Sample records for runtime assertion checking

  1. A Discussion of Issues in Integrity Constraint Monitoring

    NASA Technical Reports Server (NTRS)

    Fernandez, Francisco G.; Gates, Ann Q.; Cooke, Daniel E.

    1998-01-01

    In the development of large-scale software systems, analysts, designers, and programmers identify properties of data objects in the system. The ability to check those assertions during runtime is desirable as a means of verifying the integrity of the program. Typically, programmers ensure the satisfaction of such properties through the use of some form of manually embedded assertion check. The disadvantage to this approach is that these assertions become entangled within the program code. The goal of the research is to develop an integrity constraint monitoring mechanism whereby a repository of software system properties (called integrity constraints) are automatically inserted into the program by the mechanism to check for incorrect program behaviors. Such a mechanism would overcome many of the deficiencies of manually embedded assertion checks. This paper gives an overview of the preliminary work performed toward this goal. The manual instrumentation of constraint checking on a series of test programs is discussed, This review then is used as the basis for a discussion of issues to be considered in developing an automated integrity constraint monitor.

  2. Optimized Temporal Monitors for SystemC

    NASA Technical Reports Server (NTRS)

    Tabakov, Deian; Rozier, Kristin Y.; Vardi, Moshe Y.

    2012-01-01

    SystemC is a modeling language built as an extension of C++. Its growing popularity and the increasing complexity of designs have motivated research efforts aimed at the verification of SystemC models using assertion-based verification (ABV), where the designer asserts properties that capture the design intent in a formal language such as PSL or SVA. The model then can be verified against the properties using runtime or formal verification techniques. In this paper we focus on automated generation of runtime monitors from temporal properties. Our focus is on minimizing runtime overhead, rather than monitor size or monitor-generation time. We identify four issues in monitor generation: state minimization, alphabet representation, alphabet minimization, and monitor encoding. We conduct extensive experimentation and identify a combination of settings that offers the best performance in terms of runtime overhead.

  3. Model Checker for Java Programs

    NASA Technical Reports Server (NTRS)

    Visser, Willem

    2007-01-01

    Java Pathfinder (JPF) is a verification and testing environment for Java that integrates model checking, program analysis, and testing. JPF consists of a custom-made Java Virtual Machine (JVM) that interprets bytecode, combined with a search interface to allow the complete behavior of a Java program to be analyzed, including interleavings of concurrent programs. JPF is implemented in Java, and its architecture is highly modular to support rapid prototyping of new features. JPF is an explicit-state model checker, because it enumerates all visited states and, therefore, suffers from the state-explosion problem inherent in analyzing large programs. It is suited to analyzing programs less than 10kLOC, but has been successfully applied to finding errors in concurrent programs up to 100kLOC. When an error is found, a trace from the initial state to the error is produced to guide the debugging. JPF works at the bytecode level, meaning that all of Java can be model-checked. By default, the software checks for all runtime errors (uncaught exceptions), assertions violations (supports Java s assert), and deadlocks. JPF uses garbage collection and symmetry reductions of the heap during model checking to reduce state-explosion, as well as dynamic partial order reductions to lower the number of interleavings analyzed. JPF is capable of symbolic execution of Java programs, including symbolic execution of complex data such as linked lists and trees. JPF is extensible as it allows for the creation of listeners that can subscribe to events during searches. The creation of dedicated code to be executed in place of regular classes is supported and allows users to easily handle native calls and to improve the efficiency of the analysis.

  4. Cooperative runtime monitoring

    NASA Astrophysics Data System (ADS)

    Hallé, Sylvain

    2013-11-01

    Requirements on message-based interactions can be formalised as an interface contract that specifies constraints on the sequence of possible messages that can be exchanged by multiple parties. At runtime, each peer can monitor incoming messages and check that the contract is correctly being followed by their respective senders. We introduce cooperative runtime monitoring, where a recipient 'delegates' its monitoring task to the sender, which is required to provide evidence that the message it sends complies with the contract. In turn, this evidence can be quickly checked by the recipient, which is then guaranteed of the sender's compliance to the contract without doing the monitoring computation by itself. A particular application of this concept is shown on web services, where service providers can monitor and enforce contract compliance of third-party clients at a small cost on the server side, while avoiding to certify or digitally sign them.

  5. Runtime Analysis of Linear Temporal Logic Specifications

    NASA Technical Reports Server (NTRS)

    Giannakopoulou, Dimitra; Havelund, Klaus

    2001-01-01

    This report presents an approach to checking a running program against its Linear Temporal Logic (LTL) specifications. LTL is a widely used logic for expressing properties of programs viewed as sets of executions. Our approach consists of translating LTL formulae to finite-state automata, which are used as observers of the program behavior. The translation algorithm we propose modifies standard LTL to B chi automata conversion techniques to generate automata that check finite program traces. The algorithm has been implemented in a tool, which has been integrated with the generic JPaX framework for runtime analysis of Java programs.

  6. Building Program Verifiers from Compilers and Theorem Provers

    DTIC Science & Technology

    2015-05-14

    Checking with SMT UFO • LLVM-based front-end (partially reused in SeaHorn) • Combines Abstract Interpretation with Interpolation-Based Model Checking • (no...assertions Counter-examples are long Hard to determine (from main) what is relevant Assertion Main 35 Building Verifiers from Comp and SMT Gurfinkel, 2015

  7. The ASSERT Virtual Machine Kernel: Support for Preservation of Temporal Properties

    NASA Astrophysics Data System (ADS)

    Zamorano, J.; de la Puente, J. A.; Pulido, J. A.; Urueña

    2008-08-01

    A new approach to building embedded real-time software has been developed in the ASSERT project. One of its key elements is the concept of a virtual machine preserving the non-functional properties of the system, and especially real-time properties, all the way down from high- level design models down to executable code. The paper describes one instance of the virtual machine concept that provides support for the preservation of temporal properties both at the source code level —by accept- ing only "legal" entities, i.e. software components with statically analysable real-tim behaviour— and at run-time —by monitoring the temporal behaviour of the system. The virtual machine has been validated on several pilot projects carried out by aerospace companies in the framework of the ASSERT project.

  8. Using Runtime Analysis to Guide Model Checking of Java Programs

    NASA Technical Reports Server (NTRS)

    Havelund, Klaus; Norvig, Peter (Technical Monitor)

    2001-01-01

    This paper describes how two runtime analysis algorithms, an existing data race detection algorithm and a new deadlock detection algorithm, have been implemented to analyze Java programs. Runtime analysis is based on the idea of executing the program once. and observing the generated run to extract various kinds of information. This information can then be used to predict whether other different runs may violate some properties of interest, in addition of course to demonstrate whether the generated run itself violates such properties. These runtime analyses can be performed stand-alone to generate a set of warnings. It is furthermore demonstrated how these warnings can be used to guide a model checker, thereby reducing the search space. The described techniques have been implemented in the b e grown Java model checker called PathFinder.

  9. Quantified Event Automata: Towards Expressive and Efficient Runtime Monitors

    NASA Technical Reports Server (NTRS)

    Barringer, Howard; Falcone, Ylies; Havelund, Klaus; Reger, Giles; Rydeheard, David

    2012-01-01

    Runtime verification is the process of checking a property on a trace of events produced by the execution of a computational system. Runtime verification techniques have recently focused on parametric specifications where events take data values as parameters. These techniques exist on a spectrum inhabited by both efficient and expressive techniques. These characteristics are usually shown to be conflicting - in state-of-the-art solutions, efficiency is obtained at the cost of loss of expressiveness and vice-versa. To seek a solution to this conflict we explore a new point on the spectrum by defining an alternative runtime verification approach.We introduce a new formalism for concisely capturing expressive specifications with parameters. Our technique is more expressive than the currently most efficient techniques while at the same time allowing for optimizations.

  10. The SERENITY Runtime Monitoring Framework

    NASA Astrophysics Data System (ADS)

    Spanoudakis, George; Kloukinas, Christos; Mahbub, Khaled

    This chapter describes SERENITY’s approach to runtime monitoring and the framework that has been developed to support it. Runtime monitoring is required in SERENITY in order to check for violations of security and dependability properties which are necessary for the correct operation of the security and dependability solutions that are available from the SERENITY framework. This chapter discusses how such properties are specified and monitored. The chapter focuses on the activation and execution of monitoring activities using S&D Patterns and the actions that may be undertaken following the detection of property violations. The approach is demonstrated in reference to one of the industrial case studies of the SERENITY project.

  11. Regulatory Conformance Checking: Logic and Logical Form

    ERIC Educational Resources Information Center

    Dinesh, Nikhil

    2010-01-01

    We consider the problem of checking whether an organization conforms to a body of regulation. Conformance is studied in a runtime verification setting. The regulation is translated to a logic, from which we synthesize monitors. The monitors are evaluated as the state of an organization evolves over time, raising an alarm if a violation is…

  12. Forward-Chaining Versus A Graph Approach As The Inference Engine In Expert Systems

    NASA Astrophysics Data System (ADS)

    Neapolitan, Richard E.

    1986-03-01

    Rule-based expert systems are those in which a certain number of IF-THEN rules are assumed to be true. Based on the verity of some assertions, the rules deduce as many new conclusions as possible. A standard technique used to make these deductions is forward-chaining. In forward-chaining, the program or 'inference engine' cycles through the rules. At each rule, the premises for the rule are checked against the current true assertions. If all the premises are found, the conclusion is added to the list of true assertions. At that point it is necessary to start over at the first rule, since the new conclusion may be a premise in a rule already checked. Therefore, each time a new conclusion is deduced it is necessary to start the rule checking procedure over. This process continues until no new conclusions are added and the end of the list of rules is reached. The above process, although quite costly in terms of CPU cycles due to the necessity of repeatedly starting the process over, is necessary if the rules contain 'pattern variables'. An example of such a rule is, 'IF X IS A BACTERIA, THEN X CAN BE TREATED WITH ANTIBIOTICS'. Since the rule can lead to conclusions for many values of X, it is necessary to check each premise in the rule against every true assertion producing an association list to be used in the checking of the next premise. However, if the rule does not contain variable data, as is the case in many current expert systems, then a rule can lead to only one conclusion. In this case, the rules can be stored in a graph, and the true assertions in an assertion list. The assertion list is traversed only once; at each assertion a premise is triggered in all the rules which have that assertion as a premise. When all premises for a rule trigger, the rule's conclusion is added to the END of the list of assertions. It must be added at the end so that it will eventually be used to make further deductions. In the current paper, the two methods are described in detail, the relative advantages of each is discussed, and a benchmark comparing the CPU cycles consumed by each is included. It is also shown that, in the case of reasoning under uncertainty, it is possible to properly combine the certainties derived from rules arguing for the same conclusion when the graph approach is used.

  13. MESA: Message-Based System Analysis Using Runtime Verification

    NASA Technical Reports Server (NTRS)

    Shafiei, Nastaran; Tkachuk, Oksana; Mehlitz, Peter

    2017-01-01

    In this paper, we present a novel approach and framework for run-time verication of large, safety critical messaging systems. This work was motivated by verifying the System Wide Information Management (SWIM) project of the Federal Aviation Administration (FAA). SWIM provides live air traffic, site and weather data streams for the whole National Airspace System (NAS), which can easily amount to several hundred messages per second. Such safety critical systems cannot be instrumented, therefore, verification and monitoring has to happen using a nonintrusive approach, by connecting to a variety of network interfaces. Due to a large number of potential properties to check, the verification framework needs to support efficient formulation of properties with a suitable Domain Specific Language (DSL). Our approach is to utilize a distributed system that is geared towards connectivity and scalability and interface it at the message queue level to a powerful verification engine. We implemented our approach in the tool called MESA: Message-Based System Analysis, which leverages the open source projects RACE (Runtime for Airspace Concept Evaluation) and TraceContract. RACE is a platform for instantiating and running highly concurrent and distributed systems and enables connectivity to SWIM and scalability. TraceContract is a runtime verication tool that allows for checking traces against properties specified in a powerful DSL. We applied our approach to verify a SWIM service against several requirements.We found errors such as duplicate and out-of-order messages.

  14. COVERT: A Framework for Finding Buffer Overflows in C Programs via Software Verification

    DTIC Science & Technology

    2010-08-01

    is greater than the allocated size of B. In the case of a type-safe language or a language with runtime bounds checking (such as Java), an overflow...leads either to a (compile-time) type error or a (runtime) exception. In such languages , a buffer overflow can lead to a denial of service attack (i.e...of current and legacy software is written in unsafe languages (such as C or C++) that allow buffers to be overflowed with impunity. For reasons such as

  15. Detecting Malicious Tweets in Twitter Using Runtime Monitoring With Hidden Information

    DTIC Science & Technology

    2016-06-01

    text mining using Twitter streaming API and python [Online]. Available: http://adilmoujahid.com/posts/2014/07/twitter-analytics/ [22] M. Singh, B...sites with 645,750,000 registered users [3] and has open source public tweets for data mining . 2. Malicious Users and Tweets In the modern world...want to data mine in Twitter, and presents the natural language assertions and corresponding rule patterns. It then describes the steps performed using

  16. Static Verification for Code Contracts

    NASA Astrophysics Data System (ADS)

    Fähndrich, Manuel

    The Code Contracts project [3] at Microsoft Research enables programmers on the .NET platform to author specifications in existing languages such as C# and VisualBasic. To take advantage of these specifications, we provide tools for documentation generation, runtime contract checking, and static contract verification.

  17. A Formal Methodology to Design and Deploy Dependable Wireless Sensor Networks

    PubMed Central

    Testa, Alessandro; Cinque, Marcello; Coronato, Antonio; Augusto, Juan Carlos

    2016-01-01

    Wireless Sensor Networks (WSNs) are being increasingly adopted in critical applications, where verifying the correct operation of sensor nodes is a major concern. Undesired events may undermine the mission of the WSNs. Hence, their effects need to be properly assessed before deployment, to obtain a good level of expected performance; and during the operation, in order to avoid dangerous unexpected results. In this paper, we propose a methodology that aims at assessing and improving the dependability level of WSNs by means of an event-based formal verification technique. The methodology includes a process to guide designers towards the realization of a dependable WSN and a tool (“ADVISES”) to simplify its adoption. The tool is applicable to homogeneous WSNs with static routing topologies. It allows the automatic generation of formal specifications used to check correctness properties and evaluate dependability metrics at design time and at runtime for WSNs where an acceptable percentage of faults can be defined. During the runtime, we can check the behavior of the WSN accordingly to the results obtained at design time and we can detect sudden and unexpected failures, in order to trigger recovery procedures. The effectiveness of the methodology is shown in the context of two case studies, as proof-of-concept, aiming to illustrate how the tool is helpful to drive design choices and to check the correctness properties of the WSN at runtime. Although the method scales up to very large WSNs, the applicability of the methodology may be compromised by the state space explosion of the reasoning model, which must be faced by partitioning large topologies into sub-topologies. PMID:28025568

  18. How Mathematicians Obtain Conviction: Implications for Mathematics Instruction and Research on Epistemic Cognition

    ERIC Educational Resources Information Center

    Weber, Keith; Inglis, Matthew; Mejia-Ramos, Juan Pablo

    2014-01-01

    The received view of mathematical practice is that mathematicians gain certainty in mathematical assertions by deductive evidence rather than empirical or authoritarian evidence. This assumption has influenced mathematics instruction where students are expected to justify assertions with deductive arguments rather than by checking the assertion…

  19. An Assertiveness Inventory for Adults

    ERIC Educational Resources Information Center

    Gay, Melvin L.; And Others

    1975-01-01

    The Adult Self-Expression Scale is a 48-item, self-report measure of assertiveness designed for use with adults in general. Scale was found to have high test-retest reliability and moderate-to-high construct validity, as established by correlations with Adjective Check List scales and by a discriminant analysis procedure. (Author)

  20. A rigorous approach to self-checking programming

    NASA Technical Reports Server (NTRS)

    Hua, Kien A.; Abraham, Jacob A.

    1986-01-01

    Self-checking programming is shown to be an effective concurrent error detection technique. The reliability of a self-checking program however relies on the quality of its assertion statements. A self-checking program written without formal guidelines could provide a poor coverage of the errors. A constructive technique for self-checking programming is presented. A Structured Program Design Language (SPDL) suitable for self-checking software development is defined. A set of formal rules, was also developed, that allows the transfromation of SPDL designs into self-checking designs to be done in a systematic manner.

  1. A Scala DSL for RETE-Based Runtime Verification

    NASA Technical Reports Server (NTRS)

    Havelund, Klaus

    2013-01-01

    Runtime verification (RV) consists in part of checking execution traces against formalized specifications. Several systems have emerged, most of which support specification notations based on state machines, regular expressions, temporal logic, or grammars. The field of Artificial Intelligence (AI) has for an even longer period of time studied rule-based production systems, which at a closer look appear to be relevant for RV, although seemingly focused on slightly different application domains, such as for example business processes and expert systems. The core algorithm in many of these systems is the Rete algorithm. We have implemented a Rete-based runtime verification system, named LogFire (originally intended for offline log analysis but also applicable to online analysis), as an internal DSL in the Scala programming language, using Scala's support for defining DSLs. This combination appears attractive from a practical point of view. Our contribution is in part conceptual in arguing that such rule-based frameworks originating from AI may be suited for RV.

  2. Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime

    NASA Astrophysics Data System (ADS)

    Crespo, Beatriz Gallego-Nicasio; Piñuela, Ana; Soria-Rodriguez, Pedro; Serrano, Daniel; Maña, Antonio

    In order to satisfy the requests of SERENITY-aware applications, the SERENITY Runtime Framework’s main task is to perform pattern selection, to provide the application with the most suitable S&D Solution that satisfies the request. The result of this selection process depends on two main factors: the content of the S&D Library and the information stored and managed by the Context Manager. Three processes are involved: searching of the S&D Library to get the initial set of candidates to be selected; filtering and ordering the collection, based on the SRF configuration; and perform a loop to check S&D Pattern preconditions over the remaining S&D Artifacts in order to select the most suitable S&D Pattern first, and later the appropriate S&D Implementation for the environment conditions. Once the S&D Implementation is selected, the SERENITY Runtime Framework instantiates an Executable Component (EC) and provides the application with the necessary information and mechanism to make use of the EC.

  3. Runtime Detection of C-Style Errors in UPC Code

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pirkelbauer, P; Liao, C; Panas, T

    2011-09-29

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the globalmore » address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.« less

  4. Experience Report: A Do-It-Yourself High-Assurance Compiler

    NASA Technical Reports Server (NTRS)

    Pike, Lee; Wegmann, Nis; Niller, Sebastian; Goodloe, Alwyn

    2012-01-01

    Embedded domain-specific languages (EDSLs) are an approach for quickly building new languages while maintaining the advantages of a rich metalanguage. We argue in this experience report that the "EDSL approach" can surprisingly ease the task of building a high-assurance compiler.We do not strive to build a fully formally-verified tool-chain, but take a "do-it-yourself" approach to increase our confidence in compiler-correctness without too much effort. Copilot is an EDSL developed by Galois, Inc. and the National Institute of Aerospace under contract to NASA for the purpose of runtime monitoring of flight-critical avionics. We report our experience in using type-checking, QuickCheck, and model-checking "off-the-shelf" to quickly increase confidence in our EDSL tool-chain.

  5. Automata-Based Verification of Temporal Properties on Running Programs

    NASA Technical Reports Server (NTRS)

    Giannakopoulou, Dimitra; Havelund, Klaus; Lan, Sonie (Technical Monitor)

    2001-01-01

    This paper presents an approach to checking a running program against its Linear Temporal Logic (LTL) specifications. LTL is a widely used logic for expressing properties of programs viewed as sets of executions. Our approach consists of translating LTL formulae to finite-state automata, which are used as observers of the program behavior. The translation algorithm we propose modifies standard LTL to Buchi automata conversion techniques to generate automata that check finite program traces. The algorithm has been implemented in a tool, which has been integrated with the generic JPaX framework for runtime analysis of Java programs.

  6. Framework for Evaluating Loop Invariant Detection Games in Relation to Automated Dynamic Invariant Detectors

    DTIC Science & Technology

    2015-09-01

    Detectability ...............................................................................................37 Figure 20. Excel VBA Codes for Checker...National Vulnerability Database OS Operating System SQL Structured Query Language VC Verification Condition VBA Visual Basic for Applications...checks each of these assertions for detectability by Daikon. The checker is an Excel Visual Basic for Applications ( VBA ) script that checks the

  7. Dual compile strategy for parallel heterogeneous execution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Tyler Barratt; Perry, James Thomas

    2012-06-01

    The purpose of the Dual Compile Strategy is to increase our trust in the Compute Engine during its execution of instructions. This is accomplished by introducing a heterogeneous Monitor Engine that checks the execution of the Compute Engine. This leads to the production of a second and custom set of instructions designed for monitoring the execution of the Compute Engine at runtime. This use of multiple engines differs from redundancy in that one engine is working on the application while the other engine is monitoring and checking in parallel instead of both applications (and engines) performing the same work atmore » the same time.« less

  8. MPI Runtime Error Detection with MUST: Advances in Deadlock Detection

    DOE PAGES

    Hilbrich, Tobias; Protze, Joachim; Schulz, Martin; ...

    2013-01-01

    The widely used Message Passing Interface (MPI) is complex and rich. As a result, application developers require automated tools to avoid and to detect MPI programming errors. We present the Marmot Umpire Scalable Tool (MUST) that detects such errors with significantly increased scalability. We present improvements to our graph-based deadlock detection approach for MPI, which cover future MPI extensions. Our enhancements also check complex MPI constructs that no previous graph-based detection approach handled correctly. Finally, we present optimizations for the processing of MPI operations that reduce runtime deadlock detection overheads. Existing approaches often require ( p ) analysis time permore » MPI operation, for p processes. We empirically observe that our improvements lead to sub-linear or better analysis time per operation for a wide range of real world applications.« less

  9. Environment Modeling Using Runtime Values for JPF-Android

    NASA Technical Reports Server (NTRS)

    van der Merwe, Heila; Tkachuk, Oksana; Nel, Seal; van der Merwe, Brink; Visser, Willem

    2015-01-01

    Software applications are developed to be executed in a specific environment. This environment includes external native libraries to add functionality to the application and drivers to fire the application execution. For testing and verification, the environment of an application is simplified abstracted using models or stubs. Empty stubs, returning default values, are simple to generate automatically, but they do not perform well when the application expects specific return values. Symbolic execution is used to find input parameters for drivers and return values for library stubs, but it struggles to detect the values of complex objects. In this work-in-progress paper, we explore an approach to generate drivers and stubs based on values collected during runtime instead of using default values. Entry-points and methods that need to be modeled are instrumented to log their parameters and return values. The instrumented applications are then executed using a driver and instrumented libraries. The values collected during runtime are used to generate driver and stub values on- the-fly that improve coverage during verification by enabling the execution of code that previously crashed or was missed. We are implementing this approach to improve the environment model of JPF-Android, our model checking and analysis tool for Android applications.

  10. An Overview of the Runtime Verification Tool Java PathExplorer

    NASA Technical Reports Server (NTRS)

    Havelund, Klaus; Rosu, Grigore; Clancy, Daniel (Technical Monitor)

    2002-01-01

    We present an overview of the Java PathExplorer runtime verification tool, in short referred to as JPAX. JPAX can monitor the execution of a Java program and check that it conforms with a set of user provided properties formulated in temporal logic. JPAX can in addition analyze the program for concurrency errors such as deadlocks and data races. The concurrency analysis requires no user provided specification. The tool facilitates automated instrumentation of a program's bytecode, which when executed will emit an event stream, the execution trace, to an observer. The observer dispatches the incoming event stream to a set of observer processes, each performing a specialized analysis, such as the temporal logic verification, the deadlock analysis and the data race analysis. Temporal logic specifications can be formulated by the user in the Maude rewriting logic, where Maude is a high-speed rewriting system for equational logic, but here extended with executable temporal logic. The Maude rewriting engine is then activated as an event driven monitoring process. Alternatively, temporal specifications can be translated into efficient automata, which check the event stream. JPAX can be used during program testing to gain increased information about program executions, and can potentially furthermore be applied during operation to survey safety critical systems.

  11. The Hurst exponent over time: testing the assertion that emerging markets are becoming more efficient

    NASA Astrophysics Data System (ADS)

    Cajueiro, Daniel O.; Tabak, Benjamin M.

    2004-05-01

    This paper is concerned with the assertion found in the financial literature that emerging markets are becoming more efficient over time. To verify whether this assertion is true or not, we propose the calculation of the Hurst exponent over time using a time window with 4 years of data. The data used here comprises the bulk of emerging markets for Latin America and Asia. Our empirical results show that this assertion seems to be true for most countries, but it does not hold for countries such as Brazil, The Philippines and Thailand. Moreover, in order to check whether or not these results depend on the short term memory and the volatility of returns common in such financial asset return data, we filter the data by an AR-GARCH procedure and present the Hurst exponents for this filtered data.

  12. UTP and Temporal Logic Model Checking

    NASA Astrophysics Data System (ADS)

    Anderson, Hugh; Ciobanu, Gabriel; Freitas, Leo

    In this paper we give an additional perspective to the formal verification of programs through temporal logic model checking, which uses Hoare and He Unifying Theories of Programming (UTP). Our perspective emphasizes the use of UTP designs, an alphabetised relational calculus expressed as a pre/post condition pair of relations, to verify state or temporal assertions about programs. The temporal model checking relation is derived from a satisfaction relation between the model and its properties. The contribution of this paper is that it shows a UTP perspective to temporal logic model checking. The approach includes the notion of efficiency found in traditional model checkers, which reduced a state explosion problem through the use of efficient data structures

  13. Property Differencing for Incremental Checking

    NASA Technical Reports Server (NTRS)

    Yang, Guowei; Khurshid, Sarfraz; Person, Suzette; Rungta, Neha

    2014-01-01

    This paper introduces iProperty, a novel approach that facilitates incremental checking of programs based on a property di erencing technique. Speci cally, iProperty aims to reduce the cost of checking properties as they are initially developed and as they co-evolve with the program. The key novelty of iProperty is to compute the di erences between the new and old versions of expected properties to reduce the number and size of the properties that need to be checked during the initial development of the properties. Furthermore, property di erencing is used in synergy with program behavior di erencing techniques to optimize common regression scenarios, such as detecting regression errors or checking feature additions for conformance to new expected properties. Experimental results in the context of symbolic execution of Java programs annotated with properties written as assertions show the e ectiveness of iProperty in utilizing change information to enable more ecient checking.

  14. Usage Automata

    NASA Astrophysics Data System (ADS)

    Bartoletti, Massimo

    Usage automata are an extension of finite stata automata, with some additional features (e.g. parameters and guards) that improve their expressivity. Usage automata are expressive enough to model security requirements of real-world applications; at the same time, they are simple enough to be statically amenable, e.g. they can be model-checked against abstractions of program usages. We study here some foundational aspects of usage automata. In particular, we discuss about their expressive power, and about their effective use in run-time mechanisms for enforcing usage policies.

  15. Jeagle: a JAVA Runtime Verification Tool

    NASA Technical Reports Server (NTRS)

    DAmorim, Marcelo; Havelund, Klaus

    2005-01-01

    We introduce the temporal logic Jeagle and its supporting tool for runtime verification of Java programs. A monitor for an Jeagle formula checks if a finite trace of program events satisfies the formula. Jeagle is a programming oriented extension of the rule-based powerful Eagle logic that has been shown to be capable of defining and implementing a range of finite trace monitoring logics, including future and past time temporal logic, real-time and metric temporal logics, interval logics, forms of quantified temporal logics, and so on. Monitoring is achieved on a state-by-state basis avoiding any need to store the input trace. Jeagle extends Eagle with constructs for capturing parameterized program events such as method calls and method returns. Parameters can be the objects that methods are called upon, arguments to methods, and return values. Jeagle allows one to refer to these in formulas. The tool performs automated program instrumentation using AspectJ. We show the transformational semantics of Jeagle.

  16. Using Block-local Atomicity to Detect Stale-value Concurrency Errors

    NASA Technical Reports Server (NTRS)

    Artho, Cyrille; Havelund, Klaus; Biere, Armin

    2004-01-01

    Data races do not cover all kinds of concurrency errors. This paper presents a data-flow-based technique to find stale-value errors, which are not found by low-level and high-level data race algorithms. Stale values denote copies of shared data where the copy is no longer synchronized. The algorithm to detect such values works as a consistency check that does not require any assumptions or annotations of the program. It has been implemented as a static analysis in JNuke. The analysis is sound and requires only a single execution trace if implemented as a run-time checking algorithm. Being based on an analysis of Java bytecode, it encompasses the full program semantics, including arbitrarily complex expressions. Related techniques are more complex and more prone to over-reporting.

  17. 75 FR 69440 - Notice of Public Information Collection(s) Being Reviewed by the Federal Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-12

    ...) also requires Eligible Telecommunications Carriers (ETCs) to submit to the Universal Service.... Prior to 2009, USAC provided sample certification and verification letters on its website to assist ETCs... check box to accommodate wireless ETCs serving non-federal default states that do not assert...

  18. Analysis and synthesis of abstract data types through generalization from examples

    NASA Technical Reports Server (NTRS)

    Wild, Christian

    1987-01-01

    The discovery of general patterns of behavior from a set of input/output examples can be a useful technique in the automated analysis and synthesis of software systems. These generalized descriptions of the behavior form a set of assertions which can be used for validation, program synthesis, program testing and run-time monitoring. Describing the behavior is characterized as a learning process in which general patterns can be easily characterized. The learning algorithm must choose a transform function and define a subset of the transform space which is related to equivalence classes of behavior in the original domain. An algorithm for analyzing the behavior of abstract data types is presented and several examples are given. The use of the analysis for purposes of program synthesis is also discussed.

  19. Unless reasoning.

    PubMed

    García-Madruga, Juan A; Carriedo, Nuria; Moreno-Ríos, Sergio; Gutiérrez, Francisco; Schaeken, Walter

    2008-11-01

    We report the results of two experiments investigating conditional inferences from conditional unless assertions, such as Juan is not in León unless Nuria is in Madrid. Experiments 1 and 2 check Fillenbaum's hypothesis about the semantic similarity of unless with if not and only if assertions; both also examine inferential endorsements (Experiment 1) and endorsements and latencies (Experiment 2) of the four logically equivalent conditional formulations: if A then B, if not-B then not-A, A only if B and notA unless B. The results of these experiments show the similarity of unless and only if confirming that the representation of both conditionals from the outset probably include two possibilities directionally oriented from B to A; results also confirm the especial difficulty of unless assertions. The implications of the results are discussed in the context of recent psychological and linguistic theories of the meaning of unless.

  20. JAVA PathFinder

    NASA Technical Reports Server (NTRS)

    Mehhtz, Peter

    2005-01-01

    JPF is an explicit state software model checker for Java bytecode. Today, JPF is a swiss army knife for all sort of runtime based verification purposes. This basically means JPF is a Java virtual machine that executes your program not just once (like a normal VM), but theoretically in all possible ways, checking for property violations like deadlocks or unhandled exceptions along all potential execution paths. If it finds an error, JPF reports the whole execution that leads to it. Unlike a normal debugger, JPF keeps track of every step how it got to the defect.

  1. 12 CFR 229.54 - Expedited recredit for consumers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Expedited recredit for consumers. 229.54... Expedited recredit for consumers. (a) Circumstances giving rise to a claim. A consumer may make a claim under this section for a recredit with respect to a substitute check if the consumer asserts in good...

  2. Issues 2016: Charter Schools Are Better at Retaining Hard-to-Educate Students. Reality Check

    ERIC Educational Resources Information Center

    Winters, Marcus A.

    2016-01-01

    Though charter schools are revolutionizing U.S. urban education, critics often assert that charters post higher test scores than surrounding traditional public schools because they systematically remove their most difficult-to-educate students. To substantiate this claim, charter critics note that smaller percentages of charter students are…

  3. 12 CFR 229.54 - Expedited recredit for consumers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 3 2011-01-01 2011-01-01 false Expedited recredit for consumers. 229.54... Expedited recredit for consumers. (a) Circumstances giving rise to a claim. A consumer may make a claim under this section for a recredit with respect to a substitute check if the consumer asserts in good...

  4. Wikipedia vs peer-reviewed medical literature for information about the 10 most costly medical conditions.

    PubMed

    Hasty, Robert T; Garbalosa, Ryan C; Barbato, Vincenzo A; Valdes, Pedro J; Powers, David W; Hernandez, Emmanuel; John, Jones S; Suciu, Gabriel; Qureshi, Farheen; Popa-Radu, Matei; San Jose, Sergio; Drexler, Nathaniel; Patankar, Rohan; Paz, Jose R; King, Christopher W; Gerber, Hilary N; Valladares, Michael G; Somji, Alyaz A

    2014-05-01

    Since its launch in 2001, Wikipedia has become the most popular general reference site on the Internet and a popular source of health care information. To evaluate the accuracy of this resource, the authors compared Wikipedia articles on the most costly medical conditions with standard, evidence-based, peer-reviewed sources. The top 10 most costly conditions in terms of public and private expenditure in the United States were identified, and a Wikipedia article corresponding to each topic was chosen. In a blinded process, 2 randomly assigned investigators independently reviewed each article and identified all assertions (ie, implication or statement of fact) made in it. The reviewer then conducted a literature search to determine whether each assertion was supported by evidence. The assertions found by each reviewer were compared and analyzed to determine whether assertions made by Wikipedia for these conditions were supported by peer-reviewed sources. For commonly identified assertions, there was statistically significant discordance between 9 of the 10 selected Wikipedia articles (coronary artery disease, lung cancer, major depressive disorder, osteoarthritis, chronic obstructive pulmonary disease, hypertension, diabetes mellitus, back pain, and hyperlipidemia) and their corresponding peer-reviewed sources (P<.05) and for all assertions made by Wikipedia for these medical conditions (P<.05 for all 9). Most Wikipedia articles representing the 10 most costly medical conditions in the United States contain many errors when checked against standard peer-reviewed sources. Caution should be used when using Wikipedia to answer questions regarding patient care.

  5. Clock and reset synchronization of high-integrity lockstep self-checking pairs

    NASA Technical Reports Server (NTRS)

    Brickner, Christopher (Inventor); Oliver, Brett D. (Inventor); Caltagirone, Joseph (Inventor)

    2012-01-01

    An apparatus comprises first and second modules configured to operate in a lockstep mode and a reset mode. Each of the first and second modules is configured to asynchronously enter the reset mode when a parent reset signal is asserted at the respective each module. Each of the first and second modules is configured to, in response to the asserted parent reset signal being negated at the respective each module, indicate to the respective other module that the respective each module is ready to exit the reset mode and exit the reset mode when the respective other module has also indicated that the respective other module is ready to exit the reset mode.

  6. Data-driven backward chaining

    NASA Technical Reports Server (NTRS)

    Haley, Paul

    1991-01-01

    The C Language Integrated Production System (CLIPS) cannot effectively perform sound and complete logical inference in most real-world contexts. The problem facing CLIPS is its lack of goal generation. Without automatic goal generation and maintenance, forward chaining can only deduce all instances of a relationship. Backward chaining, which requires goal generation, allows deduction of only that subset of what is logically true which is also relevant to ongoing problem solving. Goal generation can be mimicked in simple cases using forward chaining. However, such mimicry requires manual coding of additional rules which can assert an inadequate goal representation for every condition in every rule that can have corresponding facts derived by backward chaining. In general, for N rules with an average of M conditions per rule the number of goal generation rules required is on the order of N*M. This is clearly intractable from a program maintenance perspective. We describe the support in Eclipse for backward chaining which it automatically asserts as it checks rule conditions. Important characteristics of this extension are that it does not assert goals which cannot match any rule conditions, that 2 equivalent goals are never asserted, and that goals persist as long as, but no longer than, they remain relevant.

  7. A Roadmap for using Agile Development in a Traditional System

    NASA Technical Reports Server (NTRS)

    Streiffert, Barbara; Starbird, Thomas

    2006-01-01

    I. Ensemble Development Group: a) Produces activity planning software for in spacecraft; b) Built on Eclipse Rich Client Platform (open source development and runtime software); c) Funded by multiple sources including the Mars Technology Program; d) Incorporated the use of Agile Development. II. Next Generation Uplink Planning System: a) Researches the Activity Planning and Sequencing Subsystem for Mars Science Laboratory (APSS); b) APSS includes Ensemble, Activity Modeling, Constraint Checking, Command Editing and Sequencing tools plus other uplink generation utilities; c) Funded by the Mars Technology Program; d) Integrates all of the tools for APSS.

  8. Java PathFinder User Guide

    NASA Technical Reports Server (NTRS)

    Havelund, Klaus

    1999-01-01

    The JAVA PATHFINDER, JPF, is a translator from a subset of JAVA 1.0 to PROMELA, the programming language of the SPIN model checker. The purpose of JPF is to establish a framework for verification and debugging of JAVA programming based on model checking. The main goal is to automate program verification such that a programmer can apply it in the daily work without the need for a specialist to manually reformulate a program into a different notation in order to analyze the program. The system is especially suited for analyzing multi-threaded JAVA applications, where normal testing usually falls short. The system can find deadlocks and violations of boolean assertions stated by the programmer in a special assertion language. This document explains how to Use JPF.

  9. Runtime Verification of C Programs

    NASA Technical Reports Server (NTRS)

    Havelund, Klaus

    2008-01-01

    We present in this paper a framework, RMOR, for monitoring the execution of C programs against state machines, expressed in a textual (nongraphical) format in files separate from the program. The state machine language has been inspired by a graphical state machine language RCAT recently developed at the Jet Propulsion Laboratory, as an alternative to using Linear Temporal Logic (LTL) for requirements capture. Transitions between states are labeled with abstract event names and Boolean expressions over such. The abstract events are connected to code fragments using an aspect-oriented pointcut language similar to ASPECTJ's or ASPECTC's pointcut language. The system is implemented in the C analysis and transformation package CIL, and is programmed in OCAML, the implementation language of CIL. The work is closely related to the notion of stateful aspects within aspect-oriented programming, where pointcut languages are extended with temporal assertions over the execution trace.

  10. Analysis and synthesis of abstract data types through generalization from examples

    NASA Technical Reports Server (NTRS)

    Wild, Christian

    1987-01-01

    The discovery of general patterns of behavior from a set of input/output examples can be a useful technique in the automated analysis and synthesis of software systems. These generalized descriptions of the behavior form a set of assertions which can be used for validation, program synthesis, program testing, and run-time monitoring. Describing the behavior is characterized as a learning process in which the set of inputs is mapped into an appropriate transform space such that general patterns can be easily characterized. The learning algorithm must chose a transform function and define a subset of the transform space which is related to equivalence classes of behavior in the original domain. An algorithm for analyzing the behavior of abstract data types is presented and several examples are given. The use of the analysis for purposes of program synthesis is also discussed.

  11. NEQAIR96,Nonequilibrium and Equilibrium Radiative Transport and Spectra Program: User's Manual

    NASA Technical Reports Server (NTRS)

    Whiting, Ellis E.; Park, Chul; Liu, Yen; Arnold, James O.; Paterson, John A.

    1996-01-01

    This document is the User's Manual for a new version of the NEQAIR computer program, NEQAIR96. The program is a line-by-line and a line-of-sight code. It calculates the emission and absorption spectra for atomic and diatomic molecules and the transport of radiation through a nonuniform gas mixture to a surface. The program has been rewritten to make it easy to use, run faster, and include many run-time options that tailor a calculation to the user's requirements. The accuracy and capability have also been improved by including the rotational Hamiltonian matrix formalism for calculating rotational energy levels and Hoenl-London factors for dipole and spin-allowed singlet, doublet, triplet, and quartet transitions. Three sample cases are also included to help the user become familiar with the steps taken to produce a spectrum. A new user interface is included that uses check location, to select run-time options and to enter selected run data, making NEQAIR96 easier to use than the older versions of the code. The ease of its use and the speed of its algorithms make NEQAIR96 a valuable educational code as well as a practical spectroscopic prediction and diagnostic code.

  12. Temporal Mode-Checking for Runtime Monitoring of Privacy Policies

    DTIC Science & Technology

    2014-05-28

    is a natural number. For any arbitrary i, j ∈ N with i > j , τi > τj (monotonicity). The environment η maps free variables to values in D. Given an...and for all j , where j ∈ N and k < j ≤ i, it implies that L, τ, j , η |= ϕ1 holds. • L, τ, i, η |=Iϕ iff there exists k ≥ i, where k ∈ N, such that (τk...and for all j , where j ∈ N and i ≤ j < k, it implies that L, τ, j , η |= ϕ1 holds. 3 Example policy. The following GMP formula represents a privacy

  13. Formal semantic specifications as implementation blueprints for real-time programming languages

    NASA Technical Reports Server (NTRS)

    Feyock, S.

    1981-01-01

    Formal definitions of language and system semantics provide highly desirable checks on the correctness of implementations of programming languages and their runtime support systems. If these definitions can give concrete guidance to the implementor, major increases in implementation accuracy and decreases in implementation effort can be achieved. It is shown that of the wide variety of available methods the Hgraph (hypergraph) definitional technique (Pratt, 1975), is best suited to serve as such an implementation blueprint. A discussion and example of the Hgraph technique is presented, as well as an overview of the growing body of implementation experience of real-time languages based on Hgraph semantic definitions.

  14. On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals

    NASA Astrophysics Data System (ADS)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible.

  15. Ada (trademark) projects at NASA. Runtime environment issues and recommendations

    NASA Technical Reports Server (NTRS)

    Roy, Daniel M.; Wilke, Randall W.

    1988-01-01

    Ada practitioners should use this document to discuss and establish common short term requirements for Ada runtime environments. The major current Ada runtime environment issues are identified through the analysis of some of the Ada efforts at NASA and other research centers. The runtime environment characteristics of major compilers are compared while alternate runtime implementations are reviewed. Modifications and extensions to the Ada Language Reference Manual to address some of these runtime issues are proposed. Three classes of projects focusing on the most critical runtime features of Ada are recommended, including a range of immediately feasible full scale Ada development projects. Also, a list of runtime features and procurement issues is proposed for consideration by the vendors, contractors and the government.

  16. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection

    PubMed Central

    Dai, Huning; Murphy, Christian; Kaiser, Gail

    2010-01-01

    Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations and inputs together with a certain runtime environment. One approach to detecting these vulnerabilities is fuzz testing. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, we present a new testing methodology called Configuration Fuzzing. Configuration Fuzzing is a technique whereby the configuration of the running application is mutated at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks “security invariants” that, if violated, indicate a vulnerability. We discuss the approach and introduce a prototype framework called ConFu (CONfiguration FUzzing testing framework) for implementation. We also present the results of case studies that demonstrate the approach’s feasibility and evaluate its performance. PMID:21037923

  17. The Sizing and Optimization Language, (SOL): Computer language for design problems

    NASA Technical Reports Server (NTRS)

    Lucas, Stephen H.; Scotti, Stephen J.

    1988-01-01

    The Sizing and Optimization Language, (SOL), a new high level, special purpose computer language was developed to expedite application of numerical optimization to design problems and to make the process less error prone. SOL utilizes the ADS optimization software and provides a clear, concise syntax for describing an optimization problem, the OPTIMIZE description, which closely parallels the mathematical description of the problem. SOL offers language statements which can be used to model a design mathematically, with subroutines or code logic, and with existing FORTRAN routines. In addition, SOL provides error checking and clear output of the optimization results. Because of these language features, SOL is best suited to model and optimize a design concept when the model consits of mathematical expressions written in SOL. For such cases, SOL's unique syntax and error checking can be fully utilized. SOL is presently available for DEC VAX/VMS systems. A SOL package is available which includes the SOL compiler, runtime library routines, and a SOL reference manual.

  18. Fall 2014 SEI Research Review Probabilistic Analysis of Time Sensitive Systems

    DTIC Science & Technology

    2014-10-28

    Osmosis SMC Tool Osmosis is a tool for Statistical Model Checking (SMC) with Semantic Importance Sampling. • Input model is written in subset of C...ASSERT() statements in model indicate conditions that must hold. • Input probability distributions defined by the user. • Osmosis returns the...on: – Target relative error, or – Set number of simulations Osmosis Main Algorithm 1 http://dreal.cs.cmu.edu/ (?⃑?): Indicator

  19. Teuchos C++ memory management classes, idioms, and related topics, the complete reference : a comprehensive strategy for safe and efficient memory management in C++ for high performance computing.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bartlett, Roscoe Ainsworth

    2010-05-01

    The ubiquitous use of raw pointers in higher-level code is the primary cause of all memory usage problems and memory leaks in C++ programs. This paper describes what might be considered a radical approach to the problem which is to encapsulate the use of all raw pointers and all raw calls to new and delete in higher-level C++ code. Instead, a set of cooperating template classes developed in the Trilinos package Teuchos are used to encapsulate every use of raw C++ pointers in every use case where it appears in high-level code. Included in the set of memory management classesmore » is the typical reference-counted smart pointer class similar to boost::shared ptr (and therefore C++0x std::shared ptr). However, what is missing in boost and the new standard library are non-reference counted classes for remaining use cases where raw C++ pointers would need to be used. These classes have a debug build mode where nearly all programmer errors are caught and gracefully reported at runtime. The default optimized build mode strips all runtime checks and allows the code to perform as efficiently as raw C++ pointers with reasonable usage. Also included is a novel approach for dealing with the circular references problem that imparts little extra overhead and is almost completely invisible to most of the code (unlike the boost and therefore C++0x approach). Rather than being a radical approach, encapsulating all raw C++ pointers is simply the logical progression of a trend in the C++ development and standards community that started with std::auto ptr and is continued (but not finished) with std::shared ptr in C++0x. Using the Teuchos reference-counted memory management classes allows one to remove unnecessary constraints in the use of objects by removing arbitrary lifetime ordering constraints which are a type of unnecessary coupling [23]. The code one writes with these classes will be more likely to be correct on first writing, will be less likely to contain silent (but deadly) memory usage errors, and will be much more robust to later refactoring and maintenance. The level of debug-mode runtime checking provided by the Teuchos memory management classes is stronger in many respects than what is provided by memory checking tools like Valgrind and Purify while being much less expensive. However, tools like Valgrind and Purify perform a number of types of checks (like usage of uninitialized memory) that makes these tools very valuable and therefore complement the Teuchos memory management debug-mode runtime checking. The Teuchos memory management classes and idioms largely address the technical issues in resolving the fragile built-in C++ memory management model (with the exception of circular references which has no easy solution but can be managed as discussed). All that remains is to teach these classes and idioms and expand their usage in C++ codes. The long-term viability of C++ as a usable and productive language depends on it. Otherwise, if C++ is no safer than C, then is the greater complexity of C++ worth what one gets as extra features? Given that C is smaller and easier to learn than C++ and since most programmers don't know object-orientation (or templates or X, Y, and Z features of C++) all that well anyway, then what really are most programmers getting extra out of C++ that would outweigh the extra complexity of C++ over C? C++ zealots will argue this point but the reality is that C++ popularity has peaked and is becoming less popular while the popularity of C has remained fairly stable over the last decade22. Idioms like are advocated in this paper can help to avert this trend but it will require wide community buy-in and a change in the way C++ is taught in order to have the greatest impact. To make these programs more secure, compiler vendors or static analysis tools (e.g. klocwork23) could implement a preprocessor-like language similar to OpenMP24 that would allow the programmer to declare (in comments) that certain blocks of code should be ''pointer-free'' or allow smaller blocks to be 'pointers allowed'. This would significantly improve the robustness of code that uses the memory management classes described here.« less

  20. Use of Statechart Assertions for Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes

    DTIC Science & Technology

    2012-06-01

    THIS PAGE INTENTIONALLY LEFT BLANK xv LIST OF ACRONYMS AND ABBREVIATIONS BPM Business Process Model BPMN Business Process Modeling Notation C&A...checking leads to an improvement in the quality and success of enterprise software development. Business Process Modeling Notation ( BPMN ) is an...emerging standard that allows business processes to be captured in a standardized format. BPMN lacks formal semantics which leaves many of its features

  1. Real-Time, General-Purpose, High-Speed Signal Processing Systems for Underwater Research. Proceedings of a Working Level Conference held at Supreme Allied Commander, Atlantic Anti-Submarine Warfare Research Center (SACLANTCEN) on 18-21 September 1979. Part 2. Sessions IV to VI.

    DTIC Science & Technology

    1979-12-01

    ACTIVATED, SYSTEM OPERATION AND TESTING MASCOT PROVIDES: 1. SYSTEM BUILD SOFTWARE COMPILE-TIME CHECKS,a. 2. RUN-TIME SUPERVISOR KERNEL, 3, MONITOR AND...p AD-AOBI 851 SACLANT ASW RESEARCH CENTRE LA SPEZIA 11ITALY) F/B 1711 REAL-TIME, GENERAL-PURPOSE, HIGH-SPEED SIGNAL PROCESSING SYSTEM -- ETC (U) DEC 79...Table of Contents Table of Contents (Cont’d) Page Signal processing language and operating system (w) 23-1 to 23-12 by S. Weinstein A modular signal

  2. Apparatuses and Methods for Producing Runtime Architectures of Computer Program Modules

    NASA Technical Reports Server (NTRS)

    Abi-Antoun, Marwan Elia (Inventor); Aldrich, Jonathan Erik (Inventor)

    2013-01-01

    Apparatuses and methods for producing run-time architectures of computer program modules. One embodiment includes creating an abstract graph from the computer program module and from containment information corresponding to the computer program module, wherein the abstract graph has nodes including types and objects, and wherein the abstract graph relates an object to a type, and wherein for a specific object the abstract graph relates the specific object to a type containing the specific object; and creating a runtime graph from the abstract graph, wherein the runtime graph is a representation of the true runtime object graph, wherein the runtime graph represents containment information such that, for a specific object, the runtime graph relates the specific object to another object that contains the specific object.

  3. Tempo: A Toolkit for the Timed Input/Output Automata Formalism

    DTIC Science & Technology

    2008-01-30

    generation of distributed code from specifications. F .4.3 [Formal Languages]: Tempo;, D.3 [Programming Many distributed systems involve a combination of...and require The chek (i) transition is enabled when process i’s program the simulator to check the assertions after every single step counter is set to...output foo (n:Int) The Tempo simulator addresses this issue by putting the states x: Int : = 10;transitions modeler in charge of resolving the non

  4. Would a madman have been so wise as this?" The effects of source credibility and message credibility on validation.

    PubMed

    Foy, Jeffrey E; LoCasto, Paul C; Briner, Stephen W; Dyar, Samantha

    2017-02-01

    Readers rapidly check new information against prior knowledge during validation, but research is inconsistent as to whether source credibility affects validation. We argue that readers are likely to accept highly plausible assertions regardless of source, but that high source credibility may boost acceptance of claims that are less plausible based on general world knowledge. In Experiment 1, participants read narratives with assertions for which the plausibility varied depending on the source. For high credibility sources, we found that readers were faster to read information confirming these assertions relative to contradictory information. We found the opposite patterns for low credibility characters. In Experiment 2, readers read claims from the same high or low credibility sources, but the claims were always plausible based on general world knowledge. Readers consistently took longer to read contradictory information, regardless of source. In Experiment 3, participants read modified versions of "The Tell-Tale Heart," which was narrated entirely by an unreliable source. We manipulated the plausibility of a target event, as well as whether high credibility characters within the story provided confirmatory or contradictory information about the narrator's description of the target event. Though readers rated the narrator as being insane, they were more likely to believe the narrator's assertions about the target event when it was plausible and corroborated by other characters. We argue that sourcing research would benefit from focusing on the relationship between source credibility, message credibility, and multiple sources within a text.

  5. Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions

    NASA Astrophysics Data System (ADS)

    Elbaz, Reouven; Torres, Lionel; Sassatelli, Gilles; Guillemin, Pierre; Bardouillet, Michel; Martinez, Albert

    The bus between the System on Chip (SoC) and the external memory is one of the weakest points of computer systems: an adversary can easily probe this bus in order to read private data (data confidentiality concern) or to inject data (data integrity concern). The conventional way to protect data against such attacks and to ensure data confidentiality and integrity is to implement two dedicated engines: one performing data encryption and another data authentication. This approach, while secure, prevents parallelizability of the underlying computations. In this paper, we introduce the concept of Block-Level Added Redundancy Explicit Authentication (BL-AREA) and we describe a Parallelized Encryption and Integrity Checking Engine (PE-ICE) based on this concept. BL-AREA and PE-ICE have been designed to provide an effective solution to ensure both security services while allowing for full parallelization on processor read and write operations and optimizing the hardware resources. Compared to standard encryption which ensures only confidentiality, we show that PE-ICE additionally guarantees code and data integrity for less than 4% of run-time performance overhead.

  6. Asynchronous Runtimes in Action: An Introspective Framework for a Next Gen Runtime

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Suetterlein, Joshua D.; Landwehr, Joshua B.; Marquez, Andres

    2016-05-23

    One of the most critical challenges that new high performance systems face is the lack of system software support for these large scale systems. Investment on system stack components is essential in the development, debugging and optimization of the new emerging programming models. These emerging models have the promise to better utilize the vast hardware resources available in current and future systems. To aid in the development of applications and new system stacks, runtimes, as instances of their respective execution models, need to produce facilities to introspect their inner workings and allow an indepth attribution of performance bottlenecks and computationalmore » patterns. In other words, the runtime systems need to reduce their opacity to observers so that users of a novel program execution model can adapt their designs to fit the intended model usage, regardless of the layer that they are working on. This design/development loop (akin to co-design) enables synergistic opportunities across the entire computational stack. This paper presents the design and implementation of a simple “gray” box performance attribution harness running inside a fine grain runtime system: the Open Community Runtime (OCR). We showcase what such a framework can indicate regarding the runtime behavior while running at scale. To this end, we have designed a set of synthetic scenarios aimed to test the runtime at their best and worst cases. We present an analysis of the most important runtime features, properties and idiosyncrasies that will affect the development of new runtime features, algorithmic selection, and application development.« less

  7. Development and validation of the Stirling Eating Disorder Scales.

    PubMed

    Williams, G J; Power, K G; Miller, H R; Freeman, C P; Yellowlees, A; Dowds, T; Walker, M; Parry-Jones, W L

    1994-07-01

    The development and reliability/validity check of an 80-item, 8-scale measure for use with eating disorder patients is presented. The Stirling Eating Disorder Scales (SEDS) assess anorexic dietary behavior, anorexic dietary cognitions, bulimic dietary behavior, bulimic dietary cognitions, high perceived external control, low assertiveness, low self-esteem, and self-directed hostility. The SEDS were administered to 82 eating disorder patients and 85 controls. Results indicate that the SEDS are acceptable in terms of internal consistency, reliability, group validity, and concurrent validity.

  8. Adaptive runtime for a multiprocessing API

    DOEpatents

    Antao, Samuel F.; Bertolli, Carlo; Eichenberger, Alexandre E.; O'Brien, John K.

    2016-11-15

    A computer-implemented method includes selecting a runtime for executing a program. The runtime includes a first combination of feature implementations, where each feature implementation implements a feature of an application programming interface (API). Execution of the program is monitored, and the execution uses the runtime. Monitor data is generated based on the monitoring. A second combination of feature implementations are selected, by a computer processor, where the selection is based at least in part on the monitor data. The runtime is modified by activating the second combination of feature implementations to replace the first combination of feature implementations.

  9. Adaptive runtime for a multiprocessing API

    DOEpatents

    Antao, Samuel F.; Bertolli, Carlo; Eichenberger, Alexandre E.; O'Brien, John K.

    2016-10-11

    A computer-implemented method includes selecting a runtime for executing a program. The runtime includes a first combination of feature implementations, where each feature implementation implements a feature of an application programming interface (API). Execution of the program is monitored, and the execution uses the runtime. Monitor data is generated based on the monitoring. A second combination of feature implementations are selected, by a computer processor, where the selection is based at least in part on the monitor data. The runtime is modified by activating the second combination of feature implementations to replace the first combination of feature implementations.

  10. ASC ATDM Level 2 Milestone #5325: Asynchronous Many-Task Runtime System Analysis and Assessment for Next Generation Platforms.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baker, Gavin Matthew; Bettencourt, Matthew Tyler; Bova, Steven W.

    2015-09-01

    This report provides in-depth information and analysis to help create a technical road map for developing next- generation Orogramming mocleN and runtime systemsl that support Advanced Simulation and Computing (ASC) work- load requirements. The focus herein is on 4synchronous many-task (AMT) model and runtime systems, which are of great interest in the context of "Oriascale7 computing, as they hold the promise to address key issues associated with future extreme-scale computer architectures. This report includes a thorough qualitative and quantitative examination of three best-of-class AIM] runtime systemsHCharm-HE, Legion, and Uintah, all of which are in use as part of the Centers.more » The studies focus on each of the runtimes' programmability, performance, and mutability. Through the experiments and analysis presented, several overarching Predictive Science Academic Alliance Program II (PSAAP-II) Ascl findings emerge. From a performance perspective, AIVT11runtimes show tremendous potential for addressing extreme- scale challenges. Empirical studies show an AM11 runtime can mitigate performance heterogeneity inherent to the machine itself and that Message Passing Interface (MP1) and AM11runtimes perform comparably under balanced con- ditions. From a programmability and mutability perspective however, none of the runtimes in this study are currently ready for use in developing production-ready Sandia ASCIapplications. The report concludes by recommending a co- design path forward, wherein application, programming model, and runtime system developers work together to define requirements and solutions. Such a requirements-driven co-design approach benefits the community as a whole, with widespread community engagement mitigating risk for both application developers developers. and high-performance computing inntime systein« less

  11. DARMA v. Beta 0.5

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hollman, David; Lifflander, Jonathon; Wilke, Jeremiah

    2017-03-14

    DARMA is a portability layer for asynchronous many-task (AMT) runtime systems. AMT runtime systems show promise to mitigate challenges imposed by next generation high performance computing architectures. However, current runtime system technologies are not production-ready. DARMA is a portability layer that seeks to insulate application developers from idiosyncrasies of individual runtime systems, thereby facilitating application-developer use of these technologies. DARMA comprises a frontend application programming interface (API) for application developers, a backend API for runtime system developers, and a translation that translates frontend API calls into backend API calls. Application developers use C++ abstractions to annotate both data and tasksmore » in their code. The DARMA translation layer uses C++ template metaprogramming to capture data-task dependencies, and provides this information to a potential backend runtime system via a series of backend API calls.« less

  12. PDB data curation.

    PubMed

    Wang, Yanchao; Sunderraman, Rajshekhar

    2006-01-01

    In this paper, we propose two architectures for curating PDB data to improve its quality. The first one, PDB Data Curation System, is developed by adding two parts, Checking Filter and Curation Engine, between User Interface and Database. This architecture supports the basic PDB data curation. The other one, PDB Data Curation System with XCML, is designed for further curation which adds four more parts, PDB-XML, PDB, OODB, Protin-OODB, into the previous one. This architecture uses XCML language to automatically check errors of PDB data that enables PDB data more consistent and accurate. These two tools can be used for cleaning existing PDB files and creating new PDB files. We also show some ideas how to add constraints and assertions with XCML to get better data. In addition, we discuss the data provenance that may affect data accuracy and consistency.

