Efficiently passing messages in distributed spiking neural network simulation.
Thibeault, Corey M; Minkovich, Kirill; O'Brien, Michael J; Harris, Frederick C; Srinivasa, Narayan
2013-01-01
Efficiently passing spiking messages in a neural model is an important aspect of high-performance simulation. As the scale of networks has increased so has the size of the computing systems required to simulate them. In addition, the information exchange of these resources has become more of an impediment to performance. In this paper we explore spike message passing using different mechanisms provided by the Message Passing Interface (MPI). A specific implementation, MVAPICH, designed for high-performance clusters with Infiniband hardware is employed. The focus is on providing information about these mechanisms for users of commodity high-performance spiking simulators. In addition, a novel hybrid method for spike exchange was implemented and benchmarked.
Cooperative Data Sharing: Simple Support for Clusters of SMP Nodes
NASA Technical Reports Server (NTRS)
DiNucci, David C.; Balley, David H. (Technical Monitor)
1997-01-01
Libraries like PVM and MPI send typed messages to allow for heterogeneous cluster computing. Lower-level libraries, such as GAM, provide more efficient access to communication by removing the need to copy messages between the interface and user space in some cases. still lower-level interfaces, such as UNET, get right down to the hardware level to provide maximum performance. However, these are all still interfaces for passing messages from one process to another, and have limited utility in a shared-memory environment, due primarily to the fact that message passing is just another term for copying. This drawback is made more pertinent by today's hybrid architectures (e.g. clusters of SMPs), where it is difficult to know beforehand whether two communicating processes will share memory. As a result, even portable language tools (like HPF compilers) must either map all interprocess communication, into message passing with the accompanying performance degradation in shared memory environments, or they must check each communication at run-time and implement the shared-memory case separately for efficiency. Cooperative Data Sharing (CDS) is a single user-level API which abstracts all communication between processes into the sharing and access coordination of memory regions, in a model which might be described as "distributed shared messages" or "large-grain distributed shared memory". As a result, the user programs to a simple latency-tolerant abstract communication specification which can be mapped efficiently to either a shared-memory or message-passing based run-time system, depending upon the available architecture. Unlike some distributed shared memory interfaces, the user still has complete control over the assignment of data to processors, the forwarding of data to its next likely destination, and the queuing of data until it is needed, so even the relatively high latency present in clusters can be accomodated. CDS does not require special use of an MMU, which can add overhead to some DSM systems, and does not require an SPMD programming model. unlike some message-passing interfaces, CDS allows the user to implement efficient demand-driven applications where processes must "fight" over data, and does not perform copying if processes share memory and do not attempt concurrent writes. CDS also supports heterogeneous computing, dynamic process creation, handlers, and a very simple thread-arbitration mechanism. Additional support for array subsections is currently being considered. The CDS1 API, which forms the kernel of CDS, is built primarily upon only 2 communication primitives, one process initiation primitive, and some data translation (and marshalling) routines, memory allocation routines, and priority control routines. The entire current collection of 28 routines provides enough functionality to implement most (or all) of MPI 1 and 2, which has a much larger interface consisting of hundreds of routines. still, the API is small enough to consider integrating into standard os interfaces for handling inter-process communication in a network-independent way. This approach would also help to solve many of the problems plaguing other higher-level standards such as MPI and PVM which must, in some cases, "play OS" to adequately address progress and process control issues. The CDS2 API, a higher level of interface roughly equivalent in functionality to MPI and to be built entirely upon CDS1, is still being designed. It is intended to add support for the equivalent of communicators, reduction and other collective operations, process topologies, additional support for process creation, and some automatic memory management. CDS2 will not exactly match MPI, because the copy-free semantics of communication from CDS1 will be supported. CDS2 application programs will be free to carefully also use CDS1. CDS1 has been implemented on networks of workstations running unmodified Unix-based operating systems, using UDP/IP and vendor-supplied high- performance locks. Although its inter-node performance is currently unimpressive due to rudimentary implementation technique, it even now outperforms highly-optimized MPI implementation on intra-node communication due to its support for non-copy communication. The similarity of the CDS1 architecture to that of other projects such as UNET and TRAP suggests that the inter-node performance can be increased significantly to surpass MPI or PVM, and it may be possible to migrate some of its functionality to communication controllers.
Users manual for the Chameleon parallel programming tools
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gropp, W.; Smith, B.
1993-06-01
Message passing is a common method for writing programs for distributed-memory parallel computers. Unfortunately, the lack of a standard for message passing has hampered the construction of portable and efficient parallel programs. In an attempt to remedy this problem, a number of groups have developed their own message-passing systems, each with its own strengths and weaknesses. Chameleon is a second-generation system of this type. Rather than replacing these existing systems, Chameleon is meant to supplement them by providing a uniform way to access many of these systems. Chameleon`s goals are to (a) be very lightweight (low over-head), (b) be highlymore » portable, and (c) help standardize program startup and the use of emerging message-passing operations such as collective operations on subsets of processors. Chameleon also provides a way to port programs written using PICL or Intel NX message passing to other systems, including collections of workstations. Chameleon is tracking the Message-Passing Interface (MPI) draft standard and will provide both an MPI implementation and an MPI transport layer. Chameleon provides support for heterogeneous computing by using p4 and PVM. Chameleon`s support for homogeneous computing includes the portable libraries p4, PICL, and PVM and vendor-specific implementation for Intel NX, IBM EUI (SP-1), and Thinking Machines CMMD (CM-5). Support for Ncube and PVM 3.x is also under development.« less
Secure Web-Site Access with Tickets and Message-Dependent Digests
Donato, David I.
2008-01-01
Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.
Vetter, Jeffrey S.
2005-02-01
The method and system described herein presents a technique for performance analysis that helps users understand the communication behavior of their message passing applications. The method and system described herein may automatically classifies individual communication operations and reveal the cause of communication inefficiencies in the application. This classification allows the developer to quickly focus on the culprits of truly inefficient behavior, rather than manually foraging through massive amounts of performance data. Specifically, the method and system described herein trace the message operations of Message Passing Interface (MPI) applications and then classify each individual communication event using a supervised learning technique: decision tree classification. The decision tree may be trained using microbenchmarks that demonstrate both efficient and inefficient communication. Since the method and system described herein adapt to the target system's configuration through these microbenchmarks, they simultaneously automate the performance analysis process and improve classification accuracy. The method and system described herein may improve the accuracy of performance analysis and dramatically reduce the amount of data that users must encounter.
Efficient Tracing for On-the-Fly Space-Time Displays in a Debugger for Message Passing Programs
NASA Technical Reports Server (NTRS)
Hood, Robert; Matthews, Gregory
2001-01-01
In this work we describe the implementation of a practical mechanism for collecting and displaying trace information in a debugger for message passing programs. We introduce a trace format that is highly compressible while still providing information adequate for debugging purposes. We make the mechanism convenient for users to access by incorporating the trace collection in a set of wrappers for the MPI (message passing interface) communication library. We implement several debugger operations that use the trace display: consistent stoplines, undo, and rollback. They all are implemented using controlled replay, which executes at full speed in target processes until the appropriate position in the computation is reached. They provide convenient mechanisms for getting to places in the execution where the full power of a state-based debugger can be brought to bear on isolating communication errors.
Electronic Cigarettes on Twitter – Spreading the Appeal of Flavors
Chu, Kar-Hai; Unger, Jennifer B.; Cruz, Tess Boley; Soto, Daniel W.
2016-01-01
Objectives Social media platforms are used by tobacco companies to promote products. This study examines message content on Twitter from e-cigarette brands and determines if messages about flavors are more likely than non-flavor messages to be passed along to other viewers. Methods We examined Twitter data from 2 e-cigarette brands and identified messages that contained terms related to e-cigarette flavors. Results Flavor-related posts were retweeted at a significantly higher rate by e-cigarette brands (p = .04) and other Twitter users (p < .01) than non-flavor posts. Conclusions E-cigarette brands and other Twitter users pay attention to flavor-related posts and retweet them often. These findings suggest flavors continue to be an attractive characteristic and their marketing should be monitored closely. PMID:27853734
Implementing TCP/IP and a socket interface as a server in a message-passing operating system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hipp, E.; Wiltzius, D.
1990-03-01
The UNICOS 4.3BSD network code and socket transport interface are the basis of an explicit network server for NLTSS, a message passing operating system on the Cray YMP. A BSD socket user library provides access to the network server using an RPC mechanism. The advantages of this server methodology are its modularity and extensibility to migrate to future protocol suites (e.g. OSI) and transport interfaces. In addition, the network server is implemented in an explicit multi-tasking environment to take advantage of the Cray YMP multi-processor platform. 19 refs., 5 figs.
Advanced Numerical Techniques of Performance Evaluation. Volume 2
1990-06-01
multiprocessor environment. This factor is determined by the overhead of the primitives available in the system ( semaphore , monitor , or message... semaphore , monitor , or message passing primitives ) and U the programming ability of the user who implements the simulation. " t,: the sequential...Warp Operating System . i Pro" lftevcnth ACM Symposum on Operating Systems Princlplcs, pages 77 9:3, Auslin, TX, Nov wicr 1987. ACM. [121 D.R. Jefferson
Design of a network for concurrent message passing systems
NASA Astrophysics Data System (ADS)
Song, Paul Y.
1988-08-01
We describe the design of the network design frame (NDF), a self-timed routing chip for a message-passing concurrent computer. The NDF uses a partitioned data path, low-voltage output drivers, and a distributed token-passing arbiter to provide a bandwidth of 450 Mbits/sec into the network. Wormhole routing and bidirectional virtual channels are used to provide low latency communications, less than 2us latency to deliver a 216 bit message across the diameter of a 1K node mess-connected machine. To support concurrent software systems, the NDF provides two logical networks, one for user messages and one for system messages. The two networks share the same set of physical wires. To facilitate the development of network nodes, the NDF is a design frame. The NDF circuitry is integrated into the pad frame of a chip leaving the center of the chip uncommitted. We define an analytic framework in which to study the effects of network size, network buffering capacity, bidirectional channels, and traffic on this class of networks. The response of the network to various combinations of these parameters are obtained through extensive simulation of the network model. Through simulation, we are able to observe the macro behavior of the network as opposed to the micro behavior of the NDF routing controller.
Lang, Jun
2012-01-30
In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.
Evaluating and extending user-level fault tolerance in MPI applications
Laguna, Ignacio; Richards, David F.; Gamblin, Todd; ...
2016-01-11
The user-level failure mitigation (ULFM) interface has been proposed to provide fault-tolerant semantics in the Message Passing Interface (MPI). Previous work presented performance evaluations of ULFM; yet questions related to its programability and applicability, especially to non-trivial, bulk synchronous applications, remain unanswered. In this article, we present our experiences on using ULFM in a case study with a large, highly scalable, bulk synchronous molecular dynamics application to shed light on the advantages and difficulties of this interface to program fault-tolerant MPI applications. We found that, although ULFM is suitable for master–worker applications, it provides few benefits for more common bulkmore » synchronous MPI applications. Furthermore, to address these limitations, we introduce a new, simpler fault-tolerant interface for complex, bulk synchronous MPI programs with better applicability and support than ULFM for application-level recovery mechanisms, such as global rollback.« less
Parallel community climate model: Description and user`s guide
DOE Office of Scientific and Technical Information (OSTI.GOV)
Drake, J.B.; Flanery, R.E.; Semeraro, B.D.
This report gives an overview of a parallel version of the NCAR Community Climate Model, CCM2, implemented for MIMD massively parallel computers using a message-passing programming paradigm. The parallel implementation was developed on an Intel iPSC/860 with 128 processors and on the Intel Delta with 512 processors, and the initial target platform for the production version of the code is the Intel Paragon with 2048 processors. Because the implementation uses a standard, portable message-passing libraries, the code has been easily ported to other multiprocessors supporting a message-passing programming paradigm. The parallelization strategy used is to decompose the problem domain intomore » geographical patches and assign each processor the computation associated with a distinct subset of the patches. With this decomposition, the physics calculations involve only grid points and data local to a processor and are performed in parallel. Using parallel algorithms developed for the semi-Lagrangian transport, the fast Fourier transform and the Legendre transform, both physics and dynamics are computed in parallel with minimal data movement and modest change to the original CCM2 source code. Sequential or parallel history tapes are written and input files (in history tape format) are read sequentially by the parallel code to promote compatibility with production use of the model on other computer systems. A validation exercise has been performed with the parallel code and is detailed along with some performance numbers on the Intel Paragon and the IBM SP2. A discussion of reproducibility of results is included. A user`s guide for the PCCM2 version 2.1 on the various parallel machines completes the report. Procedures for compilation, setup and execution are given. A discussion of code internals is included for those who may wish to modify and use the program in their own research.« less
New NAS Parallel Benchmarks Results
NASA Technical Reports Server (NTRS)
Yarrow, Maurice; Saphir, William; VanderWijngaart, Rob; Woo, Alex; Kutler, Paul (Technical Monitor)
1997-01-01
NPB2 (NAS (NASA Advanced Supercomputing) Parallel Benchmarks 2) is an implementation, based on Fortran and the MPI (message passing interface) message passing standard, of the original NAS Parallel Benchmark specifications. NPB2 programs are run with little or no tuning, in contrast to NPB vendor implementations, which are highly optimized for specific architectures. NPB2 results complement, rather than replace, NPB results. Because they have not been optimized by vendors, NPB2 implementations approximate the performance a typical user can expect for a portable parallel program on distributed memory parallel computers. Together these results provide an insightful comparison of the real-world performance of high-performance computers. New NPB2 features: New implementation (CG), new workstation class problem sizes, new serial sample versions, more performance statistics.
Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks
Lim, Chiwoo; Kim, Sang-Hyo
2018-01-01
In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA), is proposed for peer discovery of distributed device-to-device (D2D) communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR). The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA)-based discovery. PMID:29673167
Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks.
Lim, Chiwoo; Jang, Min; Kim, Sang-Hyo
2018-04-17
In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA), is proposed for peer discovery of distributed device-to-device (D2D) communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR). The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA)-based discovery.
Support for Debugging Automatically Parallelized Programs
NASA Technical Reports Server (NTRS)
Hood, Robert; Jost, Gabriele
2001-01-01
This viewgraph presentation provides information on support sources available for the automatic parallelization of computer program. CAPTools, a support tool developed at the University of Greenwich, transforms, with user guidance, existing sequential Fortran code into parallel message passing code. Comparison routines are then run for debugging purposes, in essence, ensuring that the code transformation was accurate.
Parallelization of NAS Benchmarks for Shared Memory Multiprocessors
NASA Technical Reports Server (NTRS)
Waheed, Abdul; Yan, Jerry C.; Saini, Subhash (Technical Monitor)
1998-01-01
This paper presents our experiences of parallelizing the sequential implementation of NAS benchmarks using compiler directives on SGI Origin2000 distributed shared memory (DSM) system. Porting existing applications to new high performance parallel and distributed computing platforms is a challenging task. Ideally, a user develops a sequential version of the application, leaving the task of porting to new generations of high performance computing systems to parallelization tools and compilers. Due to the simplicity of programming shared-memory multiprocessors, compiler developers have provided various facilities to allow the users to exploit parallelism. Native compilers on SGI Origin2000 support multiprocessing directives to allow users to exploit loop-level parallelism in their programs. Additionally, supporting tools can accomplish this process automatically and present the results of parallelization to the users. We experimented with these compiler directives and supporting tools by parallelizing sequential implementation of NAS benchmarks. Results reported in this paper indicate that with minimal effort, the performance gain is comparable with the hand-parallelized, carefully optimized, message-passing implementations of the same benchmarks.
Automation Framework for Flight Dynamics Products Generation
NASA Technical Reports Server (NTRS)
Wiegand, Robert E.; Esposito, Timothy C.; Watson, John S.; Jun, Linda; Shoan, Wendy; Matusow, Carla
2010-01-01
XFDS provides an easily adaptable automation platform. To date it has been used to support flight dynamics operations. It coordinates the execution of other applications such as Satellite TookKit, FreeFlyer, MATLAB, and Perl code. It provides a mechanism for passing messages among a collection of XFDS processes, and allows sending and receiving of GMSEC messages. A unified and consistent graphical user interface (GUI) is used for the various tools. Its automation configuration is stored in text files, and can be edited either directly or using the GUI.
Optimisation of a parallel ocean general circulation model
NASA Astrophysics Data System (ADS)
Beare, M. I.; Stevens, D. P.
1997-10-01
This paper presents the development of a general-purpose parallel ocean circulation model, for use on a wide range of computer platforms, from traditional scalar machines to workstation clusters and massively parallel processors. Parallelism is provided, as a modular option, via high-level message-passing routines, thus hiding the technical intricacies from the user. An initial implementation highlights that the parallel efficiency of the model is adversely affected by a number of factors, for which optimisations are discussed and implemented. The resulting ocean code is portable and, in particular, allows science to be achieved on local workstations that could otherwise only be undertaken on state-of-the-art supercomputers.
An implementation and performance measurement of the progressive retry technique
NASA Technical Reports Server (NTRS)
Suri, Gaurav; Huang, Yennun; Wang, Yi-Min; Fuchs, W. Kent; Kintala, Chandra
1995-01-01
This paper describes a recovery technique called progressive retry for bypassing software faults in message-passing applications. The technique is implemented as reusable modules to provide application-level software fault tolerance. The paper describes the implementation of the technique and presents results from the application of progressive retry to two telecommunications systems. the results presented show that the technique is helpful in reducing the total recovery time for message-passing applications.
Inference in the brain: Statistics flowing in redundant population codes
Pitkow, Xaq; Angelaki, Dora E
2017-01-01
It is widely believed that the brain performs approximate probabilistic inference to estimate causal variables in the world from ambiguous sensory data. To understand these computations, we need to analyze how information is represented and transformed by the actions of nonlinear recurrent neural networks. We propose that these probabilistic computations function by a message-passing algorithm operating at the level of redundant neural populations. To explain this framework, we review its underlying concepts, including graphical models, sufficient statistics, and message-passing, and then describe how these concepts could be implemented by recurrently connected probabilistic population codes. The relevant information flow in these networks will be most interpretable at the population level, particularly for redundant neural codes. We therefore outline a general approach to identify the essential features of a neural message-passing algorithm. Finally, we argue that to reveal the most important aspects of these neural computations, we must study large-scale activity patterns during moderately complex, naturalistic behaviors. PMID:28595050
Intel NX to PVM 3.2 message passing conversion library
NASA Technical Reports Server (NTRS)
Arthur, Trey; Nelson, Michael L.
1993-01-01
NASA Langley Research Center has developed a library that allows Intel NX message passing codes to be executed under the more popular and widely supported Parallel Virtual Machine (PVM) message passing library. PVM was developed at Oak Ridge National Labs and has become the defacto standard for message passing. This library will allow the many programs that were developed on the Intel iPSC/860 or Intel Paragon in a Single Program Multiple Data (SPMD) design to be ported to the numerous architectures that PVM (version 3.2) supports. Also, the library adds global operations capability to PVM. A familiarity with Intel NX and PVM message passing is assumed.
NASA Astrophysics Data System (ADS)
Stuart, J. A.
2011-12-01
This paper explores the challenges in implementing a message passing interface usable on systems with data-parallel processors, and more specifically GPUs. As a case study, we design and implement the ``DCGN'' API on NVIDIA GPUs that is similar to MPI and allows full access to the underlying architecture. We introduce the notion of data-parallel thread-groups as a way to map resources to MPI ranks. We use a method that also allows the data-parallel processors to run autonomously from user-written CPU code. In order to facilitate communication, we use a sleep-based polling system to store and retrieve messages. Unlike previous systems, our method provides both performance and flexibility. By running a test suite of applications with different communication requirements, we find that a tolerable amount of overhead is incurred, somewhere between one and five percent depending on the application, and indicate the locations where this overhead accumulates. We conclude that with innovations in chipsets and drivers, this overhead will be mitigated and provide similar performance to typical CPU-based MPI implementations while providing fully-dynamic communication.
Software architecture for time-constrained machine vision applications
NASA Astrophysics Data System (ADS)
Usamentiaga, Rubén; Molleda, Julio; García, Daniel F.; Bulnes, Francisco G.
2013-01-01
Real-time image and video processing applications require skilled architects, and recent trends in the hardware platform make the design and implementation of these applications increasingly complex. Many frameworks and libraries have been proposed or commercialized to simplify the design and tuning of real-time image processing applications. However, they tend to lack flexibility, because they are normally oriented toward particular types of applications, or they impose specific data processing models such as the pipeline. Other issues include large memory footprints, difficulty for reuse, and inefficient execution on multicore processors. We present a novel software architecture for time-constrained machine vision applications that addresses these issues. The architecture is divided into three layers. The platform abstraction layer provides a high-level application programming interface for the rest of the architecture. The messaging layer provides a message-passing interface based on a dynamic publish/subscribe pattern. A topic-based filtering in which messages are published to topics is used to route the messages from the publishers to the subscribers interested in a particular type of message. The application layer provides a repository for reusable application modules designed for machine vision applications. These modules, which include acquisition, visualization, communication, user interface, and data processing, take advantage of the power of well-known libraries such as OpenCV, Intel IPP, or CUDA. Finally, the proposed architecture is applied to a real machine vision application: a jam detector for steel pickling lines.
NASA Technical Reports Server (NTRS)
Hockney, George; Lee, Seungwon
2008-01-01
A computer program known as PyPele, originally written as a Pythonlanguage extension module of a C++ language program, has been rewritten in pure Python language. The original version of PyPele dispatches and coordinates parallel-processing tasks on cluster computers and provides a conceptual framework for spacecraft-mission- design and -analysis software tools to run in an embarrassingly parallel mode. The original version of PyPele uses SSH (Secure Shell a set of standards and an associated network protocol for establishing a secure channel between a local and a remote computer) to coordinate parallel processing. Instead of SSH, the present Python version of PyPele uses Message Passing Interface (MPI) [an unofficial de-facto standard language-independent application programming interface for message- passing on a parallel computer] while keeping the same user interface. The use of MPI instead of SSH and the preservation of the original PyPele user interface make it possible for parallel application programs written previously for the original version of PyPele to run on MPI-based cluster computers. As a result, engineers using the previously written application programs can take advantage of embarrassing parallelism without need to rewrite those programs.
NASA Astrophysics Data System (ADS)
Ha, Jeongmok; Jeong, Hong
2016-07-01
This study investigates the directed acyclic subgraph (DAS) algorithm, which is used to solve discrete labeling problems much more rapidly than other Markov-random-field-based inference methods but at a competitive accuracy. However, the mechanism by which the DAS algorithm simultaneously achieves competitive accuracy and fast execution speed, has not been elucidated by a theoretical derivation. We analyze the DAS algorithm by comparing it with a message passing algorithm. Graphical models, inference methods, and energy-minimization frameworks are compared between DAS and message passing algorithms. Moreover, the performances of DAS and other message passing methods [sum-product belief propagation (BP), max-product BP, and tree-reweighted message passing] are experimentally compared.
Hanauer, David A.; Wentzell, Katherine; Laffel, Nikki
2009-01-01
Abstract Background: Cell phone text messaging, via the Short Messaging Service (SMS), offers the promise of a highly portable, well-accepted, and inexpensive modality for engaging youth and young adults in the management of their diabetes. This pilot and feasibility study compared two-way SMS cell phone messaging with e-mail reminders that were directed at encouraging blood glucose (BG) monitoring. Methods: Forty insulin-treated adolescents and young adults with diabetes were randomized to receive electronic reminders to check their BG levels via cell phone text messaging or e-mail reminders for a 3-month pilot study. Electronic messages were automatically generated, and participant replies with BG results were processed by the locally developed Computerized Automated Reminder Diabetes System (CARDS). Participants set their schedule for reminders on the secure CARDS website where they could also enter and review BG data. Results: Of the 40 participants, 22 were randomized to receive cell phone text message reminders and 18 to receive e-mail reminders; 18 in the cell phone group and 11 in the e-mail group used the system. Compared to the e-mail group, users in the cell phone group received more reminders (180.4 vs. 106.6 per user) and responded with BG results significantly more often (30.0 vs. 6.9 per user, P=0.04). During the first month cell phone users submitted twice as many BGs as e-mail users (27.2 vs. 13.8 per user); by month 3, usage waned. Conclusions: Cell phone text messaging to promote BG monitoring is a viable and acceptable option in adolescents and young adults with diabetes. However, maintaining interest levels for prolonged intervals remains a challenge. PMID:19848576
Hanauer, David A; Wentzell, Katherine; Laffel, Nikki; Laffel, Lori M
2009-02-01
Cell phone text messaging, via the Short Messaging Service (SMS), offers the promise of a highly portable, well-accepted, and inexpensive modality for engaging youth and young adults in the management of their diabetes. This pilot and feasibility study compared two-way SMS cell phone messaging with e-mail reminders that were directed at encouraging blood glucose (BG) monitoring. Forty insulin-treated adolescents and young adults with diabetes were randomized to receive electronic reminders to check their BG levels via cell phone text messaging or e-mail reminders for a 3-month pilot study. Electronic messages were automatically generated, and participant replies with BG results were processed by the locally developed Computerized Automated Reminder Diabetes System (CARDS). Participants set their schedule for reminders on the secure CARDS website where they could also enter and review BG data. Of the 40 participants, 22 were randomized to receive cell phone text message reminders and 18 to receive e-mail reminders; 18 in the cell phone group and 11 in the e-mail group used the system. Compared to the e-mail group, users in the cell phone group received more reminders (180.4 vs. 106.6 per user) and responded with BG results significantly more often (30.0 vs. 6.9 per user, P = 0.04). During the first month cell phone users submitted twice as many BGs as e-mail users (27.2 vs. 13.8 per user); by month 3, usage waned. Cell phone text messaging to promote BG monitoring is a viable and acceptable option in adolescents and young adults with diabetes. However, maintaining interest levels for prolonged intervals remains a challenge.
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Lazard, Allison; Mackert, Michael
2014-10-01
This paper highlights the influential role of design complexity for users' first impressions of health websites. An experimental design was utilized to investigate whether a website's level of design complexity impacts user evaluations. An online questionnaire measured the hypothesized impact of design complexity on predictors of message effectiveness. Findings reveal that increased design complexity was positively associated with higher levels of perceived design esthetics, attitude toward the website, perceived message comprehensibility, perceived ease of use, perceived usefulness, perceived message quality, perceived informativeness, and perceived visual informativeness. This research gives further evidence that design complexity should be considered an influential variable for health communicators to effectively reach their audiences, as it embodies the critical first step for message evaluation via electronic platforms. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Supporting shared data structures on distributed memory architectures
NASA Technical Reports Server (NTRS)
Koelbel, Charles; Mehrotra, Piyush; Vanrosendale, John
1990-01-01
Programming nonshared memory systems is more difficult than programming shared memory systems, since there is no support for shared data structures. Current programming languages for distributed memory architectures force the user to decompose all data structures into separate pieces, with each piece owned by one of the processors in the machine, and with all communication explicitly specified by low-level message-passing primitives. A new programming environment is presented for distributed memory architectures, providing a global name space and allowing direct access to remote parts of data values. The analysis and program transformations required to implement this environment are described, and the efficiency of the resulting code on the NCUBE/7 and IPSC/2 hypercubes are described.
High Performance Fortran for Aerospace Applications
NASA Technical Reports Server (NTRS)
Mehrotra, Piyush; Zima, Hans; Bushnell, Dennis M. (Technical Monitor)
2000-01-01
This paper focuses on the use of High Performance Fortran (HPF) for important classes of algorithms employed in aerospace applications. HPF is a set of Fortran extensions designed to provide users with a high-level interface for programming data parallel scientific applications, while delegating to the compiler/runtime system the task of generating explicitly parallel message-passing programs. We begin by providing a short overview of the HPF language. This is followed by a detailed discussion of the efficient use of HPF for applications involving multiple structured grids such as multiblock and adaptive mesh refinement (AMR) codes as well as unstructured grid codes. We focus on the data structures and computational structures used in these codes and on the high-level strategies that can be expressed in HPF to optimally exploit the parallelism in these algorithms.
Efficient Data Generation and Publication as a Test Tool
NASA Technical Reports Server (NTRS)
Einstein, Craig Jakob
2017-01-01
A tool to facilitate the generation and publication of test data was created to test the individual components of a command and control system designed to launch spacecraft. Specifically, this tool was built to ensure messages are properly passed between system components. The tool can also be used to test whether the appropriate groups have access (read/write privileges) to the correct messages. The messages passed between system components take the form of unique identifiers with associated values. These identifiers are alphanumeric strings that identify the type of message and the additional parameters that are contained within the message. The values that are passed with the message depend on the identifier. The data generation tool allows for the efficient creation and publication of these messages. A configuration file can be used to set the parameters of the tool and also specify which messages to pass.
LCAMP: Location Constrained Approximate Message Passing for Compressed Sensing MRI
Sung, Kyunghyun; Daniel, Bruce L; Hargreaves, Brian A
2016-01-01
Iterative thresholding methods have been extensively studied as faster alternatives to convex optimization methods for solving large-sized problems in compressed sensing. A novel iterative thresholding method called LCAMP (Location Constrained Approximate Message Passing) is presented for reducing computational complexity and improving reconstruction accuracy when a nonzero location (or sparse support) constraint can be obtained from view shared images. LCAMP modifies the existing approximate message passing algorithm by replacing the thresholding stage with a location constraint, which avoids adjusting regularization parameters or thresholding levels. This work is first compared with other conventional reconstruction methods using random 1D signals and then applied to dynamic contrast-enhanced breast MRI to demonstrate the excellent reconstruction accuracy (less than 2% absolute difference) and low computation time (5 - 10 seconds using Matlab) with highly undersampled 3D data (244 × 128 × 48; overall reduction factor = 10). PMID:23042658
PETSc Users Manual Revision 3.7
DOE Office of Scientific and Technical Information (OSTI.GOV)
Balay, Satish; Abhyankar, S.; Adams, M.
This manual describes the use of PETSc for the numerical solution of partial differential equations and related problems on high-performance computers. The Portable, Extensible Toolkit for Scientific Computation (PETSc) is a suite of data structures and routines that provide the building blocks for the implementation of large-scale application codes on parallel (and serial) computers. PETSc uses the MPI standard for all message-passing communication.
PETSc Users Manual Revision 3.8
DOE Office of Scientific and Technical Information (OSTI.GOV)
Balay, S.; Abhyankar, S.; Adams, M.
This manual describes the use of PETSc for the numerical solution of partial differential equations and related problems on high-performance computers. The Portable, Extensible Toolkit for Scientific Computation (PETSc) is a suite of data structures and routines that provide the building blocks for the implementation of large-scale application codes on parallel (and serial) computers. PETSc uses the MPI standard for all message-passing communication.
