miriam; Broerse, Jacqueline E W; de Koning, Korrie A M

    2015-03-07

    Community health workers (CHWs) are increasingly recognized as an integral component of the health workforce needed to achieve public health goals in low- and middle-income countries (LMICs). Many factors intersect to influence CHW performance. A systematic review with a narrative analysis was conducted to identify contextual factors influencing performance of CHWs. We searched six databases for quantitative, qualitative, and mixed-methods studies that included CHWs working in promotional, preventive or curative primary health care services in LMICs. We differentiated CHW performance outcome measures at two levels: CHW level and end-user level. Ninety-four studies met the inclusion criteria and were double read to extract data relevant to the context of CHW programmes. Thematic coding was conducted and evidence on five main categories of contextual factors influencing CHW performance was synthesized. Few studies had the influence of contextual factors on CHW performance as their primary research focus. Contextual factors related to community (most prominently), economy, environment, and health system policy and practice were found to influence CHW performance. Socio-cultural factors (including gender norms and values and disease related stigma), safety and security and education and knowledge level of the target group were community factors that influenced CHW performance. Existence of a CHW policy, human resource policy legislation related to CHWs and political commitment were found to be influencing factors within the health system policy context. Health system practice factors included health service functionality, human resources provisions, level of decision-making, costs of health services, and the governance and coordination structure. All contextual factors can interact to shape CHW performance and affect the performance of CHW interventions or programmes. Research on CHW programmes often does not capture or explicitly discuss the context in which CHW interventions take place. This synthesis situates and discusses the influence of context on CHW and programme performance. Future health policy and systems research should better address the complexity of contextual influences on programmes. This insight can help policy makers and programme managers to develop CHW interventions that adequately address and respond to context to optimise performance.

  17. Children with Moderate Acute Malnutrition with No Access to Supplementary Feeding Programmes Experience High Rates of Deterioration and No Improvement: Results from a Prospective Cohort Study in Rural Ethiopia

    PubMed Central

    James, Philip; Sadler, Kate; Wondafrash, Mekitie; Argaw, Alemayehu; Luo, Hanqi; Geleta, Benti; Kedir, Kiya; Getnet, Yilak; Belachew, Tefera; Bahwere, Paluku

    2016-01-01

    Background Children with moderate acute malnutrition (MAM) have an increased risk of mortality, infections and impaired physical and cognitive development compared to well-nourished children. In parts of Ethiopia not considered chronically food insecure there are no supplementary feeding programmes (SFPs) for treating MAM. The short-term outcomes of children who have MAM in such areas are not currently described, and there remains an urgent need for evidence-based policy recommendations. Methods We defined MAM as mid-upper arm circumference (MUAC) of ≥11.0cm and <12.5cm with no bilateral pitting oedema to include Ethiopian government and World Health Organisation cut-offs. We prospectively surveyed 884 children aged 6–59 months living with MAM in a rural area of Ethiopia not eligible for a supplementary feeding programme. Weekly home visits were made for seven months (28 weeks), covering the end of peak malnutrition through to the post-harvest period (the most food secure window), collecting anthropometric, socio-demographic and food security data. Results By the end of the study follow up, 32.5% (287/884) remained with MAM, 9.3% (82/884) experienced at least one episode of SAM (MUAC <11cm and/or bilateral pitting oedema), and 0.9% (8/884) died. Only 54.2% of the children recovered with no episode of SAM by the end of the study. Of those who developed SAM half still had MAM at the end of the follow up period. The median (interquartile range) time to recovery was 9 (4–15) weeks. Children with the lowest MUAC at enrolment had a significantly higher risk of remaining with MAM and a lower chance of recovering. Conclusions Children with MAM during the post-harvest season in an area not eligible for SFP experience an extremely high incidence of SAM and a low recovery rate. Not having a targeted nutrition-specific intervention to address MAM in this context places children with MAM at excessive risk of adverse outcomes. Further preventive and curative approaches should urgently be considered. PMID:27100177

  18. Children with Moderate Acute Malnutrition with No Access to Supplementary Feeding Programmes Experience High Rates of Deterioration and No Improvement: Results from a Prospective Cohort Study in Rural Ethiopia.

    PubMed

    James, Philip; Sadler, Kate; Wondafrash, Mekitie; Argaw, Alemayehu; Luo, Hanqi; Geleta, Benti; Kedir, Kiya; Getnet, Yilak; Belachew, Tefera; Bahwere, Paluku

    2016-01-01

    Children with moderate acute malnutrition (MAM) have an increased risk of mortality, infections and impaired physical and cognitive development compared to well-nourished children. In parts of Ethiopia not considered chronically food insecure there are no supplementary feeding programmes (SFPs) for treating MAM. The short-term outcomes of children who have MAM in such areas are not currently described, and there remains an urgent need for evidence-based policy recommendations. We defined MAM as mid-upper arm circumference (MUAC) of ≥11.0 cm and <12.5 cm with no bilateral pitting oedema to include Ethiopian government and World Health Organisation cut-offs. We prospectively surveyed 884 children aged 6-59 months living with MAM in a rural area of Ethiopia not eligible for a supplementary feeding programme. Weekly home visits were made for seven months (28 weeks), covering the end of peak malnutrition through to the post-harvest period (the most food secure window), collecting anthropometric, socio-demographic and food security data. By the end of the study follow up, 32.5% (287/884) remained with MAM, 9.3% (82/884) experienced at least one episode of SAM (MUAC <11 cm and/or bilateral pitting oedema), and 0.9% (8/884) died. Only 54.2% of the children recovered with no episode of SAM by the end of the study. Of those who developed SAM half still had MAM at the end of the follow up period. The median (interquartile range) time to recovery was 9 (4-15) weeks. Children with the lowest MUAC at enrolment had a significantly higher risk of remaining with MAM and a lower chance of recovering. Children with MAM during the post-harvest season in an area not eligible for SFP experience an extremely high incidence of SAM and a low recovery rate. Not having a targeted nutrition-specific intervention to address MAM in this context places children with MAM at excessive risk of adverse outcomes. Further preventive and curative approaches should urgently be considered.

  19. Holo-Chidi video concentrator card

    NASA Astrophysics Data System (ADS)

    Nwodoh, Thomas A.; Prabhakar, Aditya; Benton, Stephen A.

    2001-12-01

    The Holo-Chidi Video Concentrator Card is a frame buffer for the Holo-Chidi holographic video processing system. Holo- Chidi is designed at the MIT Media Laboratory for real-time computation of computer generated holograms and the subsequent display of the holograms at video frame rates. The Holo-Chidi system is made of two sets of cards - the set of Processor cards and the set of Video Concentrator Cards (VCCs). The Processor cards are used for hologram computation, data archival/retrieval from a host system, and for higher-level control of the VCCs. The VCC formats computed holographic data from multiple hologram computing Processor cards, converting the digital data to analog form to feed the acousto-optic-modulators of the Media lab's Mark-II holographic display system. The Video Concentrator card is made of: a High-Speed I/O (HSIO) interface whence data is transferred from the hologram computing Processor cards, a set of FIFOs and video RAM used as buffer for data for the hololines being displayed, a one-chip integrated microprocessor and peripheral combination that handles communication with other VCCs and furnishes the card with a USB port, a co-processor which controls display data formatting, and D-to-A converters that convert digital fringes to analog form. The co-processor is implemented with an SRAM-based FPGA with over 500,000 gates and controls all the signals needed to format the data from the multiple Processor cards into the format required by Mark-II. A VCC has three HSIO ports through which up to 500 Megabytes of computed holographic data can flow from the Processor Cards to the VCC per second. A Holo-Chidi system with three VCCs has enough frame buffering capacity to hold up to thirty two 36Megabyte hologram frames at a time. Pre-computed holograms may also be loaded into the VCC from a host computer through the low- speed USB port. Both the microprocessor and the co- processor in the VCC can access the main system memory used to store control programs and data for the VCC. The Card also generates the control signals used by the scanning mirrors of Mark-II. In this paper we discuss the design of the VCC and its implementation in the Holo-Chidi system.

  20. Visually Impaired OLder people's Exercise programme for falls prevenTion (VIOLET): a feasibility study protocol

    PubMed Central

    Skelton, Dawn A; Bailey, Cathy; Howel, Denise; Cattan, Mima; Deary, Vincent; Coe, Dot; de Jong, Lex D; Gawler, Sheena; Gray, Joanne; Lampitt, Rosy; Wilkinson, Jennifer; Adams, Nicola

    2016-01-01

    Introduction In the UK, 1 in 5 people aged 75 and over live with sight loss. Visually impaired older people (VIOP) have an above average incidence of falls and 1.3–1.9 times more likely to experience hip fractures, than the general population. Older people with eye diseases are ∼3 times more likely than those with good vision, to limit activities due to fear of falling. This feasibility study aims to adapt the group-based Falls Management Exercise (FaME) programme to the needs of VIOP and carry out an external pilot trial to inform the design of a future definitive randomised controlled trial. Methods and design A UK based 2-centre mixed methods, randomised, feasibility study will be conducted over 28 months. Stakeholder panels, including VIOP, will make recommendations for adaptations to an existing exercise programme (FaME), to meet the needs of VIOP, promoting uptake and adherence, while retaining required effective components of the exercise programme. 80 VIOP aged 60 and over, living at home, ambulant with or without a walking aid, will be recruited in Newcastle (n=40) and Glasgow (n=40) through National Health Service (NHS) Trusts and third sector partners. Participants randomised into the intervention arm will receive the adapted FaME programme. Participants randomised into the control arm will continue with usual activity. Outcomes are, recruitment rate, adherence and validated measures including fear of falling and quality of life. Postintervention in-depth qualitative interviews will be conducted with a purposive sample of VIOP (N=10). Postural stability instructors will be interviewed, before trial-specific training and following the intervention. Ethics and dissemination Ethics approval was secured through the National Research Ethics Service (NRES) Committee North East, Newcastle and North Tyneside 2. Glasgow Caledonian University was approved as a non-NHS site with local ethics approval. Findings will be disseminated through peer-reviewed journals, national and international conferences. Trial registration number ISRCTN16949845. PMID:27486124

  1. [Public health competencies and contents in Spanish university degree programmes of Veterinary Medicine].

    PubMed

    Davó-Blanes, María Del Carmen; Vives-Cases, Carmen; Huerta, Belén

    2017-04-19

    To reach a consensus among public health faculty from various Spanish universities about the core public health competencies that should be integrated into the Veterinary Medicine degree training. The 3rd Forum of University Professors of Public Health was held at the School of Veterinary Medicine of the University of Cordoba (12-13 January 2016). Forty-two university professors and lecturers from nine Spanish universities with veterinary degrees participated in the forum. They were divided into five working groups during three working sessions to identify and classify core public health competencies for the Veterinary Medicine degree, propose public health contents for the identified competencies and organize such contents in thematic blocks. The results were discussed in different plenary sessions. The highest number of core competencies was identified in the activities related to the following public health functions: «Assessment of the population's health needs» and «Developing health policies». The final programme included basic contents organized into five units: 1) Fundamentals of public health; 2) Study and research in public health; 3) Production, animal health and environment; 4) Food security; and 5) Health education. The public health core competencies and contents identified in this Forum may be considered as a starting point to update public health training programmes for future veterinary professionals. Copyright © 2017 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  2. An Information Theory-Inspired Strategy for Design of Re-programmable Encrypted Graphene-based Coding Metasurfaces at Terahertz Frequencies.

    PubMed

    Momeni, Ali; Rouhi, Kasra; Rajabalipanah, Hamid; Abdolali, Ali

    2018-04-18

    Inspired by the information theory, a new concept of re-programmable encrypted graphene-based coding metasurfaces was investigated at terahertz frequencies. A channel-coding function was proposed to convolutionally record an arbitrary information message onto unrecognizable but recoverable parity beams generated by a phase-encrypted coding metasurface. A single graphene-based reflective cell with dual-mode biasing voltages was designed to act as "0" and "1" meta-atoms, providing broadband opposite reflection phases. By exploiting graphene tunability, the proposed scheme enabled an unprecedented degree of freedom in the real-time mapping of information messages onto multiple parity beams which could not be damaged, altered, and reverse-engineered. Various encryption types such as mirroring, anomalous reflection, multi-beam generation, and scattering diffusion can be dynamically attained via our multifunctional metasurface. Besides, contrary to conventional time-consuming and optimization-based methods, this paper convincingly offers a fast, straightforward, and efficient design of diffusion metasurfaces of arbitrarily large size. Rigorous full-wave simulations corroborated the results where the phase-encrypted metasurfaces exhibited a polarization-insensitive reflectivity less than -10 dB over a broadband frequency range from 1 THz to 1.7 THz. This work reveals new opportunities for the extension of re-programmable THz-coding metasurfaces and may be of interest for reflection-type security systems, computational imaging, and camouflage technology.

  3. Promoting wellbeing and improving access to mental health care through community champions in rural India: the Atmiyata intervention approach.

    PubMed

    Shields-Zeeman, Laura; Pathare, Soumitra; Walters, Bethany Hipple; Kapadia-Kundu, Nandita; Joag, Kaustubh

    2017-01-01

    There are limited accounts of community-based interventions for reducing distress or providing support for people with common mental disorders (CMDs) in low and middle-income countries. The recently implemented Atmiyata programme is one such community-based mental health intervention focused on promoting wellness and reducing distress through community volunteers in a rural area in the state of Maharashtra, India. This case study describes the content and the process of implementation of Atmiyata and how community volunteers were trained to become Atmiyata champions and mitras ( friends ). The Atmiyata programme trained Atmiyata champions to provide support and basic counselling to community members with common mental health disorders, facilitate access to mental health care and social benefits, improve community awareness of mental health issues, and to promote well-being. Challenges to implementation included logistical challenges (difficult terrain and weather conditions at the implementation site), content-related challenges (securing social welfare benefits for people with CMDs), and partnership challenges (turnover of public health workers involved in referral chain, resistance from public sector mental health specialists). The case study serves as an example for how such a model can be sustained over time at low cost. The next steps of the programme include evaluation of the impact of the Atmiyata intervention through a pre-post study and adapting the intervention for further scale-up in other settings in India.