  13. An integrated runtime and compile-time approach for parallelizing structured and block structured applications

    NASA Technical Reports Server (NTRS)

    Agrawal, Gagan; Sussman, Alan; Saltz, Joel

    1993-01-01

    Scientific and engineering applications often involve structured meshes. These meshes may be nested (for multigrid codes) and/or irregularly coupled (called multiblock or irregularly coupled regular mesh problems). A combined runtime and compile-time approach for parallelizing these applications on distributed memory parallel machines in an efficient and machine-independent fashion was described. A runtime library which can be used to port these applications on distributed memory machines was designed and implemented. The library is currently implemented on several different systems. To further ease the task of application programmers, methods were developed for integrating this runtime library with compilers for HPK-like parallel programming languages. How this runtime library was integrated with the Fortran 90D compiler being developed at Syracuse University is discussed. Experimental results to demonstrate the efficacy of our approach are presented. A multiblock Navier-Stokes solver template and a multigrid code were experimented with. Our experimental results show that our primitives have low runtime communication overheads. Further, the compiler parallelized codes perform within 20 percent of the code parallelized by manually inserting calls to the runtime library.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sharma, Vishal C.; Gopalakrishnan, Ganesh; Krishnamoorthy, Sriram

    The systems resilience research community has developed methods to manually insert additional source-program level assertions to trap errors, and also devised tools to conduct fault injection studies for scalar program codes. In this work, we contribute the first vector oriented LLVM-level fault injector VULFI to help study the effects of faults in vector architectures that are of growing importance, especially for vectorizing loops. Using VULFI, we conduct a resiliency study of nine real-world vector benchmarks using Intel’s AVX and SSE extensions as the target vector instruction sets, and offer the first reported understanding of how faults affect vector instruction sets.more » We take this work further toward automating the insertion of resilience assertions during compilation. This is based on our observation that during intermediate (e.g., LLVM-level) code generation to handle full and partial vectorization, modern compilers exploit (and explicate in their code-documentation) critical invariants. These invariants are turned into error-checking code. We confirm the efficacy of these automatically inserted low-overhead error detectors for vectorized for-loops.« less

  15. 2014 Runtime Systems Summit. Runtime Systems Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sarkar, Vivek; Budimlic, Zoran; Kulkani, Milind

    2016-09-19

    This report summarizes runtime system challenges for exascale computing, that follow from the fundamental challenges for exascale systems that have been well studied in past reports, e.g., [6, 33, 34, 32, 24]. Some of the key exascale challenges that pertain to runtime systems include parallelism, energy efficiency, memory hierarchies, data movement, heterogeneous processors and memories, resilience, performance variability, dynamic resource allocation, performance portability, and interoperability with legacy code. In addition to summarizing these challenges, the report also outlines different approaches to addressing these significant challenges that have been pursued by research projects in the DOE-sponsored X-Stack and OS/R programs. Sincemore » there is often confusion as to what exactly the term “runtime system” refers to in the software stack, we include a section on taxonomy to clarify the terminology used by participants in these research projects. In addition, we include a section on deployment opportunities for vendors and government labs to build on the research results from these projects. Finally, this report is also intended to provide a framework for discussing future research and development investments for exascale runtime systems, and for clarifying the role of runtime systems in exascale software.« less

  16. A Categorization of Dynamic Analyzers

    NASA Technical Reports Server (NTRS)

    Lujan, Michelle R.

    1997-01-01

    Program analysis techniques and tools are essential to the development process because of the support they provide in detecting errors and deficiencies at different phases of development. The types of information rendered through analysis includes the following: statistical measurements of code, type checks, dataflow analysis, consistency checks, test data,verification of code, and debugging information. Analyzers can be broken into two major categories: dynamic and static. Static analyzers examine programs with respect to syntax errors and structural properties., This includes gathering statistical information on program content, such as the number of lines of executable code, source lines. and cyclomatic complexity. In addition, static analyzers provide the ability to check for the consistency of programs with respect to variables. Dynamic analyzers in contrast are dependent on input and the execution of a program providing the ability to find errors that cannot be detected through the use of static analysis alone. Dynamic analysis provides information on the behavior of a program rather than on the syntax. Both types of analysis detect errors in a program, but dynamic analyzers accomplish this through run-time behavior. This paper focuses on the following broad classification of dynamic analyzers: 1) Metrics; 2) Models; and 3) Monitors. Metrics are those analyzers that provide measurement. The next category, models, captures those analyzers that present the state of the program to the user at specified points in time. The last category, monitors, checks specified code based on some criteria. The paper discusses each classification and the techniques that are included under them. In addition, the role of each technique in the software life cycle is discussed. Familiarization with the tools that measure, model and monitor programs provides a framework for understanding the program's dynamic behavior from different, perspectives through analysis of the input/output data.

  17. Decision Engines for Software Analysis Using Satisfiability Modulo Theories Solvers

    NASA Technical Reports Server (NTRS)

    Bjorner, Nikolaj

    2010-01-01

    The area of software analysis, testing and verification is now undergoing a revolution thanks to the use of automated and scalable support for logical methods. A well-recognized premise is that at the core of software analysis engines is invariably a component using logical formulas for describing states and transformations between system states. The process of using this information for discovering and checking program properties (including such important properties as safety and security) amounts to automatic theorem proving. In particular, theorem provers that directly support common software constructs offer a compelling basis. Such provers are commonly called satisfiability modulo theories (SMT) solvers. Z3 is a state-of-the-art SMT solver. It is developed at Microsoft Research. It can be used to check the satisfiability of logical formulas over one or more theories such as arithmetic, bit-vectors, lists, records and arrays. The talk describes some of the technology behind modern SMT solvers, including the solver Z3. Z3 is currently mainly targeted at solving problems that arise in software analysis and verification. It has been applied to various contexts, such as systems for dynamic symbolic simulation (Pex, SAGE, Vigilante), for program verification and extended static checking (Spec#/Boggie, VCC, HAVOC), for software model checking (Yogi, SLAM), model-based design (FORMULA), security protocol code (F7), program run-time analysis and invariant generation (VS3). We will describe how it integrates support for a variety of theories that arise naturally in the context of the applications. There are several new promising avenues and the talk will touch on some of these and the challenges related to SMT solvers. Proceedings

  18. MOLAR: Modular Linux and Adaptive Runtime Support for HEC OS/R Research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Frank Mueller

    2009-02-05

    MOLAR is a multi-institution research effort that concentrates on adaptive, reliable,and efficient operating and runtime system solutions for ultra-scale high-end scientific computing on the next generation of supercomputers. This research addresses the challenges outlined by the FAST-OS - forum to address scalable technology for runtime and operating systems --- and HECRTF --- high-end computing revitalization task force --- activities by providing a modular Linux and adaptable runtime support for high-end computing operating and runtime systems. The MOLAR research has the following goals to address these issues. (1) Create a modular and configurable Linux system that allows customized changes based onmore » the requirements of the applications, runtime systems, and cluster management software. (2) Build runtime systems that leverage the OS modularity and configurability to improve efficiency, reliability, scalability, ease-of-use, and provide support to legacy and promising programming models. (3) Advance computer reliability, availability and serviceability (RAS) management systems to work cooperatively with the OS/R to identify and preemptively resolve system issues. (4) Explore the use of advanced monitoring and adaptation to improve application performance and predictability of system interruptions. The overall goal of the research conducted at NCSU is to develop scalable algorithms for high-availability without single points of failure and without single points of control.« less

  19. Alternatives to Re-Planning: Methods for Plan Re-Evaluation at Runtime

    NASA Technical Reports Server (NTRS)

    Benazera, Emmanuel

    2005-01-01

    Current planning algorithms have difficulty handling the complexity that is due to an increase in domain uncertainty, and especially in the case of multi-dimensional continuous spaces. Therefore, they produce plans that do not take into account numerous situations that can occur at runtime, such as faults or other changes in the planning domain itself. Thus there is a gap between the plan generation and the reality experienced at runtime. Here we present two methods that allow the plan conditionals to be revised w.r.t. uncertainty on the system as estimated at runtime.

  20. Preventing Run-Time Bugs at Compile-Time Using Advanced C++

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neswold, Richard

    When writing software, we develop algorithms that tell the computer what to do at run-time. Our solutions are easier to understand and debug when they are properly modeled using class hierarchies, enumerations, and a well-factored API. Unfortunately, even with these design tools, we end up having to debug our programs at run-time. Worse still, debugging an embedded system changes its dynamics, making it tough to find and fix concurrency issues. This paper describes techniques using C++ to detect run-time bugs *at compile time*. A concurrency library, developed at Fermilab, is used for examples in illustrating these techniques.

  1. An Analytical Framework for Runtime of a Class of Continuous Evolutionary Algorithms.

    PubMed

    Zhang, Yushan; Hu, Guiwu

    2015-01-01

    Although there have been many studies on the runtime of evolutionary algorithms in discrete optimization, relatively few theoretical results have been proposed on continuous optimization, such as evolutionary programming (EP). This paper proposes an analysis of the runtime of two EP algorithms based on Gaussian and Cauchy mutations, using an absorbing Markov chain. Given a constant variation, we calculate the runtime upper bound of special Gaussian mutation EP and Cauchy mutation EP. Our analysis reveals that the upper bounds are impacted by individual number, problem dimension number n, searching range, and the Lebesgue measure of the optimal neighborhood. Furthermore, we provide conditions whereby the average runtime of the considered EP can be no more than a polynomial of n. The condition is that the Lebesgue measure of the optimal neighborhood is larger than a combinatorial calculation of an exponential and the given polynomial of n.

  2. Hardware independence checkout software

    NASA Technical Reports Server (NTRS)

    Cameron, Barry W.; Helbig, H. R.

    1990-01-01

    ACSI has developed a program utilizing CLIPS to assess compliance with various programming standards. Essentially the program parses C code to extract the names of all function calls. These are asserted as CLIPS facts which also include information about line numbers, source file names, and called functions. Rules have been devised to establish functions called that have not been defined in any of the source parsed. These are compared against lists of standards (represented as facts) using rules that check intersections and/or unions of these. By piping the output into other processes the source is appropriately commented by generating and executing parsed scripts.

  3. Runtime Performance Monitoring Tool for RTEMS System Software

    NASA Astrophysics Data System (ADS)

    Cho, B.; Kim, S.; Park, H.; Kim, H.; Choi, J.; Chae, D.; Lee, J.

    2007-08-01

    RTEMS is a commercial-grade real-time operating system that supports multi-processor computers. However, there are not many development tools for RTEMS. In this paper, we report new RTEMS-based runtime performance monitoring tool. We have implemented a light weight runtime monitoring task with an extension to the RTEMS APIs. Using our tool, software developers can verify various performance- related parameters during runtime. Our tool can be used during software development phase and in-orbit operation as well. Our implemented target agent is light weight and has small overhead using SpaceWire interface. Efforts to reduce overhead and to add other monitoring parameters are currently under research.

  4. Towards Run-time Assurance of Advanced Propulsion Algorithms

    NASA Technical Reports Server (NTRS)

    Wong, Edmond; Schierman, John D.; Schlapkohl, Thomas; Chicatelli, Amy

    2014-01-01

    This paper covers the motivation and rationale for investigating the application of run-time assurance methods as a potential means of providing safety assurance for advanced propulsion control systems. Certification is becoming increasingly infeasible for such systems using current verification practices. Run-time assurance systems hold the promise of certifying these advanced systems by continuously monitoring the state of the feedback system during operation and reverting to a simpler, certified system if anomalous behavior is detected. The discussion will also cover initial efforts underway to apply a run-time assurance framework to NASA's model-based engine control approach. Preliminary experimental results are presented and discussed.

  5. Personality factors that differentiate homosexual men with positive and negative attitudes toward condom use.

    PubMed

    Ross, M W

    1988-12-01

    The Homosexual Attitudes Toward Condoms scale was administered to 148 homosexually active men along with 2 personality and mood inventories, the Adjective Check List (ACL) and the Profile of Mood States (POMS). For each of the 5 subscales of the Homosexual Attitudes Toward Condoms scale and for the total scale, groups were split at the median score and compared by t-tests on the scales of the ACL and POMS. Results showed that high scorers on the ACL scales for dominance and aggression, and less frequently for autonomy, exhibition, and self-confidence, had consistently positive attitudes toward condoms; and that high scorers on the ACL scales for abasement, deference, and the POMS scale for tension- anxiety had consistently negative attitudes toward condoms. These data suggest that the most important variables associated with positive attitudes toward condom use are an assertive personality style and the ability to raise the issue of condom use in sexual encounters without fear of rebuff. Future education efforts should be directed toward assertiveness training in sexual encounters rather than information on the efficacy of condoms for prevention of HIV transmission.

  6. Compilation time analysis to minimize run-time overhead in preemptive scheduling on multiprocessors

    NASA Astrophysics Data System (ADS)

    Wauters, Piet; Lauwereins, Rudy; Peperstraete, J.

    1994-10-01

    This paper describes a scheduling method for hard real-time Digital Signal Processing (DSP) applications, implemented on a multi-processor. Due to the very high operating frequencies of DSP applications (typically hundreds of kHz) runtime overhead should be kept as small as possible. Because static scheduling introduces very little run-time overhead it is used as much as possible. Dynamic pre-emption of tasks is allowed if and only if it leads to better performance in spite of the extra run-time overhead. We essentially combine static scheduling with dynamic pre-emption using static priorities. Since we are dealing with hard real-time applications we must be able to guarantee at compile-time that all timing requirements will be satisfied at run-time. We will show that our method performs at least as good as any static scheduling method. It also reduces the total amount of dynamic pre-emptions compared with run time methods like deadline monotonic scheduling.

  7. Accountable Information Flow for Java-Based Web Applications

    DTIC Science & Technology

    2010-01-01

    runtime library Swift server runtime Java servlet framework HTTP Web server Web browser Figure 2: The Swift architecture introduced an open-ended...On the server, the Java application code links against Swift’s server-side run-time library, which in turn sits on top of the standard Java servlet ...AFRL-RI-RS-TR-2010-9 Final Technical Report January 2010 ACCOUNTABLE INFORMATION FLOW FOR JAVA -BASED WEB APPLICATIONS

  8. Application Characterization at Scale: Lessons learned from developing a distributed Open Community Runtime system for High Performance Computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Landwehr, Joshua B.; Suetterlein, Joshua D.; Marquez, Andres

    2016-05-16

    Since 2012, the U.S. Department of Energy’s X-Stack program has been developing solutions including runtime systems, programming models, languages, compilers, and tools for the Exascale system software to address crucial performance and power requirements. Fine grain programming models and runtime systems show a great potential to efficiently utilize the underlying hardware. Thus, they are essential to many X-Stack efforts. An abundant amount of small tasks can better utilize the vast parallelism available on current and future machines. Moreover, finer tasks can recover faster and adapt better, due to a decrease in state and control. Nevertheless, current applications have been writtenmore » to exploit old paradigms (such as Communicating Sequential Processor and Bulk Synchronous Parallel processing). To fully utilize the advantages of these new systems, applications need to be adapted to these new paradigms. As part of the applications’ porting process, in-depth characterization studies, focused on both application characteristics and runtime features, need to take place to fully understand the application performance bottlenecks and how to resolve them. This paper presents a characterization study for a novel high performance runtime system, called the Open Community Runtime, using key HPC kernels as its vehicle. This study has the following contributions: one of the first high performance, fine grain, distributed memory runtime system implementing the OCR standard (version 0.99a); and a characterization study of key HPC kernels in terms of runtime primitives running on both intra and inter node environments. Running on a general purpose cluster, we have found up to 1635x relative speed-up for a parallel tiled Cholesky Kernels on 128 nodes with 16 cores each and a 1864x relative speed-up for a parallel tiled Smith-Waterman kernel on 128 nodes with 30 cores.« less

  9. Establishing end-to-end security in a nationwide network for telecooperation.

    PubMed

    Staemmler, Martin; Walz, Michael; Weisser, Gerald; Engelmann, Uwe; Weininger, Robert; Ernstberger, Antonio; Sturm, Johannes

    2012-01-01

    Telecooperation is used to support care for trauma patients by facilitating a mutual exchange of treatment and image data in use-cases such as emergency consultation, second-opinion, transfer, rehabilitation and out-patient aftertreatment. To comply with data protection legislation a two-factor authentication using ownership and knowledge has been implemented to assure personalized access rights. End-to-end security is achieved by symmetric encryption in combination with external trusted services which provide the symmetric key solely at runtime. Telecooperation partners may be chosen at departmental level but only individuals of that department, as a result of checking the organizational assignments maintained by LDAP services, are granted access. Data protection officers of a federal state have accepted the data protection means. The telecooperation platform is in routine operation and designed to serve for up to 800 trauma centers in Germany, organized in more than 50 trauma networks.

  10. An overview of the Opus language and runtime system

    NASA Technical Reports Server (NTRS)

    Mehrotra, Piyush; Haines, Matthew

    1994-01-01

    We have recently introduced a new language, called Opus, which provides a set of Fortran language extensions that allow for integrated support of task and data parallelism. lt also provides shared data abstractions (SDA's) as a method for communication and synchronization among these tasks. In this paper, we first provide a brief description of the language features and then focus on both the language-dependent and language-independent parts of the runtime system that support the language. The language-independent portion of the runtime system supports lightweight threads across multiple address spaces, and is built upon existing lightweight thread and communication systems. The language-dependent portion of the runtime system supports conditional invocation of SDA methods and distributed SDA argument handling.

  11. Compiler analysis for irregular problems in FORTRAN D

    NASA Technical Reports Server (NTRS)

    Vonhanxleden, Reinhard; Kennedy, Ken; Koelbel, Charles; Das, Raja; Saltz, Joel

    1992-01-01

    We developed a dataflow framework which provides a basis for rigorously defining strategies to make use of runtime preprocessing methods for distributed memory multiprocessors. In many programs, several loops access the same off-processor memory locations. Our runtime support gives us a mechanism for tracking and reusing copies of off-processor data. A key aspect of our compiler analysis strategy is to determine when it is safe to reuse copies of off-processor data. Another crucial function of the compiler analysis is to identify situations which allow runtime preprocessing overheads to be amortized. This dataflow analysis will make it possible to effectively use the results of interprocedural analysis in our efforts to reduce interprocessor communication and the need for runtime preprocessing.

  12. Yangian Symmetry and Integrability of Planar N=4 Supersymmetric Yang-Mills Theory.

    PubMed

    Beisert, Niklas; Garus, Aleksander; Rosso, Matteo

    2017-04-07

    In this Letter, we establish Yangian symmetry of planar N=4 supersymmetric Yang-Mills theory. We prove that the classical equations of motion of the model close onto themselves under the action of Yangian generators. Moreover, we propose an off-shell extension of our statement, which is equivalent to the invariance of the action and prove that it is exactly satisfied. We assert that our relationship serves as a criterion for integrability in planar gauge theories by explicitly checking that it applies to the integrable Aharony-Bergman-Jafferis-Maldacena theory but not to the nonintegrable N=1 supersymmetric Yang-Mills theory.

  13. A ROSE-based OpenMP 3.0 Research Compiler Supporting Multiple Runtime Libraries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liao, C; Quinlan, D; Panas, T

    2010-01-25

    OpenMP is a popular and evolving programming model for shared-memory platforms. It relies on compilers for optimal performance and to target modern hardware architectures. A variety of extensible and robust research compilers are key to OpenMP's sustainable success in the future. In this paper, we present our efforts to build an OpenMP 3.0 research compiler for C, C++, and Fortran; using the ROSE source-to-source compiler framework. Our goal is to support OpenMP research for ourselves and others. We have extended ROSE's internal representation to handle all of the OpenMP 3.0 constructs and facilitate their manipulation. Since OpenMP research is oftenmore » complicated by the tight coupling of the compiler translations and the runtime system, we present a set of rules to define a common OpenMP runtime library (XOMP) on top of multiple runtime libraries. These rules additionally define how to build a set of translations targeting XOMP. Our work demonstrates how to reuse OpenMP translations across different runtime libraries. This work simplifies OpenMP research by decoupling the problematic dependence between the compiler translations and the runtime libraries. We present an evaluation of our work by demonstrating an analysis tool for OpenMP correctness. We also show how XOMP can be defined using both GOMP and Omni and present comparative performance results against other OpenMP compilers.« less

  14. Transforming parts of a differential equations system to difference equations as a method for run-time savings in NONMEM.

    PubMed

    Petersson, K J F; Friberg, L E; Karlsson, M O

    2010-10-01

    Computer models of biological systems grow more complex as computing power increase. Often these models are defined as differential equations and no analytical solutions exist. Numerical integration is used to approximate the solution; this can be computationally intensive, time consuming and be a large proportion of the total computer runtime. The performance of different integration methods depend on the mathematical properties of the differential equations system at hand. In this paper we investigate the possibility of runtime gains by calculating parts of or the whole differential equations system at given time intervals, outside of the differential equations solver. This approach was tested on nine models defined as differential equations with the goal to reduce runtime while maintaining model fit, based on the objective function value. The software used was NONMEM. In four models the computational runtime was successfully reduced (by 59-96%). The differences in parameter estimates, compared to using only the differential equations solver were less than 12% for all fixed effects parameters. For the variance parameters, estimates were within 10% for the majority of the parameters. Population and individual predictions were similar and the differences in OFV were between 1 and -14 units. When computational runtime seriously affects the usefulness of a model we suggest evaluating this approach for repetitive elements of model building and evaluation such as covariate inclusions or bootstraps.

  15. Run-time parallelization and scheduling of loops

    NASA Technical Reports Server (NTRS)

    Saltz, Joel H.; Mirchandaney, Ravi; Crowley, Kay

    1991-01-01

    Run-time methods are studied to automatically parallelize and schedule iterations of a do loop in certain cases where compile-time information is inadequate. The methods presented involve execution time preprocessing of the loop. At compile-time, these methods set up the framework for performing a loop dependency analysis. At run-time, wavefronts of concurrently executable loop iterations are identified. Using this wavefront information, loop iterations are reordered for increased parallelism. Symbolic transformation rules are used to produce: inspector procedures that perform execution time preprocessing, and executors or transformed versions of source code loop structures. These transformed loop structures carry out the calculations planned in the inspector procedures. Performance results are presented from experiments conducted on the Encore Multimax. These results illustrate that run-time reordering of loop indexes can have a significant impact on performance.

  16. Establish and Evaluate Ada Runtime Features of Interest for Real-Time Systems

    DTIC Science & Technology

    1989-02-15

    Runtime Features of Interest for Real - Time Systems -,-. CLEARED POR :)E,4 pUEL tCATLON SEP 2 0 19E19 ,CETM ORP t ’R RE LOO O Nt-U~HM- ANDQ SECURITY...ESTABLISH AND EVALUATE py ADA RUNTIME FEATURES OF INTEREST FOR REAL - TIME SYSTEMS CONTRACT NUMBER: MDA 903-87-D-0056 IITRI PROJECT NUMBER: T06168 PREPARED...2 2.0 SELECTION PROCESS OVERVIEW .................................... 3 2.1 REAL - TIME SYSTEMS IDENTIFICATION ........................... 4 2.2

  17. V and V of Lexical, Syntactic and Semantic Properties for Interactive Systems Through Model Checking of Formal Description of Dialog

    NASA Technical Reports Server (NTRS)

    Brat, Guillaume P.; Martinie, Celia; Palanque, Philippe

    2013-01-01

    During early phases of the development of an interactive system, future system properties are identified (through interaction with end users in the brainstorming and prototyping phase of the application, or by other stakehold-ers) imposing requirements on the final system. They can be specific to the application under development or generic to all applications such as usability principles. Instances of specific properties include visibility of the aircraft altitude, speed… in the cockpit and the continuous possibility of disengaging the autopilot in whatever state the aircraft is. Instances of generic properties include availability of undo (for undoable functions) and availability of a progression bar for functions lasting more than four seconds. While behavioral models of interactive systems using formal description techniques provide complete and unambiguous descriptions of states and state changes, it does not provide explicit representation of the absence or presence of properties. Assessing that the system that has been built is the right system remains a challenge usually met through extensive use and acceptance tests. By the explicit representation of properties and the availability of tools to support checking these properties, it becomes possible to provide developers with means for systematic exploration of the behavioral models and assessment of the presence or absence of these properties. This paper proposes the synergistic use two tools for checking both generic and specific properties of interactive applications: Petshop and Java PathFinder. Petshop is dedicated to the description of interactive system behavior. Java PathFinder is dedicated to the runtime verification of Java applications and as an extension dedicated to User Interfaces. This approach is exemplified on a safety critical application in the area of interactive cockpits for large civil aircrafts.

  18. SU-C-BRC-07: Parametrized GPU Accelerated Electron Monte Carlo Second Check

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Haywood, J

    Purpose: I am presenting a parameterized 3D GPU accelerated electron Monte Carlo second check program. Method: I wrote the 3D grid dose calculation algorithm in CUDA and utilized an NVIDIA GeForce GTX 780 Ti to run all of the calculations. The electron path beyond the distal end of the cone is governed by four parameters: the amplitude of scattering (AMP), the mean and width of a Gaussian energy distribution (E and α), and the percentage of photons. In my code, I adjusted all parameters until the calculated PDD and profile fit the measured 10×10 open beam data within 1%/1mm. Imore » then wrote a user interface for reading the DICOM treatment plan and images in Python. In order to verify the algorithm, I calculated 3D dose distributions on a variety of phantoms and geometries, and compared them with the Eclipse eMC calculations. I also calculated several patient specific dose distributions, including a nose and an ear. Finally, I compared my algorithm’s computation times to Eclipse’s. Results: The calculated MU for all of the investigated geometries agree with the TPS within the TG-114 action level of 5%. The MU for the nose was < 0.5 % different while the MU for the ear at 105 SSD was ∼2 %. Calculation times for a 12MeV 10×10 open beam ranged from 1 second for a 2.5 mm grid resolution with ∼15 million particles to 33 seconds on a 1 mm grid with ∼460 million particles. Eclipse calculation runtimes distributed over 10 FAS workers were 9 seconds to 15 minutes respectively. Conclusion: The GPU accelerated second check allows quick MU verification while accounting for patient specific geometry and heterogeneity.« less

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bergen, Ben; Moss, Nicholas; Charest, Marc Robert Joseph

    FleCSI is a compile-time configurable framework designed to support multi-physics application development. As such, FleCSI attempts to provide a very general set of infrastructure design patterns that can be specialized and extended to suit the needs of a broad variety of solver and data requirements. Current support includes multi-dimensional mesh topology, mesh geometry, and mesh adjacency information, n-dimensional hashed-tree data structures, graph partitioning interfaces, and dependency closures. FleCSI also introduces a functional programming model with control, execution, and data abstractions that are consistent with both MPI and state-of-the-art task-based runtimes such as Legion and Charm++. The FleCSI abstraction layer providesmore » the developer with insulation from the underlying runtime, while allowing support for multiple runtime systems, including conventional models like asynchronous MPI. The intent is to give developers a concrete set of user-friendly programming tools that can be used now, while allowing flexibility in choosing runtime implementations and optimizations that can be applied to architectures and runtimes that arise in the future. The control and execution models in FleCSI also provide formal nomenclature for describing poorly understood concepts like kernels and tasks.« less

  20. Application configuration selection for energy-efficient execution on multicore systems

    DOE PAGES

    Wang, Shinan; Luo, Bing; Shi, Weisong; ...

    2015-09-21

    Balanced performance and energy consumption are incorporated in the design of modern computer systems. Several runtime factors, such as concurrency levels, thread mapping strategies, and dynamic voltage and frequency scaling (DVFS) should be considered in order to achieve optimal energy efficiency fora workload. Selecting appropriate run-time factors, however, is one of the most challenging tasks because the run-time factors are architecture-specific and workload-specific. And while most existing works concentrate on either static analysis of the workload or run-time prediction results, we present a hybrid two-step method that utilizes concurrency levels and DVFS settings to achieve the energy efficiency configuration formore » a worldoad. The experimental results based on a Xeon E5620 server with NPB and PARSEC benchmark suites show that the model is able to predict the energy efficient configuration accurately. On average, an additional 10% EDP (Energy Delay Product) saving is obtained by using run-time DVFS for the entire system. An off-line optimal solution is used to compare with the proposed scheme. Finally, the experimental results show that the average extra EDP saved by the optimal solution is within 5% on selective parallel benchmarks.« less

  1. Framework for architecture-independent run-time reconfigurable applications

    NASA Astrophysics Data System (ADS)

    Lehn, David I.; Hudson, Rhett D.; Athanas, Peter M.

    2000-10-01

    Configurable Computing Machines (CCMs) have emerged as a technology with the computational benefits of custom ASICs as well as the flexibility and reconfigurability of general-purpose microprocessors. Significant effort from the research community has focused on techniques to move this reconfigurability from a rapid application development tool to a run-time tool. This requires the ability to change the hardware design while the application is executing and is known as Run-Time Reconfiguration (RTR). Widespread acceptance of run-time reconfigurable custom computing depends upon the existence of high-level automated design tools. Such tools must reduce the designers effort to port applications between different platforms as the architecture, hardware, and software evolves. A Java implementation of a high-level application framework, called Janus, is presented here. In this environment, developers create Java classes that describe the structural behavior of an application. The framework allows hardware and software modules to be freely mixed and interchanged. A compilation phase of the development process analyzes the structure of the application and adapts it to the target platform. Janus is capable of structuring the run-time behavior of an application to take advantage of the memory and computational resources available.

  2. Monitoring Distributed Real-Time Systems: A Survey and Future Directions

    NASA Technical Reports Server (NTRS)

    Goodloe, Alwyn E.; Pike, Lee

    2010-01-01

    Runtime monitors have been proposed as a means to increase the reliability of safety-critical systems. In particular, this report addresses runtime monitors for distributed hard real-time systems. This class of systems has had little attention from the monitoring community. The need for monitors is shown by discussing examples of avionic systems failure. We survey related work in the field of runtime monitoring. Several potential monitoring architectures for distributed real-time systems are presented along with a discussion of how they might be used to monitor properties of interest.

  3. Runtime Verification of Pacemaker Functionality Using Hierarchical Fuzzy Colored Petri-nets.

    PubMed

    Majma, Negar; Babamir, Seyed Morteza; Monadjemi, Amirhassan

    2017-02-01

    Today, implanted medical devices are increasingly used for many patients and in case of diverse health problems. However, several runtime problems and errors are reported by the relevant organizations, even resulting in patient death. One of those devices is the pacemaker. The pacemaker is a device helping the patient to regulate the heartbeat by connecting to the cardiac vessels. This device is directed by its software, so any failure in this software causes a serious malfunction. Therefore, this study aims to a better way to monitor the device's software behavior to decrease the failure risk. Accordingly, we supervise the runtime function and status of the software. The software verification means examining limitations and needs of the system users by the system running software. In this paper, a method to verify the pacemaker software, based on the fuzzy function of the device, is presented. So, the function limitations of the device are identified and presented as fuzzy rules and then the device is verified based on the hierarchical Fuzzy Colored Petri-net (FCPN), which is formed considering the software limits. Regarding the experiences of using: 1) Fuzzy Petri-nets (FPN) to verify insulin pumps, 2) Colored Petri-nets (CPN) to verify the pacemaker and 3) To verify the pacemaker by a software agent with Petri-network based knowledge, which we gained during the previous studies, the runtime behavior of the pacemaker software is examined by HFCPN, in this paper. This is considered a developing step compared to the earlier work. HFCPN in this paper, compared to the FPN and CPN used in our previous studies reduces the complexity. By presenting the Petri-net (PN) in a hierarchical form, the verification runtime, decreased as 90.61% compared to the verification runtime in the earlier work. Since we need an inference engine in the runtime verification, we used the HFCPN to enhance the performance of the inference engine.

  4. The SERENITY Runtime Framework

    NASA Astrophysics Data System (ADS)

    Crespo, Beatriz Gallego-Nicasio; Piñuela, Ana; Soria-Rodriguez, Pedro; Serrano, Daniel; Maña, Antonio

    The SERENITY Runtime Framework (SRF) provides support for applications at runtime, by managing S&D Solutions and monitoring the systems’ context. The main functionality of the SRF, amongst others, is to provide S&D Solutions, by means of Executable Components, in response to applications security requirements. Runtime environment is defined in SRF through the S&D Library and Context Manager components. S&D Library is a local S&D Artefact repository, and stores S&D Classes, S&D Patterns and S&D Implementations. The Context Manager component is in charge of storing and management of the information used by the SRF to select the most appropriate S&D Pattern for a given scenario. The management of the execution of the Executable Component, as running realizations of the S&D Patterns, including instantiation, de-activation and control, as well as providing communication and monitoring mechanisms, besides the recovery and reconfiguration aspects, complete the list of tasks performed by the SRF.

  5. ATDM LANL FleCSI: Topology and Execution Framework

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bergen, Benjamin Karl

    FleCSI is a compile-time configurable C++ framework designed to support multi-physics application development. As such, FleCSI attempts to provide a very general set of infrastructure design patterns that can be specialized and extended to suit the needs of a broad variety of solver and data requirements. This means that FleCSI is potentially useful to many different ECP projects. Current support includes multidimensional mesh topology, mesh geometry, and mesh adjacency information, n-dimensional hashed-tree data structures, graph partitioning interfaces, and dependency closures (to identify data dependencies between distributed-memory address spaces). FleCSI introduces a functional programming model with control, execution, and data abstractionsmore » that are consistent with state-of-the-art task-based runtimes such as Legion and Charm++. The model also provides support for fine-grained, data-parallel execution with backend support for runtimes such as OpenMP and C++17. The FleCSI abstraction layer provides the developer with insulation from the underlying runtimes, while allowing support for multiple runtime systems, including conventional models like asynchronous MPI. The intent is to give developers a concrete set of user-friendly programming tools that can be used now, while allowing flexibility in choosing runtime implementations and optimizations that can be applied to architectures and runtimes that arise in the future. This project is essential to the ECP Ristra Next-Generation Code project, part of ASC ATDM, because it provides a hierarchically parallel programming model that is consistent with the design of modern system architectures, but which allows for the straightforward expression of algorithmic parallelism in a portably performant manner.« less

  6. Improved Air Combat Awareness; with AESA and Next-Generation Signal Processing

    DTIC Science & Technology

    2002-09-01

    competence network Building techniques Software development environment Communication Computer architecture Modeling Real-time programming Radar...memory access, skewed load and store, 3.2 GB/s BW • Performance: 400 MFLOPS Runtime environment Custom runtime routines Driver routines Hardware

  7. Runtime support for data parallel tasks

    NASA Technical Reports Server (NTRS)

    Haines, Matthew; Hess, Bryan; Mehrotra, Piyush; Vanrosendale, John; Zima, Hans

    1994-01-01

    We have recently introduced a set of Fortran language extensions that allow for integrated support of task and data parallelism, and provide for shared data abstractions (SDA's) as a method for communications and synchronization among these tasks. In this paper we discuss the design and implementation issues of the runtime system necessary to support these extensions, and discuss the underlying requirements for such a system. To test the feasibility of this approach, we implement a prototype of the runtime system and use this to support an abstract multidisciplinary optimization (MDO) problem for aircraft design. We give initial results and discuss future plans.

  8. Certification trails and software design for testability

    NASA Technical Reports Server (NTRS)

    Sullivan, Gregory F.; Wilson, Dwight S.; Masson, Gerald M.

    1993-01-01

    Design techniques which may be applied to make program testing easier were investigated. Methods for modifying a program to generate additional data which we refer to as a certification trail are presented. This additional data is designed to allow the program output to be checked more quickly and effectively. Certification trails were described primarily from a theoretical perspective. A comprehensive attempt to assess experimentally the performance and overall value of the certification trail method is reported. The method was applied to nine fundamental, well-known algorithms for the following problems: convex hull, sorting, huffman tree, shortest path, closest pair, line segment intersection, longest increasing subsequence, skyline, and voronoi diagram. Run-time performance data for each of these problems is given, and selected problems are described in more detail. Our results indicate that there are many cases in which certification trails allow for significantly faster overall program execution time than a 2-version programming approach, and also give further evidence of the breadth of applicability of this method.

  9. Functional Programming in Computer Science

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, Loren James; Davis, Marion Kei

    We explore functional programming through a 16-week internship at Los Alamos National Laboratory. Functional programming is a branch of computer science that has exploded in popularity over the past decade due to its high-level syntax, ease of parallelization, and abundant applications. First, we summarize functional programming by listing the advantages of functional programming languages over the usual imperative languages, and we introduce the concept of parsing. Second, we discuss the importance of lambda calculus in the theory of functional programming. Lambda calculus was invented by Alonzo Church in the 1930s to formalize the concept of effective computability, and every functionalmore » language is essentially some implementation of lambda calculus. Finally, we display the lasting products of the internship: additions to a compiler and runtime system for the pure functional language STG, including both a set of tests that indicate the validity of updates to the compiler and a compiler pass that checks for illegal instances of duplicate names.« less

  10. PARLO: PArallel Run-Time Layout Optimization for Scientific Data Explorations with Heterogeneous Access Pattern

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gong, Zhenhuan; Boyuka, David; Zou, X

    Download Citation Email Print Request Permissions Save to Project The size and scope of cutting-edge scientific simulations are growing much faster than the I/O and storage capabilities of their run-time environments. The growing gap is exacerbated by exploratory, data-intensive analytics, such as querying simulation data with multivariate, spatio-temporal constraints, which induces heterogeneous access patterns that stress the performance of the underlying storage system. Previous work addresses data layout and indexing techniques to improve query performance for a single access pattern, which is not sufficient for complex analytics jobs. We present PARLO a parallel run-time layout optimization framework, to achieve multi-levelmore » data layout optimization for scientific applications at run-time before data is written to storage. The layout schemes optimize for heterogeneous access patterns with user-specified priorities. PARLO is integrated with ADIOS, a high-performance parallel I/O middleware for large-scale HPC applications, to achieve user-transparent, light-weight layout optimization for scientific datasets. It offers simple XML-based configuration for users to achieve flexible layout optimization without the need to modify or recompile application codes. Experiments show that PARLO improves performance by 2 to 26 times for queries with heterogeneous access patterns compared to state-of-the-art scientific database management systems. Compared to traditional post-processing approaches, its underlying run-time layout optimization achieves a 56% savings in processing time and a reduction in storage overhead of up to 50%. PARLO also exhibits a low run-time resource requirement, while also limiting the performance impact on running applications to a reasonable level.« less

  11. Uptake of health checks by residents from the Danish social housing sector - a register-based cross-sectional study of patient characteristics in the 'Your Life - Your Health' program.

    PubMed

    Larsen, Lars Bruun; Sandbaek, Annelli; Thomsen, Janus Laust; Bjerregaard, Anne-Louise

    2018-05-02

    Poor uptake among socio-economically disadvantaged and susceptible populations is a well-known challenge of general health check interventions, and is widely cited as one of the reasons for the lack of population level effects seen in many studies. We report on patient characteristics among attendees and non-attendees of health checks made available to residents in the social housing sector of the municipality of Aarhus. We focus on this general population, as well as a particular sub-group living in an exceptionally deprived social housing area, and discuss the properties of intervention uptake that we need to be aware of to qualify and compare the effects of general versus targeted health checks in socially deprived areas. Cross-sectionally in a sample of 6650 residents of the Aarhus social housing sector who were invited for a health check in the first year of the 'Your Life - Your Health' program. The analyses consisted of 1) descriptive analysis of the characteristics of attenders/non-attenders, 2) unadjusted and adjusted Poisson regression to examine associations of patient characteristics and uptake of health checks, and 3) decision tree analyses (CHAID) to examine interaction and homogeneity in patient characteristics among attenders. Of the overall population 30% attended. In a nested cohort of people residing in a particularly deprived social housing settlement, 25% attended. Further, in the overall population, we found an association between the likelihood of taking up a health check and age, sex, country of origin, educational attainment, cohabitation, occupational status, and past medical treatment. In the nested cohort the association between uptake and medical treatment was non-significant, while the association between uptake and occupation was limited to people who were employed. These results resonate with past evidence on health check attendance. Attendance in the 'Your Life - Your Health' program is higher among people of a higher socio-economic status. This should be taken into consideration when analysing and interpreting the overall study effects. Moreover, the results suggest that a targeted approach in the social housing sector could be more effective than a mass screening approach. However, more information is required to make such assertion definitive.

  12. Specification-based Error Recovery: Theory, Algorithms, and Usability

    DTIC Science & Technology

    2013-02-01

    transmuting the specification to an implementation at run-time and reducing the performance overhead. A suite of techniques and tools were designed...in the specification, thereby transmuting the specification to an implementation at run-time and reducing the perfor- mance overhead. A suite of

  13. A Compiler and Run-time System for Network Programming Languages

    DTIC Science & Technology

    2012-01-01

    A Compiler and Run-time System for Network Programming Languages Christopher Monsanto Princeton University Nate Foster Cornell University Rob...Foster, R. Harrison, M. Freedman, C. Monsanto , J. Rexford, A. Story, and D. Walker. Frenetic: A network programming language. In ICFP, Sep 2011. [10] A

  14. A Simplified Method for Implementing Run-Time Polymorphism in Fortran95

    DOE PAGES

    Decyk, Viktor K.; Norton, Charles D.

    2004-01-01

    This paper discusses a simplified technique for software emulation of inheritance and run-time polymorphism in Fortran95. This technique involves retaining the same type throughout an inheritance hierarchy, so that only functions which are modified in a derived class need to be implemented.

  15. Fast l₁-SPIRiT compressed sensing parallel imaging MRI: scalable parallel implementation and clinically feasible runtime.

    PubMed

    Murphy, Mark; Alley, Marcus; Demmel, James; Keutzer, Kurt; Vasanawala, Shreyas; Lustig, Michael

    2012-06-01

    We present l₁-SPIRiT, a simple algorithm for auto calibrating parallel imaging (acPI) and compressed sensing (CS) that permits an efficient implementation with clinically-feasible runtimes. We propose a CS objective function that minimizes cross-channel joint sparsity in the wavelet domain. Our reconstruction minimizes this objective via iterative soft-thresholding, and integrates naturally with iterative self-consistent parallel imaging (SPIRiT). Like many iterative magnetic resonance imaging reconstructions, l₁-SPIRiT's image quality comes at a high computational cost. Excessively long runtimes are a barrier to the clinical use of any reconstruction approach, and thus we discuss our approach to efficiently parallelizing l₁-SPIRiT and to achieving clinically-feasible runtimes. We present parallelizations of l₁-SPIRiT for both multi-GPU systems and multi-core CPUs, and discuss the software optimization and parallelization decisions made in our implementation. The performance of these alternatives depends on the processor architecture, the size of the image matrix, and the number of parallel imaging channels. Fundamentally, achieving fast runtime requires the correct trade-off between cache usage and parallelization overheads. We demonstrate image quality via a case from our clinical experimentation, using a custom 3DFT spoiled gradient echo (SPGR) sequence with up to 8× acceleration via Poisson-disc undersampling in the two phase-encoded directions.

  16. Fast ℓ1-SPIRiT Compressed Sensing Parallel Imaging MRI: Scalable Parallel Implementation and Clinically Feasible Runtime

    PubMed Central

    Murphy, Mark; Alley, Marcus; Demmel, James; Keutzer, Kurt; Vasanawala, Shreyas; Lustig, Michael

    2012-01-01

    We present ℓ1-SPIRiT, a simple algorithm for auto calibrating parallel imaging (acPI) and compressed sensing (CS) that permits an efficient implementation with clinically-feasible runtimes. We propose a CS objective function that minimizes cross-channel joint sparsity in the Wavelet domain. Our reconstruction minimizes this objective via iterative soft-thresholding, and integrates naturally with iterative Self-Consistent Parallel Imaging (SPIRiT). Like many iterative MRI reconstructions, ℓ1-SPIRiT’s image quality comes at a high computational cost. Excessively long runtimes are a barrier to the clinical use of any reconstruction approach, and thus we discuss our approach to efficiently parallelizing ℓ1-SPIRiT and to achieving clinically-feasible runtimes. We present parallelizations of ℓ1-SPIRiT for both multi-GPU systems and multi-core CPUs, and discuss the software optimization and parallelization decisions made in our implementation. The performance of these alternatives depends on the processor architecture, the size of the image matrix, and the number of parallel imaging channels. Fundamentally, achieving fast runtime requires the correct trade-off between cache usage and parallelization overheads. We demonstrate image quality via a case from our clinical experimentation, using a custom 3DFT Spoiled Gradient Echo (SPGR) sequence with up to 8× acceleration via poisson-disc undersampling in the two phase-encoded directions. PMID:22345529

  17. Optimizing ROOT’s Performance Using C++ Modules

    NASA Astrophysics Data System (ADS)

    Vassilev, Vassil

    2017-10-01

    ROOT comes with a C++ compliant interpreter cling. Cling needs to understand the content of the libraries in order to interact with them. Exposing the full shared library descriptors to the interpreter at runtime translates into increased memory footprint. ROOT’s exploratory programming concepts allow implicit and explicit runtime shared library loading. It requires the interpreter to load the library descriptor. Re-parsing of descriptors’ content has a noticeable effect on the runtime performance. Present state-of-art lazy parsing technique brings the runtime performance to reasonable levels but proves to be fragile and can introduce correctness issues. An elegant solution is to load information from the descriptor lazily and in a non-recursive way. The LLVM community advances its C++ Modules technology providing an io-efficient, on-disk representation capable to reduce build times and peak memory usage. The feature is standardized as a C++ technical specification. C++ Modules are a flexible concept, which can be employed to match CMS and other experiments’ requirement for ROOT: to optimize both runtime memory usage and performance. Cling technically “inherits” the feature, however tweaking it to ROOT scale and beyond is a complex endeavor. The paper discusses the status of the C++ Modules in the context of ROOT, supported by few preliminary performance results. It shows a step-by-step migration plan and describes potential challenges which could appear.

  18. Method-independent, Computationally Frugal Convergence Testing for Sensitivity Analysis Techniques

    NASA Astrophysics Data System (ADS)

    Mai, J.; Tolson, B.

    2017-12-01

    The increasing complexity and runtime of environmental models lead to the current situation that the calibration of all model parameters or the estimation of all of their uncertainty is often computationally infeasible. Hence, techniques to determine the sensitivity of model parameters are used to identify most important parameters. All subsequent model calibrations or uncertainty estimation procedures focus then only on these subsets of parameters and are hence less computational demanding. While the examination of the convergence of calibration and uncertainty methods is state-of-the-art, the convergence of the sensitivity methods is usually not checked. If any, bootstrapping of the sensitivity results is used to determine the reliability of the estimated indexes. Bootstrapping, however, might as well become computationally expensive in case of large model outputs and a high number of bootstraps. We, therefore, present a Model Variable Augmentation (MVA) approach to check the convergence of sensitivity indexes without performing any additional model run. This technique is method- and model-independent. It can be applied either during the sensitivity analysis (SA) or afterwards. The latter case enables the checking of already processed sensitivity indexes. To demonstrate the method's independency of the convergence testing method, we applied it to two widely used, global SA methods: the screening method known as Morris method or Elementary Effects (Morris 1991) and the variance-based Sobol' method (Solbol' 1993). The new convergence testing method is first scrutinized using 12 analytical benchmark functions (Cuntz & Mai et al. 2015) where the true indexes of aforementioned three methods are known. This proof of principle shows that the method reliably determines the uncertainty of the SA results when different budgets are used for the SA. The results show that the new frugal method is able to test the convergence and therefore the reliability of SA results in an efficient way. The appealing feature of this new technique is the necessity of no further model evaluation and therefore enables checking of already processed sensitivity results. This is one step towards reliable and transferable, published sensitivity results.

  19. CIFO 3.0

    NASA Technical Reports Server (NTRS)

    Rogers, Pat

    1992-01-01

    The Ada Runtime Environment Working Group has, since 1985, developed and published the Catalog of Interface Features and Options (CFIO) for Ada runtime environments. These interfaces, expressed in legal Ada, provide 'hooks' into the runtime system to export both functionality and enhanced performance beyond that of 'vanilla' Ada implementations. Such enhancements include high- and low-level scheduling control, asynchronous communications facilities, predictable storage management facilities, and fast interrupt response. CIFO 3.0 represents the latest release, which incorporates the efforts of the European real time community as well as new interfaces and expansions of previous catalog entries. This presentation will give both an overview of the Catalog's contents and an 'insider's' view of the Catalog as a whole.

  20. Archer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Atzeni, Simone; Ahn, Dong; Gopalakrishnan, Ganesh

    2017-01-12

    Archer is built on top of the LLVM/Clang compilers that support OpenMP. It applies static and dynamic analysis techniques to detect data races in OpenMP programs generating a very low runtime and memory overhead. Static analyses identify data race free OpenMP regions and exclude them from runtime analysis, which is performed by ThreadSanitizer included in LLVM/Clang.

  1. Towards Just-In-Time Partial Evaluation of Prolog

    NASA Astrophysics Data System (ADS)

    Bolz, Carl Friedrich; Leuschel, Michael; Rigo, Armin

    We introduce a just-in-time specializer for Prolog. Just-in-time specialization attempts to unify of the concepts and benefits of partial evaluation (PE) and just-in-time (JIT) compilation. It is a variant of PE that occurs purely at runtime, which lazily generates residual code and is constantly driven by runtime feedback.

  2. Final Report from The University of Texas at Austin for DEGAS: Dynamic Global Address Space programming environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Erez, Mattan; Yelick, Katherine; Sarkar, Vivek

    The Dynamic, Exascale Global Address Space programming environment (DEGAS) project will develop the next generation of programming models and runtime systems to meet the challenges of Exascale computing. Our approach is to provide an efficient and scalable programming model that can be adapted to application needs through the use of dynamic runtime features and domain-specific languages for computational kernels. We address the following technical challenges: Programmability: Rich set of programming constructs based on a Hierarchical Partitioned Global Address Space (HPGAS) model, demonstrated in UPC++. Scalability: Hierarchical locality control, lightweight communication (extended GASNet), and ef- ficient synchronization mechanisms (Phasers). Performance Portability:more » Just-in-time specialization (SEJITS) for generating hardware-specific code and scheduling libraries for domain-specific adaptive runtimes (Habanero). Energy Efficiency: Communication-optimal code generation to optimize energy efficiency by re- ducing data movement. Resilience: Containment Domains for flexible, domain-specific resilience, using state capture mechanisms and lightweight, asynchronous recovery mechanisms. Interoperability: Runtime and language interoperability with MPI and OpenMP to encourage broad adoption.« less

  3. AMRZone: A Runtime AMR Data Sharing Framework For Scientific Applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Wenzhao; Tang, Houjun; Harenberg, Steven

    Frameworks that facilitate runtime data sharing across multiple applications are of great importance for scientific data analytics. Although existing frameworks work well over uniform mesh data, they can not effectively handle adaptive mesh refinement (AMR) data. Among the challenges to construct an AMR-capable framework include: (1) designing an architecture that facilitates online AMR data management; (2) achieving a load-balanced AMR data distribution for the data staging space at runtime; and (3) building an effective online index to support the unique spatial data retrieval requirements for AMR data. Towards addressing these challenges to support runtime AMR data sharing across scientific applications,more » we present the AMRZone framework. Experiments over real-world AMR datasets demonstrate AMRZone's effectiveness at achieving a balanced workload distribution, reading/writing large-scale datasets with thousands of parallel processes, and satisfying queries with spatial constraints. Moreover, AMRZone's performance and scalability are even comparable with existing state-of-the-art work when tested over uniform mesh data with up to 16384 cores; in the best case, our framework achieves a 46% performance improvement.« less

  4. Runtime and Architecture Support for Efficient Data Exchange in Multi-Accelerator Applications.

    PubMed

    Cabezas, Javier; Gelado, Isaac; Stone, John E; Navarro, Nacho; Kirk, David B; Hwu, Wen-Mei

    2015-05-01

    Heterogeneous parallel computing applications often process large data sets that require multiple GPUs to jointly meet their needs for physical memory capacity and compute throughput. However, the lack of high-level abstractions in previous heterogeneous parallel programming models force programmers to resort to multiple code versions, complex data copy steps and synchronization schemes when exchanging data between multiple GPU devices, which results in high software development cost, poor maintainability, and even poor performance. This paper describes the HPE runtime system, and the associated architecture support, which enables a simple, efficient programming interface for exchanging data between multiple GPUs through either interconnects or cross-node network interfaces. The runtime and architecture support presented in this paper can also be used to support other types of accelerators. We show that the simplified programming interface reduces programming complexity. The research presented in this paper started in 2009. It has been implemented and tested extensively in several generations of HPE runtime systems as well as adopted into the NVIDIA GPU hardware and drivers for CUDA 4.0 and beyond since 2011. The availability of real hardware that support key HPE features gives rise to a rare opportunity for studying the effectiveness of the hardware support by running important benchmarks on real runtime and hardware. Experimental results show that in a exemplar heterogeneous system, peer DMA and double-buffering, pinned buffers, and software techniques can improve the inter-accelerator data communication bandwidth by 2×. They can also improve the execution speed by 1.6× for a 3D finite difference, 2.5× for 1D FFT, and 1.6× for merge sort, all measured on real hardware. The proposed architecture support enables the HPE runtime to transparently deploy these optimizations under simple portable user code, allowing system designers to freely employ devices of different capabilities. We further argue that simple interfaces such as HPE are needed for most applications to benefit from advanced hardware features in practice.

  5. Runtime and Architecture Support for Efficient Data Exchange in Multi-Accelerator Applications

    PubMed Central

    Cabezas, Javier; Gelado, Isaac; Stone, John E.; Navarro, Nacho; Kirk, David B.; Hwu, Wen-mei

    2014-01-01

    Heterogeneous parallel computing applications often process large data sets that require multiple GPUs to jointly meet their needs for physical memory capacity and compute throughput. However, the lack of high-level abstractions in previous heterogeneous parallel programming models force programmers to resort to multiple code versions, complex data copy steps and synchronization schemes when exchanging data between multiple GPU devices, which results in high software development cost, poor maintainability, and even poor performance. This paper describes the HPE runtime system, and the associated architecture support, which enables a simple, efficient programming interface for exchanging data between multiple GPUs through either interconnects or cross-node network interfaces. The runtime and architecture support presented in this paper can also be used to support other types of accelerators. We show that the simplified programming interface reduces programming complexity. The research presented in this paper started in 2009. It has been implemented and tested extensively in several generations of HPE runtime systems as well as adopted into the NVIDIA GPU hardware and drivers for CUDA 4.0 and beyond since 2011. The availability of real hardware that support key HPE features gives rise to a rare opportunity for studying the effectiveness of the hardware support by running important benchmarks on real runtime and hardware. Experimental results show that in a exemplar heterogeneous system, peer DMA and double-buffering, pinned buffers, and software techniques can improve the inter-accelerator data communication bandwidth by 2×. They can also improve the execution speed by 1.6× for a 3D finite difference, 2.5× for 1D FFT, and 1.6× for merge sort, all measured on real hardware. The proposed architecture support enables the HPE runtime to transparently deploy these optimizations under simple portable user code, allowing system designers to freely employ devices of different capabilities. We further argue that simple interfaces such as HPE are needed for most applications to benefit from advanced hardware features in practice. PMID:26180487

  6. Secure and Resilient Functional Modeling for Navy Cyber-Physical Systems

    DTIC Science & Technology

    2017-05-24

    Functional Modeling Compiler (SCCT) FM Compiler and Key Performance Indicators (KPI) May 2018 Pending. Model Management Backbone (SCCT) MMB Demonstration...implement the agent- based distributed runtime. - KPIs for single/multicore controllers and temporal/spatial domains. - Integration of the model management ...Distributed Runtime (UCI) Not started. Model Management Backbone (SCCT) Not started. Siemens Corporation Corporate Technology Unrestricted

  7. A manual for PARTI runtime primitives

    NASA Technical Reports Server (NTRS)

    Berryman, Harry; Saltz, Joel

    1990-01-01

    Primitives are presented that are designed to help users efficiently program irregular problems (e.g., unstructured mesh sweeps, sparse matrix codes, adaptive mesh partial differential equations solvers) on distributed memory machines. These primitives are also designed for use in compilers for distributed memory multiprocessors. Communications patterns are captured at runtime, and the appropriate send and receive messages are automatically generated.

  8. Neuron splitting in compute-bound parallel network simulations enables runtime scaling with twice as many processors.

    PubMed

    Hines, Michael L; Eichner, Hubert; Schürmann, Felix

    2008-08-01

    Neuron tree topology equations can be split into two subtrees and solved on different processors with no change in accuracy, stability, or computational effort; communication costs involve only sending and receiving two double precision values by each subtree at each time step. Splitting cells is useful in attaining load balance in neural network simulations, especially when there is a wide range of cell sizes and the number of cells is about the same as the number of processors. For compute-bound simulations load balance results in almost ideal runtime scaling. Application of the cell splitting method to two published network models exhibits good runtime scaling on twice as many processors as could be effectively used with whole-cell balancing.