The graphical brain: Belief propagation and active inference
Friston, Karl J.; Parr, Thomas; de Vries, Bert
2018-01-01
This paper considers functional integration in the brain from a computational perspective. We ask what sort of neuronal message passing is mandated by active inference—and what implications this has for context-sensitive connectivity at microscopic and macroscopic levels. In particular, we formulate neuronal processing as belief propagation under deep generative models. Crucially, these models can entertain both discrete and continuous states, leading to distinct schemes for belief updating that play out on the same (neuronal) architecture. Technically, we use Forney (normal) factor graphs to elucidate the requisite message passing in terms of its form and scheduling. To accommodate mixed generative models (of discrete and continuous states), one also has to consider link nodes or factors that enable discrete and continuous representations to talk to each other. When mapping the implicit computational architecture onto neuronal connectivity, several interesting features emerge. For example, Bayesian model averaging and comparison, which link discrete and continuous states, may be implemented in thalamocortical loops. These and other considerations speak to a computational connectome that is inherently state dependent and self-organizing in ways that yield to a principled (variational) account. We conclude with simulations of reading that illustrate the implicit neuronal message passing, with a special focus on how discrete (semantic) representations inform, and are informed by, continuous (visual) sampling of the sensorium. Author Summary This paper considers functional integration in the brain from a computational perspective. We ask what sort of neuronal message passing is mandated by active inference—and what implications this has for context-sensitive connectivity at microscopic and macroscopic levels. In particular, we formulate neuronal processing as belief propagation under deep generative models that can entertain both discrete and continuous states. This leads to distinct schemes for belief updating that play out on the same (neuronal) architecture. Technically, we use Forney (normal) factor graphs to characterize the requisite message passing, and link this formal characterization to canonical microcircuits and extrinsic connectivity in the brain. PMID:29417960
Han, Su Yeon; Tsou, Ming-Hsiang; Clarke, Keith C
2015-01-01
Dynamic social media content, such as Twitter messages, can be used to examine individuals' beliefs and perceptions. By analyzing Twitter messages, this study examines how Twitter users exchanged and recognized toponyms (city names) for different cities in the United States. The frequency and variety of city names found in their online conversations were used to identify the unique spatiotemporal patterns of "geographical awareness" for Twitter users. A new analytic method, Knowledge Discovery in Cyberspace for Geographical Awareness (KDCGA), is introduced to help identify the dynamic spatiotemporal patterns of geographic awareness among social media conversations. Twitter data were collected across 50 U.S. cities. Thousands of city names around the world were extracted from a large volume of Twitter messages (over 5 million tweets) by using the Twitter Application Programming Interface (APIs) and Python language computer programs. The percentages of distant city names (cities located in distant states or other countries far away from the locations of Twitter users) were used to estimate the level of global geographical awareness for Twitter users in each U.S. city. A Global awareness index (GAI) was developed to quantify the level of geographical awareness of Twitter users from within the same city. Our findings are that: (1) the level of geographical awareness varies depending on when and where Twitter messages are posted, yet Twitter users from big cities are more aware of the names of international cities or distant US cities than users from mid-size cities; (2) Twitter users have an increased awareness of other city names far away from their home city during holiday seasons; and (3) Twitter users are more aware of nearby city names than distant city names, and more aware of big city names rather than small city names.
NASA Technical Reports Server (NTRS)
Saini, Subash; Bailey, David; Chancellor, Marisa K. (Technical Monitor)
1997-01-01
High Performance Fortran (HPF), the high-level language for parallel Fortran programming, is based on Fortran 90. HALF was defined by an informal standards committee known as the High Performance Fortran Forum (HPFF) in 1993, and modeled on TMC's CM Fortran language. Several HPF features have since been incorporated into the draft ANSI/ISO Fortran 95, the next formal revision of the Fortran standard. HPF allows users to write a single parallel program that can execute on a serial machine, a shared-memory parallel machine, or a distributed-memory parallel machine. HPF eliminates the complex, error-prone task of explicitly specifying how, where, and when to pass messages between processors on distributed-memory machines, or when to synchronize processors on shared-memory machines. HPF is designed in a way that allows the programmer to code an application at a high level, and then selectively optimize portions of the code by dropping into message-passing or calling tuned library routines as 'extrinsics'. Compilers supporting High Performance Fortran features first appeared in late 1994 and early 1995 from Applied Parallel Research (APR) Digital Equipment Corporation, and The Portland Group (PGI). IBM introduced an HPF compiler for the IBM RS/6000 SP/2 in April of 1996. Over the past two years, these implementations have shown steady improvement in terms of both features and performance. The performance of various hardware/ programming model (HPF and MPI (message passing interface)) combinations will be compared, based on latest NAS (NASA Advanced Supercomputing) Parallel Benchmark (NPB) results, thus providing a cross-machine and cross-model comparison. Specifically, HPF based NPB results will be compared with MPI based NPB results to provide perspective on performance currently obtainable using HPF versus MPI or versus hand-tuned implementations such as those supplied by the hardware vendors. In addition we would also present NPB (Version 1.0) performance results for the following systems: DEC Alpha Server 8400 5/440, Fujitsu VPP Series (VX, VPP300, and VPP700), HP/Convex Exemplar SPP2000, IBM RS/6000 SP P2SC node (120 MHz) NEC SX-4/32, SGI/CRAY T3E, SGI Origin2000.
Earth Observing System Data Gateway
NASA Technical Reports Server (NTRS)
Pfister, Robin; McMahon, Joe; Amrhein, James; Sefert, Ed; Marsans, Lorena; Solomon, Mark; Nestler, Mark
2006-01-01
The Earth Observing System Data Gateway (EDG) software provides a "one-stop-shopping" standard interface for exploring and ordering Earth-science data stored at geographically distributed sites. EDG enables a user to do the following: 1) Search for data according to high-level criteria (e.g., geographic location, time, or satellite that acquired the data); 2) Browse the results of a search, viewing thumbnail sketches of data that satisfy the user s criteria; and 3) Order selected data for delivery to a specified address on a chosen medium (e.g., compact disk or magnetic tape). EDG consists of (1) a component that implements a high-level client/server protocol, and (2) a collection of C-language libraries that implement the passing of protocol messages between an EDG client and one or more EDG servers. EDG servers are located at sites usually called "Distributed Active Archive Centers" (DAACs). Each DAAC may allow access to many individual data items, called "granules" (e.g., single Landsat images). Related granules are grouped into collections called "data sets." EDG enables a user to send a search query to multiple DAACs simultaneously, inspect the resulting information, select browseable granules, and then order selected data from the different sites in a seamless fashion.
A flexible software architecture for scalable real-time image and video processing applications
NASA Astrophysics Data System (ADS)
Usamentiaga, Rubén; Molleda, Julio; García, Daniel F.; Bulnes, Francisco G.
2012-06-01
Real-time image and video processing applications require skilled architects, and recent trends in the hardware platform make the design and implementation of these applications increasingly complex. Many frameworks and libraries have been proposed or commercialized to simplify the design and tuning of real-time image processing applications. However, they tend to lack flexibility because they are normally oriented towards particular types of applications, or they impose specific data processing models such as the pipeline. Other issues include large memory footprints, difficulty for reuse and inefficient execution on multicore processors. This paper presents a novel software architecture for real-time image and video processing applications which addresses these issues. The architecture is divided into three layers: the platform abstraction layer, the messaging layer, and the application layer. The platform abstraction layer provides a high level application programming interface for the rest of the architecture. The messaging layer provides a message passing interface based on a dynamic publish/subscribe pattern. A topic-based filtering in which messages are published to topics is used to route the messages from the publishers to the subscribers interested in a particular type of messages. The application layer provides a repository for reusable application modules designed for real-time image and video processing applications. These modules, which include acquisition, visualization, communication, user interface and data processing modules, take advantage of the power of other well-known libraries such as OpenCV, Intel IPP, or CUDA. Finally, we present different prototypes and applications to show the possibilities of the proposed architecture.
A Cognitive Behavioral Therapy-Based Text Messaging Intervention for Methamphetamine Dependence
Keoleian, Victoria; Stalcup, S. Alex; Polcin, Douglas L.; Brown, Michelle; Galloway, Gantt
2013-01-01
Psychosocial treatments for methamphetamine dependence are of limited effectiveness. Thus, a significant need exists for add-on therapy for this substance user disorder. The aim of this study was to develop and test a novel text messaging intervention for use as an adjunct to cognitive behavioral group therapy for methamphetamine users. Text messaging has the potential to support patients in real-time, around the clock. We convened 2 meetings of an expert panel, held 3 focus groups in current and former users, and conducted 15 semi-structured interviews with in-treatment users in order to develop a fully-automated, cognitive behavioral therapy-based text messaging intervention. We then conducted a randomized, crossover pre-test in 5 users seeking treatment. Participants’ ratings of ease of use and functionality of the system were high. During the pre-test we performed real-time assessments via text messaging on daily methamphetamine use, craving levels, and the perceived usefulness of messages; 79% of scheduled assessments were collected. The odds of messages being rated as “very” or “extremely” useful were 6.6 times [95% CI: 2.2, 19.4] higher in the active vs. placebo periods. The intervention is now ready for testing in randomized clinical trials. PMID:24592670
High Performance Programming Using Explicit Shared Memory Model on Cray T3D1
NASA Technical Reports Server (NTRS)
Simon, Horst D.; Saini, Subhash; Grassi, Charles
1994-01-01
The Cray T3D system is the first-phase system in Cray Research, Inc.'s (CRI) three-phase massively parallel processing (MPP) program. This system features a heterogeneous architecture that closely couples DEC's Alpha microprocessors and CRI's parallel-vector technology, i.e., the Cray Y-MP and Cray C90. An overview of the Cray T3D hardware and available programming models is presented. Under Cray Research adaptive Fortran (CRAFT) model four programming methods (data parallel, work sharing, message-passing using PVM, and explicit shared memory model) are available to the users. However, at this time data parallel and work sharing programming models are not available to the user community. The differences between standard PVM and CRI's PVM are highlighted with performance measurements such as latencies and communication bandwidths. We have found that the performance of neither standard PVM nor CRI s PVM exploits the hardware capabilities of the T3D. The reasons for the bad performance of PVM as a native message-passing library are presented. This is illustrated by the performance of NAS Parallel Benchmarks (NPB) programmed in explicit shared memory model on Cray T3D. In general, the performance of standard PVM is about 4 to 5 times less than obtained by using explicit shared memory model. This degradation in performance is also seen on CM-5 where the performance of applications using native message-passing library CMMD on CM-5 is also about 4 to 5 times less than using data parallel methods. The issues involved (such as barriers, synchronization, invalidating data cache, aligning data cache etc.) while programming in explicit shared memory model are discussed. Comparative performance of NPB using explicit shared memory programming model on the Cray T3D and other highly parallel systems such as the TMC CM-5, Intel Paragon, Cray C90, IBM-SP1, etc. is presented.
Incremental Parallelization of Non-Data-Parallel Programs Using the Charon Message-Passing Library
NASA Technical Reports Server (NTRS)
VanderWijngaart, Rob F.
2000-01-01
Message passing is among the most popular techniques for parallelizing scientific programs on distributed-memory architectures. The reasons for its success are wide availability (MPI), efficiency, and full tuning control provided to the programmer. A major drawback, however, is that incremental parallelization, as offered by compiler directives, is not generally possible, because all data structures have to be changed throughout the program simultaneously. Charon remedies this situation through mappings between distributed and non-distributed data. It allows breaking up the parallelization into small steps, guaranteeing correctness at every stage. Several tools are available to help convert legacy codes into high-performance message-passing programs. They usually target data-parallel applications, whose loops carrying most of the work can be distributed among all processors without much dependency analysis. Others do a full dependency analysis and then convert the code virtually automatically. Even more toolkits are available that aid construction from scratch of message passing programs. None, however, allows piecemeal translation of codes with complex data dependencies (i.e. non-data-parallel programs) into message passing codes. The Charon library (available in both C and Fortran) provides incremental parallelization capabilities by linking legacy code arrays with distributed arrays. During the conversion process, non-distributed and distributed arrays exist side by side, and simple mapping functions allow the programmer to switch between the two in any location in the program. Charon also provides wrapper functions that leave the structure of the legacy code intact, but that allow execution on truly distributed data. Finally, the library provides a rich set of communication functions that support virtually all patterns of remote data demands in realistic structured grid scientific programs, including transposition, nearest-neighbor communication, pipelining, gather/scatter, and redistribution. At the end of the conversion process most intermediate Charon function calls will have been removed, the non-distributed arrays will have been deleted, and virtually the only remaining Charon functions calls are the high-level, highly optimized communications. Distribution of the data is under complete control of the programmer, although a wide range of useful distributions is easily available through predefined functions. A crucial aspect of the library is that it does not allocate space for distributed arrays, but accepts programmer-specified memory. This has two major consequences. First, codes parallelized using Charon do not suffer from encapsulation; user data is always directly accessible. This provides high efficiency, and also retains the possibility of using message passing directly for highly irregular communications. Second, non-distributed arrays can be interpreted as (trivial) distributions in the Charon sense, which allows them to be mapped to truly distributed arrays, and vice versa. This is the mechanism that enables incremental parallelization. In this paper we provide a brief introduction of the library and then focus on the actual steps in the parallelization process, using some representative examples from, among others, the NAS Parallel Benchmarks. We show how a complicated two-dimensional pipeline-the prototypical non-data-parallel algorithm- can be constructed with ease. To demonstrate the flexibility of the library, we give examples of the stepwise, efficient parallel implementation of nonlocal boundary conditions common in aircraft simulations, as well as the construction of the sequence of grids required for multigrid.
Waddell, T Franklin
2016-07-01
Temporary messaging programs continue to rise in popularity, due in large part to the perceived privacy that they afford. However, recent controversies have revealed that messages shared on ephemeral messaging services are persistent and potentially retrieval, thus undermining the privacy they are assumed to provide. Given this paradox, why are temporary messaging services so popular? Does the allure of privacy still motivate the use of temporary messaging programs? Or, if privacy is no longer afforded by ephemeral messaging, what other psychological gratifications do these applications fulfill that might account for their continued use? Informed by the Modality-Agency-Interactivity-Navigability (MAIN) model and the uses and gratifications tradition, the current study conducted qualitative interviews to identify the gratifications that individuals derive from the popular ephemeral messaging application, Snapchat. Study results show that the visual affordances of ephemeral messaging have legitimized photographic communication, providing self-expression and relational gratifications that are unfulfilled by text-based applications. By comparison, users report low levels of trust in the privacy affordances of ephemeral messaging, and instead projecting negative effects of temporary messaging on other users rather than self. Theoretical and practical implications of these results are discussed.
Han, Su Yeon; Tsou, Ming-Hsiang; Clarke, Keith C.
2015-01-01
Dynamic social media content, such as Twitter messages, can be used to examine individuals’ beliefs and perceptions. By analyzing Twitter messages, this study examines how Twitter users exchanged and recognized toponyms (city names) for different cities in the United States. The frequency and variety of city names found in their online conversations were used to identify the unique spatiotemporal patterns of “geographical awareness” for Twitter users. A new analytic method, Knowledge Discovery in Cyberspace for Geographical Awareness (KDCGA), is introduced to help identify the dynamic spatiotemporal patterns of geographic awareness among social media conversations. Twitter data were collected across 50 U.S. cities. Thousands of city names around the world were extracted from a large volume of Twitter messages (over 5 million tweets) by using the Twitter Application Programming Interface (APIs) and Python language computer programs. The percentages of distant city names (cities located in distant states or other countries far away from the locations of Twitter users) were used to estimate the level of global geographical awareness for Twitter users in each U.S. city. A Global awareness index (GAI) was developed to quantify the level of geographical awareness of Twitter users from within the same city. Our findings are that: (1) the level of geographical awareness varies depending on when and where Twitter messages are posted, yet Twitter users from big cities are more aware of the names of international cities or distant US cities than users from mid-size cities; (2) Twitter users have an increased awareness of other city names far away from their home city during holiday seasons; and (3) Twitter users are more aware of nearby city names than distant city names, and more aware of big city names rather than small city names. PMID:26167942
MPF: A portable message passing facility for shared memory multiprocessors
NASA Technical Reports Server (NTRS)
Malony, Allen D.; Reed, Daniel A.; Mcguire, Patrick J.
1987-01-01
The design, implementation, and performance evaluation of a message passing facility (MPF) for shared memory multiprocessors are presented. The MPF is based on a message passing model conceptually similar to conversations. Participants (parallel processors) can enter or leave a conversation at any time. The message passing primitives for this model are implemented as a portable library of C function calls. The MPF is currently operational on a Sequent Balance 21000, and several parallel applications were developed and tested. Several simple benchmark programs are presented to establish interprocess communication performance for common patterns of interprocess communication. Finally, performance figures are presented for two parallel applications, linear systems solution, and iterative solution of partial differential equations.
Interactive Supercomputing’s Star-P Platform
DOE Office of Scientific and Technical Information (OSTI.GOV)
Edelman, Alan; Husbands, Parry; Leibman, Steve
2006-09-19
The thesis of this extended abstract is simple. High productivity comes from high level infrastructures. To measure this, we introduce a methodology that goes beyond the tradition of timing software in serial and tuned parallel modes. We perform a classroom productivity study involving 29 students who have written a homework exercise in a low level language (MPI message passing) and a high level language (Star-P with MATLAB client). Our conclusions indicate what perhaps should be of little surprise: (1) the high level language is always far easier on the students than the low level language. (2) The early versions ofmore » the high level language perform inadequately compared to the tuned low level language, but later versions substantially catch up. Asymptotically, the analogy must hold that message passing is to high level language parallel programming as assembler is to high level environments such as MATLAB, Mathematica, Maple, or even Python. We follow the Kepner method that correctly realizes that traditional speedup numbers without some discussion of the human cost of reaching these numbers can fail to reflect the true human productivity cost of high performance computing. Traditional data compares low level message passing with serial computation. With the benefit of a high level language system in place, in our case Star-P running with MATLAB client, and with the benefit of a large data pool: 29 students, each running the same code ten times on three evolutions of the same platform, we can methodically demonstrate the productivity gains. To date we are not aware of any high level system as extensive and interoperable as Star-P, nor are we aware of an experiment of this kind performed with this volume of data.« less
Edworthy, Judy; Hellier, Elizabeth; Newbold, Lex; Titchener, Kirsteen
2015-05-01
Three experiments explore several factors which influence information transmission when warning messages are passed from person to person. In Experiment 1, messages were passed down chains of participants using five different modes of communication. Written communication channels resulted in more accurate message transmission than verbal. In addition, some elements of the message endured further down the chain than others. Experiment 2 largely replicated these effects and also demonstrated that simple repetition of a message eliminated differences between written and spoken communication. In a final field experiment, chains of participants passed information however they wanted to, with the proviso that half of the chains could not use telephones. Here, the lack of ability to use a telephone did not affect accuracy, but did slow down the speed of transmission from the recipient of the message to the last person in the chain. Implications of the findings for crisis and emergency risk communication are discussed. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Earthquake Early Warning: User Education and Designing Effective Messages
NASA Astrophysics Data System (ADS)
Burkett, E. R.; Sellnow, D. D.; Jones, L.; Sellnow, T. L.
2014-12-01
The U.S. Geological Survey (USGS) and partners are transitioning from test-user trials of a demonstration earthquake early warning system (ShakeAlert) to deciding and preparing how to implement the release of earthquake early warning information, alert messages, and products to the public and other stakeholders. An earthquake early warning system uses seismic station networks to rapidly gather information about an occurring earthquake and send notifications to user devices ahead of the arrival of potentially damaging ground shaking at their locations. Earthquake early warning alerts can thereby allow time for actions to protect lives and property before arrival of damaging shaking, if users are properly educated on how to use and react to such notifications. A collaboration team of risk communications researchers and earth scientists is researching the effectiveness of a chosen subset of potential earthquake early warning interface designs and messages, which could be displayed on a device such as a smartphone. Preliminary results indicate, for instance, that users prefer alerts that include 1) a map to relate their location to the earthquake and 2) instructions for what to do in response to the expected level of shaking. A number of important factors must be considered to design a message that will promote appropriate self-protective behavior. While users prefer to see a map, how much information can be processed in limited time? Are graphical representations of wavefronts helpful or confusing? The most important factor to promote a helpful response is the predicted earthquake intensity, or how strong the expected shaking will be at the user's location. Unlike Japanese users of early warning, few Californians are familiar with the earthquake intensity scale, so we are exploring how differentiating instructions between intensity levels (e.g., "Be aware" for lower shaking levels and "Drop, cover, hold on" at high levels) can be paired with self-directed supplemental information to increase the public's understanding of earthquake shaking and protective behaviors.
Statistics of Epidemics in Networks by Passing Messages
NASA Astrophysics Data System (ADS)
Shrestha, Munik Kumar
Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result financial contagion gets worse with too much diversification. We also predict that financial system exhibits "robust yet fragile" behavior, with regions of the parameter space where contagion is rare but catastrophic whenever it occurs. In further results, we develop a message-passing approach to recurrent state epidemics like susceptible-infectious-susceptible and susceptible-infectious-recovered-susceptible where nodes can return to previously inhabited states and multiple waves of infection can pass through the population. Given that message-passing has been applied exclusively to models with one-way state changes like susceptible-infectious and susceptible-infectious-recovered, we develop message-passing for recurrent epidemics based on a new class of differential equations and demonstrate that our approach is simple and efficiently approximates results obtained from Monte Carlo simulation, and that the accuracy of message-passing is often superior to the pair approximation (which also takes second-order correlations into account).
Verification of Faulty Message Passing Systems with Continuous State Space in PVS
NASA Technical Reports Server (NTRS)
Pilotto, Concetta; White, Jerome
2010-01-01
We present a library of Prototype Verification System (PVS) meta-theories that verifies a class of distributed systems in which agent commu nication is through message-passing. The theoretic work, outlined in, consists of iterative schemes for solving systems of linear equations , such as message-passing extensions of the Gauss and Gauss-Seidel me thods. We briefly review that work and discuss the challenges in formally verifying it.
User-Defined Data Distributions in High-Level Programming Languages
NASA Technical Reports Server (NTRS)
Diaconescu, Roxana E.; Zima, Hans P.
2006-01-01
One of the characteristic features of today s high performance computing systems is a physically distributed memory. Efficient management of locality is essential for meeting key performance requirements for these architectures. The standard technique for dealing with this issue has involved the extension of traditional sequential programming languages with explicit message passing, in the context of a processor-centric view of parallel computation. This has resulted in complex and error-prone assembly-style codes in which algorithms and communication are inextricably interwoven. This paper presents a high-level approach to the design and implementation of data distributions. Our work is motivated by the need to improve the current parallel programming methodology by introducing a paradigm supporting the development of efficient and reusable parallel code. This approach is currently being implemented in the context of a new programming language called Chapel, which is designed in the HPCS project Cascade.
The serial message-passing schedule for LDPC decoding algorithms
NASA Astrophysics Data System (ADS)
Liu, Mingshan; Liu, Shanshan; Zhou, Yuan; Jiang, Xue
2015-12-01
The conventional message-passing schedule for LDPC decoding algorithms is the so-called flooding schedule. It has the disadvantage that the updated messages cannot be used until next iteration, thus reducing the convergence speed . In this case, the Layered Decoding algorithm (LBP) based on serial message-passing schedule is proposed. In this paper the decoding principle of LBP algorithm is briefly introduced, and then proposed its two improved algorithms, the grouped serial decoding algorithm (Grouped LBP) and the semi-serial decoding algorithm .They can improve LBP algorithm's decoding speed while maintaining a good decoding performance.
A pilot test of a tailored mobile and web-based diabetes messaging system for adolescents.
Mulvaney, Shelagh A; Anders, Shilo; Smith, Annie K; Pittel, Eric J; Johnson, Kevin B
2012-03-01
We conducted a pilot trial of a new mobile and web-based intervention to improve diabetes adherence. The text messaging system was designed to motivate and remind adolescents about diabetes self-care tasks. Text messages were tailored according to individually-reported barriers to diabetes self-care. A total of 23 adolescents with type 1 diabetes used the system for a period of three months. On average, they received 10 text messages per week (range 8-12). A matched historical control group from the same clinic was used for comparison. After three months, system users rated the content, usability and experiences with the system, which were very favourable. Comparison of the intervention and control groups indicated a significant interaction between group and time. Both groups had similar HbA(1c) levels at baseline. After three months, the mean HbA(1c) level in the intervention group was unchanged (8.8%), but the mean level in the control group was significantly higher (9.9%), P = 0.006. The results demonstrate the feasibility of the messaging system, user acceptance and a promising effect on glycaemic control. Integrating this type of messaging system with online educational programming could prove to be beneficial.
Rus, Holly M; Cameron, Linda D
2016-10-01
Social media provides unprecedented opportunities for enhancing health communication and health care, including self-management of chronic conditions such as diabetes. Creating messages that engage users is critical for enhancing message impact and dissemination. This study analyzed health communications within ten diabetes-related Facebook pages to identify message features predictive of user engagement. The Common-Sense Model of Illness Self-Regulation and established health communication techniques guided content analyses of 500 Facebook posts. Each post was coded for message features predicted to engage users and numbers of likes, shares, and comments during the week following posting. Multi-level, negative binomial regressions revealed that specific features predicted different forms of engagement. Imagery emerged as a strong predictor; messages with images had higher rates of liking and sharing relative to messages without images. Diabetes consequence information and positive identity predicted higher sharing while negative affect, social support, and crowdsourcing predicted higher commenting. Negative affect, crowdsourcing, and use of external links predicted lower sharing while positive identity predicted lower commenting. The presence of imagery weakened or reversed the positive relationships of several message features with engagement. Diabetes control information and negative affect predicted more likes in text-only messages, but fewer likes when these messages included illustrative imagery. Similar patterns of imagery's attenuating effects emerged for the positive relationships of consequence information, control information, and positive identity with shares and for positive relationships of negative affect and social support with comments. These findings hold promise for guiding communication design in health-related social media.
NASA Technical Reports Server (NTRS)
Phillips, Jennifer K.
1995-01-01
Two of the current and most popular implementations of the Message-Passing Standard, Message Passing Interface (MPI), were contrasted: MPICH by Argonne National Laboratory, and LAM by the Ohio Supercomputer Center at Ohio State University. A parallel skyline matrix solver was adapted to be run in a heterogeneous environment using MPI. The Message-Passing Interface Forum was held in May 1994 which lead to a specification of library functions that implement the message-passing model of parallel communication. LAM, which creates it's own environment, is more robust in a highly heterogeneous network. MPICH uses the environment native to the machine architecture. While neither of these free-ware implementations provides the performance of native message-passing or vendor's implementations, MPICH begins to approach that performance on the SP-2. The machines used in this study were: IBM RS6000, 3 Sun4, SGI, and the IBM SP-2. Each machine is unique and a few machines required specific modifications during the installation. When installed correctly, both implementations worked well with only minor problems.
Implementing Multidisciplinary and Multi-Zonal Applications Using MPI
NASA Technical Reports Server (NTRS)
Fineberg, Samuel A.
1995-01-01
Multidisciplinary and multi-zonal applications are an important class of applications in the area of Computational Aerosciences. In these codes, two or more distinct parallel programs or copies of a single program are utilized to model a single problem. To support such applications, it is common to use a programming model where a program is divided into several single program multiple data stream (SPMD) applications, each of which solves the equations for a single physical discipline or grid zone. These SPMD applications are then bound together to form a single multidisciplinary or multi-zonal program in which the constituent parts communicate via point-to-point message passing routines. Unfortunately, simple message passing models, like Intel's NX library, only allow point-to-point and global communication within a single system-defined partition. This makes implementation of these applications quite difficult, if not impossible. In this report it is shown that the new Message Passing Interface (MPI) standard is a viable portable library for implementing the message passing portion of multidisciplinary applications. Further, with the extension of a portable loader, fully portable multidisciplinary application programs can be developed. Finally, the performance of MPI is compared to that of some native message passing libraries. This comparison shows that MPI can be implemented to deliver performance commensurate with native message libraries.
Specification of Fenix MPI Fault Tolerance library version 1.0.1
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gamble, Marc; Van Der Wijngaart, Rob; Teranishi, Keita
This document provides a specification of Fenix, a software library compatible with the Message Passing Interface (MPI) to support fault recovery without application shutdown. The library consists of two modules. The first, termed process recovery , restores an application to a consistent state after it has suffered a loss of one or more MPI processes (ranks). The second specifies functions the user can invoke to store application data in Fenix managed redundant storage, and to retrieve it from that storage after process recovery.
1988-12-01
Break Control....................51 8755 I/O Control..................54 Z-100 Control Software................. 55 Pass User Memory...the emulator SRAM and the other is 55 for the target SRAM. If either signal is replaced by the NACK signal the host computer displays an error message...Block Diagram 69 AUU M/M 8 in Fiur[:. cemti Daga 70m F’M I-- ’I ANLAD AMam U52 COMM ow U2 i M.2 " -n ax- U 6_- Figure 2b. Schematic Diagram 71 )-M -A -I
Seismic switch for strong motion measurement
Harben, Philip E.; Rodgers, Peter W.; Ewert, Daniel W.
1995-01-01
A seismic switching device that has an input signal from an existing microseismic station seismometer and a signal from a strong motion measuring instrument. The seismic switch monitors the signal level of the strong motion instrument and passes the seismometer signal to the station data telemetry and recording systems. When the strong motion instrument signal level exceeds a user set threshold level, the seismometer signal is switched out and the strong motion signal is passed to the telemetry system. The amount of time the strong motion signal is passed before switching back to the seismometer signal is user controlled between 1 and 15 seconds. If the threshold level is exceeded during a switch time period, the length of time is extended from that instant by one user set time period.
Seismic switch for strong motion measurement
Harben, P.E.; Rodgers, P.W.; Ewert, D.W.
1995-05-30
A seismic switching device is described that has an input signal from an existing microseismic station seismometer and a signal from a strong motion measuring instrument. The seismic switch monitors the signal level of the strong motion instrument and passes the seismometer signal to the station data telemetry and recording systems. When the strong motion instrument signal level exceeds a user set threshold level, the seismometer signal is switched out and the strong motion signal is passed to the telemetry system. The amount of time the strong motion signal is passed before switching back to the seismometer signal is user controlled between 1 and 15 seconds. If the threshold level is exceeded during a switch time period, the length of time is extended from that instant by one user set time period. 11 figs.
Battle Staff Operations: Synchronization of Planning at Battalion and Brigade Level
1989-06-02
tactical employment of the tank and mechanized infantry battalion task force. In consonance with Airland Battle doctrine, the document emphasizes ...letter entitled *Emphasis on Rapid Estimates and Decisions on the Atomic Battlefield.’ Emphasizing the increased tempo of the post war mechanized army...If so, a copy of the message is automatically canted to the user(s) identified in the distribution field. Queries are messages retrived records from
Efficient Implementation of Multigrid Solvers on Message-Passing Parrallel Systems
NASA Technical Reports Server (NTRS)
Lou, John
1994-01-01
We discuss our implementation strategies for finite difference multigrid partial differential equation (PDE) solvers on message-passing systems. Our target parallel architecture is Intel parallel computers: the Delta and Paragon system.
Comparing the OpenMP, MPI, and Hybrid Programming Paradigm on an SMP Cluster
NASA Technical Reports Server (NTRS)
Jost, Gabriele; Jin, Hao-Qiang; anMey, Dieter; Hatay, Ferhat F.
2003-01-01
Clusters of SMP (Symmetric Multi-Processors) nodes provide support for a wide range of parallel programming paradigms. The shared address space within each node is suitable for OpenMP parallelization. Message passing can be employed within and across the nodes of a cluster. Multiple levels of parallelism can be achieved by combining message passing and OpenMP parallelization. Which programming paradigm is the best will depend on the nature of the given problem, the hardware components of the cluster, the network, and the available software. In this study we compare the performance of different implementations of the same CFD benchmark application, using the same numerical algorithm but employing different programming paradigms.