  4. Effects of a weight-gain restriction programme for obese pregnant women on sickness absence and pregnancy benefits

    PubMed Central

    2013-01-01

    Abstract Objective To evaluate the effect of a weight-gain restriction programme for obese pregnant women on sickness absence days and pregnancy benefit days during pregnancy and postpartum. Design A prospective, controlled intervention study. The Swedish Social Security Agency's records were utilized to compile sickness absence and pregnancy benefit information. Setting Antenatal care clinics in the south-east of Sweden. Subjects One hundred fifty-five obese pregnant women who participated in a weight restriction program with weekly structured motivational and behavioural talks combined with aqua-aerobics during pregnancy. A total of 193 obese pregnant women with no intervention served as controls. Main outcome measures Sickness absence benefits and pregnancy benefits expressed as a percentage. Results On average women in the intervention group had 76.68 total full days of sickness absence benefit compared with 53.09days in the control group. Total full days of pregnancy benefits were 39.66% days and 41.41% for the intervention and control groups respectively. For the women who were on sick leave there were no differences between the groups in the amount of days taken. Conclusions Given the complexity of factors that have an influence on sickness absence leave, it is possible that programmes that do not address the influence of social aspects and attitudes towards sickness absence have limited effect. PMID:23301596

  5. Why have the majority of recent polio cases occurred in countries affected by Islamist militancy? A historical comparative analysis of the political determinants of polio in Nigeria, Somalia, Pakistan, Afghanistan and Syria.

    PubMed

    Kennedy, Jonathan

    2016-01-01

    This article aims to understand why the last few areas where polio remains are affected by armed conflicts involving militant organizations that use Islam to legitimize their activities. The first section critically analyses the argument that Muslims' animosity towards polio vaccination programmes is a consequence of their irrational, backward, anti-Western theology. This argument is depoliticizing, ahistorical and orientalist. Moreover, it does not explain why Islamist militant groups' attitudes to polio vaccination campaigns vary between countries. The second section analyses official documents, newspaper articles, interviews and historical and ethnographic accounts to understand the relationship between Islamist militant groups and polio in five countries - Nigeria, Somalia, Pakistan, Afghanistan and Syria - that account for 95% of the world's polio cases since 2012. I demonstrate that specific political grievances related to the postcolonial state and/or foreign military intervention help to explain variations in militant groups' attitudes to polio vaccination programmes. The paper concludes by considering the policy implications of the analysis. Improved access for polio vaccinators is not predicated on military victory against the militants but securing support of de facto political leaders. This can be achieved by developing a better understanding of the specific sociopolitical contexts in which immunization programmes operate.

  6. Creating an Assured Joint DOD and Interagency Interoperable Net-Centric Enterprise. Report of the Defense Science Board Task Force on Achieving Interoperability in a Net-Centric Environment

    DTIC Science & Technology

    2009-03-01

    policy, elliptic curve public key cryptography using the 256 -bit prime modulus elliptic curve as specified in FIPS-186-2 and SHA - 256 are appropriate for...publications/fips/fips186-2/fips186-2-change1.pdf 76 I P ART I . CH A PT E R 5 Hashing via the Secure Hash Algorithm (using SHA - 256 and...lithography and processing techniques. Field programmable gate arrays ( FPGAs ) are a chip design of interest. These devices are extensively used in

  7. Provably secure time distribution for the electric grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith IV, Amos M; Evans, Philip G; Williams, Brian P

    We demonstrate a quantum time distribution (QTD) method that combines the precision of optical timing techniques with the integrity of quantum key distribution (QKD). Critical infrastructure is dependent on microprocessor- and programmable logic-based monitoring and control systems. The distribution of timing information across the electric grid is accomplished by GPS signals which are known to be vulnerable to spoofing. We demonstrate a method for synchronizing remote clocks based on the arrival time of photons in a modifed QKD system. This has the advantage that the signal can be veried by examining the quantum states of the photons similar to QKD.

  8. Science in 60 – Tiny Satellites, Big Science

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sullivan, Erica

    2016-05-05

    When cube satellites first sprung on the scene in the late 1990s, they were seen as cheap, cute and novel. But today, these lunch-box-sized orbiters are heralded as powerful, cost-effective tools that help strengthen our national security presence in space. Los Alamos National Laboratory developed, built and tested CubeSats that are easily programmable from the ground, making them responsive to up-to-the-minute, mission-critical needs. While CubeSats are still the new kid on the celestial block, that’s about to change. These small, agile pieces of technology hold a universe of promise.

  9. SERENITY Aware Development of Security and Dependability Solutions

    NASA Astrophysics Data System (ADS)

    Serrano, Daniel; Maña, Antonio; Llarena, Rafael; Crespo, Beatriz Gallego-Nicasio; Li, Keqin

    This chapter presents an infrastructure supporting the implementation of Executable Components (ECs). ECs represent S&D solutions at the implementation level, that is, by means of pieces of executable code. ECs are instantiated by the Serenity runtime Framework (SRF) as a result of requests coming from applications. The development of ECs requires programmers having specific technical knowledge about SERENITY, since they need to implement certain interfaces of the ECs according to SERENITY standards. Every EC has to implement, the interface between the SRF and the EC itself, and the interface that the EC offers to applications.

  10. Self-imposed evaluation of the Helmholtz Research School MICMoR as a tool for quality assurance and advancement of a structured graduate programme

    NASA Astrophysics Data System (ADS)

    Elija Bleher, Bärbel; Schmid, Hans Peter; Scholz, Beate

    2015-04-01

    The Helmholtz Research School MICMoR (Mechanisms and Interactions of Climate Change in Mountain Regions) offers a structured graduate programme for doctoral students in the field of climate change research. It is hosted by the Institute of Meteorology and Climate Research (KIT/IMK-IFU) in Garmisch-Partenkirchen, in collaboration with 7 Bavarian partner universities and research institutions. Hence, MICMoR brings together a considerably large network with currently 20 doctoral students and 55 scientists. MICMoR offers scientific and professional skills training, provides a state-of-the-art supervision concept, and fosters international exchange and interdisciplinary collaboration. In order to develop and advance its programme, MICMoR has committed itself to a self-imposed mid-term review in its third year, to monitor to which extent its original objectives have been reached, and to explore and identify where MICMoR has room for improvement. The evaluation especially focused on recruitment, supervision, training, networking and cooperation. Carried out by an external expert (Beate Scholz from scholz ctc), the evaluation was based on a mixed methods approach, i.e. combining a quantitative survey involving all doctoral candidates as well as their supervisors and focus groups with different MICMoR stakeholders. The evaluation has brought forward some highly interesting results, pinpointing challenges and opportunities of setting up a structured doctoral programme. Overall, the evaluation proved to be a useful tool for evidence-based programme and policy planning, and demonstrated a high level of satisfaction of supervisors and fellows. Supervision, with facets ranging from disciplinary feedback to career advice, is demanding and requires strong commitment and adequate human resources development by all parties involved. Thus, MICMoR plans to offer mentor coaching and calls on supervisors and mentors to form a community of learners with their doctoral students. To realize this vision, a long way lies ahead for all participants. Here, the evaluation provided useful suggestions on how to best use scarce time resources. Due to the fact that MICMoR's fellowships provide only supplemental funding for its fellows to participate in the programme, their base funding (salaries, stipends) needs to be secured independently, e.g. through project funds. However, this created a significant challenge as doctoral topics were determined more by the projects' research questions than by the research school's research focus. To improve this situation, MICMoR introduced some full stipends in its third year. We conclude that, in order to successfully run an interdisciplinary, multi-network research school, sufficient funds for its general framework, but also for doctoral stipends/salaries are needed to obtain a more accurate fit between the programme's research focus and the doctoral topics. Furthermore, a high level of commitment and identification with the programme of both, doctoral students and their supervisors, is required. Finally, regular review and programme assessment are essential for tailored programme development and strategy planning.

  11. The humanitarian emergency in Burundi: evaluation of the operational strategy for management of nutritional crisis.

    PubMed

    Rossi, Laura; Verna, Daniel; Villeneuve, Susie L

    2008-07-01

    To evaluate the impact and appropriateness of programmes for the management and treatment of severe malnutrition in emergency situations. A central unified database was set up with all data and statistics provided by nutritional centres (NC) active in Burundi. The paper describes the case of Burundi as an example of the response of the humanitarian community to nutritional crisis. Since 1999, more than one million (1,054,210) severely malnourished patients were treated in NC established in Burundi. Peaks of beneficiaries were registered in 2000 and 2001; the admission rate started to decrease in 2002. In 2004, twenty therapeutic feeding centres (TFC) and 224 supplementary feeding centres (SFC) were active for the treatment of 127,420 beneficiaries. Nutritional programmes were present in every province with a coverage rate of 55%. The most convincing impact of the nutritional programme in Burundi was the reduction of mortality rate in children under 5 years of age; an impact on the prevalence of acute malnutrition could not be demonstrated. Children under 5 years old accounted for 62% of beneficiaries in TFC and 76% in SFC. TFC performance indicators fulfilled the minimum standards in disaster response; the performance of SFC was not so optimal with a low recovery rate (69% v. >80%) and a high non-respondent rate (16% v. <5%). With the combination of coverage and cure rate, the programme met 44% of the assessed needs in 2004. In Burundi the stabilisation of security conditions permitted a combination of humanitarian responses ranging from emergency activities to strengthening of community-based initiatives that could correct the coverage and impact limitations.

  12. Addressing sexual health behaviour during emerging adulthood: a critical review of the literature

    PubMed Central

    Alexander, Kamila A; Jemmott1, Loretta S; Teitelman, Anne M; D’Antonio, Patricia

    2016-01-01

    Aims and objectives In this critical literature review, we examine evidence-based interventions that target sexual behaviours of 18- to 25-year-old emerging adult women. Background Nurses and clinicians implement theory-driven research programmes for young women with increased risk of HIV/AIDS and sexually transmitted infections. Strategies to decrease transmission of HIV and sexually transmitted infections are rigorously evaluated and promoted by public health agencies such as the United States Centers for Disease Control and Prevention. While many interventions demonstrate episodic reductions in sexual risk behaviours and infection transmission, there is little evidence they build sustainable skills and behaviours. Programmes may not attend to contextual and affective influences on sexual behaviour change. Design Discursive paper. Methods We conducted a conceptually based literature review and critical analysis of the Centers for Disease Control and Prevention’s best-evidence and good-evidence HIV behavioural interventions. In this review, we examined three contextual and affective influences on the sexual health of emerging adult women: (1) developmental age, (2) reproduction and pregnancy desires and (3) sexual security or emotional responses accompanying relationship experiences. Results Our analyses revealed intervention programmes paid little attention to ways age, desires for pregnancy or emotional factors influence sexual decisions. Some programmes included 18- to 25-year-olds, but they made up small percentages of the sample and did not attend to unique emerging adult experiences. Second, primary focus on infection prevention overshadowed participant desires for pregnancy. Third, few interventions considered emotional mechanisms derived from relationship experiences involved in sexual decision-making. Conclusions Growing evidence demonstrates sexual health interventions may be more effective if augmented to attend to contextual and affective influences on relationship risks and decision-making. Modifying currently accepted strategies may enhance sustainability of sexual health-promoting behaviours. PMID:24988875

  13. Fish farming as an innovative strategy for promoting food security in drought risk regions of Zimbabwe

    PubMed Central

    2017-01-01

    This article examines the implementation of fish farming as an innovative and economic strategy for promoting food security and dietary diversities among vulnerable households in drought risk areas of Zimbabwe. The declining climatic conditions and lack of economic opportunities in Mwenezi district of Zimbabwe attracted the attention of three non-governmental organisations (NGOs) to implement fish farming as an innovative mechanism to stimulate food security and generate employment in the district. The article used a qualitative research approach that includes semi-structured interviews and secondary data. The purposive sampling technique was adopted to interview participants in Mwenezi district who were involved in fish farming to assess and explore the experiences and benefits they derive from such development projects. Results for the article revealed that fish farming was well embraced by local communities as it led to improvements in food security, household income and employment regeneration. The local government including traditional leadership (Chiefs and Headmen’s) supported the NGO activities as they benefited local communities. The article concludes that although fish farming was instrumental in regenerating employment, some participants still fail to participate because of laziness and desire to maintain dependency syndrome. The article recommends the NGOs to launch awareness campaigns in rural communities and increase networking with the donor community which is fundamental in attracting sustainable funding. The government can also promote fish farming in vulnerable rural communities by providing funding and capacity building programmes. PMID:29955350

  14. The Subjective Experiences of Firesetting by Men With Mild Intellectual Disabilities Detained in a Secure Hospital.

    PubMed

    Rose, John; Lees-Warley, Gemma; Thrift, Su

    2016-08-01

    This article explores the lived experiences of men with mild intellectual disabilities who have deliberately set a fire and are detained in a secure hospital. Semi-structured interviews were used to explore the subjective experiential claims of seven male firesetters with mild intellectual disabilities residing in a forensic intellectual disability hospital. Interpretative Phenomenological Analysis was used to interpret participants' meaning making of their firesetting. Five super-ordinate themes emerged from the analysis: (a) "the importance of the first fire," (b) "firesetting to escape distress," (c) "firesetting to enable positive emotional experiences," (d) "firesetting to communicate with services," and (e) "Fire Setters Treatment Programme." The analysis provides an understanding of why some firesetting behaviours emerge and highlights factors that contribute to the maintenance and desistence of repeat firesetting acts. The findings are considered in relation to evolving risk assessment measures and risk reduction strategies for facilitating rehabilitation into community settings. © The Author(s) 2015.

  15. An account of co-ordination mechanisms for humanitarian assistance during the international response to the 1994 crisis in Rwanda.

    PubMed

    Borton, J

    1996-12-01

    This paper examines the co-ordination strategies developed to respond to the Great Lakes crisis following the events of April 1994. It analyses the different functions and mechanisms which sought to achieve a co-ordinated response--ranging from facilitation at one extreme to management and direction at the other. The different regimes developed to facilitate co-ordination within Rwanda and neighbouring countries, focusing on both inter-agency and inter-country co-ordination issues, are then analysed. Finally, the paper highlights the absence of mechanisms to achieve coherence between the humanitarian, political and security domains. It concludes that effective co-ordination is critical not only to achieve programme efficiency, but to ensure that the appropriate instruments and strategies to respond to complex political emergencies are in place. It proposes a radical re-shaping of international humanitarian, political and security institutions, particularly the United Nations, to improve the effectiveness of humanitarian and political responses to crises such as that in the Great Lakes.