  9. An enhanced Ada run-time system for real-time embedded processors

    NASA Technical Reports Server (NTRS)

    Sims, J. T.

    1991-01-01

    An enhanced Ada run-time system has been developed to support real-time embedded processor applications. The primary focus of this development effort has been on the tasking system and the memory management facilities of the run-time system. The tasking system has been extended to support efficient and precise periodic task execution as required for control applications. Event-driven task execution providing a means of task-asynchronous control and communication among Ada tasks is supported in this system. Inter-task control is even provided among tasks distributed on separate physical processors. The memory management system has been enhanced to provide object allocation and protected access support for memory shared between disjoint processors, each of which is executing a distinct Ada program.

  10. Runtime Verification in Context : Can Optimizing Error Detection Improve Fault Diagnosis

    NASA Technical Reports Server (NTRS)

    Dwyer, Matthew B.; Purandare, Rahul; Person, Suzette

    2010-01-01

    Runtime verification has primarily been developed and evaluated as a means of enriching the software testing process. While many researchers have pointed to its potential applicability in online approaches to software fault tolerance, there has been a dearth of work exploring the details of how that might be accomplished. In this paper, we describe how a component-oriented approach to software health management exposes the connections between program execution, error detection, fault diagnosis, and recovery. We identify both research challenges and opportunities in exploiting those connections. Specifically, we describe how recent approaches to reducing the overhead of runtime monitoring aimed at error detection might be adapted to reduce the overhead and improve the effectiveness of fault diagnosis.

  11. Toward real-time performance benchmarks for Ada

    NASA Technical Reports Server (NTRS)

    Clapp, Russell M.; Duchesneau, Louis; Volz, Richard A.; Mudge, Trevor N.; Schultze, Timothy

    1986-01-01

    The issue of real-time performance measurements for the Ada programming language through the use of benchmarks is addressed. First, the Ada notion of time is examined and a set of basic measurement techniques are developed. Then a set of Ada language features believed to be important for real-time performance are presented and specific measurement methods discussed. In addition, other important time related features which are not explicitly part of the language but are part of the run-time related features which are not explicitly part of the language but are part of the run-time system are also identified and measurement techniques developed. The measurement techniques are applied to the language and run-time system features and the results are presented.

  12. Assertiveness expectancies: how hard people push depends on the consequences they predict.

    PubMed

    Ames, Daniel R

    2008-12-01

    The present article seeks to explain varying levels of assertiveness in interpersonal conflict and negotiations with assertiveness expectancies, idiosyncratic predictions people make about the social and instrumental consequences of assertive behavior. This account complements motivation-based models of assertiveness and competitiveness, suggesting that individuals may possess the same social values (e.g., concern for relationships) but show dramatically different assertiveness due to different assumptions about behavioral consequences. Results clarify the form of assertiveness expectancies, namely that most people assume increasing assertiveness can yield positive social and instrumental benefits up to a point, beyond which benefits decline. However, people vary in how assertive this perceived optimal point is. These individual differences in expectancies are linked in 4 studies to assertiveness, including self-reported assertiveness, rated behavioral preferences in assorted interpersonal conflict scenarios, partner ratings of participants' behavior in a face-to-face dyadic negotiation, and work colleague ratings of participants' assertiveness in the workplace. In each case, the link between expectancies and behavior remained after controlling for values. The results suggest a place for expectancies alongside values in psychological models of interpersonal assertiveness.

  13. Social Desirability Responding in the Measurement of Assertive Behavior.

    ERIC Educational Resources Information Center

    Kiecolt, Janice; McGrath, Ellen

    1979-01-01

    Women completed behavioral measures of assertion and anxiety before and after assertiveness training. High social desirability scorers described themselves as more assertive and less anxious, but were behaviorally less assertive than low scorers. Although all scorers improved their assertion skills, high scorers did not appear less anxious after…

  14. A Principal Components Analysis of the Rathus Assertiveness Schedule.

    ERIC Educational Resources Information Center

    Law, H. G.; And Others

    1979-01-01

    Investigated the adequacy of the Rathus Assertiveness Schedule (RAS) as a global measure of assertiveness. Analysis indicated that the RAS does not provide a unidimensional index of assertiveness, but rather measures a number of factors including situation-specific assertive behavior, aggressiveness, and a more general assertiveness. (Author)

  15. Usability of a Runtime Environment for the Use of IMS Learning Design in Mixed Mode Higher Education

    ERIC Educational Resources Information Center

    Klebl, Michael

    2006-01-01

    Starting from the first public draft of IMS Learning Design in November 2002, a research project at the Catholic University Eichstaett-Ingolstadt in Germany was dedicated to the conceptual examination and empirical review of IMS Learning Design Level A. A prototypical runtime environment called "lab005" was developed. It was built based…

  16. National Information Exchange Model (NIEM): DoD Adoption and Implications for C2 (Briefing Charts)

    DTIC Science & Technology

    2014-06-18

    Application Data Consumers Information Exchange Package ( IEP ) the data exchanged at runtime Data Producers IES defines Information Exchange...Specification (IES) build-time description of the data to be exchanged Developers System / Application System / Application IEP | 9 | Data...Exchange Package ( IEP ) the data exchanged at runtime Data Producers System / Application System / Application IEP Consumer’s Understanding

  17. Implementation of a Learning Design Run-Time Environment for the .LRN Learning Management System

    ERIC Educational Resources Information Center

    del Cid, Jose Pablo Escobedo; de la Fuente Valentin, Luis; Gutierrez, Sergio; Pardo, Abelardo; Kloos, Carlos Delgado

    2007-01-01

    The IMS Learning Design specification aims at capturing the complete learning flow of courses, without being restricted to a particular pedagogical model. Such flow description for a course, called a Unit of Learning, must be able to be reproduced in different systems using a so called run-time environment. In the last few years there has been…

  18. A manual for PARTI runtime primitives, revision 1

    NASA Technical Reports Server (NTRS)

    Das, Raja; Saltz, Joel; Berryman, Harry

    1991-01-01

    Primitives are presented that are designed to help users efficiently program irregular problems (e.g., unstructured mesh sweeps, sparse matrix codes, adaptive mesh partial differential equations solvers) on distributed memory machines. These primitives are also designed for use in compilers for distributed memory multiprocessors. Communications patterns are captured at runtime, and the appropriate send and receive messages are automatically generated.

  19. The relationship between attitude, assertiveness and condom use.

    PubMed

    Treffke, H; Tiggemann, M; Ross, M W

    1992-01-01

    The Australian study investigated condom-specific assertiveness and condom use as a means of prevention infection from sexually transmitted diseases. 211 men participated including 83 homosexual men (aged 19-62 years) and 128 heterosexual men (aged 17-49) who completed a questionnaire that comprised demographic details such as age, monogamy, and sexual activity as well as attitudinal and assertiveness measures. General assertiveness was measured by the Rathus Assertiveness Schedule (RAS) which had been widely used across a wide range of social situations. Assertiveness relating specifically to situations involving condoms was measured by the Condom Assertiveness Scale (CAS). Intention to use condoms was positively related to favorable attitudes, which were related to condom-specific assertiveness for both groups. For the heterosexual men only, general social assertiveness was negatively related to attitudes toward condoms. For both groups, the condom-specific measure of assertiveness was positively correlated with attitudes toward condoms. Condom-specific assertiveness was positively related to general social assertiveness as measured by the Rathus Assertiveness Schedule for the homosexual, but not for the heterosexual men. The negative relationship between general assertiveness and attitude to condoms among the heterosexual men implies that the risk reducing behavior of condom use did not seem to accord with the perceptions of masculinity and social assertiveness among heterosexual men. Thus, female partners of such heterosexual men exhibiting negative attitudes toward condom use combined with assertiveness would have to overcome resistance to insist on the use of condoms. Recently some advertising campaigns have been directed at women. The promotion of condom use among heterosexual men has to deal with the perceptions of condom use as unmasculine behavior.

  20. Assertive communication in condom negotiation: Insights from late adolescent couples’ subjective ratings of self and partner

    PubMed Central

    Schmid, Amy; Leonard, Noelle R.; Ritchie, Amanda S.; Gwadz, Marya V.

    2015-01-01

    Purpose Assertive communication has been associated with higher levels of condom use among youth using self-report survey methodology. The purpose of this study was to examine the subjective ratings of assertiveness among young, romantically-involved couples in the context of a condom negotiation task. Methods Using an innovative video-recall procedure, 32 couples (64 youth) engaged in a videotaped condom negotiation task and then rated self and partners’ level of assertiveness. Both individual ratings of assertiveness and couple-level assertiveness were assessed using dyadic hierarchical linear modeling. Results Individuals’ assertiveness was positively associated with condom use. Unexpectedly, the overall level of assertiveness in couples showed a curvilinear association with condom use. Very high and very low assertiveness was associated with lower condom use, while moderate levels of assertiveness were associated with higher condom use. Conclusions Moderate levels of assertiveness during condom negotiation may facilitate condom use in young couples. Increasing condom use among romantic partners may require developing interventions that strengthen youths’ ability to engage in assertive communication strategies that balance emotional intimacy with self-advocacy. PMID:25937470

  1. MIC-SVM: Designing A Highly Efficient Support Vector Machine For Advanced Modern Multi-Core and Many-Core Architectures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    You, Yang; Song, Shuaiwen; Fu, Haohuan

    2014-08-16

    Support Vector Machine (SVM) has been widely used in data-mining and Big Data applications as modern commercial databases start to attach an increasing importance to the analytic capabilities. In recent years, SVM was adapted to the field of High Performance Computing for power/performance prediction, auto-tuning, and runtime scheduling. However, even at the risk of losing prediction accuracy due to insufficient runtime information, researchers can only afford to apply offline model training to avoid significant runtime training overhead. To address the challenges above, we designed and implemented MICSVM, a highly efficient parallel SVM for x86 based multi-core and many core architectures,more » such as the Intel Ivy Bridge CPUs and Intel Xeon Phi coprocessor (MIC).« less

  2. Implementation of and Ada real-time executive: A case study

    NASA Technical Reports Server (NTRS)

    Laird, James D.; Burton, Bruce A.; Koppes, Mary R.

    1986-01-01

    Current Ada language implementations and runtime environments are immature, unproven and are a key risk area for real-time embedded computer system (ECS). A test-case environment is provided in which the concerns of the real-time, ECS community are addressed. A priority driven executive is selected to be implemented in the Ada programming language. The model selected is representative of real-time executives tailored for embedded systems used missile, spacecraft, and avionics applications. An Ada-based design methodology is utilized, and two designs are considered. The first of these designs requires the use of vendor supplied runtime and tasking support. An alternative high-level design is also considered for an implementation requiring no vendor supplied runtime or tasking support. The former approach is carried through to implementation.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Seyong; Vetter, Jeffrey S

    Computer architecture experts expect that non-volatile memory (NVM) hierarchies will play a more significant role in future systems including mobile, enterprise, and HPC architectures. With this expectation in mind, we present NVL-C: a novel programming system that facilitates the efficient and correct programming of NVM main memory systems. The NVL-C programming abstraction extends C with a small set of intuitive language features that target NVM main memory, and can be combined directly with traditional C memory model features for DRAM. We have designed these new features to enable compiler analyses and run-time checks that can improve performance and guard againstmore » a number of subtle programming errors, which, when left uncorrected, can corrupt NVM-stored data. Moreover, to enable recovery of data across application or system failures, these NVL-C features include a flexible directive for specifying NVM transactions. So that our implementation might be extended to other compiler front ends and languages, the majority of our compiler analyses are implemented in an extended version of LLVM's intermediate representation (LLVM IR). We evaluate NVL-C on a number of applications to show its flexibility, performance, and correctness.« less

  4. SuperNatural: a searchable database of available natural compounds

    PubMed Central

    Dunkel, Mathias; Fullbeck, Melanie; Neumann, Stefanie; Preissner, Robert

    2006-01-01

    Although tremendous effort has been put into synthetic libraries, most drugs on the market are still natural compounds or derivatives thereof. There are encyclopaedias of natural compounds, but the availability of these compounds is often unclear and catalogues from numerous suppliers have to be checked. To overcome these problems we have compiled a database of ∼50 000 natural compounds from different suppliers. To enable efficient identification of the desired compounds, we have implemented substructure searches with typical templates. Starting points for in silico screenings are about 2500 well-known and classified natural compounds from a compendium that we have added. Possible medical applications can be ascertained via automatic searches for similar drugs in a free conformational drug database containing WHO indications. Furthermore, we have computed about three million conformers, which are deployed to account for the flexibilities of the compounds when the 3D superposition algorithm that we have developed is used. The SuperNatural Database is publicly available at . Viewing requires the free Chime-plugin from MDL (Chime) or Java2 Runtime Environment (MView), which is also necessary for using Marvin application for chemical drawing. PMID:16381957

  5. A Secure and Robust Approach to Software Tamper Resistance

    NASA Astrophysics Data System (ADS)

    Ghosh, Sudeep; Hiser, Jason D.; Davidson, Jack W.

    Software tamper-resistance mechanisms have increasingly assumed significance as a technique to prevent unintended uses of software. Closely related to anti-tampering techniques are obfuscation techniques, which make code difficult to understand or analyze and therefore, challenging to modify meaningfully. This paper describes a secure and robust approach to software tamper resistance and obfuscation using process-level virtualization. The proposed techniques involve novel uses of software check summing guards and encryption to protect an application. In particular, a virtual machine (VM) is assembled with the application at software build time such that the application cannot run without the VM. The VM provides just-in-time decryption of the program and dynamism for the application's code. The application's code is used to protect the VM to ensure a level of circular protection. Finally, to prevent the attacker from obtaining an analyzable snapshot of the code, the VM periodically discards all decrypted code. We describe a prototype implementation of these techniques and evaluate the run-time performance of applications using our system. We also discuss how our system provides stronger protection against tampering attacks than previously described tamper-resistance approaches.

  6. A Perspective for Assertiveness Training for Blacks

    ERIC Educational Resources Information Center

    Minor, Billy Joe

    1978-01-01

    This article discussess assertiveness in the Black-White encounter. The author delineates the assertive options available to Blacks, distortions in interpretation of assertive messages, and strategies for more effective and efficient assertions. (Author)

  7. Executable assertions and flight software

    NASA Technical Reports Server (NTRS)

    Mahmood, A.; Andrews, D. M.; Mccluskey, E. J.

    1984-01-01

    Executable assertions are used to test flight control software. The techniques used for testing flight software; however, are different from the techniques used to test other kinds of software. This is because of the redundant nature of flight software. An experimental setup for testing flight software using executable assertions is described. Techniques for writing and using executable assertions to test flight software are presented. The error detection capability of assertions is studied and many examples of assertions are given. The issues of placement and complexity of assertions and the language features to support efficient use of assertions are discussed.

  8. UPEML Version 3.0: A machine-portable CDC update emulator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mehlhorn, T.A.; Haill, T.A.

    1992-04-01

    UPEML is a machine-portable program that emulates a subset of the functions of the standard CDC Update. Machine-portability has been achieved by conforming to ANSI standards for Fortran-77. UPEML is compact and fairly efficient; however, it only allows a restricted syntax as compared with the CDC Update. This program was written primarily to facilitate the use of CDC-based scientific packages on alternate computer systems such as the VAX/VMS mainframes and UNIX workstations. UPEML has also been successfully used on the multiprocessor ELXSI, on CRAYs under both UNICOS and CTSS operating systems, and on Sun, HP, Stardent and IBM workstations. UPEMLmore » was originally released with the ITS electron/photon Monte Carlo transport package, which was developed on a CDC-7600 and makes extensive use of conditional file structure to combine several problem geometry and machine options into a single program file. UPEML 3.0 is an enhanced version of the original code and is being independently released for use at any installation or with any code package. Version 3.0 includes enhanced error checking, full ASCII character support, a program library audit capability, and a partial update option in which only selected or modified decks are written to the complete file. Version 3.0 also checks for overlapping corrections, allows processing of pested calls to common decks, and allows the use of alternate files in READ and ADDFILE commands. Finally, UPEML Version 3.0 allows the assignment of input and output files at runtime on the control line.« less

  9. UPEML Version 3. 0: A machine-portable CDC update emulator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mehlhorn, T.A.; Haill, T.A.

    1992-04-01

    UPEML is a machine-portable program that emulates a subset of the functions of the standard CDC Update. Machine-portability has been achieved by conforming to ANSI standards for Fortran-77. UPEML is compact and fairly efficient; however, it only allows a restricted syntax as compared with the CDC Update. This program was written primarily to facilitate the use of CDC-based scientific packages on alternate computer systems such as the VAX/VMS mainframes and UNIX workstations. UPEML has also been successfully used on the multiprocessor ELXSI, on CRAYs under both UNICOS and CTSS operating systems, and on Sun, HP, Stardent and IBM workstations. UPEMLmore » was originally released with the ITS electron/photon Monte Carlo transport package, which was developed on a CDC-7600 and makes extensive use of conditional file structure to combine several problem geometry and machine options into a single program file. UPEML 3.0 is an enhanced version of the original code and is being independently released for use at any installation or with any code package. Version 3.0 includes enhanced error checking, full ASCII character support, a program library audit capability, and a partial update option in which only selected or modified decks are written to the complete file. Version 3.0 also checks for overlapping corrections, allows processing of pested calls to common decks, and allows the use of alternate files in READ and ADDFILE commands. Finally, UPEML Version 3.0 allows the assignment of input and output files at runtime on the control line.« less

  10. Relationship Between the Children's Assertiveness Inventory (CAI) and the Revised Behavioral Assertiveness Test for Children (BAT-CR)

    ERIC Educational Resources Information Center

    Ollendick, Thomas H.; And Others

    1986-01-01

    The relationship between a self-report measure of assertive behavior in children and a role-play measure was examined in 69 elementary school children. Self-report of positive assertion related more closely to role-play measures and expert ratings of assertiveness than did self-report of negative assertion. (Author/LHW)

  11. Assertiveness: making yourself heard in district nursing.

    PubMed

    Lawton, Sally; Stewart, Fiona

    2005-06-01

    Being assertive is not the same as being aggressive. Assertiveness is a tool for expressing ourselves confidently, and a way of saying 'yes' and 'no' in an appropriate way. This article explores issues concerned with assertiveness in district nurse settings. It outlines helpful techniques to develop assertiveness, such as the broken record, fogging, negative assertion and negative inquiry.

  12. Assertive Communication in Condom Negotiation: Insights From Late Adolescent Couples' Subjective Ratings of Self and Partner.

    PubMed

    Schmid, Amy; Leonard, Noelle R; Ritchie, Amanda S; Gwadz, Marya V

    2015-07-01

    Assertive communication has been associated with higher levels of condom use among youth using self-report survey methodology. The purpose of this study was to examine the subjective ratings of assertiveness among young, romantically involved couples in the context of a condom negotiation task. Using an innovative video-recall procedure, 32 couples (64 youth) engaged in a videotaped condom negotiation task and then rated self and partners' level of assertiveness. Both individual ratings of assertiveness and couple-level assertiveness were assessed using dyadic hierarchical linear modeling. Individuals' assertiveness was positively associated with condom use. Unexpectedly, the overall level of assertiveness in couples showed a curvilinear association with condom use. Very high and very low assertiveness was associated with lower condom use, whereas moderate levels of assertiveness were associated with higher condom use. Moderate levels of assertiveness during condom negotiation may facilitate condom use in young couples. Increasing condom use among romantic partners may require developing interventions that strengthen youths' ability to engage in assertive communication strategies that balance emotional intimacy with self-advocacy. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  13. Assertiveness training for undergraduate midwifery students.

    PubMed

    Warland, Jane; McKellar, Lois; Diaz, Monica

    2014-11-01

    Assertiveness can be defined as an interpersonal behaviour that promotes the fact all people in a relationship are equally important. All health professionals including midwives must work with and care for people. At times this will include facilitating interactions that require skilful negotiation and assertiveness. Yet embedding assertiveness education into undergraduate midwifery curricula has not been widely adopted. This paper explores one method of delivering assertiveness training in an undergraduate midwifery course and provides comment on the effectiveness of this strategy in developing assertiveness skills in a cohort of undergraduate midwifery students. We used an assertiveness survey which was administered immediately before and 3-4 months after an assertiveness training workshop. All students (n = 55) attending the training day were invited to participate. Of these 41 (77% response) chose to participate in the pre intervention survey and 32 participated (9 students lost to follow-up) in the follow up survey. There was an overall improvement in self-perceived assertiveness scores following the assertiveness training workshop. These findings provide encouraging evidence that educational institutions that offer specific and targeted assertiveness education will be rewarded with more assertive graduates. Copyright © 2014 Elsevier Ltd. All rights reserved.

  14. Effects of a single-session assertiveness music therapy role playing protocol for psychiatric inpatients.

    PubMed

    Silverman, Michael J

    2011-01-01

    The purpose of this study was to implement and measure the effectiveness of a single-session assertiveness music therapy role playing protocol for psychiatric inpatients. Participants (N=133) were randomly assigned by group to one of three conditions: (a) Assertiveness Music Therapy, (b) No Music Assertiveness, or (c) Music No Assertiveness. Participants in both assertiveness conditions role played a number of different commonly occurring scenarios at an inpatient psychiatric facility and in the community. There were no significant between-group differences in posttest quality of life, locus of control, or other subscales. However, participants in both assertiveness conditions tended to have slightly higher internal locus of control and overall quality of life scores than participants in the music no assertiveness condition. Additionally, the assertiveness music therapy condition had higher attendance rates than the other conditions. A higher percentage of participants from both the assertiveness music therapy and music no assertiveness conditions indicated they thought their session was the most helpful/therapeutic group therapy session in which they had participated; this was not the case for the assertiveness no music condition. Future research is warranted to measure the effects of protocols that can help psychiatric patients generalize skills learned in treatment.

  15. [Relationship of perception conflict and assertiveness in nurses].

    PubMed

    Stojčić, Živko; Perković, Lada; Stašević, Ina; Stojčić, Nevena; Ropac, Darko

    2014-06-01

    At their workplace, nurses are exposed to a number of conflict situations. On dealing with such situations, a significant role is played by assertiveness skills. Assertiveness is the necessity of efficient communication between nurses and patients. Thus, development of these skills can enhance patient confidence in the nursing profession. The aim of the study was to determine whether there are differences in assertiveness with respect to age and sex, and whether there is and what is the connection between assertiveness, potential sources of conflict at work, conflicts due to the behavior of associates, resolving conflicts and self-assessment in resolving conflicts. The survey included 87 hospital nurses. The questionnaire included assessment of assertiveness. On processing the results, we calculated the indicators of descriptive statistics, carried out the variance analysis and t-test, and calculated Pearson's correlation coefficients. It was found that the majority of subjects expressed a medium level of assertiveness, i.e. they could be considered as relatively assertive persons. There were significant differences in assertiveness according to age of the subjects and length of service, where the oldest age group was significantly less assertive. More assertive subjects frequently observed behaviors that may be a source of conflict and problems in the organization of work. At the same time, they often had conflicts because of such behavior, which indicated that more assertive subjects were bolder and more secure. More assertive subjects believed that they were more successful in resolving conflicts than non-assertive subjects.

  16. Evaluation of assertiveness training for psychiatric patients.

    PubMed

    Lin, Yen-Ru; Wu, Mei-Hsuen; Yang, Cheng-I; Chen, Tsai-Hwei; Hsu, Chen-Chuan; Chang, Yue-Cune; Tzeng, Wen-Chii; Chou, Yuan-Hwa; Chou, Kuei-Ru

    2008-11-01

    To investigate the effectiveness of assertiveness training programmes on psychiatric patients' assertiveness, self-esteem and social anxiety. Assertiveness training programmes are designed to improve an individual's assertive beliefs and behaviours, which can help the individual change how they view themselves and establish self-confidence and social anxiety. It is useful for patients with depression, depressive phase of bipolar disorder, anxiety disorder or adjustment disorder. Experimental. There were 68 subjects (28, experimental group; 40, diagnosis-matched comparison group). Subjects in experimental groups participated in experimenter-designed assertiveness training twice a week (two hours each) for four weeks. The comparison groups participated the usual activities. Data were collected in the two groups at the same time: before, after and one month after training programme. Efficacy was measured by assertiveness, self-esteem and social anxiety inventories. A generalised estimating equation was used for analysis. After training, subjects had a significant increase in assertiveness immediately after the assertiveness training programme and one-month follow-up. There was a significant decrease in social anxiety after training, but the improvement was not significant after one month. Self-esteem did not increase significantly after training. With our sample of patients with mixed diagnoses, assertiveness seemed to be improved after assertiveness training. Patients would benefit more from the assertiveness training programme for the change in how they view themselves, improve their assertiveness, properly express their individual moods and thoughts and further establish self-confidence. The assertiveness training protocol could be provided as a reference guide to clinical nurses.

  17. Group versus Individual Assertion Training.

    ERIC Educational Resources Information Center

    Linehan, Marsha M.; And Others

    1979-01-01

    Compared effectiveness of group assertion therapy with individual assertion therapy. Results indicated no significant differences between group v individual assertion training. Pre-, post-, and follow-up measures demonstrated that both treatments were effective in increasing assertive behavior skills and in reducing hostility and anger. Treatment…

  18. Inter-group and intra-group assertiveness: adolescents' social skills following cultural transition.

    PubMed

    Korem, Anat; Horenczyk, Gabriel; Tatar, Moshe

    2012-08-01

    The goals of this study were to examine intra-group and inter-group assertiveness among adolescents, and to compare these two domains of assertiveness between cultural groups in Israel. Measures of intra-group and inter-group assertiveness were developed, and questionnaires were administrated to 441 immigrants from the Former Soviet Union (FSU), 242 immigrants from Ethiopia and 333 non-immigrants. Compared to non-immigrants, FSU and Ethiopian immigrants' inter-group assertiveness was lower. Girls reported higher levels of inter-group assertiveness than boys. Each of the immigrant groups rates itself as equally assertive as the non-immigrant group and more assertive than the other immigrant group. Also, a difference between inter-group and intra-group assertiveness was found among the FSU immigrants. It is argued that adolescents' assertiveness following cultural transition is associated with socio-cultural context, and the implications of this conclusion are discussed. Copyright © 2011 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  19. Method-independent, Computationally Frugal Convergence Testing for Sensitivity Analysis Techniques

    NASA Astrophysics Data System (ADS)

    Mai, Juliane; Tolson, Bryan

    2017-04-01

    The increasing complexity and runtime of environmental models lead to the current situation that the calibration of all model parameters or the estimation of all of their uncertainty is often computationally infeasible. Hence, techniques to determine the sensitivity of model parameters are used to identify most important parameters or model processes. All subsequent model calibrations or uncertainty estimation procedures focus then only on these subsets of parameters and are hence less computational demanding. While the examination of the convergence of calibration and uncertainty methods is state-of-the-art, the convergence of the sensitivity methods is usually not checked. If any, bootstrapping of the sensitivity results is used to determine the reliability of the estimated indexes. Bootstrapping, however, might as well become computationally expensive in case of large model outputs and a high number of bootstraps. We, therefore, present a Model Variable Augmentation (MVA) approach to check the convergence of sensitivity indexes without performing any additional model run. This technique is method- and model-independent. It can be applied either during the sensitivity analysis (SA) or afterwards. The latter case enables the checking of already processed sensitivity indexes. To demonstrate the method independency of the convergence testing method, we applied it to three widely used, global SA methods: the screening method known as Morris method or Elementary Effects (Morris 1991, Campolongo et al., 2000), the variance-based Sobol' method (Solbol' 1993, Saltelli et al. 2010) and a derivative-based method known as Parameter Importance index (Goehler et al. 2013). The new convergence testing method is first scrutinized using 12 analytical benchmark functions (Cuntz & Mai et al. 2015) where the true indexes of aforementioned three methods are known. This proof of principle shows that the method reliably determines the uncertainty of the SA results when different budgets are used for the SA. Subsequently, we focus on the model-independency by testing the frugal method using the hydrologic model mHM (www.ufz.de/mhm) with about 50 model parameters. The results show that the new frugal method is able to test the convergence and therefore the reliability of SA results in an efficient way. The appealing feature of this new technique is the necessity of no further model evaluation and therefore enables checking of already processed (and published) sensitivity results. This is one step towards reliable and transferable, published sensitivity results.

  20. Bypassing Races in Live Applications with Execution Filters

    DTIC Science & Technology

    2010-01-01

    LOOM creates the needed locks and semaphores on demand. The first time a lock or semaphore is refer- enced by one of the inserted synchronization ...runtime. LOOM provides a flexible and safe language for develop- ers to write execution filters that explicitly synchronize code. It then uses an...first compile their application with LOOM. At runtime, to workaround a race, an application developer writes an execution filter that synchronizes the

  1. Argobots: A Lightweight Low-Level Threading and Tasking Framework

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seo, Sangmin; Amer, Abdelhalim; Balaji, Pavan

    In the past few decades, a number of user-level threading and tasking models have been proposed in the literature to address the shortcomings of OS-level threads, primarily with respect to cost and flexibility. Current state-of-the-art user-level threading and tasking models, however, are either too specific to applications or architectures or are not as powerful or flexible. In this paper, we present Argobots, a lightweight, low-level threading and tasking framework that is designed as a portable and performant substrate for high-level programming models or runtime systems. Argobots offers a carefully designed execution model that balances generality of functionality with providing amore » rich set of controls to allow specialization by the user or high-level programming model. We describe the design, implementation, and optimization of Argobots and present integrations with three example high-level models: OpenMP, MPI, and co-located I/O service. Evaluations show that (1) Argobots outperforms existing generic threading runtimes; (2) our OpenMP runtime offers more efficient interoperability capabilities than production OpenMP runtimes do; (3) when MPI interoperates with Argobots instead of Pthreads, it enjoys reduced synchronization costs and better latency hiding capabilities; and (4) I/O service with Argobots reduces interference with co-located applications, achieving performance competitive with that of the Pthreads version.« less

  2. A Weakest Precondition Approach to Robustness

    NASA Astrophysics Data System (ADS)

    Balliu, Musard; Mastroeni, Isabella

    With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.

  3. The Reciprocal Relationship Between Sexual Victimization and Sexual Assertiveness

    PubMed Central

    Livingston, Jennifer A.; Testa, Maria; VanZile-Tamsen, Carol

    2007-01-01

    Low sexual assertiveness has been proposed as a possible mechanism through which sexual revictimization occurs, yet evidence for this has been mixed. In this study, prospective path analysis was used to examine the relationship between sexual refusal assertiveness and sexual victimization over time among a community sample of women. Results provide support for a reciprocal relationship, with historical victimization predicting low sexual assertiveness and low sexual assertiveness predicting subsequent victimization. The effect of recent sexual victimization on subsequent sexual assertiveness also was replicated prospectively. These findings suggest that strengthening sexual assertiveness may help reduce vulnerability to future victimization. PMID:17322273

  4. The reciprocal relationship between sexual victimization and sexual assertiveness.

    PubMed

    Livingston, Jennifer A; Testa, Maria; VanZile-Tamsen, Carol

    2007-03-01

    Low sexual assertiveness has been proposed as a possible mechanism through which sexual revictimization occurs, yet evidence for this has been mixed. In this study, prospective path analysis was used to examine the relationship between sexual refusal assertiveness and sexual victimization over time among a community sample of women. Results provide support for a reciprocal relationship, with historical victimization predicting low sexual assertiveness and low sexual assertiveness predicting subsequent victimization. The effect of recent sexual victimization on subsequent sexual assertiveness also was replicated prospectively. These findings suggest that strengthening sexual assertiveness may help reduce vulnerability to future victimization.

  5. Assertive Training: Teaching Women Not to Discriminate Against Themselves.

    ERIC Educational Resources Information Center

    Butler, Pamela E.

    The process of assertive training is described with emphasis placed on its applicability to problems in female assertiveness. Male and female members of four assertive training groups were compared on the Wolpe-Lazarus assertive inventory. Male members obtained a significantly lower score than female members i.e., men reported themselves as…

  6. The Effects of Assertive Training on Performance in Highly Anxious Adolescents.

    ERIC Educational Resources Information Center

    Wehr, Sara H.; Kaufman, Melvin E.

    1987-01-01

    Investigated the effects of assertive training on measures of assertiveness, state anxiety, and mathematics performance in highly anxious ninth graders (N=96). Found that assertive training resulted in increased assertiveness and decreased state anxiety, with no significant effect on mathematics performance, and no significant effect due to sex.…

  7. The test of truth: an experimental investigation of the norm of assertion.

    PubMed

    Turri, John

    2013-11-01

    Assertion is fundamental to our lives as social and cognitive beings. Philosophers have recently built an impressive case that the norm of assertion is factive. That is, you should make an assertion only if it is true. Thus far the case for a factive norm of assertion been based on observational data. This paper adds experimental evidence in favor of a factive norm from six studies. In these studies, an assertion's truth value dramatically affects whether people think it should be made. Whereas nearly everyone agreed that a true assertion supported by good evidence should be made, most people judged that a false assertion supported by good evidence should not be made. The studies also suggest that people are consciously aware of criteria that guide their evaluation of assertions. Evidence is also presented that some intuitive support for a non-factive norm of assertion comes from a surprising tendency people have to misdescribe cases of blameless rule-breaking as cases where no rule is broken. Copyright © 2013 Elsevier B.V. All rights reserved.

  8. Evaluation of an assertiveness training program on nursing and medical students' assertiveness, self-esteem, and interpersonal communication satisfaction.

    PubMed

    Lin, Yen-Ru; Shiah, I-Shin; Chang, Yue-Cune; Lai, Tzu-Ju; Wang, Kwua-Yun; Chou, Kuei-Ru

    2004-11-01

    This study's objective was to evaluate the effect of an assertiveness training program on nursing and medical students' assertiveness, self-esteem, and interpersonal communication satisfaction. Using a longitudinal research design, 69 participants whose scores on the Assertive Scale were < or = 50% (i.e., low assertiveness) and who were willing to participate were included and assigned to an experimental group (33 subjects) or comparison group (36 participants; participants were matched with the experimental group by grade and sex). Participants in the experimental group received eight 2-h sessions of assertiveness training once a week. Data were collected before and after training and again one month after the end of the training using the Rotter's Internal versus External Control of Reinforcement Scale, Sex Role Inventory, Assertive Scale, Esteem Scale, and Interpersonal Communication Satisfaction Inventory. The generalized estimated equation (GEE) method was used for statistical analysis. The assertiveness and self-esteem of the experimental group were significantly improved in nursing and medical students after assertiveness training, although interpersonal communication satisfaction of the experimental group was not significantly improved after the training program.

  9. Measurement of assertive behavior: construct and predictive validity of self-report, role-playing, and in-vivo measures.

    PubMed

    Burkhart, B R; Green, S B; Harrison, W H

    1979-04-01

    Examined the predictive validity and construct equivalence of the three major procedures used to measure assertive behavior: Self-report, behavioral role-playing, and in-vivo assessment. Seventy-five Ss, who spanned the range of assertiveness, completed two self-report measures of assertiveness, the Rathus Assertiveness Scale (RAS) and the College Self-Expression Scale (CSES); two scales from the Endler S-R Inventory of General Trait Anxiousness, the interpersonal and general anxiety scales; eight role-playing situations that involved the expression of positive and negative assertiveness; and a telephone in-vivo task. In general, the study revealed the following: (1) assertiveness measures are task-dependent in that there was more overlap within task than between tasks; (2) there is a moderate degree of correspondence between self-report and role-playing measures, although this was true only for negative assertion; (3) positive and negative assertion do not appear to have the same topography of responding; and (4) there appears to be no consistent relationship between the in-vivo measure and any other type of assertiveness measure.

  10. Optimization Strategies for Hardware-Based Cofactorization

    NASA Astrophysics Data System (ADS)

    Loebenberger, Daniel; Putzka, Jens

    We use the specific structure of the inputs to the cofactorization step in the general number field sieve (GNFS) in order to optimize the runtime for the cofactorization step on a hardware cluster. An optimal distribution of bitlength-specific ECM modules is proposed and compared to existing ones. With our optimizations we obtain a speedup between 17% and 33% of the cofactorization step of the GNFS when compared to the runtime of an unoptimized cluster.

  11. Uniform Data Access Using GXD

    NASA Technical Reports Server (NTRS)

    Vanderbilt, Peter

    1999-01-01

    This paper gives an overview of GXD, a framework facilitating publication and use of data from diverse data sources. GXD defines an object-oriented data model designed to represent a wide range of things including data, its metadata, resources and query results. GXD also defines a data transport language. a dialect of XML, for representing instances of the data model. This language allows for a wide range of data source implementations by supporting both the direct incorporation of data and the specification of data by various rules. The GXD software library, proto-typed in Java, includes client and server runtimes. The server runtime facilitates the generation of entities containing data encoded in the GXD transport language. The GXD client runtime interprets these entities (potentially from many data sources) to create an illusion of a globally interconnected data space, one that is independent of data source location and implementation.

  12. What breaks a leader: the curvilinear relation between assertiveness and leadership.

    PubMed

    Ames, Daniel R; Flynn, Francis J

    2007-02-01

    The authors propose that individual differences in assertiveness play a critical role in perceptions about leaders. In contrast to prior work that focused on linear effects, the authors argue that individuals seen either as markedly low in assertiveness or as high in assertiveness are generally appraised as less effective leaders. Moreover, the authors claim that observers' perceptions of leaders as having too much or too little assertiveness are widespread. The authors linked the curvilinear effects of assertiveness to underlying tradeoffs between social outcomes (a high level of assertiveness worsens relationships) and instrumental outcomes (a low level of assertiveness limits goal achievement). In 3 studies, the authors used qualitative and quantitative approaches and found support for their account. The results suggest that assertiveness (and other constructs with nonlinear effects) might have been overlooked in research that has been focused on identifying what makes a leader rather than on identifying what breaks a leader. ((c) 2007 APA, all rights reserved).

  13. 32 CFR 842.118 - Assertable claims.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... it merits assertion. Claims for $150 or less need not be asserted; they should be asserted only if... party offers payment and demands a release from the United States before paying damages to the injured...

  14. 32 CFR 842.118 - Assertable claims.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... it merits assertion. Claims for $150 or less need not be asserted; they should be asserted only if... party offers payment and demands a release from the United States before paying damages to the injured...

  15. Acceleration of GPU-based Krylov solvers via data transfer reduction

    DOE PAGES

    Anzt, Hartwig; Tomov, Stanimire; Luszczek, Piotr; ...

    2015-04-08

    Krylov subspace iterative solvers are often the method of choice when solving large sparse linear systems. At the same time, hardware accelerators such as graphics processing units continue to offer significant floating point performance gains for matrix and vector computations through easy-to-use libraries of computational kernels. However, as these libraries are usually composed of a well optimized but limited set of linear algebra operations, applications that use them often fail to reduce certain data communications, and hence fail to leverage the full potential of the accelerator. In this study, we target the acceleration of Krylov subspace iterative methods for graphicsmore » processing units, and in particular the Biconjugate Gradient Stabilized solver that significant improvement can be achieved by reformulating the method to reduce data-communications through application-specific kernels instead of using the generic BLAS kernels, e.g. as provided by NVIDIA’s cuBLAS library, and by designing a graphics processing unit specific sparse matrix-vector product kernel that is able to more efficiently use the graphics processing unit’s computing power. Furthermore, we derive a model estimating the performance improvement, and use experimental data to validate the expected runtime savings. Finally, considering that the derived implementation achieves significantly higher performance, we assert that similar optimizations addressing algorithm structure, as well as sparse matrix-vector, are crucial for the subsequent development of high-performance graphics processing units accelerated Krylov subspace iterative methods.« less

  16. Trial and evaluation of assertion training involving nursing students.

    PubMed

    Nishina, Yuko; Tanigaki, Shizuko

    2013-09-01

    The concept of assertion and conceptual/practical methods of assertion (assertiveness) training were originally developed in the United States and Europe. These principles were embraced and adapted in Japan in 1970's. However, only a few studies relating to assertion (assertiveness) have been undertaken thus far in Japan, especially so in the domain of nursing students in comparison with other countries. The purpose of this study was to design and implement assertion training with nursing students and to clarify its effects. The participants were all volunteers, invited from a class of 3rd year nursing students. Ten students (intervention group) participated in the assertion training comprised of five sessions in February 2006. Fifty-six students (control group) were participated only in the questionnaire. Both groups were asked to complete the same questionnaire twice, before and after the assertion training. The questionnaire measured levels of assertiveness, social skills, self-esteem, social support and satisfaction with university life. The results and variances, both before and after assertion training, between the intervention group and the control group were analyzed. The effectiveness of the assertion training was determined by changes in pre and post training questionnaire scores. The scores for social skills in the control group had a tendency to decline while the scores for social skills in the intervention group remained constant. Although there were no statistically significant results in the intervention group, the present study highlights areas appropriate for further study.

  17. Trial and Evaluation of Assertion Training Involving Nursing Students

    PubMed Central

    Nishina, Yuko; Tanigaki, Shizuko

    2013-01-01

    Background The concept of assertion and conceptual/practical methods of assertion (assertiveness) training were originally developed in the United States and Europe. These principles were embraced and adapted in Japan in 1970’s. However, only a few studies relating to assertion (assertiveness) have been undertaken thus far in Japan, especially so in the domain of nursing students in comparison with other countries. The purpose of this study was to design and implement assertion training with nursing students and to clarify its effects. Methods The participants were all volunteers, invited from a class of 3rd year nursing students. Ten students (intervention group) participated in the assertion training comprised of five sessions in February 2006. Fifty-six students (control group) were participated only in the questionnaire. Both groups were asked to complete the same questionnaire twice, before and after the assertion training. The questionnaire measured levels of assertiveness, social skills, self-esteem, social support and satisfaction with university life. The results and variances, both before and after assertion training, between the intervention group and the control group were analyzed. The effectiveness of the assertion training was determined by changes in pre and post training questionnaire scores. Results The scores for social skills in the control group had a tendency to decline while the scores for social skills in the intervention group remained constant. Conclusion Although there were no statistically significant results in the intervention group, the present study highlights areas appropriate for further study. PMID:24174705

  18. Dimensions of assertiveness: factor analysis of five assertion inventories.

    PubMed

    Henderson, M; Furnham, A

    1983-09-01

    Five self report assertiveness inventories were factor analyzed. In each case two major factors emerged, accounting for approximately one-quarter to a third of the variance. The findings emphasize the multidimensional nature of current measures of assertiveness, and suggest the construction of a more systematic and psychometrically evaluated scale that would yield subscale scores assessing the separate dimensions of assertiveness.

  19. Irish nursing students' changing levels of assertiveness during their pre-registration programme.

    PubMed

    Begley, Cecily M; Glacken, Michèle

    2004-10-01

    Stress and bullying have been found to be common problems in a number of studies of Irish nursing and midwifery. Victims of bullying need high levels of assertiveness to enable them to withstand the stress of victimization. It was deemed important to measure nursing students' level of assertiveness prior to, and near completion of, their pre-registration education programme. Aim. To ascertain nursing students' perceived levels of assertiveness prior to, and nearing the completion of, their three-year pre-registration programme. Ethical approval was given. The students commencing general nurse education programmes in two schools in Southern Ireland agreed to take part (n=72). A questionnaire adapted from a number of assertiveness scales, and tested for validity and reliability in this population, was used to collect data. In general, students' reported assertiveness levels rose as they approached completion of their three-year education programme. The resource constrained health service of the 21st century requires nurses who are assertive to meet the needs of its users. Nursing students' assertiveness skills could be augmented through concentrated efforts from nurse educationalists and clinicians to reduce the communication theory practice gap in nurse education today. To address the multi-dimensional nature of assertiveness, strategies to increase assertiveness should operate at the individual, interface and organisational level. The students in this study reported an increase in levels of assertiveness as they approached completion of their three-year education programme. To function as effective, safe practitioners registered nurses need to be assertive, therefore education in assertiveness should be an integral part of their preparation. The precise composition and mode of delivery of this education requires exploration and evaluation.

  20. Aspects of Predisposition to Assertiveness, Resistance to Assertiveness and Insight into Assertiveness Based Upon Race and Sex.

    DTIC Science & Technology

    1977-12-15

    reflecting assertive behavior are presented to the subjects and (b) the subjects respond by using a scale that permits him or her to indicate his...responses of sub— - jects are not assessed in terms of how assertive ~j~y perceive them to be. For example, an item might ask a subject to scale how...possible actions. This time we want you to tell us how strong or assertive each action is, in your opinion. Each action can be rated on a scale from 1 to 5

  1. Increasing the Runtime Speed of Case-Based Plan Recognition

    DTIC Science & Technology

    2015-05-01

    number of situations that the robot might reasonably be expected to encounter. This requires ef- ficient indexing schemes to ensure that plan retrieval...collection of information if it does not display a currently valid OMB control number . 1. REPORT DATE MAY 2015 2. REPORT TYPE 3. DATES COVERED 00...00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Increasing the Runtime Speed of Case-Based Plan Recognition 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  2. Determination of the Underlying Task Scheduling Algorithm for an Ada Runtime System

    DTIC Science & Technology

    1989-12-01

    was also curious as to how well I could model the test cases with Ada programs . In particular, I wanted to see whether I could model the equal arrival...parameter relationshis=s required to detect the execution of individual algorithms. These test cases were modeled using Ada programs . Then, the...results were analyzed to determine whether the Ada programs were capable of revealing the task scheduling algorithm used by the Ada run-time system. This

  3. Accelerating semantic graph databases on commodity clusters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Morari, Alessandro; Castellana, Vito G.; Haglin, David J.

    We are developing a full software system for accelerating semantic graph databases on commodity cluster that scales to hundreds of nodes while maintaining constant query throughput. Our framework comprises a SPARQL to C++ compiler, a library of parallel graph methods and a custom multithreaded runtime layer, which provides a Partitioned Global Address Space (PGAS) programming model with fork/join parallelism and automatic load balancing over a commodity clusters. We present preliminary results for the compiler and for the runtime.

  4. Semantically Aware Foundation Environment (SAFE) for Clean-Slate Design of Resilient, Adaptive Secure Hosts (CRASH)

    DTIC Science & Technology

    2016-02-01

    system consists of a high-fidelity hardware simulation using field programmable gate arrays (FPGAs), with a set of runtime services (ConcreteWare...perimeter protection, patch, and pray” is not aligned with the threat. Programmers will not bail us out of this situation (by writing defect free code...hosted on a Field Programmable Gate Array (FPGA), with a set of runtime services (concreteware) running on the hardware. Secure applications can be

  5. Argobots: A Lightweight Low-Level Threading and Tasking Framework

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seo, Sangmin; Amer, Abdelhalim; Balaji, Pavan

    In the past few decades, a number of user-level threading and tasking models have been proposed in the literature to address the shortcomings of OS-level threads, primarily with respect to cost and flexibility. Current state-of-the-art user-level threading and tasking models, however, either are too specific to applications or architectures or are not as powerful or flexible. In this paper, we present Argobots, a lightweight, low-level threading and tasking framework that is designed as a portable and performant substrate for high-level programming models or runtime systems. Argobots offers a carefully designed execution model that balances generality of functionality with providing amore » rich set of controls to allow specialization by end users or high-level programming models. We describe the design, implementation, and performance characterization of Argobots and present integrations with three high-level models: OpenMP, MPI, and colocated I/O services. Evaluations show that (1) Argobots, while providing richer capabilities, is competitive with existing simpler generic threading runtimes; (2) our OpenMP runtime offers more efficient interoperability capabilities than production OpenMP runtimes do; (3) when MPI interoperates with Argobots instead of Pthreads, it enjoys reduced synchronization costs and better latency-hiding capabilities; and (4) I/O services with Argobots reduce interference with colocated applications while achieving performance competitive with that of a Pthreads approach.« less

  6. Argobots: A Lightweight Low-Level Threading and Tasking Framework

    DOE PAGES

    Seo, Sangmin; Amer, Abdelhalim; Balaji, Pavan; ...

    2017-10-24

    In the past few decades, a number of user-level threading and tasking models have been proposed in the literature to address the shortcomings of OS-level threads, primarily with respect to cost and flexibility. Current state-of-the-art user-level threading and tasking models, however, are either too specific to applications or architectures or are not as powerful or flexible. In this article, we present Argobots, a lightweight, low-level threading and tasking framework that is designed as a portable and performant substrate for high-level programming models or runtime systems. Argobots offers a carefully designed execution model that balances generality of functionality with providing amore » rich set of controls to allow specialization by the user or high-level programming model. Here, we describe the design, implementation, and optimization of Argobots and present integrations with three example high-level models: OpenMP, MPI, and co-located I/O service. Evaluations show that (1) Argobots outperforms existing generic threading runtimes; (2) our OpenMP runtime offers more efficient interoperability capabilities than production OpenMP runtimes do; (3) when MPI interoperates with Argobots instead of Pthreads, it enjoys reduced synchronization costs and better latency hiding capabilities; and (4) I/O service with Argobots reduces interference with co-located applications, achieving performance competitive with that of the Pthreads version.« less

  7. Argobots: A Lightweight Low-Level Threading and Tasking Framework

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seo, Sangmin; Amer, Abdelhalim; Balaji, Pavan

    In the past few decades, a number of user-level threading and tasking models have been proposed in the literature to address the shortcomings of OS-level threads, primarily with respect to cost and flexibility. Current state-of-the-art user-level threading and tasking models, however, are either too specific to applications or architectures or are not as powerful or flexible. In this article, we present Argobots, a lightweight, low-level threading and tasking framework that is designed as a portable and performant substrate for high-level programming models or runtime systems. Argobots offers a carefully designed execution model that balances generality of functionality with providing amore » rich set of controls to allow specialization by the user or high-level programming model. Here, we describe the design, implementation, and optimization of Argobots and present integrations with three example high-level models: OpenMP, MPI, and co-located I/O service. Evaluations show that (1) Argobots outperforms existing generic threading runtimes; (2) our OpenMP runtime offers more efficient interoperability capabilities than production OpenMP runtimes do; (3) when MPI interoperates with Argobots instead of Pthreads, it enjoys reduced synchronization costs and better latency hiding capabilities; and (4) I/O service with Argobots reduces interference with co-located applications, achieving performance competitive with that of the Pthreads version.« less

  8. Static and Dynamic Frequency Scaling on Multicore CPUs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bao, Wenlei; Hong, Changwan; Chunduri, Sudheer

    2016-12-28

    Dynamic voltage and frequency scaling (DVFS) adapts CPU power consumption by modifying a processor’s operating frequency (and the associated voltage). Typical approaches employing DVFS involve default strategies such as running at the lowest or the highest frequency, or observing the CPU’s runtime behavior and dynamically adapting the voltage/frequency configuration based on CPU usage. In this paper, we argue that many previous approaches suffer from inherent limitations, such as not account- ing for processor-specific impact of frequency changes on energy for different workload types. We first propose a lightweight runtime-based approach to automatically adapt the frequency based on the CPU workload,more » that is agnostic of the processor characteristics. We then show that further improvements can be achieved for affine kernels in the application, using a compile-time characterization instead of run-time monitoring to select the frequency and number of CPU cores to use. Our framework relies on a one-time energy characterization of CPU-specific DVFS profiles followed by a compile-time categorization of loop-based code segments in the application. These are combined to determine a priori of the frequency and the number of cores to use to execute the application so as to optimize energy or energy-delay product, outperforming runtime approach. Extensive evaluation on 60 benchmarks and five multi-core CPUs show that our approach systematically outperforms the powersave Linux governor, while improving overall performance.« less

  9. Factors affecting assertiveness among student nurses.

    PubMed

    Ibrahim, Sanaa Abd El Azim

    2011-05-01

    This study aimed to investigate the factors affecting assertiveness among student nurses. The study was carried out at Faculty of Nursing, Port-Said University, on 207 student nurses from four different grades. Rathus Assertiveness Schedule, consisted of 30 items, was used to measure the students' assertiveness level and a 12-item scale developed by Spreitzer was used to measure students' psychological empowerment. The study results showed that 60.4% of the students were assertive, while about half of the students were empowered. A positive relation between student assertiveness and psychological empowerment was detected. Moreover, positive relations regarding family income and students' assertiveness and psychological empowerment were determined. The study recommended introduction of specific courses aiming at enhancing the acquisition of assertiveness skills, in addition, nurse educators must motivate their students to express their opinion and personal rights and also they must pay attention for students' empowerment and enhance students' autonomy. Copyright © 2010 Elsevier Ltd. All rights reserved.

  10. The effects of assertiveness training in patients with schizophrenia: a randomized, single-blind, controlled study.

    PubMed

    Lee, Tso-Ying; Chang, Shih-Chin; Chu, Hsin; Yang, Chyn-Yng; Ou, Keng-Liang; Chung, Min-Huey; Chou, Kuei-Ru

    2013-11-01

    In this study, we investigated the effects of group assertiveness training on assertiveness, social anxiety and satisfaction with interpersonal communication among patients with chronic schizophrenia. Only limited studies highlighted the effectiveness of group assertiveness training among inpatients with schizophrenia. Given the lack of group assertiveness training among patients with schizophrenia, further development of programmes focusing on facilitating assertiveness, self-confidence and social skills among inpatients with chronic schizophrenia is needed. This study used a prospective, randomized, single-blinded, parallel-group design. This study employed a prospective, randomized, parallel-group design. Seventy-four patients were randomly assigned to experimental group receiving 12 sessions of assertiveness training, or a supportive control group. Data collection took place for the period of June 2009-July 2010. Among patients with chronic schizophrenia, assertiveness, levels of social anxiety and satisfaction with interpersonal communication significantly improved immediately after the intervention and at the 3-month follow-up in the intervention group. The results of a generalized estimating equation (GEE) indicated that: (1) assertiveness significantly improved from pre- to postintervention and was maintained until the follow-up; (2) anxiety regarding social interactions significantly decreased after assertiveness training; and (3) satisfaction with interpersonal communication slightly improved after the 12-session intervention and at the 3-month follow-up. Assertivenss training is a non-invasive and inexpensive therapy that appears to improve assertiveness, social anxiety and interpersonal communication among inpatients with chronic schizophrenia. These findings may provide a reference guide to clinical nurses for developing assertiveness-training protocols. © 2013 Blackwell Publishing Ltd.

  11. A Modular Environment for Geophysical Inversion and Run-time Autotuning using Heterogeneous Computing Systems

    NASA Astrophysics Data System (ADS)

    Myre, Joseph M.

    Heterogeneous computing systems have recently come to the forefront of the High-Performance Computing (HPC) community's interest. HPC computer systems that incorporate special purpose accelerators, such as Graphics Processing Units (GPUs), are said to be heterogeneous. Large scale heterogeneous computing systems have consistently ranked highly on the Top500 list since the beginning of the heterogeneous computing trend. By using heterogeneous computing systems that consist of both general purpose processors and special- purpose accelerators, the speed and problem size of many simulations could be dramatically increased. Ultimately this results in enhanced simulation capabilities that allows, in some cases for the first time, the execution of parameter space and uncertainty analyses, model optimizations, and other inverse modeling techniques that are critical for scientific discovery and engineering analysis. However, simplifying the usage and optimization of codes for heterogeneous computing systems remains a challenge. This is particularly true for scientists and engineers for whom understanding HPC architectures and undertaking performance analysis may not be primary research objectives. To enable scientists and engineers to remain focused on their primary research objectives, a modular environment for geophysical inversion and run-time autotuning on heterogeneous computing systems is presented. This environment is composed of three major components: 1) CUSH---a framework for reducing the complexity of programming heterogeneous computer systems, 2) geophysical inversion routines which can be used to characterize physical systems, and 3) run-time autotuning routines designed to determine configurations of heterogeneous computing systems in an attempt to maximize the performance of scientific and engineering codes. Using three case studies, a lattice-Boltzmann method, a non-negative least squares inversion, and a finite-difference fluid flow method, it is shown that this environment provides scientists and engineers with means to reduce the programmatic complexity of their applications, to perform geophysical inversions for characterizing physical systems, and to determine high-performing run-time configurations of heterogeneous computing systems using a run-time autotuner.

  12. Relationship between Gender Roles and Sexual Assertiveness in Married Women.

    PubMed

    Azmoude, Elham; Firoozi, Mahbobe; Sadeghi Sahebzad, Elahe; Asgharipour, Neghar

    2016-10-01

    Evidence indicates that sexual assertiveness is one of the important factors affecting sexual satisfaction. According to some studies, traditional gender norms conflict with women's capability in expressing sexual desires. This study examined the relationship between gender roles and sexual assertiveness in married women in Mashhad, Iran. This cross-sectional study was conducted on 120 women who referred to Mashhad health centers through convenient sampling in 2014-15. Data were collected using Bem Sex Role Inventory (BSRI) and Hulbert index of sexual assertiveness. Data were analyzed using SPSS 16 by Pearson and Spearman's correlation tests and linear Regression Analysis. The mean scores of sexual assertiveness was 54.93±13.20. According to the findings, there was non-significant correlation between Femininity and masculinity score with sexual assertiveness (P=0.069 and P=0.080 respectively). Linear regression analysis indicated that among the predictor variables, only Sexual function satisfaction was identified as the sexual assertiveness summary predictor variables (P=0.001). Based on the results, sexual assertiveness in married women does not comply with gender role, but it is related to Sexual function satisfaction. So, counseling psychologists need to consider this variable when designing intervention programs for modifying sexual assertiveness and find other variables that affect sexual assertiveness.