The design of multi-core DSP parallel model based on message passing and multi-level pipeline
NASA Astrophysics Data System (ADS)
Niu, Jingyu; Hu, Jian; He, Wenjing; Meng, Fanrong; Li, Chuanrong
2017-10-01
Currently, the design of embedded signal processing system is often based on a specific application, but this idea is not conducive to the rapid development of signal processing technology. In this paper, a parallel processing model architecture based on multi-core DSP platform is designed, and it is mainly suitable for the complex algorithms which are composed of different modules. This model combines the ideas of multi-level pipeline parallelism and message passing, and summarizes the advantages of the mainstream model of multi-core DSP (the Master-Slave model and the Data Flow model), so that it has better performance. This paper uses three-dimensional image generation algorithm to validate the efficiency of the proposed model by comparing with the effectiveness of the Master-Slave and the Data Flow model.
Gauge-free cluster variational method by maximal messages and moment matching.
Domínguez, Eduardo; Lage-Castellanos, Alejandro; Mulet, Roberto; Ricci-Tersenghi, Federico
2017-04-01
We present an implementation of the cluster variational method (CVM) as a message passing algorithm. The kind of message passing algorithm used for CVM, usually named generalized belief propagation (GBP), is a generalization of the belief propagation algorithm in the same way that CVM is a generalization of the Bethe approximation for estimating the partition function. However, the connection between fixed points of GBP and the extremal points of the CVM free energy is usually not a one-to-one correspondence because of the existence of a gauge transformation involving the GBP messages. Our contribution is twofold. First, we propose a way of defining messages (fields) in a generic CVM approximation, such that messages arrive on a given region from all its ancestors, and not only from its direct parents, as in the standard parent-to-child GBP. We call this approach maximal messages. Second, we focus on the case of binary variables, reinterpreting the messages as fields enforcing the consistency between the moments of the local (marginal) probability distributions. We provide a precise rule to enforce all consistencies, avoiding any redundancy, that would otherwise lead to a gauge transformation on the messages. This moment matching method is gauge free, i.e., it guarantees that the resulting GBP is not gauge invariant. We apply our maximal messages and moment matching GBP to obtain an analytical expression for the critical temperature of the Ising model in general dimensions at the level of plaquette CVM. The values obtained outperform Bethe estimates, and are comparable with loop corrected belief propagation equations. The method allows for a straightforward generalization to disordered systems.
Gauge-free cluster variational method by maximal messages and moment matching
NASA Astrophysics Data System (ADS)
Domínguez, Eduardo; Lage-Castellanos, Alejandro; Mulet, Roberto; Ricci-Tersenghi, Federico
2017-04-01
We present an implementation of the cluster variational method (CVM) as a message passing algorithm. The kind of message passing algorithm used for CVM, usually named generalized belief propagation (GBP), is a generalization of the belief propagation algorithm in the same way that CVM is a generalization of the Bethe approximation for estimating the partition function. However, the connection between fixed points of GBP and the extremal points of the CVM free energy is usually not a one-to-one correspondence because of the existence of a gauge transformation involving the GBP messages. Our contribution is twofold. First, we propose a way of defining messages (fields) in a generic CVM approximation, such that messages arrive on a given region from all its ancestors, and not only from its direct parents, as in the standard parent-to-child GBP. We call this approach maximal messages. Second, we focus on the case of binary variables, reinterpreting the messages as fields enforcing the consistency between the moments of the local (marginal) probability distributions. We provide a precise rule to enforce all consistencies, avoiding any redundancy, that would otherwise lead to a gauge transformation on the messages. This moment matching method is gauge free, i.e., it guarantees that the resulting GBP is not gauge invariant. We apply our maximal messages and moment matching GBP to obtain an analytical expression for the critical temperature of the Ising model in general dimensions at the level of plaquette CVM. The values obtained outperform Bethe estimates, and are comparable with loop corrected belief propagation equations. The method allows for a straightforward generalization to disordered systems.
Price-Haywood, Eboni G; Luo, Qingyang; Monlezun, Dominique
2018-02-09
Organizational strategies for implementing eHealth tools influence patient and provider use of portal technology. This study examines whether the intensity of bidirectional secure portal messaging is associated with improved clinical outcomes. This is a retrospective cohort analysis of 101 019 patients with diabetes or hypertension (11 138 active portal users) who received primary care within the Ochsner Health System between 2012 and 2014. Propensity score-adjusted multivariable fixed effects regression panel analysis was used to examine associations between intensity of "medical advice" portal messaging and glucose/blood pressure control. Most portal users rarely used medical advice messaging. A higher proportion of patients who were age 50 years and older, female, white non-Hispanic, and with co-morbid diabetes and hypertension had higher frequency and intensity of medical advice messaging. Study findings revealed a dose-response effect of the intensity of messaging on glucose control, whereby, compared to nonportal users, each level of messaging among portal users was associated with greater decreases in HbA1c (β estimate [95% CI]: none -0.28 (-0.34 to -0.22); low -0.28 (-0.32 to -0.24); medium -0.41 (-0.52 to -0.31); high -0.43 (-0.60 to -0.27), all P ≤ .001). There was no observed effect on blood pressure. The digital divide exists not only between portal users and nonusers but also among portal users. Research exploring the relationship between intensity of bidirectional secure messaging and health outcomes for a broader scope of chronic conditions is needed. Future implementation research must also elucidate best practices that enhance not only the use of portals by patients and providers, but how they use portals. © The Author(s) 2018. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com
Preference for gain- or loss-framed electronic cigarette prevention messages.
Kong, Grace; Cavallo, Dana A; Camenga, Deepa R; Morean, Meghan E; Krishnan-Sarin, Suchitra
2016-11-01
Effective electronic cigarette (e-cigarette) prevention messages are needed to combat the rising popularity/uptake of e-cigarettes among youth. We examined preferences for e-cigarette prevention messages that either emphasized gains (e.g., You save money by not using e-cigarettes) or losses (e.g., You spend money by using e-cigarettes) among adolescents and young adults. Using surveys in two middle schools, four high schools, and one college in CT (N=5405), we assessed students' preferences for gain- or loss-framed e-cigarette prevention messages related to four themes: financial cost, health risks, addiction potential, and social labeling as a smoker. We also assessed whether preferences for each message framing theme differed by sex, school level, cigarette-use status, and e-cigarette use-status. We also examined whether preference for message framing differed by cigarette and e-cigarette susceptibility status among never e-cigarette users. Overall, loss-framing was preferred for message themes related to health risks, addiction potential, and social labeling as a smoker, whereas gain-framing was preferred for message themes related to financial cost. Logistic regression analyses showed that 1) females preferred loss-framed messages for all themes relative to males, 2) lifetime e-cigarette users preferred loss-framed health risks and social labeling messages relative to never users, and 3) high school students preferred gain-framed social labeling messages relative to college students. The preference for message framing did not differ by cigarette or e-cigarette susceptibility. Preference for message framing differed by themes and individual characteristics. This formative research could inform the construction of persuasive e-cigarette prevention messages. Copyright © 2016. Published by Elsevier Ltd.
Quantum cluster variational method and message passing algorithms revisited
NASA Astrophysics Data System (ADS)
Domínguez, E.; Mulet, Roberto
2018-02-01
We present a general framework to study quantum disordered systems in the context of the Kikuchi's cluster variational method (CVM). The method relies in the solution of message passing-like equations for single instances or in the iterative solution of complex population dynamic algorithms for an average case scenario. We first show how a standard application of the Kikuchi's CVM can be easily translated to message passing equations for specific instances of the disordered system. We then present an "ad hoc" extension of these equations to a population dynamic algorithm representing an average case scenario. At the Bethe level, these equations are equivalent to the dynamic population equations that can be derived from a proper cavity ansatz. However, at the plaquette approximation, the interpretation is more subtle and we discuss it taking also into account previous results in classical disordered models. Moreover, we develop a formalism to properly deal with the average case scenario using a replica-symmetric ansatz within this CVM for quantum disordered systems. Finally, we present and discuss numerical solutions of the different approximations for the quantum transverse Ising model and the quantum random field Ising model in two-dimensional lattices.
Nelson, Lyndsay A; Mayberry, Lindsay S; Wallston, Kenneth; Kripalani, Sunil; Bergner, Erin M; Osborn, Chandra Y
2016-09-08
Among adults with type 2 diabetes mellitus (T2DM), adherence to recommended self-care activities is suboptimal, especially among racial and ethnic minorities with low income. Self-care nonadherence is associated with having worse glycemic control and diabetes complications. Text messaging interventions are improving the self-care of adults with T2DM, but few have been tested with disadvantaged populations. To develop Rapid Education/Encouragement And Communications for Health (REACH), a tailored, text messaging intervention to support the self-care adherence of disadvantaged patients with T2DM, based on the Information-Motivation-Behavioral skills model. We then tested REACH's usability to make improvements before evaluating its effects. We developed REACH's content and functionality using an empirical and theory-based approach, findings from a previously pilot-tested intervention, and the expertise of our interdisciplinary research team. We recruited 36 adults with T2DM from Federally Qualified Health Centers to participate in 1 of 3 rounds of usability testing. For 2 weeks, participants received daily text messages assessing and promoting self-care, including tailored messages addressing users' unique barriers to adherence, and weekly text messages with adherence feedback. We analyzed quantitative and qualitative user feedback and system-collected data to improve REACH. Participants were, on average, 52.4 (SD 9.5) years old, 56% (20/36) female, 63% (22/35) were a racial or ethnic minority, and 67% (22/33) had an income less than US $35,000. About half were taking insulin, and average hemoglobin A1c level was 8.2% (SD 2.2%). We identified issues (eg, user concerns with message phrasing, technical restrictions with responding to assessment messages) and made improvements between testing rounds. Overall, participants favorably rated the ease of understanding (mean 9.6, SD 0.7) and helpfulness (mean 9.3, SD 1.4) of self-care promoting text messages on a scale of 1-10, responded to 96% of assessment text messages, and rated the helpfulness of feedback text messages 8.5 (SD 2.7) on a scale of 1-10. User feedback led to refining our study enrollment process so that users understood the flexibility in message timing and that computers, not people, send the messages. Furthermore, research assistants' feedback on the enrollment process helped improve participants' engagement with study procedures. Testing technology-delivered interventions with disadvantaged adults revealed preferences and concerns unique to this population. Through iterative testing and multiple data sources, we identified and responded to users' intervention preferences, technical issues, and shortcomings in our research procedures.
Diffusion of Messages from an Electronic Cigarette Brand to Potential Users through Twitter
Chu, Kar-Hai; Unger, Jennifer B.; Allem, Jon-Patrick; Pattarroyo, Monica; Soto, Daniel; Cruz, Tess Boley; Yang, Haodong; Jiang, Ling; Yang, Christopher C.
2015-01-01
Objective This study explores the presence and actions of an electronic cigarette (e-cigarette) brand, Blu, on Twitter to observe how marketing messages are sent and diffused through the retweet (i.e., message forwarding) functionality. Retweet networks enable messages to reach additional Twitter users beyond the sender’s local network. We follow messages from their origin through multiple retweets to identify which messages have more reach, and the different users who are exposed. Methods We collected three months of publicly available data from Twitter. A combination of techniques in social network analysis and content analysis were applied to determine the various networks of users who are exposed to e-cigarette messages and how the retweet network can affect which messages spread. Results The Blu retweet network expanded during the study period. Analysis of user profiles combined with network cluster analysis showed that messages of certain topics were only circulated within a community of e-cigarette supporters, while other topics spread further, reaching more general Twitter users who may not support or use e-cigarettes. Conclusions Retweet networks can serve as proxy filters for marketing messages, as Twitter users decide which messages they will continue to diffuse among their followers. As certain e-cigarette messages extend beyond their point of origin, the audience being exposed expands beyond the e-cigarette community. Potential implications for health education campaigns include utilizing Twitter and targeting important gatekeepers or hubs that would maximize message diffusion. PMID:26684746
Message passing with parallel queue traversal
Underwood, Keith D [Albuquerque, NM; Brightwell, Ronald B [Albuquerque, NM; Hemmert, K Scott [Albuquerque, NM
2012-05-01
In message passing implementations, associative matching structures are used to permit list entries to be searched in parallel fashion, thereby avoiding the delay of linear list traversal. List management capabilities are provided to support list entry turnover semantics and priority ordering semantics.
Message passing for integrating and assessing renewable generation in a redundant power grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zdeborova, Lenka; Backhaus, Scott; Chertkov, Michael
2009-01-01
A simplified model of a redundant power grid is used to study integration of fluctuating renewable generation. The grid consists of large number of generator and consumer nodes. The net power consumption is determined by the difference between the gross consumption and the level of renewable generation. The gross consumption is drawn from a narrow distribution representing the predictability of aggregated loads, and we consider two different distributions representing wind and solar resources. Each generator is connected to D consumers, and redundancy is built in by connecting R {le} D of these consumers to other generators. The lines are switchablemore » so that at any instance each consumer is connected to a single generator. We explore the capacity of the renewable generation by determining the level of 'firm' generation capacity that can be displaced for different levels of redundancy R. We also develop message-passing control algorithm for finding switch sellings where no generator is overloaded.« less
Application Portable Parallel Library
NASA Technical Reports Server (NTRS)
Cole, Gary L.; Blech, Richard A.; Quealy, Angela; Townsend, Scott
1995-01-01
Application Portable Parallel Library (APPL) computer program is subroutine-based message-passing software library intended to provide consistent interface to variety of multiprocessor computers on market today. Minimizes effort needed to move application program from one computer to another. User develops application program once and then easily moves application program from parallel computer on which created to another parallel computer. ("Parallel computer" also include heterogeneous collection of networked computers). Written in C language with one FORTRAN 77 subroutine for UNIX-based computers and callable from application programs written in C language or FORTRAN 77.
ConformRank: A conformity-based rank for finding top-k influential users
NASA Astrophysics Data System (ADS)
Wang, Qiyao; Jin, Yuehui; Cheng, Shiduan; Yang, Tan
2017-05-01
Finding influential users is a hot topic in social networks. For example, advertisers identify influential users to make a successful campaign. Retweeters forward messages from original users, who originally publish messages. This action is referred to as retweeting. Retweeting behaviors generate influence. Original users have influence on retweeters. Whether retweeters keep the same sentiment as original users is taken into consideration in this study. Influence is calculated based on conformity from emotional perspective after retweeting. A conformity-based algorithm, called ConformRank, is proposed to find top-k influential users, who make the most users keep the same sentiment after retweeting messages. Emotional conformity is introduced to denote how users conform to original users from the emotional perspective. Conforming weights are introduced to denote how two users keep the same sentiment after retweeting messages. Emotional conformity is applied for users and conforming weights are used for relations. Experiments were conducted on Sina Weibo. Experimental results show that users have larger influence when they publish positive messages.
Neighbourhood-consensus message passing and its potentials in image processing applications
NASA Astrophysics Data System (ADS)
Ružic, Tijana; Pižurica, Aleksandra; Philips, Wilfried
2011-03-01
In this paper, a novel algorithm for inference in Markov Random Fields (MRFs) is presented. Its goal is to find approximate maximum a posteriori estimates in a simple manner by combining neighbourhood influence of iterated conditional modes (ICM) and message passing of loopy belief propagation (LBP). We call the proposed method neighbourhood-consensus message passing because a single joint message is sent from the specified neighbourhood to the central node. The message, as a function of beliefs, represents the agreement of all nodes within the neighbourhood regarding the labels of the central node. This way we are able to overcome the disadvantages of reference algorithms, ICM and LBP. On one hand, more information is propagated in comparison with ICM, while on the other hand, the huge amount of pairwise interactions is avoided in comparison with LBP by working with neighbourhoods. The idea is related to the previously developed iterated conditional expectations algorithm. Here we revisit it and redefine it in a message passing framework in a more general form. The results on three different benchmarks demonstrate that the proposed technique can perform well both for binary and multi-label MRFs without any limitations on the model definition. Furthermore, it manifests improved performance over related techniques either in terms of quality and/or speed.
Pope, Bernard J; Fitch, Blake G; Pitman, Michael C; Rice, John J; Reumann, Matthias
2011-01-01
Future multiscale and multiphysics models must use the power of high performance computing (HPC) systems to enable research into human disease, translational medical science, and treatment. Previously we showed that computationally efficient multiscale models will require the use of sophisticated hybrid programming models, mixing distributed message passing processes (e.g. the message passing interface (MPI)) with multithreading (e.g. OpenMP, POSIX pthreads). The objective of this work is to compare the performance of such hybrid programming models when applied to the simulation of a lightweight multiscale cardiac model. Our results show that the hybrid models do not perform favourably when compared to an implementation using only MPI which is in contrast to our results using complex physiological models. Thus, with regards to lightweight multiscale cardiac models, the user may not need to increase programming complexity by using a hybrid programming approach. However, considering that model complexity will increase as well as the HPC system size in both node count and number of cores per node, it is still foreseeable that we will achieve faster than real time multiscale cardiac simulations on these systems using hybrid programming models.
Foundations for a healthy future.
Riley, R; Green, J; Willis, S; Soden, E; Rushby, C; Postle, D; Wakeling, S
1998-01-01
Health promotion activities with children and young people are important as they take messages about health seriously and can be influential in spreading messages about healthy living to their friends and families. Child health professionals have an important role to play in passing on messages of positive health to children and young people. Peer education is a useful way of passing on messages about health to young people. This article shares examples of three health promotion projects with children in a community trust, looking at asthma, sex education and testicular examination.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gorentla Venkata, Manjunath; Graham, Richard L; Ladd, Joshua S
This paper describes the design and implementation of InfiniBand (IB) CORE-Direct based blocking and nonblocking broadcast operations within the Cheetah collective operation framework. It describes a novel approach that fully ofFLoads collective operations and employs only user-supplied buffers. For a 64 rank communicator, the latency of CORE-Direct based hierarchical algorithm is better than production-grade Message Passing Interface (MPI) implementations, 150% better than the default Open MPI algorithm and 115% better than the shared memory optimized MVAPICH implementation for a one kilobyte (KB) message, and for eight mega-bytes (MB) it is 48% and 64% better, respectively. Flat-topology broadcast achieves 99.9% overlapmore » in a polling based communication-computation test, and 95.1% overlap for a wait based test, compared with 92.4% and 17.0%, respectively, for a similar Central Processing Unit (CPU) based implementation.« less
Lee, Joy L; DeCamp, Matthew; Dredze, Mark; Chisolm, Margaret S; Berger, Zackary D
2014-10-15
Twitter is home to many health professionals who send messages about a variety of health-related topics. Amid concerns about physicians posting inappropriate content online, more in-depth knowledge about these messages is needed to understand health professionals' behavior on Twitter. Our goal was to characterize the content of Twitter messages, specifically focusing on health professionals and their tweets relating to health. We performed an in-depth content analysis of 700 tweets. Qualitative content analysis was conducted on tweets by health users on Twitter. The primary objective was to describe the general type of content (ie, health-related versus non-health related) on Twitter authored by health professionals and further to describe health-related tweets on the basis of the type of statement made. Specific attention was given to whether a tweet was personal (as opposed to professional) or made a claim that users would expect to be supported by some level of medical evidence (ie, a "testable" claim). A secondary objective was to compare content types among different users, including patients, physicians, nurses, health care organizations, and others. Health-related users are posting a wide range of content on Twitter. Among health-related tweets, 53.2% (184/346) contained a testable claim. Of health-related tweets by providers, 17.6% (61/346) were personal in nature; 61% (59/96) made testable statements. While organizations and businesses use Twitter to promote their services and products, patient advocates are using this tool to share their personal experiences with health. Twitter users in health-related fields tweet about both testable claims and personal experiences. Future work should assess the relationship between testable tweets and the actual level of evidence supporting them, including how Twitter users-especially patients-interpret the content of tweets posted by health providers.
Chain of Custody Item Monitor Message Viewer v.1.0 Beta
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schwartz, Steven Robert; Fielder, Laura; Hymel, Ross W.
The CoCIM Message Viewer software allows users to connect to and download messages from a Chain of Custody Item Monitor (CoCIM) connected to a serial port on the user’s computer. The downloaded messages are authenticated and displayed in a Graphical User Interface that allows the user a limited degree of sorting and filtering of the downloaded messages as well as the ability to save downloaded files or to open previously downloaded message history files.
Adding Fault Tolerance to NPB Benchmarks Using ULFM
DOE Office of Scientific and Technical Information (OSTI.GOV)
Parchman, Zachary W; Vallee, Geoffroy R; Naughton III, Thomas J
2016-01-01
In the world of high-performance computing, fault tolerance and application resilience are becoming some of the primary concerns because of increasing hardware failures and memory corruptions. While the research community has been investigating various options, from system-level solutions to application-level solutions, standards such as the Message Passing Interface (MPI) are also starting to include such capabilities. The current proposal for MPI fault tolerant is centered around the User-Level Failure Mitigation (ULFM) concept, which provides means for fault detection and recovery of the MPI layer. This approach does not address application-level recovery, which is currently left to application developers. In thismore » work, we present a mod- ification of some of the benchmarks of the NAS parallel benchmark (NPB) to include support of the ULFM capabilities as well as application-level strategies and mechanisms for application-level failure recovery. As such, we present: (i) an application-level library to checkpoint and restore data, (ii) extensions of NPB benchmarks for fault tolerance based on different strategies, (iii) a fault injection tool, and (iv) some preliminary results that show the impact of such fault tolerant strategies on the application execution.« less
Dispatching packets on a global combining network of a parallel computer
Almasi, Gheorghe [Ardsley, NY; Archer, Charles J [Rochester, MN
2011-07-19
Methods, apparatus, and products are disclosed for dispatching packets on a global combining network of a parallel computer comprising a plurality of nodes connected for data communications using the network capable of performing collective operations and point to point operations that include: receiving, by an origin system messaging module on an origin node from an origin application messaging module on the origin node, a storage identifier and an operation identifier, the storage identifier specifying storage containing an application message for transmission to a target node, and the operation identifier specifying a message passing operation; packetizing, by the origin system messaging module, the application message into network packets for transmission to the target node, each network packet specifying the operation identifier and an operation type for the message passing operation specified by the operation identifier; and transmitting, by the origin system messaging module, the network packets to the target node.
MPIRUN: A Portable Loader for Multidisciplinary and Multi-Zonal Applications
NASA Technical Reports Server (NTRS)
Fineberg, Samuel A.; Woodrow, Thomas S. (Technical Monitor)
1994-01-01
Multidisciplinary and multi-zonal applications are an important class of applications in the area of Computational Aerosciences. In these codes, two or more distinct parallel programs or copies of a single program are utilized to model a single problem. To support such applications, it is common to use a programming model where a program is divided into several single program multiple data stream (SPMD) applications, each of which solves the equations for a single physical discipline or grid zone. These SPMD applications are then bound together to form a single multidisciplinary or multi-zonal program in which the constituent parts communicate via point-to-point message passing routines. One method for implementing the message passing portion of these codes is with the new Message Passing Interface (MPI) standard. Unfortunately, this standard only specifies the message passing portion of an application, but does not specify any portable mechanisms for loading an application. MPIRUN was developed to provide a portable means for loading MPI programs, and was specifically targeted at multidisciplinary and multi-zonal applications. Programs using MPIRUN for loading and MPI for message passing are then portable between all machines supported by MPIRUN. MPIRUN is currently implemented for the Intel iPSC/860, TMC CM5, IBM SP-1 and SP-2, Intel Paragon, and workstation clusters. Further, MPIRUN is designed to be simple enough to port easily to any system supporting MPI.
Lung Cancer Messages on Twitter: Content Analysis and Evaluation.
Sutton, Jeannette; Vos, Sarah C; Olson, Michele K; Woods, Chelsea; Cohen, Elisia; Gibson, C Ben; Phillips, Nolan Edward; Studts, Jamie L; Eberth, Jan M; Butts, Carter T
2018-01-01
The aim of this project was to describe and evaluate the levels of lung cancer communication across the cancer prevention and control continuum for content posted to Twitter during a 10-day period (September 30 to October 9) in 2016. Descriptive and inferential statistics were used to identify relationships between tweet characteristics in lung cancer communication on Twitter and user-level data. Overall, 3,000 tweets published between September 30 and October 9 were assessed by a team of three coders. Lung cancer-specific tweets by user type (individuals, media, and organizations) were examined to identify content and structural message features. The study also assessed differences by user type in the use of hashtags, directed messages, health topic focus, and lung cancer-specific focus across the cancer control continuum. Across the universe of lung cancer tweets, the majority of tweets focused on treatment and the use of pharmaceutical and research interventions, followed by awareness and prevention and risk topics. Among all lung cancer tweets, messages were most consistently tweeted by individual users, and personal behavioral mobilizing cues to action were rare. Lung cancer advocates, as well as patient and medical advocacy organizations, with an interest in expanding the reach and effectiveness of social media efforts should monitor the topical nature of public tweets across the cancer continuum and consider integrating cues to action as a strategy to increase engagement and behavioral activation pertaining to lung cancer reduction efforts. Copyright © 2017 American College of Radiology. Published by Elsevier Inc. All rights reserved.
Jacobs, Chris; Pichert, Gabriella; Harris, Jackie; Tucker, Kathy; Michie, Susan
2017-11-01
Genetic testing of cancer predisposing genes will increasingly be needed in oncology clinics to target cancer treatment. This Delphi study aimed to identify areas of agreement and disagreement between genetics and oncology health professionals and service users about the key messages required by women with breast/ovarian cancer who undergo BRCA1/BRCA2 genetic testing and the optimal timing of communicating key messages. Participants were 16 expert health professionals specialising in oncology/genetics and 16 service users with breast/ovarian cancer and a pathogenic BRCA1/BRCA2 variant. Online questionnaires containing 53 inductively developed information messages were circulated to the groups separately. Participants rated each message as key/not key on a Likert scale and suggested additional messages. Questionnaires were modified according to the feedback and up to 3 rounds were circulated. Consensus was reached when there was ≥75% agreement. Thirty key messages were agreed by both groups with 7 of the key messages agreed by ≥95% of participants: dominant inheritance, the availability of predictive testing, the importance of pretest discussion, increased risk of breast and ovarian cancer, and the option of risk-reducing mastectomy and bilateral salpingo-oophorectomy. Both groups agreed that key messages should be communicated before genetic testing and once a pathogenic variant has been identified. There was a high level of agreement within and between the groups about the information requirements of women with breast/ovarian cancer about BRCA1/BRCA2. These key messages will be helpful in developing new approaches to the delivery of information as genetic testing becomes further integrated into mainstream oncology services. Copyright © 2017 John Wiley & Sons, Ltd.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Painter, J.; McCormick, P.; Krogh, M.
This paper presents the ACL (Advanced Computing Lab) Message Passing Library. It is a high throughput, low latency communications library, based on Thinking Machines Corp.`s CMMD, upon which message passing applications can be built. The library has been implemented on the Cray T3D, Thinking Machines CM-5, SGI workstations, and on top of PVM.
DeCamp, Matthew; Dredze, Mark; Chisolm, Margaret S; Berger, Zackary D
2014-01-01
Background Twitter is home to many health professionals who send messages about a variety of health-related topics. Amid concerns about physicians posting inappropriate content online, more in-depth knowledge about these messages is needed to understand health professionals’ behavior on Twitter. Objective Our goal was to characterize the content of Twitter messages, specifically focusing on health professionals and their tweets relating to health. Methods We performed an in-depth content analysis of 700 tweets. Qualitative content analysis was conducted on tweets by health users on Twitter. The primary objective was to describe the general type of content (ie, health-related versus non-health related) on Twitter authored by health professionals and further to describe health-related tweets on the basis of the type of statement made. Specific attention was given to whether a tweet was personal (as opposed to professional) or made a claim that users would expect to be supported by some level of medical evidence (ie, a “testable” claim). A secondary objective was to compare content types among different users, including patients, physicians, nurses, health care organizations, and others. Results Health-related users are posting a wide range of content on Twitter. Among health-related tweets, 53.2% (184/346) contained a testable claim. Of health-related tweets by providers, 17.6% (61/346) were personal in nature; 61% (59/96) made testable statements. While organizations and businesses use Twitter to promote their services and products, patient advocates are using this tool to share their personal experiences with health. Conclusions Twitter users in health-related fields tweet about both testable claims and personal experiences. Future work should assess the relationship between testable tweets and the actual level of evidence supporting them, including how Twitter users—especially patients—interpret the content of tweets posted by health providers. PMID:25591063
NASA Astrophysics Data System (ADS)
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-12-01
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-01-01
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary. PMID:25518810
Improving UDP/IP Transmission Without Increasing Congestion
NASA Technical Reports Server (NTRS)
Burleigh, Scott
2006-01-01
Datagram Retransmission (DGR) is a computer program that, within certain limits, ensures the reception of each datagram transmitted under the User Datagram Protocol/Internet Protocol. [User Datagram Protocol (UDP) is considered unreliable because it does not involve a reliability-ensuring connection-initiation dialogue between sender and receiver. UDP is well suited to issuing of many small messages to many different receivers.] Unlike prior software for ensuring reception of UDP datagrams, DGR does not contribute to network congestion by retransmitting data more frequently as an ever-increasing number of messages and acknowledgements is lost. Instead, DGR does just the opposite: DGR includes an adaptive timeout-interval- computing component that provides maximum opportunity for reception of acknowledgements, minimizing retransmission. By monitoring changes in the rate at which message-transmission transactions are completed, DGR detects changes in the level of congestion and responds by imposing varying degrees of delay on the transmission of new messages. In addition, DGR maximizes throughput by not waiting for acknowledgement of a message before sending the next message. All DGR communication is asynchronous, to maximize efficient utilization of network connections. DGR manages multiple concurrent datagram transmission and acknowledgement conversations.
Information processing in the CNS: a supramolecular chemistry?
Tozzi, Arturo
2015-10-01
How does central nervous system process information? Current theories are based on two tenets: (a) information is transmitted by action potentials, the language by which neurons communicate with each other-and (b) homogeneous neuronal assemblies of cortical circuits operate on these neuronal messages where the operations are characterized by the intrinsic connectivity among neuronal populations. In this view, the size and time course of any spike is stereotypic and the information is restricted to the temporal sequence of the spikes; namely, the "neural code". However, an increasing amount of novel data point towards an alternative hypothesis: (a) the role of neural code in information processing is overemphasized. Instead of simply passing messages, action potentials play a role in dynamic coordination at multiple spatial and temporal scales, establishing network interactions across several levels of a hierarchical modular architecture, modulating and regulating the propagation of neuronal messages. (b) Information is processed at all levels of neuronal infrastructure from macromolecules to population dynamics. For example, intra-neuronal (changes in protein conformation, concentration and synthesis) and extra-neuronal factors (extracellular proteolysis, substrate patterning, myelin plasticity, microbes, metabolic status) can have a profound effect on neuronal computations. This means molecular message passing may have cognitive connotations. This essay introduces the concept of "supramolecular chemistry", involving the storage of information at the molecular level and its retrieval, transfer and processing at the supramolecular level, through transitory non-covalent molecular processes that are self-organized, self-assembled and dynamic. Finally, we note that the cortex comprises extremely heterogeneous cells, with distinct regional variations, macromolecular assembly, receptor repertoire and intrinsic microcircuitry. This suggests that every neuron (or group of neurons) embodies different molecular information that hands an operational effect on neuronal computation.
A practical guide to replica-exchange Wang—Landau simulations
NASA Astrophysics Data System (ADS)
Vogel, Thomas; Li, Ying Wai; Landau, David P.