  16. Hybrid breeding in wheat: technologies to improve hybrid wheat seed production.

    PubMed

    Whitford, Ryan; Fleury, Delphine; Reif, Jochen C; Garcia, Melissa; Okada, Takashi; Korzun, Viktor; Langridge, Peter

    2013-12-01

    Global food security demands the development and delivery of new technologies to increase and secure cereal production on finite arable land without increasing water and fertilizer use. There are several options for boosting wheat yields, but most offer only small yield increases. Wheat is an inbred plant, and hybrids hold the potential to deliver a major lift in yield and will open a wide range of new breeding opportunities. A series of technological advances are needed as a base for hybrid wheat programmes. These start with major changes in floral development and architecture to separate the sexes and force outcrossing. Male sterility provides the best method to block self-fertilization, and modifying the flower structure will enhance pollen access. The recent explosion in genomic resources and technologies provides new opportunities to overcome these limitations. This review outlines the problems with existing hybrid wheat breeding systems and explores molecular-based technologies that could improve the hybrid production system to reduce hybrid seed production costs, a prerequisite for a commercial hybrid wheat system.

  17. Design and Implementation of Website Information Disclosure Assessment System

    PubMed Central

    Cho, Ying-Chiang; Pan, Jen-Yi

    2015-01-01

    Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people’s lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail address and network database leakages. These leakages have many causes. For example, malicious users can steal database contents, taking advantage of mistakes made by programmers and administrators. In order to mitigate this type of abuse, a website information disclosure assessment system is proposed in this study. This system utilizes a series of technologies, such as web crawler algorithms, SQL injection attack detection, and web vulnerability mining, to assess a website’s information disclosure. Thirty websites, randomly sampled from the top 50 world colleges, were used to collect leakage information. This testing showed the importance of increasing the security and privacy of website information for academic websites. PMID:25768434

  18. Vulnerabilities in GSM technology and feasibility of selected attacks

    NASA Astrophysics Data System (ADS)

    Voznak, M.; Prokes, M.; Sevcik, L.; Frnda, J.; Toral-Cruz, Homer; Jakovlev, Sergej; Fazio, Peppino; Mehic, M.; Mikulec, M.

    2015-05-01

    Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem's occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting - Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.

  19. Resilient patriarchy: public authority and women's (in)security in Karamoja, Uganda.

    PubMed

    Hopwood, Julian; Porter, Holly; Saum, Nangiro

    2018-01-01

    This paper draws on fieldwork conducted in 2011 and 2016 to explore the differing experiences of Karamojong women following the Government of Uganda's most recent disarmament programme. Besides being deprived of their guns, Karamojong communities have lost most of the cattle on which their livelihoods and way of life were centred. The study assesses whether or not women's experience of patriarchy has changed in these new circumstances, and, if so, how this impacts on their security and control of resources, or the absence of them. It maps, using information primarily supplied by women, public authorities from below, and evaluates if and how they respond to women's protection and survival needs, as well as if current development/humanitarian interventions are of sustainable benefit to Karamojong women. The paper concludes that apparent shifts in gender relations are probably superficial, contingent on continuing food aid, and that economic development and positive social change for women remain elusive. © 2018 The Author(s). Disasters © Overseas Development Institute, 2018.

  20. Submillimetre wave imaging and security: imaging performance and prediction

    NASA Astrophysics Data System (ADS)

    Appleby, R.; Ferguson, S.

    2016-10-01

    Within the European Commission Seventh Framework Programme (FP7), CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) has designed and is fabricating a stand-off system operating at sub-millimetre wave frequencies for the detection of objects concealed on people. This system scans people as they walk by the sensor. This paper presents the top level system design which brings together both passive and active sensors to provide good performance. The passive system operates in two bands between 100 and 600GHz and is based on a cryogen free cooled focal plane array sensor whilst the active system is a solid-state 340GHz radar. A modified version of OpenFX was used for modelling the passive system. This model was recently modified to include realistic location-specific skin temperature and to accept animated characters wearing up to three layers of clothing that move dynamically, such as those typically found in cinematography. Targets under clothing have been modelled and the performance simulated. The strengths and weaknesses of this modelling approach are discussed.

  1. FPGA based digital phase-coding quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Lu, XiaoMing; Zhang, LiJun; Wang, YongGang; Chen, Wei; Huang, DaJun; Li, Deng; Wang, Shuang; He, DeYong; Yin, ZhenQiang; Zhou, Yu; Hui, Cong; Han, ZhengFu

    2015-12-01

    Quantum key distribution (QKD) is a technology with the potential capability to achieve information-theoretic security. Phasecoding is an important approach to develop practical QKD systems in fiber channel. In order to improve the phase-coding modulation rate, we proposed a new digital-modulation method in this paper and constructed a compact and robust prototype of QKD system using currently available components in our lab to demonstrate the effectiveness of the method. The system was deployed in laboratory environment over a 50 km fiber and continuously operated during 87 h without manual interaction. The quantum bit error rate (QBER) of the system was stable with an average value of 3.22% and the secure key generation rate is 8.91 kbps. Although the modulation rate of the photon in the demo system was only 200 MHz, which was limited by the Faraday-Michelson interferometer (FMI) structure, the proposed method and the field programmable gate array (FPGA) based electronics scheme have a great potential for high speed QKD systems with Giga-bits/second modulation rate.

  2. The Gateway Paper--financing health in Pakistan and its linkage with health reforms.

    PubMed

    Nishtar, Sania

    2006-12-01

    Pakistan currently principally uses three modes of financing health--taxation, out of pocket payments and donor contributions of which the latter is the least significant in terms of size. Less than 3.6% of the employees are covered under the social security scheme and there is a limited social protection mechanism, which collectively serves the health needs of 3.4% of the population. The main issues in health financing include low spending, lack of attention to alternate sources of financing and issues with fund mobilization and utilization. With respect to the first, health reforms proposed as part of the Gateway Paper make a strong case for promoting the reallocation of tax-based revenues and developing sustainable alternatives to low levels of public spending on health. With respect to alternative sources of health financing, the Gateway Paper lays stress on exploring policy options for private health insurance, broadening the base of Employees Social Security, creating a Federal Employees Social Security Programme, developing social health insurance within the framework of a broad-based social protection strategy, which scopes beyond the formally employed sector, establishing a widely inclusive safety net for the poor; mainstreaming philanthropic grants as a major source of health financing; developing a conducive tax configuration; generating greater corporate support for social sector causes within the framework of the concept of Corporate Social Responsibility and developing cost-sharing programmes, albeit with safeguards. The Gateway Paper regards efficient fund utilization a priority and lays stress on striking a balance between minimizing costs, controlling costs and using resources more efficiently and equitably--in other words, getting the best value for the money, on the one hand, and increasing the pool of available resources, on the other. Specific interventions such as the promotion of transparent financial administration, budgeting and cost controls and enhancing the capacity to overcome onerous financial management procedures and decentralizing decision-making are underscored as a priority as is the need for ensuring greater financial procedural clarity at the federal-provincial-district interface.

  3. Food insecurity among people who inject drugs in Los Angeles and San Francisco.

    PubMed

    Schmitz, Jane; Kral, Alex H; Chu, Daniel; Wenger, Lynn D; Bluthenthal, Ricky N

    2016-08-01

    We estimated the prevalence of food insecurity among people who inject drugs (PWID) in Los Angeles and San Francisco and explored correlates of food insecurity. A cross-sectional study that measured 30 d food insecurity using the US Adult Food Security Survey ten-item Module developed by the US Department of Agriculture. Food insecurity was defined as including low and very low food security. Two cities in the state of California, USA. Male and female active PWID (n 777). Among participants, 58 % reported food insecurity and 41 % reported very low food security. Food-insecure PWID were more likely to report being homeless (prevalence ratio (PR)=1·20; 95 % CI 1·05, 1·37), chest pain in the past 12 months (PR=1·19; CI 1·06, 1·35), acquiring syringes from someone who goes to a syringe exchange programme (PR=1·27; 95 % CI 1·13, 1·43) and feeling at risk for arrest for possession of drug paraphernalia (PR=1·30; 95 % CI 1·15, 1·46). Current food insecurity was common among PWID in these two cities, yet few factors were independently associated with food insecurity. These data suggest that broad strategies to improve food access for this high-risk population are urgently needed.

  4. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education

    PubMed Central

    2013-01-01

    Background Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient’s TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Methods Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO’s standard for information security risk management. Results A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Conclusions Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy. PMID:23937965

  5. Data security and patient confidentiality: the manager's role.

    PubMed

    Fisher, F; Madge, B

    1996-10-01

    The maintenance of patient confidentiality is of utmost importance in the doctor patient relationship. With the advent of networks such as the National Health Service Wide Area Network in the UK, the potential to transmit identifiable clinical data will become greater. Links between general practitioners (GPs) and hospitals will allow the rapid transmission of data which if intercepted could be potentially embarrassing to the patient concerned. In 1994 the British Medical Association launched a draft bill on privacy and confidentiality and in association with this bill it is pushing for encryption of all clinical data across electronic networks. The manager's role within an acute hospital, community units and general practice, is to ensure that all employees are aware of the principles of data protection, security of hospital computer systems and that no obvious breaches of security can occur at publicly accessible terminals. Managers must be kept up to date with the latest developments in computer security such as digital signatures and be prepared to instigate these developments where practically possible. Managers must also take responsibility for the monitoring of access to terminals and be prepared to deal severely with staff who breach the code of confidentiality. Each manager must be kept informed of employees status with regard to their 'need to know' clearance level and also to promote confidentiality of patient details throughout the hospital. All of the management team must be prepared to train new staff in the principles of data security as they join the organisation and recognise their accountability if the programme fails. Data security and patient confidentiality is a broad responsibility in any healthcare organisation, with the Chief Executive accountable. In family practice, the partners are responsible and accountable. The British Medical Association believes as a matter of policy, that allowing access to personal health data without the patients consent, except in a legally allowable situation, should be a statutory offence.

  6. Evaluation of health, nutrition and food security programmes in a complex emergency: the case of Congo as an example of a chronic post-conflict situation.

    PubMed

    Rossi, Laura; Hoerz, Thomas; Thouvenot, Veronique; Pastore, Gianni; Michael, Markus

    2006-08-01

    To describe the case of Congo as an example of the assessment and appropriateness of donor operational and sectoral strategies in a complex emergency. The paper reports the findings of an external evaluation of operations financed by the European Commission Humanitarian Office in the Democratic Republic of Congo (DRC). The Congolese health system is suffering from severe deterioration. What is functioning in the public health context is donor-dependent with high costs and limited coverage. Despite a relatively favourable agro-climatic situation, food shortage and famine severely affect the nutritional status of large population groups. In this context, humanitarian programmes have generally improved access to health care and the nutritional status of beneficiaries. The reduction of malnutrition in project areas is often demonstrated even though the context did not permit consolidation of these results. Malnutrition continues to claim a massive cost of lives owing to the effect of widespread food insecurity that follows a circular cause-and-effect pattern of very low food production and extreme poverty. The current context in DRC does not correspond yet to 'post-crisis': neither at population level with regard to indicators of poverty, malnutrition, disease and death, nor at institutional level, with regard to state support to institutions. In these situations, the international community is often called upon to replace the state as service provider. Integrated humanitarian actions should be the future of relief projects in DRC. Health, nutrition and food security components should be considered a standard public health intervention strategy representing the most sensible approach to address the needs of the affected population.

  7. Gender and age disparities in adult undernutrition in northern Uganda: high-risk groups not targeted by food aid programmes.

    PubMed

    Schramm, Stine; Kaducu, Felix Ocaka; Smedemark, Siri Aas; Ovuga, Emilio; Sodemann, Morten

    2016-06-01

    To determine the prevalence of adult malnutrition and associated risk factors in a post-conflict area of northern Uganda. A cross-sectional community survey was performed from September 2011 to June 2013. All registered residents in Gulu Health and Demographic Surveillance System aged 15 years and older were considered eligible. Trained field assistants collected anthropometric measurements (weight and height) and administered questionnaires with information on sociodemographic characteristics, food security, smoking and alcohol. Nutritional status was classified by body mass index. In total, 2062 men and 2924 women participated and were included in the analyses. The prevalence of underweight was 22.3% for men and 16.0% for women, whereas the prevalence of overweight was 1.5% for men and 7.6% for women. In men, underweight was associated with younger (15-19 years) and older age (>55 years) (P < 0.001), being divorced/separated [odds ratio (OR) = 1.91 (95% confidence interval (CI): 1.21-2.99] and smoking (OR = 2.13, 95% CI: 1.67-2.73). For women, underweight was associated with older age (P < 0.001) and hungry-gap rainy season (May-July) (OR = 1.33, 95% CI: 1.04-1.69). Widowed or divorced/separated women were not more likely to be underweight. No association was found between education, alcohol consumption or food security score and underweight. Our findings are not in line with the conventional target groups in nutritional programmes and highlight the importance of continuous health and nutritional assessments of all population groups that reflect local social determinants and family structures. © 2016 John Wiley & Sons Ltd.

  8. Food insecurity, food assistance and weight status in US youth: new evidence from NHANES 2007-08.

    PubMed

    Kohn, M J; Bell, J F; Grow, H M G; Chan, G

    2014-04-01

    To investigate food assistance participation as a risk factor for overweight and obesity in youth, and food insecurity as an effect modifier. The sample included youth ages 4-17, in families ≤200% of the federal poverty line in the 2007-2008 National Health and Nutrition Examination Survey (n = 1321). Food insecurity was measured with the US Department of Agriculture survey module. Food assistance participation was assessed for Supplemental Nutrition Assistance Program, Special Supplemental Nutrition Program for Women, Infants and Children and school meals. Body size was classified by age- and sex-specific body mass index (BMI) percentile, BMI z-score and waist circumference percentile. Regression models with direct covariate adjustment and programme-specific propensity scores, stratified by food insecurity, estimated associations between food assistance participation and body size. Food assistance participation was not associated with increased body size among food-insecure youth in models with direct covariate adjustment or propensity scores. Compared with low-income, food-secure youth not participating in food assistance, BMI z-scores were higher among participants in models with direct covariate adjustment (0.27-0.38 SD and 0.41-0.47 SD, for boys and girls, respectively). Using propensity scores, results were similar for boys, but less so for girls. Food assistance programme participation is associated with increased body size in food-secure youth, but not food-insecure youth. Using both direct covariate adjustment and a propensity score approach, self-selection bias may explain some, but not all, of the associations. Providing healthy food assistance that improves diet quality without contributing to excessive intake remains an important public health goal. © 2013 The Authors. Pediatric Obesity © 2013 International Association for the Study of Obesity.