  13. Relationship between Gender Roles and Sexual Assertiveness in Married Women

    PubMed Central

    Azmoude, Elham; Firoozi, Mahbobe; Sadeghi Sahebzad, Elahe; Asgharipour, Neghar

    2016-01-01

    ABSTRACT Background: Evidence indicates that sexual assertiveness is one of the important factors affecting sexual satisfaction. According to some studies, traditional gender norms conflict with women’s capability in expressing sexual desires. This study examined the relationship between gender roles and sexual assertiveness in married women in Mashhad, Iran. Methods: This cross-sectional study was conducted on 120 women who referred to Mashhad health centers through convenient sampling in 2014-15. Data were collected using Bem Sex Role Inventory (BSRI) and Hulbert index of sexual assertiveness. Data were analyzed using SPSS 16 by Pearson and Spearman’s correlation tests and linear Regression Analysis. Results: The mean scores of sexual assertiveness was 54.93±13.20. According to the findings, there was non-significant correlation between Femininity and masculinity score with sexual assertiveness (P=0.069 and P=0.080 respectively). Linear regression analysis indicated that among the predictor variables, only Sexual function satisfaction was identified as the sexual assertiveness summary predictor variables (P=0.001). Conclusion: Based on the results, sexual assertiveness in married women does not comply with gender role, but it is related to Sexual function satisfaction. So, counseling psychologists need to consider this variable when designing intervention programs for modifying sexual assertiveness and find other variables that affect sexual assertiveness. PMID:27713899

  14. WE-AB-BRA-09: Registration of Preoperative MRI to Intraoperative Radiographs for Automatic Vertebral Target Localization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    De Silva, T; Uneri, A; Ketcha, M

    Purpose: Accurate localization of target vertebrae is essential to safe, effective spine surgery, but wrong-level surgery occurs with surprisingly high frequency. Recent research yielded the “LevelCheck” method for 3D-2D registration of preoperative CT to intraoperative radiographs, providing decision support for level localization. We report a new method (MR-LevelCheck) to perform 3D-2D registration based on preoperative MRI, presenting a solution for the increasingly common scenario in which MRI (not CT) is used for preoperative planning. Methods: Direct extension of LevelCheck is confounded by large mismatch in image intensity between MRI and radiographs. The proposed method overcomes such challenges with a simplemore » vertebrae segmentation. Using seed points at centroids, vertebrae are segmented using continuous max-flow method and dilated by 1.8 mm to include surrounding cortical bone (inconspicuous in T2w-MRI). MRI projections are computed (analogous to DRR) using segmentation and registered to intraoperative radiographs. The method was tested in a retrospective IRB-approved study involving 11 patients undergoing cervical, thoracic, or lumbar spine surgery following preoperative MRI. Registration accuracy was evaluated in terms of projection-distance-error (PDE) between the true and estimated location of vertebrae in each radiograph. Results: The method successfully registered each preoperative MRI to intraoperative radiographs and maintained desirable properties of robustness against image content mismatch, and large capture range. Segmentation achieved Dice coefficient = 89.2 ± 2.3 and mean-absolute-distance (MAD) = 1.5 ± 0.3 mm. Registration demonstrated robust performance under realistic patient variations, with PDE = 4.0 ± 1.9 mm (median ± iqr) and converged with run-time = 23.3 ± 1.7 s. Conclusion: The MR-LevelCheck algorithm provides an important extension to a previously validated decision support tool in spine surgery by extending its utility to preoperative MRI. With initial studies demonstrating PDE <5 mm and 0% failure rate, the method is now in translation to larger scale prospective clinical studies. S. Vogt and G. Kleinszig are employees of Siemens Healthcare.« less

  15. Challenges in High-Assurance Runtime Verification

    NASA Technical Reports Server (NTRS)

    Goodloe, Alwyn E.

    2016-01-01

    Safety-critical systems are growing more complex and becoming increasingly autonomous. Runtime Verification (RV) has the potential to provide protections when a system cannot be assured by conventional means, but only if the RV itself can be trusted. In this paper, we proffer a number of challenges to realizing high-assurance RV and illustrate how we have addressed them in our research. We argue that high-assurance RV provides a rich target for automated verification tools in hope of fostering closer collaboration among the communities.

  16. Angular-contact ball-bearing internal load estimation algorithm using runtime adaptive relaxation

    NASA Astrophysics Data System (ADS)

    Medina, H.; Mutu, R.

    2017-07-01

    An algorithm to estimate internal loads for single-row angular contact ball bearings due to externally applied thrust loads and high-operating speeds is presented. A new runtime adaptive relaxation procedure and blending function is proposed which ensures algorithm stability whilst also reducing the number of iterations needed to reach convergence, leading to an average reduction in computation time in excess of approximately 80%. The model is validated based on a 218 angular contact bearing and shows excellent agreement compared to published results.

  17. Affordance Templates for Shared Robot Control

    NASA Technical Reports Server (NTRS)

    Hart, Stephen; Dinh, Paul; Hambuchen, Kim

    2014-01-01

    This paper introduces the Affordance Template framework used to supervise task behaviors on the NASA-JSC Valkyrie robot at the 2013 DARPA Robotics Challenge (DRC) Trials. This framework provides graphical interfaces to human supervisors that are adjustable based on the run-time environmental context (e.g., size, location, and shape of objects that the robot must interact with, etc.). Additional improvements, described below, inject degrees of autonomy into instantiations of affordance templates at run-time in order to enable efficient human supervision of the robot for accomplishing tasks.

  18. Deep learning for media analysis in defense scenariosan evaluation of an open source framework for object detection in intelligence related image sets

    DTIC Science & Technology

    2017-06-01

    Training time statistics from Jones’ thesis. . . . . . . . . . . . . . 15 Table 2.2 Evaluation runtime statistics from Camp’s thesis for a single image. 17...Table 2.3 Training and evaluation runtime statistics from Sharpe’s thesis. . . 19 Table 2.4 Sharpe’s screenshot detector results for combinations of...training resources available and time required for each algorithm Jones [15] tested. Table 2.1. Training time statistics from Jones’ [15] thesis. Algorithm

  19. Beyond Assertiveness Training: A Problem-Solving Approach.

    ERIC Educational Resources Information Center

    Scott, Nancy A.

    1979-01-01

    Assertiveness training models show shortcomings in those situations where assertiveness results in stalemates or conflicts, or both. Deadlocks may occur when antagonists demonstrate appropriate assertive behavior. Conflict management using problem-solving skills allows individuals to learn appropriate methods of dealing with conflictual or…

  20. Sexual Assertiveness Scale (SAS) for women: development and validation.

    PubMed

    Morokoff, P J; Quina, K; Harlow, L L; Whitmire, L; Grimley, D M; Gibson, P R; Burkholder, G J

    1997-10-01

    Four studies were conducted to develop and validate the Sexual Assertiveness Scale (SAS), a measure of sexual assertiveness in women that consists of factors measuring initiation, refusal, and pregnancy-sexually transmitted disease prevention assertiveness. A total of 1,613 women from both university and community populations were studied. Confirmatory factor analyses demonstrated that the 3 factors remained stable across samples of university and community women. A structural model was tested in 2 samples, indicating that sexual experience, anticipated negative partner response, and self-efficacy are consistent predictors of sexual assertiveness. Sexual assertiveness was found to be somewhat related to relationship satisfaction, power, and length. The community sample was retested after 6 months and 1 year to establish test-retest reliability. The SAS provides a reliable instrument for assessing and understanding women's sexual assertiveness.

  1. Summary of FY15 results of benchmark modeling activities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arguello, J. Guadalupe

    2015-08-01

    Sandia is participating in the third phase of an is a contributing partner to a U.S.-German "Joint Project" entitled "Comparison of current constitutive models and simulation procedures on the basis of model calculations of the thermo-mechanical behavior and healing of rock salt." The first goal of the project is to check the ability of numerical modeling tools to correctly describe the relevant deformation phenomena in rock salt under various influences. Achieving this goal will lead to increased confidence in the results of numerical simulations related to the secure storage of radioactive wastes in rock salt, thereby enhancing the acceptance ofmore » the results. These results may ultimately be used to make various assertions regarding both the stability analysis of an underground repository in salt, during the operating phase, and the long-term integrity of the geological barrier against the release of harmful substances into the biosphere, in the post-operating phase.« less

  2. Dynamic assertion testing of flight control software

    NASA Technical Reports Server (NTRS)

    Andrews, D. M.; Mahmood, A.; Mccluskey, E. J.

    1985-01-01

    An experiment in using assertions to dynamically test fault tolerant flight software is described. The experiment showed that 87% of typical errors introduced into the program would be detected by assertions. Detailed analysis of the test data showed that the number of assertions needed to detect those errors could be reduced to a minimal set. The analysis also revealed that the most effective assertions tested program parameters that provided greater indirect (collateral) testing of other parameters.

  3. SuperNatural: a searchable database of available natural compounds.

    PubMed

    Dunkel, Mathias; Fullbeck, Melanie; Neumann, Stefanie; Preissner, Robert

    2006-01-01

    Although tremendous effort has been put into synthetic libraries, most drugs on the market are still natural compounds or derivatives thereof. There are encyclopaedias of natural compounds, but the availability of these compounds is often unclear and catalogues from numerous suppliers have to be checked. To overcome these problems we have compiled a database of approximately 50,000 natural compounds from different suppliers. To enable efficient identification of the desired compounds, we have implemented substructure searches with typical templates. Starting points for in silico screenings are about 2500 well-known and classified natural compounds from a compendium that we have added. Possible medical applications can be ascertained via automatic searches for similar drugs in a free conformational drug database containing WHO indications. Furthermore, we have computed about three million conformers, which are deployed to account for the flexibilities of the compounds when the 3D superposition algorithm that we have developed is used. The SuperNatural Database is publicly available at http://bioinformatics.charite.de/supernatural. Viewing requires the free Chime-plugin from MDL (Chime) or Java2 Runtime Environment (MView), which is also necessary for using Marvin application for chemical drawing.

  4. Relation of assertiveness and anxiety among Iranian University students.

    PubMed

    Larijani, T T; Aghajani, M; Baheiraei, A; Neiestanak, N S

    2010-12-01

    • The findings from the present study revealed that less than 30% of nursing and midwifery students have high assertiveness and only half of them have low anxiety. • Assertiveness and anxiety have negative correlations in nursing and midwifery students and affect the mental health and educational and occupational performance of the students. • Many factors such as years of education and working while studying influence the level of assertiveness in the students. • The anxiety in students had a significant relation with the father's level of education, family income, etc. The simultaneous existence of low assertiveness and high anxiety in nursing and midwifery students leads to the disruption of study performance. There exists little information concerning their assertiveness. The purpose of this study was to determine the relation of assertiveness and anxiety in nursing and midwifery students. In this correlational, cross-sectional study, 173 nursing students (68 males and 105 females) and 77 midwifery students were recruited from the Tehran University of Medical Sciences in Iran. Data were collected using a questionnaire including personal-social factors, the Spielberger Trait Anxiety Inventory and the Assertion Inventory of Gambrill and Richey. More than half of the nursing and midwifery students (59.5% and 59.7%, respectively) had moderate assertiveness. Also, 43.3% and 36.4% of them had moderate and high levels of anxiety. Pearson correlation test revealed that assertiveness and anxiety had negative correlations in nursing (r=-0.51, P < 0.001) and midwifery (r=-0.449, P < 0.001) students. Some demographic variables had significant correlations with assertiveness and anxiety among the students. Considering the relation of assertiveness and anxiety and its effects on mental health and educational and occupational performance, students should be informed of the required skills for positive interaction with others and to increase assertiveness and decrease anxiety. © 2010 Blackwell Publishing.

  5. The New Assertive You.

    ERIC Educational Resources Information Center

    Bondanza, Julie

    This workbook provides exercises, role-playing activities, and self-evaluation activities to help deaf adolescents become more aware of their level of assertiveness and the ways assertive behavior can assist in daily living situations. Assertiveness is different from aggressiveness and passiveness, and many people learn through their families and…

  6. Writing executable assertions to test flight software

    NASA Technical Reports Server (NTRS)

    Mahmood, A.; Andrews, D. M.; Mccluskey, E. J.

    1984-01-01

    An executable assertion is a logical statement about the variables or a block of code. If there is no error during execution, the assertion statement results in a true value. Executable assertions can be used for dynamic testing of software. They can be employed for validation during the design phase, and exception and error detection during the operation phase. The present investigation is concerned with the problem of writing executable assertions, taking into account the use of assertions for testing flight software. They can be employed for validation during the design phase, and for exception handling and error detection during the operation phase The digital flight control system and the flight control software are discussed. The considered system provides autopilot and flight director modes of operation for automatic and manual control of the aircraft during all phases of flight. Attention is given to techniques for writing and using assertions to test flight software, an experimental setup to test flight software, and language features to support efficient use of assertions.

  7. The relationship of extraversion and neuroticism to two measures of assertive behavior.

    PubMed

    Vestewig, R E; Moss, M K

    1976-05-01

    One hundred forty-four college students completed the Eysenck Personality Inventory and the Rathus Assertiveness Schedule (RAS) and wrote their behavioral reactions to five scenarios in which an assertive behavior was an appropriate response. Extraversion showed a significant positive correlation with the RAS in both males and females. Neuroticism was negatively correlated with RAS in both sexes. Extraversion and RAS correlated significantly with rated Assertiveness in the scenarios only in the male sample. The RAS predicted variance in Assertiveness beyond that predicted by Extraversion. Overall low correlations of the measures with rated Assertiveness were discussed in terms of the low internal consistency reliability of that scale.

  8. The Development of the Sexual Assertiveness Questionnaire (SAQ): A Comprehensive Measure of Sexual Assertiveness for Women.

    PubMed

    Loshek, Eevett; Terrell, Heather K

    2015-01-01

    Sexual assertiveness has been defined in a number of ways by many researchers, with different aspects of sexual assertiveness emphasized in different measures. Most previous measures have included condom insistence as an important aspect of sexual assertiveness, but this may not translate well to women at all life stages or in varied types of relationships. The goal of the current study was to develop a comprehensive measure of sexual assertiveness that encompasses the aspects of sexual assertiveness that have been emphasized by previous researchers, with the exception of condom insistence. Items were generated based on previous measures and definitions, and an exploratory factor analysis was conducted (Study 1) to better understand the dimensions of sexual assertiveness. The proposed scale was revised and further refined using both exploratory factor analysis and confirmatory factor analysis in Study 2. The final scale consisted of 18 items that seem to capture three dimensions of sexual assertiveness: the ability to initiate and communicate about desired sex, the ability to refuse unwanted sex, and the ability to communicate about sexual history and risk. Model fit indices indicate that this three-factor solution fits the data well. Implications and suggestions for future research are discussed.

  9. Physical Attractiveness, Locus of Control, Sex Role, and Conversational Assertiveness.

    ERIC Educational Resources Information Center

    Campbell, Keith F.; And Others

    1990-01-01

    Analyzes the relationship among physical attractiveness, locus of control, sex role orientation, and assertiveness in undergraduate students. Reviews videotapes of mixed-sex student groups engaged in discussion. Finds an internal locus of control positively correlated with assertiveness. Uses a behavioral measure of assertiveness rather than…

  10. A Self-Report Measure of Assertiveness in Young Adolescents.

    ERIC Educational Resources Information Center

    Connor, Jane M.; And Others

    1982-01-01

    Reported a self-report measure of adolescents' assertiveness. Items for the scale were presented to sixth-grade students. Factor analysis revealed factors of submissiveness, aggressiveness, and assertiveness. After the validational study, a small assertiveness training program indicated that training effects were obtained and could be generalized…

  11. Design for Run-Time Monitor on Cloud Computing

    NASA Astrophysics Data System (ADS)

    Kang, Mikyung; Kang, Dong-In; Yun, Mira; Park, Gyung-Leen; Lee, Junghoon

    Cloud computing is a new information technology trend that moves computing and data away from desktops and portable PCs into large data centers. The basic principle of cloud computing is to deliver applications as services over the Internet as well as infrastructure. A cloud is the type of a parallel and distributed system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources. The large-scale distributed applications on a cloud require adaptive service-based software, which has the capability of monitoring the system status change, analyzing the monitored information, and adapting its service configuration while considering tradeoffs among multiple QoS features simultaneously. In this paper, we design Run-Time Monitor (RTM) which is a system software to monitor the application behavior at run-time, analyze the collected information, and optimize resources on cloud computing. RTM monitors application software through library instrumentation as well as underlying hardware through performance counter optimizing its computing configuration based on the analyzed data.

  12. Colt: an experiment in wormhole run-time reconfiguration

    NASA Astrophysics Data System (ADS)

    Bittner, Ray; Athanas, Peter M.; Musgrove, Mark

    1996-10-01

    Wormhole run-time reconfiguration (RTR) is an attempt to create a refined computing paradigm for high performance computational tasks. By combining concepts from field programmable gate array (FPGA) technologies with data flow computing, the Colt/Stallion architecture achieves high utilization of hardware resources, and facilitates rapid run-time reconfiguration. Targeted mainly at DSP-type operations, the Colt integrated circuit -- a prototype wormhole RTR device -- compares favorably to contemporary DSP alternatives in terms of silicon area consumed per unit computation and in computing performance. Although emphasis has been placed on signal processing applications, general purpose computation has not been overlooked. Colt is a prototype that defines an architecture not only at the chip level but also in terms of an overall system design. As this system is realized, the concept of wormhole RTR will be applied to numerical computation and DSP applications including those common to image processing, communications systems, digital filters, acoustic processing, real-time control systems and simulation acceleration.

  13. Design and Implementation of a Scalable Membership Service for Supercomputer Resiliency-Aware Runtime

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tock, Yoav; Mandler, Benjamin; Moreira, Jose

    2013-01-01

    As HPC systems and applications get bigger and more complex, we are approaching an era in which resiliency and run-time elasticity concerns be- come paramount.We offer a building block for an alternative resiliency approach in which computations will be able to make progress while components fail, in addition to enabling a dynamic set of nodes throughout a computation lifetime. The core of our solution is a hierarchical scalable membership service provid- ing eventual consistency semantics. An attribute replication service is used for hierarchy organization, and is exposed to external applications. Our solution is based on P2P technologies and provides resiliencymore » and elastic runtime support at ultra large scales. Resulting middleware is general purpose while exploiting HPC platform unique features and architecture. We have implemented and tested this system on BlueGene/P with Linux, and using worst-case analysis, evaluated the service scalability as effective for up to 1M nodes.« less

  14. Build and Execute Environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Guan, Qiang

    At exascale, the challenge becomes to develop applications that run at scale and use exascale platforms reliably, efficiently, and flexibly. Workflows become much more complex because they must seamlessly integrate simulation and data analytics. They must include down-sampling, post-processing, feature extraction, and visualization. Power and data transfer limitations require these analysis tasks to be run in-situ or in-transit. We expect successful workflows will comprise multiple linked simulations along with tens of analysis routines. Users will have limited development time at scale and, therefore, must have rich tools to develop, debug, test, and deploy applications. At this scale, successful workflows willmore » compose linked computations from an assortment of reliable, well-defined computation elements, ones that can come and go as required, based on the needs of the workflow over time. We propose a novel framework that utilizes both virtual machines (VMs) and software containers to create a workflow system that establishes a uniform build and execution environment (BEE) beyond the capabilities of current systems. In this environment, applications will run reliably and repeatably across heterogeneous hardware and software. Containers, both commercial (Docker and Rocket) and open-source (LXC and LXD), define a runtime that isolates all software dependencies from the machine operating system. Workflows may contain multiple containers that run different operating systems, different software, and even different versions of the same software. We will run containers in open-source virtual machines (KVM) and emulators (QEMU) so that workflows run on any machine entirely in user-space. On this platform of containers and virtual machines, we will deliver workflow software that provides services, including repeatable execution, provenance, checkpointing, and future proofing. We will capture provenance about how containers were launched and how they interact to annotate workflows for repeatable and partial re-execution. We will coordinate the physical snapshots of virtual machines with parallel programming constructs, such as barriers, to automate checkpoint and restart. We will also integrate with HPC-specific container runtimes to gain access to accelerators and other specialized hardware to preserve native performance. Containers will link development to continuous integration. When application developers check code in, it will automatically be tested on a suite of different software and hardware architectures.« less

  15. Structure and software tools of AIDA.

    PubMed

    Duisterhout, J S; Franken, B; Witte, F

    1987-01-01

    AIDA consists of a set of software tools to allow for fast development and easy-to-maintain Medical Information Systems. AIDA supports all aspects of such a system both during development and operation. It contains tools to build and maintain forms for interactive data entry and on-line input validation, a database management system including a data dictionary and a set of run-time routines for database access, and routines for querying the database and output formatting. Unlike an application generator, the user of AIDA may select parts of the tools to fulfill his needs and program other subsystems not developed with AIDA. The AIDA software uses as host language the ANSI-standard programming language MUMPS, an interpreted language embedded in an integrated database and programming environment. This greatly facilitates the portability of AIDA applications. The database facilities supported by AIDA are based on a relational data model. This data model is built on top of the MUMPS database, the so-called global structure. This relational model overcomes the restrictions of the global structure regarding string length. The global structure is especially powerful for sorting purposes. Using MUMPS as a host language allows the user an easy interface between user-defined data validation checks or other user-defined code and the AIDA tools. AIDA has been designed primarily for prototyping and for the construction of Medical Information Systems in a research environment which requires a flexible approach. The prototyping facility of AIDA operates terminal independent and is even to a great extent multi-lingual. Most of these features are table-driven; this allows on-line changes in the use of terminal type and language, but also causes overhead. AIDA has a set of optimizing tools by which it is possible to build a faster, but (of course) less flexible code from these table definitions. By separating the AIDA software in a source and a run-time version, one is able to write implementation-specific code which can be selected and loaded by a special source loader, being part of the AIDA software. This feature is also accessible for maintaining software on different sites and on different installations.

  16. 78 FR 51677 - Children's Online Privacy Protection Rule Proposed Parental Consent Method; AssertID, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ...-AB20 Children's Online Privacy Protection Rule Proposed Parental Consent Method; AssertID, Inc. Application for Approval of Parental Consent Method AGENCY: Federal Trade Commission (FTC or Commission... concerning the proposed parental consent method submitted by AssertID, Inc. (``AssertID'') under the...

  17. Application of the Elaboration Likelihood Model of Attitude Change to Assertion Training.

    ERIC Educational Resources Information Center

    Ernst, John M.; Heesacker, Martin

    1993-01-01

    College students (n=113) participated in study comparing effects of elaboration likelihood model (ELM) based assertion workshop with those of typical assertion workshop. ELM-based workshop was significantly better at producing favorable attitude change, greater intention to act assertively, and more favorable evaluations of workshop content.…

  18. Effects of Assertive Training on Hospitalized Adolescents and Young Adults.

    ERIC Educational Resources Information Center

    Fiedler, Phyllis E.; And Others

    1979-01-01

    This study focuses on reducing the hostility of hospitalized adolescent and young adult psychiatric patients through assertive training techniques designed to teach appropriate responses to interpersonal conflict. It was predicted that, after treatment, the assertive group would show greater assertiveness, less hostility, and a more positive…

  19. Measurement of Assertive Behavior: Construct and Predictive Validity of Self-Report, Role-Playing, and In-Vivo Measures.

    ERIC Educational Resources Information Center

    Burkhart, Barry R.

    1979-01-01

    Seventy-five subjects, who spanned the range of assertiveness, completed two self-report measures of assertiveness, eight role-playing situations involving positive and negative assertiveness, and a telephone in-vivo task. Correlations between the three measurement methods were examined. (Author/SJL)

  20. Dimensions of Assertiveness in an Asian-American Student Population.

    ERIC Educational Resources Information Center

    Fukuyama, Mary A.; Greenfield, Tom K.

    1983-01-01

    Analyzed components of assertiveness, assessed by the College Self-Expression Scale, for Asian-American (N=105) and Caucasian (N=135) students. Results showed a significant difference in full-scale assertion scores indicating lower levels of overall assertion in Asian Americans, interpreted as consistent with value differences between…

  1. An efficient algorithm for accurate computation of the Dirichlet-multinomial log-likelihood function.

    PubMed

    Yu, Peng; Shaw, Chad A

    2014-06-01

    The Dirichlet-multinomial (DMN) distribution is a fundamental model for multicategory count data with overdispersion. This distribution has many uses in bioinformatics including applications to metagenomics data, transctriptomics and alternative splicing. The DMN distribution reduces to the multinomial distribution when the overdispersion parameter ψ is 0. Unfortunately, numerical computation of the DMN log-likelihood function by conventional methods results in instability in the neighborhood of [Formula: see text]. An alternative formulation circumvents this instability, but it leads to long runtimes that make it impractical for large count data common in bioinformatics. We have developed a new method for computation of the DMN log-likelihood to solve the instability problem without incurring long runtimes. The new approach is composed of a novel formula and an algorithm to extend its applicability. Our numerical experiments show that this new method both improves the accuracy of log-likelihood evaluation and the runtime by several orders of magnitude, especially in high-count data situations that are common in deep sequencing data. Using real metagenomic data, our method achieves manyfold runtime improvement. Our method increases the feasibility of using the DMN distribution to model many high-throughput problems in bioinformatics. We have included in our work an R package giving access to this method and a vingette applying this approach to metagenomic data. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  2. Rule Systems for Runtime Verification: A Short Tutorial

    NASA Astrophysics Data System (ADS)

    Barringer, Howard; Havelund, Klaus; Rydeheard, David; Groce, Alex

    In this tutorial, we introduce two rule-based systems for on and off-line trace analysis, RuleR and LogScope. RuleR is a conditional rule-based system, which has a simple and easily implemented algorithm for effective runtime verification, and into which one can compile a wide range of temporal logics and other specification formalisms used for runtime verification. Specifications can be parameterized with data, or even with specifications, allowing for temporal logic combinators to be defined. We outline a number of simple syntactic extensions of core RuleR that can lead to further conciseness of specification but still enabling easy and efficient implementation. RuleR is implemented in Java and we will demonstrate its ease of use in monitoring Java programs. LogScope is a derivation of RuleR adding a simple very user-friendly temporal logic. It was developed in Python, specifically for supporting testing of spacecraft flight software for NASA’s next 2011 Mars mission MSL (Mars Science Laboratory). The system has been applied by test engineers to analysis of log files generated by running the flight software. Detailed logging is already part of the system design approach, and hence there is no added instrumentation overhead caused by this approach. While post-mortem log analysis prevents the autonomous reaction to problems possible with traditional runtime verification, it provides a powerful tool for test automation. A new system is being developed that integrates features from both RuleR and LogScope.

  3. Sam2bam: High-Performance Framework for NGS Data Preprocessing Tools

    PubMed Central

    Cheng, Yinhe; Tzeng, Tzy-Hwa Kathy

    2016-01-01

    This paper introduces a high-throughput software tool framework called sam2bam that enables users to significantly speed up pre-processing for next-generation sequencing data. The sam2bam is especially efficient on single-node multi-core large-memory systems. It can reduce the runtime of data pre-processing in marking duplicate reads on a single node system by 156–186x compared with de facto standard tools. The sam2bam consists of parallel software components that can fully utilize multiple processors, available memory, high-bandwidth storage, and hardware compression accelerators, if available. The sam2bam provides file format conversion between well-known genome file formats, from SAM to BAM, as a basic feature. Additional features such as analyzing, filtering, and converting input data are provided by using plug-in tools, e.g., duplicate marking, which can be attached to sam2bam at runtime. We demonstrated that sam2bam could significantly reduce the runtime of next generation sequencing (NGS) data pre-processing from about two hours to about one minute for a whole-exome data set on a 16-core single-node system using up to 130 GB of memory. The sam2bam could reduce the runtime of NGS data pre-processing from about 20 hours to about nine minutes for a whole-genome sequencing data set on the same system using up to 711 GB of memory. PMID:27861637

  4. Assertiveness, submissive behaviour and social comparison.

    PubMed

    Gilbert, P; Allan, S

    1994-09-01

    This paper explores the relationship between a new assertiveness measure (the Scale for Interpersonal Behaviour--SIB), social comparison and submissive behaviour. The paper investigates these measures in relation to the personality traits of neuroticism and introversion. Findings suggest: (a) that social comparison may be an important variable in assertiveness and submissive behaviour and shows a strong relationship to neuroticism and introversion; (b) that submissive behaviour is not the mirror opposite of assertive behaviour; and (c) submissive behaviour seems more strongly associated with introversion and neuroticism than assertive performance.

  5. The effect of high and low assertiveness on locus of control and health problems.

    PubMed

    Williams, J M; Stout, J K

    1985-03-01

    The effect of high and low assertiveness on locus of control and health problems was examined with 78 direct-service workers in mental health and mental retardation settings in northeastern Pennsylvania. The direct-service workers completed the Rathus (1973) Assertiveness Schedule, the Rotter (1966) Internal-External Locus of Control Scale, and a health-problems inventory. Highly assertive individuals were found to be more internally controlled and to experience fewer health problems than were individuals low in assertiveness.

  6. Sexual victimization, fear of sexual powerlessness, and cognitive emotion dysregulation as barriers to sexual assertiveness in college women.

    PubMed

    Zerubavel, Noga; Messman-Moore, Terri L

    2013-12-01

    The current study examined sexual victimization and two barriers to young women's sexual assertiveness: fear of sexual powerlessness and cognitive emotion dysregulation. College women (N = 499) responded to surveys and indicated that fear of sexual powerlessness and, to a lesser extent, cognitive emotion dysregulation were barriers to sexual assertiveness. Compared with nonvictims, sexually victimized women had greater problems with sexual assertiveness, fear of sexual powerlessness, and cognitive emotion dysregulation. Among victims, fear of sexual powerlessness and emotion dysregulation interacted to impede sexual assertiveness. Findings support targeting identified barriers in interventions to improve sexual assertiveness and reduce risk for unwanted sexual experiences and sexual victimization.

  7. [A concept analysis of assertiveness].

    PubMed

    Park, Hyoung-Sook; Yang, Young-Ok

    2006-06-01

    The purpose of this study was to analyze and clarify the meaning of the concept, assertiveness. This study used Walker and Avant's process of concept analysis. 1. Attributes of assertiveness were defined as 1) Self-esteem 2) Comprehension to others 3) Clarification of the subject 4) Verbal communication 5) Non-verbal communication. 2. The antecedents of assertiveness consist of these facts 1) The occurrence of a conflict situation 2) The occurrence of will to stick to one's opinions. 3. There are consequences occurring as a result of assertiveness 1) Positive self-confidence 2) Increased comprehension or consideration to others 3) Expand of mutual respect 4) Maintenance of continuously cooperative relationship with each other 5) Output of acceptable results to each other. Assertiveness is a core human behavior and is key to interpersonal relationships. Using the components of the concept of assertiveness, many conflicts in a nursing situation can be effectively prevented.

  8. Examining communication and assertiveness as predictors of condom use: implications for HIV prevention.

    PubMed

    Zamboni, B D; Crawford, I; Williams, P G

    2000-12-01

    The current study explored the relationship between communication and assertiveness in general and sexual contexts and examined each construct's differential ability to predict reported condom use among college students. The results suggest that the constructs are positively related to each other, but general communication does not predict sexual assertiveness. Although sexual assertiveness is a better predictor of condom use than general assertiveness, general communication, and sexual communication, it needs to be considered within the context of other variables (e.g., normative beliefs regarding condom use). HIV prevention programs and models of health behavior should incorporate individual characteristics such as sexual assertiveness. The results of this study suggest that sexual assertiveness, social norm perceptions of condom use, self-efficacy for HIV prevention, and condom attitudes are among the critical variables that should be examined in an integrated model of sexual health behavior.

  9. Self-reported assertiveness in Swedish and Turkish adolescents: a cross-cultural comparison.

    PubMed

    Eskin, Mehmet

    2003-02-01

    The present cross-cultural study compared self-reported assertiveness in 652 Swedish and 654 Turkish high school students by using a multi-dimensional measure called the Scale for Interpersonal Behavior (SIB). Four hypotheses were tested in the study. First, the hypothesis that Swedish adolescents would be more assertive than their Turkish counterparts was supported by the data. Second, the expectation that Turkish boys would be more assertive than Turkish girls, while there would be no differences between Swedish girls and boys, was not confirmed. In general, girls were found to be more skilled than boys in expressing and dealing with personal limitations. Third, as expected, more assertive adolescents in both Sweden and Turkey reported having more friends and receiving more social support than their less assertive peers. Finally, the data supported the expectation that older adolescents would be more assertive than younger ones. The results are discussed in terms of cultural and gender differences.

  10. Verification of reliability and validity of a Japanese version of the Rathus Assertiveness Schedule.

    PubMed

    Suzuki, Eiko; Kanoya, Yuka; Katsuki, Takeshi; Sato, Chifumi

    2007-07-01

    To verify the reliability and validity of a Japanese version of the Rathus Assertiveness Schedule in novice nurses to contribute to nursing management. An adequate scale is needed to measure the assertiveness and the effect of assertion training for Japanese nurses and to compare them with those in other countries. Rathus Assertiveness Schedule was adapted to Japanese with back-translation and its validity was examined in 989 novice nurses. The Japanese version showed a high coefficient of reliability in a split-half reliability test (r=0.76; P<0.01). The coefficient of reliability of Cronbach's alpha was high (r=0.84; P<0.01) indicating high internal consistency. The similarity with the concept of stress coping was shown. We extracted eight principal factors using factor analysis with varimax rotation. Elements of these factors were similar to those of the original Rathus Assertiveness Schedule. The Japanese version of Rathus Assertiveness Schedule was verified.

  11. Assertiveness process of Iranian nurse leaders: a grounded theory study.

    PubMed

    Mahmoudirad, Gholamhossein; Ahmadi, Fazlollah; Vanaki, Zohreh; Hajizadeh, Ebrahim

    2009-06-01

    The purpose of this study was to explore the assertiveness process in Iranian nursing leaders. A qualitative design based on the grounded theory approach was used to collect and analyze the assertiveness experiences of 12 nurse managers working in four hospitals in Iran. Purposeful and theoretical sampling methods were employed for the data collection and selection of the participants, and semistructured interviews were held. During the data analysis, 17 categories emerged and these were categorized into three themes: "task generation", "assertiveness behavior", and "executive agents". From the participants' experiences, assertiveness theory emerged as being fundamental to the development of a schematic model describing nursing leadership behaviors. From another aspect, religious beliefs also played a fundamental role in Iranian nursing leadership assertiveness. It was concluded that bringing a change in the current support from top managers and improving self-learning are required in order to enhance the assertiveness of the nursing leaders in Iran.

  12. Dimensions of Assertiveness: Differential Relationships to Substance Use in Early Adolescence.

    ERIC Educational Resources Information Center

    Wills, Thomas Ashby; And Others

    1989-01-01

    Tested multidimensional formulation of assertiveness and substance use in 3 metropolitan-area school samples (N=675, N=1,430, and N=5,545) of adolescents including White, Black, and Hispanic students aged 12-14 years. Found Substance-specific Assertiveness inversly associated with substance use and Social Dating Assertiveness positively associated…

  13. The Effects of Assertiveness Training on Enhancing the Social Skills of Adolescents with Visual Impairments.

    ERIC Educational Resources Information Center

    Kim, Young-il

    2003-01-01

    A study of the effects of assertiveness training to enhance the social/assertiveness skills of 36 adolescents with visual impairments found that parents, the students, teachers, and observers judged the adolescents' social skills differently. However, the training did have some specific effect on increasing assertiveness. (Contains references.)…

  14. Children's Assertive Behavior: The Reliability and Validity of Three Self-Report Measures.

    ERIC Educational Resources Information Center

    Scanlon, Elizabeth M.; Ollendick, Thomas H.

    1985-01-01

    The internal consistency and validity of three new scales for measuring assertiveness in children were tested. Two of the scales were able to "unbind" aggressive from assertive behavior, while the third was able to "unbind" submissive from assertive behavior. At present, a combination of the three scales is recommended. (KH)

  15. The Effects of Two Types of Assertion Training on Self-Assertion, Anxiety and Self Actualization.

    ERIC Educational Resources Information Center

    Langelier, Regis

    The standard assertion training package includes a selection of techniques from behavior therapy such as modeling, behavior rehearsal, and role-playing along with lectures and discussion, bibliotherapy, and audiovisual feedback. The effects of a standard assertion training package with and without videotape feedback on self-report measures of…

  16. "I'll Repeat Myself, "Again?!"" Empowering Students through Assertive Communication Strategies

    ERIC Educational Resources Information Center

    Kolb, Sharon M.; Griffith, Amy C. Stevens

    2009-01-01

    One goal parents and educators should have is to help children become assertive and emotionally intelligent individuals. In furthering this goal, it helps to have an understanding of the three basic communication styles: (1) passive; (2) aggressive; and (3) assertive. Because communication is most effective when a message is delivered assertively,…

  17. The Effect of Assertiveness Training on the Mobbing That Nurses Experience.

    PubMed

    Karakaş, Sibel Asi; Okanli, Ayşe

    2015-10-01

    This research was designed to determine the impact of assertiveness training on the mobbing experience of nurses. This study was conducted in two phases. In the first phase, 218 nurses completed the mobbing scale; the education group consisted of 38 nurses who received a score at or above 204 points. A total of 180 nurses were excluded from the education group because they received less than 204 points. The study was conducted with 30 nurses because 8 nurses did not agree to participate in the study. The 30 nurses received the assertiveness training program. Six months after training, the nurses completed the mobbing scale and Rathus Assertiveness Inventory (RAI) again. The assertiveness training positively affected the assertiveness and mobbing scores (p = .000). After the training, the assertiveness scores increased and the mobbing condition score decreased (p < .01). Assertiveness training is an effective method for decreasing mobbing. In line with these results, training programs, which support nurses' personal development by providing counseling and support to nurse victims of mobbing, are recommended. © 2015 The Author(s).

  18. Risk taking and refusal assertiveness in a longitudinal model of alcohol use among inner-city adolescents.

    PubMed

    Epstein, J A; Griffin, K W; Botvin, G J

    2001-09-01

    Risk taking and refusal assertiveness have been shown to be important determinants of adolescent alcohol use. However, it remains unclear whether youth predisposed to risk taking would be less likely to assertively refuse. This study examined the relationships among risk taking, refusal assertiveness, and alcohol use in a sample of inner-city minority students (N = 1,459), using a cross-lagged longitudinal structural equation model. Data collectors administered the questionnaire to students following a standardized protocol during a 40-min class period. Based on the tested model, risk taking was more stable over time than refusal assertiveness. Furthermore, high risk takers reported less frequent subsequent refusal assertiveness, and less frequent refusal assertiveness predicted greater drinking. A predisposition toward risk taking appears to be an enduring characteristic that is associated with low refusal assertiveness and increased alcohol use. These findings suggest that alcohol prevention programs that emphasize refusal skills training may be less effective for high risk takers. But programs that focus on enhancing competence or reducing normative expectations for peer alcohol use might be more effective for high risk-taking youth.

  19. Nurses in OR are more assertive than radiographers.

    PubMed

    Johnson, L

    1993-01-01

    This study investigated two hypotheses: that there is a positive correlation between assertiveness and self-esteem, and that nurses rate lower than non-nurses on the constructs. A self-report survey incorporating scales for general assertiveness, situationally-specific assertiveness, global self-esteem and differentiated self-esteem was utilised. For the sample of 83 operating room nurses and 81 radiographers, correlations significant at the p < .001 level between the respective scales supported the first hypothesis. Analysis of variance yielded no significant differences between the two groups on either self-esteem measures or general assertiveness, with the nurses scoring significantly higher than radiographers on the situationally-specific assertiveness scale. Findings challenge the stereotype of the 'shrinking violet' nurse. Additional analysis revealed that the power component of differentiated self-esteem had a higher correlation with global self-esteem and with both assertiveness measures than any other component. Further, the operating room nurses were significantly more power-oriented than radiographers. The pre-eminence of power in the findings suggests that assertiveness and self-esteem are issues relating to the empowerment of nurses.

  20. [Lack of assertiveness in patients with eating disorders].

    PubMed

    Behar A, Rosa; Manzo G, Rodrigo; Casanova Z, Dunny

    2006-03-01

    Low self-assertion has been noted as an important feature among patients with eating disorders. To verify, in a female population, if assertiveness is related or has a predictive capacity for the development of eating disorders. An structured clinical interview, the Eating Attitudes Test (EAT-40) and the Rathus Assertiveness Scale (RAS) were administered to 62 patients that fulfilled the DSM-IV diagnostic criteria for eating disorders and to 120 female students without eating problems. Patients with eating disorders ranked significantly higher on the EAT-40 and its factors (p <0.001) and showed a lower level of assertiveness on the RAS (p <0.001). Assertiveness measured by RAS and its factors was inversely related to EAT-40 and its items (r= -0.21). The predictive capability of the lack of self-assertion in the development of an eating disorder reached 53%, when patients with eating disorders and subjects at risk were considered together and compared to students without such disorder. Lack of assertiveness is a significant trait in patients with eating disorders; it may worsen its outcome and even perpetuate symptoms. Low self-assertion may be considered a predictive factor in the development of an eating disorder and must be managed from a preventive or therapeutic point of view.

  1. Assertiveness and Attitudes of HIV/AIDS Orphaned Girls Towards Education in Kampala (Uganda).

    PubMed

    Kitara, David Lagoro; Amongin, Hellen Christine; Oonyu, Joseph C; Baguma, Peter K

    2013-08-09

    Whereas HIV/AIDS prevalence has been declining in Uganda from 30% to less than 10% in the last 2 decades, the number of HIV/AIDS orphaned girls in secondary schools is still high and girl children have tended to carry the heaviest burdens of family responsibilities thereby adversely affecting their assertiveness and attitudes towards education. Assertiveness is a critical life skill that enables a person to state an opinion, claim a right, or establish authority and it is important to improve attitude towards education. This study examined the relationship between assertiveness and attitude towards education of HIV/AIDS orphaned and non-orphaned adolescent school girls in Kampala. The California Psychological Inventory (CPI) Dominance (Do) Assertiveness Scale and the Attitude Scale were administered to 225 students consecutively selected from 6 secondary schools in Kampala. HIV/AIDS Orphaned girls had lower levels of assertiveness and most had a negative attitude towards education compared to non-orphaned girls. Girls orphaned to HIV/AIDS were less assertive compared to those orphaned by other causes. There was a positive relationship between assertiveness and attitude towards education among orphaned adolescent secondary school girls in Kampala. Girls orphaned to HIV/AIDS were less assertive compared to other school girls and have a poor attitude towards education.

  2. Can you please put it out? Predicting non-smokers' assertiveness intentions at work.

    PubMed

    Aspropoulos, Eleftherios; Lazuras, Lambros; Rodafinos, Angelos; Eiser, J Richard

    2010-04-01

    The present study aimed to identify the psychosocial predictors of non-smoker employee intentions to ask smokers not to smoke at work. The predictive effects of past behaviour, anticipated regret, social norms, attitudinal, outcome expectancy and behavioural control beliefs were investigated in relation to the Attitudes-Social influence-self-Efficacy (ASE) model. Data were collected from Greek non-smoker employees (n=137, mean age=33.5, SD=10.5, 54.7% female) in 15 companies. The main outcome measure was assertiveness intention. Data on participants' past smoking, age, gender and on current smoking policy in the company were also collected. The majority of employees (77.4%) reported being annoyed by exposure to passive smoking at work, but only 37% reported having asked a smoker colleague not to smoke in the last 30 days. Regression analysis showed that the strongest predictor of non-smokers' assertiveness intentions was how often they believed that other non-smokers were assertive. Perceived control over being assertive, annoyance with secondhand smoke (SHS) exposure at work and past assertive behaviour also significantly predicted assertiveness intentions. Assertiveness by non-smoker employees seems to be guided mainly by normative and behavioural control beliefs, annoyance with SHS exposure at work, and past behaviour. Interventions to promote assertiveness in non-smokers might benefit from efficacy training combined with conveying the messages that the majority of other non-smokers are frequently annoyed by exposure to SHS, and that nearly half of all non-smokers are assertive towards smokers.

  3. A Runtime Performance Predictor for Selecting Tabu Tenures

    NASA Technical Reports Server (NTRS)

    Allen, John A.; Minton, Steven N.

    1997-01-01

    One of the drawbacks of parameter based systems, such as tabu search, is the difficulty of finding the correct parameter for a particular problem. Often, rule-of-thumb advice is given which may have little or no applicability to the domain or problem instance at hand. This paper describes the application of a general technique, Runtime Performance Predictors (RPP) which can be used to determine, in an efficient manner, the correct tabu tenure for a particular problem instance. The details of the approach and a demonstration using a variant of GSAT are presented.

  4. Consumer Behavior: Developing Skills for Assertiveness. Consumer Education Training Module.

    ERIC Educational Resources Information Center

    Thayer, Lou

    The goal of this inservice guide for teaching consumer education at the secondary and adult level is to help consumers become more assertive when buying goods and services. A major section in the guide defines assertiveness. The four basic components of assertive behavior are the ability to express emotions openly, the capacity to exercise one's…

  5. Using Simulations in the Middle School: Does Assertiveness of Dyad Partners Influence Conceptual Change?

    ERIC Educational Resources Information Center

    Windschitl, Mark

    2001-01-01

    Examines how academic assertiveness in junior high school students was related to conceptual change and the degree to which their assertiveness affected conceptual change in the partners paired with them for a series of activities using a simulation of the human cardiovascular system. Indicates that the assertiveness ratings of the individuals'…

  6. Inter-Group and Intra-Group Assertiveness: Adolescents' Social Skills Following Cultural Transition

    ERIC Educational Resources Information Center

    Korem, Anat; Horenczyk, Gabriel; Tatar, Moshe

    2012-01-01

    The goals of this study were to examine intra-group and inter-group assertiveness among adolescents, and to compare these two domains of assertiveness between cultural groups in Israel. Measures of intra-group and inter-group assertiveness were developed, and questionnaires were administrated to 441 immigrants from the Former Soviet Union (FSU),…

  7. Effect of the Creative Drama-Based Assertiveness Program on the Assertiveness Skill of Psychological Counsellor Candidates

    ERIC Educational Resources Information Center

    Gundogdu, Rezzan

    2012-01-01

    The purpose of this quasi-experimental research is to study the effects of the creative drama-based assertiveness program (CDBAP) on the assertiveness skill of Psychological Counselling and Guidance (PCG) department students. The opinions of experimental group students on the program were obtained through the CDBAP evaluation form. The sample of…

  8. Personality Correlates of Self-Report, Role-Playing, and In Vivo Measures of Assertiveness.

    ERIC Educational Resources Information Center

    Green, Samuel B.; And Others

    1979-01-01

    Undergraduates completed self-report inventories of assertiveness, participated in behavior role-playing tasks and in vivo measures of assertiveness, and completed the Personality Research Form E (PRF-E). Of 22 PRF-E scales, 11 had at least one significant correlation with assertiveness measures. Some composites of PRF-E scales were related to…

  9. Relations of children's proactive and reactive assertiveness to peer acceptance: moderating effects of social interest.

    PubMed

    Lee, Han-Jong

    2014-06-01

    Previous studies on the social outcome of assertiveness reported mixed findings, failing to support the assumption that assertiveness promotes peer acceptance. In an attempt to provide explanations for the inconsistencies in prior findings, this study proposed making a distinction between proactive and reactive assertiveness and examined the moderating effects of social interest. A total of 441 fifth and sixth graders (232 boys, 209 girls; M age = 10.6 yr., SD = 0.6) participated in the study. Results indicated that proactive assertiveness was positively related to peer acceptance regardless of social interest. By contrast, reactive assertiveness was positively related to peer acceptance but only when social interest is high. When social interest is low, it was negatively associated with peer acceptance.

  10. High estradiol and low progesterone are associated with high assertiveness in women.

    PubMed

    Blake, Khandis R; Bastian, Brock; O'Dean, Siobhan M; Denson, Thomas F

    2017-01-01

    Sexual selection theory posits that women are more selective than men are when choosing a mate. This evolutionary theory suggests that "choosiness" increases during the fertile window because the costs and benefits of mate selection are highest when women are likely to conceive. Little research has directly investigated reproductive correlates of choice assertion. To address this gap, in the present research we investigated whether fertility, estradiol, and progesterone influenced general assertiveness in women. We recruited 98 naturally cycling, ethnically diverse women. Using a within-subjects design and ovarian hormone concentrations at fertile and non-fertile menstrual cycle phases, we measured implicit assertiveness and self-reported assertive behavior. To see if fertility-induced high assertiveness was related to increased sexual motivation, we also measured women's implicit sexual availability and interest in buying sexy clothes. Results showed that high estradiol and low progesterone predicted higher assertiveness. Sexual availability increased during periods of high fertility. Low progesterone combined with high estradiol predicted greater interest in buying sexy clothes. Results held when controlling for individual differences in mate value and sociosexual orientation. Our findings support the role of fluctuating ovarian hormones in the expression and magnitude of women's assertiveness. High assertiveness during the fertile window may be a psychological adaptation that promotes mate selectivity and safeguards against indiscriminate mate choice when conception risk is highest. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Undergraduate nursing students' level of assertiveness in Greece: a questionnaire survey.

    PubMed

    Deltsidou, Anna

    2009-09-01

    A number of studies of nursing and midwifery have found stress and bullying to be frequent problems. Those suffering from bullying and stress need to have high levels of assertiveness to resist and to cope successfully. Hence, it was considered vital to assess the assertiveness level of nursing students throughout their training curriculum. The study population was composed of nursing students in different semesters at one school in Central Greece (n=298) who agreed to complete a questionnaire on assertiveness level assessment, which had been translated into Greek and adapted to this population. All students present in class completed the questionnaire, representing 80% of the total population of active students. Mean assertiveness scores between semesters were compared by ANOVA and comparisons between the responses of the first semester students and responses of advanced semester students were done by Pearson's chi square. The main finding of this study was that the assertiveness levels displayed by students increase slightly in advanced semesters by comparison to those displayed by first-semester students. Assertive behavior should be encouraged through learning methods. Nurses should preferably obtain this training throughout their studies. Instructors have an essential role in the improvement and achievement of assertiveness training curriculums for undergraduate nursing students.

  12. Assertion training therapy in psychiatric milieus.

    PubMed

    Aschen, S R

    1997-02-01

    The current investigation involved an attempt to develop a clinical procedure to decrease anxiety and increase responsiveness (assertion) of psychiatric inpatients of both sexes in mixed diagnostic categories and to evaluate the effectiveness of the procedure. Using a Solomon Four-Group Design, patients, matched on age, sex, and diagnosis, were assigned to one of the following conditions: (1) pretest, treatment, posttest; (2) pretest, no treatment, posttest; (3) treatment, posttest; or (4) no treatment, posttest. The Gambrill-Richey Assertive Inventory was used to assess patient Degree of Discomfort and Response Probability with and without assertion training therapy. Results indicated that (1) patients receiving assertion training therapy were less anxious and more responsive after treatment than before, (2) patients receiving assertion training therapy were less anxious and more responsive than were matched control subjects, (3) control subjects who received no assertion training therapy and who were pretested showed moderate significant gains on the posttest measure, (4) patients reported a greater reduction of anxiety than they did an increase in responsiveness, and (5) pretesting did not significantly influence posttest scores.

  13. Sexual assertiveness mediates the effect of social interaction anxiety on sexual victimization risk among college women.

    PubMed

    Schry, Amie R; White, Susan W

    2013-03-01

    Sexual victimization is prevalent among college women and is associated with adverse psychological consequences. Social anxiety, particularly related to interpersonal interaction, may increase risk of sexual victimization among college women by decreasing sexual assertiveness and decreasing the likelihood of using assertive resistance techniques. This study examined social interaction anxiety as a risk factor for sexual victimization. College women (n=672) completed online measures of social interaction anxiety, sexual assertiveness, and sexual victimization experiences. Social interaction anxiety was significantly positively related to likelihood of experiencing coerced sexual intercourse, and significant indirect effects, via decreased sexual refusal assertiveness, were found for both coerced sexual intercourse and rape. Social anxiety may be an important psychological barrier to assertive resistance during risky sexual situations, and developers of risk reduction programs for college women should consider including methods to help women overcome their social anxiety in order to successfully use assertive resistance techniques. Copyright © 2012. Published by Elsevier Ltd.

  14. Number of sexual partners and sexual assertiveness predict sexual victimization: do more partners equal more risk?

    PubMed

    Walker, Dave P; Messman-Moore, Terri L; Ward, Rose Marie

    2011-01-01

    In previous studies, number of sexual partners and sexual assertiveness were examined as independent risk factors for sexual victimization among college women. Using a sample of 335 college women, this study examined the interaction of number of sexual partners and sexual assertiveness on verbal sexual coercion and rape. Approximately 32% of the sample reported unwanted sexual intercourse, 6.9% (n = 23) experienced verbal sexual coercion, 17.9% (n = 60) experienced rape, and 7.2% (n = 24) experienced both. As number of sexual partners increased, instances of verbal sexual coercion increased for women low in relational sexual assertiveness but not for women high in relational sexual assertiveness. A similar relationship was not found for rape. Among women who experienced both verbal sexual coercion and rape, increases in number of partners in the context of low refusal and relational assertiveness were associated with increases in verbal sexual coercion and rape. Findings suggest sexual assertiveness is related to fewer experiences of sexual coercion.

  15. FleCSPH notes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lim, Hyun; Loiseau, Julien

    FleCSI is a compile-time con gurable framework designed to support multi-physics application development. As such, FleCSI provides a very general set of infrastructure design patterns that can be specialized and extended to suit the needs of a broad variety of solver and data requirements. FleCSI currently supports multi-dimensional mesh topology, geometry, and adjacency information, as well as n-dimensional hashed-tree data structures, graph partitioning interfaces, and dependency closures. FleCSI introduces a functional programming model with control, execution, and data abstractions that are consistent both with MPI and with state-of-the-art, task-based runtimes such as Legion and Charm++. The abstraction layer insulates developersmore » from the underlying runtime, while allowing support for multiple runtime systems including conventional models like asynchronous MPI. The intent is to provide developers with a concrete set of user-friendly programming tools that can be used now, while allowing exibility in choosing runtime implementations and optimization that can be applied to future architectures and runtimes. FleCSI's control and execution models provide formal nomenclature for describing poorly understood concepts such as kernels and tasks. FleCSI's data model provides a low-buy-in approach that makes it an attractive option for many application projects, as developers are not locked into particular layouts or data structure representations. FleCSI currently provides a parallel but not distributed implementation of Binary, Quad and Oct-tree topology. This implementation is base on space lling curves domain decomposition, the Morton order. The current FleCSI version requires the implementation of a driver and a specialization driver. The role of the specialization driver is to provide the data distribution. This feature is not complete in FleCSI code and we provide it. The next step will be to incorporate it directly from FleCSPH to FleCSI as we reach a good level of performance. Then the driver represent the general execution of the resolution without worrying of the data locality and communications. As FleCSI is an On-Development code the structure may change in the future and we keep track of these changes in FleCSPH.« less

  16. Predictors of sexual assertiveness: the role of sexual desire, arousal, attitudes, and partner abuse.

    PubMed

    Santos-Iglesias, Pablo; Sierra, Juan Carlos; Vallejo-Medina, Pablo

    2013-08-01

    This study was conducted to test interpersonal, attitudinal, and sexual predictors of sexual assertiveness in a Spanish sample of 1,619 men and 1,755 women aged 18-87 years. Participants completed measures of sexual assertiveness, solitary and dyadic sexual desire, sexual arousal, erectile function, sexual attitudes, and frequency of partner abuse. In men, higher sexual assertiveness was predicted by less non-physical abuse, more positive attitudes toward sexual fantasies and erotophilia, higher dyadic desire, and higher sexual arousal. In women, higher sexual assertiveness was predicted by less non-physical abuse, less solitary sexual desire and higher dyadic sexual desire, arousal, erotophilia, and positive attitudes towards sexual fantasies. Results were discussed in the light of prevention and educational programs that include training in sexual assertiveness skills.

  17. A Hartree-Fock Application Using UPC++ and the New DArray Library

    DOE PAGES

    Ozog, David; Kamil, Amir; Zheng, Yili; ...

    2016-07-21

    The Hartree-Fock (HF) method is the fundamental first step for incorporating quantum mechanics into many-electron simulations of atoms and molecules, and it is an important component of computational chemistry toolkits like NWChem. The GTFock code is an HF implementation that, while it does not have all the features in NWChem, represents crucial algorithmic advances that reduce communication and improve load balance by doing an up-front static partitioning of tasks, followed by work stealing whenever necessary. To enable innovations in algorithms and exploit next generation exascale systems, it is crucial to support quantum chemistry codes using expressive and convenient programming modelsmore » and runtime systems that are also efficient and scalable. Here, this paper presents an HF implementation similar to GTFock using UPC++, a partitioned global address space model that includes flexible communication, asynchronous remote computation, and a powerful multidimensional array library. UPC++ offers runtime features that are useful for HF such as active messages, a rich calculus for array operations, hardware-supported fetch-and-add, and functions for ensuring asynchronous runtime progress. We present a new distributed array abstraction, DArray, that is convenient for the kinds of random-access array updates and linear algebra operations on block-distributed arrays with irregular data ownership. Finally, we analyze the performance of atomic fetch-and-add operations (relevant for load balancing) and runtime attentiveness, then compare various techniques and optimizations for each. Our optimized implementation of HF using UPC++ and the DArrays library shows up to 20% improvement over GTFock with Global Arrays at scales up to 24,000 cores.« less

  18. A fundamental study of suction for Laminar Flow Control (LFC)

    NASA Astrophysics Data System (ADS)

    Watmuff, Jonathan H.

    1992-10-01

    This report covers the period forming the first year of the project. The aim is to experimentally investigate the effects of suction as a technique for Laminar Flow Control. Experiments are to be performed which require substantial modifications to be made to the experimental facility. Considerable effort has been spent developing new high performance constant temperature hot-wire anemometers for general purpose use in the Fluid Mechanics Laboratory. Twenty instruments have been delivered. An important feature of the facility is that it is totally automated under computer control. Unprecedently large quantities of data can be acquired and the results examined using the visualization tools developed specifically for studying the results of numerical simulations on graphics works stations. The experiment must be run for periods of up to a month at a time since the data is collected on a point-by-point basis. Several techniques were implemented to reduce the experimental run-time by a significant factor. Extra probes have been constructed and modifications have been made to the traverse hardware and to the real-time experimental code to enable multiple probes to be used. This will reduce the experimental run-time by the appropriate factor. Hot-wire calibration drift has been a frustrating problem owing to the large range of ambient temperatures experienced in the laboratory. The solution has been to repeat the calibrations at frequent intervals. However the calibration process has consumed up to 40 percent of the run-time. A new method of correcting the drift is very nearly finalized and when implemented it will also lead to a significant reduction in the experimental run-time.