2018-04-01
This paper is based on a series of tutorial lectures about the replica-exchange Wang-Landau (REWL) method given at the IX Brazilian Meeting on Simulational Physics (BMSP 2017). It provides a practical guide for the implementation of the method. A complete example code for a model system is available online. In this paper, we discuss the main parallel features of this code after a brief introduction to the REWL algorithm. The tutorial section is mainly directed at users who have written a single-walker Wang–Landau program already but might have just taken their first steps in parallel programming using the Message Passing Interface (MPI). In the last section, we answer “frequently asked questions” from users about the implementation of REWL for different scientific problems.
Can Secure Patient-Provider Messaging Improve Diabetes Care?
Chung, Sukyung; Panattoni, Laura; Chi, Jeffrey; Palaniappan, Latha
2017-10-01
Internet-based secure messaging between patients and providers through a patient portal is now common in the practice of modern medicine. There is limited evidence on how messaging is associated with use and clinical quality measures among patients with type 2 diabetes. We examine whether messaging with physicians for medical advice is associated with fewer face-to-face visits and better diabetes management. Patients with diabetes who were enrolled in an online portal of an outpatient health care organization in 2011-2014 were studied ( N = 37,762 patient-years). Messages from/to primary care physicians or diabetes-related specialists for medical advice were considered. We estimated the association of messaging with diabetes quality measures, adjusting for patient and provider characteristics and patient-level clustering. Most patients (72%) used messaging, and those who made frequent visits were also more likely to message. Given visit frequency, no (vs. any) messaging was negatively associated with the likelihood of meeting an HbA 1c target of <8% (64 mmol/mol) (odds ratio [OR] 0.83 [95% CI 0.77, 0.90]). Among message users, additional messages (vs. 1) were associated with better outcome (two more messages: OR 1.17 [95% CI 1.06, 1.28]; three more messages: 1.38 [1.25, 1.53]; four more messages: 1.55 [1.43, 1.69]). The relationship was stronger for noninsulin users. Message frequency was also positively associated, but to a smaller extent, with process measures (e.g., eye examination). Physician-initiated messages had effects similar to those for patient-initiated messages. Patients with diabetes frequently used secure messaging for medical advice in addition to routine visits to care providers. Messaging was positively associated with better diabetes management in a large community outpatient practice. © 2017 by the American Diabetes Association.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Perry, Marcia; Agarwal, Deb
2003-03-17
The PCCEServer application is a server that should be used in conjunction with the LBNLSecureMessaging user interface to enable secure synchronous and asynchronous messaging. It provides authentication and authorization services for members of a collaboration group via PKI/SSL and maintains an access control list. Members of collaboration groups using the LBNLSecureMessaging client must register identifying information. including usemame and password and an optional X.509 certificate, with the PCCEServer. This registration not only restricts access to instant messaging, but augments the LBNLSecureMessaging's IRC-based chat facility with persistence. Users register permanent unique user ids by which they are knowTl to other usersmore » in the system and create permanent venues intended for group conversations on a tong-term or continuous basis. In addition, the PCCEServer enhances instant messaging with presence and awareness information such as user availability, and it allows users to leave notes asynchronously for other users who are online or offline. Written in Java, it is a standalone application that can run on any platform that supports a Java Virtual Machine.« less
DMA engine for repeating communication patterns
Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard; Vranas, Pavlos
2010-09-21
A parallel computer system is constructed as a network of interconnected compute nodes to operate a global message-passing application for performing communications across the network. Each of the compute nodes includes one or more individual processors with memories which run local instances of the global message-passing application operating at each compute node to carry out local processing operations independent of processing operations carried out at other compute nodes. Each compute node also includes a DMA engine constructed to interact with the application via Injection FIFO Metadata describing multiple Injection FIFOs where each Injection FIFO may containing an arbitrary number of message descriptors in order to process messages with a fixed processing overhead irrespective of the number of message descriptors included in the Injection FIFO.
Overview of Sparse Graph for Multiple Access in Future Mobile Networks
NASA Astrophysics Data System (ADS)
Lei, Jing; Li, Baoguo; Li, Erbao; Gong, Zhenghui
2017-10-01
Multiple access via sparse graph, such as low density signature (LDS) and sparse code multiple access (SCMA), is a promising technique for future wireless communications. This survey presents an overview of the developments in this burgeoning field, including transmitter structures, extrinsic information transform (EXIT) chart analysis and comparisons with existing multiple access techniques. Such technique enables multiple access under overloaded conditions to achieve a satisfactory performance. Message passing algorithm is utilized for multi-user detection in the receiver, and structures of the sparse graph are illustrated in detail. Outlooks and challenges of this technique are also presented.
Young, Rachel
2015-09-01
Social media users post messages about health goals and behaviors to online social networks. Compared with more traditional sources of health communication such as physicians or health journalists, peer sources are likely to be perceived as more socially close or similar, which influences how messages are processed. This experimental study uses construal level theory of psychological distance to predict how mediated health messages from peers influence health-related cognition and behavioral intention. Participants were exposed to source cues that identified peer sources as being either highly attitudinally and demographically similar to or different from participants. As predicted by construal level theory, participants who perceived sources of social media health messages as highly similar listed a greater proportion of beliefs about the feasibility of health behaviors and a greater proportion of negative beliefs, while participants who perceived sources as more dissimilar listed a greater proportion of positive beliefs about the health behaviors. Results of the study could be useful in determining how health messages from peers could encourage individuals to set realistic health goals.
Seeman, Neil; Seeman, Bob
2017-01-01
Reaching the recipient of online health messages is necessary to Web-based health promotion applications. To measure willingness to adhere to a health-related Web message, we explored the frequency with which more than 13 million Web users ignored or opted to receive a random inbound message. The findings suggest declining curiosity among Web users about online messages, and that certain days may be more propitious than others for communicating with users. This approach can be modified to gather more granular insights into how messages, including timing and design features, can be tailored to promote improved public health messaging.
Does the Type of Event Influence How User Interactions Evolve on Twitter?
del Val, Elena; Rebollo, Miguel; Botti, Vicente
2015-01-01
The number of people using on-line social networks as a new way of communication is continually increasing. The messages that a user writes in these networks and his/her interactions with other users leave a digital trace that is recorded. Thanks to this fact and the use of network theory, the analysis of messages, user interactions, and the complex structures that emerge is greatly facilitated. In addition, information generated in on-line social networks is labeled temporarily, which makes it possible to go a step further analyzing the dynamics of the interaction patterns. In this article, we present an analysis of the evolution of user interactions that take place in television, socio-political, conference, and keynote events on Twitter. Interactions have been modeled as networks that are annotated with the time markers. We study changes in the structural properties at both the network level and the node level. As a result of this analysis, we have detected patterns of network evolution and common structural features as well as differences among the events. PMID:25961305
Montagne, Michael
2011-01-01
Messages posted on the MSN Health message board in response to a news story reporting that antidepressant medications are placebos were examined. Over 37 days, 1,624 messages were posted by 1,238 unique authors. The sampling unit consisted of 960 authors who were users. Users' messages were gathered in real time and content analyzed. Few users explicitly responded to the question posed in the article: 2.5% of the users stated their antidepressant was a miracle drug, 2.0% stated it was a poison, and only 0.2% stated it was a placebo. Users reported positive experiences with antidepressants more than twice as often as they reported negative experiences. Copyright © 2011 Informa Healthcare USA, Inc.
Cannabis, alcohol use, psychological distress, and decision-making style.
Phillips, James G; Ogeil, Rowan P
2017-09-01
There have been suggestions of hypofrontality in cannabis users. To understand cannabis-related differences in decisional processes, Janis and Mann's conflict model of decision making was applied to recreational cannabis smokers who varied in their alcohol use and level of psychological distress. An online sample of recreational substance users (114 male, 119 female) completed the Melbourne Decision Making Questionnaire, the Alcohol Use Disorders Identification Test (AUDIT), Kessler's Psychological Distress Scale (K10), and the Severity of Dependence Scale (SDS) for cannabis. Multivariate analysis of variance examined self-reported decision-making styles as a function of gender, recent cannabis use, risky alcohol consumption, and levels of psychological distress. Psychological distress was associated with lower decisional self-esteem and higher levels of procrastination and buck-passing. There were gender differences associated with cannabis use. Female cannabis users reported higher levels of hypervigilance, while male cannabis users reported lower levels of buck-passing. Although there was little indication of an avoidant decisional style in cannabis users, the results suggest that cannabis affects decisional processes, contributing to panic in females and impulsivity in males.
Event Driven Messaging with Role-Based Subscriptions
NASA Technical Reports Server (NTRS)
Bui, Tung; Bui, Bach; Malhotra, Shantanu; Chen, Fannie; Kim, rachel; Allen, Christopher; Luong, Ivy; Chang, George; Zendejas, Silvino; Sadaqathulla, Syed
2009-01-01
Event Driven Messaging with Role-Based Subscriptions (EDM-RBS) is a framework integrated into the Service Management Database (SMDB) to allow for role-based and subscription-based delivery of synchronous and asynchronous messages over JMS (Java Messaging Service), SMTP (Simple Mail Transfer Protocol), or SMS (Short Messaging Service). This allows for 24/7 operation with users in all parts of the world. The software classifies messages by triggering data type, application source, owner of data triggering event (mission), classification, sub-classification and various other secondary classifying tags. Messages are routed to applications or users based on subscription rules using a combination of the above message attributes. This program provides a framework for identifying connected users and their applications for targeted delivery of messages over JMS to the client applications the user is logged into. EDMRBS provides the ability to send notifications over e-mail or pager rather than having to rely on a live human to do it. It is implemented as an Oracle application that uses Oracle relational database management system intrinsic functions. It is configurable to use Oracle AQ JMS API or an external JMS provider for messaging. It fully integrates into the event-logging framework of SMDB (Subnet Management Database).
ScatterBlogs2: real-time monitoring of microblog messages through user-guided filtering.
Bosch, Harald; Thom, Dennis; Heimerl, Florian; Püttmann, Edwin; Koch, Steffen; Krüger, Robert; Wörner, Michael; Ertl, Thomas
2013-12-01
The number of microblog posts published daily has reached a level that hampers the effective retrieval of relevant messages, and the amount of information conveyed through services such as Twitter is still increasing. Analysts require new methods for monitoring their topic of interest, dealing with the data volume and its dynamic nature. It is of particular importance to provide situational awareness for decision making in time-critical tasks. Current tools for monitoring microblogs typically filter messages based on user-defined keyword queries and metadata restrictions. Used on their own, such methods can have drawbacks with respect to filter accuracy and adaptability to changes in trends and topic structure. We suggest ScatterBlogs2, a new approach to let analysts build task-tailored message filters in an interactive and visual manner based on recorded messages of well-understood previous events. These message filters include supervised classification and query creation backed by the statistical distribution of terms and their co-occurrences. The created filter methods can be orchestrated and adapted afterwards for interactive, visual real-time monitoring and analysis of microblog feeds. We demonstrate the feasibility of our approach for analyzing the Twitter stream in emergency management scenarios.
Message Passing vs. Shared Address Space on a Cluster of SMPs
NASA Technical Reports Server (NTRS)
Shan, Hongzhang; Singh, Jaswinder Pal; Oliker, Leonid; Biswas, Rupak
2000-01-01
The convergence of scalable computer architectures using clusters of PCs (or PC-SMPs) with commodity networking has become an attractive platform for high end scientific computing. Currently, message-passing and shared address space (SAS) are the two leading programming paradigms for these systems. Message-passing has been standardized with MPI, and is the most common and mature programming approach. However message-passing code development can be extremely difficult, especially for irregular structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality, and high protocol overhead. In this paper, we compare the performance of and programming effort, required for six applications under both programming models on a 32 CPU PC-SMP cluster. Our application suite consists of codes that typically do not exhibit high efficiency under shared memory programming. due to their high communication to computation ratios and complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of our applications: however, on certain classes of problems SAS performance is competitive with MPI. We also present new algorithms for improving the PC cluster performance of MPI collective operations.
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-12-18
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message a1a2···al from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each a(i) contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.
Xu, Lei; Jeavons, Peter
2015-11-01
Leader election in anonymous rings and complete networks is a very practical problem in distributed computing. Previous algorithms for this problem are generally designed for a classical message passing model where complex messages are exchanged. However, the need to send and receive complex messages makes such algorithms less practical for some real applications. We present some simple synchronous algorithms for distributed leader election in anonymous rings and complete networks that are inspired by the development of the neural system of the fruit fly. Our leader election algorithms all assume that only one-bit messages are broadcast by nodes in the network and processors are only able to distinguish between silence and the arrival of one or more messages. These restrictions allow implementations to use a simpler message-passing architecture. Even with these harsh restrictions our algorithms are shown to achieve good time and message complexity both analytically and experimentally.
Lieffers, Jessica R L; Haresign, Helen; Mehling, Christine; Arocha, Jose F; Hanning, Rhona M
2018-06-01
To conduct a qualitative evaluation of adjunct supports (brief motivational messaging regarding goals delivered by email/website, contact centre dietitian assistance) offered by EatRight Ontario (ERO) for users of a website-based nutrition/activity goal setting/tracking feature (eaTracker "My Goals"). One-on-one semi-structured interviews were conducted with My Goals users in Ontario (n = 18) and Alberta (n = 5) recruited via the eaTracker website and ERO contact centre dietitians (n = 5). Interview transcripts were analyzed using content analysis. Participants had mixed experiences and perspectives with ERO motivational messaging. Messages targeted towards specific goals (e.g., tips, recipes) were generally well-liked, and generic messages (e.g., eaTracker login reminders) were less useful. No interviewed users had contacted ERO dietitians regarding goals, and dietitians reported encountering few callers asking for assistance while using My Goals. Limited user knowledge was one explanation for this finding. Participants provided suggestions to enhance these supports. Electronic motivational messaging and contact centre dietitian assistance have the potential to support achievement of goals set with website-based features. When considering using electronic messaging, researchers and practitioners should consider message content and delivery tailoring. Marketing that focuses on how contact centre dietitians can assist website users with their goals is needed when services are used in naturalistic settings.
Colantonio, Lisandro D; Peña, Lorena; Whittaker, Robyn; Mejia, Raul M
2016-03-01
Few individual-level nonpharmacological interventions are available in Argentina to support smokers who attempt to quit. We conducted a cross-cultural adaptation of Stop Smoking with Mobile Phones, an English text message-based tobacco cessation program, in Buenos Aires. The process included English-Spanish translation and back-translation, face validity checking by two local tobacco cessation experts, and a complete review using a structured questionnaire and discussion groups with potential users (current smokers who want to quit or former smokers who quit in the past 6 months). An editing group was responsible for analyzing information collected and preparing adapted messages. Readability of final messages was assessed. Tobacco cessation experts found translated messages suitable for the local setting, although mention of "mate" (a local infusion which can trigger cravings) was recommended. Review of messages by two potential users confirmed most of the messages would help smokers to quit and resulted in minor edits. Potential users who participated in two discussion groups (n = 17, 64.7% female, age range: 30-73) found the content of messages was relevant for cessation and related to their own experiences, although they suggested adding information regarding the negative consequences of smoking. Participants emphasized that messages should be formatted using voseo and informal style and provided feedback on specific words and expressions. Readability of final messages was easy/very easy (Fernández Huerta Index: 79.93). The cross-cultural adaptation of Stop Smoking with Mobile Phones resulted in relevant revisions for the study population, including tone, wording, and pertinent information (eg, smoking consequences). Local acceptability and effectiveness should be confirmed in future studies. © The Author 2015. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
LeFevre, Amnesty E; Mohan, Diwakar; Hutchful, David; Jennings, Larissa; Mehl, Garrett; Labrique, Alain; Romano, Karen; Moorthy, Anitha
2017-03-14
Despite the growing use of technology in the health sector, little evidence is available on the technological performance of mobile health programs nor on the willingness of target users to utilize these technologies as intended (behavioral performance). In this case study of the Mobile Technology for Health (MOTECH) program in Ghana, we assess the platform's effectiveness in delivering messages, along with user response across sites in five districts from 2011 to 2014. MOTECH is comprised of "Client Data Application" (CDA) which allows providers to digitize and track service delivery information for women and infants and "Mobile Midwife" (MM) which sends automated educational voice messages to the mobile phones of pregnant and postpartum women. Using a naturalist study design, we draw upon system generated data to evaluate message delivery, client engagement, and provider responsiveness to MOTECH over time and by level of facility. A total of 7,370 women were enrolled in MM during pregnancy and 14,867 women were enrolled postpa1rtum. While providers were able to register and upload patient-level health information using CDA, the majority of these uploads occurred in Community-based facilities versus Health Centers. For MM, 25% or less of expected messages were received by pregnant women, despite the majority (>77%) owning a private mobile phone. While over 80% of messages received by pregnant women were listened to, postpartum rates of listening declined over time. Only 25% of pregnant women received and listened to at least 1 first trimester message. By 6-12 months postpartum, less than 6% of enrolled women were exposed to at least one message. Caution should be exercised in assuming that digital health programs perform as intended. Evaluations should measure the technological, behavioral, health systems, and/or community factors which may lead to breaks in the impact pathway and influence findings on effectiveness. The MOTECH platform's technological limitations in 'pushing' out voice messages highlights the need for more timely use of data to mitigate delivery challenges and improve exposure to health information. Alternative message delivery channels (USSD or SMS) could improve the platform's ability to deliver messages but may not be appropriate for illiterate users. Not applicable.
Mbuagbaw, Lawrence; Bonono-Momnougui, Renee-Cecile; Thabane, Lehana; Kouanfack, Charles; Smieja, Marek; Ongolo-Zogo, Pierre
2014-09-26
Mobile phone text messaging has been shown to improve adherence to antiretroviral therapy and to improve communication between patients and health care workers. It is unclear which strategies are most appropriate for scaling up text messaging programmes. We sought to investigate acceptability and readiness for ownership (community members designing, sending and receiving text messages) of a text message programme among a community of clients living with human immunodeficiency virus (HIV) in Yaoundé, Cameroon and to develop a framework for implementation. We used the mixed-methods sequential exploratory design. In the qualitative strand we conducted 7 focus group discussions (57 participants) to elicit themes related to acceptability and readiness. In the quantitative strand we explored the generalizability of these themes in a survey of 420 clients. Qualitative and quantitative data were merged to generate meta-inferences. Both qualitative and quantitative strands showed high levels of acceptability and readiness despite low rates of participation in other community-led projects. In the qualitative strand, compared to the quantitative strand, more potential service users were willing to pay for a text messaging service, preferred participation of health personnel in managing the project and preferred that the project be based in the hospital rather than in the community. Some of the limitations identified to implementing a community-owned project were lack of management skills in the community, financial, technical and literacy challenges. Participants who were willing to pay were more likely to find the project acceptable and expressed positive feelings about community readiness to own a text messaging project. Community ownership of a text messaging programme is acceptable to the community of clients at the Yaoundé Central Hospital. Our framework for implementation includes components for community members who take on roles as services users (demonstrating clear benefits, allowing a trial period and ensuring high levels of confidentiality) or service providers (training in project management and securing sustainable funding). Such a project can be evaluated using participation rate, clinical outcomes, satisfaction with the service, cost and feedback from users.
A message passing kernel for the hypercluster parallel processing test bed
NASA Technical Reports Server (NTRS)
Blech, Richard A.; Quealy, Angela; Cole, Gary L.
1989-01-01
A Message-Passing Kernel (MPK) for the Hypercluster parallel-processing test bed is described. The Hypercluster is being developed at the NASA Lewis Research Center to support investigations of parallel algorithms and architectures for computational fluid and structural mechanics applications. The Hypercluster resembles the hypercube architecture except that each node consists of multiple processors communicating through shared memory. The MPK efficiently routes information through the Hypercluster, using a message-passing protocol when necessary and faster shared-memory communication whenever possible. The MPK also interfaces all of the processors with the Hypercluster operating system (HYCLOPS), which runs on a Front-End Processor (FEP). This approach distributes many of the I/O tasks to the Hypercluster processors and eliminates the need for a separate I/O support program on the FEP.
Exploring Factors Influencing Mobile Users' Intention to Adopt Multimedia Messaging Service
ERIC Educational Resources Information Center
Chang, Shuchih Ernest; Pan, Ying-Hui Vera
2011-01-01
While short messaging service (SMS) is discussed often in recent literature, multimedia messaging service (MMS), a media rich successor of SMS, is seldom heard or understood by mobile users in Taiwan. The adoption rates of MMS are far from satisfactory, implying that there might be some factors keeping the potential users away from using MMS. This…
Effectiveness Testing of Embedded User Support for U.S. Army Installation-Level Software
1991-06-01
under what conditions Dynamic Help could influence performance and satisfaction. The ACIFS program was modified to provide automatic collection of all...under what conditions Dynamic Help can influence user performance and satisfaction. This chapter reports the design, implementation, and analysis of...ambiguous or is hidden in the body of the message. The ACIFS program has many user interface deficiencies, but it does allow the user to use trial and
ERIC Educational Resources Information Center
Schwan, Stephan; Straub, Daniela; Hesse, Friedrich W.
2002-01-01
Describes a study of computer conferencing where learners interacted over the course of four log-in sessions to acquire the knowledge sufficient to pass a learning test. Studied the number of messages irrelevant to the topic, explicit threading of messages, reading times of relevant messages, and learning outcomes. (LRW)
Development of a distributed control system for TOTEM experiment using ASIO Boost C++ libraries
NASA Astrophysics Data System (ADS)
Cafagna, F.; Mercadante, A.; Minafra, N.; Quinto, M.; Radicioni, E.
2014-06-01
The main goals of the TOTEM Experiment at the LHC are the measurements of the elastic and total p-p cross sections and the studies of the diffractive dissociation processes. Those scientific objectives are achieved by using three tracking detectors symmetrically arranged around the interaction point called IP5. The control system is based on a C++ software that allows the user, by means of a graphical interface, direct access to hardware and handling of devices configuration. A first release of the software was designed as a monolithic block, with all functionalities being merged together. Such approach showed soon its limits, mainly poor reusability and maintainability of the source code, evident not only in phase of bug-fixing, but also when one wants to extend functionalities or apply some other modifications. This led to the decision of a radical redesign of the software, now based on the dialogue (message-passing) among separate building blocks. Thanks to the acquired extensibility, the software gained new features and now is a complete tool by which it is possible not only to configure different devices interfacing with a large subset of buses like I2C and VME, but also to do data acquisition both for calibration and physics runs. Furthermore, the software lets the user set up a series of operations to be executed sequentially to handle complex operations. To achieve maximum flexibility, the program units may be run either as a single process or as separate processes on different PCs which exchange messages over the network, thus allowing remote control of the system. Portability is ensured by the adoption of the ASIO (Asynchronous Input Output) library of Boost, a cross-platform suite of libraries which is candidate to become part of the C++ 11 standard. We present the state of the art of this project and outline the future perspectives. In particular, we describe the system architecture and the message-passing scheme. We also report on the results obtained in a first complete test of the software both as a single process and on two PCs.
Mutti, Seema; Reid, Jessica L; Gupta, Prakash C; Pednekar, Mangesh S; Dhumal, Gauri; Nargis, Nigar; Hussain, Akm Ghulam; Hammond, David
2016-07-01
To examine the perceived effectiveness of text and pictorial smokeless tobacco health warnings in India and Bangladesh, including different types of message content. An experimental study was conducted in Navi Mumbai, India (n=1002), and Dhaka, Bangladesh (n=1081). Face-to-face interviews were conducted on tablets with adult (≥19 years) smokeless tobacco users and youth (16-18 years) users and non-users. Respondents viewed warnings depicting five health effects, within one of the four randomly assigned warning label conditions (or message themes): (1) text-only, (2) symbolic pictorial, (3) graphic pictorial or (4) personal testimonial pictorial messages. Text-only warnings were perceived as less effective than all of the pictorial styles (p<0.001 for all). Graphic warnings were given higher effectiveness ratings than symbolic or testimonial warnings (p<0.001). No differences were observed in levels of agreement with negative attitudes and beliefs across message themes, after respondents had viewed warnings. Pictorial warnings are more effective than text-only messages. Pictorial warnings depicting graphic health effects may have the greatest impact, consistent with research from high-income countries on cigarette warnings. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Controlled Bidirectional Quantum Secure Direct Communication
Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan
2014-01-01
We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages. PMID:25006596
ERIC Educational Resources Information Center
Chiang, Yu-Tzu; Lin, Sunny S. J.; Liu, Eric Zhi-Feng
2012-01-01
This research is comprised of two studies designed to explore the effects of online discussion forum aggressive messages and Internet cognitive distortion on users' negative affect and aggression. The results of study 1 revealed 69 users could perceive both disgust and hostility feelings toward aggressive messages conducted by the authors, and…
Sutton, Jeannette; Gibson, C. Ben; Spiro, Emma S.; League, Cedar; Fitzhugh, Sean M.; Butts, Carter T.
2015-01-01
Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not) perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials’ Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events. PMID:26295584
Teaching Gateways and Bridges To Rank Broadcast Messages for Educational Networks.
ERIC Educational Resources Information Center
Losee, Robert M., Jr.
Messages entering an educational information distribution network may be ranked for an ordered introduction into the network to maximize the timeliness of message arrivals over the set of users. Electronic mail, EDI documents, and broadcast news may be ranked by the users who choose to examine those messages of interest or benefit to themselves.…
The Edge-Disjoint Path Problem on Random Graphs by Message-Passing.
Altarelli, Fabrizio; Braunstein, Alfredo; Dall'Asta, Luca; De Bacco, Caterina; Franz, Silvio
2015-01-01
We present a message-passing algorithm to solve a series of edge-disjoint path problems on graphs based on the zero-temperature cavity equations. Edge-disjoint paths problems are important in the general context of routing, that can be defined by incorporating under a unique framework both traffic optimization and total path length minimization. The computation of the cavity equations can be performed efficiently by exploiting a mapping of a generalized edge-disjoint path problem on a star graph onto a weighted maximum matching problem. We perform extensive numerical simulations on random graphs of various types to test the performance both in terms of path length minimization and maximization of the number of accommodated paths. In addition, we test the performance on benchmark instances on various graphs by comparison with state-of-the-art algorithms and results found in the literature. Our message-passing algorithm always outperforms the others in terms of the number of accommodated paths when considering non trivial instances (otherwise it gives the same trivial results). Remarkably, the largest improvement in performance with respect to the other methods employed is found in the case of benchmarks with meshes, where the validity hypothesis behind message-passing is expected to worsen. In these cases, even though the exact message-passing equations do not converge, by introducing a reinforcement parameter to force convergence towards a sub optimal solution, we were able to always outperform the other algorithms with a peak of 27% performance improvement in terms of accommodated paths. On random graphs, we numerically observe two separated regimes: one in which all paths can be accommodated and one in which this is not possible. We also investigate the behavior of both the number of paths to be accommodated and their minimum total length.
The Edge-Disjoint Path Problem on Random Graphs by Message-Passing
2015-01-01
We present a message-passing algorithm to solve a series of edge-disjoint path problems on graphs based on the zero-temperature cavity equations. Edge-disjoint paths problems are important in the general context of routing, that can be defined by incorporating under a unique framework both traffic optimization and total path length minimization. The computation of the cavity equations can be performed efficiently by exploiting a mapping of a generalized edge-disjoint path problem on a star graph onto a weighted maximum matching problem. We perform extensive numerical simulations on random graphs of various types to test the performance both in terms of path length minimization and maximization of the number of accommodated paths. In addition, we test the performance on benchmark instances on various graphs by comparison with state-of-the-art algorithms and results found in the literature. Our message-passing algorithm always outperforms the others in terms of the number of accommodated paths when considering non trivial instances (otherwise it gives the same trivial results). Remarkably, the largest improvement in performance with respect to the other methods employed is found in the case of benchmarks with meshes, where the validity hypothesis behind message-passing is expected to worsen. In these cases, even though the exact message-passing equations do not converge, by introducing a reinforcement parameter to force convergence towards a sub optimal solution, we were able to always outperform the other algorithms with a peak of 27% performance improvement in terms of accommodated paths. On random graphs, we numerically observe two separated regimes: one in which all paths can be accommodated and one in which this is not possible. We also investigate the behavior of both the number of paths to be accommodated and their minimum total length. PMID:26710102
Lu, Xi; Katoh, Takahiko; Chen, Zi; Nagata, Toshiaki; Kitamura, Toshinori
2014-05-15
Text messaging may be excessive and young people may be dependent on it. We distributed the Self-perception of Text-message Dependency Scale (STDS), Hospital Anxiety and Depression Scale (HADS), Temperament and Character Inventory (TCI), and Relationship Questionnaire (RQ) to 223 Japanese university students in a two-wave study, separated by a 5-month interval. The STDS yielded a three-factor structure. The STDS scores across the two measurement occasions were stable across time (except for the Relationship Maintenance subscale). A hierarchical cluster analysis suggested a three-class structure interpreted as Normal Users, Excessive Users, and Dependent Users. Excessive Users and Dependent Users were characterized by a young age at initial mobile phone use, more frequent use of text messaging, higher Novelty Seeking, and better Other-Model patterns of adult attachment. Unlike Excessive Users, Dependent Users were characterized by lower Self-directedness, poorer Self-Model of adult attachment, and higher anxiety and depression. The Excessive Users, but not the Dependent Users, were characterized by high Reward Dependence and Co-operativeness. The present study demonstrated that the STDS has a robust factor structure, good construct validity, and temporal stability (except for Relationship Maintenance subscale); students could be classified into normal, excessive, and Dependent Users of the text messaging; and Dependent Users were characterized by Excessive Use and personality immaturity. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Hoerster, Katherine D; Mayer, Joni A
2013-09-01
The Correlates of Indoor Tanning in Youth (CITY100) project evaluated individual, built-environmental, and policy correlates of indoor tanning by adolescents in the 100 most populous US cities. After CITY100's completion, the research team obtained supplemental dissemination funding to strategically share data with stakeholders. The primary CITY100 dissemination message was to encourage state-level banning of indoor tanning among youth. We created a user-friendly website to broadly share the most relevant CITY100 data. Journalists were a primary target audience, as were health organizations that would be well positioned to advocate for legislative change. CITY100 data were used to pass the first US state law to ban indoor tanning among those under 18 (CA, USA), as well as in other legislative advocacy activities. This paper concludes with lessons learned from CITY100 dissemination activities that we hope will encourage more health researchers to proactively address policy implications of their data and to design relevant, effective dissemination strategies.
mHealth App for Cannabis Users: Satisfaction and Perceived Usefulness.
Monney, Grégoire; Penzenstadler, Louise; Dupraz, Olivia; Etter, Jean-François; Khazaal, Yasser
2015-01-01
The aim of this study was to describe the characteristics of cannabis users and their levels of satisfaction with Stop-cannabis, an app intended for cannabis users who want to stop or reduce their cannabis use or prevent relapse. A cross-sectional online survey was administered to users of Stop-cannabis, a French-language app for iOS and Android devices. All app users were invited to participate in the survey via a message sent to the app. For hundred and eighty-two users answered the survey. The app was used daily by 348 of the participants (around 70%). More than 80% of participants (397) considered the app to have helped them "a little" or "a lot" to stop or reduce cannabis consumption. Most of the users' suggestions were related to the number or the quality of the messages sent by, or displayed in, the app. This pilot study supports the feasibility of such an app and its perceived usefulness. A self-selection bias, however, limits the conclusions of the study. The efficacy of the app should be evaluated in a randomized controlled trial.