  9. The intuitive use of laryngeal airway tools by first year medical students.

    PubMed

    Bickenbach, Johannes; Schälte, Gereon; Beckers, Stefan; Fries, Michael; Derwall, Matthias; Rossaint, Rolf

    2009-09-22

    Providing a secured airway is of paramount importance in cardiopulmonary resuscitation. Although intubating the trachea is yet seen as gold standard, this technique is still reserved to experienced healthcare professionals. Compared to bag-valve facemask ventilation, however, the insertion of a laryngeal mask airway offers the opportunity to ventilate the patient effectively and can also be placed easily by lay responders. Obviously, it might be inserted without detailed background knowledge.The purpose of the study was to investigate the intuitive use of airway devices by first-year medical students as well as the effect of a simple, but well-directed training programme. Retention of skills was re-evaluated six months thereafter. The insertion of a LMA-Classic and a LMA-Fastrach performed by inexperienced medical students was compared in an airway model. The improvement on their performance after a training programme of overall two hours was examined afterwards. Prior to any instruction, mean time to correct placement was 55.5 +/- 29.6 s for the LMA-Classic and 38.1 +/- 24.9 s for the LMA-Fastrach. Following training, time to correct placement decreased significantly with 22.9 +/- 13.5 s for the LMA-Classic and 22.9 +/- 19.0 s for the LMA-Fastrach, respectively (p < 0.05). After six months, the results are comparable prior (55.6 +/- 29.9 vs 43.1 +/- 34.7 s) and after a further training period (23.5 +/- 13.2 vs 26.6 +/- 21.6, p < 0.05). Untrained laypersons are able to use different airway devices in a manikin and may therefore provide a secured airway even without having any detailed background knowledge about the tool. Minimal theoretical instruction and practical skill training can improve their performance significantly. However, refreshment of knowledge seems justified after six months.

  10. [Rehabilitation programme using neuromuscular electrical stimulation in spinal cord: epidemiological aspects].

    PubMed

    Bittar, Cíntia Kelly; Cliquet, Alberto

    2011-01-01

    To assess epidemiological profile of spinal cord injury outpatients which have been participating of rehabilitation programme using neuromuscular electrical stimulation, in order to implement campaigns for preventing spinal cord trauma. From January to April 2009, 30 patients at the spinal cord injury ambulatory clinic at Hospital das Clínicas of Unicamp were analysed by some epidemiologic characteristics: age, profession, type and level of their paralysis, origin and time of injury. All patients had complete spinal cord injury (ASIA); 24 patients were men and six were women, the mean age was 34.6 years (range, 10-64 years), two patients were children. Twenty-one patients were paraplegic and nine were tetraplegic; causes included automobile accident (12), run over (three), diving (four), bicycle accident (one), motorcycle accident (three), gunshot wound (six), thoracic tuberculosis (one), and lumbar surgery (one). The mean lesion time was 8.2 years (range, 1-15 years). Two patients were retired. The results suggested that spinal cord injury affects mainly young active men. It is necessary to develop incisive actions to prevent accidents, specially directed to traffic security.

  11. What is the responsibility of national government with respect to vaccination?

    PubMed

    Verweij, Marcel F; Houweling, Hans

    2014-12-12

    Given the ethical aspects of vaccination policies and current threats to public trust in vaccination, it is important that governments follow clear criteria for including new vaccines in a national programme. The Health Council of the Netherlands developed such a framework of criteria in 2007, and has been using this as basis for advisory reports about several vaccinations. However, general criteria alone offer insufficient ground and direction for thinking about what the state ought to do. In this paper, we present and defend two basic ethical principles that explain why certain vaccinations are the state's moral-political responsibility, and that may further guide decision-making about the content and character of immunisation programmes. First and foremost, the state is responsible for protecting the basic conditions for public health and societal life. Secondly, states are responsible for promoting and securing equal access to basic health care, which may also include certain vaccinations. We argue how these principles can find reasonable support from a broad variety of ethical and political views, and discuss several implications for vaccination policies. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. Standardizing psycho-medical torture during the War on Terror: Why it happened, how it happened, and why it didn't work.

    PubMed

    Balfe, Myles

    2016-12-01

    After 9/11/2001 the United States launched a global War on Terror. As part of this War, terrorism suspects were detained by the U.S. military and by the C.I.A. It is now widely recognized that the United States tortured a number of these detainees in the context of its 'enhanced interrogation' programme. This article examines how and why U.S. organizations developed standards that allowed healthcare professionals to become involved in torture; why the standards developed by U.S. security institutions failed to control the actions of enhanced interrogation personnel on the ground; and what the role of standards were in stopping the enhanced interrogation initiative. The article concludes by discussing the general lessons that the enhanced interrogation programme has for social science research on standards, namely that individuals can experience ambivalence when caught between competing organizational and professional standards and that it might be inherently difficult to successfully enact certain protocols when these relate to deviant or destructive acts. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. Preparing to understand and use science in the real world: interdisciplinary study concentrations at the Technical University of Darmstadt.

    PubMed

    Liebert, Wolfgang J

    2013-12-01

    In order to raise awareness of the ambiguous nature of scientific-technological progress, and of the challenging problems it raises, problems which are not easily addressed by courses in a single discipline and cannot be projected onto disciplinary curricula, Technical University of Darmstadt has established three interdisciplinary study concentrations: "Technology and International Development", "Environmental Sciences", and "Sustainable Shaping of Technology and Science". These three programmes seek to overcome the limitations of strictly disciplinary research and teaching by developing an integrated, problem-oriented approach. For example, one course considers fundamental nuclear dilemmas and uses role-playing techniques to address a controversy in the area of nuclear security. At the same time, incorporating interdisciplinary teaching into a university that is organized around mono- or multi-disciplinary faculties also poses a number of challenges. Recognition in disciplinary curricula, and appropriate organizational support and funding are examples of those challenges. It is expected that science and engineering students, empowered by such interdisciplinary study programmes, will be better prepared to act responsibly with regard to scientific and technological challenges.

  14. Towards Application of NASA Standard for Models and Simulations in Aeronautical Design Process

    NASA Astrophysics Data System (ADS)

    Vincent, Luc; Dunyach, Jean-Claude; Huet, Sandrine; Pelissier, Guillaume; Merlet, Joseph

    2012-08-01

    Even powerful computational techniques like simulation endure limitations in their validity domain. Consequently using simulation models requires cautions to avoid making biased design decisions for new aeronautical products on the basis of inadequate simulation results. Thus the fidelity, accuracy and validity of simulation models shall be monitored in context all along the design phases to build confidence in achievement of the goals of modelling and simulation.In the CRESCENDO project, we adapt the Credibility Assessment Scale method from NASA standard for models and simulations from space programme to the aircraft design in order to assess the quality of simulations. The proposed eight quality assurance metrics aggregate information to indicate the levels of confidence in results. They are displayed in management dashboard and can secure design trade-off decisions at programme milestones.The application of this technique is illustrated in aircraft design context with specific thermal Finite Elements Analysis. This use case shows how to judge the fitness- for-purpose of simulation as Virtual testing means and then green-light the continuation of Simulation Lifecycle Management (SLM) process.

  15. Situational analysis of infant and young child nutrition policies and programmatic activities in Senegal.

    PubMed

    Wuehler, Sara E; Ly Wane, Coudy Thierno

    2011-04-01

    Progress towards reducing mortality and malnutrition among children <5 years of age has been less than needed to achieve related Millennium Development Goals (MDGs). Therefore, several international agencies joined to 'Reposition children's right to adequate nutrition in the Sahel', starting with an analysis of current activities related to infant and young child nutrition (IYCN). The main objectives of the situational analysis are to compile, analyse and interpret available information on infant and child feeding and the nutrition situation of children <2 years of age in Senegal, as one of the six targeted countries. These findings will be used to assist in identifying inconsistencies and filling gaps in current programming. Between August and December 2008, key informants responsible for conducting IYCN-related activities in Senegal were interviewed, and 157 documents were examined on the following themes: optimal breastfeeding and complementary feeding practices, prevention of micronutrient deficiencies, prevention of mother-to-child transmission of HIV, management of acute malnutrition, food security and hygienic practices. Nearly all of the key IYCN topics were addressed, specifically or generally, in national policy documents. Senegal reported substantial improvements since the 1990s towards reducing infant and young child mortality and underweight, and increasing exclusive breastfeeding among infants <6 months of age (34%). Senegal is one of the few countries in the region that is nearly on track for reaching related MDGs. Notable activities that may have played a role include: (1) vitamin A supplementation was expanded to nearly semi-annual national campaigns starting in 1994; (2) the Ministry of Health partnered with several national and international agencies to scale up child survival activities under the umbrella of the Basic Support for Institutionalizing Child Survival (1994-2006); (3) a national nutrition division was developed to support a national nutrition strengthening programme; (4) the national nutrition counsel was organized to coordinate nutritional activities across various organizations and governmental sectors, involving representatives from health, agriculture and surveillance; and (5) an integrated communications programme was developed to support harmonized behaviour change communication tools for the health and nutrition sectors. Along with these activities, a number of programme evaluations were conducted to ensure that programmes obtain desired results. Although useful, these evaluations were not rigorous enough to identify effective programmes that contributed to the mentioned reductions in the prevalence of underweight and mortality, and increases in exclusive breastfeeding. The policy and programme framework is well established for support of optimal IYCN practices in Senegal. Despite the recent improvements in infant and young child nutritional status indicators, there is still much to do. Greater resources and continued capacity building are needed to: (1) conduct necessary research for adapting training materials and programme protocols to programmatic needs; (2) improve and carry out monitoring and evaluation that identify effective programme components; and (3) apply these findings in developing, expanding and improving effective programmes. © 2011 Blackwell Publishing Ltd.

  16. Getting ready for the arrival of Sentinel data

    NASA Astrophysics Data System (ADS)

    Aschbacher, Josef; Milagro Perez, Maria Pilar

    2013-04-01

    The European Union (EU) and the European Space Agency (ESA) have developed the Global Monitoring for Environment and Security (GMES), being renamed to Copernicus, programme as Europe's answer to the vital need for joined-up data about our climate, environment and security. Through a unique combination of satellite, atmospheric and Earth-based monitoring systems, the initiative will provide new insight into the state of the land, sea and air, providing policymakers, scientists, businesses and the public with accurate and timely information. GMES capabilities include monitoring and forecasting of climatic change, flood risks, soil and coastal erosion, crop and fish resources, air pollution, greenhouse gases, iceberg distribution and snow cover, among others. To accomplish this, GMES has been divided into three main components: Space, In-situ and Services. The Space Component, led by ESA, comprises five types of new dedicated satellites called Sentinels. These missions carry a range of technologies, such as radar and multi-spectral imaging instruments for land, ocean and atmospheric monitoring. While the Sentinel satellites are currently being developed by ESA specifically to meet the needs of GMES, the Contributing Missions, operated by national agencies or commercial entities, are already providing a wealth of data for GMES services, and will continue to deliver complementary data after the Sentinels are in orbit. An integrated Ground Segment ensures access to Sentinels and Contributing Missions data. Access to Sentinel data is governed by the Sentinel data policy, which is part of a wider GMES data and information access policy. The Sentinel data policy envisages free and open access, subject to restrictions only if security or other European interests need to be preserved. As regards the Contributing Missions, the data policy of the mission owners will be respected for the purpose of providing data to GMES service users. The first in the fleet of dedicated satellites to be launched at the end of 2013 is Sentinel-1. This is a radar mission and will be engaged in wide range of land and ocean surveillance tasks, such as oil-spill monitoring and earthquake hazard assessment. It will be followed early next year by Sentinel-2 and Sentinel-3, dedicated mainly to the mapping of the Earth's surface and to the monitoring of ocean temperature and colour. The arrival of the first Sentinel data will provide systematic continuity of data already widely used within the science and application communities. It will also ensure long-term operational commitment and data consistency. The in-situ component, under the coordination of the European Environment Agency (EEA), is composed of atmospheric and Earth based monitoring systems, and based on established networks and programmes at European and international levels. The European Commission is in charge of implementing the services component of GMES and of leading GMES overall. GMES services, fed with data from the Space and In-situ components, will provide essential information in five main domains, atmosphere, ocean and land monitoring as well as emergency response and security. Climate change has been added as a new GMES service and cross-cuts all these domains. This session aims at informing users about the current programme's overall status and its potential for users in the services and scientific fields, in particular, in view of the upcoming launch of the first in the fleet of Sentinel satellites.

  17. A comparison of SuperLU solvers on the intel MIC architecture

    NASA Astrophysics Data System (ADS)

    Tuncel, Mehmet; Duran, Ahmet; Celebi, M. Serdar; Akaydin, Bora; Topkaya, Figen O.

    2016-10-01

    In many science and engineering applications, problems may result in solving a sparse linear system AX=B. For example, SuperLU_MCDT, a linear solver, was used for the large penta-diagonal matrices for 2D problems and hepta-diagonal matrices for 3D problems, coming from the incompressible blood flow simulation (see [1]). It is important to test the status and potential improvements of state-of-the-art solvers on new technologies. In this work, sequential, multithreaded and distributed versions of SuperLU solvers (see [2]) are examined on the Intel Xeon Phi coprocessors using offload programming model at the EURORA cluster of CINECA in Italy. We consider a portfolio of test matrices containing patterned matrices from UFMM ([3]) and randomly located matrices. This architecture can benefit from high parallelism and large vectors. We find that the sequential SuperLU benefited up to 45 % performance improvement from the offload programming depending on the sparse matrix type and the size of transferred and processed data.

  18. A nanostructure based on metasurfaces for optical interconnects

    NASA Astrophysics Data System (ADS)

    Lin, Shulang; Gu, Huarong

    2017-08-01

    Optical-electronic Integrated Neural Co-processor takes vital part in optical neural network, which is mainly realized by optical interconnects. Because of the accuracy requirement and long-term goal of integration, optical interconnects should be effective and pint-size. In traditional solutions of optical interconnects, holography built on crystalloid or law of Fresnel diffraction exploited on zone plate was used. However, holographic method cannot meet the efficiency requirement and zone plate is too bulk to make the optical neural unit miniaturization. Thus, this paper aims to find a way to replace holographic method or zone plate with enough diffraction efficiency and smaller size. Metasurfaces are composed of subwavelength-spaced phase shifters at an interface of medium. Metasurfaces allow for unprecedented control of light properties. They also have advanced optical technology of enabling versatile functionalities in a planar structure. In this paper, a nanostructure is presented for optical interconnects. The comparisons of light splitting ability and simulated crosstalk between nanostructure and zone plate are also made.

  19. Pulse-by-pulse energy measurement at the Stanford Linear Collider

    NASA Astrophysics Data System (ADS)

    Blaylock, G.; Briggs, D.; Collins, B.; Petree, M.