  19. A Hartree-Fock Application Using UPC++ and the New DArray Library

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ozog, David; Kamil, Amir; Zheng, Yili

    The Hartree-Fock (HF) method is the fundamental first step for incorporating quantum mechanics into many-electron simulations of atoms and molecules, and it is an important component of computational chemistry toolkits like NWChem. The GTFock code is an HF implementation that, while it does not have all the features in NWChem, represents crucial algorithmic advances that reduce communication and improve load balance by doing an up-front static partitioning of tasks, followed by work stealing whenever necessary. To enable innovations in algorithms and exploit next generation exascale systems, it is crucial to support quantum chemistry codes using expressive and convenient programming modelsmore » and runtime systems that are also efficient and scalable. Here, this paper presents an HF implementation similar to GTFock using UPC++, a partitioned global address space model that includes flexible communication, asynchronous remote computation, and a powerful multidimensional array library. UPC++ offers runtime features that are useful for HF such as active messages, a rich calculus for array operations, hardware-supported fetch-and-add, and functions for ensuring asynchronous runtime progress. We present a new distributed array abstraction, DArray, that is convenient for the kinds of random-access array updates and linear algebra operations on block-distributed arrays with irregular data ownership. Finally, we analyze the performance of atomic fetch-and-add operations (relevant for load balancing) and runtime attentiveness, then compare various techniques and optimizations for each. Our optimized implementation of HF using UPC++ and the DArrays library shows up to 20% improvement over GTFock with Global Arrays at scales up to 24,000 cores.« less

  20. A fundamental study of suction for Laminar Flow Control (LFC)

    NASA Technical Reports Server (NTRS)

    Watmuff, Jonathan H.

    1992-01-01

    This report covers the period forming the first year of the project. The aim is to experimentally investigate the effects of suction as a technique for Laminar Flow Control. Experiments are to be performed which require substantial modifications to be made to the experimental facility. Considerable effort has been spent developing new high performance constant temperature hot-wire anemometers for general purpose use in the Fluid Mechanics Laboratory. Twenty instruments have been delivered. An important feature of the facility is that it is totally automated under computer control. Unprecedently large quantities of data can be acquired and the results examined using the visualization tools developed specifically for studying the results of numerical simulations on graphics works stations. The experiment must be run for periods of up to a month at a time since the data is collected on a point-by-point basis. Several techniques were implemented to reduce the experimental run-time by a significant factor. Extra probes have been constructed and modifications have been made to the traverse hardware and to the real-time experimental code to enable multiple probes to be used. This will reduce the experimental run-time by the appropriate factor. Hot-wire calibration drift has been a frustrating problem owing to the large range of ambient temperatures experienced in the laboratory. The solution has been to repeat the calibrations at frequent intervals. However the calibration process has consumed up to 40 percent of the run-time. A new method of correcting the drift is very nearly finalized and when implemented it will also lead to a significant reduction in the experimental run-time.

  1. Correlates of adolescent assertiveness with HIV avoidance in a four-nation sample.

    PubMed

    Onuoha, Francis N; Munakata, Tsunetsugu

    2005-01-01

    Adolescents are frequently admonished to be socially assertive in order to confront negative interpersonal peer influences. Since the advent of HIV/AIDS in human social chemistry, the admonition has become more critical than ever. But the warning is often proffered in the misguided presumption that social assertiveness is the all-required psycho-structure against risk. The present cross-national study examines social and sexual assertiveness in four-country adolescent samples of Nigerian, Thai, Chinese, and Japanese college students. The findings reveal that sexual rather than social assertiveness was the sine qua non against risk, cross-culturally.

  2. Design and Development of a Run-Time Monitor for Multi-Core Architectures in Cloud Computing

    PubMed Central

    Kang, Mikyung; Kang, Dong-In; Crago, Stephen P.; Park, Gyung-Leen; Lee, Junghoon

    2011-01-01

    Cloud computing is a new information technology trend that moves computing and data away from desktops and portable PCs into large data centers. The basic principle of cloud computing is to deliver applications as services over the Internet as well as infrastructure. A cloud is a type of parallel and distributed system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources. The large-scale distributed applications on a cloud require adaptive service-based software, which has the capability of monitoring system status changes, analyzing the monitored information, and adapting its service configuration while considering tradeoffs among multiple QoS features simultaneously. In this paper, we design and develop a Run-Time Monitor (RTM) which is a system software to monitor the application behavior at run-time, analyze the collected information, and optimize cloud computing resources for multi-core architectures. RTM monitors application software through library instrumentation as well as underlying hardware through a performance counter optimizing its computing configuration based on the analyzed data. PMID:22163811

  3. Design and development of a run-time monitor for multi-core architectures in cloud computing.

    PubMed

    Kang, Mikyung; Kang, Dong-In; Crago, Stephen P; Park, Gyung-Leen; Lee, Junghoon

    2011-01-01

    Cloud computing is a new information technology trend that moves computing and data away from desktops and portable PCs into large data centers. The basic principle of cloud computing is to deliver applications as services over the Internet as well as infrastructure. A cloud is a type of parallel and distributed system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources. The large-scale distributed applications on a cloud require adaptive service-based software, which has the capability of monitoring system status changes, analyzing the monitored information, and adapting its service configuration while considering tradeoffs among multiple QoS features simultaneously. In this paper, we design and develop a Run-Time Monitor (RTM) which is a system software to monitor the application behavior at run-time, analyze the collected information, and optimize cloud computing resources for multi-core architectures. RTM monitors application software through library instrumentation as well as underlying hardware through a performance counter optimizing its computing configuration based on the analyzed data.

  4. A domain-specific compiler for a parallel multiresolution adaptive numerical simulation environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rajbhandari, Samyam; Kim, Jinsung; Krishnamoorthy, Sriram

    This paper describes the design and implementation of a layered domain-specific compiler to support MADNESS---Multiresolution ADaptive Numerical Environment for Scientific Simulation. MADNESS is a high-level software environment for the solution of integral and differential equations in many dimensions, using adaptive and fast harmonic analysis methods with guaranteed precision. MADNESS uses k-d trees to represent spatial functions and implements operators like addition, multiplication, differentiation, and integration on the numerical representation of functions. The MADNESS runtime system provides global namespace support and a task-based execution model including futures. MADNESS is currently deployed on massively parallel supercomputers and has enabled many science advances.more » Due to the highly irregular and statically unpredictable structure of the k-d trees representing the spatial functions encountered in MADNESS applications, only purely runtime approaches to optimization have previously been implemented in the MADNESS framework. This paper describes a layered domain-specific compiler developed to address some performance bottlenecks in MADNESS. The newly developed static compile-time optimizations, in conjunction with the MADNESS runtime support, enable significant performance improvement for the MADNESS framework.« less

  5. Mentat/A: Medium grain parallel processing

    NASA Technical Reports Server (NTRS)

    Grimshaw, Andrew S.

    1992-01-01

    The objective of this project is to test the Algorithm to Architecture Mapping Model (ATAMM) firing rules using the Mentat run-time system and the Mentat Programming Language (MPL). A special version of Mentat, Mentat/A (Mentat/ATAMM) was constructed. This required changes to: (1) modify the run-time system to control queue length and inhibit actor firing until required data tokens are available and space is available in the input queues of all of the direct descendent actors; (2) disallow the specification of persistent object classes in the MPL; and (3) permit only decision free graphs in the MPL. We were successful in implementing the spirit of the plan, although some goals changed as we came to better understand the problem. We report on what we accomplished and the lessons we learned. The Mentat/A run-time system is discussed, and we briefly present the compiler. We present results for three applications and conclude with a summary and some observations. Appendix A contains a list of technical reports and published papers partially supported by the grant. Appendix B contains listings for the three applications.

  6. Optimization and Control of Cyber-Physical Vehicle Systems

    PubMed Central

    Bradley, Justin M.; Atkins, Ella M.

    2015-01-01

    A cyber-physical system (CPS) is composed of tightly-integrated computation, communication and physical elements. Medical devices, buildings, mobile devices, robots, transportation and energy systems can benefit from CPS co-design and optimization techniques. Cyber-physical vehicle systems (CPVSs) are rapidly advancing due to progress in real-time computing, control and artificial intelligence. Multidisciplinary or multi-objective design optimization maximizes CPS efficiency, capability and safety, while online regulation enables the vehicle to be responsive to disturbances, modeling errors and uncertainties. CPVS optimization occurs at design-time and at run-time. This paper surveys the run-time cooperative optimization or co-optimization of cyber and physical systems, which have historically been considered separately. A run-time CPVS is also cooperatively regulated or co-regulated when cyber and physical resources are utilized in a manner that is responsive to both cyber and physical system requirements. This paper surveys research that considers both cyber and physical resources in co-optimization and co-regulation schemes with applications to mobile robotic and vehicle systems. Time-varying sampling patterns, sensor scheduling, anytime control, feedback scheduling, task and motion planning and resource sharing are examined. PMID:26378541

  7. Optimization and Control of Cyber-Physical Vehicle Systems.

    PubMed

    Bradley, Justin M; Atkins, Ella M

    2015-09-11

    A cyber-physical system (CPS) is composed of tightly-integrated computation, communication and physical elements. Medical devices, buildings, mobile devices, robots, transportation and energy systems can benefit from CPS co-design and optimization techniques. Cyber-physical vehicle systems (CPVSs) are rapidly advancing due to progress in real-time computing, control and artificial intelligence. Multidisciplinary or multi-objective design optimization maximizes CPS efficiency, capability and safety, while online regulation enables the vehicle to be responsive to disturbances, modeling errors and uncertainties. CPVS optimization occurs at design-time and at run-time. This paper surveys the run-time cooperative optimization or co-optimization of cyber and physical systems, which have historically been considered separately. A run-time CPVS is also cooperatively regulated or co-regulated when cyber and physical resources are utilized in a manner that is responsive to both cyber and physical system requirements. This paper surveys research that considers both cyber and physical resources in co-optimization and co-regulation schemes with applications to mobile robotic and vehicle systems. Time-varying sampling patterns, sensor scheduling, anytime control, feedback scheduling, task and motion planning and resource sharing are examined.

  8. A Concept for Run-Time Support of the Chapel Language

    NASA Technical Reports Server (NTRS)

    James, Mark

    2006-01-01

    A document presents a concept for run-time implementation of other concepts embodied in the Chapel programming language. (Now undergoing development, Chapel is intended to become a standard language for parallel computing that would surpass older such languages in both computational performance in the efficiency with which pre-existing code can be reused and new code written.) The aforementioned other concepts are those of distributions, domains, allocations, and access, as defined in a separate document called "A Semantic Framework for Domains and Distributions in Chapel" and linked to a language specification defined in another separate document called "Chapel Specification 0.3." The concept presented in the instant report is recognition that a data domain that was invented for Chapel offers a novel approach to distributing and processing data in a massively parallel environment. The concept is offered as a starting point for development of working descriptions of functions and data structures that would be necessary to implement interfaces to a compiler for transforming the aforementioned other concepts from their representations in Chapel source code to their run-time implementations.

  9. Final Project Report. Scalable fault tolerance runtime technology for petascale computers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Krishnamoorthy, Sriram; Sadayappan, P

    With the massive number of components comprising the forthcoming petascale computer systems, hardware failures will be routinely encountered during execution of large-scale applications. Due to the multidisciplinary, multiresolution, and multiscale nature of scientific problems that drive the demand for high end systems, applications place increasingly differing demands on the system resources: disk, network, memory, and CPU. In addition to MPI, future applications are expected to use advanced programming models such as those developed under the DARPA HPCS program as well as existing global address space programming models such as Global Arrays, UPC, and Co-Array Fortran. While there has been amore » considerable amount of work in fault tolerant MPI with a number of strategies and extensions for fault tolerance proposed, virtually none of advanced models proposed for emerging petascale systems is currently fault aware. To achieve fault tolerance, development of underlying runtime and OS technologies able to scale to petascale level is needed. This project has evaluated range of runtime techniques for fault tolerance for advanced programming models.« less

  10. Power-constrained supercomputing

    NASA Astrophysics Data System (ADS)

    Bailey, Peter E.

    As we approach exascale systems, power is turning from an optimization goal to a critical operating constraint. With power bounds imposed by both stakeholders and the limitations of existing infrastructure, achieving practical exascale computing will therefore rely on optimizing performance subject to a power constraint. However, this requirement should not add to the burden of application developers; optimizing the runtime environment given restricted power will primarily be the job of high-performance system software. In this dissertation, we explore this area and develop new techniques that extract maximum performance subject to a particular power constraint. These techniques include a method to find theoretical optimal performance, a runtime system that shifts power in real time to improve performance, and a node-level prediction model for selecting power-efficient operating points. We use a linear programming (LP) formulation to optimize application schedules under various power constraints, where a schedule consists of a DVFS state and number of OpenMP threads for each section of computation between consecutive message passing events. We also provide a more flexible mixed integer-linear (ILP) formulation and show that the resulting schedules closely match schedules from the LP formulation. Across four applications, we use our LP-derived upper bounds to show that current approaches trail optimal, power-constrained performance by up to 41%. This demonstrates limitations of current systems, and our LP formulation provides future optimization approaches with a quantitative optimization target. We also introduce Conductor, a run-time system that intelligently distributes available power to nodes and cores to improve performance. The key techniques used are configuration space exploration and adaptive power balancing. Configuration exploration dynamically selects the optimal thread concurrency level and DVFS state subject to a hardware-enforced power bound. Adaptive power balancing efficiently predicts where critical paths are likely to occur and distributes power to those paths. Greater power, in turn, allows increased thread concurrency levels, CPU frequency/voltage, or both. We describe these techniques in detail and show that, compared to the state-of-the-art technique of using statically predetermined, per-node power caps, Conductor leads to a best-case performance improvement of up to 30%, and an average improvement of 19.1%. At the node level, an accurate power/performance model will aid in selecting the right configuration from a large set of available configurations. We present a novel approach to generate such a model offline using kernel clustering and multivariate linear regression. Our model requires only two iterations to select a configuration, which provides a significant advantage over exhaustive search-based strategies. We apply our model to predict power and performance for different applications using arbitrary configurations, and show that our model, when used with hardware frequency-limiting in a runtime system, selects configurations with significantly higher performance at a given power limit than those chosen by frequency-limiting alone. When applied to a set of 36 computational kernels from a range of applications, our model accurately predicts power and performance; our runtime system based on the model maintains 91% of optimal performance while meeting power constraints 88% of the time. When the runtime system violates a power constraint, it exceeds the constraint by only 6% in the average case, while simultaneously achieving 54% more performance than an oracle. Through the combination of the above contributions, we hope to provide guidance and inspiration to research practitioners working on runtime systems for power-constrained environments. We also hope this dissertation will draw attention to the need for software and runtime-controlled power management under power constraints at various levels, from the processor level to the cluster level.

  11. Assertive Behavior and Cognitive Performance in Preschool Children

    ERIC Educational Resources Information Center

    Dorman, Lynn

    1973-01-01

    Assertive behaviors were related to each other and to intelligence test scores. An item analysis revealed that more assertive children did better on certain intelligence test items: comprehension, verbal, and discrimination. (ST)

  12. Effects of music on assertive behavior during exercise by middle-school-age students.

    PubMed

    Mills, B D

    1996-10-01

    The purpose of this study was to assess the association of a particular style of music and assertive behavior in middle-school-aged students during exercise. Participants were students enrolled in a public middle school (Grades 6, 7, and 8, N = 502). A statistically significant relationship was found between the number of assertive behaviors occurring while listening to fast tempo music and grades and between difference scores and grades. Difference scores were obtained by subtracting the number of assertive behaviors occurring while listening to fast tempo music from those while listening to slow tempo music. Discriminant function analysis showed the number of assertive behaviors when listening to fast tempo music and difference scores were predictive of membership by grade. The higher the more assertive behaviors were emitted when listening to fast tempo music.

  13. Assertiveness and problem solving in midwives.

    PubMed

    Yurtsal, Zeliha Burcu; Özdemir, Levent

    2015-01-01

    Midwifery profession is required to bring solutions to problems and a midwife is expected to be an assertive person and to develop midwifery care. This study was planned to examine the relationship between assertiveness and problem-solving skills of midwives. This cross-sectional study was conducted with 201 midwives between July 2008 and February 2009 in the city center of Sivas. The Rathus Assertiveness Schedule (RAS) and Problem Solving Inventory (PSI) were used to determine the level of assertiveness and problem-solving skills of midwives. Statistical methods were used as mean, standard deviation, percentage, Student's T, ANOVA and Tukey HSD, Kruskal Wallis, Fisher Exact, Pearson Correlation and Chi-square tests and P < 0.05. The RAS mean scores and the PSI mean scores showed statistically significant differences in terms of a midwife's considering herself as a member of the health team, expressing herself within the health care team, being able to say "no" when necessary, cooperating with her colleagues, taking part in problem-solving skills training. A statistically significant negative correlation was found between the RAS and PSI scores. The RAS scores decreased while the problem-solving scores increased (r: -0451, P < 0.01). There were significant statistical differences between assertiveness levels and problem solving skills of midwives, and midwives who were assertive solved their problems better than did others. Assertiveness and problem-solving skills training will contribute to the success of the midwifery profession. Midwives able to solve problems, and display assertive behaviors will contribute to the development of midwifery profession.

  14. Is modified brief assertiveness training for nurses effective? A single-group study with long-term follow-up.

    PubMed

    Yoshinaga, Naoki; Nakamura, Yohei; Tanoue, Hiroki; MacLiam, Fionnula; Aoishi, Keiko; Shiraishi, Yuko

    2018-01-01

    To evaluate the long-term effectiveness of modified brief assertiveness training (with cognitive techniques) for nurses. Most assertiveness training takes a long time to conduct; thus, briefer training is required for universal on-the-job training in the workplace. In this single-group study, nurses received two 90-min training sessions with a 1-month interval between sessions. The degree of assertiveness was assessed by using the Rathus Assertiveness Schedule as the primary outcome, at four time points: pre- and post-training, 3-month follow-up and 6-month follow-up. A total of 33 nurses received the training, and the mean Rathus Assertiveness Schedule score improved from -14.2 (SD = 16.5) pre-training to -10.5 (SD = 18.0) post-training (p < .05). These improvements were maintained until the 6-month follow-up. The pre-post effect size of 0.22 (indicating small effect) was larger than the effect sizes ranging from -0.56 to 0.17 (no effect) reported in previous studies that used brief training. Modified brief assertiveness training seems feasible and may achieve long-term favourable outcomes in improving assertiveness among nurses. The ease of implementation of assertiveness training is important because creating an open environment for communication leads to improved job satisfaction, improved nursing care and increased patient safety. © 2017 The Authors. Journal of Nursing Management Published by John Wiley & Sons Ltd.

  15. [The effect of assertiveness training on communication related factors and personnel turnover rate among hospital nurses].

    PubMed

    Kang, Myung Ja; Lee, Haejung

    2006-08-01

    The purpose of this study was to investigate the effects of assertiveness training on nurses' assertive behaviors, interpersonal relations, communication conflicts, conflict management style and personnel turnover rate. A non-equivalent control group pretest-posttest design was used in this study. Nurses were assigned into the experimental or control groups, each consisting of 39 nurses. Data was collected between January to March 2004. An 'Assertiveness Training Program' for Nurses developed by Park was used for the study. To emphasize assertiveness practice, 5 practice sessions utilizing ABCDE principles were added to Park's program. To examine the effects of the program, differences between the two groups in assertive behaviors, interpersonal relations, communication conflicts, conflict management style and personnel turnover rate were analyzed using ANCOVA. The assertiveness training was effective in improving the nurses' assertiveness behaviors, but was not effective in improving interpersonal relations, reducing the subjects' communication conflicts, changing the conflict management style or reducing their personnel turnover rate. There have been many studies about factors affecting nurses' personnel turnover rates, but few have been done about methods of intervention to reduce the personnel turnover rate. Thus, this study provides a significant contribution in attempting such an intervention from nursing management perspectives.

  16. Children's responses to hypothetical provocation by peers: coordination of assertive and aggressive strategies.

    PubMed

    Dirks, Melanie A; Suor, Jennifer H; Rusch, Dana; Frazier, Stacy L

    2014-10-01

    Children often respond to aggression by peers with assertive bids or aggressive retaliation. Little is known, however, about whether and how children coordinate these strategies across different types of provocation. The present study examined endorsement of aggressive and assertive responses to hypothetical physical, relational, and verbal provocation in a sample of lower-income children (N = 402, M age = 10.21, SD = 1.46). Latent-profile analysis revealed 3-class models for both aggression and assertion, each reflecting low, moderate, and high levels of endorsement. There was no association between children's reported use of aggression and assertion. For example, children who endorsed high levels of aggression were equally likely to be classified as low, moderate, or high on assertive responding. For both assertion and aggression, parental ratings of children's externalizing behavior and social skills differed across the low and high groups. No such differences were found between the low and moderate groups, despite the latter groups endorsing markedly higher levels of assertive and aggressive responses. This pattern of findings may be due, in part, to the situation specificity of children's responding. Our findings hint at the complexity of children's behavioral repertoires and contribute to a growing literature that suggests the need for intervention models that consider both social skills and social situations.

  17. Evolving binary classifiers through parallel computation of multiple fitness cases.

    PubMed

    Cagnoni, Stefano; Bergenti, Federico; Mordonini, Monica; Adorni, Giovanni

    2005-06-01

    This paper describes two versions of a novel approach to developing binary classifiers, based on two evolutionary computation paradigms: cellular programming and genetic programming. Such an approach achieves high computation efficiency both during evolution and at runtime. Evolution speed is optimized by allowing multiple solutions to be computed in parallel. Runtime performance is optimized explicitly using parallel computation in the case of cellular programming or implicitly taking advantage of the intrinsic parallelism of bitwise operators on standard sequential architectures in the case of genetic programming. The approach was tested on a digit recognition problem and compared with a reference classifier.

  18. An Adaptive Cross-Architecture Combination Method for Graph Traversal

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    You, Yang; Song, Shuaiwen; Kerbyson, Darren J.

    2014-06-18

    Breadth-First Search (BFS) is widely used in many real-world applications including computational biology, social networks, and electronic design automation. The combination method, using both top-down and bottom-up techniques, is the most effective BFS approach. However, current combination methods rely on trial-and-error and exhaustive search to locate the optimal switching point, which may cause significant runtime overhead. To solve this problem, we design an adaptive method based on regression analysis to predict an optimal switching point for the combination method at runtime within less than 0.1% of the BFS execution time.

  19. Distributed memory compiler design for sparse problems

    NASA Technical Reports Server (NTRS)

    Wu, Janet; Saltz, Joel; Berryman, Harry; Hiranandani, Seema

    1991-01-01

    A compiler and runtime support mechanism is described and demonstrated. The methods presented are capable of solving a wide range of sparse and unstructured problems in scientific computing. The compiler takes as input a FORTRAN 77 program enhanced with specifications for distributing data, and the compiler outputs a message passing program that runs on a distributed memory computer. The runtime support for this compiler is a library of primitives designed to efficiently support irregular patterns of distributed array accesses and irregular distributed array partitions. A variety of Intel iPSC/860 performance results obtained through the use of this compiler are presented.

  20. Cross-cultural validity of the scale for interpersonal behavior.

    PubMed

    Nota, Laura; Arrindell, Willem A; Soresi, Salvatore; van der Ende, Jan; Sanavio, Ezio

    2011-01-01

    The Scale for Interpersonal Behavior (SIB) is a 50-item multidimensional measure of difficulty and distress in assertiveness. The SIB assesses negative assertion, expression of and dealing with personal limitations, initiating assertiveness and positive assertion. The SIB was originally developed in the Netherlands. The present study attempted to replicate the original factors with an Italian student sample (n = 995). The four distress and four performance factors were replicable across two methods of analysis (the multiple group method of confirmatory analysis and Tucker's coefficient of congruence (phi). The corresponding scales were internally consistent and showed predicted patterns of correlations with a measure of self-efficacy. Sex and age differences in assertiveness were generally negligible. Italian students had higher positive assertion-performance scores than the Dutch and comparable scores on other performance scales; by contrast, the Italian subjects had significantly higher scores on all SIB distress scales than their Dutch equivalents. This was ascribed to the stronger pressure on people in Italian society to behave assertively (Hofstede's National Masculinity score = 70) as opposed to the Dutch society (National Masculinity score = 14).

  1. Assessment of MLA assertiveness training for librarians: students' behavior changes after taking C.E. 669, Assertiveness and Human Relations Skills.

    PubMed Central

    Caputo, J S

    1985-01-01

    C.E. 669, offered for three years, was MLA's first personal development continuing education course. Participants were asked to respond to a follow-up survey about their current assertive philosophy, awareness, and behavioral repertoire. They were also assessed by the Librarian's Assertiveness Inventory, a tool that indicates patterns of behavioral responses, for which some normative data were available from librarians who had not taken the class. Class participants were found to be more likely to behave assertively and less likely to behave aggressively than librarians who had not taken the class. In nine out of ten situational categories, librarians who had taken the class demonstrated assertive response patterns. They also reported remembering and using more than one third of the behavioral techniques covered in class, with particular use of the nonverbal techniques. A majority saw themselves as more assertive since taking the class, although most believed that others viewed them much the same as they had prior to the class. Positive progress toward reaching specific behavioral goals was also reported. PMID:4052676

  2. RADICALLY CONTESTED ASSERTIONS IN ECOSYSTEM MANAGEMENT

    EPA Science Inventory

    Ecosystem management is a magnet for controversy, in part because some of its formulations rest on questionable assertions that are radically contested. These assertions are important to understanding much of the conflict surrounding ecosystem management and, therrefore, deserve...

  3. Validity of a Measure of Assertiveness

    ERIC Educational Resources Information Center

    Galassi, John P.; Galassi, Merna D.

    1974-01-01

    This study was concerned with further validation of a measure of assertiveness. Concurrent validity was established for the College Self-Expression Scale using the method of contrasted groups and through correlations of self-and judges' ratings of assertiveness. (Author)

  4. Assertiveness Training and Christian Values.

    ERIC Educational Resources Information Center

    Bolsinger, Scot A.; McMinn, Mark R.

    1989-01-01

    Studies exploring the relationship between religious values and assertiveness are reviewed. Ideological obstacles in assertion training with religious clients are considered, and appropriate therapeutic strategies suggested. Emphasizes importance of presenting rationale for treatment and understanding client's value system. (Author/TE)

  5. Assertiveness and problem solving in midwives

    PubMed Central

    Yurtsal, Zeliha Burcu; Özdemir, Levent

    2015-01-01

    Background: Midwifery profession is required to bring solutions to problems and a midwife is expected to be an assertive person and to develop midwifery care. This study was planned to examine the relationship between assertiveness and problem-solving skills of midwives. Materials and Methods: This cross-sectional study was conducted with 201 midwives between July 2008 and February 2009 in the city center of Sivas. The Rathus Assertiveness Schedule (RAS) and Problem Solving Inventory (PSI) were used to determine the level of assertiveness and problem-solving skills of midwives. Statistical methods were used as mean, standard deviation, percentage, Student's T, ANOVA and Tukey HSD, Kruskal Wallis, Fisher Exact, Pearson Correlation and Chi-square tests and P < 0.05. Results: The RAS mean scores and the PSI mean scores showed statistically significant differences in terms of a midwife's considering herself as a member of the health team, expressing herself within the health care team, being able to say “no” when necessary, cooperating with her colleagues, taking part in problem-solving skills training. A statistically significant negative correlation was found between the RAS and PSI scores. The RAS scores decreased while the problem-solving scores increased (r: -0451, P < 0.01). Conclusions: There were significant statistical differences between assertiveness levels and problem solving skills of midwives, and midwives who were assertive solved their problems better than did others. Assertiveness and problem-solving skills training will contribute to the success of the midwifery profession. Midwives able to solve problems, and display assertive behaviors will contribute to the development of midwifery profession. PMID:26793247

  6. Observed assertive and intrusive maternal feeding behaviors increase child adiposity123

    PubMed Central

    Ozbeki, Tina N; Appugliese, Danielle P; Kaciroti, Niko; Corwyn, Robert F; Bradley, Robert H

    2012-01-01

    Background: Few studies have examined observed maternal feeding behaviors and their potential association with child adiposity. The association between maternal prompting to eat and child adiposity has been inconsistent. Objectives: This study sought to identify factors associated with maternal feeding behaviors and to test the hypothesis that more maternal prompts to eat, more assertive prompts, and more intrusiveness are associated with greater child adiposity. Design: Children (n = 1218) and their mothers were videotaped eating a standardized snack at ages 15, 24, and 36 mo. Maternal prompts to eat, the percentage of prompts that were assertive, and intrusiveness were coded. Adjusted regression analyses evaluated predictors of prompts, the percentage of assertive prompts, and intrusiveness and the relation of each of these factors with child adiposity (weight-for-length z score at 15 mo and BMI z score at 24 and 36 mo) after control for the child's race-ethnicity and sex, family income-to-needs ratio, and maternal education, weight status, and depressive symptoms. Results: At 36 mo, mothers gave an average of 9.3 prompts; 61% of prompts were assertive, and 48% of mothers were intrusive. Lower maternal education and minority race-ethnicity were associated with a greater percentage of assertive prompts and intrusiveness. A greater percentage of assertive prompts and intrusiveness, but not total prompts, was associated with higher child adiposity. Conclusions: Assertive prompting and an intrusive style had small but significant associations with greater child adiposity. Future work should focus on maternal motivations for assertive and intrusive feeding styles and mechanisms through which these feeding styles might increase child adiposity. PMID:22277552

  7. The Level of Depression and Assertiveness among Nursing Students.

    PubMed

    Rezayat, Fatemeh; Dehghan Nayeri, Nahid

    2014-07-01

    Nursing students are susceptible to a higher risk of depression. Recognition of depression, assertiveness and the relationship between them is important since if a relationship exists, probably enhancing the level of assertiveness can reduce depression in this high risk group. We aimed to investigate depression and assertiveness levels and the relationship between them in nursing students of Tehran University of Medical Sciences. The target population of this cross-sectional study was bachelor nursing students of Tehran University of Medical Sciences, as the largest and one of the most prestigious Iranian universities. For selecting samples, the convenience sampling method was used. Having no previous information about classes, the researcher selected the students from the courses held while the researcher was present for sampling at the faculty and studied all the students willing to participate in the study in selected classes. The questionnaire consisted of demographic information, Gambrill and Richey assertion inventory, and Beck's depression inventory. SPSS software, version 16, was used to analyze the data. ANOVA and independent samples t test were used for as appropriated. 55.6% of students indicated average and low levels of assertiveness and 38.7% were suffering from mild to severe depression. Pearson correlation test showed a significant inverse relationship (r=0.314 and P<0.001) between assertiveness and depression. There were significant relationships between depression and interest in the field of study (P=0.001) and between assertiveness and gender (P=0.035). There was an inverse significant relationship between depression and assertiveness among nursing students. We suggest a cohort study design that can determine the effect of these variables on each other completely.

  8. Effect of assertiveness training on levels of stress and assertiveness experienced by nurses in Taiwan, Republic of China.

    PubMed

    Lee, S; Crockett, M S

    1994-01-01

    The purpose of the study was to examine the effectiveness of assertiveness training in improving self-perceived levels of stress and assertiveness among nurses in Taiwan, Republic of China. The two-group experimental design was conducted in a 2,000-bed veteran general hospital. A sample of 60 volunteer Chinese-speaking nurses participated in the study. Subjects were randomly assigned to one of two treatments: assertiveness training (AT) or alternate treatment control (ATC), which served as a control and contained updated knowledge of new computer technology for in patient settings. Subjects in each group participated in six 2-hour workshops in the same two-week period. All subjects were pre-, post-, and follow-up posttested for stress and assertiveness with the Perceived Stress Scale (PSS) and Rathus Assertiveness Schedule (RAS), respectively. Results revealed the following: (1) subjects in both groups of pretest were clearly subassertive and under considerable stress; (2) by the end of training, the AT group scored significantly higher on the rating of assertiveness than those in the ATC group, and had successfully maintained their improvement by the 4-week follow-up; and (3) by the end of training, the AT group reported significantly lower levels of stress than the ATC group as indicated on the PSS, and successfully maintained their improvements at the 4-week follow-up. Overall, the results indicate clear support for the effectiveness of assertiveness training for treating subassertive behaviors and stress in a population of professional nurses in Taiwan.

  9. Sex Differences in Assertiveness in College Students

    ERIC Educational Resources Information Center

    Stebbins, Charles; And Others

    1977-01-01

    Validates the "College Self-Expression Scale." Shows that females are significantly more assertive, and that in one of the criterion situations each sex was significantly more assertive toward members of the same sex than members of the opposite sex. (RL)

  10. The effectiveness of assertiveness communication training programs for healthcare professionals and students: A systematic review.

    PubMed

    Omura, Mieko; Maguire, Jane; Levett-Jones, Tracy; Stone, Teresa Elizabeth

    2017-11-01

    Communication errors have a negative impact on patient safety. It is therefore essential that healthcare professionals have the skills and confidence to speak up assertively when patient safety is at risk. Although the facilitators to and barriers of assertive communication have been the subject of previous reviews, evidence regarding the effectiveness of interventions designed to enhance assertive communication is lacking. Thus, this paper reports the findings from a systematic review of the effectiveness of assertiveness communication training programs for healthcare professionals and students. The objective of this review is to identify, appraise and synthesise the best available quantitative evidence in relation to the effectiveness of assertiveness communication training programs for healthcare professionals and students on levels of assertiveness, communication competence and impact on clinicians' behaviours and patient safety. The databases included: CINAHL, Cochrane library, EMBASE, Informit health collection, MEDLINE, ProQuest nursing and allied health, PsycINFO, Scopus and Web of Science. The search for unpublished studies included: MedNar, ProQuest Dissertations & Theses A&I. Studies published in English from 2001 until 2016 inclusive were considered. The review included original quantitative research that evaluated (a) any type of independent assertiveness communication training program; and (b) programs with assertiveness training included as a core component of team skills or communication training for healthcare professionals and students, regardless of healthcare setting and level of qualification of participants. Studies selected based on eligibility criteria were assessed for methodological quality and the data were extracted by two independent researchers using the Joanna Briggs Institute critical appraisal and data extraction tools. Eleven papers were critically appraised using the Joanna Briggs Institute critical appraisal checklists. Eight papers from the USA, Australia, Ireland, and Taiwan were included in the review. Interventions to improve assertive communication were reported to be effective to some degree with all targeted groups except experienced anaesthesiologists. Face-to-face and multimethod programs, support from leaders, teamwork skills training and communication techniques adapted from the aviation industry were identified as appropriate approaches for optimising the effectiveness of assertiveness communication training programs. Behavioural change as the result of assertiveness interventions was evaluated by observer-based rating scales during simulation, whilst self-perceived knowledge and attitudes were evaluated using validated scales. Future research should consider evaluation of sustained effect on behaviour change and patient safety. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Development of a flight software testing methodology

    NASA Technical Reports Server (NTRS)

    Mccluskey, E. J.; Andrews, D. M.

    1985-01-01

    The research to develop a testing methodology for flight software is described. An experiment was conducted in using assertions to dynamically test digital flight control software. The experiment showed that 87% of typical errors introduced into the program would be detected by assertions. Detailed analysis of the test data showed that the number of assertions needed to detect those errors could be reduced to a minimal set. The analysis also revealed that the most effective assertions tested program parameters that provided greater indirect (collateral) testing of other parameters. In addition, a prototype watchdog task system was built to evaluate the effectiveness of executing assertions in parallel by using the multitasking features of Ada.

  12. A diagnostic interface for the ICOsahedral Non-hydrostatic (ICON) modelling framework based on the Modular Earth Submodel System (MESSy v2.50)

    NASA Astrophysics Data System (ADS)

    Kern, Bastian; Jöckel, Patrick

    2016-10-01

    Numerical climate and weather models have advanced to finer scales, accompanied by large amounts of output data. The model systems hit the input and output (I/O) bottleneck of modern high-performance computing (HPC) systems. We aim to apply diagnostic methods online during the model simulation instead of applying them as a post-processing step to written output data, to reduce the amount of I/O. To include diagnostic tools into the model system, we implemented a standardised, easy-to-use interface based on the Modular Earth Submodel System (MESSy) into the ICOsahedral Non-hydrostatic (ICON) modelling framework. The integration of the diagnostic interface into the model system is briefly described. Furthermore, we present a prototype implementation of an advanced online diagnostic tool for the aggregation of model data onto a user-defined regular coarse grid. This diagnostic tool will be used to reduce the amount of model output in future simulations. Performance tests of the interface and of two different diagnostic tools show, that the interface itself introduces no overhead in form of additional runtime to the model system. The diagnostic tools, however, have significant impact on the model system's runtime. This overhead strongly depends on the characteristics and implementation of the diagnostic tool. A diagnostic tool with high inter-process communication introduces large overhead, whereas the additional runtime of a diagnostic tool without inter-process communication is low. We briefly describe our efforts to reduce the additional runtime from the diagnostic tools, and present a brief analysis of memory consumption. Future work will focus on optimisation of the memory footprint and the I/O operations of the diagnostic interface.

  13. Impact of backwashing procedures on deep bed filtration productivity in drinking water treatment.

    PubMed

    Slavik, Irene; Jehmlich, Alexander; Uhl, Wolfgang

    2013-10-15

    Backwash procedures for deep bed filters were evaluated and compared by means of a new integrated approach based on productivity. For this, different backwash procedures were experimentally evaluated by using a pilot plant for direct filtration. A standard backwash mode as applied in practice served as a reference and effluent turbidity was used as the criterion for filter run termination. The backwash water volumes needed, duration of the filter-to-waste period, time out of operation, total volume discharged and filter run-time were determined and used to calculate average filtration velocity and average productivity. Results for filter run-times, filter backwash volumes, and filter-to-waste volumes showed considerable differences between the backwash procedures. Thus, backwash procedures with additional clear flushing phases were characterised by an increased need for backwash water. However, this additional water consumption could not be compensated by savings during filter ripening. Compared to the reference backwash procedure, filter run-times were longer for both single-media and dual-media filters when air scour and air/water flush were optimised with respect to flow rates and the proportion of air and water. This means that drinking water production time is longer and less water is needed for filter bed cleaning. Also, backwashing with additional clear flushing phases resulted in longer filter run-times before turbidity breakthrough. However, regarding the productivity of the filtration process, it was shown that it was almost the same for all of the backwash procedures investigated in this study. Due to this unexpected finding, the relationships between filter bed cleaning, filter ripening and filtration performance were considered and important conclusions and new approaches for process optimisation and resource savings were derived. Copyright © 2013 Elsevier Ltd. All rights reserved.

  14. Active Storage with Analytics Capabilities and I/O Runtime System for Petascale Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Choudhary, Alok

    Computational scientists must understand results from experimental, observational and computational simulation generated data to gain insights and perform knowledge discovery. As systems approach the petascale range, problems that were unimaginable a few years ago are within reach. With the increasing volume and complexity of data produced by ultra-scale simulations and high-throughput experiments, understanding the science is largely hampered by the lack of comprehensive I/O, storage, acceleration of data manipulation, analysis, and mining tools. Scientists require techniques, tools and infrastructure to facilitate better understanding of their data, in particular the ability to effectively perform complex data analysis, statistical analysis and knowledgemore » discovery. The goal of this work is to enable more effective analysis of scientific datasets through the integration of enhancements in the I/O stack, from active storage support at the file system layer to MPI-IO and high-level I/O library layers. We propose to provide software components to accelerate data analytics, mining, I/O, and knowledge discovery for large-scale scientific applications, thereby increasing productivity of both scientists and the systems. Our approaches include 1) design the interfaces in high-level I/O libraries, such as parallel netCDF, for applications to activate data mining operations at the lower I/O layers; 2) Enhance MPI-IO runtime systems to incorporate the functionality developed as a part of the runtime system design; 3) Develop parallel data mining programs as part of runtime library for server-side file system in PVFS file system; and 4) Prototype an active storage cluster, which will utilize multicore CPUs, GPUs, and FPGAs to carry out the data mining workload.« less

  15. Data Automata in Scala

    NASA Technical Reports Server (NTRS)

    Havelund, Klaus

    2014-01-01

    The field of runtime verification has during the last decade seen a multitude of systems for monitoring event sequences (traces) emitted by a running system. The objective is to ensure correctness of a system by checking its execution traces against formal specifications representing requirements. A special challenge is data parameterized events, where monitors have to keep track of the combination of control states as well as data constraints, relating events and the data they carry across time points. This poses a challenge wrt. efficiency of monitors, as well as expressiveness of logics. Data automata is a form of automata where states are parameterized with data, supporting monitoring of data parameterized events. We describe the full details of a very simple API in the Scala programming language, an internal DSL (Domain-Specific Language), implementing data automata. The small implementation suggests a design pattern. Data automata allow transition conditions to refer to other states than the source state, and allow target states of transitions to be inlined, offering a temporal logic flavored notation. An embedding of a logic in a high-level language like Scala in addition allows monitors to be programmed using all of Scala's language constructs, offering the full flexibility of a programming language. The framework is demonstrated on an XML processing scenario previously addressed in related work.

  16. Experimental Evaluation of Verification and Validation Tools on Martian Rover Software

    NASA Technical Reports Server (NTRS)

    Brat, Guillaume; Giannakopoulou, Dimitra; Goldberg, Allen; Havelund, Klaus; Lowry, Mike; Pasareani, Corina; Venet, Arnaud; Visser, Willem; Washington, Rich

    2003-01-01

    We report on a study to determine the maturity of different verification and validation technologies (V&V) on a representative example of NASA flight software. The study consisted of a controlled experiment where three technologies (static analysis, runtime analysis and model checking) were compared to traditional testing with respect to their ability to find seeded errors in a prototype Mars Rover. What makes this study unique is that it is the first (to the best of our knowledge) to do a controlled experiment to compare formal methods based tools to testing on a realistic industrial-size example where the emphasis was on collecting as much data on the performance of the tools and the participants as possible. The paper includes a description of the Rover code that was analyzed, the tools used as well as a detailed description of the experimental setup and the results. Due to the complexity of setting up the experiment, our results can not be generalized, but we believe it can still serve as a valuable point of reference for future studies of this kind. It did confirm the belief we had that advanced tools can outperform testing when trying to locate concurrency errors. Furthermore the results of the experiment inspired a novel framework for testing the next generation of the Rover.

  17. The effectiveness of assertiveness training for school-aged children on bullying and assertiveness level.

    PubMed

    Avşar, Fatma; Ayaz Alkaya, Sultan

    The aim of this study was to determine the effectiveness of an assertive training for school-aged children on peer bullying and assertiveness. A quasi-experimental design using pre- and post-testing was conducted. Data were collected using a demographic questionnaire, an assertiveness scale, and the peer victimization scale. The training program was comprised of eight sessions which were implemented to intervention group. Descriptive characteristics were not statistically different between the groups (p>0.05). The peer victimization victim dimension results show that post-test mean scores of the students in the intervention group were lower than the pre-test mean scores (p<0.05). For the control group, no significant change was found in the pre-test and post-test mean scores (p>0.05). A comparison of the mean pre-test/post-test scores of peer-victimization bully dimension of the students' intervention and control groups revealed that the mean post-test scores of the students in the each group decreased (p>0.05). An assertiveness training program increased the assertiveness level and reduced the state of being victims, but did not affect the state of being bullies. The results of this study can help children acquire assertive behaviors instead of negative behaviors such as aggression and shyness, and help them to build effective social communication. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. [Psychosocial functioning in non-psychiatric acute and chronic inpatients: depression, alexithymia and lack of assertiveness].

    PubMed

    Arancibia, Marcelo; Behar, Rosa; Marín, Sofía; Inzunza, Nicolás; Madrid, Eva

    2016-11-01

    Depression, alexithymia, and lack of assertiveness interfere with individual psychosocial functioning and may result in longer hospitalization stay and poorer therapeutic results. To analyze the psychosocial functioning in acute and chronic patients and its association with psychological, clinical and sociodemographic variables. We performed a cross-sectional study that included 80 inpatients of both sexes with organic pathology, aged between 18 to 70 years old, without any current psychiatric disorder. Clinical and sociodemographic data were collected from a semi-structured interview and hospital records. Beck Depression Inventory-IA, Toronto Alexithymia Scale-20 and Rathus Assertiveness Scale were administered. Fifty five percent of patients had some degree of depression, 33% alexithymia and 34% lack of assertiveness. The levels of depression, alexithymia and lack of assertiveness in chronic patients were significantly higher than those observed in acute patients. Women and participants older than 60 years exhibited the highest degrees of depression. Alexithymia and lack of assertiveness were associated with a lower educational level. A negative significant correlation between alexithymia and assertiveness scores was observed among acute patients. Participants with chronic diseases had a lower psychosocial functioning. Less educated patients showed more alexithymic and less assertive features. We emphasized the need of a better management of these aspects by the health team, since social functioning might interfere with the outcome of physical illnesses.

  19. Spectroscopy of exotic hadrons formed from dynamical diquarks

    NASA Astrophysics Data System (ADS)

    Lebed, Richard F.

    2017-12-01

    The dynamical diquark picture asserts that exotic hadrons can be formed from widely separated colored diquark or triquark components. We use the Born-Oppenheimer (BO) approximation to study the spectrum of states thus constructed, both in the basis of diquark spins and in the basis of heavy quark-antiquark spins. We develop a compact notation for naming these states, and use the results of lattice simulations for hybrid mesons to predict the lowest expected BO potentials for both tetraquarks and pentaquarks. We then compare to the set of exotic candidates with experimentally determined quantum numbers, and find that all of them can be accommodated. Once decay modes are also considered, one can develop selection rules of both exact (JP C conservation) and approximate (within the context of the BO approximation) types and test their effectiveness. We find that the most appealing way to satisfy both sets of selection rules requires including additional low-lying BO potentials, a hypothesis that can be checked on the lattice.

  20. Construal level as a moderator of the role of affective and cognitive attitudes in the prediction of health-risk behavioural intentions.

    PubMed

    Carrera, Pilar; Caballero, Amparo; Muñoz, Dolores; González-Iraizoz, Marta; Fernández, Itziar

    2014-12-01

    In two preliminary control checks it was shown that affective attitudes presented greater abstraction than cognitive attitudes. Three further studies explored how construal level moderated the role of affective and cognitive attitudes in predicting one health-promoting behaviour (exercising) and two risk behaviours (sleep debt and binge drinking). There was a stronger influence of affective attitudes both when participants were in abstract (vs. concrete) mindsets induced by a priming task in Studies 1a and 1b, and when behavioural intentions were formed for the distant (vs. near) future in Study 2. In the case of concrete mindsets, the results were inconclusive; the interaction between construal level and cognitive attitudes was only marginally significant in Study 1b. The present research supports the assertion that in abstract mindsets (vs. concrete mindsets) people use more affective attitudes to construe their behavioural intentions. Practical implications for health promotion are discussed in the framework of construal-level theory. © 2014 The British Psychological Society.

  1. Interpreting Abstract Interpretations in Membership Equational Logic

    NASA Technical Reports Server (NTRS)

    Fischer, Bernd; Rosu, Grigore

    2001-01-01

    We present a logical framework in which abstract interpretations can be naturally specified and then verified. Our approach is based on membership equational logic which extends equational logics by membership axioms, asserting that a term has a certain sort. We represent an abstract interpretation as a membership equational logic specification, usually as an overloaded order-sorted signature with membership axioms. It turns out that, for any term, its least sort over this specification corresponds to its most concrete abstract value. Maude implements membership equational logic and provides mechanisms to calculate the least sort of a term efficiently. We first show how Maude can be used to get prototyping of abstract interpretations "for free." Building on the meta-logic facilities of Maude, we further develop a tool that automatically checks and abstract interpretation against a set of user-defined properties. This can be used to select an appropriate abstract interpretation, to characterize the specified loss of information during abstraction, and to compare different abstractions with each other.

  2. Exploring Japanese nurses' perceptions of the relevance and use of assertive communication in healthcare: A qualitative study informed by the Theory of Planned Behaviour.

    PubMed

    Omura, Mieko; Stone, Teresa E; Maguire, Jane; Levett-Jones, Tracy

    2018-08-01

    The hierarchical nature of healthcare environments presents a key risk factor for effective interprofessional communication. Power differentials evident in traditional healthcare cultures can make it difficult for healthcare professionals to raise concerns and be assertive when they have concerns about patient safety. This issue is of particular concern in Japan where inherent cultural and social norms discourage assertive communication. The aim of this study was to (a) explore nurses' perceptions of the relevance and use of assertive communication in Japanese healthcare environments; and (b) identify the factors that facilitate or impede assertive communication by Japanese nurses. A belief elicitation qualitative study informed by the Theory of Planned Behaviour was conducted and reported according to the COnsolidated criteria for REporting Qualitative research. Twenty-three practicing Japanese registered nurses were recruited by snowball sampling from October 2016 to January 2017. Individual face-to-face semi-structured interviews were conducted and transcribed in Japanese and then translated into English. Two researchers independently conducted a directed content analysis informed by the Theory of Planned Behaviour. Participants' responses were labelled in order of frequency for behavioural beliefs about the consequences of assertive communication, sources of social pressure, and factors that facilitate or impede assertive communication in Japanese healthcare environments. Although person-centred care and patient advocacy were core values for many of the participants, strict hierarchies, age-based seniority, and concerns about offending a colleague or causing team disharmony impeded their use of assertive communication. Novice nurses were particularly reluctant to speak up because of their perception of having limited knowledge and experience. This study identified Japanese nurses' behavioural, normative, and control beliefs in relation to assertive communication. The findings will be used to inform the development of a culturally appropriate assertiveness communication training program for Japanese nurses and nursing students. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. [Basic science and applied science].

    PubMed

    Pérez-Tamayo, R

    2001-01-01

    A lecture was presented by the author at the Democratic Opinion Forum on Health Teaching and Research, organized by Mexico's National Health Institutes Coordinating Office, at National Cardiology Institute "Ignacio Chavez", where he presented a critical review of the conventional classification of basic and applied science, as well as his personal view on health science teaching and research. According to the author, "well-conducted science" is that "generating reality-checked knowledge" and "mis-conducted science" is that "unproductive or producing 'just lies' and 'non-fundable'. To support his views, the author reviews utilitarian and pejorative definitions of science, as well as those of committed and pure science, useful and useless science, and practical and esoterical science, as synonyms of applied and basic science. He also asserts that, in Mexico, "this classification has been used in the past to justify federal funding cutbacks to basic science, allegedly because it is not targeted at solving 'national problems' or because it was not relevant to priorities set in a given six-year political administration period". Regarding health education and research, the author asserts that the current academic programs are inefficient and ineffective; his proposal to tackle these problems is to carry out a solid scientific study, conducted by a multidisciplinary team of experts, "to design the scientific researcher curricula from recruitment of intelligent young people to retirement or death". Performance assessment of researchers would not be restricted to publication of papers, since "the quality of scientific work and contribution to the development of science is not reflected by the number of published papers". The English version of this paper is available at: http://www.insp.mx/salud/index.html

  4. The professional socialization of collegiate female athletic trainers: navigating experiences of gender bias.

    PubMed

    Mazerolle, Stephanie M; Borland, John F; Burton, Laura J

    2012-01-01

    Female athletic trainers (ATs) experience gender discrimination in the workplace due to stereotypical gender roles, but limited information is available regarding the topic. To understand the challenges and obstacles faced by young female ATs working in National Collegiate Athletic Association Division I athletics. Exploratory study using semistructured interviews. Division I clinical setting. A total of 14 female ATs were included in the study, using both criterion and snowball-sampling techniques. Their mean age was 27 ± 2 years, with 5 ± 2 years of overall clinical experience. Criteria included employment at the Division I clinical setting, being a full-time assistant AT, and at least 3 years of working experience but no more than 9 years to avoid role continuance. Analysis of the interview data followed inductive procedures as outlined by a grounded theory approach. Credibility was established by member checks, multiple-analyst triangulation, and peer review. Clear communication with both coaches and players about expectations and philosophies regarding medical care, a supportive head AT in terms of clinical competence, and having and serving as a role model were cited as critical tools to alleviate gender bias in the workplace. The female ATs in this study stressed the importance of being assertive with coaches early in the season with regard to the AT's role on the team. They reasoned that these actions brought forth a greater perception of congruity between their roles as ATs and their gender and age. We suggest that female athletic training students seek mentors in their field while they complete their coursework and practicums. The ATs in the current study indicated that a mentor, regardless of sex, helped them feel empowered to navigate the male-centric terrain of athletic departments by encouraging them to be assertive and not second-guess their decisions.

  5. [Development and Effects of Assertiveness Training applying Dongsasub Training for Nursing Students in Clinical Practice].

    PubMed

    Kim, Myoungsuk

    2016-08-01

    This study was conducted to develop assertiveness training applying Dongsasub training for junior nursing students, and to verify effectiveness of the training on assertiveness behavior, self-esteem, clinical practice stress, and clinical competence. The study design was a non-equivalent control group non-synchronized design. Participants were 63 nursing students in clinical training (31 students in the experimental group and 32 students in the control group). The assertiveness training applying Dongsasub training consisted of four sessions. Outcome variables included assertiveness behavior, self-esteem, clinical practice stress, and clinical competence. Data were analyzed using Chi-square, Fisher's exact test and independent samples t-test with SPSS/WIN 21.0. Scores of assertiveness behavior (t=-2.49, p=.015), self-esteem (t=-4.80, p<.001) and clinical competence (t=-2.33, p=.023) were significantly higher and clinical practice stress (t=4.22, p<.001) was significantly lower in the experimental group compared to the control group. Results indicate that the assertiveness training applying Dongsasub training can be used as a nursing intervention to lower clinical practice stress and improve the clinical competence of nursing students.

  6. Smokers’ compliance with smoke-free policies, and non-smokers’ assertiveness for smoke-free air in the workplace: a study from the Balkans.

    PubMed

    Lazuras, Lambros; Zlatev, Martin; Rodafinos, Angelos; Eiser, J Richard

    2012-10-01

    Identify the psychosocial variables that predict smokers’ compliance with smoke-free policies at work, and non-smokers’ assertiveness for smoke-free rights in Greek and Bulgarian workplaces. Data were collected from employees in Greece and Bulgaria. The main outcome measures were smokers’ compliance with smoke-free policies, and non-smokers’ assertiveness intentions. Demographic variables, tobacco use and dependence, as well as beliefs about second-hand smoke (SHS) exposure and smoking at work were also assessed. Regression analyses showed that smokers’ compliance with smoke-free policies was predicted by age, perceived health risks of smoking, and beliefs related to the benefits of smoking at work. Non-smokers’ assertiveness was predicted by annoyance from exposure to SHS at work, and assertiveness-related social cognitions (e.g., attitudes, social norms, and self-efficacy). Interventions to promote support for tobacco control policies at work in Greece and Bulgaria may benefit from targeting smokers’ beliefs about the actual effects of tobacco use on health and job performance. Accordingly, efforts to promote non-smokers assertiveness should build stronger assertiveness-related attitudes, convey anti-smoking normative messages, and strengthen self-efficacy skills.

  7. The Level of Depression and Assertiveness among Nursing Students

    PubMed Central

    Rezayat, Fatemeh; Dehghan Nayeri, Nahid

    2014-01-01

    Background: Nursing students are susceptible to a higher risk of depression. Recognition of depression, assertiveness and the relationship between them is important since if a relationship exists, probably enhancing the level of assertiveness can reduce depression in this high risk group. We aimed to investigate depression and assertiveness levels and the relationship between them in nursing students of Tehran University of Medical Sciences. Methods: The target population of this cross-sectional study was bachelor nursing students of Tehran University of Medical Sciences, as the largest and one of the most prestigious Iranian universities. For selecting samples, the convenience sampling method was used. Having no previous information about classes, the researcher selected the students from the courses held while the researcher was present for sampling at the faculty and studied all the students willing to participate in the study in selected classes. The questionnaire consisted of demographic information, Gambrill and Richey assertion inventory, and Beck’s depression inventory. SPSS software, version 16, was used to analyze the data. ANOVA and independent samples t test were used for as appropriated. Results: 55.6% of students indicated average and low levels of assertiveness and 38.7% were suffering from mild to severe depression. Pearson correlation test showed a significant inverse relationship (r=0.314 and P<0.001) between assertiveness and depression. There were significant relationships between depression and interest in the field of study (P=0.001) and between assertiveness and gender (P=0.035). Conclusion: There was an inverse significant relationship between depression and assertiveness among nursing students. We suggest a cohort study design that can determine the effect of these variables on each other completely. PMID:25349860

  8. The Relationship Between Cultural Sensitivity and Assertiveness in Nursing Students from Turkey.

    PubMed

    Kılıç, Serap Parlar; Sevinç, Sibel

    2018-07-01

    As foreigners live in and visit Turkey for various reasons, it is essential to provide culturally appropriate health care. This study was conducted to determine the relationship between cultural sensitivity and assertiveness in university nursing students. This descriptive, cross-sectional study was conducted at two universities in the cities of Kilis and Elazığ, Turkey. The study sample consisted of 444 nursing students. Data collection tools included a questionnaire about participant sociodemographic characteristics, Chen and Starosta's Intercultural Sensitivity Scale, and the Rathus Assertiveness Scale. The mean age of participants was 21.09 years. Most students (71.6%) were female and 34.7% of the students stayed at the hostel. Of the students, 44.4%, 27.5%, and 28.2% attended were the second-, third-, and fourth-year students, respectively. Participants were asked about problems related to caring for patients who speak different languages. The mean score for the Intercultural Sensitivity Scale was 89.42 ± 13.55 and the total score for all students for the Assertiveness Scale was 112.64 ± 15.61. We identified a positive relationship between total scores for the Intercultural Sensitivity Scale and the Assertiveness Scale ( p < .001). There was relationship between cultural sensitivity and gender and want to work overseas; assertiveness and year of nursing education and want to work overseas. Nursing students at both schools had a moderate level of cultural sensitivity and assertiveness. It has been determined that as assertiveness level of the students increased, intercultural sensitivity of them also increased. Consequently, it is concluded that training as assertive and self-confident individuals during the nursing education of students has a contribution to making patient-specific and culture-sensitive care.