Message passing with a limited number of DMA byte counters
Blocksome, Michael [Rochester, MN; Chen, Dong [Croton on Hudson, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Kumar, Sameer [White Plains, NY; Parker, Jeffrey J [Rochester, MN
2011-10-04
A method for passing messages in a parallel computer system constructed as a plurality of compute nodes interconnected as a network where each compute node includes a DMA engine but includes only a limited number of byte counters for tracking a number of bytes that are sent or received by the DMA engine, where the byte counters may be used in shared counter or exclusive counter modes of operation. The method includes using rendezvous protocol, a source compute node deterministically sending a request to send (RTS) message with a single RTS descriptor using an exclusive injection counter to track both the RTS message and message data to be sent in association with the RTS message, to a destination compute node such that the RTS descriptor indicates to the destination compute node that the message data will be adaptively routed to the destination node. Using one DMA FIFO at the source compute node, the RTS descriptors are maintained for rendezvous messages destined for the destination compute node to ensure proper message data ordering thereat. Using a reception counter at a DMA engine, the destination compute node tracks reception of the RTS and associated message data and sends a clear to send (CTS) message to the source node in a rendezvous protocol form of a remote get to accept the RTS message and message data and processing the remote get (CTS) by the source compute node DMA engine to provide the message data to be sent.
Evaluation Metrics for the Paragon XP/S-15
NASA Technical Reports Server (NTRS)
Traversat, Bernard; McNab, David; Nitzberg, Bill; Fineberg, Sam; Blaylock, Bruce T. (Technical Monitor)
1993-01-01
On February 17th 1993, the Numerical Aerodynamic Simulation (NAS) facility located at the NASA Ames Research Center installed a 224 node Intel Paragon XP/S-15 system. After its installation, the Paragon was found to be in a very immature state and was unable to support a NAS users' workload, composed of a wide range of development and production activities. As a first step towards addressing this problem, we implemented a set of metrics to objectively monitor the system as operating system and hardware upgrades were installed. The metrics were designed to measure four aspects of the system that we consider essential to support our workload: availability, utilization, functionality, and performance. This report presents the metrics collected from February 1993 to August 1993. Since its installation, the Paragon availability has improved from a low of 15% uptime to a high of 80%, while its utilization has remained low. Functionality and performance have improved from merely running one of the NAS Parallel Benchmarks to running all of them faster (between 1 and 2 times) than on the iPSC/860. In spite of the progress accomplished, fundamental limitations of the Paragon operating system are restricting the Paragon from supporting the NAS workload. The maximum operating system message passing (NORMA IPC) bandwidth was measured at 11 Mbytes/s, well below the peak hardware bandwidth (175 Mbytes/s), limiting overall virtual memory and Unix services (i.e. Disk and HiPPI I/O) performance. The high NX application message passing latency (184 microns), three times than on the iPSC/860, was found to significantly degrade performance of applications relying on small message sizes. The amount of memory available for an application was found to be approximately 10 Mbytes per node, indicating that the OS is taking more space than anticipated (6 Mbytes per node).
Op den Akker, Harm; Cabrita, Miriam; Op den Akker, Rieks; Jones, Valerie M; Hermens, Hermie J
2015-06-01
This paper presents a comprehensive and practical framework for automatic generation of real-time tailored messages in behavior change applications. Basic aspects of motivational messages are time, intention, content and presentation. Tailoring of messages to the individual user may involve all aspects of communication. A linear modular system is presented for generating such messages. It is explained how properties of user and context are taken into account in each of the modules of the system and how they affect the linguistic presentation of the generated messages. The model of motivational messages presented is based on an analysis of existing literature as well as the analysis of a corpus of motivational messages used in previous studies. The model extends existing 'ontology-based' approaches to message generation for real-time coaching systems found in the literature. Practical examples are given on how simple tailoring rules can be implemented throughout the various stages of the framework. Such examples can guide further research by clarifying what it means to use e.g. user targeting to tailor a message. As primary example we look at the issue of promoting daily physical activity. Future work is pointed out in applying the present model and framework, defining efficient ways of evaluating individual tailoring components, and improving effectiveness through the creation of accurate and complete user- and context models. Copyright © 2015 Elsevier Inc. All rights reserved.
Public-channel cryptography based on mutual chaos pass filters.
Klein, Einat; Gross, Noam; Kopelowitz, Evi; Rosenbluh, Michael; Khaykovich, Lev; Kinzel, Wolfgang; Kanter, Ido
2006-10-01
We study the mutual coupling of chaotic lasers and observe both experimentally and in numeric simulations that there exists a regime of parameters for which two mutually coupled chaotic lasers establish isochronal synchronization, while a third laser coupled unidirectionally to one of the pair does not synchronize. We then propose a cryptographic scheme, based on the advantage of mutual coupling over unidirectional coupling, where all the parameters of the system are public knowledge. We numerically demonstrate that in such a scheme the two communicating lasers can add a message signal (compressed binary message) to the transmitted coupling signal and recover the message in both directions with high fidelity by using a mutual chaos pass filter procedure. An attacker, however, fails to recover an errorless message even if he amplifies the coupling signal.
Best practices in the use of hybrid static-dynamic signs.
DOT National Transportation Integrated Search
2012-12-01
Static signs are traditionally used to convey messages to the road users. The need to quickly communicate up-to-date messages to the road users has given rise to the increasing use of dynamic message signs (DMS). An alternative to DMS is hybrid signs...
Nelson, Lyndsay A; Mayberry, Lindsay S; Wallston, Kenneth; Kripalani, Sunil; Bergner, Erin M
2016-01-01
Background Among adults with type 2 diabetes mellitus (T2DM), adherence to recommended self-care activities is suboptimal, especially among racial and ethnic minorities with low income. Self-care nonadherence is associated with having worse glycemic control and diabetes complications. Text messaging interventions are improving the self-care of adults with T2DM, but few have been tested with disadvantaged populations. Objective To develop Rapid Education/Encouragement And Communications for Health (REACH), a tailored, text messaging intervention to support the self-care adherence of disadvantaged patients with T2DM, based on the Information-Motivation-Behavioral skills model. We then tested REACH’s usability to make improvements before evaluating its effects. Methods We developed REACH’s content and functionality using an empirical and theory-based approach, findings from a previously pilot-tested intervention, and the expertise of our interdisciplinary research team. We recruited 36 adults with T2DM from Federally Qualified Health Centers to participate in 1 of 3 rounds of usability testing. For 2 weeks, participants received daily text messages assessing and promoting self-care, including tailored messages addressing users’ unique barriers to adherence, and weekly text messages with adherence feedback. We analyzed quantitative and qualitative user feedback and system-collected data to improve REACH. Results Participants were, on average, 52.4 (SD 9.5) years old, 56% (20/36) female, 63% (22/35) were a racial or ethnic minority, and 67% (22/33) had an income less than US $35,000. About half were taking insulin, and average hemoglobin A1c level was 8.2% (SD 2.2%). We identified issues (eg, user concerns with message phrasing, technical restrictions with responding to assessment messages) and made improvements between testing rounds. Overall, participants favorably rated the ease of understanding (mean 9.6, SD 0.7) and helpfulness (mean 9.3, SD 1.4) of self-care promoting text messages on a scale of 1-10, responded to 96% of assessment text messages, and rated the helpfulness of feedback text messages 8.5 (SD 2.7) on a scale of 1-10. User feedback led to refining our study enrollment process so that users understood the flexibility in message timing and that computers, not people, send the messages. Furthermore, research assistants’ feedback on the enrollment process helped improve participants’ engagement with study procedures. Conclusions Testing technology-delivered interventions with disadvantaged adults revealed preferences and concerns unique to this population. Through iterative testing and multiple data sources, we identified and responded to users’ intervention preferences, technical issues, and shortcomings in our research procedures. PMID:27609738
Belief propagation decoding of quantum channels by passing quantum messages
NASA Astrophysics Data System (ADS)
Renes, Joseph M.
2017-07-01
The belief propagation (BP) algorithm is a powerful tool in a wide range of disciplines from statistical physics to machine learning to computational biology, and is ubiquitous in decoding classical error-correcting codes. The algorithm works by passing messages between nodes of the factor graph associated with the code and enables efficient decoding of the channel, in some cases even up to the Shannon capacity. Here we construct the first BP algorithm which passes quantum messages on the factor graph and is capable of decoding the classical-quantum channel with pure state outputs. This gives explicit decoding circuits whose number of gates is quadratic in the code length. We also show that this decoder can be modified to work with polar codes for the pure state channel and as part of a decoder for transmitting quantum information over the amplitude damping channel. These represent the first explicit capacity-achieving decoders for non-Pauli channels.
NASA Astrophysics Data System (ADS)
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.
2015-11-01
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A
2015-11-18
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
Assessment of newborn screening parent education materials.
Arnold, Connie L; Davis, Terry C; Frempong, Janet Ohene; Humiston, Sharon G; Bocchini, Anna; Kennen, Estela M; Lloyd-Puryear, Michele
2006-05-01
The purpose of this study was to measure the readability and user-friendliness (clarity, complexity, organization, appearance, and cultural appropriateness of materials) of parent education brochures on newborn screening. We studied English-language versions of the brochures that state newborn screening programs prepare and distribute. We obtained brochures from 48 states and Puerto Rico. We evaluated each brochure for readability with the Flesch reading ease formula. User-friendliness of the brochures was assessed with an instrument we created that contained 22 specific criteria grouped into 5 categories, ie, layout, illustrations, message, manageable information, and cultural appropriateness. Most current newborn screening brochures should be revised to make them more readable and user-friendly for parents. Ninety-two percent of brochures were written at a reading level that is higher than the average reading level of US adults (eighth-grade level). In most brochures, the essential information for parents was buried. Although all brochures were brief and focused on the newborn screening tests being performed, 81% needed improvement in getting to the point quickly and making it easy for parents to identify what they needed to know or to do. None of the brochures scored high in all 22 criteria on the user-friendliness checklist. Parent education materials about newborn screening should be revised to be easier to read and more user-friendly, by lowering the reading difficulty to eighth-grade level and focusing on issues such as layout, illustrations, message, information, and cultural appropriateness. It is important that state newborn screening programs and organizations work with parents to develop and to evaluate materials to ensure that they are user-friendly.
Relevance and speed of message delivery trade-offs in augmentative and alternative communication.
Bedrosian, Jan L; Hoag, Linda A; McCoy, Kathleen F
2003-08-01
This report is the first in a series of investigations designed to test a theory identifying the effects of conversational trade-offs between selected maxims on public attitudes toward augmentative and alternative communication (AAC) system users and their communication. In the current study, the trade-offs between the relevance of a prestored message and its speed of delivery were examined. Participating were 96 sales clerks. Twelve scripted videotaped conversational conditions, involving an AAC customer and a clerk at a checkout counter, were used to manipulate message relevance, speed of message delivery, and participant/AAC user gender. Following each assigned viewing, participants completed a questionnaire designed to assess their attitudes toward the AAC user and his or her communication. Significantly higher mean ratings were found for the conditions involving the slowly delivered relevant messages (both preceded by a conversational floorholder and without a floorholder) when compared to the quickly delivered partly relevant message condition. In addition, the condition involving the slowly delivered relevant message with a floorholder yielded significantly higher mean ratings than that without the floorholder. There was no effect for participant/user gender. Modifications of the theory and technological implications are discussed.
A cross-hazard analysis of terse message retransmission on Twitter.
Sutton, Jeannette; Gibson, C Ben; Phillips, Nolan Edward; Spiro, Emma S; League, Cedar; Johnson, Britta; Fitzhugh, Sean M; Butts, Carter T
2015-12-01
For decades, public warning messages have been relayed via broadcast information channels, including radio and television; more recently, risk communication channels have expanded to include social media sites, where messages can be easily amplified by user retransmission. This research examines the factors that predict the extent of retransmission for official hazard communications disseminated via Twitter. Using data from events involving five different hazards, we identity three types of attributes--local network properties, message content, and message style--that jointly amplify and/or attenuate the retransmission of official communications under imminent threat. We find that the use of an agreed-upon hashtag and the number of users following an official account positively influence message retransmission, as does message content describing hazard impacts or emphasizing cohesion among users. By contrast, messages directed at individuals, expressing gratitude, or including a URL were less widely disseminated than similar messages without these features. Our findings suggest that some measures commonly taken to convey additional information to the public (e.g., URL inclusion) may come at a cost in terms of message amplification; on the other hand, some types of content not traditionally emphasized in guidance on hazard communication may enhance retransmission rates.
Development of an E-mail Application Seemit and its Utilization in an Information Literacy Course
NASA Astrophysics Data System (ADS)
Kita, Toshihiro; Miyazaki, Makoto; Nakano, Hiroshi; Sugitani, Kenichi; Akiyama, Hidenori
We have developed a simple e-mail application named Seemit which is designed for being used in information literacy courses. It has necessary and sufficient functionality of an e-mail application, and it has been developed for the purpose of learning basic operations and mechanisms of e-mail transfer easily. It is equipped with the function to automatically set the configuration of user's SMTP/POP servers and e-mail address, etc. The process of transferring e-mail via SMTP and POP can be demonstrated step by step showing actual messages passed during the client-server interaction. We have utilized Seemit in a university-wide information literacy course which holds about 1800 students.
Baseline Motivation Type as a Predictor of Dropout in a Healthy Eating Text Messaging Program.
Coa, Kisha; Patrick, Heather
2016-09-29
Growing evidence suggests that text messaging programs are effective in facilitating health behavior change. However, high dropout rates limit the potential effectiveness of these programs. This paper describes patterns of early dropout in the HealthyYou text (HYTxt) program, with a focus on the impact of baseline motivation quality on dropout, as characterized by Self-Determination Theory (SDT). This analysis included 193 users of HYTxt, a diet and physical activity text messaging intervention developed by the US National Cancer Institute. Descriptive statistics were computed, and logistic regression models were run to examine the association between baseline motivation type and early program dropout. Overall, 43.0% (83/193) of users dropped out of the program; of these, 65.1% (54/83; 28.0% of all users) did so within the first 2 weeks. Users with higher autonomous motivation had significantly lower odds of dropping out within the first 2 weeks. A one unit increase in autonomous motivation was associated with lower odds (odds ratio 0.44, 95% CI 0.24-0.81) of early dropout, which persisted after adjusting for level of controlled motivation. Applying SDT-based strategies to enhance autonomous motivation might reduce early dropout rates, which can improve program exposure and effectiveness.
The NASTRAN User's Manual (Level 15)
NASA Technical Reports Server (NTRS)
Mccormick, C. W. (Editor)
1972-01-01
The User's manual for the NASA Structural Analysis (NASTRAN) program is presented. The manual contains all information needed to solve problems with NASTRAN. The volume is instructional and encyclopedic. The manual includes instruction in structural modeling techniques, instruction in input preparation, and information to assist the interpretation of the output. Descriptions of all input data cards, restart procedures, and diagnostic messages are developed.
Usage of the hybrid encryption in a cloud instant messages exchange system
NASA Astrophysics Data System (ADS)
Kvyetnyy, Roman N.; Romanyuk, Olexander N.; Titarchuk, Evgenii O.; Gromaszek, Konrad; Mussabekov, Nazarbek
2016-09-01
A new approach for constructing cloud instant messaging represented in this article allows users to encrypt data locally by using Diffie - Hellman key exchange protocol. The described approach allows to construct a cloud service which operates only by users encrypted messages; encryption and decryption takes place locally at the user party using a symmetric AES encryption. A feature of the service is the conferences support without the need for messages reecryption for each participant. In the article it is given an example of the protocol implementation on the ECC and RSA encryption algorithms basis, as well as a comparison of these implementations.
CSlib, a library to couple codes via Client/Server messaging
DOE Office of Scientific and Technical Information (OSTI.GOV)
Plimpton, Steve
The CSlib is a small, portable library which enables two (or more) independent simulation codes to be coupled, by exchanging messages with each other. Both codes link to the library when they are built, and can them communicate with each other as they run. The messages contain data or instructions that the two codes send back-and-forth to each other. The messaging can take place via files, sockets, or MPI. The latter is a standard distributed-memory message-passing library.
Prevention of sexually transmitted infections using mobile devices and ubiquitous computing.
Besoain, Felipe; Perez-Navarro, Antoni; Caylà, Joan A; Aviñó, Constanza Jacques; de Olalla, Patricia García
2015-05-03
Advances in the development of information and communication technologies have facilitated social interrelationships, but also sexual contacts without appropriate preventive measures. In this paper, we will focus on situations in which people use applications to meet sexual partners nearby, which could increase their chance of exposure to sexually transmitted infections (STI). How can we encourage users to adopt preventive measures without violating their privacy or infringing on the character of the application? To achieve the goal of preventing STI, we have used the design and creation methodology and have developed a prototype software package. This prototype follows the RESTful services principles and has two parts: an Android OS application with emphasis on ubiquitous computing and designed according to General Responsibility Assignment Software Patterns (GRASP), and a server with a web page. To choose the preventive messages, we performed a test in 17 men who have sex with men (MSM). Our software sends preventive notifications to users when it detects situations such as the activation of particular applications on their smartphones, or their proximity to areas with a high probability of intercourse (hot zones). The underlying idea is the same as that for warning messages on cigarette packets, since users read the message just when they are going to smoke. The messages used have been selected from a list that has been rated by the users themselves. The most popular message is "Enjoy sex and enjoy life. Do not expose yourself to HIV". The user is unaware of the software, which runs in the background. Ubiquitous computing may be useful for alerting users with preventive and educational messages. The proposed application is non-intrusive because: 1) the users themselves decide to install it and, therefore, users' privacy rights are preserved; 2) it sends a message that helps users think about taking appropriate preventive measures; and 3) it works in the background without interfering with users unless a trigger situation is detected. Thus, this type of application could become an important tool in the complex task of STI prevention.
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.
2015-01-01
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement. PMID:26577473
CDC WONDER: a cooperative processing architecture for public health.
Friede, A; Rosen, D H; Reid, J A
1994-01-01
CDC WONDER is an information management architecture designed for public health. It provides access to information and communications without the user's needing to know the location of data or communication pathways and mechanisms. CDC WONDER users have access to extractions from some 40 databases; electronic mail (e-mail); and surveillance data processing. System components include the Remote Client, the Communications Server, the Queue Managers, and Data Servers and Process Servers. The Remote Client software resides in the user's machine; other components are at the Centers for Disease Control and Prevention (CDC). The Remote Client, the Communications Server, and the Applications Server provide access to the information and functions in the Data Servers and Process Servers. The system architecture is based on cooperative processing, and components are coupled via pure message passing, using several protocols. This architecture allows flexibility in the choice of hardware and software. One system limitation is that final results from some subsystems are obtained slowly. Although designed for public health, CDC WONDER could be useful for other disciplines that need flexible, integrated information exchange. PMID:7719813
Chan, Brian; Lopez, Andrea; Sarkar, Urmimala
2015-01-01
Non-medical prescription opioid use is a growing public health concern. Social media is an emerging tool to understand health attitudes, beliefs, and behaviors. We retrieved a sample of publicly available Twitter messages in early 2014, using common opioid medication names and slang search terms. We used content analysis to code messages by user, context of message (personal vs general experiences), and key content themes. We reviewed 540 messages, of which 375 (69%) messages were related to opioid behaviors. Of these, 316 (84%) originated from individual user accounts; 125 messages expressed personal experience with opioids. The majority of personal messages referenced using opioids to obtain a "high", use for sleep, or other non-intended use (87,70%). General attitudes regarding opioid use included positive sentiment (52, 27%), comments on others peoples opioid use (57, 30%), and messages containing public health information or links (48, 25%). In a sample of social media messages mentioning opioid medications, the most common theme amongst English users related to various forms of opioid misuse. Social media can provide insights into the types of misuse of opioids that might aid public health efforts to reduce non-medical opioid use.
Design and Implementation of an Operations Module for the ARGOS paperless Ship System
1989-06-01
A. OPERATIONS STACK SCRIPTS SCRIPTS FOR STACK: operations * BACKGROUND #1: Operations * on openStack hide message box show menuBar pass openStack end... openStack ** CARD #1, BUTTON #1: Up ***** on mouseUp visual effect zoom out go to card id 10931 of stack argos end mouseUp ** CARD #1, BUTTON #2...STACK SCRIPTS SCRIPTS FOR STACK: Reports ** BACKGROUND #1: Operations * on openStack hie message box show menuBar pass openStack end openStack ** CARD #1
Experiences Using OpenMP Based on Compiler Directed Software DSM on a PC Cluster
NASA Technical Reports Server (NTRS)
Hess, Matthias; Jost, Gabriele; Mueller, Matthias; Ruehle, Roland; Biegel, Bryan (Technical Monitor)
2002-01-01
In this work we report on our experiences running OpenMP (message passing) programs on a commodity cluster of PCs (personal computers) running a software distributed shared memory (DSM) system. We describe our test environment and report on the performance of a subset of the NAS (NASA Advanced Supercomputing) Parallel Benchmarks that have been automatically parallelized for OpenMP. We compare the performance of the OpenMP implementations with that of their message passing counterparts and discuss performance differences.
Charon Message-Passing Toolkit for Scientific Computations
NASA Technical Reports Server (NTRS)
VanderWijngaart, Rob F.; Yan, Jerry (Technical Monitor)
2000-01-01
Charon is a library, callable from C and Fortran, that aids the conversion of structured-grid legacy codes-such as those used in the numerical computation of fluid flows-into parallel, high- performance codes. Key are functions that define distributed arrays, that map between distributed and non-distributed arrays, and that allow easy specification of common communications on structured grids. The library is based on the widely accepted MPI message passing standard. We present an overview of the functionality of Charon, and some representative results.
1992-10-01
5 2.1 Network Overview ................................................ 5 2.2 Network Access Methods...to TAC and ?4ini-TAC users, such as common error messages, TAC commands, and instructions for performing file tranders. Section 5 , Network Use...originally known as Interface Message Processors, or IMPs. 5 THE DEFENSE DATA NETWORK DRAFt NIC 60001, October 1992 message do not necessarily take the same
Couriers in the Inca Empire: Getting Your Message Across. [Lesson Plan].
ERIC Educational Resources Information Center
2002
This lesson shows how the Inca communicated across the vast stretches of their mountain realm, the largest empire of the pre-industrial world. The lesson explains how couriers carried messages along mountain-ridge roads, up and down stone steps, and over chasm-spanning footbridges. It states that couriers could pass a message from Quito (Ecuador)…
On codes with multi-level error-correction capabilities
NASA Technical Reports Server (NTRS)
Lin, Shu
1987-01-01
In conventional coding for error control, all the information symbols of a message are regarded equally significant, and hence codes are devised to provide equal protection for each information symbol against channel errors. However, in some occasions, some information symbols in a message are more significant than the other symbols. As a result, it is desired to devise codes with multilevel error-correcting capabilities. Another situation where codes with multi-level error-correcting capabilities are desired is in broadcast communication systems. An m-user broadcast channel has one input and m outputs. The single input and each output form a component channel. The component channels may have different noise levels, and hence the messages transmitted over the component channels require different levels of protection against errors. Block codes with multi-level error-correcting capabilities are also known as unequal error protection (UEP) codes. Structural properties of these codes are derived. Based on these structural properties, two classes of UEP codes are constructed.
1989-09-27
a run is always the @RUN statement, which can specify user-id, account number, and project-id. The @ PASSWD statement specifies password and security...Every-Page-Label Options PASSWD password for batch; F36 User-id validation chang for demand; comp, nent set for batch LEV change Clearance Level F33...clearance level @@PASS Change password F36 Current valid password must @@ PASSWD be specified @@SEND Display a print file F16 Sym to user-id or site-id that is
Critical field-exponents for secure message-passing in modular networks
NASA Astrophysics Data System (ADS)
Shekhtman, Louis M.; Danziger, Michael M.; Bonamassa, Ivan; Buldyrev, Sergey V.; Caldarelli, Guido; Zlatić, Vinko; Havlin, Shlomo
2018-05-01
We study secure message-passing in the presence of multiple adversaries in modular networks. We assume a dominant fraction of nodes in each module have the same vulnerability, i.e., the same entity spying on them. We find both analytically and via simulations that the links between the modules (interlinks) have effects analogous to a magnetic field in a spin-system in that for any amount of interlinks the system no longer undergoes a phase transition. We then define the exponents δ, which relates the order parameter (the size of the giant secure component) at the critical point to the field strength (average number of interlinks per node), and γ, which describes the susceptibility near criticality. These are found to be δ = 2 and γ = 1 (with the scaling of the order parameter near the critical point given by β = 1). When two or more vulnerabilities are equally present in a module we find δ = 1 and γ = 0 (with β ≥ 2). Apart from defining a previously unidentified universality class, these exponents show that increasing connections between modules is more beneficial for security than increasing connections within modules. We also measure the correlation critical exponent ν, and the upper critical dimension d c , finding that ν {d}c=3 as for ordinary percolation, suggesting that for secure message-passing d c = 6. These results provide an interesting analogy between secure message-passing in modular networks and the physics of magnetic spin-systems.
A qualitative study of smokers' responses to messages discouraging dual tobacco product use.
Popova, Lucy; Kostygina, Ganna; Sheon, Nicolas M; Ling, Pamela M
2014-04-01
Cigarette companies increasingly promote novel smokeless tobacco products to smokers, encouraging them to use smokeless tobacco in smoke-free environments. New messages may counteract this promotion. We developed 12 initial anti-smokeless message ideas and tested them in eight online focus groups with 75 US smokers. Those smokers who never tried smokeless tobacco were unaware of health risks of novel smokeless tobacco products, perceived scary messages as effective and acknowledged the addictive nature of nicotine. Smokers who had tried smokeless tobacco shared their personal (mainly negative) experiences with smokeless tobacco, were aware of health risks of novel smokeless tobacco products, but denied personal addiction, and misinterpreted or disregarded more threatening messages. Portraying women as smokeless tobacco users was perceived as unbelievable, and emphasizing the lack of appeal of novel smokeless tobacco products was perceived as encouraging continued smoking. Future ads should educate smokers about risks of novel smokeless tobacco products, but past users and never users may require different message strategies.
A qualitative study of smokers’ responses to messages discouraging dual tobacco product use
Popova, Lucy; Kostygina, Ganna; Sheon, Nicolas M.; Ling, Pamela M.
2014-01-01
Cigarette companies increasingly promote novel smokeless tobacco products to smokers, encouraging them to use smokeless tobacco in smoke-free environments. New messages may counteract this promotion. We developed 12 initial anti-smokeless message ideas and tested them in eight online focus groups with 75 US smokers. Those smokers who never tried smokeless tobacco were unaware of health risks of novel smokeless tobacco products, perceived scary messages as effective and acknowledged the addictive nature of nicotine. Smokers who had tried smokeless tobacco shared their personal (mainly negative) experiences with smokeless tobacco, were aware of health risks of novel smokeless tobacco products, but denied personal addiction, and misinterpreted or disregarded more threatening messages. Portraying women as smokeless tobacco users was perceived as unbelievable, and emphasizing the lack of appeal of novel smokeless tobacco products was perceived as encouraging continued smoking. Future ads should educate smokers about risks of novel smokeless tobacco products, but past users and never users may require different message strategies. PMID:24441592
Design of Instant Messaging System of Multi-language E-commerce Platform
NASA Astrophysics Data System (ADS)
Yang, Heng; Chen, Xinyi; Li, Jiajia; Cao, Yaru
2017-09-01
This paper aims at researching the message system in the instant messaging system based on the multi-language e-commerce platform in order to design the instant messaging system in multi-language environment and exhibit the national characteristics based information as well as applying national languages to e-commerce. In order to develop beautiful and friendly system interface for the front end of the message system and reduce the development cost, the mature jQuery framework is adopted in this paper. The high-performance server Tomcat is adopted at the back end to process user requests, and MySQL database is adopted for data storage to persistently store user data, and meanwhile Oracle database is adopted as the message buffer for system optimization. Moreover, AJAX technology is adopted for the client to actively pull the newest data from the server at the specified time. In practical application, the system has strong reliability, good expansibility, short response time, high system throughput capacity and high user concurrency.
Chan, Brian; Lopez, Andrea; Sarkar, Urmimala
2015-01-01
Objective Non-medical prescription opioid use is a growing public health concern. Social media is an emerging tool to understand health attitudes, beliefs, and behaviors. Methods We retrieved a sample of publicly available Twitter messages in early 2014, using common opioid medication names and slang search terms. We used content analysis to code messages by user, context of message (personal vs general experiences), and key content themes. Results We reviewed 540 messages, of which 375 (69%) messages were related to opioid behaviors. Of these, 316 (84%) originated from individual user accounts; 125 messages expressed personal experience with opioids. The majority of personal messages referenced using opioids to obtain a “high”, use for sleep, or other non-intended use (87,70%). General attitudes regarding opioid use included positive sentiment (52, 27%), comments on others peoples opioid use (57, 30%), and messages containing public health information or links (48, 25%). Conclusions In a sample of social media messages mentioning opioid medications, the most common theme amongst English users related to various forms of opioid misuse. Social media can provide insights into the types of misuse of opioids that might aid public health efforts to reduce non-medical opioid use. PMID:26252774
FAST: a framework for simulation and analysis of large-scale protein-silicon biosensor circuits.
Gu, Ming; Chakrabartty, Shantanu
2013-08-01
This paper presents a computer aided design (CAD) framework for verification and reliability analysis of protein-silicon hybrid circuits used in biosensors. It is envisioned that similar to integrated circuit (IC) CAD design tools, the proposed framework will be useful for system level optimization of biosensors and for discovery of new sensing modalities without resorting to laborious fabrication and experimental procedures. The framework referred to as FAST analyzes protein-based circuits by solving inverse problems involving stochastic functional elements that admit non-linear relationships between different circuit variables. In this regard, FAST uses a factor-graph netlist as a user interface and solving the inverse problem entails passing messages/signals between the internal nodes of the netlist. Stochastic analysis techniques like density evolution are used to understand the dynamics of the circuit and estimate the reliability of the solution. As an example, we present a complete design flow using FAST for synthesis, analysis and verification of our previously reported conductometric immunoassay that uses antibody-based circuits to implement forward error-correction (FEC).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Perry, Marcia
The IRCD is an IRC server that was originally distributed by the IRCD Hybrid developer team for use as a server in IRC message over the public Internet. By supporting the IRC protocol defined in the IRC RFC, IRCD allows the users to create and join channels for group or one-to-one text-based instant messaging. It stores information about channels (e.g., whether it is public, secret, or invite-only, the topic set, membership) and users (who is online and what channels they are members of). It receives messages for a specific user or channel and forwards these messages to the targeted destination.more » Since server-to-server communication is also supported, these targeted destinations may be connected to different IRC servers. Messages are exchanged over TCP connections that remain open between the client and the server. The IRCD is being used within the Pervasive Computing Collaboration Environment (PCCE) as the 'chat server' for message exchange over public and private channels. After an LBNLSecureMessaging(PCCE chat) client has been authenticated, the client connects to IRCD with its assigned nickname or 'nick.' The client can then create or join channels for group discussions or one-to-one conversations. These channels can have an initial mode of public or invite-only and the mode may be changed after creation. If a channel is public, any one online can join the discussion; if a channel is invite-only, users can only join if existing members of the channel explicity invite them. Users can be invited to any type of channel and users may be members of multiple channels simultaneously. For use with the PCCE environment, the IRCD application (which was written in C) was ported to Linux and has been tested and installed under Linux Redhat 7.2. The source code was also modified with SSL so that all messages exchanged over the network are encrypted. This modified IRC server also verifies with an authentication server that the client is who he or she claims to be and that this user is authorized to ain access to the IRCD.« less
Frohlich, Dennis Owen; Zmyslinski-Seelig, Anne
2012-01-01
The purpose of this study was to explore the types of social support messages YouTube users posted on medical videos. Specifically, the study compared messages posted on inflammatory bowel disease-related videos and ostomy-related videos. Additionally, the study analyzed the differences in social support messages posted on lay-created videos and professionally-created videos. Conducting a content analysis, the researchers unitized the comments on each video; the total number of thought units amounted to 5,960. Researchers coded each thought unit through the use of a coding scheme modified from a previous study. YouTube users posted informational support messages most frequently (65.1%), followed by emotional support messages (18.3%), and finally, instrumental support messages (8.2%).