    1992-01-01

    The Stanford Linear Collider (SLC) collides a beam of electrons and positrons at 92 GeV. It is the first colliding linac, and produces Z(sup 0) particles for High-Energy Physics measurements. The energy of each beam must be measured to one part in 10(exp 4) on every collision (120 Hz). An Energy Spectrometer in each beam line after the collision produces two stripes of high-energy synchrotron radiation with critical energy of a few MeV. The distance between these two stripes at an imaging plane measures the beam energy. The Wire-Imaging Synchrotron Radiation Detector (WISRD) system comprises a novel detector, data acquisition electronics, readout, and analysis. The detector comprises an array of wires for each synchrotron stripe. The electronics measure secondary emission charge on each wire of each array. A Macintosh II (using THINK C, THINK Class Library) and DSP coprocessor (using ANSI C) acquire and analyze the data, and display and report the results for SLC operation.

  20. Situational analysis of infant and young child nutrition policies and programmatic activities in Chad.

    PubMed

    Wuehler, Sara E; Nadjilem, Djasndibye

    2011-04-01

    Progress towards reducing mortality and malnutrition among children <5 years of age has been less than needed to achieve related Millennium Development Goals (MDGs). Therefore, several international agencies joined to 'reposition children's right to adequate nutrition in the Sahel', starting with an analysis of current activities related to infant and young child nutrition (IYCN). The main objectives of the situational analysis are to compile, analyse, and interpret available information on infant and child feeding, and the nutrition situation of children <2 years of age in Chad, as one of the six targeted countries. These findings are available to assist in identifying inconsistencies and filling gaps in current programming. Between June and October of 2008, key informants responsible for IYCN-related activities in Chad were interviewed, and 53 documents were examined on the following themes: the promotion of optimal breastfeeding and complementary feeding practices, prevention of micronutrient deficiencies, management of acute malnutrition, prevention of mother-to-child transmission of human immunodeficiency virus (HIV), food security, and promotion of good hygienic practices. Chad is not on track to reaching the MDGs of reducing mortality by two-thirds and malnutrition by half among children <5 years of age between 1990 and 2015. Most of the key IYCN topics were addressed in a national policy to combat malnutrition and micronutrient deficiencies. No national nutrition policy was yet ratified in Chad, so the target of many documents reviewed was the malnourished child. Researchers have identified some barriers to optimal feeding practices. However, the majority of these surveys were small scale, so they do not necessarily provide information relevant to the general population. Expanded surveys would be needed for developing evidence-based educational messages targeted to local needs. Reviewed training materials and related programmes being implemented in Chad provide specific guidance for nearly all of the key IYCN topics, except for appropriate feeding choices for the prevention of mother-to-child transmission of HIV. Some of the programmes were intended for national coverage, but we could not confirm whether these programmes were actually implemented nationally. Monitoring and evaluation reports were available for some small-scale programmes, but few of these evaluated whether IYCN-specific programme components were implemented as designed and none evaluated whether participants adopted the promoted feeding practices. Establishment of the policy and programme framework has commenced for improving IYCN practices. Formative research is needed to guide the development of evidence-based training materials and programmes to address the nutritional needs of infants and children. Once more directed programmes are established, there is a further need for rigorous monitoring and evaluation to ensure that training is adequate, programmes are implemented as designed, and effective programmes are identified for expansion nationally. Evaluations are also needed to determine where human and institutional capacity building is needed to carry out these activities as they are implemented. National and international support will be required to complete these enhancements, and thus improve the health and nutritional status of infants and young children in Chad. © 2011 Blackwell Publishing Ltd.

  1. The research on electronic commerce security payment system based on set protocol

    NASA Astrophysics Data System (ADS)

    Guo, Hongliang

    2012-04-01

    With the rapid development of network technology, online transactions have become more and more common. In this paper, we firstly introduce the principle and the basic principal and technical foundation of SET, and then we analyze the progress of designing a system in the foundation of the procedure of the electronic business based on SET. On this basis, we design a system of the Payment System for Electronic Business. It will not only take on crucial realism signification for large-scale, medium-sized and mini-type corporations, but also provide guide meaning with programmer and design-developer to realize Electronic Commerce (EC).

  2. A Realization of Theoretical Maximum Performance in IPSec on Gigabit Ethernet

    NASA Astrophysics Data System (ADS)

    Onuki, Atsushi; Takeuchi, Kiyofumi; Inada, Toru; Tokiniwa, Yasuhisa; Ushirozawa, Shinobu

    This paper describes “IPSec(IP Security) VPN system" and how it attains a theoretical maximum performance on Gigabit Ethernet. The Conventional System is implemented by software. However, the system has several bottlenecks which must be overcome to realize a theoretical maximum performance on Gigabit Ethernet. Thus, we newly propose IPSec VPN System with the FPGA(Field Programmable Gate Array) based hardware architecture, which transmits a packet by the pipe-lined flow processing and has 6 parallel structure of encryption and authentication engines. We show that our system attains the theoretical maximum performance in the short packet which is difficult to realize until now.

  3. Science in 60 – Tiny Satellites, Big Science

    ScienceCinema

    Sullivan, Erica

    2018-05-31

    When cube satellites first sprung on the scene in the late 1990s, they were seen as cheap, cute and novel. But today, these lunch-box-sized orbiters are heralded as powerful, cost-effective tools that help strengthen our national security presence in space. Los Alamos National Laboratory developed, built and tested CubeSats that are easily programmable from the ground, making them responsive to up-to-the-minute, mission-critical needs. While CubeSats are still the new kid on the celestial block, that’s about to change. These small, agile pieces of technology hold a universe of promise.

  4. Cross-country analysis of strategies for achieving progress towards global goals for women's and children's health.

    PubMed

    Ahmed, Syed Masud; Rawal, Lal B; Chowdhury, Sadia A; Murray, John; Arscott-Mills, Sharon; Jack, Susan; Hinton, Rachael; Alam, Prima M; Kuruvilla, Shyama

    2016-05-01

    To identify how 10 low- and middle-income countries achieved accelerated progress, ahead of comparable countries, towards meeting millennium development goals 4 and 5A to reduce child and maternal mortality. We synthesized findings from multistakeholder dialogues and country policy reports conducted previously for the Success Factors studies in 10 countries: Bangladesh, Cambodia, China, Egypt, Ethiopia, the Lao People's Democratic Republic, Nepal, Peru, Rwanda and Viet Nam. A framework approach was used to analyse and synthesize the data from the country reports, resulting in descriptive or explanatory conclusions by theme. Successful policy and programme approaches were categorized in four strategic areas: leadership and multistakeholder partnerships; health sector; sectors outside health; and accountability for resources and results. Consistent and coordinated inputs across sectors, based on high-impact interventions, were assessed. Within the health sector, key policy and programme strategies included defining standards, collecting and using data, improving financial protection, and improving the availability and quality of services. Outside the health sector, strategies included investing in girls' education, water, sanitation and hygiene, poverty reduction, nutrition and food security, and infrastructure development. Countries improved accountability by strengthening and using data systems for planning and evaluating progress. Reducing maternal and child mortality in the 10 fast-track countries can be linked to consistent and coordinated policy and programme inputs across health and other sectors. The approaches used by successful countries have relevance to other countries looking to scale-up or accelerate progress towards the sustainable development goals.

  5. Transcript-specific, single-nucleotide polymorphism discovery and linkage analysis in hexaploid bread wheat (Triticum aestivum L.).

    PubMed

    Allen, Alexandra M; Barker, Gary L A; Berry, Simon T; Coghill, Jane A; Gwilliam, Rhian; Kirby, Susan; Robinson, Phil; Brenchley, Rachel C; D'Amore, Rosalinda; McKenzie, Neil; Waite, Darren; Hall, Anthony; Bevan, Michael; Hall, Neil; Edwards, Keith J

    2011-12-01

    Food security is a global concern and substantial yield increases in cereal crops are required to feed the growing world population. Wheat is one of the three most important crops for human and livestock feed. However, the complexity of the genome coupled with a decline in genetic diversity within modern elite cultivars has hindered the application of marker-assisted selection (MAS) in breeding programmes. A crucial step in the successful application of MAS in breeding programmes is the development of cheap and easy to use molecular markers, such as single-nucleotide polymorphisms. To mine selected elite wheat germplasm for intervarietal single-nucleotide polymorphisms, we have used expressed sequence tags derived from public sequencing programmes and next-generation sequencing of normalized wheat complementary DNA libraries, in combination with a novel sequence alignment and assembly approach. Here, we describe the development and validation of a panel of 1114 single-nucleotide polymorphisms in hexaploid bread wheat using competitive allele-specific polymerase chain reaction genotyping technology. We report the genotyping results of these markers on 23 wheat varieties, selected to represent a broad cross-section of wheat germplasm including a number of elite UK varieties. Finally, we show that, using relatively simple technology, it is possible to rapidly generate a linkage map containing several hundred single-nucleotide polymorphism markers in the doubled haploid mapping population of Avalon × Cadenza. © 2011 The Authors. Plant Biotechnology Journal © 2011 Society for Experimental Biology, Association of Applied Biologists and Blackwell Publishing Ltd.

  6. Linking agriculture and nutrition education to improve infant and young child feeding: Lessons for future programmes.

    PubMed

    Muehlhoff, Ellen; Wijesinha-Bettoni, Ramani; Westaway, Elizabeth; Jeremias, Theresa; Nordin, Stacia; Garz, Julia

    2017-10-01

    Agriculture and food systems play a central role in nutrition by supplying nutritious, healthy and affordable foods. When integrated with nutrition education for behaviour change, agricultural interventions that supply diverse affordable foods from all food groups have great scope for improving young child and family diets. In 2014, process reviews were conducted in Cambodia and Malawi of food security projects that provided agricultural support and community-based nutrition education on improved infant and young child feeding (IYCF). In both countries, household visits were carried out with mothers/caregivers, and interviews and Focus Group Discussions (FGDs) were conducted with purposively selected project stakeholders (53 in Cambodia, 170 in Malawi), including government staff from the agriculture and health sectors. Results highlight that adoption of improved IYCF practices was facilitated by participation in nutrition education and practical cooking sessions, and supportive family and community structures. Barriers faced by families and caregivers were identified, such as women's workload and lack of access to high quality foods, namely fruits, vegetables, legumes, nuts and animal source foods. Implementation challenges regarding coordination of cross-sectoral targeting strategies and capacities of extension services to sustain community-based IYCF nutrition education need to be addressed to improve programme effectiveness and impact. The project lessons from Cambodia and Malawi are useful for integrated agriculture-IYCF nutrition education programmes to help ensure better young child nutrition outcomes. © 2017 John Wiley & Sons Ltd.

  7. Proposals for the mitigation of the environmental impact of clinical laboratories.

    PubMed

    Lopez, Joseph B; Badrick, Tony

    2012-03-24

    Laboratories should be aware of the carbon footprint resulting from their activities and take steps to mitigate it as part of their societal responsibilities. Once committed to a mitigation programme, they should announce an environmental policy, secure the support of senior management, initiate documentation, institute a staff training programme, schedule environmental audits and appoint an environmental manager. Laboratories may aspire to be accredited to one of the standards for environmental management, such as the ISO 14000. As environmental and quality issues are linked, the improvement in the environmental management of an organisation will ultimately lead to improved quality system performance. Indeed, environmental management could conceivably come under overall quality management. Although there will be initial costs, good environmental practices can bring savings. Environmental improvement should be based on the 3R concept to reduce, reuse and recycle. Several policy initiatives may be introduced. These include a green purchasing policy for equipment, laboratory furniture and reagents as well as the management of packaging wastes. There are several ways to reduce energy, water usage and wastage. A reduction of test numbers and collection tubes should be attempted. Paper management involves all aspects of 3R. The recycling of solvents and general wastes should be practised where feasible. The construction new laboratories or renovations to existing ones are opportunities to make them more environmentally-friendly. The advocacy of policies to associates and the inclusion of environmentally-friendly conditions on contractors are integral parts of the programme.

  8. NMF-mGPU: non-negative matrix factorization on multi-GPU systems.

    PubMed

    Mejía-Roa, Edgardo; Tabas-Madrid, Daniel; Setoain, Javier; García, Carlos; Tirado, Francisco; Pascual-Montano, Alberto

    2015-02-13

    In the last few years, the Non-negative Matrix Factorization ( NMF ) technique has gained a great interest among the Bioinformatics community, since it is able to extract interpretable parts from high-dimensional datasets. However, the computing time required to process large data matrices may become impractical, even for a parallel application running on a multiprocessors cluster. In this paper, we present NMF-mGPU, an efficient and easy-to-use implementation of the NMF algorithm that takes advantage of the high computing performance delivered by Graphics-Processing Units ( GPUs ). Driven by the ever-growing demands from the video-games industry, graphics cards usually provided in PCs and laptops have evolved from simple graphics-drawing platforms into high-performance programmable systems that can be used as coprocessors for linear-algebra operations. However, these devices may have a limited amount of on-board memory, which is not considered by other NMF implementations on GPU. NMF-mGPU is based on CUDA ( Compute Unified Device Architecture ), the NVIDIA's framework for GPU computing. On devices with low memory available, large input matrices are blockwise transferred from the system's main memory to the GPU's memory, and processed accordingly. In addition, NMF-mGPU has been explicitly optimized for the different CUDA architectures. Finally, platforms with multiple GPUs can be synchronized through MPI ( Message Passing Interface ). In a four-GPU system, this implementation is about 120 times faster than a single conventional processor, and more than four times faster than a single GPU device (i.e., a super-linear speedup). Applications of GPUs in Bioinformatics are getting more and more attention due to their outstanding performance when compared to traditional processors. In addition, their relatively low price represents a highly cost-effective alternative to conventional clusters. In life sciences, this results in an excellent opportunity to facilitate the daily work of bioinformaticians that are trying to extract biological meaning out of hundreds of gigabytes of experimental information. NMF-mGPU can be used "out of the box" by researchers with little or no expertise in GPU programming in a variety of platforms, such as PCs, laptops, or high-end GPU clusters. NMF-mGPU is freely available at https://github.com/bioinfo-cnb/bionmf-gpu .

  9. Which green way: description of the intervention for mobilising against Aedes aegypti under difficult security conditions in southern Mexico.