  9. Predictive factors of alcohol and tobacco use in adolescents.

    PubMed

    Alvarez-Aguirre, Alicia; Alonso-Castillo, María Magdalena; Zanetti, Ana Carolina Guidorizzi

    2014-01-01

    to analyze the effect of self-esteem, assertiveness, self-efficacy and resiliency on alcohol and tobacco consumption in adolescents. a descriptive and correlational study was undertaken with 575 adolescents in 2010. The Self-Esteem Scale, the Situational Confidence Scale, the Assertiveness Questionnaire and the Resiliency Scale were used. the adjustment of the logistic regression model, considering age, sex, self-esteem, assertiveness, self-efficacy and resiliency, demonstrates significance in the consumption of alcohol and tobacco. Age, resiliency and assertiveness predict alcohol consumption in the lifetime and assertiveness predicts alcohol consumption in the last year. Similarly, age and sex predict tobacco consumption in the lifetime and age in the last year. this study can offer important information to plan nursing interventions involving adolescent alcohol and tobacco users.

  10. Highlights of X-Stack ExM Deliverable: MosaStore

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ripeanu, Matei

    2016-07-20

    This brief report highlights the experience gained with MosaStore, an exploratory part of the X-Stack project “ExM: System support for extreme-scale, many-task applications”. The ExM project proposed to use concurrent workflows supported by the Swift language and runtime as an innovative programming model to exploit parallelism in exascale computers. MosaStore aims to support this endeavor by improving storage support for workflow-based applications, more precisely by exploring the gains that can be obtained from co-designing the storage system and the workflow runtime engine. MosaStore has been developed primarily at the University of British Columbia.

  11. Instrumentation of Java Bytecode for Runtime Analysis

    NASA Technical Reports Server (NTRS)

    Goldberg, Allen; Haveland, Klaus

    2003-01-01

    This paper describes JSpy, a system for high-level instrumentation of Java bytecode and its use with JPaX, OUT system for runtime analysis of Java programs. JPaX monitors the execution of temporal logic formulas and performs predicative analysis of deadlocks and data races. JSpy s input is an instrumentation specification, which consists of a collection of rules, where a rule is a predicate/action pair The predicate is a conjunction of syntactic constraints on a Java statement, and the action is a description of logging information to be inserted in the bytecode corresponding to the statement. JSpy is built using JTrek an instrumentation package at a lower level of abstraction.

  12. A new order-theoretic characterisation of the polytime computable functions☆

    PubMed Central

    Avanzini, Martin; Eguchi, Naohi; Moser, Georg

    2015-01-01

    We propose a new order-theoretic characterisation of the class of polytime computable functions. To this avail we define the small polynomial path order (sPOP⁎ for short). This termination order entails a new syntactic method to analyse the innermost runtime complexity of term rewrite systems fully automatically: for any rewrite system compatible with sPOP⁎ that employs recursion up to depth d, the (innermost) runtime complexity is polynomially bounded of degree d. This bound is tight. Thus we obtain a direct correspondence between a syntactic (and easily verifiable) condition of a program and the asymptotic worst-case complexity of the program. PMID:26412933

  13. Monitoring Object Library Usage and Changes

    NASA Technical Reports Server (NTRS)

    Owen, R. K.; Craw, James M. (Technical Monitor)

    1995-01-01

    The NASA Ames Numerical Aerodynamic Simulation program Aeronautics Consolidated Supercomputing Facility (NAS/ACSF) supercomputing center services over 1600 users, and has numerous analysts with root access. Several tools have been developed to monitor object library usage and changes. Some of the tools do "noninvasive" monitoring and other tools implement run-time logging even for object-only libraries. The run-time logging identifies who, when, and what is being used. The benefits are that real usage can be measured, unused libraries can be discontinued, training and optimization efforts can be focused at those numerical methods that are actually used. An overview of the tools will be given and the results will be discussed.

  14. Onboard Run-Time Goal Selection for Autonomous Operations

    NASA Technical Reports Server (NTRS)

    Rabideau, Gregg; Chien, Steve; McLaren, David

    2010-01-01

    We describe an efficient, online goal selection algorithm for use onboard spacecraft and its use for selecting goals at runtime. Our focus is on the re-planning that must be performed in a timely manner on the embedded system where computational resources are limited. In particular, our algorithm generates near optimal solutions to problems with fully specified goal requests that oversubscribe available resources but have no temporal flexibility. By using a fast, incremental algorithm, goal selection can be postponed in a "just-in-time" fashion allowing requests to be changed or added at the last minute. This enables shorter response cycles and greater autonomy for the system under control.

  15. AEOSS runtime manual for system analysis on Advanced Earth-Orbital Spacecraft Systems

    NASA Technical Reports Server (NTRS)

    Lee, Hwa-Ping

    1990-01-01

    Advanced earth orbital spacecraft system (AEOSS) enables users to project the required power, weight, and cost for a generic earth-orbital spacecraft system. These variables are calculated on the component and subsystem levels, and then the system level. The included six subsystems are electric power, thermal control, structure, auxiliary propulsion, attitude control, and communication, command, and data handling. The costs are computed using statistically determined models that were derived from the flown spacecraft in the past and were categorized into classes according to their functions and structural complexity. Selected design and performance analyses for essential components and subsystems are also provided. AEOSS has the feature permitting a user to enter known values of these parameters, totally and partially, at all levels. All information is of vital importance to project managers of subsystems or a spacecraft system. AEOSS is a specially tailored software coded from the relational database program of the Acius' 4th Dimension with a Macintosh version. Because of the licensing agreements, two versions of the AEOSS documents were prepared. This version, AEOSS Runtime Manual, is permitted to be distributed with a finite number of the restrictive 4D Runtime version. It can perform all contained applications without any programming alterations.

  16. Holistic Context-Sensitivity for Run-Time Optimization of Flexible Manufacturing Systems.

    PubMed

    Scholze, Sebastian; Barata, Jose; Stokic, Dragan

    2017-02-24

    Highly flexible manufacturing systems require continuous run-time (self-) optimization of processes with respect to diverse parameters, e.g., efficiency, availability, energy consumption etc. A promising approach for achieving (self-) optimization in manufacturing systems is the usage of the context sensitivity approach based on data streaming from high amount of sensors and other data sources. Cyber-physical systems play an important role as sources of information to achieve context sensitivity. Cyber-physical systems can be seen as complex intelligent sensors providing data needed to identify the current context under which the manufacturing system is operating. In this paper, it is demonstrated how context sensitivity can be used to realize a holistic solution for (self-) optimization of discrete flexible manufacturing systems, by making use of cyber-physical systems integrated in manufacturing systems/processes. A generic approach for context sensitivity, based on self-learning algorithms, is proposed aiming at a various manufacturing systems. The new solution encompasses run-time context extractor and optimizer. Based on the self-learning module both context extraction and optimizer are continuously learning and improving their performance. The solution is following Service Oriented Architecture principles. The generic solution is developed and then applied to two very different manufacturing processes.

  17. Holistic Context-Sensitivity for Run-Time Optimization of Flexible Manufacturing Systems

    PubMed Central

    Scholze, Sebastian; Barata, Jose; Stokic, Dragan

    2017-01-01

    Highly flexible manufacturing systems require continuous run-time (self-) optimization of processes with respect to diverse parameters, e.g., efficiency, availability, energy consumption etc. A promising approach for achieving (self-) optimization in manufacturing systems is the usage of the context sensitivity approach based on data streaming from high amount of sensors and other data sources. Cyber-physical systems play an important role as sources of information to achieve context sensitivity. Cyber-physical systems can be seen as complex intelligent sensors providing data needed to identify the current context under which the manufacturing system is operating. In this paper, it is demonstrated how context sensitivity can be used to realize a holistic solution for (self-) optimization of discrete flexible manufacturing systems, by making use of cyber-physical systems integrated in manufacturing systems/processes. A generic approach for context sensitivity, based on self-learning algorithms, is proposed aiming at a various manufacturing systems. The new solution encompasses run-time context extractor and optimizer. Based on the self-learning module both context extraction and optimizer are continuously learning and improving their performance. The solution is following Service Oriented Architecture principles. The generic solution is developed and then applied to two very different manufacturing processes. PMID:28245564

  18. MCR Container Tools

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Haas, Nicholas Q; Gillen, Robert E; Karnowski, Thomas P

    MathWorks' MATLAB is widely used in academia and industry for prototyping, data analysis, data processing, etc. Many users compile their programs using the MATLAB Compiler to run on workstations/computing clusters via the free MATLAB Compiler Runtime (MCR). The MCR facilitates the execution of code calling Application Programming Interfaces (API) functions from both base MATLAB and MATLAB toolboxes. In a Linux environment, a sizable number of third-party runtime dependencies (i.e. shared libraries) are necessary. Unfortunately, to the MTLAB community's knowledge, these dependencies are not documented, leaving system administrators and/or end-users to find/install the necessary libraries either as runtime errors resulting frommore » them missing or by inspecting the header information of Executable and Linkable Format (ELF) libraries of the MCR to determine which ones are missing from the system. To address various shortcomings, Docker Images based on Community Enterprise Operating System (CentOS) 7, a derivative of Redhat Enterprise Linux (RHEL) 7, containing recent (2015-2017) MCR releases and their dependencies were created. These images, along with a provided sample Docker Compose YAML Script, can be used to create a simulated computing cluster where MATLAB Compiler created binaries can be executed using a sample Slurm Workload Manager script.« less

  19. Efficiency of analytical and sampling-based uncertainty propagation in intensity-modulated proton therapy

    NASA Astrophysics Data System (ADS)

    Wahl, N.; Hennig, P.; Wieser, H. P.; Bangert, M.

    2017-07-01

    The sensitivity of intensity-modulated proton therapy (IMPT) treatment plans to uncertainties can be quantified and mitigated with robust/min-max and stochastic/probabilistic treatment analysis and optimization techniques. Those methods usually rely on sparse random, importance, or worst-case sampling. Inevitably, this imposes a trade-off between computational speed and accuracy of the uncertainty propagation. Here, we investigate analytical probabilistic modeling (APM) as an alternative for uncertainty propagation and minimization in IMPT that does not rely on scenario sampling. APM propagates probability distributions over range and setup uncertainties via a Gaussian pencil-beam approximation into moments of the probability distributions over the resulting dose in closed form. It supports arbitrary correlation models and allows for efficient incorporation of fractionation effects regarding random and systematic errors. We evaluate the trade-off between run-time and accuracy of APM uncertainty computations on three patient datasets. Results are compared against reference computations facilitating importance and random sampling. Two approximation techniques to accelerate uncertainty propagation and minimization based on probabilistic treatment plan optimization are presented. Runtimes are measured on CPU and GPU platforms, dosimetric accuracy is quantified in comparison to a sampling-based benchmark (5000 random samples). APM accurately propagates range and setup uncertainties into dose uncertainties at competitive run-times (GPU ≤slant {5} min). The resulting standard deviation (expectation value) of dose show average global γ{3% / {3}~mm} pass rates between 94.2% and 99.9% (98.4% and 100.0%). All investigated importance sampling strategies provided less accuracy at higher run-times considering only a single fraction. Considering fractionation, APM uncertainty propagation and treatment plan optimization was proven to be possible at constant time complexity, while run-times of sampling-based computations are linear in the number of fractions. Using sum sampling within APM, uncertainty propagation can only be accelerated at the cost of reduced accuracy in variance calculations. For probabilistic plan optimization, we were able to approximate the necessary pre-computations within seconds, yielding treatment plans of similar quality as gained from exact uncertainty propagation. APM is suited to enhance the trade-off between speed and accuracy in uncertainty propagation and probabilistic treatment plan optimization, especially in the context of fractionation. This brings fully-fledged APM computations within reach of clinical application.

  20. Efficiency of analytical and sampling-based uncertainty propagation in intensity-modulated proton therapy.

    PubMed

    Wahl, N; Hennig, P; Wieser, H P; Bangert, M

    2017-06-26

    The sensitivity of intensity-modulated proton therapy (IMPT) treatment plans to uncertainties can be quantified and mitigated with robust/min-max and stochastic/probabilistic treatment analysis and optimization techniques. Those methods usually rely on sparse random, importance, or worst-case sampling. Inevitably, this imposes a trade-off between computational speed and accuracy of the uncertainty propagation. Here, we investigate analytical probabilistic modeling (APM) as an alternative for uncertainty propagation and minimization in IMPT that does not rely on scenario sampling. APM propagates probability distributions over range and setup uncertainties via a Gaussian pencil-beam approximation into moments of the probability distributions over the resulting dose in closed form. It supports arbitrary correlation models and allows for efficient incorporation of fractionation effects regarding random and systematic errors. We evaluate the trade-off between run-time and accuracy of APM uncertainty computations on three patient datasets. Results are compared against reference computations facilitating importance and random sampling. Two approximation techniques to accelerate uncertainty propagation and minimization based on probabilistic treatment plan optimization are presented. Runtimes are measured on CPU and GPU platforms, dosimetric accuracy is quantified in comparison to a sampling-based benchmark (5000 random samples). APM accurately propagates range and setup uncertainties into dose uncertainties at competitive run-times (GPU [Formula: see text] min). The resulting standard deviation (expectation value) of dose show average global [Formula: see text] pass rates between 94.2% and 99.9% (98.4% and 100.0%). All investigated importance sampling strategies provided less accuracy at higher run-times considering only a single fraction. Considering fractionation, APM uncertainty propagation and treatment plan optimization was proven to be possible at constant time complexity, while run-times of sampling-based computations are linear in the number of fractions. Using sum sampling within APM, uncertainty propagation can only be accelerated at the cost of reduced accuracy in variance calculations. For probabilistic plan optimization, we were able to approximate the necessary pre-computations within seconds, yielding treatment plans of similar quality as gained from exact uncertainty propagation. APM is suited to enhance the trade-off between speed and accuracy in uncertainty propagation and probabilistic treatment plan optimization, especially in the context of fractionation. This brings fully-fledged APM computations within reach of clinical application.

  1. An Assertiveness Scale for Adolescents.

    ERIC Educational Resources Information Center

    Lee, Dong Yul; And Others

    1985-01-01

    Developed a 33-item, situation-specific instrument that measures assertiveness of adolescents. Based on data from 682 elementary and secondary school students, adequate reliability and validity of the Assertiveness Scale for Adolescents (ASA) were obtained when tested against several variables about which predictions could be made. (BH)

  2. Staff's perceptions of voluntary assertiveness skills training.

    PubMed

    McVanel, Sarah; Morris, Beth

    2010-01-01

    Clinicians' ability to be assertive when unsure or concerned about procedures, treatment modalities, or patients' symptoms is key in reducing risk and preventing sentinel events. In this article, the authors provide a framework for generic, voluntary assertiveness communication skills workshops that any educator can implement.

  3. Assertiveness and Physical Attractiveness.

    ERIC Educational Resources Information Center

    Kleim, David M.; And Others

    Earlier research investigating the relationship between physical attractiveness and assertiveness found that physically attractive females were more assertive than other females. To investigate this relationship further and to broaden the scope of the study, 69 students were videotaped in groups of five to ten while responding to open-ended…

  4. Revisiting the Interactive Effect of Narcissism and Self-Esteem on Responses to Ego Threat: Distinguishing Between Assertiveness and Intent to Harm.

    PubMed

    Hart, William; Richardson, Kyle; Tortoriello, Gregory K

    2018-05-01

    We addressed whether narcissism and self-esteem synergize to enhance assertive responses and deter aggressive responses to ego-threatening provocation. Participants ( N = 448) completed measures of narcissism and self-esteem, imagined ego-threatening provocation, and indicated their aggressive and assertive responses. Participants also completed individual difference measures of agreeableness, openness, status/dominance motivation, and endorsement of the notion that aggression begets power. Narcissism and self-esteem interacted to reduce aggressive responses but enhance assertive responses to ego-threat; moreover, this interaction related to enhanced agreeableness, openness, status/dominance motivation, and reduced endorsement of the belief that aggression begets power, and these relations accounted, in part, for relations between the interaction and aggressive and assertive responses. Broadly, the findings contribute to the contentious issue of how self-evaluation influences responses to ego-threat; specifically, we would suggest that this issue be conceptualized in terms of synergistic effects of narcissism and self-esteem and distinguish between assertive versus aggressive responding.

  5. Developing a short form of the simple Rathus assertiveness schedule using a sample of adults with sickle cell disease.

    PubMed

    Jenerette, Coretta; Dixon, Jane

    2010-10-01

    Ethnic and cultural norms influence an individual's assertiveness. In health care, assertiveness may play an important role in health outcomes, especially for predominantly minority populations, such as adults with sickle cell disease. Therefore, it is important to develop measures to accurately assess assertiveness. It is also important to reduce response burden of lengthy instruments while retaining instrument reliability and validity. The purpose of this article is to describe development of a shorter version of the Simple Rathus Assertiveness Schedule (SRAS). Data from a cross-sectional descriptive study of adults with sickle cell disease were used to construct a short form of the SRAS, guided by stepwise regression analysis. The 19-item Simple Rathus Assertiveness Scale-Short Form (SRAS-SF) had acceptable reliability (α = .81) and construct validity and was highly correlated with the SRAS (r = .98, p = .01). The SRAS-SF reduces response burden, while maintaining reliability and validity.

  6. Effectiveness of Group Training of Assertiveness on Social Anxiety among Deaf and Hard of Hearing Adolescents.

    PubMed

    Ahmadi, Hamed; Daramadi, Parviz Sharifi; Asadi-Samani, Majid; Givtaj, Hamed; Sani, Mohammad Reza Mahmoudian

    2017-06-01

    The present study was conducted to compare the effectiveness of assertiveness group training on social anxiety (SAD) between deaf and hearing impaired adolescents. Forty eight (24 deaf and 24 hearing impaired) people participated in this study. First, participants with SAD, i.e. attaining the scores above 40 for Connor's Social Inventory Scale 2000 (SPIN), were selected according to convenience sampling and randomly assigned to two groups, i.e. intervention and control. Then, assertiveness group training was conducted for intervention group within 10 sessions, and immediately after completion of the training sessions, SPIN was re-administered to the two groups. ANCOVA showed that the effectiveness of assertiveness group training on SAD is different between deaf and hearing impaired participants, i.e. assertiveness group training was effective on improvement of SAD in hearing impaired participants but not deaf ones. Therefore, it is recommended to incorporate assertiveness group training in the educational programs developed for adolescents with ear disorders especially hearing impairment.

  7. The moderating role of risk-taking tendency and refusal assertiveness on social influences in alcohol use among inner-city adolescents.

    PubMed

    Epstein, Jennifer A; Botvin, Gilbert J

    2002-07-01

    Many etiological models of adolescent alcohol use concentrate on the main effects of risk and protective factors. This study examined the moderating influence of risk-taking tendency and refusal assertiveness on perceived friends' drinking as associated with alcohol use among inner-city adolescents. Participants (N = 2,400; 54% female) completed questionnaires that included measures of risk-taking tendency, refusal assertiveness, perceived friends' drinking and alcohol use (drinking frequency, drinking amount and drunkenness). Main effects for perceived friends' drinking, risk-taking tendency and refusal assertiveness were found for all three drinking measures, consistent with prior work. Furthermore, significant interactions were found between (1) risk-taking tendency and perceived friends' drinking and (2) refusal assertiveness and perceived friends' drinking. High risk-taking tendency and low refusal assertiveness increased the impact of perceived friends' drinking on alcohol use among inner-city adolescents. This suggests that these factors are important components in preventing alcohol use.

  8. The relationship between psychosocial maturity and assertiveness in males and females.

    PubMed

    Goldman, J A; Olczak, P V

    1981-02-01

    The relationship between psychosocial maturity (psychological health) and assertiveness was investigated in a sample of United States college males and females. Results revealed a moderately high positive relationship between psychosocial maturity (PSM) and self-reported assertiveness on the Rathus and Galassi scales for both sexes. This relationship was slightly stronger (in terms of variance accounted for) for males than females, significant differences being obtained for Intimacy on the Rathus scale and PSM and Intimacy on the Galassi scale. Multiple regression analyses revealed that the personality components most consistently accounting for major portions of the variance in predicting male assertiveness scores on both the Rathus Assertiveness Schedule and the College Self-Expression Scale were Intimacy and Initiative, while in predicting female assertiveness, only Initiative was involved. The findings were related to previous research, recent work on the androgyny construct (instrumental vs. expressive behaviors), and exhortations for increased cooperation between schools of psychotherapy to establish it as a more unified discipline.

  9. Relationship satisfaction in women: a longitudinal case-control study about the role of breast cancer, personal assertiveness, and partners' relationship-focused coping.

    PubMed

    Hinnen, Chris; Hagedoorn, Mariët; Ranchor, Adelita V; Sanderman, Robbert

    2008-11-01

    The aim of this study was to investigate whether a breast cancer diagnosis, personal assertiveness (i.e. frequency of assertive behaviour and tension associated with this behaviour), and partners' relationship-focused coping (i.e. active engagement and protective buffering) were sources of variation in patients' relationship satisfaction, cross-sectionally and over time. This longitudinal case-control study assessed the two dimensions of personal assertiveness and relationship satisfaction in both women with cancer (N=72) and comparison controls (N=62). In addition, patients completed a measure assessing their partners' active engagement and protective buffering. Cases (i.e. women with breast cancer) were not found to report more relationship problems than controls. Women with breast cancer who tended not to express their concerns and feelings and who experienced much tension when they did, reported relatively low marital satisfaction. Moreover, partners' protective buffering was associated with less relationship satisfaction in especially more assertive (i.e. high frequency of assertive behaviour and low tension) women with cancer, while active engagement was associated with more relationship satisfaction, regardless of the women's personal assertiveness. The results of the present study indicate that a breast cancer diagnosis by itself may not be a risk factor for relationship problems. However, in the context of an illness such as cancer, personal assertiveness, and a partner's relationship-focused coping strategies do seem to play a role in maintaining a satisfactory relationship with one's partner.

  10. Assertiveness with 'Special' Children.

    ERIC Educational Resources Information Center

    Rosenberg, Shelley K.; Stillman-Powell, Patricia

    The author examines issues related to adult assertiveness in controlling and setting limits for handicapped children. Reasons for adults not wishing to be in charge include feelings of guilt, lack of consistency in enforcing rules, and a sense of sympathy for special children. Assertiveness is distinguished from aggressiveness, and suggestions for…

  11. Enhancement of Self-Regulation, Assertiveness, and Empathy.

    ERIC Educational Resources Information Center

    Sanz de Acedo Lizarraga, M. Luisa; Ugarte, M. Dolores; Cardelle-Elawar, Maria; Iriarte, M. Dolores; Sanz de Acedo Baquedano, M. Teresa

    2003-01-01

    Examined the effects of teaching self-regulation strategies and social skills to 40 middle school students who presented difficulties in self-reflection, self-inquiry, assertiveness, and empathy. Significant gains were observed in the experimental group in self-regulation of learning, self-control of behavior, assertiveness, empathy, and…

  12. The Assertiveness Scale for Children.

    ERIC Educational Resources Information Center

    Peeler, Elizabeth; Rimmer, Susan M.

    1981-01-01

    Described an assertiveness scale for children developed to assess four dimensions of assertiveness across three categories of interpersonal situations. The scale was administered to elementary and middle school children (N=609) and readministered to students (N=164) to assess test-retest reliability. Test-retest reliability was low while internal…

  13. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-29

    ... Businesses Assert Business Confidentiality Claims AGENCY: Environmental Protection Agency (EPA). ACTION... purpose of this notice is to inform ``affected businesses'' about the documents or data sought by these types of FOIA requests in order to provide the businesses with the opportunity to assert claims that any...

  14. Assertiveness Training: A Program for High School Students.

    ERIC Educational Resources Information Center

    Jean-Grant, Deborah S.

    1980-01-01

    Proposes an assertiveness training program suitable for adolescents in a high school group setting. After role-playing examples, students should begin formulating their own responses. Early work in this area indicates that students eagerly participate in assertiveness training groups, and are quick to pick up the skills required for assertive…

  15. Social Skills Training for Young Adolescents: Symbolic and Behavioral Components.

    ERIC Educational Resources Information Center

    Thompson, Kathryn L.; And Others

    1995-01-01

    Expanded the curriculum of an assertiveness training program. Found that boys and girls benefited similarly in the cognitive acquisition of assertiveness information from this program. Discusses results in terms of the difference between having stored symbolic information regarding assertive responses and in recognizing appropriate contexts for…

  16. Social Skills Training for Young Adolescents: Cognitive and Performance Components.

    ERIC Educational Resources Information Center

    Thompson, Kathryn L.; And Others

    1996-01-01

    An assertiveness training curriculum that was an expansion of two previous programs with young adolescents was presented to 22 fifth graders. Results did not show that training facilitated assertiveness on the performance components. Suggestions are offered for designing programs aimed at developing adolescents' assertive behavior in ways that…

  17. Four-Year Results of a Youth Smoking Prevention Program Using Assertiveness Training.

    ERIC Educational Resources Information Center

    Del Greco, Linda; And Others

    1986-01-01

    Seventh graders (N=161) participated in health education classes consisting of either an innovative smoking education program, the program plus assertiveness training, or a traditional smoking education program. Data collected four years later revealed no significant differences in smoking behavior, changes in assertion, or sex differences among…

  18. Can Assertiveness be Distinguished From Aggressiveness Using Self Report Data?

    ERIC Educational Resources Information Center

    Mauger, Paul A.; And Others

    The differences between aggressiveness and assertiveness were examined using the Interpersonal Behavior Survey (IBS), a 136-item self-report questionnaire which was developed to distinguish between assertive and aggressive behaviors. Item level factor analysis was used in scale construction. Results indicated that: (1) the correlation between the…

  19. Relation between Assertiveness, Academic Self-Efficacy, and Psychosocial Adjustment among International Graduate Students.

    ERIC Educational Resources Information Center

    Poyrazli, Senel; Arbona, Consuelo; Nora, Amaury; McPherson, Robert; Pisecco, Stewart

    2002-01-01

    Rathus Assertiveness Schedule, Academic Self-Efficacy Scale, The Inventory for Student Adjustment Strain, and UCLA Loneliness Scale were used to examine a total of 122 graduate international students. Findings indicate that English proficiency, assertiveness, and academic self-efficacy contributed uniquely to the variance in students' general…

  20. A Comparison of Three Covert Assertion Training Procedures.

    ERIC Educational Resources Information Center

    Twentyman, Craig T.; And Others

    1980-01-01

    Assessed the effectiveness of covert modification procedures in an assertion training program. All treatment groups were superior to the control in behavioral ratings of assertiveness during the posttest in those situations that had been employed previously in treatment; two were superior in those that had not been used, providing evidence of…

  1. Assertion Training and Cognitive Restructuring With College Women.

    ERIC Educational Resources Information Center

    Terrill, Marilyn J.

    The process of assertive behavior change of college women who received assertion training (AT) and cognitive restructuring was examined to assess the relative effects of different durations of exposure to cognitive restructuring. Undergraduate and graduate women students (N=27) at a state university volunteered and were screened for AT groups.…

  2. Cross-Cultural Perspectives on Assertiveness and Self-Image.

    ERIC Educational Resources Information Center

    Lau, Estelle Pau-on

    In an examination of some relationships between culture, assertiveness, decisionmaking, and self image among Chinese Americans, this paper focuses on themes such as: (1) how cultural factors impinge on individual capability to be assertive; (2) specific ways in which cultural conditioning affects decisionmaking skills and other behavior patterns;…

  3. 48 CFR 227.7103-13 - Government right to review, verify, challenge and validate asserted restrictions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... contracting officer shall not challenge a contractor's assertion that a commercial item, component, or process... to development of the item, component or process. (2) Presumption regarding development exclusively... validation of asserted restrictions for technical data related to commercial items, and to major systems, on...

  4. 48 CFR 227.7103-13 - Government right to review, verify, challenge and validate asserted restrictions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... contracting officer shall not challenge a contractor's assertion that a commercial item, component, or process... to development of the item, component or process. (2) Presumption regarding development exclusively... validation of asserted restrictions for technical data related to commercial items, and to major systems, on...

  5. 48 CFR 227.7103-13 - Government right to review, verify, challenge and validate asserted restrictions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... contracting officer shall not challenge a contractor's assertion that a commercial item, component, or process... to development of the item, component or process. (2) Presumption regarding development exclusively... validation of asserted restrictions for technical data related to commercial items, and to major systems, on...

  6. 48 CFR 227.7103-13 - Government right to review, verify, challenge and validate asserted restrictions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... contracting officer shall not challenge a contractor's assertion that a commercial item, component, or process... to development of the item, component or process. (2) Presumption regarding development exclusively... validation of asserted restrictions for technical data related to commercial items, and to major systems, on...

  7. Re-examination of assertiveness and aggressiveness as potential moderators of verbal intentions.

    PubMed

    Swanson, S R

    1999-06-01

    This research reports the results of a replication of Swanson and McIntyre's 1998 study of assertiveness and aggressiveness as potential moderators of verbal intentions. A convenience sample of 119 women and 71 men participated. Nonassertive subjects were least likely, while Resort-to-Aggressive subjects were the most likely, to talk with acquaintances and others. Nonassertive and Assertive subjects were significantly more likely than Aggressive ones to make recommendations. Finally, men and women scored equally assertive, but men were more likely to score aggressive. The findings generally support the earlier work.

  8. Predictive factors of alcohol and tobacco use in adolescents

    PubMed Central

    Alvarez-Aguirre, Alicia; Alonso-Castillo, María Magdalena; Zanetti, Ana Carolina Guidorizzi

    2014-01-01

    OBJECTIVES: to analyze the effect of self-esteem, assertiveness, self-efficacy and resiliency on alcohol and tobacco consumption in adolescents. METHOD: a descriptive and correlational study was undertaken with 575 adolescents in 2010. The Self-Esteem Scale, the Situational Confidence Scale, the Assertiveness Questionnaire and the Resiliency Scale were used. RESULTS: the adjustment of the logistic regression model, considering age, sex, self-esteem, assertiveness, self-efficacy and resiliency, demonstrates significance in the consumption of alcohol and tobacco. Age, resiliency and assertiveness predict alcohol consumption in the lifetime and assertiveness predicts alcohol consumption in the last year. Similarly, age and sex predict tobacco consumption in the lifetime and age in the last year. CONCLUSION: this study can offer important information to plan nursing interventions involving adolescent alcohol and tobacco users. PMID:25591103

  9. Relationships of assertiveness, depression, and social support among older nursing home residents.

    PubMed

    Segal, Daniel L

    2005-07-01

    This study assessed the relationships of assertiveness, depression, and social support among nursing home residents. The sample included 50 older nursing home residents (mean age = 75 years; 75% female; 92% Caucasian). There was a significant correlation between assertiveness and depression (r = -.33), but the correlations between social support and depression (r = -.15) and between social support and assertiveness (r = -.03) were small and nonsignificant. The correlation between overall physical health (a subjective self-rating) and depression was strong and negative (r = -.50), with lower levels of health associated with higher depression. An implication of this study is that an intervention for depression among nursing home residents that is targeted at increasing assertiveness and bolstering health status may be more effective than the one that solely targets social support.

  10. Drug assertiveness and sexual risk-taking behavior in a sample of HIV-positive, methamphetamine-using men who have sex with men

    PubMed Central

    Semple, Shirley J.; Strathdee, Steffanie A.; Zians, Jim; McQuaid, John R.; Patterson, Thomas L.

    2011-01-01

    Drug assertiveness skills have been demonstrated effective in reducing substance use behaviors among patients with alcohol- or heroin-use disorders. This study examined the association between drug assertiveness and methamphetamine use, psychological factors, and sexual risk behaviors in a sample of 250 HIV-positive men who have sex with men (MSM) enrolled in a safer sex intervention in San Diego, CA. Less assertiveness in turning down drugs was associated with greater frequency and larger amounts of methamphetamine use, lower self-esteem, higher scores on a measure of sexual sensation-seeking, and greater attendance at risky sexual venues. These data suggest that drug assertiveness training should be incorporated into drug abuse treatment programs and other risk reduction interventions for methamphetamine users. PMID:21550758

  11. Anxiety and assertiveness in the relatives of alcoholics and controls.

    PubMed

    Schuckit, M A

    1982-06-01

    The Rathus Assertiveness Schedule (RAS) and the Spielberger State-Trait Anxiety Inventory A-Trait Scale (STAI) were administered to male university students and nonacademic staff. Subjects classified as "at-risk" on the basis of a history of alcoholism in a first-degree relative (N = 30) were compared to controls with no such family histories (N = 30). The two groups were matched on demographic variables and drinking history. No significant differences were found between the groups on the traits of anxiety or assertiveness, although the subjects hypothesized to be at higher risk for alcoholism showed a trend toward higher assertiveness scores. These findings are not consistent with the hypothesis that higher levels of anxiety and/or lower levels of assertiveness predispose an individual toward the development of alcoholism.

  12. 22 CFR 40.25 - Certain aliens involved in serious criminal activity who have asserted immunity from prosecution...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Certain aliens involved in serious criminal activity who have asserted immunity from prosecution. [Reserved] 40.25 Section 40.25 Foreign Relations... Certain aliens involved in serious criminal activity who have asserted immunity from prosecution...

  13. 22 CFR 40.25 - Certain aliens involved in serious criminal activity who have asserted immunity from prosecution...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Certain aliens involved in serious criminal activity who have asserted immunity from prosecution. [Reserved] 40.25 Section 40.25 Foreign Relations... Certain aliens involved in serious criminal activity who have asserted immunity from prosecution...

  14. 22 CFR 40.25 - Certain aliens involved in serious criminal activity who have asserted immunity from prosecution...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Certain aliens involved in serious criminal activity who have asserted immunity from prosecution. [Reserved] 40.25 Section 40.25 Foreign Relations... Certain aliens involved in serious criminal activity who have asserted immunity from prosecution...

  15. 22 CFR 40.25 - Certain aliens involved in serious criminal activity who have asserted immunity from prosecution...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Certain aliens involved in serious criminal activity who have asserted immunity from prosecution. [Reserved] 40.25 Section 40.25 Foreign Relations... Certain aliens involved in serious criminal activity who have asserted immunity from prosecution...

  16. 22 CFR 40.25 - Certain aliens involved in serious criminal activity who have asserted immunity from prosecution...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Certain aliens involved in serious criminal activity who have asserted immunity from prosecution. [Reserved] 40.25 Section 40.25 Foreign Relations... Certain aliens involved in serious criminal activity who have asserted immunity from prosecution...

  17. Correlates of Postassault Self-Defense/Assertiveness Training Participation for Sexual Assault Survivors

    ERIC Educational Resources Information Center

    Brecklin, Leanne R.; Ullman, Sarah E.

    2004-01-01

    Past research has shown that self-defense/assertiveness training may have positive implications for sexual assault survivors. However, little is known about the correlates of self-defense/assertiveness training participation for sexually victimized women. In this study we examined the assault characteristics and experiences that relate to women's…

  18. Rational-Emotive, Self-Instructional, and Behavioral Assertion Training: Enhancing the Generalization and Maintenance of Treatment Gains.

    ERIC Educational Resources Information Center

    Carmody, Timothy P.

    A sample of 63 subassertive adults participated in four 90-minute sessions of group assertion training. The treatment components of challenging maladaptive cognitions and learning self-instructions were examined by comparing Rational-Emotive, Self-Instructional, and Behavioral Assertion Training. A delayed-treatment control group was also…

  19. Sexual Assertiveness Mediates the Effect of Social Interaction Anxiety on Sexual Victimization Risk among College Women

    ERIC Educational Resources Information Center

    Schry, Amie R.; White, Susan W.

    2013-01-01

    Sexual victimization is prevalent among college women and is associated with adverse psychological consequences. Social anxiety, particularly related to interpersonal interaction, may increase risk of sexual victimization among college women by decreasing sexual assertiveness and decreasing the likelihood of using assertive resistance techniques.…

  20. Assertion and Overcontrolled Hostility among Mentally Disordered Murderers.

    ERIC Educational Resources Information Center

    Quinsey, Vernon L.; And Others

    1983-01-01

    Studied whether men (N=19) who had committed very severe assaults and who score high on the Overcontrolled Hostility (O-H) scale had assertion deficits that could be measured behaviorally. Results showed the high O-H group was significantly less assertive than control groups in role playing tasks and on questionnaire items. (WAS)

  1. Evaluation of Assertive Training and Homosexual Guidance Service Groups Designed to Improve Homosexual Functioning

    ERIC Educational Resources Information Center

    Russell, A.; Winkler, R.

    1977-01-01

    It is proposed that clinicians should develop research-based assertiveness training procedures for homosexuals that are designed to facilitate homosexual functioning. Subjects (N=27) were assigned to a behaviorally oriented assertive training group or a non-directive group run by a homosexual guidance service. Self-report measures indicated…

  2. Correlates of Adolescent Assertiveness with HIV Avoidance in a Four-Nation Sample

    ERIC Educational Resources Information Center

    Onuoha, Francis N.; Munakata, Tsunetsugu

    2005-01-01

    Adolescents are frequently admonished to be socially assertive in order to confront negative interpersonal peer influences. Since the advent of HIV/AIDS in human social chemistry, the admonition has become more critical than ever. But the warning is often proffered in the misguided presumption that social assertiveness is the all-required…

  3. The Rathus Assertiveness Schedule: Reliability at the Junior High School Level

    ERIC Educational Resources Information Center

    Vaal, Joseph J.; McCullagh, James

    1977-01-01

    This research was an attempt to determine the usefullness of the Rathus Assertiveness Schedule with pre-adolescent and early adolescent students. Previously it has been used with outpatients, institutionalized adults, or with college students. The RAS is a thirty item schedule that was developed for measuring assertiveness. (Author/RK)

  4. Conversational Skills for Autistic Adolescents: Teaching Assertiveness in Naturalistic Game Settings.

    ERIC Educational Resources Information Center

    McGee, Gail G.; And Others

    1984-01-01

    A naturalistic social skills training program was used to teach assertive responses to three autistic adolescents in the context of two game situations. Results demonstrated the effectiveness of the procedure in generating high levels of positive and negative assertions that maintained across a 4.5-month follow-up interval. (Author/CL)

  5. Relationships of Assertiveness, Depression, and Social Support Among Older Nursing Home Residents

    ERIC Educational Resources Information Center

    Segal, Daniel

    2005-01-01

    This study assessed the relationships of assertiveness, depression, and social support among nursing home residents. The sample included 50 older nursing home residents (mean age=75 years; 75% female; 92% Caucasian). There was a significant correlation between assertiveness and depression (r=-.33), but the correlations between social support and…

  6. The Influences of Gender, School Year, and Socioeconomic Status on Assertiveness for Blacks at Predominantly White Universities.

    ERIC Educational Resources Information Center

    Haralson, Mitchel, Jr.

    This study investigated the influences of gender, school year, and socioeconomic status on assertiveness for black students attending four predominantly white, southeastern universities. The study employed a combination of quantitative and qualitative techniques. Quantitative data on assertiveness were collected from 560 black freshmen and juniors…

  7. Cultural factors influencing Japanese nurses' assertive communication. Part 1: Collectivism.

    PubMed

    Omura, Mieko; Stone, Teresa E; Levett-Jones, Tracy

    2018-02-06

    Culture influences the way health-care professionals communicate with each other and their ability to relate to colleagues in an assertive manner. Cultural barriers can also make it difficult for nurses to speak up even when they have concerns about patient safety. An understanding of the potential impact of cultural factors is therefore needed when developing assertiveness communication training programs. This paper presents the findings from a study that explored Japanese nurses' perceptions of how culture and values impact assertive communication in health care. Semistructured interviews with 23 registered nurses were undertaken, and data were analyzed using directed content analysis. Two major themes were identified: collectivism and hierarchy/power. In the present study, we discuss the cultural values related to collectivism that included four categories of "wa" (harmony), "uchi to soto" (inside and outside), implicit communication/ambiguity, and "nemawashi" (groundwork). The findings highlight the impact of culture on nurses' assertive communication behaviors and can be used to inform the design of culturally-appropriate assertiveness communication training programs for Japanese nurses working both within their own country or internationally. © 2018 John Wiley & Sons Australia, Ltd.

  8. Women’s Condom Use Assertiveness and Sexual Risk-Taking: Effects of Alcohol Intoxication and Adult Victimization

    PubMed Central

    Norris, Jeanette; George, William H.; Morrison, Diane M.; Zawacki, Tina; Davis, Kelly Cue; Hessler, Danielle M.

    2008-01-01

    This experiment examined relationships among adulthood victimization, sexual assertiveness, alcohol intoxication, and sexual risk-taking in female social drinkers (N = 161). Women completed measures of sexual assault and intimate partner violence history and sexual assertiveness before random assignment to 1 of 4 beverage conditions: control, placebo, low dose (.04%), or high dose (.08%). After drinking, women read a second-person story involving a sexual encounter with a new partner. As protagonist of the story, each woman rated her likelihood of condom insistence and unprotected sex. Victimization history and self-reported sexual assertiveness were negatively related. The less sexually assertive a woman was, the less she intended to insist on condom use, regardless of intoxication. By reducing the perceived health consequences of unprotected sex, intoxication indirectly decreased condom insistence and increased unprotected sex. Findings extend previous work by elucidating possible mechanisms of the relationship between alcohol and unprotected sex – perceived health consequences and situational condom insistence – and support the value of sexual assertiveness training to enhance condom insistence, especially since the latter relationship was robust to intoxication. PMID:18556139

  9. The connection between young women's body esteem and sexual assertiveness.

    PubMed

    Auslander, Beth A; Baker, Jaqwiana; Short, Mary B

    2012-04-01

    Healthy sexuality includes having positive feelings about one's body and developing positive romantic relationships. Previous research predicts that women dissatisfied with their bodies may be less likely to enforce their rights of sexual autonomy (i.e., sexual assertiveness). We assessed whether the body esteem of young women was related to their reports of sexual assertiveness. Young women from local colleges (N = 127) completed a questionnaire that included demographics, self reported weight and height, sexual history, along with body esteem and sexual assertiveness. Overall, body esteem was related to sexual assertiveness regarding condom use when controlling for other variables. Women with less body esteem were less likely to insist that their partner use a condom. Individual components of body esteem did not independently predict insistence of condom use. Body esteem was not related to initiation of sex or refusal of unwanted sex. The current study found relationships between body esteem and sexual assertiveness regarding STI prevention behaviors. Given these findings, implications for STI prevention programs are discussed. Copyright © 2012 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  10. Women's condom use assertiveness and sexual risk-taking: effects of alcohol intoxication and adult victimization.

    PubMed

    Stoner, Susan A; Norris, Jeanette; George, William H; Morrison, Diane M; Zawacki, Tina; Davis, Kelly Cue; Hessler, Danielle M

    2008-09-01

    This experiment examined relationships among adulthood victimization, sexual assertiveness, alcohol intoxication, and sexual risk-taking in female social drinkers (N=161). Women completed measures of sexual assault and intimate partner violence history and sexual assertiveness before random assignment to 1 of 4 beverage conditions: control, placebo, low dose (.04%), or high dose (.08%). After drinking, women read a second-person story involving a sexual encounter with a new partner. As protagonist of the story, each woman rated her likelihood of condom insistence and unprotected sex. Victimization history and self-reported sexual assertiveness were negatively related. The less sexually assertive a woman was, the less she intended to insist on condom use, regardless of intoxication. By reducing the perceived health consequences of unprotected sex, intoxication indirectly decreased condom insistence and increased unprotected sex. Findings extend previous work by elucidating possible mechanisms of the relationship between alcohol and unprotected sex - perceived health consequences and situational condom insistence - and support the value of sexual assertiveness training to enhance condom insistence, especially since the latter relationship was robust to intoxication.

  11. Probability of assertive behaviour, interpersonal anxiety and self-efficacy of South African registered dietitians.

    PubMed

    Paterson, Marie; Green, J M; Basson, C J; Ross, F

    2002-02-01

    There is little information on the probability of assertive behaviour, interpersonal anxiety and self-efficacy in the literature regarding dietitians. The objective of this study was to establish baseline information of these attributes and the factors affecting them. Questionnaires collecting biographical information and self-assessment psychometric scales measuring levels of probability of assertiveness, interpersonal anxiety and self-efficacy were mailed to 350 subjects, who comprised a random sample of dietitians registered with the Health Professions Council of South Africa. Forty-one per cent (n=145) of the sample responded. Self-assessment inventory results were compared to test levels of probability of assertive behaviour, interpersonal anxiety and self-efficacy. The inventory results were compared with the biographical findings to establish statistical relationships between the variables. The hypotheses were formulated before data collection. Dietitians had acceptable levels of probability of assertive behaviour and interpersonal anxiety. The probability of assertive behaviour was significantly lower than the level noted in the literature and was negatively related to interpersonal anxiety and positively related to self-efficacy.

  12. Gender by assertiveness interaction in delayed auditory feedback.

    PubMed

    Elias, J W; Rosenzweig, C M; Dippel, R L

    1981-04-01

    The College Self-Expression and the Marlowe-Crowne Social Desirability Scales were given to 144 undergraduates. High (N; 10 M; 10 F) and Low (N; 10 M 10 F) Assertiveness Ss were given a DAF test with a 'Phonic Mirror" and the Stroop test (naming the color of a word printed in a different color). DAF performance did not differ among the 4 subgroups (M and F, High and Low Assertiveness), except that Low Assertiveness women showed significantly greater DAF interference than the other subgroups. There was no significant correlation between the continuous interference of the DAF vs the discontinuous of the Stroop test. The difference may reside in the time available and the consequent reduction in anxiety, for the next stimulus in the Stroop test. These data show that, under certain circumstances, personality factors such as assertiveness can interact with gender to affect speech fluency and production. The ability to overcome feedback-related disfluencies in speech may be partially aided by improvement in self-concept or specific training in such behaviors as assertiveness, and this may be more important for females than males.

  13. Safer sexual practices among African American women: intersectional socialisation and sexual assertiveness.

    PubMed

    Brown, Danice L; Blackmon, Sha'Kema; Shiflett, Alexandra

    2018-06-01

    Scholars have posited that childhood socialisation experiences may play a key role in influencing behaviours and attitudes that contribute to the acquisition of HIV. This study examined the links between past ethnic-racial and gender socialisation, sexual assertiveness and the safe sexual practices of African American college women utilising a cluster analytic approach. After identifying separate racial-gender and ethnic-gender socialisation profiles, results indicated that ethnic-gender socialisation cluster profiles were directly associated with sexual assertiveness and safer sex behaviour. Greater levels of ethnic socialisation and low traditional gender role socialisation were found to be associated with greater sexual assertiveness and safer sex behaviour. Further analysis showed that sexual assertiveness mediated the links between the identified ethnic-gender socialisation profiles and safer sex behaviour. Implications for policy and programme development are discussed.

  14. [Relationship between members' egoistic self-assertion and captains' leadership in athletic clubs].

    PubMed

    Yoshimura, Hitoshi

    2005-02-01

    This study examined the relationships between club members' egoistic self-assertion and their captains' leadership with respect to the adjustment to activities in extracurricular athletic clubs. Participants were 638 junior high school students who belong to the athletic clubs. The research was conducted by means of a questionnaire and the following results were obtained. When the captains took a laissez-faire command, club members who did not assert themselves egoistically were not satisfied with their captains, and did not participate in the club activities very diligently. On the other hand, when the captains took an authoritative command, the members who asserted themselves egoistically were not satisfied with club activities. These results suggest that the relationships between egoistic self-assertion by club members and leadership by captains have a great influence on the adjustment to club activities.

  15. Depression as a mediator between family factors and peer-bullying victimization in Latino adolescents.

    PubMed

    Yabko, Brandon A; Hokoda, Audrey; Ulloa, Emilio C

    2008-01-01

    The purpose of this study was to assess the mediating role of depression in three different relationships: (a) sibling bullying and peer victimization, (b) mothers' power-assertive parenting and peer victimization, and (c) fathers' power-assertive parenting and peer victimization. Results from 242 Latino middle school adolescents from a large southwestern city bordering Mexico revealed that both boys' and girls' peer victimization were related to familial factors and depression. Regression analyses for boys revealed that depression mediated three relationships: (a) sibling bullying and peer victimization, (b) mothers' power-assertive parenting and peer victimization, and (c) fathers' power-assertive parenting and peer victimization. Depression also mediated the relationship between fathers' power-assertive parenting and girls' victimization by peers. The findings support the development of family-based interventions for peer victimization that include curriculum addressing depression.

  16. Drug assertiveness and sexual risk-taking behavior in a sample of HIV-positive, methamphetamine-using men who have sex with men.

    PubMed

    Semple, Shirley J; Strathdee, Steffanie A; Zians, Jim; McQuaid, John R; Patterson, Thomas L

    2011-10-01

    Drug assertiveness skills have been demonstrated to be effective in reducing substance use behaviors among patients with alcohol or heroin use disorders. This study examined the association between drug assertiveness and methamphetamine use, psychological factors, and sexual risk behaviors in a sample of 250 HIV-positive men who have sex with men enrolled in a safer sex intervention in San Diego, CA. Less assertiveness in turning down drugs was associated with greater frequency and larger amounts of methamphetamine use, lower self-esteem, higher scores on a measure of sexual sensation seeking, and greater attendance at risky sexual venues. These data suggest that drug assertiveness training should be incorporated into drug abuse treatment programs and other risk reduction interventions for methamphetamine users. Copyright © 2011 Elsevier Inc. All rights reserved.

  17. Execution time supports for adaptive scientific algorithms on distributed memory machines

    NASA Technical Reports Server (NTRS)

    Berryman, Harry; Saltz, Joel; Scroggs, Jeffrey

    1990-01-01

    Optimizations are considered that are required for efficient execution of code segments that consists of loops over distributed data structures. The PARTI (Parallel Automated Runtime Toolkit at ICASE) execution time primitives are designed to carry out these optimizations and can be used to implement a wide range of scientific algorithms on distributed memory machines. These primitives allow the user to control array mappings in a way that gives an appearance of shared memory. Computations can be based on a global index set. Primitives are used to carry out gather and scatter operations on distributed arrays. Communications patterns are derived at runtime, and the appropriate send and receive messages are automatically generated.

  18. Rapid Processing of Radio Interferometer Data for Transient Surveys

    NASA Astrophysics Data System (ADS)

    Bourke, S.; Mooley, K.; Hallinan, G.

    2014-05-01

    We report on a software infrastructure and pipeline developed to process large radio interferometer datasets. The pipeline is implemented using a radical redesign of the AIPS processing model. An infrastructure we have named AIPSlite is used to spawn, at runtime, minimal AIPS environments across a cluster. The pipeline then distributes and processes its data in parallel. The system is entirely free of the traditional AIPS distribution and is self configuring at runtime. This software has so far been used to process a EVLA Stripe 82 transient survey, the data for the JVLA-COSMOS project, and has been used to process most of the EVLA L-Band data archive imaging each integration to search for short duration transients.

  19. The Concert system - Compiler and runtime technology for efficient concurrent object-oriented programming

    NASA Technical Reports Server (NTRS)

    Chien, Andrew A.; Karamcheti, Vijay; Plevyak, John; Sahrawat, Deepak

    1993-01-01

    Concurrent object-oriented languages, particularly fine-grained approaches, reduce the difficulty of large scale concurrent programming by providing modularity through encapsulation while exposing large degrees of concurrency. Despite these programmability advantages, such languages have historically suffered from poor efficiency. This paper describes the Concert project whose goal is to develop portable, efficient implementations of fine-grained concurrent object-oriented languages. Our approach incorporates aggressive program analysis and program transformation with careful information management at every stage from the compiler to the runtime system. The paper discusses the basic elements of the Concert approach along with a description of the potential payoffs. Initial performance results and specific plans for system development are also detailed.

  20. Execution time support for scientific programs on distributed memory machines

    NASA Technical Reports Server (NTRS)

    Berryman, Harry; Saltz, Joel; Scroggs, Jeffrey

    1990-01-01

    Optimizations are considered that are required for efficient execution of code segments that consists of loops over distributed data structures. The PARTI (Parallel Automated Runtime Toolkit at ICASE) execution time primitives are designed to carry out these optimizations and can be used to implement a wide range of scientific algorithms on distributed memory machines. These primitives allow the user to control array mappings in a way that gives an appearance of shared memory. Computations can be based on a global index set. Primitives are used to carry out gather and scatter operations on distributed arrays. Communications patterns are derived at runtime, and the appropriate send and receive messages are automatically generated.

  1. An extension of the OpenModelica compiler for using Modelica models in a discrete event simulation

    DOE PAGES

    Nutaro, James

    2014-11-03

    In this article, a new back-end and run-time system is described for the OpenModelica compiler. This new back-end transforms a Modelica model into a module for the adevs discrete event simulation package, thereby extending adevs to encompass complex, hybrid dynamical systems. The new run-time system that has been built within the adevs simulation package supports models with state-events and time-events and that comprise differential-algebraic systems with high index. Finally, although the procedure for effecting this transformation is based on adevs and the Discrete Event System Specification, it can be adapted to any discrete event simulation package.

  2. SERENITY in e-Business and Smart Item Scenarios

    NASA Astrophysics Data System (ADS)

    Benameur, Azzedine; Khoury, Paul El; Seguran, Magali; Sinha, Smriti Kumar

    SERENITY Artefacts, like Class, Patterns, Implementations and Executable Components for Security & Dependability (S&D) in addition to Serenity Runtime Framework (SRF) are discussed in previous chapters. How to integrate these artefacts with applications in Serenity approach is discussed here with two scenarios. The e-Business scenario is a standard loan origination process in a bank. The Smart Item scenario is an Ambient intelligence case study where we take advantage of Smart Items to provide an electronic healthcare infrastructure for remote healthcare assistance. In both cases, we detail how the prototype implementations of the scenarios select proper executable components through Serenity Runtime Framework and then demonstrate how these executable components of the S&D Patterns are deployed.

  3. Promoting African American women and sexual assertiveness in reducing HIV/AIDS: an analytical review of the research literature.

    PubMed

    Kennedy, Bernice Roberts; Jenkins, Chalice C

    2011-01-01

    African American women, including adolescents and adults, are disproportionately affected by the transmission of Human Immunodeficiency Virus (HIV) and Acquired Immunodeficiency Syndrome (AIDS). HIV/AID is a health disparity issue for African American females in comparison to other ethnic groups. According to data acquired from 33 states in 2005, 64% of women who have HIV/ AIDS are African American women. It is estimated that during 2001-2004, 61% of African Americans under the age of 25 had been living with HIV/AIDS. This article is an analytical review of the literature emphasizing sexual assertiveness of African American women and the gap that exists in research literature on this population. The multifaceted model of HIV risk posits that an interpersonal predictor of risky sexual behavior is sexual assertiveness. The critical themes extracted from a review of the literature reveal the following: (a) sexual assertiveness is related to HIV risk in women, (b) sexual assertiveness and sexual communication are related, and (c) women with low sexual assertiveness are at increased risk of HIV As a result of this comprehensive literature, future research studies need to use models in validating sexual assertiveness interventions in reducing the risk of HIV/AIDS in African American women. HIV/AIDs prevention interventions or future studies need to target reducing the risk factors of HIV/AIDS of African Americans focusing on gender and culture-specific strategies.

  4. An exploratory study of sexual assertiveness and characteristics of African American women in negotiating condom use at an HBCU.

    PubMed

    Jenkins, Chalice C; Kennedy, Bernice Roberts

    2013-01-01

    The transmission of HIV/AIDS among African American women through heterosexual sex is an epidemic. Critical themes extracted from the HIV/AIDS sexual assertiveness literature revealed that: (a) sexual assertiveness is related to HIV risk, (b) sexual assertiveness is related to communication, and (c) women with low sexual assertiveness are at risk for HIV. This descriptive study sought to answer the following research question: What do young adult college attending African American women self-report about asking information about their partner's sexual history? The multifaceted model of HIV risk is the theoretical framework which guided this descriptive study. A basic tenet of the multifaceted model of HIV risk is that there is no single predictor of women's HIV risk behavior. Results revealed that 104 young adult college attending African American women who volunteered to attend a one day HIV prevention training overall scored high on a Sexual Assertive Scale on subscales of Information Communication, Refusal, and Pregnancy/STD Prevention Subscale, and scored in the medium range on the Initiation Subscales. The Information Communication and Pregnancy/ STD Prevention Subscale received the highest scores. More research is needed targeting diverse African American females with different socioeconomic status, various locations, and educated to determine their sexual assertiveness with partners which are essential in developing specific programs for diverse groups of African American females.

  5. Assertiveness in Women Reporting Symptoms of Bulimia.

    ERIC Educational Resources Information Center

    Ruhl, Berenice; McCanne, Thomas R.

    It has been suggested that a lack of assertiveness may be an important component of the psychological make-up of bulimic women, and that bulimic women may experience particular difficulties in asserting themselves in interactions with men. In this study, 23 women reporting the symptoms of bulimia by high scores on the Bulimia Test (BULIT) and 21…

  6. Use of Hypnotherapy for Assertive Training and Behavioral Rehearsal: An Active Mode of Therapy.

    ERIC Educational Resources Information Center

    DeVoge, Susan D.

    This paper describes a treatment approach which uses hypnotherapy techniques in combination with assertive training and behavioral rehearsal. It discusses the use of this treatment with a client who exhibited psychogenic symptoms due to personal anxiety. At the beginning of the treatment the client was shy, non-assertive and extremely…

  7. Effects of Gender, Age, and Education on Assertiveness in a Nigerian Sample

    ERIC Educational Resources Information Center

    Onyeizugbo, Eucharia U.