Turk, Tahir; Newton, Fiona; Choudhury, Sohel; Islam, Md Shafiqul
2018-06-01
Tobacco use contributes to an estimated 14.6% of male and 5.7% of female deaths in Bangladesh. We examine the determinants of tobacco-related quit attempts among Bangladeshis with and without awareness of the synergized "People Behind the Packs" (PBTP) communication campaign used to support the introduction of pack-based graphic warning labels (GWLs) in 2016. Data from 1,796 adults were collected using multistage sampling and a cross-sectional face-to-face survey. Analyses used a normalized design weight to ensure representativeness to the national population of smokers within Bangladesh. For the overall sample, the multivariable logistic regression model revealed quit attempts were associated with having seen the pack-based GWLs, recalling ≥1 PBTP campaign message, higher levels of self-efficacy to quit, and recognizing more potential side-effects associated with using tobacco products. Conversely, the likelihood of quitting attempts were lower among dual tobacco users (relative to smokers) and those using tobacco at least daily (vs. less than daily). The hierarchical multivariable logistic regression model among those aware of ≥1 PBTP campaign message indicated quitting attempts were positively associated with recalling more of the campaign messages and discussing them with others. This national evaluation of pack-based GWLs and accompanying PBTP campaign within Bangladesh supports the efficacy of using synergized communication messages when introducing such labels. That quit attempts are more likely among those discussing PBTP campaign messages with others and recalling more PBTP campaign messages highlights the importance of ensuring message content is both memorable and engaging.
Relay Forward-Link File Management Services (MaROS Phase 2)
NASA Technical Reports Server (NTRS)
Allard, Daniel A.; Wallick, Michael N.; Hy, Franklin H.; Gladden, Roy E.
2013-01-01
This software provides the service-level functionality to manage the delivery of files from a lander mission repository to an orbiter mission repository for eventual spacelink relay by the orbiter asset on a specific communications pass. It provides further functions to deliver and track a set of mission-defined messages detailing lander authorization instructions and orbiter data delivery state. All of the information concerning these transactions is persisted in a database providing a high level of accountability of the forward-link relay process.
User Preferences for a Text Message-Based Smoking Cessation Intervention
ERIC Educational Resources Information Center
Bock, Beth C.; Heron, Kristin E.; Jennings, Ernestine G.; Magee, Joshua C.; Morrow, Kathleen M.
2013-01-01
Younger adults are more likely to smoke and less likely to seek treatment than older smokers. They are also frequent users of communication technology. In the current study, we conducted focus groups to obtain feedback about preferences for a text message-based smoking cessation program from potential users. Participants ("N" = 21, "M" age = 25.6…
[Series: Medical Applications of the PHITS Code (2): Acceleration by Parallel Computing].
Furuta, Takuya; Sato, Tatsuhiko
2015-01-01
Time-consuming Monte Carlo dose calculation becomes feasible owing to the development of computer technology. However, the recent development is due to emergence of the multi-core high performance computers. Therefore, parallel computing becomes a key to achieve good performance of software programs. A Monte Carlo simulation code PHITS contains two parallel computing functions, the distributed-memory parallelization using protocols of message passing interface (MPI) and the shared-memory parallelization using open multi-processing (OpenMP) directives. Users can choose the two functions according to their needs. This paper gives the explanation of the two functions with their advantages and disadvantages. Some test applications are also provided to show their performance using a typical multi-core high performance workstation.
SBML-PET-MPI: a parallel parameter estimation tool for Systems Biology Markup Language based models.
Zi, Zhike
2011-04-01
Parameter estimation is crucial for the modeling and dynamic analysis of biological systems. However, implementing parameter estimation is time consuming and computationally demanding. Here, we introduced a parallel parameter estimation tool for Systems Biology Markup Language (SBML)-based models (SBML-PET-MPI). SBML-PET-MPI allows the user to perform parameter estimation and parameter uncertainty analysis by collectively fitting multiple experimental datasets. The tool is developed and parallelized using the message passing interface (MPI) protocol, which provides good scalability with the number of processors. SBML-PET-MPI is freely available for non-commercial use at http://www.bioss.uni-freiburg.de/cms/sbml-pet-mpi.html or http://sites.google.com/site/sbmlpetmpi/.
PRAIS: Distributed, real-time knowledge-based systems made easy
NASA Technical Reports Server (NTRS)
Goldstein, David G.
1990-01-01
This paper discusses an architecture for real-time, distributed (parallel) knowledge-based systems called the Parallel Real-time Artificial Intelligence System (PRAIS). PRAIS strives for transparently parallelizing production (rule-based) systems, even when under real-time constraints. PRAIS accomplishes these goals by incorporating a dynamic task scheduler, operating system extensions for fact handling, and message-passing among multiple copies of CLIPS executing on a virtual blackboard. This distributed knowledge-based system tool uses the portability of CLIPS and common message-passing protocols to operate over a heterogeneous network of processors.
Gene-network inference by message passing
NASA Astrophysics Data System (ADS)
Braunstein, A.; Pagnani, A.; Weigt, M.; Zecchina, R.
2008-01-01
The inference of gene-regulatory processes from gene-expression data belongs to the major challenges of computational systems biology. Here we address the problem from a statistical-physics perspective and develop a message-passing algorithm which is able to infer sparse, directed and combinatorial regulatory mechanisms. Using the replica technique, the algorithmic performance can be characterized analytically for artificially generated data. The algorithm is applied to genome-wide expression data of baker's yeast under various environmental conditions. We find clear cases of combinatorial control, and enrichment in common functional annotations of regulated genes and their regulators.
Optimal mapping of neural-network learning on message-passing multicomputers
NASA Technical Reports Server (NTRS)
Chu, Lon-Chan; Wah, Benjamin W.
1992-01-01
A minimization of learning-algorithm completion time is sought in the present optimal-mapping study of the learning process in multilayer feed-forward artificial neural networks (ANNs) for message-passing multicomputers. A novel approximation algorithm for mappings of this kind is derived from observations of the dominance of a parallel ANN algorithm over its communication time. Attention is given to both static and dynamic mapping schemes for systems with static and dynamic background workloads, as well as to experimental results obtained for simulated mappings on multicomputers with dynamic background workloads.
Trace-Driven Debugging of Message Passing Programs
NASA Technical Reports Server (NTRS)
Frumkin, Michael; Hood, Robert; Lopez, Louis; Bailey, David (Technical Monitor)
1998-01-01
In this paper we report on features added to a parallel debugger to simplify the debugging of parallel message passing programs. These features include replay, setting consistent breakpoints based on interprocess event causality, a parallel undo operation, and communication supervision. These features all use trace information collected during the execution of the program being debugged. We used a number of different instrumentation techniques to collect traces. We also implemented trace displays using two different trace visualization systems. The implementation was tested on an SGI Power Challenge cluster and a network of SGI workstations.
Nicholson, Emma; Murphy, Tara; Larkin, Philip; Normand, Charles; Guerin, Suzanne
2016-10-21
Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users. Preferred reporting items for systematic review and meta-analysis protocol guidelines will inform the search and analysis plan to ensure that the synthesis of the data is as rigorous as possible. An approach based on critical interpretative synthesis will be adapted to include a thematic synthesis for the identification of higher-order themes and messages from a body of dissemination products generated by the Palliative Care Research Network. The thematic synthesis outlined in the present protocol offers a novel method of synthesising data from a focused research network that employs a variety of dissemination materials as a means of identifying key themes and messages from a specific body of research. The high-level themes and messages will be identified from the thematic synthesis, widely disseminated and targeted towards a range of stakeholders and knowledge users such as carers, health and social care professionals, policy makers and researchers.
Versteeg, Roelof J; Few, Douglas A; Kinoshita, Robert A; Johnson, Doug; Linda, Ondrej
2015-02-24
Methods, computer readable media, and apparatuses provide robotic explosive hazard detection. A robot intelligence kernel (RIK) includes a dynamic autonomy structure with two or more autonomy levels between operator intervention and robot initiative A mine sensor and processing module (ESPM) operating separately from the RIK perceives environmental variables indicative of a mine using subsurface perceptors. The ESPM processes mine information to determine a likelihood of a presence of a mine. A robot can autonomously modify behavior responsive to an indication of a detected mine. The behavior is modified between detection of mines, detailed scanning and characterization of the mine, developing mine indication parameters, and resuming detection. Real time messages are passed between the RIK and the ESPM. A combination of ESPM bound messages and RIK bound messages cause the robot platform to switch between modes including a calibration mode, the mine detection mode, and the mine characterization mode.
Versteeg, Roelof J.; Few, Douglas A.; Kinoshita, Robert A.; Johnson, Douglas; Linda, Ondrej
2015-12-15
Methods, computer readable media, and apparatuses provide robotic explosive hazard detection. A robot intelligence kernel (RIK) includes a dynamic autonomy structure with two or more autonomy levels between operator intervention and robot initiative A mine sensor and processing module (ESPM) operating separately from the RIK perceives environmental variables indicative of a mine using subsurface perceptors. The ESPM processes mine information to determine a likelihood of a presence of a mine. A robot can autonomously modify behavior responsive to an indication of a detected mine. The behavior is modified between detection of mines, detailed scanning and characterization of the mine, developing mine indication parameters, and resuming detection. Real time messages are passed between the RIK and the ESPM. A combination of ESPM bound messages and RIK bound messages cause the robot platform to switch between modes including a calibration mode, the mine detection mode, and the mine characterization mode.
Machine-checked proofs of the design and implementation of a fault-tolerant circuit
NASA Technical Reports Server (NTRS)
Bevier, William R.; Young, William D.
1990-01-01
A formally verified implementation of the 'oral messages' algorithm of Pease, Shostak, and Lamport is described. An abstract implementation of the algorithm is verified to achieve interactive consistency in the presence of faults. This abstract characterization is then mapped down to a hardware level implementation which inherits the fault-tolerant characteristics of the abstract version. All steps in the proof were checked with the Boyer-Moore theorem prover. A significant results is the demonstration of a fault-tolerant device that is formally specified and whose implementation is proved correct with respect to this specification. A significant simplifying assumption is that the redundant processors behave synchronously. A mechanically checked proof that the oral messages algorithm is 'optimal' in the sense that no algorithm which achieves agreement via similar message passing can tolerate a larger proportion of faulty processor is also described.
Support of Wheelchairs Using Pheromone Information with Two Types of Communication Methods
NASA Astrophysics Data System (ADS)
Yamamoto, Koji; Nitta, Katsumi
In this paper, we propose a communication framework which combined two types of communication among wheelchairs and mobile devices. Due to restriction of range of activity, there is a problem that wheelchair users tend to shut themselves up in their houses. We developed a navigational wheelchair which loads a system that displays information on a map through WWW. However, this wheelchair is expensive because it needs a solid PC, a precise GPS, a battery, and so on. We introduce mobile devices and use this framework to provide information to wheelchair users and to facilitate them to go out. When a user encounters other users, they exchange messages which they have by short-distance wireless communication. Once a message is delivered to a navigational wheelchair, the wheelchair uploads the message to the system. We use two types of pheromone information which represent trends of user's movement and existences of a crowd of users. First, when users gather, ``crowd of people pheromone'' is emitted virtually. Users do not send these pheromones to the environment but carry them. If the density exceeds the threshold, messages that express ``people gethered'' are generated automatically. The other pheromone is ``movement trend pheromone'', which is used to improve probability of successful transmissions. From results of experiments, we concluded that our method can deliver information that wheelchair users gathered to other wheelchairs.
Kim, Hwa Sun; Cho, Hune
2011-01-01
Objectives The Health Level Seven Interface Engine (HL7 IE), developed by Kyungpook National University, has been employed in health information systems, however users without a background in programming have reported difficulties in using it. Therefore, we developed a graphical user interface (GUI) engine to make the use of the HL7 IE more convenient. Methods The GUI engine was directly connected with the HL7 IE to handle the HL7 version 2.x messages. Furthermore, the information exchange rules (called the mapping data), represented by a conceptual graph in the GUI engine, were transformed into program objects that were made available to the HL7 IE; the mapping data were stored as binary files for reuse. The usefulness of the GUI engine was examined through information exchange tests between an HL7 version 2.x message and a health information database system. Results Users could easily create HL7 version 2.x messages by creating a conceptual graph through the GUI engine without requiring assistance from programmers. In addition, time could be saved when creating new information exchange rules by reusing the stored mapping data. Conclusions The GUI engine was not able to incorporate information types (e.g., extensible markup language, XML) other than the HL7 version 2.x messages and the database, because it was designed exclusively for the HL7 IE protocol. However, in future work, by including additional parsers to manage XML-based information such as Continuity of Care Documents (CCD) and Continuity of Care Records (CCR), we plan to ensure that the GUI engine will be more widely accessible for the health field. PMID:22259723
Kim, Hwa Sun; Cho, Hune; Lee, In Keun
2011-12-01
The Health Level Seven Interface Engine (HL7 IE), developed by Kyungpook National University, has been employed in health information systems, however users without a background in programming have reported difficulties in using it. Therefore, we developed a graphical user interface (GUI) engine to make the use of the HL7 IE more convenient. The GUI engine was directly connected with the HL7 IE to handle the HL7 version 2.x messages. Furthermore, the information exchange rules (called the mapping data), represented by a conceptual graph in the GUI engine, were transformed into program objects that were made available to the HL7 IE; the mapping data were stored as binary files for reuse. The usefulness of the GUI engine was examined through information exchange tests between an HL7 version 2.x message and a health information database system. Users could easily create HL7 version 2.x messages by creating a conceptual graph through the GUI engine without requiring assistance from programmers. In addition, time could be saved when creating new information exchange rules by reusing the stored mapping data. The GUI engine was not able to incorporate information types (e.g., extensible markup language, XML) other than the HL7 version 2.x messages and the database, because it was designed exclusively for the HL7 IE protocol. However, in future work, by including additional parsers to manage XML-based information such as Continuity of Care Documents (CCD) and Continuity of Care Records (CCR), we plan to ensure that the GUI engine will be more widely accessible for the health field.
Multiple node remote messaging
Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Ohmacht, Martin; Salapura, Valentina; Steinmacher-Burow, Burkhard; Vranas, Pavlos
2010-08-31
A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).
Requirements for the Military Message System (MMS) Family: Data Types and User Commands.
1986-04-11
AD-A167 126 REQUIREMENTS FOR THE MILITARY MESSASE SYSTEM (NHS) i FRILY: DATA TYPES AND USER CONNNDS(U) NAVAL RESEARCH LAB WASHINGTON DC C L HEITHEVER... System (MMS) Family: Data Types and User Commands CONSTANCE L. HEITMEYER Computer Science and Systems Branch I Information Technology Division April 11...Security Classification) Requirements for the Military Message System (MMS) Family: Data Types and User Commands 12. PERSONAL AUTHOR(S) Heitmeer, Constance
Cellular automata with object-oriented features for parallel molecular network modeling.
Zhu, Hao; Wu, Yinghui; Huang, Sui; Sun, Yan; Dhar, Pawan
2005-06-01
Cellular automata are an important modeling paradigm for studying the dynamics of large, parallel systems composed of multiple, interacting components. However, to model biological systems, cellular automata need to be extended beyond the large-scale parallelism and intensive communication in order to capture two fundamental properties characteristic of complex biological systems: hierarchy and heterogeneity. This paper proposes extensions to a cellular automata language, Cellang, to meet this purpose. The extended language, with object-oriented features, can be used to describe the structure and activity of parallel molecular networks within cells. Capabilities of this new programming language include object structure to define molecular programs within a cell, floating-point data type and mathematical functions to perform quantitative computation, message passing capability to describe molecular interactions, as well as new operators, statements, and built-in functions. We discuss relevant programming issues of these features, including the object-oriented description of molecular interactions with molecule encapsulation, message passing, and the description of heterogeneity and anisotropy at the cell and molecule levels. By enabling the integration of modeling at the molecular level with system behavior at cell, tissue, organ, or even organism levels, the program will help improve our understanding of how complex and dynamic biological activities are generated and controlled by parallel functioning of molecular networks. Index Terms-Cellular automata, modeling, molecular network, object-oriented.
Security Analysis of Accountable Anonymous Group Communication in Dissent
2013-01-31
instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols
ERIC Educational Resources Information Center
Cole, Charles; Mandelblatt, Bertie
2000-01-01
Uses Kintsch's proposition-based construction-integration theory of discourse comprehension to detail the user coding operations that occur in each of the three subsystems (Perception, Comprehension, Application) in which users process an information retrieval systems (IRS) message. Describes an IRS device made up of two separate parts that enable…
Monitoring Data-Structure Evolution in Distributed Message-Passing Programs
NASA Technical Reports Server (NTRS)
Sarukkai, Sekhar R.; Beers, Andrew; Woodrow, Thomas S. (Technical Monitor)
1996-01-01
Monitoring the evolution of data structures in parallel and distributed programs, is critical for debugging its semantics and performance. However, the current state-of-art in tracking and presenting data-structure information on parallel and distributed environments is cumbersome and does not scale. In this paper we present a methodology that automatically tracks memory bindings (not the actual contents) of static and dynamic data-structures of message-passing C programs, using PVM. With the help of a number of examples we show that in addition to determining the impact of memory allocation overheads on program performance, graphical views can help in debugging the semantics of program execution. Scalable animations of virtual address bindings of source-level data-structures are used for debugging the semantics of parallel programs across all processors. In conjunction with light-weight core-files, this technique can be used to complement traditional debuggers on single processors. Detailed information (such as data-structure contents), on specific nodes, can be determined using traditional debuggers after the data structure evolution leading to the semantic error is observed graphically.
Modulating the neural bases of persuasion: why/how, gain/loss, and users/non-users
Katzman, Perri L.; Ames, Daniel L.; Falk, Emily B.; Lieberman, Matthew D.
2017-01-01
Abstract Designing persuasive content is challenging, in part because people can be poor predictors of their actions. Medial prefrontal cortex (MPFC) activation during message exposure reliably predicts downstream behavior, but past work has been largely atheoretical. We replicated past results on this relationship and tested two additional framing effects known to alter message receptivity. First, we examined gain- vs. loss-framed reasons for a health behavior (sunscreen use). Consistent with predictions from prospect theory, we observed greater MPFC activity to gain- vs. loss-framed messages, and this activity was associated with behavior. This relationship was stronger for those who were not previously sunscreen users. Second, building on theories of action planning, we compared neural activity during messages regarding how vs. why to enact the behavior. We observed rostral inferior parietal lobule and posterior inferior frontal gyrus activity during action planning (“how” messages), and this activity was associated with behavior; this is in contrast to the relationship between MPFC activity during the “why” (i.e., gain and loss) messages and behavior. These results reinforce that persuasion occurs in part via self-value integration—seeing value and incorporating persuasive messages into one's self-concept—and extend this work to demonstrate how message framing and action planning may influence this process. PMID:27521303
Toward Abstracting the Communication Intent in Applications to Improve Portability and Productivity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mintz, Tiffany M; Hernandez, Oscar R; Kartsaklis, Christos
Programming with communication libraries such as the Message Passing Interface (MPI) obscures the high-level intent of the communication in an application and makes static communication analysis difficult to do. Compilers are unaware of communication libraries specifics, leading to the exclusion of communication patterns from any automated analysis and optimizations. To overcome this, communication patterns can be expressed at higher-levels of abstraction and incrementally added to existing MPI applications. In this paper, we propose the use of directives to clearly express the communication intent of an application in a way that is not specific to a given communication library. Our communicationmore » directives allow programmers to express communication among processes in a portable way, giving hints to the compiler on regions of computations that can be overlapped with communication and relaxing communication constraints on the ordering, completion and synchronization of the communication imposed by specific libraries such as MPI. The directives can then be translated by the compiler into message passing calls that efficiently implement the intended pattern and be targeted to multiple communication libraries. Thus far, we have used the directives to express point-to-point communication patterns in C, C++ and Fortran applications, and have translated them to MPI and SHMEM.« less
Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm
NASA Astrophysics Data System (ADS)
Rachmawati, D.; Budiman, M. A.; Aulya, L.
2018-02-01
Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.
Ordering Traces Logically to Identify Lateness in Message Passing Programs
Isaacs, Katherine E.; Gamblin, Todd; Bhatele, Abhinav; ...
2015-03-30
Event traces are valuable for understanding the behavior of parallel programs. However, automatically analyzing a large parallel trace is difficult, especially without a specific objective. We aid this endeavor by extracting a trace's logical structure, an ordering of trace events derived from happened-before relationships, while taking into account developer intent. Using this structure, we can calculate an operation's delay relative to its peers on other processes. The logical structure also serves as a platform for comparing and clustering processes as well as highlighting communication patterns in a trace visualization. We present an algorithm for determining this idealized logical structure frommore » traces of message passing programs, and we develop metrics to quantify delays and differences among processes. We implement our techniques in Ravel, a parallel trace visualization tool that displays both logical and physical timelines. Rather than showing the duration of each operation, we display where delays begin and end, and how they propagate. As a result, we apply our approach to the traces of several message passing applications, demonstrating the accuracy of our extracted structure and its utility in analyzing these codes.« less
Dust Dynamics in Protoplanetary Disks: Parallel Computing with PVM
NASA Astrophysics Data System (ADS)
de La Fuente Marcos, Carlos; Barge, Pierre; de La Fuente Marcos, Raúl
2002-03-01
We describe a parallel version of our high-order-accuracy particle-mesh code for the simulation of collisionless protoplanetary disks. We use this code to carry out a massively parallel, two-dimensional, time-dependent, numerical simulation, which includes dust particles, to study the potential role of large-scale, gaseous vortices in protoplanetary disks. This noncollisional problem is easy to parallelize on message-passing multicomputer architectures. We performed the simulations on a cache-coherent nonuniform memory access Origin 2000 machine, using both the parallel virtual machine (PVM) and message-passing interface (MPI) message-passing libraries. Our performance analysis suggests that, for our problem, PVM is about 25% faster than MPI. Using PVM and MPI made it possible to reduce CPU time and increase code performance. This allows for simulations with a large number of particles (N ~ 105-106) in reasonable CPU times. The performances of our implementation of the pa! rallel code on an Origin 2000 supercomputer are presented and discussed. They exhibit very good speedup behavior and low load unbalancing. Our results confirm that giant gaseous vortices can play a dominant role in giant planet formation.
Twitter and the health reforms in the English National Health Service.
King, Dominic; Ramirez-Cano, Daniel; Greaves, Felix; Vlaev, Ivo; Beales, Steve; Darzi, Ara
2013-05-01
Social media (for example Facebook and YouTube) uses online and mobile technologies to allow individuals to participate in, comment on and create user-generated content. Twitter is a widely used social media platform that lets users post short publicly available text-based messages called tweets that other users can respond to. Alongside traditional media outlets, Twitter has been a focus for discussions about the controversial and radical reforms to the National Health Service (NHS) in England that were recently passed into law by the current coalition Government. Looking at over 120,000 tweets made about the health reforms, we have investigated whether any insights can be obtained about the role of Twitter in informing, debating and influencing opinion in a specific area of health policy. In particular we have looked at how the sentiment of tweets changed with the passage of the Health and Social Care Bill through Parliament, and how this compared to conventional opinion polls taken over the same time period. We examine which users appeared to have the most influence in the 'Twittersphere' and suggest how a widely used metric of academic impact - the H-index - could be applied to measure context-dependent influence on Twitter. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
TravelAid : in-vehicle signing and variable speed limit evaluation
DOT National Transportation Integrated Search
2001-12-01
This report discusses the effectiveness of using variable message signs (VMSs) and in-vehicle traffic advisory systems (IVUs) on a mountainous pass (Snoqualmie Pass on Interstate 90 in Washington State) for changing driver behavior. As part of this p...
Haun, Jolie N; Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R
2014-03-06
The United States Department of Veterans Affairs has implemented an electronic asynchronous "Secure Messaging" tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients' experiences and preferences for using Secure Messaging. The objectives of this mixed-methods study were to (1) characterize veterans' experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans' use of Secure Messaging. We recruited 33 veterans who had access to and had previously used the portal's Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants' computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving Secure Messaging. Veterans identified and demonstrated impediments to successful system usage that can be addressed with education, skill building, and system modifications. Analysis of secure message content data provided insights to reasons for use that were not disclosed by participants during interviews, specifically sensitive health topics such as erectile dysfunction and sexually transmitted disease inquiries. Veterans perceive Secure Messaging in the My HealtheVet patient portal as a useful tool for communicating with health care teams. However, to maximize sustained utilization of Secure Messaging, marketing, education, skill building, and system modifications are needed. Data from this study can inform a large-scale quantitative assessment of Secure Messaging users' experiences in a representative sample to validate qualitative findings.
Detecting Rumors Through Modeling Information Propagation Networks in a Social Media Environment.
Liu, Yang; Xu, Songhua; Tourassi, Georgia
2015-01-01
In the midst of today's pervasive influence of social media content and activities, information credibility has increasingly become a major issue. Accordingly, identifying false information, e.g. rumors circulated in social media environments, attracts expanding research attention and growing interests. Many previous studies have exploited user-independent features for rumor detection. These prior investigations uniformly treat all users relevant to the propagation of a social media message as instances of a generic entity. Such a modeling approach usually adopts a homogeneous network to represent all users, the practice of which ignores the variety across an entire user population in a social media environment. Recognizing this limitation of modeling methodologies, this study explores user-specific features in a social media environment for rumor detection. The new approach hypothesizes that whether a user tends to spread a rumor is dependent upon specific attributes of the user in addition to content characteristics of the message itself. Under this hypothesis, information propagation patterns of rumors versus those of credible messages in a social media environment are systematically differentiable. To explore and exploit this hypothesis, we develop a new information propagation model based on a heterogeneous user representation for rumor recognition. The new approach is capable of differentiating rumors from credible messages through observing distinctions in their respective propagation patterns in social media. Experimental results show that the new information propagation model based on heterogeneous user representation can effectively distinguish rumors from credible social media content.
Fernandes, Natália Maria da Silva; Bastos, Marcus Gomes; Oliveira, Nivalda A C de; Costa, Alex do Vale; Bernardino, Heder Soares
2015-01-01
The focus in the treatment of CKD is to prevent its progression through optimal medical control. The large number of patients with CKD has pressed nephrologists to assess more patients into ever-smaller periods of consultation. The use of light technologies as a promising form of health care. The internet offers the opportunity to manipulate the doctor in his professional contact with the user. To develop a web system to attend the patients with CKD not on dialysis and clinically stable stages at distance. Developed a system using the Java language, MySQL database and PrimeFaces framework; available on a Glassfish application server. The initial access is performed by the nephrologist, which registers the patients with their personal information and access data. After being registered, the patient (or family doctor) can enter the data of your query and these will be following, passed on to the nephrologist for evaluation. The form with the data of interest is pre-determined, but there is possibility to add free-form information. The system enables, in addition, there is exchange of messages between doctors and patients. In addition, users receive messages via e-mail alerting them of their duties. Confidentiality is guaranteed by individual passwords for doctors and patients. This tool will enable to increase the coverage area of nephrologists, reduce costs and bring the patient to the primary care physician, using the Family Health Program as an interface between the patient and the nephrology secondary care.
A real-time MPEG software decoder using a portable message-passing library
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kwong, Man Kam; Tang, P.T. Peter; Lin, Biquan
1995-12-31
We present a real-time MPEG software decoder that uses message-passing libraries such as MPL, p4 and MPI. The parallel MPEG decoder currently runs on the IBM SP system but can be easil ported to other parallel machines. This paper discusses our parallel MPEG decoding algorithm as well as the parallel programming environment under which it uses. Several technical issues are discussed, including balancing of decoding speed, memory limitation, 1/0 capacities, and optimization of MPEG decoding components. This project shows that a real-time portable software MPEG decoder is feasible in a general-purpose parallel machine.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gropp, W.D.; Keyes, D.E.
1988-03-01
The authors discuss the parallel implementation of preconditioned conjugate gradient (PCG)-based domain decomposition techniques for self-adjoint elliptic partial differential equations in two dimensions on several architectures. The complexity of these methods is described on a variety of message-passing parallel computers as a function of the size of the problem, number of processors and relative communication speeds of the processors. They show that communication startups are very important, and that even the small amount of global communication in these methods can significantly reduce the performance of many message-passing architectures.
n-body simulations using message passing parallel computers.
NASA Astrophysics Data System (ADS)
Grama, A. Y.; Kumar, V.; Sameh, A.
The authors present new parallel formulations of the Barnes-Hut method for n-body simulations on message passing computers. These parallel formulations partition the domain efficiently incurring minimal communication overhead. This is in contrast to existing schemes that are based on sorting a large number of keys or on the use of global data structures. The new formulations are augmented by alternate communication strategies which serve to minimize communication overhead. The impact of these communication strategies is experimentally studied. The authors report on experimental results obtained from an astrophysical simulation on an nCUBE2 parallel computer.
NASA Astrophysics Data System (ADS)
Saito, Shoichi; Uehara, Tetsutaro; Izumi, Yutaka; Kunieda, Yoshitoshi
The VPN (Virtual Private Network) technique becomes more and more popular to protect contents of messages and to achieve secure communication from incidents, such as tapping. However, it grow in usage that a VPN server is used on a sub-network in part of an office-wide network. But, a PPTP system included in Windows operating systems cannot establish nested VPN links. Moreover encrypted communication by VPN hides a user of the VPN connection. Consequently, any administrators of network systems can’t find out the users of the VPN connection via firewall, moreover can’t decide whether if the user is legal or not. In order to solve this problem, we developed a multi step PPTP relay system on a firewall. This system solves all the problems of our previously developed PPTP relay system(1). The new relay system improves security by encrypting through the whole end-to-end communication and abolishing of prior registration of passwords for the next step. Furthermore, transport speed is accelerated, and the restriction of the number of steps on relay is also abolished. By these features the multi step PPTP relay system expands usability.