    PubMed

    Morales-Perez, Arcadio; Nava-Aguilera, Elizabeth; Legorreta-Soberanis, José; Paredes-Solís, Sergio; Balanzar-Martínez, Alejandro; Serrano-de Los Santos, Felipe René; Ríos-Rivera, Claudia Erika; García-Leyva, Jaime; Ledogar, Robert J; Cockcroft, Anne; Andersson, Neil

    2017-05-30

    Community mobilisation for prevention requires engagement with and buy in from those communities. In the Mexico state of Guerrero, unprecedented social violence related to the narcotics trade has eroded most community structures. A recent randomised controlled trial in 90 coastal communities achieved sufficient mobilisation to reduce conventional vector density indicators, self-reported dengue illness and serologically proved dengue virus infection. The Camino Verde intervention was a participatory research protocol promoting local discussion of baseline evidence and co-design of vector control solutions. Training of facilitators emphasised community authorship rather than trying to convince communities to do specific activities. Several discussion groups in each intervention community generated a loose and evolving prevention plan. Facilitators trained brigadistas, the first wave of whom received a small monthly stipend. Increasing numbers of volunteers joined the effort without pay. All communities opted to work with schoolchildren and for house-to-house visits by brigadístas. Children joined the neighbourhood vector control movements where security conditions permitted. After 6 months, a peer evaluation involved brigadista visits between intervention communities to review and to share progress. Although most communities had no active social institutions at the outset, local action planning using survey data provided a starting point for community authorship. Well-known in their own communities, brigadistas faced little security risk compared with the facilitators who visited the communities, or with governmental programmes. We believe the training focus on evidence-based dialogue and a plural community ownership through multiple design groups were key to success under challenging security conditions. ISRCTN27581154 .

  10. Uptake of Space Technologies - An Educational Programme

    NASA Astrophysics Data System (ADS)

    Bacai, Hina; Zolotikova, Svetlana; Young, Mandy; Cowsill, Rhys; Wells, Alan; Monks, Paul; Archibald, Alexandra; Smith, Teresa

    2013-04-01

    Earth Observation data and remote sensing technologies have been maturing into useful tools that can be utilised by local authorities and businesses to aid in activates such as monitoring climate change trends and managing agricultural land and water uses. The European Earth observation programme Copernicus, previously known as GMES (Global Monitoring for Environment and Security), provides the means to collect and process multi-source EO and environmental data that supports policy developments at the European level. At the regional and local level, the Copernicus programme has been initiated through Regional Contact Office (RCO), which provide knowledge, training, and access to expertise both locally and at a European level through the network of RCOs established across Europe in the DORIS_Net (Downstream Observatory organised by Regions active In Space - Network) project (Grant Agreement No. 262789 Coordination and support action (Coordinating) FP7 SPA.2010.1.1-07 "Fostering downstream activities and links with regions"). In the East Midlands UK RCO, educational and training workshops and modules have been organised to highlight the wider range of tools and application available to businesses and local authorities in the region. Engagement with businesses and LRA highlighted the need to have a tiered system of training to build awareness prior to investigating innovative solutions and space technology uses for societal benefits. In this paper we outline education and training programmes which have been developed at G-STEP (GMES - Science and Technology Education Partnership), University of Leicester, UK to open up the Copernicus programme through the Regional Contact Office to downstream users such as local businesses and LRAs. Innovative methods to introduce the operational uses of Space technologies in real cases through e-learning modules and web-based tools will be described and examples of good practice for educational training in these sectors will be demonstrated. The results from these workshops and awareness building campaigns will show the end-user 'pull' in the uptake of remote sensing and Earth Observation data to implement successful Local Authority action plans and projects developing innovative solutions to critical Local Authority issues.

  11. The Ocean Surface Topography SENTINEL-6/JASON-CS Mission

    NASA Astrophysics Data System (ADS)

    Cullen, R.

    2015-12-01

    The Sentinel-6/Jason-CS mission will consist of 2 spacecraft and will be the latest in a series of ocean surface topography missions that will span nearly three decades. They follow the altimeters on- board TOPEX/Poseidon through to Jason-3 (expected March 2015). Jason-CS will continue to fulfil objectives of the reference series whilst introducing a major enhancement in capability providing the operational and science oceanographic community with the state of the art in terms of platform, measurement instrumentation design thus securing optimal operational and science data return. The programme is a part of the EC Copernicus initiative, whose objective is to support Europe's goals regarding sustainable development and global governance of the environment by providing timely and quality data, information, services and knowledge. The programme brings together: ESA for development, procurement & early orbit activities; EUMETSAT for mission management, ground segment, flight ops, contributing funding of the 1st satellite and participation in funding for the 2nd satellite; NASA for the US payload and launcher procurement in addition to funding US science opportunities; EC for funding the operations and participation in funding (with EUMETSAT) for the 2nd satellite; NOAA are expected to provide US ground stations & operations services; CNES for mission expertise and provision of the POD service. The consortium plan to procure 2 satellites with the 1st planned for launch readiness in the 1st half of 2020 with the 2nd satellite 5 years later. The first major commitment to funding was given by the ESA member states that approved the programme in June 2014 and in addition the European Commission funding is also fully secure. The design is based on a platform derived from CryoSat-2 adjusted to the specific requirements of the higher orbit. The principle payload instrument is a high precision Ku/C band radar altimeter with retrieval of geophysical parameters (surface elevation, wind speed and SWH) from the altimeter data require supporting measurements: a DORIS receiver for POD; The Climate Quality Advanced Microwave Radiometer (AMR-C) provided by JPL for high stability path delay correction. Orbit tracking data are also provided by GPS & LRA. An additional US GPS receiver, GNSS-RO, will be dedicated to radio-occultation.

  12. Are patients deemed 'dangerous and severely personality disordered' different from other personality disordered patients detained in forensic settings?

    PubMed

    Howard, Rick; Khalifa, Najat; Duggan, Conor; Lumsden, John

    2012-02-01

    In 1999, the UK government initiated a programme for the assessment and treatment of individuals deemed to have 'dangerous and severe personality disorder' (DSPD). After over 10 years of specialist service development, it is not clear whether DSPD patients represent a distinct group. The aim of this study was to establish whether people admitted to DSPD hospital units could be distinguished in presentation or personality traits from people with personality disorder admitted to standard secure hospital services. Thirty-eight men detained in high-security hospital DSPD units were compared with 62 men detained in conventional medium or high security hospital units, using the Psychopathy Checklist-Revised (PCL-R) and other standard personality disorder, clinical and offending measures. Compared with their counterparts in standard services, the DSPD group had higher scores on PCL-R psychopathy, significantly more convictions before age 18 years, greater severity of institutional violence and more prior crimes of sexual violence. Regression analysis confirmed that only PCL-R Factor 1, reflecting core interpersonal and affective features of psychopathy, predicted group membership. The DSPD group emerged as having higher psychopathy scores, but as there is currently no evidence that the core personality features of psychopathy are amenable to treatment, there is little justification for treating high-psychopathy forensic patients differently from those with other disorders of personality. Copyright © 2011 John Wiley & Sons, Ltd.

  13. Impact of hospital security programmes and workplace aggression on nurse perceptions of safety.

    PubMed

    Blando, James D; O'Hagan, Emily; Casteel, Carri; Nocera, Mary-Alice; Peek-Asa, Corinne

    2013-04-01

    To assess how nurses' perception of their safety and risk of violence was affected by their work environment and whether this perception correlated with their actual risk. The work environment has an impact on nurses' perception of their risk of violence and this perception affects worker productivity, quality, employee retention, worker satisfaction and their actual safety. A cross-sectional survey was conducted in person of 314 emergency department nurses and 143 psychiatric nurses, and assault data was collected from injury logs. This study found that nurses in the emergency and psychiatric units differed in their perception of violence and safety. The workplace elements that led to a perception of lower risk of violence were not correlated with a lower rate of injury from violent acts. The nurses' beliefs about the adequacy of security equipment, security guards and the frequency of verbal abuse were strongly correlated with perceived safety. Several factors that influence nurses' perception of their risk of violence are not well correlated with their actual risk. Managers must address workplace elements that affect nurse perceptions because this has an impact on quality and employee retention. They must also address factors that have an impact on the actual risk of violence because this study showed, for the first time, that these may differ from perceptions. © 2012 Blackwell Publishing Ltd.

  14. Use of an Infrared Thermometer with Laser Targeting in Morphological Scene Change Detection for Fire Detection

    NASA Astrophysics Data System (ADS)

    Tickle, Andrew J.; Singh, Harjap; Grindley, Josef E.

    2013-06-01

    Morphological Scene Change Detection (MSCD) is a process typically tasked at detecting relevant changes in a guarded environment for security applications. This can be implemented on a Field Programmable Gate Array (FPGA) by a combination of binary differences based around exclusive-OR (XOR) gates, mathematical morphology and a crucial threshold setting. This is a robust technique and can be applied many areas from leak detection to movement tracking, and further augmented to perform additional functions such as watermarking and facial detection. Fire is a severe problem, and in areas where traditional fire alarm systems are not installed or feasible, it may not be detected until it is too late. Shown here is a way of adapting the traditional Morphological Scene Change Detector (MSCD) with a temperature sensor so if both the temperature sensor and scene change detector are triggered, there is a high likelihood of fire present. Such a system would allow integration into autonomous mobile robots so that not only security patrols could be undertaken, but also fire detection.

  15. Survey of staff attitudes to the smoking ban in a medium secure unit.

    PubMed

    Garg, Shruti; Shenoy, Suraj; Badee, May; Varghese, Joe; Quinn, Patrick; Kent, John

    2009-10-01

    The aim of this survey was to explore staff attitudes to the indoor smoking ban in a medium secure unit and to ascertain if they had experienced any difficulties in imposing the ban in the four months after its introduction. All staff members available on duty who agreed to participate in the survey were interviewed using a semi-structured questionnaire. The response rate was 65%. Sixty-four percent of the staff supported the smoking ban. Forty-three percent reported experiencing patient management problems with the majority complaining of increased patient aggression, increased use of staff time in supervising patients smoking. Additionally, supervising staff were still being exposed to passive smoking. Sixty-five percent reported positive effects due to the ban with the majority reporting that patients were sleeping at night due to the smoking area being closed at night. A significant proportion of the staff is still opposed to the smoking ban. Changing staff attitudes through educational programmes will be important in ensuring success of a possible future total ban in psychiatric units. 2009 Elsevier Ltd and Faculty of Forensic and Legal Medicine.

  16. Post-conflict reconstruction of the health system of Afghanistan: assisting in the rehabilitation of a provincial hospital--context and experience.

    PubMed

    Cook, Judith

    2003-01-01

    Over more than two decades of conflict, Afghanistan's health system came to depend heavily on assistance from donors and non-governmental organizations (NGOs). When the Taliban fell in November 2001 the health system was in a state of collapse; Afghanistan's health indicators were amongst the worst in the world. National Health Policy is to deliver an essential package of health services to the entire population. It is acknowledged that reconstruction of the health system will depend on donor financial support and NGO involvement in health programmes. An example is Médecins du Monde's involvement in health system rehabilitation in the Ghor province. Investing in health can contribute to peace, stability and political transition. Security, needed for reconstruction and for NGOs to continue their crucial work in health, has recently deteriorated in parts of Afghanistan. Joint Regional Teams to provide security to outlying areas have been announced by the US. There is concern that their proposed humanitarian and development role could compromise perception of the neutrality and impartiality of NGOs.

  17. Computation of spanwise distribution of circulation and lift coefficient for flapped wings of arbitrary planform

    NASA Technical Reports Server (NTRS)

    Razak, K.

    1980-01-01

    The question of the effect of distribution and magnitude of spanwise circulation and shed vorticity from an airplane wing on the distribution pattern of agricultural products distributed from an airplane was studied. The first step in an analysis of this question is the determination of the actual distribution of lift along an airplane wing, from which the pattern of shed vorticity can be determined. A procedure is developed to calculate the span loading for flapped and unflapped wings of arbitrary aspect ratio and taper ratio. The procedure was programmed on a small programmable calculator, the Hewlett Packard HP-97, and also was programmed in BASIC language. They could be used to explore the variations in span loading that can be secured by variable flap deflections or the effect of flying at varying air speeds at different airplane gross weights. Either an absolute evaluation of span loading can be secured or comparative span loading can be evaluated to determine their effect on swath width and swath distribution pattern. The programs are intended to assist the user in evaluating the effect of a given spanload distribution.

  18. Service audit of a forensic rehabilitation ward.

    PubMed

    Young, Susan; Gudjonsson, Gisli H; Needham-Bennett, Humphrey; Chick, Kay

    2009-10-01

    An open forensic rehabilitation ward provides an important link bridging the gap between secure and community provisions. This paper provides an audit of such a service by examining the records of an open forensic rehabilitation ward over a five-year period from 1 June 2000 until 31 May 2005. During the audit period there were 51 admissions, involving 45 different patients, and 50 discharges. The majority of the patients came from secure unit facilities, acute psychiatric wards or home. Thirty-nine patients were discharged either into hostels (66%) or their home (12%). The majority of patients (80%) had on admission a primary diagnosis of either schizophrenia or schizoaffective disorder. Most had an extensive forensic history. The focus of their admission was to assess and treat their mental illness/disorder and offending behaviour and this was successful as the majority of patients were transferred to a community placement after a mean of 15 months. It is essential that there is a well-integrated care pathway for forensic patients, involving constructive liaison with generic services and a well-structured treatment programme which integrates the key principles of the 'recovery model' approach to care.

  19. The United Nations and One Health: the International Health Regulations (2005) and global health security.

    PubMed

    Nuttall, I; Miyagishima, K; Roth, C; de La Rocque, S

    2014-08-01

    The One Health approach encompasses multiple themes and can be understood from many different perspectives. This paper expresses the viewpoint of those in charge of responding to public health events of international concern and, in particular, to outbreaks of zoonotic disease. Several international organisations are involved in responding to such outbreaks, including the United Nations (UN) and its technical agencies; principally, the Food and Agriculture Organization of the UN (FAO) and the World Health Organization (WHO); UN funds and programmes, such as the United Nations Development Programme, the World Food Programme, the United Nations Environment Programme, the United Nations Children's Fund; the UN-linked multilateral banking system (the World Bank and regional development banks); and partner organisations, such as the World Organisation for Animal Health (OIE). All of these organisations have benefited from the experiences gained during zoonotic disease outbreaks over the last decade, developing common approaches and mechanisms to foster good governance, promote policies that cut across different sectors, target investment more effectively and strengthen global and national capacities for dealing with emerging crises. Coordination among the various UN agencies and creating partnerships with related organisations have helped to improve disease surveillance in all countries, enabling more efficient detection of disease outbreaks and a faster response, greater transparency and stakeholder engagement and improved public health. The need to build more robust national public human and animal health systems, which are based on good governance and comply with the International Health Regulations (2005) and the international standards set by the OIE, prompted FAO, WHO and the OIE to join forces with the World Bank, to provide practical tools to help countries manage their zoonotic disease risks and develop adequate resources to prevent and control disease outbreaks, particularly at the animal source. All these efforts contribute to the One Health agenda.