    2003-01-01

    Two hundred fourteen (214) married persons, 101 men and 113 women aged 20-60, with at least high school education, participated in the study which investigated the effects of gender, age, and educational attainment on assertiveness among married persons in Nigeria. The Assertive Behavior Assessment scale (ABAS; Onyeizugbo, 1998) was used to…

  8. 32 CFR 537.9 - Assertion.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... STATES § 537.9 Assertion. (a) Asserting demands. If a prima facie claim exists under state law, a written...) Lost pay will be obtained from the leave or earnings statement or the active duty pay chart for the... did not receive either due to the length of time off assigned duty. The time off duty will be based on...

  9. Assertive Skills and Academic Performance in Primary and Secondary Education, Giftedness, and Conflictive Students

    ERIC Educational Resources Information Center

    Marugan de Miguelsanz, Montserrat; Carbonero Martin, Miguel Angel; Palazuelo Martinez, Ma Marcela

    2012-01-01

    Introduction: This study explores the level of assertiveness in various samples of students from Primary and Secondary Education. With the data obtained, on the one hand, we analyzed the relation between assertiveness and academic performance and, on the other, we verified whether students who are excluded from the norm, either because of their…

  10. A Factor Analytic Study of the Items in the Personal Report of Communication Apprehension and the Rathus Assertiveness Schedule.

    ERIC Educational Resources Information Center

    Pearson, Judy C.

    A study was undertaken to determine the relationship between assertiveness and communication apprehension by examining common factors that exist between the items on the Rathus Assertiveness Schedule and the Personal Report of Communication Apprehension. The two instruments were administered to students at a large midwestern university. Responses…

  11. Aggression, Assertion, and Openness to Experience: A Comparison of Men and Women

    ERIC Educational Resources Information Center

    Wyrick, Linda C.; And Others

    1977-01-01

    Investigates the degree of correlation between social constriction, i.e., lack of assertiveness as measured by the Bates-Zimmerman scale (1971), and assertiveness, as measured by the College Self-Expression Scale (1974) and further examines the relationship of scores on both of these scales to aggression/hostility as measured by the Buss-Durkee…

  12. "You Don't Have to Like Me, but You Have to Respect Me": The Impacts of Assertiveness, Cooperativeness, and Group Satisfaction in Collaborative Assignments

    ERIC Educational Resources Information Center

    Lambertz-Berndt, Megan M.; Blight, Michael G.

    2016-01-01

    This study investigates cooperativeness, assertiveness, group satisfaction, leader grade, and leadership negotiation in a collaborative assignment conducted in a small group. Researchers manipulated the assignment of team members who reported on measures of group satisfaction and original scales of assertiveness and cooperativeness. Respondents…

  13. Communication Skills for Career Success. A Programmed Textbook. Book II: Assertive Communication.

    ERIC Educational Resources Information Center

    Lombana, Judy H.; Pratt, Phillip A.

    This programmed text for self-study provides information on assertive communication in business. Part of a series of such texts, the book presents examples of familiar work situations involving interpersonal problems. The text then discusses each of the answers and explains why one or the other is appropriate for communicating assertively. Some of…

  14. Implications of Responsive Space on the Flight Software Architecture

    NASA Technical Reports Server (NTRS)

    Wilmot, Jonathan

    2006-01-01

    The Responsive Space initiative has several implications for flight software that need to be addressed not only within the run-time element, but the development infrastructure and software life-cycle process elements as well. The runtime element must at a minimum support Plug & Play, while the development and process elements need to incorporate methods to quickly generate the needed documentation, code, tests, and all of the artifacts required of flight quality software. Very rapid response times go even further, and imply little or no new software development, requiring instead, using only predeveloped and certified software modules that can be integrated and tested through automated methods. These elements have typically been addressed individually with significant benefits, but it is when they are combined that they can have the greatest impact to Responsive Space. The Flight Software Branch at NASA's Goddard Space Flight Center has been developing the runtime, infrastructure and process elements needed for rapid integration with the Core Flight software System (CFS) architecture. The CFS architecture consists of three main components; the core Flight Executive (cFE), the component catalog, and the Integrated Development Environment (DE). This paper will discuss the design of the components, how they facilitate rapid integration, and lessons learned as the architecture is utilized for an upcoming spacecraft.

  15. Traleika Glacier X-Stack Extension Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fryman, Joshua

    The XStack Extension Project continued along the direction of the XStack program in exploring the software tools and frameworks to support a task-based community runtime towards the goal of Exascale programming. The momentum built as part of the XStack project, with the development of the task-based Open Community Runtime (OCR) and related tools, was carried through during the XStack Extension with the focus areas of easing application development, improving performance and supporting more features. The infrastructure set up for a community-driven open-source development continued to be used towards these areas, with continued co-development of runtime and applications. A variety ofmore » OCR programming environments were studied, as described in Sections Revolutionary Programming Environments & Applications – to assist with application development on OCR, and we develop OCR Translator, a ROSE-based source-to-source compiler that parses high-level annotations in an MPI program to generate equivalent OCR code. Figure 2 compares the number of OCR objects needed to generate the 2D stencil workload using the translator, against manual approaches based on SPMD library or native coding. The rate of increase with the translator, with an increase in number of ranks, is consistent with other approaches. This is explored further in Section OCR Translator.« less

  16. Highly accurate fast lung CT registration

    NASA Astrophysics Data System (ADS)

    Rühaak, Jan; Heldmann, Stefan; Kipshagen, Till; Fischer, Bernd

    2013-03-01

    Lung registration in thoracic CT scans has received much attention in the medical imaging community. Possible applications range from follow-up analysis, motion correction for radiation therapy, monitoring of air flow and pulmonary function to lung elasticity analysis. In a clinical environment, runtime is always a critical issue, ruling out quite a few excellent registration approaches. In this paper, a highly efficient variational lung registration method based on minimizing the normalized gradient fields distance measure with curvature regularization is presented. The method ensures diffeomorphic deformations by an additional volume regularization. Supplemental user knowledge, like a segmentation of the lungs, may be incorporated as well. The accuracy of our method was evaluated on 40 test cases from clinical routine. In the EMPIRE10 lung registration challenge, our scheme ranks third, with respect to various validation criteria, out of 28 algorithms with an average landmark distance of 0.72 mm. The average runtime is about 1:50 min on a standard PC, making it by far the fastest approach of the top-ranking algorithms. Additionally, the ten publicly available DIR-Lab inhale-exhale scan pairs were registered to subvoxel accuracy at computation times of only 20 seconds. Our method thus combines very attractive runtimes with state-of-the-art accuracy in a unique way.

  17. Optimized distributed computing environment for mask data preparation

    NASA Astrophysics Data System (ADS)

    Ahn, Byoung-Sup; Bang, Ju-Mi; Ji, Min-Kyu; Kang, Sun; Jang, Sung-Hoon; Choi, Yo-Han; Ki, Won-Tai; Choi, Seong-Woon; Han, Woo-Sung

    2005-11-01

    As the critical dimension (CD) becomes smaller, various resolution enhancement techniques (RET) are widely adopted. In developing sub-100nm devices, the complexity of optical proximity correction (OPC) is severely increased and applied OPC layers are expanded to non-critical layers. The transformation of designed pattern data by OPC operation causes complexity, which cause runtime overheads to following steps such as mask data preparation (MDP), and collapse of existing design hierarchy. Therefore, many mask shops exploit the distributed computing method in order to reduce the runtime of mask data preparation rather than exploit the design hierarchy. Distributed computing uses a cluster of computers that are connected to local network system. However, there are two things to limit the benefit of the distributing computing method in MDP. First, every sequential MDP job, which uses maximum number of available CPUs, is not efficient compared to parallel MDP job execution due to the input data characteristics. Second, the runtime enhancement over input cost is not sufficient enough since the scalability of fracturing tools is limited. In this paper, we will discuss optimum load balancing environment that is useful in increasing the uptime of distributed computing system by assigning appropriate number of CPUs for each input design data. We will also describe the distributed processing (DP) parameter optimization to obtain maximum throughput in MDP job processing.

  18. Vision, knowledge, and assertion.

    PubMed

    Turri, John

    2016-04-01

    I report two experiments studying the relationship among explicit judgments about what people see, know, and should assert. When an object of interest was surrounded by visibly similar items, it diminished people's willingness to judge that an agent sees, knows, and should tell others that it is present. This supports the claim, made by many philosophers, that inhabiting a misleading environment intuitively decreases our willingness to attribute perception and knowledge. However, contrary to stronger claims made by some philosophers, inhabiting a misleading environment does not lead to the opposite pattern whereby people deny perception and knowledge. Causal modeling suggests a specific psychological model of how explicit judgments about perception, knowledge, and assertability are made: knowledge attributions cause perception attributions, which in turn cause assertability attributions. These findings advance understanding of how these three important judgments are made, provide new evidence that knowledge is the norm of assertion, and highlight some important subtleties in folk epistemology. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. Agoraphobia Related to Unassertiveness in Panic Disorder.

    PubMed

    Levitan, Michelle Nigri; Simoes, Pedro; Sardinha, Aline G; Nardi, Antonio E

    2016-05-01

    Despite developments in panic disorder (PD) research, a significant percentage of patients do not benefit from conventional treatments. Interpersonal factors have been identified as potential predictors of treatment failures. We aimed to evaluate assertiveness in a sample of patients with PD and its implications for treatment. Forty-six symptomatic patients with PD and 46 college students responded to assessment scales regarding assertiveness and clinical data. Seventy-five percent of the patients had a secondary diagnosis of agoraphobia. We found that the PD group was characterized as nonassertive and slightly less assertive than control subjects. Furthermore, the deficit in the level of assertiveness correlated with the severity of the PD. The diagnosis of agoraphobia was correlated with unassertiveness (p < 0.05). Agoraphobia predisposes individuals to dependency and insecurity about their ability to overcome anxiogenic situations. These data demonstrate the importance of managing assertiveness in patients with PD accompanied by agoraphobia.

  20. Mediators of sexual revictimization risk in adult sexual assault victims.

    PubMed

    Ullman, Sarah E; Vasquez, Amanda L

    2015-01-01

    This study examined sexual risk behaviors and sexual refusal assertiveness in relationship to child sexual abuse, emotion dysregulation, and adult sexual revictimization. Path analyses of 1,094 survivors who had sex in the past year were done to examine sexual risk behavior and sexual refusal assertiveness mediational pathways by which child sexual abuse severity and emotion dysregulation may affect revictimization over one year in adult female sexual assault survivors. Exchanging sex for money and sexual refusal assertiveness were significantly associated with emotion dysregulation, whereas exchanging sex for money, and not sexual refusal assertiveness, was only significantly related to child sexual abuse severity. Both exchanging sex for money and sex refusal assertiveness mediated the relationship between emotion dysregulation and adult sexual revictimization. Exchanging sex for money mediated the child sexual abuse severity-revictimization relationship. These findings demonstrate the importance of considering both risky and protective sexual behaviors in research and prevention programming that address sexual revictimization in women.

  1. Mediators of Sexual Revictimization Risk in Adult Sexual Assault Victims

    PubMed Central

    Ullman, Sarah E.; Vasquez, Amanda L.

    2015-01-01

    This study examined sexual risk behaviors and sexual refusal assertiveness in relationship to child sexual abuse (CSA), emotion dysregulation, and adult sexual revictimization. Path analyses of 1,094 survivors who had sex in the past year were done to examine sexual risk behavior, and sexual refusal assertiveness mediational pathways by which CSA severity and emotion dysregulation may affect revictimization over one year in adult female sexual assault survivors. Exchanging sex for money and sexual refusal assertiveness were significantly associated with emotion dysregulation, whereas exchanging sex for money, and not sexual refusal assertiveness, was only significantly related to CSA severity. Both exchanging sex for money and sex refusal assertiveness mediated the relationship between emotion dysregulation and adult sexual revictimization. Exchanging sex for money mediated the CSA severity-revictimization relationship. These findings demonstrate the importance of considering both risky and protective sexual behaviors in research and prevention programming that address sexual revictimization in women. PMID:25942287

  2. Goal preference shapes confrontations of sexism.

    PubMed

    Mallett, Robyn K; Melchiori, Kala J

    2014-05-01

    Although most women assume they would confront sexism, assertive responses are rare. We test whether women's preference for respect or liking during interpersonal interactions explains this surprising tendency. Women report preferring respect relative to liking after being asked sexist, compared with inappropriate, questions during a virtual job interview (Study 1, n = 149). Women's responses to sexism increase in assertiveness along with their preference for being respected, and a respect-preference mediates the relation between the type of questions and response assertiveness (Studies 1 and 2). In Study 2 (n = 105), women's responses to sexist questions are more assertive when the sense of belonging is enhanced with a belonging manipulation. Moreover, preference for respect mediates the effect of the type of questions on response assertiveness, but only when belonging needs are met. Thus the likelihood of confrontation depends on the goal to be respected outweighing the goal to be liked.

  3. Changes in women's assertiveness in response to status and roles: a cross-temporal meta-analysis, 1931-1993.

    PubMed

    Twenge, J M

    2001-07-01

    Across two meta-analyses, American women's assertiveness rose and fell with their social status from 1931 to 1993. College women and high school girls' self-reports on assertiveness and dominance scales increased from 1931 to 1945, decreased from 1946 to 1967, and increased from 1968 to 1993, explaining about 14% of the variance in the trait. Women's scores have increased enough that many recent samples show no sex differences in assertiveness. Correlations with social indicators (e.g., women's educational attainment, women's median age at first marriage) confirm that women's assertiveness varies with their status and roles. Social change is thus internalized in the form of a personality trait. Men's scores do not demonstrate a significant birth cohort effect overall. The results suggest that the changing sociocultural environment for women affected their personalities, most likely beginning in childhood.

  4. [Causal relationship between assertiveness and adjustment in children: A short-term longitudinal study].

    PubMed

    Eguchi, Megumi; Hamaguchi, Yoshikazu

    2015-08-01

    This study examined the causal relationships between assertiveness and both internal and external adjustment in children. Elementary school children in grades four through six (N = 284) participated in the study, which used a short-term longitudinal design. The children completed questionnaires twice during a 6-months period. They responded to assertiveness questionnaires that included two components: "self-expression" and "consideration of others". They also completed a self-esteem scale as an index of internal adjustment, and the Class Life Satisfaction scale as an index of external adjustment. There was a positive causative relationship between "self-expression" and internal adjustment and between "consideration for others" and external adjustment. In addition, the effects on adjustment varied according to the type of assertiveness. Cluster analysis and MANOVA indicated that the group with high "self-expression" and "consideration for others" had high internal and external adjustment, while the children with poor assertiveness showed the lowest degree of adaptivity.

  5. Validity of the Inventory of Interpersonal Problems (IIP-64) for predicting assertiveness in role-play situations.

    PubMed

    Leising, Daniel; Rehbein, Diana; Sporberg, Doreen

    2007-10-01

    The Inventory of Interpersonal Problems (IIP-64; Horowitz, Alden, Wiggins, & Pincus, 2000) is a self-report measure of maladaptive relationship behavior. Ninety-five adult female participants completed the IIP-64 and then interacted with a same-sex confederate in three diagnostic role plays, designed to evoke assertive responses. After each role play, both the participant and the confederate judged how assertive the participant had been, using two subscales from the Interpersonal Adjective Scales (IAS; Wiggins, 1995). The participants' general self-images, assessed with the IIP-64, were quite congruent with how they judged their own assertiveness in the role plays. But when role-play assertiveness was judged by the confederate, the match with the participants' general self-images was considerably lower. Our results indicate that self-reported interpersonal problems do not converge well with external judgments of interpersonal behavior.

  6. A Cross-Platform Infrastructure for Scalable Runtime Application Performance Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jack Dongarra; Shirley Moore; Bart Miller, Jeffrey Hollingsworth

    2005-03-15

    The purpose of this project was to build an extensible cross-platform infrastructure to facilitate the development of accurate and portable performance analysis tools for current and future high performance computing (HPC) architectures. Major accomplishments include tools and techniques for multidimensional performance analysis, as well as improved support for dynamic performance monitoring of multithreaded and multiprocess applications. Previous performance tool development has been limited by the burden of having to re-write a platform-dependent low-level substrate for each architecture/operating system pair in order to obtain the necessary performance data from the system. Manual interpretation of performance data is not scalable for large-scalemore » long-running applications. The infrastructure developed by this project provides a foundation for building portable and scalable performance analysis tools, with the end goal being to provide application developers with the information they need to analyze, understand, and tune the performance of terascale applications on HPC architectures. The backend portion of the infrastructure provides runtime instrumentation capability and access to hardware performance counters, with thread-safety for shared memory environments and a communication substrate to support instrumentation of multiprocess and distributed programs. Front end interfaces provides tool developers with a well-defined, platform-independent set of calls for requesting performance data. End-user tools have been developed that demonstrate runtime data collection, on-line and off-line analysis of performance data, and multidimensional performance analysis. The infrastructure is based on two underlying performance instrumentation technologies. These technologies are the PAPI cross-platform library interface to hardware performance counters and the cross-platform Dyninst library interface for runtime modification of executable images. The Paradyn and KOJAK projects have made use of this infrastructure to build performance measurement and analysis tools that scale to long-running programs on large parallel and distributed systems and that automate much of the search for performance bottlenecks.« less

  7. Bayesian Model Selection under Time Constraints

    NASA Astrophysics Data System (ADS)

    Hoege, M.; Nowak, W.; Illman, W. A.

    2017-12-01

    Bayesian model selection (BMS) provides a consistent framework for rating and comparing models in multi-model inference. In cases where models of vastly different complexity compete with each other, we also face vastly different computational runtimes of such models. For instance, time series of a quantity of interest can be simulated by an autoregressive process model that takes even less than a second for one run, or by a partial differential equations-based model with runtimes up to several hours or even days. The classical BMS is based on a quantity called Bayesian model evidence (BME). It determines the model weights in the selection process and resembles a trade-off between bias of a model and its complexity. However, in practice, the runtime of models is another weight relevant factor for model selection. Hence, we believe that it should be included, leading to an overall trade-off problem between bias, variance and computing effort. We approach this triple trade-off from the viewpoint of our ability to generate realizations of the models under a given computational budget. One way to obtain BME values is through sampling-based integration techniques. We argue with the fact that more expensive models can be sampled much less under time constraints than faster models (in straight proportion to their runtime). The computed evidence in favor of a more expensive model is statistically less significant than the evidence computed in favor of a faster model, since sampling-based strategies are always subject to statistical sampling error. We present a straightforward way to include this misbalance into the model weights that are the basis for model selection. Our approach follows directly from the idea of insufficient significance. It is based on a computationally cheap bootstrapping error estimate of model evidence and is easy to implement. The approach is illustrated in a small synthetic modeling study.

  8. Assertive outreach handbook will aid mental health staff in maintaining client engagement.

    PubMed

    Gregory, Nathan; Macpherson, Rob

    The model of assertive outreach is one of the most internationally researched areas of community mental healthcare. An assertive outreach team at a mental health trust developed a handbook on the model, involving contributions from service users, carers, local clinicians and the voluntary sector. This article outlines the process of developing the handbook, summarises its content and user feedback.

  9. Aspect-Oriented Programming is Quantification and Implicit Invocation

    NASA Technical Reports Server (NTRS)

    Filman, Robert E.; Friedman, Daniel P.; Koga, Dennis (Technical Monitor)

    2001-01-01

    We propose that the distinguishing characteristic of Aspect-Oriented Programming (AOP) languages is that they allow programming by making quantified programmatic assertions over programs that lack local notation indicating the invocation of these assertions. This suggests that AOP systems can be analyzed with respect to three critical dimensions: the kinds of quantifications allowed, the nature of the interactions that can be asserted, and the mechanism for combining base-level actions with asserted actions. Consequences of this perspective are the recognition that certain systems are not AOP and that some mechanisms are metabolism: they are sufficiently expressive to allow straightforwardly programming an AOP system within them.

  10. Apparatus for controlling system state based on unique identifiers

    DOEpatents

    Drotning, William D.

    2002-01-01

    An apparatus allows workers to assert and release control over the energization of a system. The apparatus does not require the workers to carry any additional paraphernalia, and is not be easily defeated by other workers. Users asserting and releasing control present tokens uniquely identifying each user to a reader, and the apparatus prevents transition of the system to an undesired state until an appropriate number of users are currently asserting control. For example, a dangerous manufacturing robot can be prevented from energizing until all the users that have asserted control when entering the robot's controlled space have subsequently released control when leaving the robot's controlled space.

  11. Perceived and Actual Behavior in Female Sexual Assertiveness: A Within-Couple Analysis in Hong Kong.

    PubMed

    Zhang, Huiping; Yip, Paul S F

    2018-01-02

    Studies in female sexual assertiveness have generally focused on individuals rather than couples, and little research has been conducted in the Chinese context. This study examined perceived and actual female sexual assertiveness at the couple level, and also explored its impact on marital and sexual satisfaction with a representative sample of 770 couples in Hong Kong. The results showed that husbands reported a higher level of acceptance of female sexual assertiveness in both perception and actual behavior; furthermore, couples reported greater congruence in their perception of female sexual initiation than actual behavior. Multiple logistic regressions showed that actual female sexual assertiveness, not the perception of it, affects both spouses' marital and sexual satisfaction. Compared with couples in which neither accepted female sexual initiation in practice, husbands where both spouses accepted this were more likely to be satisfied with the marriage. Husbands who accepted female sexual refusal whilst their wives did not were also more likely to be satisfied with both the marital and sexual relationship. Similarly, wives who did accept female sexual assertiveness but whose husbands did not were more likely to be satisfied with both the marital and sexual relationship.

  12. Speaking up about Lighting up in Public: Examining Psychosocial Correlates of Smoking and Vaping Assertive Communication Intentions among U.S. Adults.

    PubMed

    Bigman, Cabral A; Mello, Susan; Sanders-Jackson, Ashley; Tan, Andy S L

    2018-01-24

    Against a backdrop of increasing smoke-free policies, electronic cigarette use, and discussion about public health risks posed by smoking and vaping, this study examines psychosocial predictors of intentions to ask others not to use e-cigarettes (vape) and smoke - i.e., assertive communication intentions. A national sample of U.S. adults (n = 474) reported assertive communication intentions for public venues. Psychosocial correlates included perceived risks of exposure to secondhand smoke (SHSe) and secondhand vapor (SHVe), SHSe and SHVe attitudes, subjective norms, and perceived self-efficacy. Separate linear regression models were conducted for smoking and vaping assertive communication intention outcomes. Perceived risks and self-efficacy were associated with greater vaping and smoking assertive communication intentions; subjective norms were only significant for vaping assertive communication intentions. Although a majority of respondents indicated they were unlikely to intervene to voice objections about SHSe and SHVe in public venues, this study suggests that incidental or intentional messages and policies that influence perceptions of risk, norms, and efficacy could affect willingness to voice objections about others' vaping and smoking in public.

  13. Rape myth acceptance and rape acknowledgment: The mediating role of sexual refusal assertiveness.

    PubMed

    Newins, Amie R; Wilson, Laura C; White, Susan W

    2018-05-01

    Unacknowledged rape, defined as when an individual experiences an event that meets a legal or empirical definition of rape but the individual does not label it as such, is prevalent. Research examining predictors of rape acknowledgment is needed. Sexual assertiveness may be an important variable to consider, as an individual's typical behavior during sexual situations may influence rape acknowledgment. To assess the indirect effect of rape myth acceptance on rape acknowledgment through sexual refusal assertiveness, an online survey of 181 female rape survivors was conducted. The indirect effects of two types of rape myths (He didn't mean to and Rape is a deviant event) were significant and positive. Specifically, acceptance of these two rape myths was negatively related to sexual refusal assertiveness, which was negatively associated with likelihood of rape acknowledgment. The results of this study indicate that sexual refusal assertiveness is associated with lower likelihood of rape acknowledgment among rape survivors. As a result, it appears that, under certain circumstances, women high in rape myth acceptance may be more likely to acknowledge rape when it results in decreased sexual refusal assertiveness. Copyright © 2018 Elsevier B.V. All rights reserved.

  14. The role of self-efficacy and assertiveness in aggression among high-school students in Isfahan.

    PubMed

    Khademi Mofrad, S H; Mehrabi, T

    2015-01-01

    Background. Nowadays, one sixth of the world's population is represented by adolescents, nearly 1.2 billion people being of age 10-19. According to the 2011 census in Iran, the estimation of adolescent population was 12 million, which represents 16% of the Iran population. Undoubtedly, adolescence is the most dominant stage of life. During this period, adolescents face biological, cognitive, and emotional changes that may be accompanied by inappropriate behavioral responses such as aggression. Considering pressures of peer groups during adolescence, assertiveness has an important role as a social skill. It seems that the success of adolescents in dealing with these problems depends on their self-efficacy. This study was designed to explore the role of self-efficacy and assertiveness in aggression among high-school students. Material and methods. This cross-sectional and correlational study was conducted among 321 first grade high-school students during 2014 and 2015. Samples were extracted from six education and training regions by a multi-stage random sampling. In this study, the questionnaire included demographic, Rathus Assertiveness, self-efficacy for children and aggression data. Results. The results showed that there was a notable negative association between aggression and assertiveness (p < 0.003) and also between assault and self-efficacy (p < 0.001). Conclusions. An increase in assertiveness and self-efficacy resulted in a decrease of aggression. So, training was recommended to reinforce self-efficacy beliefs and assertiveness behaviors for mental health promotion.

  15. The role of self-efficacy and assertiveness in aggression among high-school students in Isfahan

    PubMed Central

    Khademi Mofrad, SH; Mehrabi, T

    2015-01-01

    Background. Nowadays, one sixth of the world’s population is represented by adolescents, nearly 1.2 billion people being of age 10-19. According to the 2011 census in Iran, the estimation of adolescent population was 12 million, which represents 16% of the Iran population. Undoubtedly, adolescence is the most dominant stage of life. During this period, adolescents face biological, cognitive, and emotional changes that may be accompanied by inappropriate behavioral responses such as aggression. Considering pressures of peer groups during adolescence, assertiveness has an important role as a social skill. It seems that the success of adolescents in dealing with these problems depends on their self-efficacy. This study was designed to explore the role of self-efficacy and assertiveness in aggression among high-school students. Material and methods. This cross-sectional and correlational study was conducted among 321 first grade high-school students during 2014 and 2015. Samples were extracted from six education and training regions by a multi-stage random sampling. In this study, the questionnaire included demographic, Rathus Assertiveness, self-efficacy for children and aggression data. Results. The results showed that there was a notable negative association between aggression and assertiveness (p < 0.003) and also between assault and self-efficacy (p < 0.001). Conclusions. An increase in assertiveness and self-efficacy resulted in a decrease of aggression. So, training was recommended to reinforce self-efficacy beliefs and assertiveness behaviors for mental health promotion. PMID:28316736

  16. Normative studies with the Scale for Interpersonal Behaviour (SIB): II. US students. A cross-cultural comparison with Dutch data.

    PubMed

    Arrindell, W A; Bridges, K R; van der Ende, J; St Lawrence, J S; Gray-Shellberg, L; Harnish, R; Rogers, R; Sanderman, R

    2001-12-01

    The Scale for Interpersonal Behaviour (SIB), a multidimensional, self-report measure of state assertiveness, was administered to a nationwide sample of 2375 undergraduates enrolled at 11 colleges and universities across the USA. The SIB was developed in the Netherlands for the independent assessment of both distress associated with self-assertion in a variety of social situations and the likelihood of engaging in a specific assertive response. This is done with four factorially-derived, first-order dimensions: (i) Display of negative feelings (Negative assertion); (ii) Expression of and dealing with personal limitations; (iii) Initiating assertiveness; and (iv) Praising others and the ability to deal with compliments/praise of others (Positive assertion). The present study was designed to determine the cross-national invariance of the original Dutch factors and the construct validity of the corresponding dimensions. It also set out to develop norms for a nationwide sample of US students. The results provide further support for the reliability, factorial and construct validity of the SIB. Compared to their Dutch equivalents, US students had meaningfully higher distress in assertiveness scores on all SIB scales (medium to large effect sizes), whereas differences on the performance scales reflected small effect sizes. The cross-national differences in distress scores were hypothesized to have originated from the American culture being more socially demanding with respect to interpersonal competence than the Dutch, and from the perceived threats and related cognitive appraisals that are associated with such demands.

  17. Reducing False Positives in Runtime Analysis of Deadlocks

    NASA Technical Reports Server (NTRS)

    Bensalem, Saddek; Havelund, Klaus; Clancy, Daniel (Technical Monitor)

    2002-01-01

    This paper presents an improvement of a standard algorithm for detecting dead-lock potentials in multi-threaded programs, in that it reduces the number of false positives. The standard algorithm works as follows. The multi-threaded program under observation is executed, while lock and unlock events are observed. A graph of locks is built, with edges between locks symbolizing locking orders. Any cycle in the graph signifies a potential for a deadlock. The typical standard example is the group of dining philosophers sharing forks. The algorithm is interesting because it can catch deadlock potentials even though no deadlocks occur in the examined trace, and at the same time it scales very well in contrast t o more formal approaches to deadlock detection. The algorithm, however, can yield false positives (as well as false negatives). The extension of the algorithm described in this paper reduces the amount of false positives for three particular cases: when a gate lock protects a cycle, when a single thread introduces a cycle, and when the code segments in different threads that cause the cycle can actually not execute in parallel. The paper formalizes a theory for dynamic deadlock detection and compares it to model checking and static analysis techniques. It furthermore describes an implementation for analyzing Java programs and its application to two case studies: a planetary rover and a space craft altitude control system.

  18. The DaveMLTranslator: An Interface for DAVE-ML Aerodynamic Models

    NASA Technical Reports Server (NTRS)

    Hill, Melissa A.; Jackson, E. Bruce

    2007-01-01

    It can take weeks or months to incorporate a new aerodynamic model into a vehicle simulation and validate the performance of the model. The Dynamic Aerospace Vehicle Exchange Markup Language (DAVE-ML) has been proposed as a means to reduce the time required to accomplish this task by defining a standard format for typical components of a flight dynamic model. The purpose of this paper is to describe an object-oriented C++ implementation of a class that interfaces a vehicle subsystem model specified in DAVE-ML and a vehicle simulation. Using the DaveMLTranslator class, aerodynamic or other subsystem models can be automatically imported and verified at run-time, significantly reducing the elapsed time between receipt of a DAVE-ML model and its integration into a simulation environment. The translator performs variable initializations, data table lookups, and mathematical calculations for the aerodynamic build-up, and executes any embedded static check-cases for verification. The implementation is efficient, enabling real-time execution. Simple interface code for the model inputs and outputs is the only requirement to integrate the DaveMLTranslator as a vehicle aerodynamic model. The translator makes use of existing table-lookup utilities from the Langley Standard Real-Time Simulation in C++ (LaSRS++). The design and operation of the translator class is described and comparisons with existing, conventional, C++ aerodynamic models of the same vehicle are given.

  19. Malware detection and analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chiang, Ken; Lloyd, Levi; Crussell, Jonathan

    Embodiments of the invention describe systems and methods for malicious software detection and analysis. A binary executable comprising obfuscated malware on a host device may be received, and incident data indicating a time when the binary executable was received and identifying processes operating on the host device may be recorded. The binary executable is analyzed via a scalable plurality of execution environments, including one or more non-virtual execution environments and one or more virtual execution environments, to generate runtime data and deobfuscation data attributable to the binary executable. At least some of the runtime data and deobfuscation data attributable tomore » the binary executable is stored in a shared database, while at least some of the incident data is stored in a private, non-shared database.« less

  20. Generalizing the extensibility of a dynamic geometry software

    NASA Astrophysics Data System (ADS)

    Herceg, Đorđe; Radaković, Davorka; Herceg, Dejana

    2012-09-01

    Plug-and-play visual components in a Dynamic Geometry Software (DGS) enable development of visually attractive, rich and highly interactive dynamic drawings. We are developing SLGeometry, a DGS that contains a custom programming language, a computer algebra system (CAS engine) and a graphics subsystem. The basic extensibility framework on SLGeometry supports dynamic addition of new functions from attribute annotated classes that implement runtime metadata registration in code. We present a general plug-in framework for dynamic importing of arbitrary Silverlight user interface (UI) controls into SLGeometry at runtime. The CAS engine maintains a metadata storage that describes each imported visual component and enables two-way communication between the expressions stored in the engine and the UI controls on the screen.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Collins, Benjamin S.; Hamilton, Steven P.; Jarrett, Michael G.

    This report describes the performance improvements made to the VERA Core Simulator (VERA-CS) during FY2016. The development of the VERA Core Simulator has focused on the capability needed to deplete physical reactors and help solve various problems; this capability required the accurate simulation of many operating cycles of a nuclear power plant. The first section of this report introduces two test problems used to assess the run-time performance of VERA-CS using a source dated February 2016. The next section provides a brief overview of the major modifications made to decrease the computational cost. Following the descriptions of the major improvements,more » the run-time for each improvement is shown. Conclusions on the work are presented, and further follow-on performance improvements are suggested.« less

  2. Fiia: A Model-Based Approach to Engineering Collaborative Augmented Reality

    NASA Astrophysics Data System (ADS)

    Wolfe, Christopher; Smith, J. David; Phillips, W. Greg; Graham, T. C. Nicholas

    Augmented reality systems often involve collaboration among groups of people. While there are numerous toolkits that aid the development of such augmented reality groupware systems (e.g., ARToolkit and Groupkit), there remains an enormous gap between the specification of an AR groupware application and its implementation. In this chapter, we present Fiia, a toolkit which simplifies the development of collaborative AR applications. Developers specify the structure of their applications using the Fiia modeling language, which abstracts details of networking and provides high-level support for specifying adapters between the physical and virtual world. The Fiia.Net runtime system then maps this conceptual model to a runtime implementation. We illustrate Fiia via Raptor, an augmented reality application used to help small groups collaboratively prototype video games.

  3. GPU accelerated FDTD solver and its application in MRI.

    PubMed

    Chi, J; Liu, F; Jin, J; Mason, D G; Crozier, S

    2010-01-01

    The finite difference time domain (FDTD) method is a popular technique for computational electromagnetics (CEM). The large computational power often required, however, has been a limiting factor for its applications. In this paper, we will present a graphics processing unit (GPU)-based parallel FDTD solver and its successful application to the investigation of a novel B1 shimming scheme for high-field magnetic resonance imaging (MRI). The optimized shimming scheme exhibits considerably improved transmit B(1) profiles. The GPU implementation dramatically shortened the runtime of FDTD simulation of electromagnetic field compared with its CPU counterpart. The acceleration in runtime has made such investigation possible, and will pave the way for other studies of large-scale computational electromagnetic problems in modern MRI which were previously impractical.

  4. An Investigation of High School Seniors' Assertiveness Levels Based on Their Demographic Characteristics

    ERIC Educational Resources Information Center

    Çam, Ibrahim

    2015-01-01

    High school students who are in the development age or in the last class and have chance to win the university exams or disposal stage of the business life must also have a high level of assertiveness. In this context, the purpose of this research is to compare the assertiveness levels of high school seniors. The study group consists of 312 high…

  5. Aspect-Oriented Programming is Quantification and Obliviousness

    NASA Technical Reports Server (NTRS)

    Filman, Robert E.; Friedman, Daniel P.; Norvig, Peter (Technical Monitor)

    2000-01-01

    This paper proposes that the distinguishing characteristic of Aspect-Oriented Programming (AOP) systems is that they allow programming by making quantified programmatic assertions over programs written by programmers oblivious to such assertions. Thus, AOP systems can be analyzed with respect to three critical dimensions: the kinds of quantifications allowed, the nature of the actions that can be asserted, and the mechanism for combining base-level actions with asserted actions. Consequences of this perspective are the recognition that certain systems are not AOP and that some mechanisms are expressive enough to allow programming an AOP system within them. A corollary is that while AOP can be applied to Object-Oriented Programming, it is an independent concept applicable to other programming styles.

  6. Agoraphobics' interpersonal problems. Their role in the effects of exposure in vivo therapy.

    PubMed

    Emmelkamp, P M

    1980-11-01

    The effects of self-controlled exposure in vivo therapy were compared between assertive and unassertive agoraphobics and between agoraphobics with high and low marital satisfaction. Assessments were made at the pretest, at the posttest after four therapy sessions, and at the follow-up one month later. Assessments were carried out by the therapist, by an independent observer, and by the patient. No significant differences were found between the groups with high and low marital satisfaction. The only significant difference between the groups with high and low assertiveness was shown at the posstest by the phobic anxiety scale; compared with high assertive patients, low assertive patients improved more.

  7. [Evaluation of the factorial and metric equivalence of the Sexual Assertiveness Scale (SAS) by sex].

    PubMed

    Sierra, Juan Carlos; Santos-Iglesias, Pablo; Vallejo-Medina, Pablo

    2012-05-01

    Sexual assertiveness refers to the ability to initiate sexual activity, refuse unwanted sexual activity, and use contraceptive methods to avoid sexually transmitted diseases, developing healthy sexual behaviors. The Sexual Assertiveness Scale (SAS) assesses these three dimensions. The purpose of this study is to evaluate, using structural equation modeling and differential item functioning, the equivalence of the scale between men and women. Standard scores are also provided. A total of 4,034 participants from 21 Spanish provinces took part in the study. Quota sampling method was used. Results indicate a strict equivalent dimensionality of the Sexual Assertiveness Scale across sexes. One item was flagged by differential item functioning, although it does not affect the scale. Therefore, there is no significant bias in the scale when comparing across sexes. Standard scores show similar Initiation assertiveness scores for men and women, and higher scores on Refusal and Sexually Transmitted Disease Prevention for women. This scale can be used on men and women with sufficient psychometric guarantees.

  8. Assertiveness levels of nursing students who experience verbal violence during practical training.

    PubMed

    Unal, Sati; Hisar, Filiz; Görgülü, Ulkü

    2012-08-01

    The aim of the study was to investigate students' verbal violence experiences, the effect of assertiveness on being subjected to violence, the behaviour of students after the violence and the experience of psychological distress during practical training. The study sample consisted of 274 students attending a school of nursing. A questionnaire form and the Rathus Assertiveness Schedule (RAS) were used for data collection. Percentages, means and the independent samples t-test were used for the evaluation of data. During practical training, the students suffered verbal violence from teachers, department nurses and doctors. The students had higher mean scores of RAS for most types of violence committed by the teachers and being reprimanded by the nurses and 69.3% had not responded to the violence. Students with a high level of assertiveness are subjected to violence more frequently. Being subjected to verbal violence and feeling psychological distress during practical training are a major problem among nursing students. Students should be supported in terms of assertiveness and dealing with violence effectively.

  9. Assertiveness.

    PubMed

    Chambers, David W

    2009-01-01

    Assertiveness means speaking up for one's interpersonal freedoms or as required by one's role responsibilities to engage others in finding viable, stable solutions. Assertiveness is a learnable skill rather than a personality characteristic. The first step in assertiveness is recognizing the nature of one's problem in order to avoid the objectionable and usually ineffective practice of trying to solve other people's problems. A simple assertive approach is to suggest a solution. A more structured technique involves identifying the behavior that is causing a problem and expressing one's feelings about the problem (I-messages). The most powerful technique combines portions of suggested solutions and I-messages with a clear statement of consequences (DESC scripts). Although there may be a small number of circumstances where they are appropriate, acquiescence (temporarily forgoing one's interpersonal freedoms or role responsibilities) or aggression (insisting on one's own solution to the detriment of others) have several disadvantages. An example of justifiable criticism in the case of recognized gross or continuous faulty work by another dentist is presented.

  10. [Relationship between assertiveness including consideration for others and adjustment in children].

    PubMed

    Eguchi, Megumi; Hamaguchi, Yoshikazu

    2012-06-01

    The relationship between assertiveness and internal and external adjustment was investigated. Elementary school children in grades four to six (n=207) and their classroom teachers (n=8) participated in the study. Internal and external adjustments were measured by using self-ratings, and self- and other- ratings respectively. The children responded to a questionnaires inquiring about assertiveness that included two components of assessment: "self expression" and "consideration for others". Then, the children were divided into 4 groups according to their scores on these two components of assertiveness. The results indicated that children scoring high on both components of assertiveness had higher self-rating scores than those scoring low on both components. Moreover, children that scored high on "consideration for others" tended to have high external adjustment. Also, boys that scored low on "self expression" had lower external adjustment as indicated by the negative ratings of teachers. Furthermore, girls that scored high on "consideration for others" had high external adjustment as indicated by positive ratings of teachers and same-sexed classmates.

  11. Two heretical thoughts on fusion and climate

    NASA Astrophysics Data System (ADS)

    Manheimer, Wallace

    2016-10-01

    This presents and explores 2 heretical thoughts regarding controlled fusion and climate. First, the only way that fusion can contribute to midcentury power is by switching its goal from pure fusion, to fusion breeding. Fusion breeding makes many fewer demands on the fusion device than does pure fusion. Fusion breeding could lead to a sustainable, carbon free, environmentally and economically viable, midcentury infrastructure, with little or no proliferation risk, which could provide terawatts of power for the world. The second involves climate. We are all inundated by media warnings, not only of warming from CO2 in the atmosphere, but all sorts of other environmental disasters. For instance there will be more intense storms, rising sea levels, wild fires, retreating glaciers, droughts, loss of agricultural productivity... These assertions are very easy to check out. Such a search shows that we are nowhere near any sort of environmental crisis. The timing could be serendipitous; the time necessary to develop fusion breeding could well match up to the time when it is needed so as to avoid harm to the earth's climate and/or depletion of finite energy resources.

  12. Check it! A randomized pilot of a positive psychology intervention to improve adherence in adolescents with type 1 diabetes.

    PubMed

    Jaser, Sarah S; Patel, Niral; Rothman, Russell L; Choi, Leena; Whittemore, Robin

    2014-01-01

    The purpose of the current study was to pilot-test a positive psychology intervention to improve adherence to diabetes management in adolescents with type 1 diabetes. A total of 39 adolescents (ages, 13-17 years) with type 1 diabetes and their caregivers were randomized to a positive psychology intervention (n = 20) or an attention control (education) intervention (n = 19). The intervention condition used positive psychology exercises (eg, gratitude, self-affirmation), small gifts, and parent affirmations to boost positive affect. Outcomes included frequency of blood glucose monitoring, quality of life, and glycemic control. No main effects for treatment were observed at the 6-month follow-up. However, there was a significant association between adolescents' levels of positive affect and measures of adherence, including self-report and meter downloads of glucose monitoring. The results from the current study support the assertion that positive affect in the context of diabetes education is an important factor to consider in adolescents with type 1 diabetes. © 2014 The Author(s).

  13. Perceptions of sexual assertiveness among adolescent girls: initiation, refusal, and use of protective behaviors.

    PubMed

    Auslander, Beth A; Perfect, Michelle M; Succop, Paul A; Rosenthal, Susan L

    2007-06-01

    We describe adolescent girls' perceptions of sexual assertiveness and examine the relationship of these perceptions with developmental and interpersonal variables. Cross-sectional analysis. Participants were recruited from a school-based health clinic and local colleges, and through snowballing to participate in a 6-month study examining microbicide acceptability. 106 sexually experienced girls (ages 14 through 21 years). Girls described their demographics, sexual history, and romantic relationships and completed the Sexual Assertiveness Scale for Women (SAS-W), which assesses perceptions of sexual assertiveness: Initiation of Sex, Refusal of Unwanted Sex, and Pregnancy-STD Prevention. Girls perceived themselves as asserting themselves between 50% and 75% of the time with their current or most recent partner. The Initiation subscale was not related to the other two subscales. In final models, girls with a prior pregnancy perceived themselves as initiating sex more than girls without a prior pregnancy. Having a greater number of lifetime partners was related to perceptions of less refusal, whereas greater number of partners, being sexually experienced longer, and engaging in more unprotected sex were related to perceptions of less implementation of preventive methods. None of the relationship variables were related to scores on any subscale. Most of these girls perceived themselves as sexually assertive. Given that sexual experience, not relationship factors, were related to perceptions of sexual assertiveness, the design of counseling messages should incorporate sexual experience. These messages should find effective ways to help girls both to communicate their sexual desires and to enhance their ability to protect themselves.

  14. Perceptions of Sexual Assertiveness among Adolescent Girls: Initiation, Refusal, and Use of Protective Behaviors

    PubMed Central

    Auslander, Beth A.; Perfect, Michelle M.; Succop, Paul A.; Rosenthal, Susan L.

    2007-01-01

    Study Objective: We describe adolescent girls' perceptions of sexual assertiveness and examine the relationship of these perceptions with developmental and interpersonal variables. Design: Cross-sectional analysis Setting: Participants were recruited from a school-based health clinic, local colleges, and through snowballing to participate in a 6-month study examining microbicide acceptability. Participants: 106 sexually experienced girls (ages 14 through 21 years). Methods: Girls described their demographics, sexual history, and romantic relationships and completed the Sexual Assertiveness Scale for Women (SAS-W), which assesses perceptions of sexual assertiveness: Initiation of Sex, Refusal of Unwanted Sex, and Pregnancy-STD Prevention. Results: Girls perceived themselves as asserting themselves between 50 and 75% of the time with their current or most recent partner. The Initiation subscale was not related to the other two subscales. In final models, girls with a prior pregnancy perceived themselves as initiating sex more than girls without a prior pregnancy. Having a greater number of lifetime partners was related to perceptions of less refusal and greater number of partners, being sexually experienced longer, and engaging in more unprotected sex were related to perceptions of less implementation of preventive methods. None of the relationship variables were related to scores on any subscale. Conclusions: Most of these girls perceived themselves as sexually assertive. Given that sexual experience not relationship factors were related to perceptions of sexual assertiveness, the design of counseling messages should incorporate sexual experience. These messages should find effective ways to help girls communicate both their sexual desires and enhance their ability to protect themselves. PMID:17561183

  15. Parallel Clustering Algorithm for Large-Scale Biological Data Sets

    PubMed Central

    Wang, Minchao; Zhang, Wu; Ding, Wang; Dai, Dongbo; Zhang, Huiran; Xie, Hao; Chen, Luonan; Guo, Yike; Xie, Jiang

    2014-01-01

    Backgrounds Recent explosion of biological data brings a great challenge for the traditional clustering algorithms. With increasing scale of data sets, much larger memory and longer runtime are required for the cluster identification problems. The affinity propagation algorithm outperforms many other classical clustering algorithms and is widely applied into the biological researches. However, the time and space complexity become a great bottleneck when handling the large-scale data sets. Moreover, the similarity matrix, whose constructing procedure takes long runtime, is required before running the affinity propagation algorithm, since the algorithm clusters data sets based on the similarities between data pairs. Methods Two types of parallel architectures are proposed in this paper to accelerate the similarity matrix constructing procedure and the affinity propagation algorithm. The memory-shared architecture is used to construct the similarity matrix, and the distributed system is taken for the affinity propagation algorithm, because of its large memory size and great computing capacity. An appropriate way of data partition and reduction is designed in our method, in order to minimize the global communication cost among processes. Result A speedup of 100 is gained with 128 cores. The runtime is reduced from serval hours to a few seconds, which indicates that parallel algorithm is capable of handling large-scale data sets effectively. The parallel affinity propagation also achieves a good performance when clustering large-scale gene data (microarray) and detecting families in large protein superfamilies. PMID:24705246

  16. Flow-Centric, Back-in-Time Debugging

    NASA Astrophysics Data System (ADS)

    Lienhard, Adrian; Fierz, Julien; Nierstrasz, Oscar

    Conventional debugging tools present developers with means to explore the run-time context in which an error has occurred. In many cases this is enough to help the developer discover the faulty source code and correct it. However, rather often errors occur due to code that has executed in the past, leaving certain objects in an inconsistent state. The actual run-time error only occurs when these inconsistent objects are used later in the program. So-called back-in-time debuggers help developers step back through earlier states of the program and explore execution contexts not available to conventional debuggers. Nevertheless, even Back-in-Time Debuggers do not help answer the question, “Where did this object come from?” The Object-Flow Virtual Machine, which we have proposed in previous work, tracks the flow of objects to answer precisely such questions, but this VM does not provide dedicated debugging support to explore faulty programs. In this paper we present a novel debugger, called Compass, to navigate between conventional run-time stack-oriented control flow views and object flows. Compass enables a developer to effectively navigate from an object contributing to an error back-in-time through all the code that has touched the object. We present the design and implementation of Compass, and we demonstrate how flow-centric, back-in-time debugging can be used to effectively locate the source of hard-to-find bugs.

  17. SARANA: language, compiler and run-time system support for spatially aware and resource-aware mobile computing.

    PubMed

    Hari, Pradip; Ko, Kevin; Koukoumidis, Emmanouil; Kremer, Ulrich; Martonosi, Margaret; Ottoni, Desiree; Peh, Li-Shiuan; Zhang, Pei

    2008-10-28

    Increasingly, spatial awareness plays a central role in many distributed and mobile computing applications. Spatially aware applications rely on information about the geographical position of compute devices and their supported services in order to support novel functionality. While many spatial application drivers already exist in mobile and distributed computing, very little systems research has explored how best to program these applications, to express their spatial and temporal constraints, and to allow efficient implementations on highly dynamic real-world platforms. This paper proposes the SARANA system architecture, which includes language and run-time system support for spatially aware and resource-aware applications. SARANA allows users to express spatial regions of interest, as well as trade-offs between quality of result (QoR), latency and cost. The goal is to produce applications that use resources efficiently and that can be run on diverse resource-constrained platforms ranging from laptops to personal digital assistants and to smart phones. SARANA's run-time system manages QoR and cost trade-offs dynamically by tracking resource availability and locations, brokering usage/pricing agreements and migrating programs to nodes accordingly. A resource cost model permeates the SARANA system layers, permitting users to express their resource needs and QoR expectations in units that make sense to them. Although we are still early in the system development, initial versions have been demonstrated on a nine-node system prototype.

  18. Detecting Payload Attacks on Programmable Logic Controllers (PLCs)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan

    Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less

  19. Empirical Evaluation of Conservative and Optimistic Discrete Event Execution on Cloud and VM Platforms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yoginath, Srikanth B; Perumalla, Kalyan S

    2013-01-01

    Virtual machine (VM) technologies, especially those offered via Cloud platforms, present new dimensions with respect to performance and cost in executing parallel discrete event simulation (PDES) applications. Due to the introduction of overall cost as a metric, the choice of the highest-end computing configuration is no longer the most economical one. Moreover, runtime dynamics unique to VM platforms introduce new performance characteristics, and the variety of possible VM configurations give rise to a range of choices for hosting a PDES run. Here, an empirical study of these issues is undertaken to guide an understanding of the dynamics, trends and trade-offsmore » in executing PDES on VM/Cloud platforms. Performance results and cost measures are obtained from actual execution of a range of scenarios in two PDES benchmark applications on the Amazon Cloud offerings and on a high-end VM host machine. The data reveals interesting insights into the new VM-PDES dynamics that come into play and also leads to counter-intuitive guidelines with respect to choosing the best and second-best configurations when overall cost of execution is considered. In particular, it is found that choosing the highest-end VM configuration guarantees neither the best runtime nor the least cost. Interestingly, choosing a (suitably scaled) low-end VM configuration provides the least overall cost without adversely affecting the total runtime.« less

  20. Nonpreemptive run-time scheduling issues on a multitasked, multiprogrammed multiprocessor with dependencies, bidimensional tasks, folding and dynamic graphs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, Allan Ray

    1987-05-01

    Increases in high speed hardware have mandated studies in software techniques to exploit the parallel capabilities. This thesis examines the effects a run-time scheduler has on a multiprocessor. The model consists of directed, acyclic graphs, generated from serial FORTRAN benchmark programs by the parallel compiler Parafrase. A multitasked, multiprogrammed environment is created. Dependencies are generated by the compiler. Tasks are bidimensional, i.e., they may specify both time and processor requests. Processor requests may be folded into execution time by the scheduler. The graphs may arrive at arbitrary time intervals. The general case is NP-hard, thus, a variety of heuristics aremore » examined by a simulator. Multiprogramming demonstrates a greater need for a run-time scheduler than does monoprogramming for a variety of reasons, e.g., greater stress on the processors, a larger number of independent control paths, more variety in the task parameters, etc. The dynamic critical path series of algorithms perform well. Dynamic critical volume did not add much. Unfortunately, dynamic critical path maximizes turnaround time as well as throughput. Two schedulers are presented which balance throughput and turnaround time. The first requires classification of jobs by type; the second requires selection of a ratio value which is dependent upon system parameters. 45 refs., 19 figs., 20 tabs.« less

  1. [Studies of the personality of nursing students].

    PubMed

    Martín, M J; Vila, J; Capellas, R

    2000-09-01

    This study evaluates diverse psychological variables in 35 third-year nursing students. Personality is studied according to Eysenck's theories, by means of the E.P.Q. questionnaire; assertive behavior is studied by means of the Gambrill and Richey assertiveness questionnaire; and the hostility set is also measured by means of the Buss-Durkee questionnaire. Likewise, due to the results obtained, the authors point out the necessity to work on the theme of assertiveness in nursing students.

  2. A proposal for evaluating cognition in assertiveness.

    PubMed

    Vagos, Paula; Pereira, Anabela

    2010-09-01

    This article presents the development process and initial psychometric features of an instrument for evaluating cognition in assertiveness. This is an essential social skill for adolescent development and seems to encompass emotional, behavioral, and cognitive aspects. The instrument was created by combining both empirical and theoretical methods for item construction, aiming to evaluate the cognitive realm of assertiveness. A sample of 996 adolescent students was used to test for reliability and validity. Results indicate good psychometric properties. The instrument is composed of 4 subscales: Outer Emotional Support, Functional Personal Ability, Interpersonal Management, and Affective Personal Ability. The Assertive Interpersonal Schema Questionnaire may potentially be a useful tool in the diagnosis of, understanding of, and development of a treatment plan for individuals with persistent difficulties in social events.

  3. Faster search by lackadaisical quantum walk

    NASA Astrophysics Data System (ADS)

    Wong, Thomas G.

    2018-03-01

    In the typical model, a discrete-time coined quantum walk searching the 2D grid for a marked vertex achieves a success probability of O(1/log N) in O(√{N log N}) steps, which with amplitude amplification yields an overall runtime of O(√{N} log N). We show that making the quantum walk lackadaisical or lazy by adding a self-loop of weight 4 / N to each vertex speeds up the search, causing the success probability to reach a constant near 1 in O(√{N log N}) steps, thus yielding an O(√{log N}) improvement over the typical, loopless algorithm. This improved runtime matches the best known quantum algorithms for this search problem. Our results are based on numerical simulations since the algorithm is not an instance of the abstract search algorithm.

  4. Ultrafast adiabatic quantum algorithm for the NP-complete exact cover problem

    PubMed Central

    Wang, Hefeng; Wu, Lian-Ao

    2016-01-01

    An adiabatic quantum algorithm may lose quantumness such as quantum coherence entirely in its long runtime, and consequently the expected quantum speedup of the algorithm does not show up. Here we present a general ultrafast adiabatic quantum algorithm. We show that by applying a sequence of fast random or regular signals during evolution, the runtime can be reduced substantially, whereas advantages of the adiabatic algorithm remain intact. We also propose a randomized Trotter formula and show that the driving Hamiltonian and the proposed sequence of fast signals can be implemented simultaneously. We illustrate the algorithm by solving the NP-complete 3-bit exact cover problem (EC3), where NP stands for nondeterministic polynomial time, and put forward an approach to implementing the problem with trapped ions. PMID:26923834

  5. Reversible Parallel Discrete-Event Execution of Large-scale Epidemic Outbreak Models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Perumalla, Kalyan S; Seal, Sudip K

    2010-01-01

    The spatial scale, runtime speed and behavioral detail of epidemic outbreak simulations together require the use of large-scale parallel processing. In this paper, an optimistic parallel discrete event execution of a reaction-diffusion simulation model of epidemic outbreaks is presented, with an implementation over themore » $$\\mu$$sik simulator. Rollback support is achieved with the development of a novel reversible model that combines reverse computation with a small amount of incremental state saving. Parallel speedup and other runtime performance metrics of the simulation are tested on a small (8,192-core) Blue Gene / P system, while scalability is demonstrated on 65,536 cores of a large Cray XT5 system. Scenarios representing large population sizes (up to several hundred million individuals in the largest case) are exercised.« less

  6. The Basis System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dubois, P.F.

    1989-05-16

    This paper discusses the basis system. Basis is a program development system for scientific programs. It has been developed over the last five years at Lawrence Livermore National Laboratory (LLNL), where it is now used in about twenty major programming efforts. The Basis System includes two major components, a program development system and a run-time package. The run-time package provides the Basis Language interpreter, through which the user does input, output, plotting, and control of the program's subroutines and functions. Variables in the scientific packages are known to this interpreter, so that the user may arbitrarily print, plot, and calculatemore » with, any major program variables. Also provided are facilities for dynamic memory management, terminal logs, error recovery, text-file i/o, and the attachment of non-Basis-developed packages.« less

  7. Real-Time MENTAT programming language and architecture

    NASA Technical Reports Server (NTRS)

    Grimshaw, Andrew S.; Silberman, Ami; Liu, Jane W. S.

    1989-01-01

    Real-time MENTAT, a programming environment designed to simplify the task of programming real-time applications in distributed and parallel environments, is described. It is based on the same data-driven computation model and object-oriented programming paradigm as MENTAT. It provides an easy-to-use mechanism to exploit parallelism, language constructs for the expression and enforcement of timing constraints, and run-time support for scheduling and exciting real-time programs. The real-time MENTAT programming language is an extended C++. The extensions are added to facilitate automatic detection of data flow and generation of data flow graphs, to express the timing constraints of individual granules of computation, and to provide scheduling directives for the runtime system. A high-level view of the real-time MENTAT system architecture and programming language constructs is provided.