Kantor, Leslie M; Levine, Deborah S; Arons, Whitney
2013-01-01
Background Teens and young adults in the United States are in need of sexual and reproductive health information, as evidenced by elevated rates of sexually transmitted infections (STIs), pregnancy, and births among this population. In-person sexuality education programs are helpful, but they are unlikely to rapidly accommodate teens and young adults in a moment of crisis. Evidence suggests that technologies such as instant messaging (IM) and text messaging may be effective ways to provide teens and young adults with sexual and reproductive health information. In September 2010, Planned Parenthood Federation of America launched a text and IM program designed to provide immediate answers to urgent sexual and reproductive health questions from a reliable and confidential source and to link young people to sexual and reproductive health services if needed. Objective To assess whether this program is successful in reaching the target population, whether user characteristics vary by mode (IM vs text), and whether mode is associated with reaching individuals with high levels of worry or reducing worry postchat. Methods Data were collected from prechat and postchat surveys for all IM and text message conversations between September 2010 and August 2011. A bivariate analysis was conducted using chi-square tests for differences in the main covariates by mode of conversation. In the multivariable analysis, logistic regression was used to identify factors that were independently associated with prechat levels of worry and changes in worry postchat. Results A total of 32,589 conversations occurred during the program’s first year. The odds of feeling very worried prechat were highest for IM users (adjusted odds ratio [AOR] 1.43, 95% CI 1.20-1.72), users 17 years and younger (AOR 1.62, 95% CI 1.50-1.74), Latino/Hispanic users (AOR 1.36, 95% CI 1.27-1.46), and black users (AOR 1.40, 95% CI 1.30-1.50). After controlling for the study covariates, there was no significant difference in the odds of feeling better (less worried) postchat between IM and text message users. Feeling better postchat was associated with being younger (≤17 years: AOR 1.42, 95% CI 1.17-1.72; 18-24 years: AOR 1.20, 95% CI 1.02-1.42), being Latino/Hispanic (AOR 1.31, 95% CI 1.10-1.55), reporting that the service was very helpful (AOR 3.47, 95% CI 3.24-4.32), and asking about emergency contraception (AOR 1.35, 95% CI 1.13-1.61). The odds of feeling better were lowest for users with questions about STIs (AOR 0.61, 95% CI 0.47-0.78). Conclusions The results from the process evaluation suggest that the program was able to provide informational support to vulnerable groups, such as teens and racial minorities, in moments of particular worry. Differences between the IM and text message users reveal that each mode appeals to a different population and that both are necessary to reach a diverse audience. PMID:24055754
Real-time reference: the use of chat technology to improve point of need assistance.
Connor, Elizabeth
2002-01-01
Chat reference refers to the use of instant messaging and call center software to support interactive text or voice communication with library patrons. Instant messaging has been integrated into many e-commerce environments, and into the social lives of many teenagers and young adults, affording a level of immediacy and intimacy not possible with e-mail applications. The convergence and interoperability of new and emerging technologies can be used to develop new communities of users that view libraries as being essential to their education, patient care, and research activities.
Gordon, Chad R; Rezzadeh, Kameron S; Li, Andrew; Vardanian, Andrew; Zelken, Jonathan; Shores, Jamie T; Sacks, Justin M; Segovia, Andres L; Jarrahy, Reza
2015-01-01
Mobile device technology has revolutionized interpersonal communication, but the application of this technology to the physician-patient relationship remains limited due to concerns over patient confidentiality and the security of digital information. Nevertheless, there is a continued focus on improving communication between doctors and patients in all fields of medicine as a means of improving patient care. In this study, we implement a novel communications platform to demonstrate that instantaneously sharing perioperative information with surgical patients and members of their support networks can improve patient care and strengthen the physician-patient relationship. 423 consecutive patients scheduled to undergo elective surgical procedures were offered complimentary registration to a secure, web-based service designed to distribute perioperative updates to a group of recipients designated by each patient via Short Message Service (SMS) and/or email. Messages were created by attending surgeons and delivered instantaneously through the web-based platform. In the postoperative period, patients and their designated message recipients, as well as participating healthcare providers, were asked to complete a survey designed to assess their experience with the messaging system. Survey results were statistically analyzed to determine satisfaction rates. Of the qualifying 423 patients, 313 opted to enroll in the study. On average, patients selected a total of 3.5 recipients to receive perioperative updates. A total of 1,195 electronic messages were generated for distribution to designated recipients during the study period and delivered to recipients located around the world. There were no documented errors or failures in message delivery. Satisfaction surveys were completed by 190 users of the service (73 %). Respondents identified themselves as either patients (n = 48, 25.5 %), family/friends (n = 120, 63.8 %), or healthcare providers (n = 15, 12 %). Satisfaction with the service was high: 94.2 % of users "enjoyed this software" and and 94.2 % of family/friends "felt more connected to their loved ones during surgery." 92.5 % would "recommend their loved ones sign up for this service". Ninety percent of patients who completed the survey reported "an improved hospital experience". Digital communications platforms can facilitate the immediate transfer of HIPAA-compliant data to patients and their designees. Such systems can greatly improve the level of communication between physicians, patients, and patients' families and caregivers. All types of users, including healthcare professionals, patients, and their loved ones, recorded high levels of satisfaction. Based on these observations, we conclude that mobile digital communications platforms represent a way to harness the power of social media to enhance patient care.
Contraction of online response to major events.
Szell, Michael; Grauwin, Sébastian; Ratti, Carlo
2014-01-01
Quantifying regularities in behavioral dynamics is of crucial interest for understanding collective social events such as panics or political revolutions. With the widespread use of digital communication media it has become possible to study massive data streams of user-created content in which individuals express their sentiments, often towards a specific topic. Here we investigate messages from various online media created in response to major, collectively followed events such as sport tournaments, presidential elections, or a large snow storm. We relate content length and message rate, and find a systematic correlation during events which can be described by a power law relation--the higher the excitation, the shorter the messages. We show that on the one hand this effect can be observed in the behavior of most regular users, and on the other hand is accentuated by the engagement of additional user demographics who only post during phases of high collective activity. Further, we identify the distributions of content lengths as lognormals in line with statistical linguistics, and suggest a phenomenological law for the systematic dependence of the message rate to the lognormal mean parameter. Our measurements have practical implications for the design of micro-blogging and messaging services. In the case of the existing service Twitter, we show that the imposed limit of 140 characters per message currently leads to a substantial fraction of possibly dissatisfying to compose tweets that need to be truncated by their users.
Contraction of Online Response to Major Events
Szell, Michael; Grauwin, Sébastian; Ratti, Carlo
2014-01-01
Quantifying regularities in behavioral dynamics is of crucial interest for understanding collective social events such as panics or political revolutions. With the widespread use of digital communication media it has become possible to study massive data streams of user-created content in which individuals express their sentiments, often towards a specific topic. Here we investigate messages from various online media created in response to major, collectively followed events such as sport tournaments, presidential elections, or a large snow storm. We relate content length and message rate, and find a systematic correlation during events which can be described by a power law relation—the higher the excitation, the shorter the messages. We show that on the one hand this effect can be observed in the behavior of most regular users, and on the other hand is accentuated by the engagement of additional user demographics who only post during phases of high collective activity. Further, we identify the distributions of content lengths as lognormals in line with statistical linguistics, and suggest a phenomenological law for the systematic dependence of the message rate to the lognormal mean parameter. Our measurements have practical implications for the design of micro-blogging and messaging services. In the case of the existing service Twitter, we show that the imposed limit of 140 characters per message currently leads to a substantial fraction of possibly dissatisfying to compose tweets that need to be truncated by their users. PMID:24586499
An expert system shell for inferring vegetation characteristics: Prototype help system (Task 1)
NASA Technical Reports Server (NTRS)
1993-01-01
The NASA Vegetation Workbench (VEG) is a knowledge based system that infers vegetation characteristics from reflectance data. A prototype of the VEG subgoal HELP.SYSTEM has been completed and the Help System has been added to the VEG system. It is loaded when the user first clicks on the HELP.SYSTEM option in the Tool Box Menu. The Help System provides a user tool to support needed user information. It also provides interactive tools the scientist may use to develop new help messages and to modify existing help messages that are attached to VEG screens. The system automatically manages system and file operations needed to preserve new or modified help messages. The Help System was tested both as a help system development and a help system user tool.
Modulating the neural bases of persuasion: why/how, gain/loss, and users/non-users.
Vezich, I Stephanie; Katzman, Perri L; Ames, Daniel L; Falk, Emily B; Lieberman, Matthew D
2017-02-01
Designing persuasive content is challenging, in part because people can be poor predictors of their actions. Medial prefrontal cortex (MPFC) activation during message exposure reliably predicts downstream behavior, but past work has been largely atheoretical. We replicated past results on this relationship and tested two additional framing effects known to alter message receptivity. First, we examined gain- vs. loss-framed reasons for a health behavior (sunscreen use). Consistent with predictions from prospect theory, we observed greater MPFC activity to gain- vs. loss-framed messages, and this activity was associated with behavior. This relationship was stronger for those who were not previously sunscreen users. Second, building on theories of action planning, we compared neural activity during messages regarding how vs. why to enact the behavior. We observed rostral inferior parietal lobule and posterior inferior frontal gyrus activity during action planning ("how" messages), and this activity was associated with behavior; this is in contrast to the relationship between MPFC activity during the "why" (i.e., gain and loss) messages and behavior. These results reinforce that persuasion occurs in part via self-value integration-seeing value and incorporating persuasive messages into one's self-concept-and extend this work to demonstrate how message framing and action planning may influence this process. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.
BrdsNBz: Sexually Experienced Teens More Likely to Use Sexual Health Text Message Service.
Willoughby, Jessica Fitts
2015-12-01
Text messaging services are becoming an increasingly popular way to provide sexual health information to teens, but little is known about who uses such services. This study assessed whether teens at a greater risk for negative sexual health outcomes use a sexual health text message service. A text message service that connects teens with sexual health educators was promoted in six public schools in one state in the Southeast. Students (n = 2,125) in four schools completed an online questionnaire assessing personal risk factors associated with negative sexual health outcomes and use of the text message service. Text message service users (n = 144) were more likely to have had sex, to have been in a relationship, and to come from a lower socioeconomic status background. Users also felt less connected to their schools and were slightly older than nonservice users. When all variables were entered into a logistic regression, only sexual experience was associated with service use. Sexual health text message services are designed to provide information to teens in an effort to prevent negative sexual outcomes. Such services seem to be reaching youth with increased risk of teen pregnancy and sexually transmitted disease acquisition. This study provides evidence that teens most likely to benefit are also those most likely to use a sexual health text message service. © 2015 Society for Public Health Education.
Visual aspects of perception of multimedia messages on the web through the "eye tracker" method.
Svilicić, Niksa
2010-09-01
Since the dawn of civilisation visual communication played a role in everyday life. In the early times there were simply shaped drawings of animals, pictograms explaining hunting tactics or strategies of attacking the enemies. Through evolution visual expression becomes an important component of communication process on several levels, from the existential and economic level to the artistic level. However, there was always a question of the level of user reception of such visual information in the medium transmitting the information. Does physical positioning of information in the medium contribute to the efficiency of the message? Do the same rules of content positioning apply for traditional (offline) and online media (Internet)? Rapid development of information technology and Internet in almost all segments of contemporary life calls for defining the rules of designing and positioning multimedia online contents on web sites. Recent research indicates beyond doubt that the physical positioning of an online content on a web site significantly determines the quality of user's perception of such content. By employing the "Eye tracking" method it is possible to objectively analyse the level of user perception of a multimedia content on a web site. What is the first thing observed by the user after opening the web site and how does he/she visually search the online content? By which methods can this be investigated subjectively and objectively? How can the survey results be used to improve the creation of web sites and to optimise the positioning of relevant contents on the site? The answers to these questions will significantly improve the presentation of multimedia interactive contents on the Web.
Emerging Communities at BBC Learning English
ERIC Educational Resources Information Center
Chapman, Catherine; Scott, Paul
2008-01-01
This paper traces the development of the BBC Learning English [http://www.bbc.co.uk/worldservice/learningenglish/] online community, focusing on tools such as e-mail discussion lists, message boards, comments boards, student/teacher blogs, competitions, and voting. It describes how relationships between the intermediate level users of all…
Emotion Telepresence: Emotion Augmentation through Affective Haptics and Visual Stimuli
NASA Astrophysics Data System (ADS)
Tsetserukou, D.; Neviarouskaya, A.
2012-03-01
The paper focuses on a novel concept of emotional telepresence. The iFeel_IM! system which is in the vanguard of this technology integrates 3D virtual world Second Life, intelligent component for automatic emotion recognition from text messages, and innovative affective haptic interfaces providing additional nonverbal communication channels through simulation of emotional feedback and social touch (physical co-presence). Users can not only exchange messages but also emotionally and physically feel the presence of the communication partner (e.g., family member, friend, or beloved person). The next prototype of the system will include the tablet computer. The user can realize haptic interaction with avatar, and thus influence its mood and emotion of the partner. The finger gesture language will be designed for communication with avatar. This will bring new level of immersion of on-line communication.
mHealth Intervention Elements and User Characteristics Determine Utility: A Mixed-Methods Analysis.
Nelson, Lyndsay A; Mulvaney, Shelagh A; Johnson, Kevin B; Osborn, Chandra Y
2017-01-01
Mobile health (mHealth) interventions are improving the medication adherence of adults with type 2 diabetes mellitus (T2DM), but few studies examine how users experience these interventions. Therefore, we used a mixed-methods approach to understand how T2DM users experience a text messaging and interactive voice response (IVR)-delivered medication adherence intervention called MEssaging for Diabetes (MED). Adults with T2DM used MED as part of a 3-month pilot study. MED sends daily tailored text messages addressing adherence barriers, daily assessment text messages asking about adherence, and weekly tailored IVR calls providing adherence feedback, encouragement, and questions to facilitate problem solving. Sixty participants completed feedback interviews. We used a mixed-methods approach to understand their experience, examining associations between participants' characteristics and their feedback. Participants who completed feedback interviews were on average 50.0 ± 10.1 years old; 65% female, 62% non-white; 15% had less than a high school education, 70% had annual incomes less than $20K; and average hemoglobin A1c was 8.0% ± 1.9%. Participants rated each intervention element favorably; common reasons for MED's helpfulness included receiving novel information about diabetes medications, emotional support, and reminders to take medication. People who were younger and more recently diagnosed with T2DM had more favorable experiences using MED. In general, users valued text messages more than IVR calls. Consideration of the user experience is critical for developing engaging mHealth interventions. User feedback reveals what mHealth elements have the most value and why, which users to target, and how to optimize an intervention's utility and appeal.
Shang, Ce; Huang, Jidong; Chaloupka, Frank J; Emery, Sherry L
2017-11-02
To examine the impact of flavour, device type and health warning messages on youth preference for electronic nicotine delivery systems (ENDS), and to provide evidence and data to inform the Food and Drug Administration's potential regulatory actions on ENDS. An online discrete choice experiment was conducted in September 2015. Each participant was given nine choice sets and asked to choose one out of two alternative ENDS products, with varying characteristics in three attributes (flavour, device type and warning message). The impact of the attributes on the probability of choosing ENDS was analysed using conditional and nested logit regressions, controlling for individual sociodemographic characteristics and current smoking status. A general population sample of 515 participants (50 ever-users and 465 never-users of ENDS) aged 14-17 years were recruited to complete the experiment using an online panel. Fruit/sweets/beverage flavours significantly increase the probability of choosing ENDS among youth (p<0.01 for never-users and <0.1 for ever-users) and flavour has the most pronounced impact among three attributes. Among never-users, menthol flavour also increases (p<0.05) the probability of choosing ENDS compared with tobacco flavour. Vaping devices that are modifiable, compared with cigarette-like e-cigarettes, increase (p<0.05) the probability of choosing ENDS among adolescent never-users. Warning messages reduce (p<0.01) the probability of choosing ENDS among never-users. Restricting fruit/sweets/beverage flavours in ENDS, regulating modifiable vaping devices and adopting strong health warning messages may reduce the uptake of ENDS among youth. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Herrera-Tapia, Jorge; Hernández-Orallo, Enrique; Tomás, Andrés; Manzoni, Pietro; Tavares Calafate, Carlos; Cano, Juan-Carlos
2016-09-18
Regular citizens equipped with smart devices are being increasingly used as "sensors" by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE) simulator and using real human mobility traces.
Competitive diffusion in online social networks with heterogeneous users
NASA Astrophysics Data System (ADS)
Li, Pei; He, Su; Wang, Hui; Zhang, Xin
2014-06-01
Online social networks have attracted increasing attention since they provide various approaches for hundreds of millions of people to stay connected with their friends. However, most research on diffusion dynamics in epidemiology cannot be applied directly to characterize online social networks, where users are heterogeneous and may act differently according to their standpoints. In this paper, we propose models to characterize the competitive diffusion in online social networks with heterogeneous users. We classify messages into two types (i.e., positive and negative) and users into three types (i.e., positive, negative and neutral). We estimate the positive (negative) influence for a user generating a given type message, which is the number of times that positive (negative) messages are processed (i.e., read) incurred by this action. We then consider the diffusion threshold, above which the corresponding influence will approach infinity, and the effect threshold, above which the unexpected influence of generating a message will exceed the expected one. We verify all these results by simulations, which show the analysis results are perfectly consistent with the simulation results. These results are of importance in understanding the diffusion dynamics in online social networks, and also critical for advertisers in viral marketing where there are fans, haters and neutrals.
Wackowski, Olivia Ann; Lewis, M Jane; Delnevo, Cristine D
2011-03-01
In 2006, RJ Reynolds began test-marketing Camel Snus, a new smokeless tobacco (SLT) product. Promotion included use of a brand website, a relatively new marketing channel used by tobacco companies, which allowed visitors to learn about the product and discuss it with others on the website's message board. Our study aimed to examine early experiences with and perceptions of Camel Snus as described by board contributors and also to consider the use and benefits of the message board for both consumers and the company. We conducted a qualitative analysis, coding each message in Atlas.Ti and analysing it for emerging themes and patterns. Messages were also coded for demographic information where evident, such as tobacco use status and geographical location. Descriptive data and illustrative quotes are presented. Board participants described being introduced to Camel Snus through free samples. Favourable evaluations were posted by current smokers who had never tried SLT before as well as current users of other SLT brands. Messages indicated both initiation of dual product use among smokers and product substitution. Participants used the board to advise each other on how to use the product, where to get more, suggest ways RJ Reynolds could improve the product and to encourage RJ Reynolds to release it nationally. Camel Snus has appeal for at least some smokers and SLT users. Camel Snus' website message board may have been a doubly beneficial marketing feature in both connecting product users and providing product feedback to the company during test-marketing.
Using secure messaging to update medications list in ambulatory care setting.
Raghu, T S; Frey, Keith; Chang, Yu-Hui; Cheng, Meng-Ru; Freimund, Sharon; Patel, Asha
2015-10-01
This study analyzed patient adoption of secure messaging to update medication list in an ambulatory care setting. The objective was to establish demographic differences between users and non-users of secure messaging for medications list update. Efficiency of secure messaging for the updates was compared to fax and telephone based updates. The study used a retrospective, cross-sectional study of patient medical records and pharmacy call logs at Mayo Clinic, Arizona from December 2012 to May 2013, approximately one year after organizing a pharmacy call center for medication updates. A subgroup analysis during a 2-week period was used to measure time to complete update. Main dependent variable is the frequency of medication list updates over the study duration. Technician time required for the update was also utilized. A total of 22,495 outpatient visits were drawn and 18,702 unique patients were included in the primary analysis. A total of 402 unique patients were included in sub-group analysis. Secure message response rate (49.5%) was statistically significantly lower than that for phone calls (54.8%, p<0.001). Time to complete the update was significantly higher for faxed medication lists (Wilcoxon rank-sum tests, p<0.001) when compared to those for secure message or phone. Around 50% of the patients respond to medication update requests before office visit when contacted using phone calls and secure messages. Given the demographic differences between users and non-users of patient portal, mixed mode communication with patients is likely to be the norm for the foreseeable future in outpatient settings. Copyright © 2015. Published by Elsevier Ireland Ltd.
Liu, Shuang; Willoughby, Jessica F
2018-01-01
Fitness tracking apps have the potential to change unhealthy lifestyles, but users' lack of compliance is an issue. The current intervention examined the effectiveness of using goal-setting theory-based text message reminders to promote tracking activities on fitness apps. We conducted a 2-week experiment with pre- and post-tests with young adults (n = 50). Participants were randomly assigned to two groups-a goal-setting text message reminder group and a generic text message reminder group. Participants were asked to use a fitness tracking app to log physical activity and diet for the duration of the study. Participants who received goal-setting reminders logged significantly more physical activities than those who only received generic reminders. Further, participants who received goal-setting reminders liked the messages and showed significantly increased self-efficacy, awareness of personal goals, motivation, and intention to use the app. The study shows that incorporating goal-setting theory-based text message reminders can be useful to boost user compliance with self-monitoring fitness apps by reinforcing users' personal goals and enhancing cognitive factors associated with health behavior change.
Frattaroli, Shannon; Schulman, Eric; McDonald, Eileen M; Omaki, Elise C; Shields, Wendy C; Jones, Vanya; Brewer, William
2018-05-17
Innovative strategies are needed to improve the prevalence of working smoke alarms in homes. To our knowledge, this is the first study to report on the effectiveness of Facebook advertising and automated telephone calls as population-level strategies to encourage an injury prevention behavior. We examine the effectiveness of Facebook advertising and automated telephone calls as strategies to enroll individuals in Baltimore City's Fire Department's free smoke alarm installation program. We directed our advertising efforts toward Facebook users eligible for the Baltimore City Fire Department's free smoke alarm installation program and all homes with a residential phone line included in Baltimore City's automated call system. The Facebook campaign targeted Baltimore City residents 18 years of age and older. In total, an estimated 300 000 Facebook users met the eligibility criteria. Facebook advertisements were delivered to users' desktop and mobile device newsfeeds. A prerecorded message was sent to all residential landlines listed in the city's automated call system. By the end of the campaign, the 3 advertisements generated 456 666 impressions reaching 130 264 Facebook users. Of the users reached, 4367 individuals (1.3%) clicked the advertisement. The automated call system included approximately 90 000 residential phone numbers. Participants attributed 25 smoke alarm installation requests to Facebook and 458 to the automated call. Facebook advertisements are a novel approach to promoting smoke alarms and appear to be effective in exposing individuals to injury prevention messages. However, converting Facebook message recipients to users of a smoke alarm installation program occurred infrequently in this study. Residents who participated in the smoke alarm installation program were more likely to cite the automated call as the impetus for their participation. Additional research is needed to understand the circumstances and strategies to effectively use the social networking site as a tool to convert passive users into active participants.
Uniform Interfaces for Distributed Systems.
1980-05-01
in data str ’.ctures on stable storage (such as disk). The Virtual Terminals associated with a particular user (i.e., rM display terminal) are all...vec MESSAGESIZE let error = nil [S ReceiveAny (msg) // The copy is made so that lower-level routines may // munge the message template without losing
Intrasystem Analysis Program (IAP) Structural Design Study.
1981-06-01
accuracy constraints, and user competence . This report is designed to serve as a guide in con- structing procedures and identifying those aspects of the...parameters. 3.3.3 Userability The term "Userability" refers here to the level of competence assumed for an IAP analyst in need of a procedure. There...media the wires pass through is homogeneous along the length of the wires. Under these assumptions the wave propagation is predominantly tranverse
NASA Technical Reports Server (NTRS)
1981-01-01
Communication is made possible for disabled individuals by means of an electronic system, developed at Stanford University's School of Medicine, which produces highly intelligible synthesized speech. Familiarly known as the "talking wheelchair" and formally as the Versatile Portable Speech Prosthesis (VPSP). Wheelchair mounted system consists of a word processor, a video screen, a voice synthesizer and a computer program which instructs the synthesizer how to produce intelligible sounds in response to user commands. Computer's memory contains 925 words plus a number of common phrases and questions. Memory can also store several thousand other words of the user's choice. Message units are selected by operating a simple switch, joystick or keyboard. Completed message appears on the video screen, then user activates speech synthesizer, which generates a voice with a somewhat mechanical tone. With the keyboard, an experienced user can construct messages as rapidly as 30 words per minute.
Driver performance while text messaging using handheld and in-vehicle systems.
Owens, Justin M; McLaughlin, Shane B; Sudweeks, Jeremy
2011-05-01
This study presents an evaluation of driver performance while text messaging via handheld mobile phones and an in-vehicle texting system. Participants sent and received text messages while driving with an experimenter on a closed-road course, using their personal mobile phones and the vehicle's system. The test vehicle was an instrumented 2010 Mercury Mariner equipped with an OEM in-vehicle system that supports text messaging and voice control of mobile devices via Bluetooth, which was modified to allow text message sending during driving. Twenty participants were tested, 11 younger (19-34) and 9 older (39-51). All participants were regular users of the in-vehicle system, although none had experience with the texting functions. Results indicated that handheld text message sending and receiving resulted in higher mental demand, more frequent and longer glances away from the roadway, and degraded steering measures compared to baseline. Using the in-vehicle system to send messages showed less performance degradation, but still had more task-related interior glance time and higher mental demand than baseline; using the system's text-to-speech functionality for incoming messages showed no differences from baseline. These findings suggest that using handheld phones to send and receive text messages may interfere with drivers' visual and steering behaviors; the in-vehicle system showed improvement, but performance was not at baseline levels during message sending. Copyright © 2010 Elsevier Ltd. All rights reserved.
Live chat alternative security protocol
NASA Astrophysics Data System (ADS)
Rahman, J. P. R.; Nugraha, E.; Febriany, A.
2018-05-01
Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.
Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis
NASA Technical Reports Server (NTRS)
Wang, Yi-Min
1993-01-01
Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.
ERIC Educational Resources Information Center
Flowers, Arthur; Crandell, Edwin W.
Three auditory perceptual processes (resistance to distortion, selective listening in the form of auditory dedifferentiation, and binaural synthesis) were evaluated by five assessment techniques: (1) low pass filtered speech, (2) accelerated speech, (3) competing messages, (4) accelerated plus competing messages, and (5) binaural synthesis.…
Engineered cell-cell communication via DNA messaging
2012-01-01
Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia. PMID:22958599
Liu, Jingfang; Zhang, Pengzhu; Lu, Yingjie
2014-11-01
User-generated medical messages on Internet contain extensive information related to adverse drug reactions (ADRs) and are known as valuable resources for post-marketing drug surveillance. The aim of this study was to find an effective method to identify messages related to ADRs automatically from online user reviews. We conducted experiments on online user reviews using different feature set and different classification technique. Firstly, the messages from three communities, allergy community, schizophrenia community and pain management community, were collected, the 3000 messages were annotated. Secondly, the N-gram-based features set and medical domain-specific features set were generated. Thirdly, three classification techniques, SVM, C4.5 and Naïve Bayes, were used to perform classification tasks separately. Finally, we evaluated the performance of different method using different feature set and different classification technique by comparing the metrics including accuracy and F-measure. In terms of accuracy, the accuracy of SVM classifier was higher than 0.8, the accuracy of C4.5 classifier or Naïve Bayes classifier was lower than 0.8; meanwhile, the combination feature sets including n-gram-based feature set and domain-specific feature set consistently outperformed single feature set. In terms of F-measure, the highest F-measure is 0.895 which was achieved by using combination feature sets and a SVM classifier. In all, we can get the best classification performance by using combination feature sets and SVM classifier. By using combination feature sets and SVM classifier, we can get an effective method to identify messages related to ADRs automatically from online user reviews.
Towards collaborative filtering recommender systems for tailored health communications.
Marlin, Benjamin M; Adams, Roy J; Sadasivam, Rajani; Houston, Thomas K
2013-01-01
The goal of computer tailored health communications (CTHC) is to promote healthy behaviors by sending messages tailored to individual patients. Current CTHC systems collect baseline patient "profiles" and then use expert-written, rule-based systems to target messages to subsets of patients. Our main interest in this work is the study of collaborative filtering-based CTHC systems that can learn to tailor future message selections to individual patients based explicit feedback about past message selections. This paper reports the results of a study designed to collect explicit feedback (ratings) regarding four aspects of messages from 100 subjects in the smoking cessation support domain. Our results show that most users have positive opinions of most messages and that the ratings for all four aspects of the messages are highly correlated with each other. Finally, we conduct a range of rating prediction experiments comparing several different model variations. Our results show that predicting future ratings based on each user's past ratings contributes the most to predictive accuracy.
WE-G-BRA-02: SafetyNet: Automating Radiotherapy QA with An Event Driven Framework
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hadley, S; Kessler, M; Litzenberg, D
2015-06-15
Purpose: Quality assurance is an essential task in radiotherapy that often requires many manual tasks. We investigate the use of an event driven framework in conjunction with software agents to automate QA and eliminate wait times. Methods: An in house developed subscription-publication service, EventNet, was added to the Aria OIS to be a message broker for critical events occurring in the OIS and software agents. Software agents operate without user intervention and perform critical QA steps. The results of the QA are documented and the resulting event is generated and passed back to EventNet. Users can subscribe to those eventsmore » and receive messages based on custom filters designed to send passing or failing results to physicists or dosimetrists. Agents were developed to expedite the following QA tasks: Plan Revision, Plan 2nd Check, SRS Winston-Lutz isocenter, Treatment History Audit, Treatment Machine Configuration. Results: Plan approval in the Aria OIS was used as the event trigger for plan revision QA and Plan 2nd check agents. The agents pulled the plan data, executed the prescribed QA, stored the results and updated EventNet for publication. The Winston Lutz agent reduced QA time from 20 minutes to 4 minutes and provided a more accurate quantitative estimate of radiation isocenter. The Treatment Machine Configuration agent automatically reports any changes to the Treatment machine or HDR unit configuration. The agents are reliable, act immediately, and execute each task identically every time. Conclusion: An event driven framework has inverted the data chase in our radiotherapy QA process. Rather than have dosimetrists and physicists push data to QA software and pull results back into the OIS, the software agents perform these steps immediately upon receiving the sentinel events from EventNet. Mr Keranen is an employee of Varian Medical Systems. Dr. Moran’s institution receives research support for her effort for a linear accelerator QA project from Varian Medical Systems. Other quality projects involving her effort are funded by Blue Cross Blue Shield of Michigan, Breast Cancer Research Foundation, and the NIH.« less
Some effects of stress on users of a voice recognition system: A preliminary inquiry
NASA Astrophysics Data System (ADS)
French, B. A.
1983-03-01
Recent work with Automatic Speech Recognition has focused on applications and productivity considerations in the man-machine interface. This thesis is an attempt to see if placing users of such equipment under time-induced stress has an effect on their percent correct recognition rates. Subjects were given a message-handling task of fixed length and allowed progressively shorter times to attempt to complete it. Questionnaire responses indicate stress levels increased with decreased time-allowance; recognition rates decreased as time was reduced.