  20. Future Earth -- New Approaches to address Climate Change and Sustainability in the MENA Region

    NASA Astrophysics Data System (ADS)

    Lange, Manfred; Abu Alhaija, Rana

    2016-04-01

    Interactions and feedbacks between rapidly increasing multiple pressures on water, energy and food security drive social-ecological systems at multiple scales towards critical thresholds in countries of the Eastern Mediterranean, the Middle East and North Africa (MENA Region). These pressures, including climate change, the growing demand on resources and resource degradation, urbanization and globalization, cause unprecedented challenges for countries and communities in the region. Responding to these challenges requires integrated science and a closer relationship with policy makers and stakeholders. Future Earth has been designed to respond to these urgent needs. In order to pursue such objectives, Future Earth is becoming the host organization for some 23 programs that were previously run under four global environmental change programmes, DIVERSITAS, the International Geosphere-Biosphere Programme (IGBP), the International Human Dimensions Programme (IHDP) and the World Climate Research Programme (WCRP). Some further projects arose out of the Earth System Science Partnership (ESSP). It thus brings together a wide spectrum of expertise and knowledge that will be instrumental in tackling urgent problems in the MENA region and the wider Mediterranean Basin. Future Earth is being administered by a globally distributed secretariat that also includes a series of Regional Centers, which will be the nuclei for the development of new regional networks. The Cyprus Institute in Nicosia, Cyprus (CyI; www.cyi.ac.cy) is hosting the Regional Center for the MENA Region. The CyI is a non-profit research and post-graduate education institution with a strong scientific and technological orientation and a distinctive regional, Eastern Mediterranean scope. Cyprus at the crossroads of three continents and open to all nations in the region provides excellent conditions for advancing the research agenda of Future Earth in the MENA Region. Given the recent and ongoing major political and societal transformation in the region, research and development that help prepare the MENA countries for anticipated global changes and advance the development of sustainable structures are not only meaningful, but also a quite challenging undertakings.

  1. Addressing sexual health behaviour during emerging adulthood: a critical review of the literature.

    PubMed

    Alexander, Kamila A; Jemmott, Loretta S; Teitelman, Anne M; D'Antonio, Patricia

    2015-01-01

    In this critical literature review, we examine evidence-based interventions that target sexual behaviours of 18- to 25-year-old emerging adult women. Nurses and clinicians implement theory-driven research programmes for young women with increased risk of HIV/AIDS and sexually transmitted infections. Strategies to decrease transmission of HIV and sexually transmitted infections are rigorously evaluated and promoted by public health agencies such as the United States Centers for Disease Control and Prevention. While many interventions demonstrate episodic reductions in sexual risk behaviours and infection transmission, there is little evidence they build sustainable skills and behaviours. Programmes may not attend to contextual and affective influences on sexual behaviour change. Discursive paper. We conducted a conceptually based literature review and critical analysis of the Centers for Disease Control and Prevention's best-evidence and good-evidence HIV behavioural interventions. In this review, we examined three contextual and affective influences on the sexual health of emerging adult women: (1) developmental age, (2) reproduction and pregnancy desires and (3) sexual security or emotional responses accompanying relationship experiences. Our analyses revealed intervention programmes paid little attention to ways age, desires for pregnancy or emotional factors influence sexual decisions. Some programmes included 18- to 25-year-olds, but they made up small percentages of the sample and did not attend to unique emerging adult experiences. Second, primary focus on infection prevention overshadowed participant desires for pregnancy. Third, few interventions considered emotional mechanisms derived from relationship experiences involved in sexual decision-making. Growing evidence demonstrates sexual health interventions may be more effective if augmented to attend to contextual and affective influences on relationship risks and decision-making. Modifying currently accepted strategies may enhance sustainability of sexual health-promoting behaviours. This study provides nurses and public health educators with recommendations for broadening the content of sexual health promotion intervention programming. © 2014 John Wiley & Sons Ltd.

  2. The Norwegian immunisation register--SYSVAK.

    PubMed

    Trogstad, L; Ung, G; Hagerup-Jenssen, M; Cappelen, I; Haugen, I L; Feiring, B

    2012-04-19

    The Norwegian immunisation register, SYSVAK, is a national electronic immunisation register. It became nationwide in 1995. The major aim was to register all vaccinations in the Childhood Immunisation Programme to ensure that all children are offered adequate vaccination according to schedule in the programme, and to secure high vaccination coverage. Notification to SYSVAK is mandatory, based on personal identification numbers. This allows follow up of individual vaccination schedules and linkage of SYSVAK data to other national health registers for information on outcome diagnoses, such as the surveillance system for communicable diseases. Information from SYSVAK is used to determine vaccine coverage in a timely manner. Coverage can be broken down to regional/local levels and used for active surveillance of vaccination coverage and decisions about interventions. During the 2009 influenza A(H1N1)pdm09 pandemic, an adaptation of SYSVAK enabled daily surveillance of vaccination coverage on national and regional levels. Currently, data from SYSVAK are used, among others, in studies on adverse events related to pandemic vaccination. Future challenges include maximising usage of collected data in surveillance and research, and continued improvement of data quality. Immunisation registers are rich sources for high quality surveillance of vaccination coverage, effectiveness, vaccine failure and adverse events, and gold mines for research.

  3. Secure Sensor Platform Software Utilities v.2.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hymel, Ross

    The SSP Software package allows a user to connect to a CoCIM via a Personality Programmer and: Reset the firmware of the CoCIM using the SSP Personality Programmer. The changes that can be made include things such as: Recovering from a tamper event; Resetting the initialization date and message counter; Change configuration values of the CoCIM using the SSP Seal Configuration or the RMSA Configuration File Editor programs. Configuration values that can be set will depend on what version of the CoCIM firmware is being used, but can include: The IP address of the translator with which this CoCIM (ormore » RMSA) communicates; The number of attempts the CoCIM (or RMSA) will attempt to contact the translator; The primary CoCIM (or RMSA) channel; The secondary CoCIM (or RMSA) channel; Locations of files containing CoCIM (or RMSA) encryption keys SSPSerialDataDumper downloads a CoCIM’s stored messages to a computer connected to the CoCIM via a serial cable; SSPLogAnalyzer decrypts and authenticates messages that have been downloaded using the Serial Data Dumper program and then displays the messages values.« less

  4. Design and FPGA implementation for MAC layer of Ethernet PON

    NASA Astrophysics Data System (ADS)

    Zhu, Zengxi; Lin, Rujian; Chen, Jian; Ye, Jiajun; Chen, Xinqiao

    2004-04-01

    Ethernet passive optical network (EPON), which represents the convergence of low-cost, high-bandwidth and supporting multiple services, appears to be one of the best candidates for the next-generation access network. The work of standardizing EPON as a solution for access network is still underway in the IEEE802.3ah Ethernet in the first mile (EFM) task force. The final release is expected in 2004. Up to now, there has been no standard application specific integrated circuit (ASIC) chip available which fulfills the functions of media access control (MAC) layer of EPON. The MAC layer in EPON system has many functions, such as point-to-point emulation (P2PE), Ethernet MAC functionality, multi-point control protocol (MPCP), network operation, administration and maintenance (OAM) and link security. To implement those functions mentioned above, an embedded real-time operating system (RTOS) and a flexible programmable logic device (PLD) with an embedded processor are used. The software and hardware functions in MAC layer are realized through programming embedded microprocessor and field programmable gate array(FPGA). Finally, some experimental results are given in this paper. The method stated here can provide a valuable reference for developing EPON MAC layer ASIC.

  5. Model-guided fieldwork: practical guidelines for multidisciplinary research on wildlife ecological and epidemiological dynamics

    PubMed Central

    Restif, Olivier; Hayman, David T S; Pulliam, Juliet R C; Plowright, Raina K; George, Dylan B; Luis, Angela D; Cunningham, Andrew A; Bowen, Richard A; Fooks, Anthony R; O'Shea, Thomas J; Wood, James L N; Webb, Colleen T

    2012-01-01

    Infectious disease ecology has recently raised its public profile beyond the scientific community due to the major threats that wildlife infections pose to biological conservation, animal welfare, human health and food security. As we start unravelling the full extent of emerging infectious diseases, there is an urgent need to facilitate multidisciplinary research in this area. Even though research in ecology has always had a strong theoretical component, cultural and technical hurdles often hamper direct collaboration between theoreticians and empiricists. Building upon our collective experience of multidisciplinary research and teaching in this area, we propose practical guidelines to help with effective integration among mathematical modelling, fieldwork and laboratory work. Modelling tools can be used at all steps of a field-based research programme, from the formulation of working hypotheses to field study design and data analysis. We illustrate our model-guided fieldwork framework with two case studies we have been conducting on wildlife infectious diseases: plague transmission in prairie dogs and lyssavirus dynamics in American and African bats. These demonstrate that mechanistic models, if properly integrated in research programmes, can provide a framework for holistic approaches to complex biological systems. PMID:22809422

  6. Implementation of the 2-D Wavelet Transform into FPGA for Image

    NASA Astrophysics Data System (ADS)

    León, M.; Barba, L.; Vargas, L.; Torres, C. O.

    2011-01-01

    This paper presents a hardware system implementation of the of discrete wavelet transform algoritm in two dimensions for FPGA, using the Daubechies filter family of order 2 (db2). The decomposition algorithm of this transform is designed and simulated with the Hardware Description Language VHDL and is implemented in a programmable logic device (FPGA) XC3S1200E reference, Spartan IIIE family, by Xilinx, take advantage the parallels properties of these gives us and speeds processing that can reach them. The architecture is evaluated using images input of different sizes. This implementation is done with the aim of developing a future images encryption hardware system using wavelet transform for security information.

  7. European Security in an Evolving World

    DTIC Science & Technology

    2011-06-18

    the key neighboring countries of Russia and Turkey . Chapter three, the final major section of this paper, will seek to identify the aggregated...and wanted in  the  US ‐ is  widely regarded as one of  the  world’s leading arms  smugglers .  A former Soviet officer, he launched into a  new career after...25 Inside  Story , Al Jazeera, “ The  Tool for Revolution?,” (originally aired February 10,  2011),  http://english.aljazeera.net/programmes/insidestory

  8. Development of the mechanical cryocooler system for the Sea Land Surface Temperature Radiometer

    NASA Astrophysics Data System (ADS)

    Camilletti, Adam; Burgess, Christopher; Donchev, Anton; Watson, Stuart; Weatherstone Akbar, Shane; Gamo-Albero, Victoria; Romero-Largacha, Victor; Caballero-Olmo, Gema

    2014-11-01

    The Sea Land Surface Temperature Radiometer is a dual view Earth observing instrument developed as part of the European Global Monitoring for Environment and Security programme. It is scheduled for launch on two satellites, Sentinel 3A and 3B in 2014. The instrument detectors are cooled to below 85 K by two split Stirling Cryocoolers running in hot redundancy. These coolers form part of a cryocooler system that includes a support structure and drive electronics. Aspects of the system design, including control and reduction of exported vibration are discussed; and results, including thermal performance and exported vibration from the Engineering Model Cryooler System test campaign are presented.

  9. How to Apply for and Secure EU Funding for Collaborative IBD Research Projects

    PubMed Central

    Satsangi, Jack; Kitten, Olivier; Chavez, Marcela; Kalla, Rahul; Prel, Nadege; Meuwis, Marie-Alice; Scott, Stephanie; Bonetti, Illaria; Ventham, Nicholas T.

    2016-01-01

    The European Union offers opportunities for high-level of funding of collaborative European research. Calls are regularly published: after the end of the FP7 funding programme the new round of Horizon 2020 calls started in 2015. Several topics are relevant to inflammatory bowel disease (IBD) challenges, including chronic disease management, biomarker discovery and new treatments developments. The aim of this Viewpoint article is to describe the new Horizon 2020 instrument and the project submission procedures, and to highlight these through the description of tips and tricks, taking advantage of four examples of successful projects in the field of IBD: the SADEL, IBD-BIOM, IBD Character and BIOCYCLE projects. PMID:26744440

  10. The role of clinical governance as a strategy for quality improvement in primary care.

    PubMed Central

    Campbell, Stephen M; Sweeney, Grace M

    2002-01-01

    This power considers the process of implementing clinical governance in primary care and its impact on quality improvement. It discuss how clinical governance is being implemented both at the level of Primary Care Organisations and general practices, and the challenges to implementing clinical governance. It also suggests a model for promoting the factors that will help clinical governance improve quality of care. The experience of implementing clinical governance is broadly positive to date. However, the government needs to match its commitment to a ten-year programme of change with realistic timetables to secure the cultural and organisational changes needed to improve quality of care. PMID:12389764

  11. Food insecurity, overweight and obesity among low-income African-American families in Baltimore City: associations with food-related perceptions.

    PubMed

    Vedovato, Gabriela M; Surkan, Pamela J; Jones-Smith, Jessica; Steeves, Elizabeth Anderson; Han, Eunkyung; Trude, Angela Cb; Kharmats, Anna Y; Gittelsohn, Joel

    2016-06-01

    To examine associations between food insecurity, excess body weight, psychosocial factors and food behaviours among low-income African-American families. Cross-sectional survey of participants in the baseline evaluation of the B'More Healthy Communities for Kids (BHCK) obesity prevention trial. We collected data on socio-economic factors, food source destinations, acquiring food, preparation methods, psychosocial factors, beliefs and attitudes, participation in food assistance programmes, anthropometry and food security. We used principal component analysis to identify patterns of food source destinations and logistic regression to examine associations. Fourteen low-income, predominantly African-American neighbourhoods in Baltimore City, MD, USA. Two hundred and ninety-eight adult caregiver-child (10-14 years old) dyads. Of households, 41·6 % had some level of food insecurity and 12·4 % experienced some level of hunger. Food-insecure participants with hunger were significantly more likely to be unemployed and to have lower incomes. We found high rates of excess body weight (overweight and obesity) among adults and children (82·8 % and 37·9 % among food insecure without hunger, 89·2 % and 45·9 % among food insecure with hunger, respectively), although there were no significant differences by food security status. Food source usage patterns, food acquisition, preparation, knowledge, self-efficacy and intentions did not differ by food security. Food security was associated with perceptions that healthy foods are affordable and convenient. Greater caregiver body satisfaction was associated with food insecurity and excess body weight. In this setting, obesity and food insecurity are major problems. For many food-insecure families, perceptions of healthy foods may serve as additional barriers to their purchase and consumption.