  8. Organisational Pattern Driven Recovery Mechanisms

    NASA Astrophysics Data System (ADS)

    Giacomo, Valentina Di; Presenza, Domenico; Riccucci, Carlo

    The process of reaction to system failures and security attacks is strongly influenced by its infrastructural, procedural and organisational settings. Analysis of reaction procedures and practices from different domains (Air Traffic Management, Response to Computer Security Incident, Response to emergencies, recovery in Chemical Process Industry) highlight three key requirements for this activity: smooth collaboration and coordination among responders, accurate monitoring and management of resources and ability to adapt pre-established reaction plans to the actual context. The SERENITY Reaction Mechanisms (SRM) is the subsystem of the SERENITY Run-time Framework aimed to provide SERENITY aware AmI settings (i.e. socio-technical systems with highly distributed dynamic services) with functionalities to implement applications specific reaction strategies. The SRM uses SERENITY Organisational S&D Patterns as run-time models to drive these three key functionalities.

  9. Jagged Tiling for Intra-tile Parallelism and Fine-Grain Multithreading

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shrestha, Sunil; Manzano Franco, Joseph B.; Marquez, Andres

    In this paper, we have developed a novel methodology that takes into consideration multithreaded many-core designs to better utilize memory/processing resources and improve memory residence on tileable applications. It takes advantage of polyhedral analysis and transformation in the form of PLUTO, combined with a highly optimized finegrain tile runtime to exploit parallelism at all levels. The main contributions of this paper include the introduction of multi-hierarchical tiling techniques that increases intra tile parallelism; and a data-flow inspired runtime library that allows the expression of parallel tiles with an efficient synchronization registry. Our current implementation shows performance improvements on an Intelmore » Xeon Phi board up to 32.25% against instances produced by state-of-the-art compiler frameworks for selected stencil applications.« less

  10. An Automated Approach to Reasoning Under Multiple Perspectives

    NASA Technical Reports Server (NTRS)

    deBessonet, Cary

    2004-01-01

    This is the final report with emphasis on research during the last term. The context for the research has been the development of an automated reasoning technology for use in SMS (symbolic Manipulation System), a system used to build and query knowledge bases (KBs) using a special knowledge representation language SL (Symbolic Language). SMS interpreters assertive SL input and enters the results as components of its universe. The system operates in two basic models: 1) constructive mode (for building KBs); and 2) query/search mode (for querying KBs). Query satisfaction consists of matching query components with KB components. The system allows "penumbral matches," that is, matches that do not exactly meet the specifications of the query, but which are deemed relevant for the conversational context. If the user wants to know whether SMS has information that holds, say, for "any chow," the scope of relevancy might be set so that the system would respond based on a finding that it has information that holds for "most dogs," although this is not exactly what was called for by the query. The response would be qualified accordingly, as would normally be the case in ordinary human conversation. The general goal of the research was to develop an approach by which assertive content could be interpreted from multiple perspectives so that reasoning operations could be successfully conducted over the results. The interpretation of an SL statement such as, "{person believes [captain (asserted (perhaps)) (astronaut saw (comet (bright)))]}," which in English would amount to asserting something to the effect that, "Some person believes that a captain perhaps asserted that an astronaut saw a bright comet," would require the recognition of multiple perspectives, including some that are: a) epistemically-based (focusing on "believes"); b) assertion-based (focusing on "asserted"); c) perception-based (focusing on "saw"); d) adjectivally-based (focusing on "bight"); and e) modally-based (focusing on "perhaps"). Any conclusion reached under a line of reasoning that employs such an assertion or its associated implications should somehow reflect the employed perspectives. The investigators made significant progress in developing an approach that would enable a system to conduct reasoning operations over assertions of this kind while maintaining consistency in its knowledge bases. Significant accomplishments were made in the areas of: 1) integration and inferencing; 2) generation of perspectives, including wholistic ad composite views; and 3) consistency maintenance.

  11. Cue-based assertion classification for Swedish clinical text – developing a lexicon for pyConTextSwe

    PubMed Central

    Velupillai, Sumithra; Skeppstedt, Maria; Kvist, Maria; Mowery, Danielle; Chapman, Brian E.; Dalianis, Hercules; Chapman, Wendy W.

    2014-01-01

    Objective The ability of a cue-based system to accurately assert whether a disorder is affirmed, negated, or uncertain is dependent, in part, on its cue lexicon. In this paper, we continue our study of porting an assertion system (pyConTextNLP) from English to Swedish (pyConTextSwe) by creating an optimized assertion lexicon for clinical Swedish. Methods and material We integrated cues from four external lexicons, along with generated inflections and combinations. We used subsets of a clinical corpus in Swedish. We applied four assertion classes (definite existence, probable existence, probable negated existence and definite negated existence) and two binary classes (existence yes/no and uncertainty yes/no) to pyConTextSwe. We compared pyConTextSwe’s performance with and without the added cues on a development set, and improved the lexicon further after an error analysis. On a separate evaluation set, we calculated the system’s final performance. Results Following integration steps, we added 454 cues to pyConTextSwe. The optimized lexicon developed after an error analysis resulted in statistically significant improvements on the development set (83% F-score, overall). The system’s final F-scores on an evaluation set were 81% (overall). For the individual assertion classes, F-score results were 88% (definite existence), 81% (probable existence), 55% (probable negated existence), and 63% (definite negated existence). For the binary classifications existence yes/no and uncertainty yes/no, final system performance was 97%/87% and 78%/86% F-score, respectively. Conclusions We have successfully ported pyConTextNLP to Swedish (pyConTextSwe). We have created an extensive and useful assertion lexicon for Swedish clinical text, which could form a valuable resource for similar studies, and which is publicly available. PMID:24556644

  12. Non-smoker assertive behaviour against smoke exposure: Chinese and Korean American non-smokers.

    PubMed

    Saw, Anne; Tang, Hao; Tsoh, Janice Y; Chen, Moon S; Tong, Elisa K

    2017-11-01

    Non-smokers' assertive behaviour towards smokers by asking them not to smoke is important in promoting smoke-free environments. Korean and Chinese Americans come from countries where most women are non-smokers and assertive behaviour may not be prevalent but may increase after migration because of social-ecological factors. This study assessed the extent to which Korean and Chinese American non-smokers ask someone not to smoke and associated factors. The 2003 California Chinese American and Korean American Tobacco Use Surveys were analysed. Multivariate logistic regression analyses examined factors related to non-smoker self-reports that they asked someone not to smoke within the past year. About 40% reported past-year assertive behaviour against smoking, with higher rates among Koreans than Chinese (60.4% vs. 34.5%), those living with smokers (63.5%), ever exposed with a smoke-free home rule (62.3%), recently exposed at work without a smoke-free work policy (67.6%) and regularly exposed at other locations (52.3%). In combined multivariate analyses of both ethnic groups, assertive behaviour was associated with individual factors (single vs. married; tobacco exposure knowledge), family factors (living with smokers, exposed at home despite a smoke-free rule), community factors (exposed at work with no smoke-free policy, exposed at other locations) and cultural factors (Korean vs. Chinese ethnicity; lower acculturation). Chinese and Korean American non-smokers report assertive behaviour against smoking, which is associated with social-ecological factors. Results help identify target groups and strategies for future intervention, including the need to implement or enforce smoke-free environments and promote empowerment. [Saw A, Tang H, Tsoh JY, Chen MS Jr, Tong EK. Non-smoker assertive behaviour against smoke exposure: Chinese and Korean American non-smokers. © 2017 Australasian Professional Society on Alcohol and other Drugs.

  13. The effects of enactment on communicative competence in aphasic casual conversation: a functional linguistic perspective.

    PubMed

    Groenewold, Rimke; Armstrong, Elizabeth

    2018-05-14

    Previous research has shown that speakers with aphasia rely on enactment more often than non-brain-damaged language users. Several studies have been conducted to explain this observed increase, demonstrating that spoken language containing enactment is easier to produce and is more engaging to the conversation partner. This paper describes the effects of the occurrence of enactment in casual conversation involving individuals with aphasia on its level of conversational assertiveness. To evaluate whether and to what extent the occurrence of enactment in speech of individuals with aphasia contributes to its conversational assertiveness. Conversations between a speaker with aphasia and his wife (drawn from AphasiaBank) were analysed in several steps. First, the transcripts were divided into moves, and all moves were coded according to the systemic functional linguistics (SFL) framework. Next, all moves were labelled in terms of their level of conversational assertiveness, as defined in the previous literature. Finally, all enactments were identified and their level of conversational assertiveness was compared with that of non-enactments. Throughout their conversations, the non-brain-damaged speaker was more assertive than the speaker with aphasia. However, the speaker with aphasia produced more enactments than the non-brain-damaged speaker. The moves of the speaker with aphasia containing enactment were more assertive than those without enactment. The use of enactment in the conversations under study positively affected the level of conversational assertiveness of the speaker with aphasia, a competence that is important for speakers with aphasia because it contributes to their floor time, chances to be heard seriously and degree of control over the conversation topic. © 2018 The Authors International Journal of Language & Communication Disorders published by John Wiley & Sons Ltd on behalf of Royal College of Speech and Language Therapists.

  14. The Professional Socialization of Collegiate Female Athletic Trainers: Navigating Experiences of Gender Bias

    PubMed Central

    Mazerolle, Stephanie M.; Borland, John F.; Burton, Laura J.

    2012-01-01

    Context Female athletic trainers (ATs) experience gender discrimination in the workplace due to stereotypical gender roles, but limited information is available regarding the topic. Objective To understand the challenges and obstacles faced by young female ATs working in National Collegiate Athletic Association Division I athletics. Design Exploratory study using semistructured interviews. Setting Division I clinical setting. Patients or Other Participants A total of 14 female ATs were included in the study, using both criterion and snowball- sampling techniques. Their mean age was 27 ± 2 years, with 5 ± 2 years of overall clinical experience. Criteria included employment at the Division I clinical setting, being a full-time assistant AT, and at least 3 years of working experience but no more than 9 years to avoid role continuance. Data Collection and Analysis Analysis of the interview data followed inductive procedures as outlined by a grounded theory approach. Credibility was established by member checks, multiple-analyst triangulation, and peer review. Results Clear communication with both coaches and players about expectations and philosophies regarding medical care, a supportive head AT in terms of clinical competence, and having and serving as a role model were cited as critical tools to alleviate gender bias in the workplace. Conclusions The female ATs in this study stressed the importance of being assertive with coaches early in the season with regard to the AT's role on the team. They reasoned that these actions brought forth a greater perception of congruity between their roles as ATs and their gender and age. We suggest that female athletic training students seek mentors in their field while they complete their coursework and practicums. The ATs in the current study indicated that a mentor, regardless of sex, helped them feel empowered to navigate the male-centric terrain of athletic departments by encouraging them to be assertive and not second-guess their decisions. PMID:23182018

  15. Those who hesitate lose: the relationship between assertiveness and response latency.

    PubMed

    Collins, L H; Powell, J L; Oliver, P V

    2000-06-01

    Individuals who are low in assertiveness may take longer to sort out, process, and state their own perceptions, attitudes and priorities, which puts them at a disadvantage in getting their needs met. The reason for this may not be inhibition in social situations or cognitive ability, but a lack of clarity regarding their own attitudes, opinions, preferences, goals, and priorities. 101 undergraduate students (57% women and 43% men) completed a demographics questionnaire, the Wonderlic Personnel Test, a self-monitoring scale, the Marlowe-Crowne Social Desirability Scale, the Rosenberg Self-esteem Scale, the College Self-expression Scale, and a test of the false-consensus effect. Response latencies to questions were measured. Individuals with higher scores on the Wonderlic Personnel Test answered items more quickly but, even when cognitive ability was controlled, individuals low in assertiveness still took significantly longer to respond to questions about themselves, their opinions, and their preferences. If individuals fall behind at this early step in the process of asserting themselves, then they may be more likely to miss opportunities to be assertive.

  16. Biometric Subject Verification Based on Electrocardiographic Signals

    NASA Technical Reports Server (NTRS)

    Dusan, Sorin V. (Inventor); Jorgensen, Charles C. (Inventor)

    2014-01-01

    A method of authenticating or declining to authenticate an asserted identity of a candidate-person. In an enrollment phase, a reference PQRST heart action graph is provided or constructed from information obtained from a plurality of graphs that resemble each other for a known reference person, using a first graph comparison metric. In a verification phase, a candidate-person asserts his/her identity and presents a plurality of his/her heart cycle graphs. If a sufficient number of the candidate-person's measured graphs resemble each other, a representative composite graph is constructed from the candidate-person's graphs and is compared with a composite reference graph, for the person whose identity is asserted, using a second graph comparison metric. When the second metric value lies in a selected range, the candidate-person's assertion of identity is accepted.

  17. The effect of nurse education on the self-esteem and assertiveness of nursing students: A four-year longitudinal study.

    PubMed

    İlhan, Nesrin; Sukut, Özge; Akhan, Latife Utaş; Batmaz, Makbule

    2016-04-01

    The nurse education program affects many aspects of personal development. Nursing students gain skills in critical thinking and analysis and also develop communication and management skills. The four-year program may also have an effect on students' assertiveness and self-esteem. This study was conducted to determine the impact of the four-year higher nursing school educational program on students' self-esteem and assertiveness. Descriptive longitudinal design. The study took place at a Foundation University in Istanbul, Turkey over the period 2006-2010. The students' levels of self-esteem and assertiveness were assessed at the beginning and end of the first, second, third and fourth years of the program. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. The assessment of social skills deficits in the elderly.

    PubMed

    Furnham, A; Pendleton, D

    1983-01-01

    This paper tested the hypothesis that a sample of elderly people compared to a matched sample of younger people reports an increase in difficulty and social anxiety in dealing with a wide range of everyday social situations. The literature on assertiveness and social skills training with the elderly was first reviewed. Then an assertiveness and social difficulty scale was administered to a group of eighty participants divided by age and sex. It was found that older people experienced less discomfort in situations requiring assertiveness, yet were less likely to respond assertively. Older people reported higher incidence of social anxiety across forty everyday situations. In general females reported more difficulty than males, though there were no interaction effects. The results are discussed in terms of the assessment and training of social skills in the elderly.

  19. Automated Run-Time Mission and Dialog Generation

    DTIC Science & Technology

    2007-03-01

    Processing, Social Network Analysis, Simulation, Automated Scenario Generation 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified...9 D. SOCIAL NETWORKS...13 B. MISSION AND DIALOG GENERATION.................................................13 C. SOCIAL NETWORKS

  20. Subsampled open-reference clustering creates consistent, comprehensive OTU definitions and scales to billions of sequences.

    PubMed

    Rideout, Jai Ram; He, Yan; Navas-Molina, Jose A; Walters, William A; Ursell, Luke K; Gibbons, Sean M; Chase, John; McDonald, Daniel; Gonzalez, Antonio; Robbins-Pianka, Adam; Clemente, Jose C; Gilbert, Jack A; Huse, Susan M; Zhou, Hong-Wei; Knight, Rob; Caporaso, J Gregory

    2014-01-01

    We present a performance-optimized algorithm, subsampled open-reference OTU picking, for assigning marker gene (e.g., 16S rRNA) sequences generated on next-generation sequencing platforms to operational taxonomic units (OTUs) for microbial community analysis. This algorithm provides benefits over de novo OTU picking (clustering can be performed largely in parallel, reducing runtime) and closed-reference OTU picking (all reads are clustered, not only those that match a reference database sequence with high similarity). Because more of our algorithm can be run in parallel relative to "classic" open-reference OTU picking, it makes open-reference OTU picking tractable on massive amplicon sequence data sets (though on smaller data sets, "classic" open-reference OTU clustering is often faster). We illustrate that here by applying it to the first 15,000 samples sequenced for the Earth Microbiome Project (1.3 billion V4 16S rRNA amplicons). To the best of our knowledge, this is the largest OTU picking run ever performed, and we estimate that our new algorithm runs in less than 1/5 the time than would be required of "classic" open reference OTU picking. We show that subsampled open-reference OTU picking yields results that are highly correlated with those generated by "classic" open-reference OTU picking through comparisons on three well-studied datasets. An implementation of this algorithm is provided in the popular QIIME software package, which uses uclust for read clustering. All analyses were performed using QIIME's uclust wrappers, though we provide details (aided by the open-source code in our GitHub repository) that will allow implementation of subsampled open-reference OTU picking independently of QIIME (e.g., in a compiled programming language, where runtimes should be further reduced). Our analyses should generalize to other implementations of these OTU picking algorithms. Finally, we present a comparison of parameter settings in QIIME's OTU picking workflows and make recommendations on settings for these free parameters to optimize runtime without reducing the quality of the results. These optimized parameters can vastly decrease the runtime of uclust-based OTU picking in QIIME.

  1. Convergence Acceleration and Documentation of CFD Codes for Turbomachinery Applications

    NASA Technical Reports Server (NTRS)

    Marquart, Jed E.

    2005-01-01

    The development and analysis of turbomachinery components for industrial and aerospace applications has been greatly enhanced in recent years through the advent of computational fluid dynamics (CFD) codes and techniques. Although the use of this technology has greatly reduced the time required to perform analysis and design, there still remains much room for improvement in the process. In particular, there is a steep learning curve associated with most turbomachinery CFD codes, and the computation times need to be reduced in order to facilitate their integration into standard work processes. Two turbomachinery codes have recently been developed by Dr. Daniel Dorney (MSFC) and Dr. Douglas Sondak (Boston University). These codes are entitled Aardvark (for 2-D and quasi 3-D simulations) and Phantom (for 3-D simulations). The codes utilize the General Equation Set (GES), structured grid methodology, and overset O- and H-grids. The codes have been used with success by Drs. Dorney and Sondak, as well as others within the turbomachinery community, to analyze engine components and other geometries. One of the primary objectives of this study was to establish a set of parametric input values which will enhance convergence rates for steady state simulations, as well as reduce the runtime required for unsteady cases. The goal is to reduce the turnaround time for CFD simulations, thus permitting more design parametrics to be run within a given time period. In addition, other code enhancements to reduce runtimes were investigated and implemented. The other primary goal of the study was to develop enhanced users manuals for Aardvark and Phantom. These manuals are intended to answer most questions for new users, as well as provide valuable detailed information for the experienced user. The existence of detailed user s manuals will enable new users to become proficient with the codes, as well as reducing the dependency of new users on the code authors. In order to achieve the objectives listed, the following tasks were accomplished: 1) Parametric Study Of Preconditioning Parameters And Other Code Inputs; 2) Code Modifications To Reduce Runtimes; 3) Investigation Of Compiler Options To Reduce Code Runtime; and 4) Development/Enhancement of Users Manuals for Aardvark and Phantom

  2. Essentials for effective communication in oncology nursing: assertiveness, conflict management, delegation, and motivation.

    PubMed

    Walczak, M B; Absolon, P L

    2001-01-01

    The ability to communicate effectively with a multidisciplinary team in an assertive manner to resolve conflict, motivate others, and delegate tasks is a prerequisite skill to promote a harmonious work environment. Acquisition of this skill is often a combination of inherent attributes and learned experiences. This article describes a program on assertiveness, conflict resolution, motivation of others, and delegation. Nurses are encouraged to seek expertise from other departments (e.g., Human Resources) to help them develop similar programs.

  3. Social competence: evaluation of assertiveness in Spanish adolescents.

    PubMed

    Castedo, Antonio López; Juste, Margarita Pino; Alonso, José Domínguez

    2015-02-01

    Relations between assertiveness in adolescents' social behavior and demographic variables were assessed in 4,943 Spanish adolescents, ages 12 to 17 years, enrolled in 32 schools for Compulsory Secondary Education. Province of residence, school size, age, grade, and academic focus were statistically significant sources of variance in assertiveness scores. All effects were small. Patterns in responses indicate the items should be reviewed to improve the measure for adolescents, and as a tool for addressing teens' social competence in real life situations.

  4. Technology for Space Station Evolution: the Data Management System

    NASA Technical Reports Server (NTRS)

    Abbott, L.

    1990-01-01

    Viewgraphs on the data management system (DMS) for the space station evolution are presented. Topics covered include DMS architecture and implementation approach; and an overview of the runtime object database.

  5. Experiments with Test Case Generation and Runtime Analysis

    NASA Technical Reports Server (NTRS)

    Artho, Cyrille; Drusinsky, Doron; Goldberg, Allen; Havelund, Klaus; Lowry, Mike; Pasareanu, Corina; Rosu, Grigore; Visser, Willem; Koga, Dennis (Technical Monitor)

    2003-01-01

    Software testing is typically an ad hoc process where human testers manually write many test inputs and expected test results, perhaps automating their execution in a regression suite. This process is cumbersome and costly. This paper reports preliminary results on an approach to further automate this process. The approach consists of combining automated test case generation based on systematically exploring the program's input domain, with runtime analysis, where execution traces are monitored and verified against temporal logic specifications, or analyzed using advanced algorithms for detecting concurrency errors such as data races and deadlocks. The approach suggests to generate specifications dynamically per input instance rather than statically once-and-for-all. The paper describes experiments with variants of this approach in the context of two examples, a planetary rover controller and a space craft fault protection system.

  6. A Core Plug and Play Architecture for Reusable Flight Software Systems

    NASA Technical Reports Server (NTRS)

    Wilmot, Jonathan

    2006-01-01

    The Flight Software Branch, at Goddard Space Flight Center (GSFC), has been working on a run-time approach to facilitate a formal software reuse process. The reuse process is designed to enable rapid development and integration of high-quality software systems and to more accurately predict development costs and schedule. Previous reuse practices have been somewhat successful when the same teams are moved from project to project. But this typically requires taking the software system in an all-or-nothing approach where useful components cannot be easily extracted from the whole. As a result, the system is less flexible and scalable with limited applicability to new projects. This paper will focus on the rationale behind, and implementation of the run-time executive. This executive is the core for the component-based flight software commonality and reuse process adopted at Goddard.

  7. Estimating job runtime for CMS analysis jobs

    NASA Astrophysics Data System (ADS)

    Sfiligoi, I.

    2014-06-01

    The basic premise of pilot systems is to create an overlay scheduling system on top of leased resources. And by definition, leases have a limited lifetime, so any job that is scheduled on such resources must finish before the lease is over, or it will be killed and all the computation is wasted. In order to effectively schedule jobs to resources, the pilot system thus requires the expected runtime of the users' jobs. Past studies have shown that relying on user provided estimates is not a valid strategy, so the system should try to make an estimate by itself. This paper provides a study of the historical data obtained from the Compact Muon Solenoid (CMS) experiment's Analysis Operations submission system. Clear patterns are observed, suggesting that making prediction of an expected job lifetime range is achievable with high confidence level in this environment.

  8. Runtime support for parallelizing data mining algorithms

    NASA Astrophysics Data System (ADS)

    Jin, Ruoming; Agrawal, Gagan

    2002-03-01

    With recent technological advances, shared memory parallel machines have become more scalable, and offer large main memories and high bus bandwidths. They are emerging as good platforms for data warehousing and data mining. In this paper, we focus on shared memory parallelization of data mining algorithms. We have developed a series of techniques for parallelization of data mining algorithms, including full replication, full locking, fixed locking, optimized full locking, and cache-sensitive locking. Unlike previous work on shared memory parallelization of specific data mining algorithms, all of our techniques apply to a large number of common data mining algorithms. In addition, we propose a reduction-object based interface for specifying a data mining algorithm. We show how our runtime system can apply any of the technique we have developed starting from a common specification of the algorithm.

  9. Halvade-RNA: Parallel variant calling from transcriptomic data using MapReduce.

    PubMed

    Decap, Dries; Reumers, Joke; Herzeel, Charlotte; Costanza, Pascal; Fostier, Jan

    2017-01-01

    Given the current cost-effectiveness of next-generation sequencing, the amount of DNA-seq and RNA-seq data generated is ever increasing. One of the primary objectives of NGS experiments is calling genetic variants. While highly accurate, most variant calling pipelines are not optimized to run efficiently on large data sets. However, as variant calling in genomic data has become common practice, several methods have been proposed to reduce runtime for DNA-seq analysis through the use of parallel computing. Determining the effectively expressed variants from transcriptomics (RNA-seq) data has only recently become possible, and as such does not yet benefit from efficiently parallelized workflows. We introduce Halvade-RNA, a parallel, multi-node RNA-seq variant calling pipeline based on the GATK Best Practices recommendations. Halvade-RNA makes use of the MapReduce programming model to create and manage parallel data streams on which multiple instances of existing tools such as STAR and GATK operate concurrently. Whereas the single-threaded processing of a typical RNA-seq sample requires ∼28h, Halvade-RNA reduces this runtime to ∼2h using a small cluster with two 20-core machines. Even on a single, multi-core workstation, Halvade-RNA can significantly reduce runtime compared to using multi-threading, thus providing for a more cost-effective processing of RNA-seq data. Halvade-RNA is written in Java and uses the Hadoop MapReduce 2.0 API. It supports a wide range of distributions of Hadoop, including Cloudera and Amazon EMR.

  10. BFL: a node and edge betweenness based fast layout algorithm for large scale networks

    PubMed Central

    Hashimoto, Tatsunori B; Nagasaki, Masao; Kojima, Kaname; Miyano, Satoru

    2009-01-01

    Background Network visualization would serve as a useful first step for analysis. However, current graph layout algorithms for biological pathways are insensitive to biologically important information, e.g. subcellular localization, biological node and graph attributes, or/and not available for large scale networks, e.g. more than 10000 elements. Results To overcome these problems, we propose the use of a biologically important graph metric, betweenness, a measure of network flow. This metric is highly correlated with many biological phenomena such as lethality and clusters. We devise a new fast parallel algorithm calculating betweenness to minimize the preprocessing cost. Using this metric, we also invent a node and edge betweenness based fast layout algorithm (BFL). BFL places the high-betweenness nodes to optimal positions and allows the low-betweenness nodes to reach suboptimal positions. Furthermore, BFL reduces the runtime by combining a sequential insertion algorim with betweenness. For a graph with n nodes, this approach reduces the expected runtime of the algorithm to O(n2) when considering edge crossings, and to O(n log n) when considering only density and edge lengths. Conclusion Our BFL algorithm is compared against fast graph layout algorithms and approaches requiring intensive optimizations. For gene networks, we show that our algorithm is faster than all layout algorithms tested while providing readability on par with intensive optimization algorithms. We achieve a 1.4 second runtime for a graph with 4000 nodes and 12000 edges on a standard desktop computer. PMID:19146673

  11. Programming and Runtime Support to Blaze FPGA Accelerator Deployment at Datacenter Scale

    PubMed Central

    Huang, Muhuan; Wu, Di; Yu, Cody Hao; Fang, Zhenman; Interlandi, Matteo; Condie, Tyson; Cong, Jason

    2017-01-01

    With the end of CPU core scaling due to dark silicon limitations, customized accelerators on FPGAs have gained increased attention in modern datacenters due to their lower power, high performance and energy efficiency. Evidenced by Microsoft’s FPGA deployment in its Bing search engine and Intel’s 16.7 billion acquisition of Altera, integrating FPGAs into datacenters is considered one of the most promising approaches to sustain future datacenter growth. However, it is quite challenging for existing big data computing systems—like Apache Spark and Hadoop—to access the performance and energy benefits of FPGA accelerators. In this paper we design and implement Blaze to provide programming and runtime support for enabling easy and efficient deployments of FPGA accelerators in datacenters. In particular, Blaze abstracts FPGA accelerators as a service (FaaS) and provides a set of clean programming APIs for big data processing applications to easily utilize those accelerators. Our Blaze runtime implements an FaaS framework to efficiently share FPGA accelerators among multiple heterogeneous threads on a single node, and extends Hadoop YARN with accelerator-centric scheduling to efficiently share them among multiple computing tasks in the cluster. Experimental results using four representative big data applications demonstrate that Blaze greatly reduces the programming efforts to access FPGA accelerators in systems like Apache Spark and YARN, and improves the system throughput by 1.7 × to 3× (and energy efficiency by 1.5× to 2.7×) compared to a conventional CPU-only cluster. PMID:28317049

  12. Programming and Runtime Support to Blaze FPGA Accelerator Deployment at Datacenter Scale.

    PubMed

    Huang, Muhuan; Wu, Di; Yu, Cody Hao; Fang, Zhenman; Interlandi, Matteo; Condie, Tyson; Cong, Jason

    2016-10-01

    With the end of CPU core scaling due to dark silicon limitations, customized accelerators on FPGAs have gained increased attention in modern datacenters due to their lower power, high performance and energy efficiency. Evidenced by Microsoft's FPGA deployment in its Bing search engine and Intel's 16.7 billion acquisition of Altera, integrating FPGAs into datacenters is considered one of the most promising approaches to sustain future datacenter growth. However, it is quite challenging for existing big data computing systems-like Apache Spark and Hadoop-to access the performance and energy benefits of FPGA accelerators. In this paper we design and implement Blaze to provide programming and runtime support for enabling easy and efficient deployments of FPGA accelerators in datacenters. In particular, Blaze abstracts FPGA accelerators as a service (FaaS) and provides a set of clean programming APIs for big data processing applications to easily utilize those accelerators. Our Blaze runtime implements an FaaS framework to efficiently share FPGA accelerators among multiple heterogeneous threads on a single node, and extends Hadoop YARN with accelerator-centric scheduling to efficiently share them among multiple computing tasks in the cluster. Experimental results using four representative big data applications demonstrate that Blaze greatly reduces the programming efforts to access FPGA accelerators in systems like Apache Spark and YARN, and improves the system throughput by 1.7 × to 3× (and energy efficiency by 1.5× to 2.7×) compared to a conventional CPU-only cluster.

  13. Towards quality indicators for assertive outreach programmes for severely impaired substance abusers: concept mapping with Dutch experts.

    PubMed

    Roeg, Diana; van de Goor, Ien; Garretsen, Henk

    2005-06-01

    We investigated the concept of 'quality of assertive outreach programmes for severely impaired substance abusers' with the aim of developing a conceptual framework as the basis for an assessment instrument. We held a concept-mapping session with 13 experts in 2003. Fifty measurable elements of quality were mentioned and rated in terms of relative importance on a Likert-type response scale. Subsequently, the experts grouped the statements that were similar in content. The resulting concept map and additional interpretation made up the final quality framework. SETTING/STUDY PARTICIPANTS: Theoretical sampling was used to select Dutch managers, team leaders, and service providers from different assertive outreach delivery systems for substance abusers. Variation in both perspective and region was reflected in the sample. Nine aspects of quality were formulated: preconditions for care, preconditions for service providers' work, relationship to regular care, service providers' activities and goals, service providers' skills, the role of repression, optimal care for the client, goals of assertive outreach, and nuisance reduction to society. Each aspect was presented using a selection of measurable elements. According to the experts, optimal assertive outreach depends on a broad range of aspects that were later classified in three regions: structure, process, and outcomes. Saturation of the elements has not been proved so far. Nevertheless, it is promising that the framework's regions are supported by theory and that it is largely in accordance with clients' perspectives on assertive community treatment.

  14. Cultural mismatch and the education of Aboriginal youths: the interplay of cultural identities and teacher ratings.

    PubMed

    Fryberg, Stephanie A; Troop-Gordon, Wendy; D'Arrisso, Alexandra; Flores, Heidi; Ponizovskiy, Vladimir; Ranney, John D; Mandour, Tarek; Tootoosis, Curtis; Robinson, Sandy; Russo, Natalie; Burack, Jacob A

    2013-01-01

    In response to the enduring "deficit" approach to the educational attainment of Aboriginal students in North America, we hypothesized that academic underperformance is related to a cultural mismatch between Aboriginal students' cultural background, which emphasizes connectedness and interdependence, and the mainstream White model of education, which focuses on independence and assertiveness. The participants included virtually all the secondary students (N = 115) in the Naskapi community of Kawawachikamach, Quebec, Canada. We obtained self-reports of identification with Aboriginal and White culture, teacher reports of assertiveness, and official grades. We found that high identification with either Aboriginal or White culture was related to higher grades, regardless of whether the students were perceived as assertive by their teacher. Conversely, at low levels of cultural identification toward Aboriginal or White culture, being perceived as low in assertiveness by one's teacher predicted lower grades. This suggests that both high cultural identification and assertiveness can contribute to enhancing the educational outcomes of Aboriginal students, but that Aboriginal students with low levels of both cultural identification and assertiveness are at particular risk as they are mismatched with the culture of mainstream schools and do not benefit from the protective effects of identity. The relationships among identity, cultural values, and academic performance point to the need to reject the notion of an inherent deficit in education among Aboriginal youths in favor of a different framework in which success can be attained when alternative ways of being are fostered and nurtured in schools.

  15. MachineProse: an Ontological Framework for Scientific Assertions

    PubMed Central

    Dinakarpandian, Deendayal; Lee, Yugyung; Vishwanath, Kartik; Lingambhotla, Rohini

    2006-01-01

    Objective: The idea of testing a hypothesis is central to the practice of biomedical research. However, the results of testing a hypothesis are published mainly in the form of prose articles. Encoding the results as scientific assertions that are both human and machine readable would greatly enhance the synergistic growth and dissemination of knowledge. Design: We have developed MachineProse (MP), an ontological framework for the concise specification of scientific assertions. MP is based on the idea of an assertion constituting a fundamental unit of knowledge. This is in contrast to current approaches that use discrete concept terms from domain ontologies for annotation and assertions are only inferred heuristically. Measurements: We use illustrative examples to highlight the advantages of MP over the use of the Medical Subject Headings (MeSH) system and keywords in indexing scientific articles. Results: We show how MP makes it possible to carry out semantic annotation of publications that is machine readable and allows for precise search capabilities. In addition, when used by itself, MP serves as a knowledge repository for emerging discoveries. A prototype for proof of concept has been developed that demonstrates the feasibility and novel benefits of MP. As part of the MP framework, we have created an ontology of relationship types with about 100 terms optimized for the representation of scientific assertions. Conclusion: MachineProse is a novel semantic framework that we believe may be used to summarize research findings, annotate biomedical publications, and support sophisticated searches. PMID:16357355

  16. What is a Question?

    NASA Technical Reports Server (NTRS)

    Knuth, Kevin H.; Clancy, Daniel (Technical Monitor)

    2002-01-01

    A given question can be defined in terms of the set of statements or assertions that answer it. Application of the logic of inference to this set of assertions allows one to derive the logic of inquiry among questions. There are interesting symmetries between the logics of inference and inquiry; where probability describes the degree to which a premise implies an assertion, there exists an analogous quantity that describes the bearing or relevance that a question has on an outstanding issue. These have been extended to suggest that the logic of inquiry results in functional relationships analogous to, although more general than, those found in information theory. Employing lattice theory, I examine in greater detail the structure of the space of assertions and questions demonstrating that the symmetries between the logical relations in each of the spaces derive directly from the lattice structure. Furthermore, I show that while symmetries between the spaces exist, the two lattices are not isomorphic. The lattice of assertions is described by a Boolean lattice 2(sup N) whereas the lattice of real questions is shown to be a sublattice of the free distributive lattice FD(N) = 2(sup 2(sup N)). Thus there does not exist a one-to-one mapping of assertions to questions, there is no reflection symmetry between the two spaces, and questions in general do not possess unique complements. Last, with these lattice structures in mind, I discuss the relationship between probability, relevance and entropy.

  17. Attachment, Sexual Assertiveness, and Sexual Outcomes in Women with Provoked Vestibulodynia and Their Partners: A Mediation Model.

    PubMed

    Leclerc, Bianca; Bergeron, Sophie; Brassard, Audrey; Bélanger, Claude; Steben, Marc; Lambert, Bernard

    2015-08-01

    Provoked vestibulodynia (PVD) is a prevalent women's sexual pain disorder, which is associated with sexual function difficulties. Attachment theory has been used to understand adult sexual outcomes, providing a useful framework for examining sexual adaptation in couples confronted with PVD. Research to date indicates that anxious and avoidant attachment dimensions correlate with worse sexual outcomes in community and clinical samples. The present study examined the association between attachment, pain, sexual function, and sexual satisfaction in a sample of 101 couples in which the women presented with PVD. The actor-partner interdependence model was used in order to investigate both actor and partner effects. This study also examined the role of sexual assertiveness as a mediator of these associations via structural equation modeling. Women completed measures of pain intensity and both members of the couple completed measures of romantic attachment, sexual assertiveness, sexual function, and satisfaction. Results indicated that attachment dimensions did not predict pain intensity. Both anxious and avoidant attachment were associated with lower sexual satisfaction. Only attachment avoidance predicted lower sexual function in women. Partner effects indicated that higher sexual assertiveness in women predicted higher sexual satisfaction in men. Finally, women's sexual assertiveness was found to be a significant mediator of the relationship between their attachment dimensions, sexual function, and satisfaction. Findings highlight the importance of examining how anxious and avoidant attachment may lead to difficulties in sexual assertiveness and to less satisfying sexual interactions in couples where women suffer from PVD.

  18. Women are Warmer but No Less Assertive than Men: Gender and Language on Facebook.

    PubMed

    Park, Gregory; Yaden, David Bryce; Schwartz, H Andrew; Kern, Margaret L; Eichstaedt, Johannes C; Kosinski, Michael; Stillwell, David; Ungar, Lyle H; Seligman, Martin E P

    2016-01-01

    Using a large social media dataset and open-vocabulary methods from computational linguistics, we explored differences in language use across gender, affiliation, and assertiveness. In Study 1, we analyzed topics (groups of semantically similar words) across 10 million messages from over 52,000 Facebook users. Most language differed little across gender. However, topics most associated with self-identified female participants included friends, family, and social life, whereas topics most associated with self-identified male participants included swearing, anger, discussion of objects instead of people, and the use of argumentative language. In Study 2, we plotted male- and female-linked language topics along two interpersonal dimensions prevalent in gender research: affiliation and assertiveness. In a sample of over 15,000 Facebook users, we found substantial gender differences in the use of affiliative language and slight differences in assertive language. Language used more by self-identified females was interpersonally warmer, more compassionate, polite, and-contrary to previous findings-slightly more assertive in their language use, whereas language used more by self-identified males was colder, more hostile, and impersonal. Computational linguistic analysis combined with methods to automatically label topics offer means for testing psychological theories unobtrusively at large scale.

  19. Hispanic construction workers and assertiveness training.

    PubMed

    Shrestha, Pramen P; Menzel, Nancy N

    2014-01-01

    Hispanic (Latino) construction workers experience disparities in occupational death and injury rates in the United States. The cultural value of respect for those in authority may hinder these workers from requesting safe working conditions from supervisors. To evaluate whether Hispanic construction workers in Las Vegas, Nevada found assertiveness training more useful than non-Hispanic trainees and whether or not they practiced this behavior at work after the training. An assertiveness training simulation was part of fall prevention classes offered to area construction workers. Eight weeks after the training, participants were interviewed by telephone about class topics they found most useful and whether or not they had made any subsequent behavior changes at work. More than half of the 760 fall prevention trainees completed telephone interviews. A smaller proportion of Hispanic trainees found assertiveness training to be useful (11%) than non-Hispanics (28%) (p⩽ 0.001). Only 2% of both groups identified practicing assertiveness at work. A large proportion of Hispanic trainees valued other knowledge more highly. They may weigh job security as more important than speaking up about safety issues, which might threaten their employment. Interventions to improve safety should focus instead on improving work safety climate and engineering controls.

  20. Sexual Assertiveness Mediates the Associations Between Partner Facilitative Responses and Sexual Outcomes in Women With Provoked Vestibulodynia.

    PubMed

    McNicoll, Gabrielle; Corsini-Munt, Serena; O Rosen, Natalie; McDuff, Pierre; Bergeron, Sophie

    2017-10-03

    Provoked vestibulodynia (PVD) is a recurrent idiopathic vulvo-vaginal pain associated with negative sexual and psychological consequences. Facilitative partner responses to pain are currently receiving empirical attention because they are positively associated with women's sexual outcomes. However, the mechanisms through which facilitative responses to pain are associated with these outcomes have not been examined. One potential mechanism is sexual assertiveness, which has been found to be associated with better sexual function and satisfaction in women with PVD. The present study examined whether women's sexual assertiveness mediated the association between women's perception of facilitative partner responses and women's sexual function and satisfaction. Women (N = 140) with PVD symptomatology completed self-reported questionnaires evaluating their perception of their partners' facilitative responses, and their own sexual assertiveness, sexual function, and sexual satisfaction. Dependent measures were sexual function measured by the Female Sexual Function Index and sexual satisfaction assessed by the Global Measure of Sexual Satisfaction Scale. Results indicated that women's higher sexual assertiveness mediated the association between their greater perceived facilitative partner responses and their improved sexual function and satisfaction. Findings suggest a potential mechanism through which partner responses may be associated with women's sexual outcomes.

  1. Women are Warmer but No Less Assertive than Men: Gender and Language on Facebook

    PubMed Central

    Park, Gregory; Schwartz, H. Andrew; Kern, Margaret L.; Eichstaedt, Johannes C.; Kosinski, Michael; Stillwell, David; Ungar, Lyle H.; Seligman, Martin E. P.

    2016-01-01

    Using a large social media dataset and open-vocabulary methods from computational linguistics, we explored differences in language use across gender, affiliation, and assertiveness. In Study 1, we analyzed topics (groups of semantically similar words) across 10 million messages from over 52,000 Facebook users. Most language differed little across gender. However, topics most associated with self-identified female participants included friends, family, and social life, whereas topics most associated with self-identified male participants included swearing, anger, discussion of objects instead of people, and the use of argumentative language. In Study 2, we plotted male- and female-linked language topics along two interpersonal dimensions prevalent in gender research: affiliation and assertiveness. In a sample of over 15,000 Facebook users, we found substantial gender differences in the use of affiliative language and slight differences in assertive language. Language used more by self-identified females was interpersonally warmer, more compassionate, polite, and—contrary to previous findings—slightly more assertive in their language use, whereas language used more by self-identified males was colder, more hostile, and impersonal. Computational linguistic analysis combined with methods to automatically label topics offer means for testing psychological theories unobtrusively at large scale. PMID:27223607

  2. Stress Management: Being Assertive

    MedlinePlus

    ... assertively can help you: Gain self-confidence and self-esteem Understand and recognize your feelings Earn respect from others Improve communication Create win-win situations Improve your decision-making skills Create honest relationships Gain more job satisfaction Learning ...

  3. ColDICE: A parallel Vlasov–Poisson solver using moving adaptive simplicial tessellation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sousbie, Thierry, E-mail: tsousbie@gmail.com; Department of Physics, The University of Tokyo, Tokyo 113-0033; Research Center for the Early Universe, School of Science, The University of Tokyo, Tokyo 113-0033

    2016-09-15

    Resolving numerically Vlasov–Poisson equations for initially cold systems can be reduced to following the evolution of a three-dimensional sheet evolving in six-dimensional phase-space. We describe a public parallel numerical algorithm consisting in representing the phase-space sheet with a conforming, self-adaptive simplicial tessellation of which the vertices follow the Lagrangian equations of motion. The algorithm is implemented both in six- and four-dimensional phase-space. Refinement of the tessellation mesh is performed using the bisection method and a local representation of the phase-space sheet at second order relying on additional tracers created when needed at runtime. In order to preserve in the bestmore » way the Hamiltonian nature of the system, refinement is anisotropic and constrained by measurements of local Poincaré invariants. Resolution of Poisson equation is performed using the fast Fourier method on a regular rectangular grid, similarly to particle in cells codes. To compute the density projected onto this grid, the intersection of the tessellation and the grid is calculated using the method of Franklin and Kankanhalli [65–67] generalised to linear order. As preliminary tests of the code, we study in four dimensional phase-space the evolution of an initially small patch in a chaotic potential and the cosmological collapse of a fluctuation composed of two sinusoidal waves. We also perform a “warm” dark matter simulation in six-dimensional phase-space that we use to check the parallel scaling of the code.« less

  4. An approach to secure weather and climate models against hardware faults

    NASA Astrophysics Data System (ADS)

    Düben, Peter D.; Dawson, Andrew

    2017-03-01

    Enabling Earth System models to run efficiently on future supercomputers is a serious challenge for model development. Many publications study efficient parallelization to allow better scaling of performance on an increasing number of computing cores. However, one of the most alarming threats for weather and climate predictions on future high performance computing architectures is widely ignored: the presence of hardware faults that will frequently hit large applications as we approach exascale supercomputing. Changes in the structure of weather and climate models that would allow them to be resilient against hardware faults are hardly discussed in the model development community. In this paper, we present an approach to secure the dynamical core of weather and climate models against hardware faults using a backup system that stores coarse resolution copies of prognostic variables. Frequent checks of the model fields on the backup grid allow the detection of severe hardware faults, and prognostic variables that are changed by hardware faults on the model grid can be restored from the backup grid to continue model simulations with no significant delay. To justify the approach, we perform model simulations with a C-grid shallow water model in the presence of frequent hardware faults. As long as the backup system is used, simulations do not crash and a high level of model quality can be maintained. The overhead due to the backup system is reasonable and additional storage requirements are small. Runtime is increased by only 13 % for the shallow water model.

  5. An approach to secure weather and climate models against hardware faults

    NASA Astrophysics Data System (ADS)

    Düben, Peter; Dawson, Andrew

    2017-04-01

    Enabling Earth System models to run efficiently on future supercomputers is a serious challenge for model development. Many publications study efficient parallelisation to allow better scaling of performance on an increasing number of computing cores. However, one of the most alarming threats for weather and climate predictions on future high performance computing architectures is widely ignored: the presence of hardware faults that will frequently hit large applications as we approach exascale supercomputing. Changes in the structure of weather and climate models that would allow them to be resilient against hardware faults are hardly discussed in the model development community. We present an approach to secure the dynamical core of weather and climate models against hardware faults using a backup system that stores coarse resolution copies of prognostic variables. Frequent checks of the model fields on the backup grid allow the detection of severe hardware faults, and prognostic variables that are changed by hardware faults on the model grid can be restored from the backup grid to continue model simulations with no significant delay. To justify the approach, we perform simulations with a C-grid shallow water model in the presence of frequent hardware faults. As long as the backup system is used, simulations do not crash and a high level of model quality can be maintained. The overhead due to the backup system is reasonable and additional storage requirements are small. Runtime is increased by only 13% for the shallow water model.

  6. Assertive community treatment for elderly people with severe mental illness

    PubMed Central

    2010-01-01

    Background Adults aged 65 and older with severe mental illnesses are a growing segment of the Dutch population. Some of them have a range of serious problems and are also difficult to engage. While assertive community treatment is a common model for treating difficult to engage severe mental illnesses patients, no special form of it is available for the elderly. A special assertive community treatment team for the elderly is developed in Rotterdam, the Netherlands and tested for its effectiveness. Methods We will use a randomized controlled trial design to compare the effects of assertive community treatment for the elderly with those of care as usual. Primary outcome measures will be the number of dropouts, the number of patients engaged in care and patient's psychiatric symptoms, somatic symptoms, and social functioning. Secondary outcome measures are the number of unmet needs, the subjective quality of life and patients' satisfaction. Other secondary outcomes include the number of crisis contacts, rates of voluntary and involuntary admission, and length of stay. Inclusion criteria are aged 65 plus, the presence of a mental disorder, a lack of motivation for treatment and at least four suspected problems with functioning (addiction, somatic problems, daily living activities, housing etc.). If patients meet the inclusion criteria, they will be randomly allocated to either assertive community treatment for the elderly or care as usual. Trained assessors will use mainly observational instruments at the following time points: at baseline, after 9 and 18 months. Discussion This study will help establish whether assertive community treatment for the elderly produces better results than care as usual in elderly people with severe mental illnesses who are difficult to engage. When assertive community treatment for the elderly proves valuable in these respects, it can be tested and implemented more widely, and mechanisms for its effects investigated. Trial Registration The Netherlands National Trial Register NTR1620 PMID:20958958

  7. Assertive community treatment for elderly people with severe mental illness.

    PubMed

    Stobbe, Jolanda; Mulder, Niels C L; Roosenschoon, Bert-Jan; Depla, Marja; Kroon, Hans

    2010-10-19

    Adults aged 65 and older with severe mental illnesses are a growing segment of the Dutch population. Some of them have a range of serious problems and are also difficult to engage. While assertive community treatment is a common model for treating difficult to engage severe mental illnesses patients, no special form of it is available for the elderly. A special assertive community treatment team for the elderly is developed in Rotterdam, the Netherlands and tested for its effectiveness. We will use a randomized controlled trial design to compare the effects of assertive community treatment for the elderly with those of care as usual. Primary outcome measures will be the number of dropouts, the number of patients engaged in care and patient's psychiatric symptoms, somatic symptoms, and social functioning. Secondary outcome measures are the number of unmet needs, the subjective quality of life and patients' satisfaction. Other secondary outcomes include the number of crisis contacts, rates of voluntary and involuntary admission, and length of stay. Inclusion criteria are aged 65 plus, the presence of a mental disorder, a lack of motivation for treatment and at least four suspected problems with functioning (addiction, somatic problems, daily living activities, housing etc.). If patients meet the inclusion criteria, they will be randomly allocated to either assertive community treatment for the elderly or care as usual. Trained assessors will use mainly observational instruments at the following time points: at baseline, after 9 and 18 months. This study will help establish whether assertive community treatment for the elderly produces better results than care as usual in elderly people with severe mental illnesses who are difficult to engage. When assertive community treatment for the elderly proves valuable in these respects, it can be tested and implemented more widely, and mechanisms for its effects investigated. The Netherlands National Trial Register NTR1620.

  8. The effect of assertiveness training on student's academic anxiety.

    PubMed

    Mohebi, S; Sharifirad, G H R; Shahsiah, M; Botlani, S; Matlabi, M; Rezaeian, M

    2012-03-01

    Academic anxiety is an important educational problem that affects millions of students in colleges and schools over the world each year. Although a low level of anxiety can cause positive motivation for improvement of educational functioning, high levels of it can cause a disturbance in concentration, attention, storage of knowledge, recall and educational reduction. It has also been recently determined that there is a relationship between anxiety and assertiveness. Therefore, this study is an attempt to determine the effect of assertiveness training on reducing anxiety levels in pre-college academic students in Gonabad city in 2008. In this clinical trial study, all the pre-college students of Gonabad city were invited to participate and 89 students were divided into experimental and control groups. There were 3 questionnaires, namely demographic, academic anxiety and assertiveness Rathus questionnaires in which the validity and reliability were calculated and approved. The intervention for the experimental group was 5 sessions of assertiveness training using the PRECEDE model and 1 session for parents and teachers to help and support the intervention program. We had a post-test 8 weeks after the last training session for each group was conducted. The data was analyzed by SPSS. The results showed that anxiety levels and decisiveness in the target group were moderate to high and it is seen as a significant reverse relationship between these two factors (r = -0.69 and p < 0.001). The results also showed that there was a significant anxiety decrease in the experimental group after the intervention. On the one hand, there was a significant increase in decisiveness for both groups, but there was not a significant difference between academic anxiety and assertiveness in the control group.before and after the intervention. Due to a significant decrease in anxiety and increased decisiveness in the experimental group, it can be claimed that assertiveness training is an effective non-pharmacological method for reducing academic anxiety and it can improve academic performance.

  9. Congruent Validity of the Rathus Assertiveness Schedule.

    ERIC Educational Resources Information Center

    Harris, Thomas L.; Brown, Nina W.

    1979-01-01

    The validity of the Rathus Assertiveness Schedule (RAS) was investigated by correlating it with the six Class I scales of the California Psychological Inventory on a sample of undergraduate students. Results supported the validity of the RAS. (JKS)

  10. Social Awareness and Influence Workshop. Student Handbook

    DTIC Science & Technology

    2008-07-01

    aggressive in social relationships . High Low • It is important to be assertive, dominant, and tough • Competition is healthy...10 11 Assertiveness Degree to which individuals are direct, confrontational, and aggressive in social relationships Regions High in

  11. Effects of Assertiveness Training and Expressive Writing on Acculturative Stress in International Students: A Randomized Trial

    PubMed Central

    Tavakoli, Shedeh; Lumley, Mark A.; Hijazi, Alaa M.; Slavin-Spenny, Olga M.; Parris, George P.

    2010-01-01

    International university students often experience acculturative stress, and culturally appropriate techniques to manage stress are needed. This randomized trial tested the effects of group assertiveness training, private expressive writing, their combination, and a wait-list control on the acculturative stress, affect, and health of 118 international students at an urban, American university. Interventions were conducted at the start of a semester, and assessments were conducted at baseline and the end of the semester. Group assertiveness training was rated positively by students and led to lower negative affect, whereas expressive writing was less well received and led to higher homesickness and fear, but also higher positive affect. The combined intervention had no effects, perhaps because the two components negated each other. It is concluded that group assertiveness training improves emotional adjustment of international students, but expressive writing has mixed effects and needs further development and study. PMID:20357910

  12. Decreased risk of alcohol dependence and/or misuse in women with high self-assertiveness and leadership abilities.

    PubMed

    Hensing, G; Spak, F; Thundal, K L; Ostlund, A

    2003-01-01

    To analyse dimensions of gender identity and its association to psychiatric disorders and alcohol consumption. The study was performed in two stages: an initial screening (n = 8335) for alcohol consumption, followed by a structured psychiatric interview (n = 1054). The Masculinity/Femininity-Questionnaire was used as an indicator of gender identity. The final study group included 836 women. Leadership, caring, self-assertiveness and emotionality were dimensions of gender identity found in a factor analysis. Low self-assertiveness, high emotionality and to some extent low leadership were associated with increased odds for having bipolar disorders, severe anxiety disorders and alcohol dependence and misuse. Low self-assertiveness and high emotionality were not only associated with alcohol dependence and misuse, but also with high episodic drinking. There was an association between some of the dimensions of gender identity and psychiatric disorders and alcohol consumption. Further attention is needed in both clinical work and research.

  13. Semantic Web Infrastructure Supporting NextFrAMES Modeling Platform

    NASA Astrophysics Data System (ADS)

    Lakhankar, T.; Fekete, B. M.; Vörösmarty, C. J.

    2008-12-01

    Emerging modeling frameworks offer new ways to modelers to develop model applications by offering a wide range of software components to handle common modeling tasks such as managing space and time, distributing computational tasks in parallel processing environment, performing input/output and providing diagnostic facilities. NextFrAMES, the next generation updates to the Framework for Aquatic Modeling of the Earth System originally developed at University of New Hampshire and currently hosted at The City College of New York takes a step further by hiding most of these services from modeler behind a platform agnostic modeling platform that allows scientists to focus on the implementation of scientific concepts in the form of a new modeling markup language and through a minimalist application programming interface that provide means to implement model processes. At the core of the NextFrAMES modeling platform there is a run-time engine that interprets the modeling markup language loads the module plugins establishes the model I/O and executes the model defined by the modeling XML and the accompanying plugins. The current implementation of the run-time engine is designed for single processor or symmetric multi processing (SMP) systems but future implementation of the run-time engine optimized for different hardware architectures are anticipated. The modeling XML and the accompanying plugins define the model structure and the computational processes in a highly abstract manner, which is not only suitable for the run-time engine, but has the potential to integrate into semantic web infrastructure, where intelligent parsers can extract information about the model configurations such as input/output requirements applicable space and time scales and underlying modeling processes. The NextFrAMES run-time engine itself is also designed to tap into web enabled data services directly, therefore it can be incorporated into complex workflow to implement End-to-End application from observation to the delivery of highly aggregated information. Our presentation will discuss the web services ranging from OpenDAP and WaterOneFlow data services to metadata provided through catalog services that could serve NextFrAMES modeling applications. We will also discuss the support infrastructure needed to streamline the integration of NextFrAMES into an End-to-End application to deliver highly processed information to end users. The End-to-End application will be demonstrated through examples from the State-of-the Global Water System effort that builds on data services provided through WMO's Global Terrestrial Network for Hydrology to deliver water resources related information to policy makers for better water management. Key components of this E2E system are promoted as Community of Practice examples for the Global Observing System of Systems therefore the State-of-the Global Water System can be viewed as test case for the interoperability of the incorporated web service components.

  14. Mothers’ Power Assertion, Children’s Negative, Adversarial Orientation, and Future Behavior Problems in Low-Income Families: Early Maternal Responsiveness as a Moderator of the Developmental Cascade

    PubMed Central

    Kim, Sanghag; Kochanska, Grazyna

    2014-01-01

    Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children’s negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers’ responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children’s negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children’s behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children’s negative, adversarial orientation to future behavior problems was present when mothers’ responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PMID:25401483

  15. Mothers' power assertion; children's negative, adversarial orientation; and future behavior problems in low-income families: early maternal responsiveness as a moderator of the developmental cascade.

    PubMed

    Kim, Sanghag; Kochanska, Grazyna

    2015-02-01

    Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children's negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers' responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children's negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children's behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children's negative, adversarial orientation to future behavior problems was present when mothers' responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  16. Assertion: A Technique for Handling Troublesome Library Patrons.

    ERIC Educational Resources Information Center

    Groark, James J.

    1979-01-01

    Encourages the use of assertion training for librarians to aid them in providing reference service, interviewing for employment, and handling difficult patrons. A list of references and a selection of readers' comments on the article is included. (FM)

  17. 48 CFR 252.227-7023 - Drawings and other data to become property of Government.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... may be used on any other design or construction without additional compensation to the Contractor. The... assert or authorize others to assert any rights nor establish any claim under the design patent or...

  18. 48 CFR 252.227-7023 - Drawings and other data to become property of Government.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... may be used on any other design or construction without additional compensation to the Contractor. The... assert or authorize others to assert any rights nor establish any claim under the design patent or...

  19. 48 CFR 252.227-7023 - Drawings and other data to become property of Government.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... may be used on any other design or construction without additional compensation to the Contractor. The... assert or authorize others to assert any rights nor establish any claim under the design patent or...

  20. 48 CFR 252.227-7023 - Drawings and other data to become property of Government.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... may be used on any other design or construction without additional compensation to the Contractor. The... assert or authorize others to assert any rights nor establish any claim under the design patent or...

Top