  12. Why and How the Dairy Farmers of India are Vulnerable to the Impacts of Climate Variability and Change?

    NASA Astrophysics Data System (ADS)

    Radhakrishnan, A.; Gupta, J.

    2017-12-01

    Climate change and variability has added many atrociousness to India's food security challenges and the relationship between the asset components of farmers and climate change is always complex. In India, dairy farming substantially contributes towards the food security and always plays a supportive role to agriculture from the adversities. This study provides an overview of the socio economic and livelihood vulnerability of small holder dairy farmers of India to climate change and variability in three dimensions — sensitivity, exposure and adaptive capacity by combining 70 indicators and 12 major components. The livelihood and socio economic vulnerability of dairy farmers to climate change and variability is assessed at taluka level in India through detailed house hold level data of livelihoods of Western Ghats region of India collected by several levels of survey and through Participatory Rural Appraisal (PRA) techniques from selected farmers complemented by thirty years of gridded weather data and other secondary data sources. The index score of dairy based livelihoods of Maharashtra was highly negative compared to other states with about 50 percent of farmers having high level of vulnerability with significant tradeoff between milk productivity and health, food, natural disasters-climate variability components. It finds that ensuring food security in the scenario of climate change will be a dreadful challenge and recommends identification of different potential options depending on local contexts at grass root level, the adoption of sustainable agricultural practices, focusing on improving the adaptive capacity component, provision of livelihood security, preparing the extensionists of Krishi Vigyan Kendras (KVKs)- universities to deal with the risks through extensive training programmes, long-term relief measures in the event of natural disasters, workshops on climate science and communication and promoting farmer centric extension system.

  13. Perspectives from the frontlines: palliative care providers' expectations of Canada's compassionate care benefit programme.

    PubMed

    Giesbrecht, Melissa; Crooks, Valorie A; Williams, Allison

    2010-11-01

    Recognising their valuable role as key informants, this study examines the perspectives of front-line palliative care providers (FLPCP) regarding a social benefit programme in Canada designed to support family caregivers at end-of-life, namely the Compassionate Care Benefit (CCB). The CCB's purpose is to provide income assistance and job security to family caregivers who take temporary leave from employment to care for a dying family member. Contributing to an evaluative study that aims to provide policy-relevant recommendations about the CCB, this analysis draws on semi-structured interviews undertaken in 2007/2008 with FLPCPs (n = 50) from across Canada. Although participants were not explicitly asked during interviews about their expectations of the CCB, thematic content analysis revealed 'expectations' as a key finding. Through participants' discussions of their knowledge of and familiarity with the CCB, specific expectations were identified and grouped into four categories: (1) temporal; (2) financial; (3) informational; and (4) administrative. Findings demonstrate that participants expect the CCB to provide: (1) an adequate length of leave time from work, which is reflective of the uncertain nature of caregiving at end-of-life; (2) adequate financial support; (3) information on the programme to be disseminated to FLPCPs so that they may share it with others; and (4) a simple, clear, and quick application process. FLPCPs hold unique expertise, and ultimately the power to shape uptake of the CCB. As such, their expectations of the CCB contribute valuable knowledge from which relevant policy recommendations can be made to better meet the needs of family caregivers and FLPCPs alike. © 2010 Blackwell Publishing Ltd.

  14. Supply-side harm reduction strategies: Bolivia's experiment with social control.

    PubMed

    Farthing, Linda; Kohl, Benjamin

    2012-11-01

    Harm reduction approaches to drug control have almost exclusively focussed on consumers in northern countries. This article supports recent analysis that indicates that such policies also hold relevance for producer countries by drawing on recent policy innovations in Bolivia. When Evo Morales, the president of the national coca grower confederation, was elected the country's first indigenous president in 2005, he promised to fundamentally change 25 years of the U.S.-funded "drug war" that had generated repeated human rights violations. The new policy, which implicitly incorporates harm reduction principles combined with respect for human rights, recognizes coca leaf's traditional use and cultural importance and relies on vigorous local organizations to implement a community-based programme called social control. Results to date indicate that Bolivia's social control experience has reduced violence in coca growing communities, ensured small farmers a subsistence income from coca and increased sovereignty, while making a modest contribution to containing expansion of coca cultivation. The programme has registered 50,000 farmers who are allowed to cultivate limited quantities of coca to supply traditional users and helped them gain secure title to their land. This registration is combined with satellite surveillance to guarantee that farmers do not exceed limits established by law. To date, the programme's reach is incomplete and coca is still diverted to the drug trade. Nonetheless, the approach may offer lessons for other drug producer countries, particularly where strong socio-political organizations are found in combination with closeknit communities holding shared cultural values. Copyright © 2012 Elsevier B.V. All rights reserved.

  15. Addressing malnutrition in young children in South Africa. Setting the national context for paediatric food-based dietary guidelines.

    PubMed

    Bourne, Lesley T; Hendricks, Michael K; Marais, Debbie; Eley, Brian

    2007-10-01

    Despite various national nutrition and primary healthcare programmes being initiated in South Africa over the last decade, child health has deteriorated. This is seen by the rise in infant and child mortality rates, the high prevalence of preventable childhood diseases, e.g. diarrhoea and lower respiratory tract infections, and the coexistence of under-nutrition along with HIV/AIDS. Poor dietary intake, food insecurity and poor quality of basic services prevail within this precarious causal web. The national Integrated Nutrition Programme is a comprehensive nutrition strategy that focuses on children below 6 years old, at-risk pregnant and lactating women, and those affected by communicable and non-communicable diseases. Focus areas relevant to pre-school children include disease-specific nutrition treatment, support and counselling; growth monitoring and promotion (GMP); micronutrient malnutrition control; breastfeeding promotion, protection and support; contributions to household food security; nutrition interventions among HIV-infected children; and nutrition promotion, education and advocacy. Progress towards this includes the Baby-Friendly Hospital Initiative; mandatory fortification of maize meal and wheat flour with multiple micronutrients; vitamin A supplementation coverage and mandatory iodization of salt by legislation; the provision of free road-to-health charts for GMP; and the National School Nutrition Programme. Since 2003, the basis of the nutrition education strategy has been the locally developed food-based dietary guidelines (FBDGs), directed at adults and school-going children. This review sketches the backdrop to and motivation for the introduction of specifically targeted paediatric FBDGs, for mothers and caregivers of children from birth to age 7 years, as a national initiative.

  16. Building a clinical leadership community to drive improvement: a multi-case educational study to inform 21st century clinical commissioning, professional capability and patient care.

    PubMed

    Lynch, Marion; Verner, Elizabeth

    2013-01-01

    The new NHS requires transformational leadership; people with the knowledge and motivation to make effective change combined with an understanding of the system they work in. The aim of the Practice Leaders' Programme (PLP) is to generate the conditions needed to focus the energy and collaborative creativity required for innovation to enhance leadership skills across the health economy improving patient care. The PLP engaged 60 local leaders from central England in a new approach enabling them to influence others. It has informed educational policy and practice and helped change professional behaviours. Each participant implemented improvements in care and participated in six action learning sets (ALS) and up to six coaching sessions. Evidence of progress, learning and impact was identified in project reports, reflective diaries and evaluations. The ALS brought together key individuals from clinical and management disciplines across a diverse organisation to redesign a system by developing a shared vision for improving the quality of patient care. The links forged, the projects initiated, and the skills cultivated through the PLP produced ongoing benefits and outcomes beyond the course itself. Coaching sessions helped participants focus their efforts to achieve maximum impact and to become resilient in managing service change effectively. The programme has evolved over four years, building on recommendations from external evaluation which identified statistically significant increases in leadership competences. Further enhancement of this programme secured an International Health Improvement Award. Three key findings of positive impact have emerged; personal growth, service improvement, and legacy and sustainability.

  17. An open-access, mobile compatible, electronic patient register for rheumatic heart disease ('eRegister') based on the World Heart Federation's framework for patient registers.

    PubMed

    van Dam, Joris; Musuku, John; Zühlke, Liesl J; Engel, Mark E; Nestle, Nick; Tadmor, Brigitta; Spector, Jonathan; Mayosi, Bongani M

    2015-01-01

    Rheumatic heart disease (RHD) remains a major disease burden in low-resource settings globally. Patient registers have long been recognised to be an essential instrument in RHD control and elimination programmes, yet to date rely heavily on paper-based data collection and non-networked data-management systems, which limit their functionality. To assess the feasibility and potential benefits of producing an electronic RHD patient register. We developed an eRegister based on the World Heart Federation's framework for RHD patient registers using CommCare, an open-source, cloud-based software for health programmes that supports the development of customised data capture using mobile devices. The resulting eRegistry application allows for simultaneous data collection and entry by field workers using mobile devices, and by providers using computer terminals in clinics and hospitals. Data are extracted from CommCare and are securely uploaded into a cloud-based database that matches the criteria established by the WHF framework. The application can easily be tailored to local needs by modifying existing variables or adding new ones. Compared with traditional paper-based data-collection systems, the eRegister reduces the risk of data error, synchronises in real-time, improves clinical operations and supports management of field team operations. The user-friendly eRegister is a low-cost, mobile, compatible platform for RHD treatment and prevention programmes based on materials sanctioned by the World Heart Federation. Readily adaptable to local needs, this paperless RHD patient register program presents many practical benefits.

  18. Cross-country analysis of strategies for achieving progress towards global goals for women’s and children’s health

    PubMed Central

    Ahmed, Syed Masud; Rawal, Lal B; Chowdhury, Sadia A; Murray, John; Arscott-Mills, Sharon; Jack, Susan; Hinton, Rachael; Alam, Prima M

    2016-01-01

    Abstract Objective To identify how 10 low- and middle-income countries achieved accelerated progress, ahead of comparable countries, towards meeting millennium development goals 4 and 5A to reduce child and maternal mortality. Methods We synthesized findings from multistakeholder dialogues and country policy reports conducted previously for the Success Factors studies in 10 countries: Bangladesh, Cambodia, China, Egypt, Ethiopia, the Lao People's Democratic Republic, Nepal, Peru, Rwanda and Viet Nam. A framework approach was used to analyse and synthesize the data from the country reports, resulting in descriptive or explanatory conclusions by theme. Findings Successful policy and programme approaches were categorized in four strategic areas: leadership and multistakeholder partnerships; health sector; sectors outside health; and accountability for resources and results. Consistent and coordinated inputs across sectors, based on high-impact interventions, were assessed. Within the health sector, key policy and programme strategies included defining standards, collecting and using data, improving financial protection, and improving the availability and quality of services. Outside the health sector, strategies included investing in girls’ education, water, sanitation and hygiene, poverty reduction, nutrition and food security, and infrastructure development. Countries improved accountability by strengthening and using data systems for planning and evaluating progress. Conclusion Reducing maternal and child mortality in the 10 fast-track countries can be linked to consistent and coordinated policy and programme inputs across health and other sectors. The approaches used by successful countries have relevance to other countries looking to scale-up or accelerate progress towards the sustainable development goals. PMID:27147765

  19. Gait rehabilitation machines based on programmable footplates.

    PubMed

    Schmidt, Henning; Werner, Cordula; Bernhardt, Rolf; Hesse, Stefan; Krüger, Jörg

    2007-02-09

    Gait restoration is an integral part of rehabilitation of brain lesioned patients. Modern concepts favour a task-specific repetitive approach, i.e. who wants to regain walking has to walk, while tone-inhibiting and gait preparatory manoeuvres had dominated therapy before. Following the first mobilization out of the bed, the wheelchair-bound patient should have the possibility to practise complex gait cycles as soon as possible. Steps in this direction were treadmill training with partial body weight support and most recently gait machines enabling the repetitive training of even surface gait and even of stair climbing. With treadmill training harness-secured and partially relieved wheelchair-mobilised patients could practise up to 1000 steps per session for the first time. Controlled trials in stroke and SCI patients, however, failed to show a superior result when compared to walking exercise on the floor. Most likely explanation was the effort for the therapists, e.g. manually setting the paretic limbs during the swing phase resulting in a too little gait intensity. The next steps were gait machines, either consisting of a powered exoskeleton and a treadmill (Lokomat, AutoAmbulator) or an electromechanical solution with the harness secured patient placed on movable foot plates (Gait Trainer GT I). For the latter, a large multi-centre trial with 155 non-ambulatory stroke patients (DEGAS) revealed a superior gait ability and competence in basic activities of living in the experimental group. The HapticWalker continued the end effector concept of movable foot plates, now fully programmable and equipped with 6 DOF force sensors. This device for the first time enables training of arbitrary walking situations, hence not only the simulation of floor walking but also for example of stair climbing and perturbations. Locomotor therapy is a fascinating new tool in rehabilitation, which is in line with modern principles of motor relearning promoting a task-specific repetitive approach. Sophisticated technical developments and positive randomized controlled trials form the basis of a growing acceptance worldwide to the benefits or our patients.

  20. Risk Management in Agriculture for Food Security in Latin America and the Caribbean

    NASA Astrophysics Data System (ADS)

    Martinez, A.; National Research CouncilScientific; Technological Research (Conicet)

    2013-05-01

    The Americas are extremely important as a unique contributor to Food Security. It provides from tropical to temperate crops. Not only they are able to feed their own population, but contribute significantly to the food supply of the population in developed, emergent and underdeveloped countries. This fact has given the region a unique responsibility to develop a regional risk-management strategy to manage food insecurity at a local, national, regional and global level. Although international agencies such as UN Food and Agriculture Organization (FAO), Instituto Interamericano para la Cooperación en Agricultura (IICA) and the regional centres of the Consultative Group for International Agriculture Research (CGIAR) and the World Bank (WB), are engaged in actions for Risk Management in Agriculture for reducing Food Insecurity. However there is a need to build a framework and/or comprehensive regional strategy for the Americas. It would identify areas for promoting research projects where natural and social science work together for producing relevant scientific information and tools i.e. maps, indicators, models and scenarios, early warning systems, etc. to cooperate with both policy and decision makers in the public and private sectors. This would eventually lead to a comprehensive regional programme for reducing food insecurity. The purpose of International Council for Science-International Research and the International Research for Disaster Risk programme (ICSU-IRDR) and ICSU Regional Office for Latinamerica and the Caribbean (ICSU-ROLAC) is to promote the cooperation of the relevant scientific fields in both natural science and social science in a multi and trans-disciplinary approach on risk management to reduce food insecurity. Also both ICSU-IRDR and ICSU-ROLAC are building a case for the inclusion of the scientific community in the revision of the Hjogo Framework for Action for Disaster Reduction to be held in 2015 as risk management for reducing food insecurity is part of the agenda.

Top