Personal Academic Strategies for Success (PASS) Tool Administrator’s User Manual
2013-12-01
Personal Academic Strategies for Success (PASS) Tool Administrator’s User Manual by Jim H. Hewson, Valerie J. Rice, and Petra Alfred ARL...SR-275 December 2013 Personal Academic Strategies for Success (PASS) Tool Administrator’s User Manual Jim H. Hewson Career Management...Associates ( CMA ) Valerie J. Rice and Petra Alfred Human Research and Engineering Directorate, ARL
ERIC Educational Resources Information Center
Huang, Yong-Ming
2017-01-01
Team messaging services represent a type of cloud computing applications that support not only the messaging among users but also the collaboration in a team. Accordingly, team messaging services have great potential to facilitate students' collaboration. However, only few studies utilized such services to support students' collaboration and…
Tan, Ziying; Liu, Xingyun; Liu, Xiaoqian; Cheng, Qijin
2017-01-01
Background While Web-based interventions can be efficacious, engaging a target population’s attention remains challenging. We argue that strategies to draw such a population’s attention should be tailored to meet its needs. Increasing user engagement in online suicide intervention development requires feedback from this group to prevent people who have suicide ideation from seeking treatment. Objective The goal of this study was to solicit feedback on the acceptability of the content of messaging from social media users with suicide ideation. To overcome the common concern of lack of engagement in online interventions and to ensure effective learning from the message, this research employs a customized design of both content and length of the message. Methods In study 1, 17 participants suffering from suicide ideation were recruited. The first (n=8) group conversed with a professional suicide intervention doctor about its attitudes and suggestions for a direct message intervention. To ensure the reliability and consistency of the result, an identical interview was conducted for the second group (n=9). Based on the collected data, questionnaires about this intervention were formed. Study 2 recruited 4222 microblog users with suicide ideation via the Internet. Results The results of the group interviews in study 1 yielded little difference regarding the interview results; this difference may relate to the 2 groups’ varied perceptions of direct message design. However, most participants reported that they would be most drawn to an intervention where they knew that the account was reliable. Out of 4222 microblog users, we received responses from 725 with completed questionnaires; 78.62% (570/725) participants were not opposed to online suicide intervention and they valued the link for extra suicide intervention information as long as the account appeared to be trustworthy. Their attitudes toward the intervention and the account were similar to those from study 1, and 3 important elements were found pertaining to the direct message: reliability of account name, brevity of the message, and details of the phone numbers of psychological intervention centers and psychological assessment. Conclusions This paper proposed strategies for engaging target populations in online suicide interventions. PMID:29233805
Owens, Christabel; Farrand, Paul; Darvill, Ruth; Emmens, Tobit; Hewis, Elaine; Aitken, Peter
2011-09-01
OBJECTIVE To engage a group of people with relevant lived experience in the development of a text-messaging intervention to reduce repetition of self-harm. BACKGROUND Contact-based interventions, such as follow-up letters, postcards and telephone calls, have shown potential to reduce repetition of self-harm in those who present at Accident and Emergency departments. Text messaging offers a low-cost alternative that has not been tested. We set out to develop a text-based intervention. The process of intervention development is rarely reported and little is known about the impact of service user involvement on intervention design. METHOD We held a series of six participatory workshops and invited service users and clinicians to help us work out how to get the right message to the right person at the right time, and to simulate and test prototypes of an intervention. RESULTS Service users rejected both the idea of a generic, 'one size fits all' approach and that of 'audience segmentation', maintaining that text messages could be safe and effective only if individualized. This led us to abandon our original thinking and develop a way of supporting individuals to author their own self-efficacy messages and store them in a personal message bank for withdrawal at times of crisis. CONCLUSIONS This paper highlights both the challenge and the impact of involving consumers at the development stage. Working with those with lived experience requires openness, flexibility and a readiness to abandon or radically revise initial plans, and may have unexpected consequences for intervention design. © 2010 Blackwell Publishing Ltd.
Owens, Christabel; Farrand, Paul; Darvill, Ruth; Emmens, Tobit; Hewis, Elaine; Aitken, Peter
2010-01-01
Abstract Objective To engage a group of people with relevant lived experience in the development of a text‐messaging intervention to reduce repetition of self‐harm. Background Contact‐based interventions, such as follow‐up letters, postcards and telephone calls, have shown potential to reduce repetition of self‐harm in those who present at Accident and Emergency departments. Text messaging offers a low‐cost alternative that has not been tested. We set out to develop a text‐based intervention. The process of intervention development is rarely reported and little is known about the impact of service user involvement on intervention design. Method We held a series of six participatory workshops and invited service users and clinicians to help us work out how to get the right message to the right person at the right time, and to simulate and test prototypes of an intervention. Results Service users rejected both the idea of a generic, ‘one size fits all’ approach and that of ‘audience segmentation’, maintaining that text messages could be safe and effective only if individualized. This led us to abandon our original thinking and develop a way of supporting individuals to author their own self‐efficacy messages and store them in a personal message bank for withdrawal at times of crisis. Conclusions This paper highlights both the challenge and the impact of involving consumers at the development stage. Working with those with lived experience requires openness, flexibility and a readiness to abandon or radically revise initial plans, and may have unexpected consequences for intervention design. PMID:20860777
Compiling global name-space programs for distributed execution
NASA Technical Reports Server (NTRS)
Koelbel, Charles; Mehrotra, Piyush
1990-01-01
Distributed memory machines do not provide hardware support for a global address space. Thus programmers are forced to partition the data across the memories of the architecture and use explicit message passing to communicate data between processors. The compiler support required to allow programmers to express their algorithms using a global name-space is examined. A general method is presented for analysis of a high level source program and along with its translation to a set of independently executing tasks communicating via messages. If the compiler has enough information, this translation can be carried out at compile-time. Otherwise run-time code is generated to implement the required data movement. The analysis required in both situations is described and the performance of the generated code on the Intel iPSC/2 is presented.
The Raid distributed database system
NASA Technical Reports Server (NTRS)
Bhargava, Bharat; Riedl, John
1989-01-01
Raid, a robust and adaptable distributed database system for transaction processing (TP), is described. Raid is a message-passing system, with server processes on each site to manage concurrent processing, consistent replicated copies during site failures, and atomic distributed commitment. A high-level layered communications package provides a clean location-independent interface between servers. The latest design of the package delivers messages via shared memory in a configuration with several servers linked into a single process. Raid provides the infrastructure to investigate various methods for supporting reliable distributed TP. Measurements on TP and server CPU time are presented, along with data from experiments on communications software, consistent replicated copy control during site failures, and concurrent distributed checkpointing. A software tool for evaluating the implementation of TP algorithms in an operating-system kernel is proposed.
User's guide to the Reliability Estimation System Testbed (REST)
NASA Technical Reports Server (NTRS)
Nicol, David M.; Palumbo, Daniel L.; Rifkin, Adam
1992-01-01
The Reliability Estimation System Testbed is an X-window based reliability modeling tool that was created to explore the use of the Reliability Modeling Language (RML). RML was defined to support several reliability analysis techniques including modularization, graphical representation, Failure Mode Effects Simulation (FMES), and parallel processing. These techniques are most useful in modeling large systems. Using modularization, an analyst can create reliability models for individual system components. The modules can be tested separately and then combined to compute the total system reliability. Because a one-to-one relationship can be established between system components and the reliability modules, a graphical user interface may be used to describe the system model. RML was designed to permit message passing between modules. This feature enables reliability modeling based on a run time simulation of the system wide effects of a component's failure modes. The use of failure modes effects simulation enhances the analyst's ability to correctly express system behavior when using the modularization approach to reliability modeling. To alleviate the computation bottleneck often found in large reliability models, REST was designed to take advantage of parallel processing on hypercube processors.
No-passing zone system: user's manual.
DOT National Transportation Integrated Search
2016-08-01
This Users Manual is intended for traffic engineers and technicians who will be either conducting passing sight distance : measurement runs in the field or processing the collected data in the office. This Users Manual includes: : - A descripti...
Herrera-Tapia, Jorge; Hernández-Orallo, Enrique; Tomás, Andrés; Manzoni, Pietro; Tavares Calafate, Carlos; Cano, Juan-Carlos
2016-01-01
Regular citizens equipped with smart devices are being increasingly used as “sensors” by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE) simulator and using real human mobility traces. PMID:27649209
NASA Technical Reports Server (NTRS)
Lupton, W. F.; Conrad, A. R.
1992-01-01
KTL is a set of routines which eases the job of writing applications which must interact with a variety of underlying sub-systems (known as services). A typical application is an X Window user interface coordinating telescope and instruments. In order to connect to a service, application code specifies a service name--typically an instrument name--and a style, which defines the way in which the application will interact with the service. Two styles are currently supported: keyword, where the application reads and writes named keywords and the resulting inter-task message traffic is hidden; and message, where the application deals directly with messages. The keyword style is intended mainly for user interfaces, and the message style is intended mainly for lower-level applications. KTL applications are event driven: a typical application first connects to all its desired services, then expresses interest in specified events. The application then enters an event dispatch loop in which it waits for events and calls the appropriate service's event-handling routine. Each event is associated with a call-back routine which is invoked when the event occurs. Call-back routines may (and typically do) interact with other sub-systems and KTL provides the means of doing so without blocking the application (vital for X Window user interfaces). This approach is a marriage of ideas culled from the X window, ADAM, Keck instrument, and Keck telescope control systems. A novel feature of KTL is that it knows nothing about any services or styles. Instead it defines a generic set of routines which must be implemented by all services and styles (essentially open(), ioctl(), read(), write(), event(), and close()) and activates sharable libraries at run-time. Services have been implemented (in both keyword and message styles) for HIRES (the Keck high resolution echelle spectrograph built by Lick Observatory), LWS (the Keck long wavelength spectrometer built by UC San Diego), and the Keck telescope. Each of these implementations uses different underlying message systems: the Lick MUSIC system, RPC's, and direct sockets (respectively). Services for the remaining three front-line Keck instruments will be implemented over the next few months.
Design for Social Presence and Exploring Its Mediating Effect in Mobile Data Communication Services
ERIC Educational Resources Information Center
Ogara, Solomon Omondi
2011-01-01
The mobility, flexibility, convenience, and ubiquity of mobile data services (MDS) have contributed to their enormous growth and popularity with users. MDS allow users to communicate through mobile texting (mTexting), mobile Instant Messaging (mIM), multimedia messaging services (MMS), and email. A unique feature of MDS that enhances its…
Gollust, Sarah E; Tang, Xuyang; White, James M; French, Simone A; Runge, Carlisle Ford; Rothman, Alexander J
2017-01-01
Many jurisdictions in the USA and globally are considering raising the prices of sugar-sweetened beverages (SSB) through taxes as a strategy to reduce their consumption. The objective of the present study was to identify whether the rationale provided for an SSB price increase affects young adults' behavioural intentions and attitudes towards SSB. Participants were randomly assigned to receive one of eight SSB price increase rationales. Intentions to purchase SSB and attitudes about the product and policy were measured. A forty-six-item cross-sectional Internet survey. Undergraduate students (n 494) at a large US Midwestern university. Rationale type was significantly associated with differences in participants' purchasing intentions for the full sample (F 7,485=2·53, P=0·014). Presenting the rationale for an SSB price increase as a user fee, an effort to reduce obesity, a strategy to offset health-care costs or to protect children led to lower SSB purchasing intentions compared with a message with no rationale. Rationale type was also significantly associated with differences in perceptions of soda companies (F 7,485=2·10, P=0·043); among low consumers of SSB, messages describing the price increase as a user fee or tax led to more negative perceptions of soda companies. The rationale attached to an SSB price increase could influence consumers. However, these message effects may depend on individuals' level of SSB consumption.
Collaborative Scheduling Using JMS in a Mixed Java and .NET Environment
NASA Technical Reports Server (NTRS)
Wang, Yeou-Fang; Wax, Allan; Lam, Ray; Baldwin, John; Borden, Chet
2006-01-01
A collaborative framework/environment was proto-typed to prove the feasibility of scheduling space flight missions on NASA's Deep Space Network (DSN) in a distributed fashion. In this environment, effective collaboration relies on efficient communications among all flight mission and DSN scheduling users. There-fore, messaging becomes critical to timely event notification and data synchronization. In the prototype, a rapid messaging system using Java Message Service (JMS) in a mixed Java and .NET environment is established. This scheme allows both Java and .NET applications to communicate with each other for data synchronization and schedule negotiation. The JMS approach we used is based on a centralized messaging scheme. With proper use of a high speed messaging system, all users in this collaborative framework can communicate with each other to generate a schedule collaboratively to meet DSN and projects tracking needs.
Asbestos: Securing Untrusted Software with Interposition
2005-09-01
consistent intelligible interfaces to different types of resource. Message-based operating systems, such as Accent, Amoeba, Chorus, L4 , Spring...control on self-authenticating capabilities, precluding policies that restrict delegation. L4 uses a strict hierarchy of interpositions, useful for...the OS de- sign space amenable to secure application construction. Similar effects might be possible with message-passing microkernels , or unwieldy
Ribeiro, Antonio; Couto Silva, Ana Paula; Meira Jr, Wagner
2017-01-01
Background Recent research has shown that of the 72% of American Internet users who have looked for health information online, 22% have searched for help to lose or control weight. This demand for information has given rise to many online weight management communities, where users support one another throughout their weight loss process. Whether and how user engagement in online communities relates to weight change is not totally understood. Objective We investigated the activity behavior and analyze the semantic content of the messages of active users in LoseIt (r/loseit), a weight management community of the online social network Reddit. We then explored whether these features are associated with weight loss in this online social network. Methods A data collection tool was used to collect English posts, comments, and other public metadata of active users (ie, users with at least one post or comment) on LoseIt from August 2010 to November 2014. Analyses of frequency and intensity of user interaction in the community were performed together with a semantic analysis of the messages, done by a latent Dirichlet allocation method. The association between weight loss and online user activity patterns, the semantics of the messages, and real-world variables was found by a linear regression model using 30-day weight change as the dependent variable. Results We collected posts and comments of 107,886 unique users. Among these, 101,003 (93.62%) wrote at least one comment and 38,981 (36.13%) wrote at least one post. Median percentage of days online was 3.81 (IQR 9.51). The 10 most-discussed semantic topics on posts were related to healthy food, clothing, calorie counting, workouts, looks, habits, support, and unhealthy food. In the subset of 754 users who had gender, age, and 30-day weight change data available, women were predominant and 92.9% (701/754) lost weight. Female gender, body mass index (BMI) at baseline, high levels of online activity, the number of upvotes received per post, and topics discussed within the community were independently associated with weight change. Conclusions Our findings suggest that among active users of a weight management community, self-declaration of higher BMI levels (which may represent greater dissatisfaction with excess weight), high online activity, and engagement in discussions that might provide social support are associated with greater weight loss. These findings have the potential to aid health professionals to assist patients in online interventions by focusing efforts on increasing engagement and/or starting discussions on topics of higher impact on weight change. PMID:28093378
Concept-Based Grammatical Errors of Arab EFL Learners
ERIC Educational Resources Information Center
Al-Quran, Majed
2010-01-01
Building up messages as a cognitive activity within the linguistic multi-level system is the result of the interaction between the various components of this system. Yet, this interactive process occurring in the language user's mind while encoding can vary from person to person. Likewise, it also differs in different recipients while decoding.…
NASA Technical Reports Server (NTRS)
Grams, R. R.
1982-01-01
A system designed to access a large range of available medical textbook information in an online interactive fashion is described. A high level query type database manager, INQUIRE, is used. Operating instructions, system flow diagrams, database descriptions, text generation, and error messages are discussed. User information is provided.
How Effective is Routing for Wireless Networking
2016-03-05
Routing (LAR) [31]. The basic mechanism of how link-based routing schemes operate is as follows: a user broadcasts a control message (called a “ hello ...to all of its neighbors. If a series of hello messages are exchanged between two users, a link is considered to exist between them. Routes are then be...description of ETX is as follows. For a given window of time, the number of hello packets that a user receives from a neighbor is counted. A cost is then
Non-RF Chain of Custody Item Monitor (CoCIM) User Manual.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brotz, Jay Kristoffer; Wade, James Rokwel; Schwartz, Steven Robert
This User Manual contains a description of the wired and infrared (IR) variants of the Chain of Custody Item Monitor (CoCIM), the Coordinator for reading stored messages, and the inspector Message Viewer user interface (UI) software, as well as instructions for use. This manual does not include descriptions or use instructions for the radio frequency (RF) variant of the CoCIM. The intended audience is planners and participants in treaty verification exercises where chain of custody (CoC) elements are required.
Network support for system initiated checkpoints
Chen, Dong; Heidelberger, Philip
2013-01-29
A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.
The invisible reality of arthritis: a qualitative analysis of an online message board.
Hadert, Aimee; Rodham, Karen
2008-09-01
Living with a chronic illness, such as arthritis, creates many psychosocial stressors, which can be difficult to cope with. Exploring the interactions which take place on an online message board for people with arthritis may provide insight into both the social support offered, as well as highlighting the groups' needs that perhaps are not being met in a more formal 'offline' setting. The aim of this study was to investigate how and why an arthritis online message board was used. A retrospective three-month period of discussions posted on an online message board for people who have arthritis was downloaded into a word document. Collecting data in this manner ensured that completed discussions were captured. Eighty-seven initial messages and 981 replies were analysed. The discussions were analysed using interpretive phenomenological analysis. Four master themes were identified. Firstly, the invisible reality of the condition; secondly, information exchange, whereby users of the message board were shown to be both seeking and providing information; thirdly, while users praised the support they received from family and friends, the support offered and received online was considered to provide additional benefits. Finally, the message board allowed users to share (primarily negative) emotions which they felt unable to express in their offline worlds. Patients do not always understand the information being offered by health care professionals, and they do not have the confidence to ask for clarification. Health care professionals need to ensure that they find a way of checking levels of patient understanding. Failure to do so means that patients may turn to alternative sources, which may not provide accurate information. The study also showed that people with arthritic conditions find it difficult to express how they are feeling in their offline world; furthermore, they find it difficult to ask for support from their significant others, preferring instead to 'suffer in silence' and seek support from the online community, potentially further isolating them from the support of those in their offline world. There is scope for such patients to be both empowered and educated, so that they are better able to ask for the help they need, which in turn will help to counteract the danger of isolation. (c) 2008 John Wiley & Sons, Ltd.
Hyperswitch communication network
NASA Technical Reports Server (NTRS)
Peterson, J.; Pniel, M.; Upchurch, E.
1991-01-01
The Hyperswitch Communication Network (HCN) is a large scale parallel computer prototype being developed at JPL. Commercial versions of the HCN computer are planned. The HCN computer being designed is a message passing multiple instruction multiple data (MIMD) computer, and offers many advantages in price-performance ratio, reliability and availability, and manufacturing over traditional uniprocessors and bus based multiprocessors. The design of the HCN operating system is a uniquely flexible environment that combines both parallel processing and distributed processing. This programming paradigm can achieve a balance among the following competing factors: performance in processing and communications, user friendliness, and fault tolerance. The prototype is being designed to accommodate a maximum of 64 state of the art microprocessors. The HCN is classified as a distributed supercomputer. The HCN system is described, and the performance/cost analysis and other competing factors within the system design are reviewed.
Performance Analysis of GYRO: A Tool Evaluation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Worley, P.; Roth, P.; Candy, J.
2005-06-26
The performance of the Eulerian gyrokinetic-Maxwell solver code GYRO is analyzed on five high performance computing systems. First, a manual approach is taken, using custom scripts to analyze the output of embedded wall clock timers, floating point operation counts collected using hardware performance counters, and traces of user and communication events collected using the profiling interface to Message Passing Interface (MPI) libraries. Parts of the analysis are then repeated or extended using a number of sophisticated performance analysis tools: IPM, KOJAK, SvPablo, TAU, and the PMaC modeling tool suite. The paper briefly discusses what has been discovered via this manualmore » analysis process, what performance analyses are inconvenient or infeasible to attempt manually, and to what extent the tools show promise in accelerating or significantly extending the manual performance analyses.« less
NASA Technical Reports Server (NTRS)
Juang, Hann-Ming Henry; Tao, Wei-Kuo; Zeng, Xi-Ping; Shie, Chung-Lin; Simpson, Joanne; Lang, Steve
2004-01-01
The capability for massively parallel programming (MPP) using a message passing interface (MPI) has been implemented into a three-dimensional version of the Goddard Cumulus Ensemble (GCE) model. The design for the MPP with MPI uses the concept of maintaining similar code structure between the whole domain as well as the portions after decomposition. Hence the model follows the same integration for single and multiple tasks (CPUs). Also, it provides for minimal changes to the original code, so it is easily modified and/or managed by the model developers and users who have little knowledge of MPP. The entire model domain could be sliced into one- or two-dimensional decomposition with a halo regime, which is overlaid on partial domains. The halo regime requires that no data be fetched across tasks during the computational stage, but it must be updated before the next computational stage through data exchange via MPI. For reproducible purposes, transposing data among tasks is required for spectral transform (Fast Fourier Transform, FFT), which is used in the anelastic version of the model for solving the pressure equation. The performance of the MPI-implemented codes (i.e., the compressible and anelastic versions) was tested on three different computing platforms. The major results are: 1) both versions have speedups of about 99% up to 256 tasks but not for 512 tasks; 2) the anelastic version has better speedup and efficiency because it requires more computations than that of the compressible version; 3) equal or approximately-equal numbers of slices between the x- and y- directions provide the fastest integration due to fewer data exchanges; and 4) one-dimensional slices in the x-direction result in the slowest integration due to the need for more memory relocation for computation.
Abstract Mindsets Increase Believability of Spatially Distant Online Messages
Sungur, Hande; Hartmann, Tilo; van Koningsbruggen, Guido M.
2016-01-01
Growing evidence from online credibility research reveals that online users rely on heuristic processes to evaluate the credibility of online information. The current paper, which is based on the construal level theory (CLT), proposes that congruency between the psychological distance of a stimulus and the way it is mentally construed can act as a heuristic for believability. According to CLT, psychologically close (e.g., spatially, temporally, socially) stimuli are represented concretely whereas psychologically distant stimuli are represented abstractly. The level of mental construals and the psychological distance of information have been shown to influence people’s truth judgments in offline contexts. This study tests whether congruency between the construal level of people’s mindsets (abstract vs. concrete) and the psychological distance implied in an online message (far vs. close) enhances message believability. By partially confirming CLT predictions, we found that believability of an online news item about a distant location increased when people maintained an abstract mindset rather than a concrete one. The effect of a concrete mindset on believability was not significant for the close psychological distance condition. Our findings provide initial evidence that congruency between the construal level of people’s mindsets and psychological distance cues in online messages can act as a heuristic for believability. We discuss the potential of applying the CLT framework to the growing literature on online cognitive heuristics in the area of online information credibility. PMID:27468272
''Towards a High-Performance and Robust Implementation of MPI-IO on Top of GPFS''
DOE Office of Scientific and Technical Information (OSTI.GOV)
Prost, J.P.; Tremann, R.; Blackwore, R.
2000-01-11
MPI-IO/GPFS is a prototype implementation of the I/O chapter of the Message Passing Interface (MPI) 2 standard. It uses the IBM General Parallel File System (GPFS), with prototyped extensions, as the underlying file system. this paper describes the features of this prototype which support its high performance and robustness. The use of hints at the file system level and at the MPI-IO level allows tailoring the use of the file system to the application needs. Error handling in collective operations provides robust error reporting and deadlock prevention in case of returning errors.
Performance Evaluation of Remote Memory Access (RMA) Programming on Shared Memory Parallel Computers
NASA Technical Reports Server (NTRS)
Jin, Hao-Qiang; Jost, Gabriele; Biegel, Bryan A. (Technical Monitor)
2002-01-01
The purpose of this study is to evaluate the feasibility of remote memory access (RMA) programming on shared memory parallel computers. We discuss different RMA based implementations of selected CFD application benchmark kernels and compare them to corresponding message passing based codes. For the message-passing implementation we use MPI point-to-point and global communication routines. For the RMA based approach we consider two different libraries supporting this programming model. One is a shared memory parallelization library (SMPlib) developed at NASA Ames, the other is the MPI-2 extensions to the MPI Standard. We give timing comparisons for the different implementation strategies and discuss the performance.
ADAPTIVE TETRAHEDRAL GRID REFINEMENT AND COARSENING IN MESSAGE-PASSING ENVIRONMENTS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hallberg, J.; Stagg, A.
2000-10-01
A grid refinement and coarsening scheme has been developed for tetrahedral and triangular grid-based calculations in message-passing environments. The element adaption scheme is based on an edge bisection of elements marked for refinement by an appropriate error indicator. Hash-table/linked-list data structures are used to store nodal and element formation. The grid along inter-processor boundaries is refined and coarsened consistently with the update of these data structures via MPI calls. The parallel adaption scheme has been applied to the solution of a transient, three-dimensional, nonlinear, groundwater flow problem. Timings indicate efficiency of the grid refinement process relative to the flow solvermore » calculations.« less
PREDICTING INDIVIDUAL WELL-BEING THROUGH THE LANGUAGE OF SOCIAL MEDIA.
Schwartz, H Andrew; Sap, Maarten; Kern, Margaret L; Eichstaedt, Johannes C; Kapelner, Adam; Agrawal, Megha; Blanco, Eduardo; Dziurzynski, Lukasz; Park, Gregory; Stillwell, David; Kosinski, Michal; Seligman, Martin E P; Ungar, Lyle H
2016-01-01
We present the task of predicting individual well-being, as measured by a life satisfaction scale, through the language people use on social media. Well-being, which encompasses much more than emotion and mood, is linked with good mental and physical health. The ability to quickly and accurately assess it can supplement multi-million dollar national surveys as well as promote whole body health. Through crowd-sourced ratings of tweets and Facebook status updates, we create message-level predictive models for multiple components of well-being. However, well-being is ultimately attributed to people, so we perform an additional evaluation at the user-level, finding that a multi-level cascaded model, using both message-level predictions and userlevel features, performs best and outperforms popular lexicon-based happiness models. Finally, we suggest that analyses of language go beyond prediction by identifying the language that characterizes well-being.
Proof of Concept for the Rewrite Rule Machine: Interensemble Studies
1994-02-23
34 -,,, S2 •fbo fibo 0 1 Figure 1: Concurrent Rewriting of Fibonacci Expressions exploit a problem’s parallelism at several levels. We call this...property multigrain concurrency; it makes the RRM very well suited for solving not only homogeneous problems, but also complex, locally homogeneous but...interprocessor message passing over a network-is not well suited to data parallelism. A key goal of the RRM is to combine the best of these two approaches in a
Head flexion angle while using a smartphone.
Lee, Sojeong; Kang, Hwayeong; Shin, Gwanseob
2015-01-01
Repetitive or prolonged head flexion posture while using a smartphone is known as one of risk factors for pain symptoms in the neck. To quantitatively assess the amount and range of head flexion of smartphone users, head forward flexion angle was measured from 18 participants when they were conducing three common smartphone tasks (text messaging, web browsing, video watching) while sitting and standing in a laboratory setting. It was found that participants maintained head flexion of 33-45° (50th percentile angle) from vertical when using the smartphone. The head flexion angle was significantly larger (p < 0.05) for text messaging than for the other tasks, and significantly larger while sitting than while standing. Study results suggest that text messaging, which is one of the most frequently used app categories of smartphone, could be a main contributing factor to the occurrence of neck pain of heavy smartphone users. Practitioner Summary: In this laboratory study, the severity of head flexion of smartphone users was quantitatively evaluated when conducting text messaging, web browsing and video watching while sitting and standing. Study results indicate that text messaging while sitting caused the largest head flexion than that of other task conditions.
Two-Way Text Messaging: An Interactive Mobile Learning Environment in Higher Education
ERIC Educational Resources Information Center
Premadasa, H. K. Salinda; Meegama, R. G. N.
2016-01-01
Short messaging service (SMS) is perhaps the most popular mobile technology prevalent among students in higher education due to its ubiquitous nature and the capability of two-way communication. However, a major limitation in two-way text messaging is sending back a part of received data with the reply message. This limitation results in users of…
NASA Astrophysics Data System (ADS)
Huang, Haiping
2017-05-01
Revealing hidden features in unlabeled data is called unsupervised feature learning, which plays an important role in pretraining a deep neural network. Here we provide a statistical mechanics analysis of the unsupervised learning in a restricted Boltzmann machine with binary synapses. A message passing equation to infer the hidden feature is derived, and furthermore, variants of this equation are analyzed. A statistical analysis by replica theory describes the thermodynamic properties of the model. Our analysis confirms an entropy crisis preceding the non-convergence of the message passing equation, suggesting a discontinuous phase transition as a key characteristic of the restricted Boltzmann machine. Continuous phase transition is also confirmed depending on the embedded feature strength in the data. The mean-field result under the replica symmetric assumption agrees with that obtained by running message passing algorithms on single instances of finite sizes. Interestingly, in an approximate Hopfield model, the entropy crisis is absent, and a continuous phase transition is observed instead. We also develop an iterative equation to infer the hyper-parameter (temperature) hidden in the data, which in physics corresponds to iteratively imposing Nishimori condition. Our study provides insights towards understanding the thermodynamic properties of the restricted Boltzmann machine learning, and moreover important theoretical basis to build simplified deep networks.
Principles for problem aggregation and assignment in medium scale multiprocessors
NASA Technical Reports Server (NTRS)
Nicol, David M.; Saltz, Joel H.
1987-01-01
One of the most important issues in parallel processing is the mapping of workload to processors. This paper considers a large class of problems having a high degree of potential fine grained parallelism, and execution requirements that are either not predictable, or are too costly to predict. The main issues in mapping such a problem onto medium scale multiprocessors are those of aggregation and assignment. We study a method of parameterized aggregation that makes few assumptions about the workload. The mapping of aggregate units of work onto processors is uniform, and exploits locality of workload intensity to balance the unknown workload. In general, a finer aggregate granularity leads to a better balance at the price of increased communication/synchronization costs; the aggregation parameters can be adjusted to find a reasonable granularity. The effectiveness of this scheme is demonstrated on three model problems: an adaptive one-dimensional fluid dynamics problem with message passing, a sparse triangular linear system solver on both a shared memory and a message-passing machine, and a two-dimensional time-driven battlefield simulation employing message passing. Using the model problems, the tradeoffs are studied between balanced workload and the communication/synchronization costs. Finally, an analytical model is used to explain why the method balances workload and minimizes the variance in system behavior.
Secure UNIX socket-based controlling system for high-throughput protein crystallography experiments.
Gaponov, Yurii; Igarashi, Noriyuki; Hiraki, Masahiko; Sasajima, Kumiko; Matsugaki, Naohiro; Suzuki, Mamoru; Kosuge, Takashi; Wakatsuki, Soichi
2004-01-01
A control system for high-throughput protein crystallography experiments has been developed based on a multilevel secure (SSL v2/v3) UNIX socket under the Linux operating system. Main features of protein crystallography experiments (purification, crystallization, loop preparation, data collecting, data processing) are dealt with by the software. All information necessary to perform protein crystallography experiments is stored (except raw X-ray data, that are stored in Network File Server) in a relational database (MySQL). The system consists of several servers and clients. TCP/IP secure UNIX sockets with four predefined behaviors [(a) listening to a request followed by a reply, (b) sending a request and waiting for a reply, (c) listening to a broadcast message, and (d) sending a broadcast message] support communications between all servers and clients allowing one to control experiments, view data, edit experimental conditions and perform data processing remotely. The usage of the interface software is well suited for developing well organized control software with a hierarchical structure of different software units (Gaponov et al., 1998), which will pass and receive different types of information. All communication is divided into two parts: low and top levels. Large and complicated control tasks are split into several smaller ones, which can be processed by control clients independently. For communicating with experimental equipment (beamline optical elements, robots, and specialized experimental equipment etc.), the STARS server, developed at the Photon Factory, is used (Kosuge et al., 2002). The STARS server allows any application with an open socket to be connected with any other clients that control experimental equipment. Majority of the source code is written in C/C++. GUI modules of the system were built mainly using Glade user interface builder for GTK+ and Gnome under Red Hat Linux 7.1 operating system.
Increased User Satisfaction Through an Improved Message System
NASA Technical Reports Server (NTRS)
Weissert, C. L.
1997-01-01
With all of the enhancements in software methodology and testing, there is no guarantee that software can be delivered such that no user errors occur, How to handle these errors when they occur has become a major research topic within human-computer interaction (HCI). Users of the Multimission Spacecraft Analysis Subsystem(MSAS) at the Jet Propulsion Laboratory (JPL), a system of X and motif graphical user interfaces for analyzing spacecraft data, complained about the lack of information about the error cause and have suggested that recovery actions be included in the system error messages...The system was evaluated through usability surveys and was shown to be successful.
Vape, quit, tweet? Electronic cigarettes and smoking cessation on Twitter.
van der Tempel, Jan; Noormohamed, Aliya; Schwartz, Robert; Norman, Cameron; Malas, Muhannad; Zawertailo, Laurie
2016-03-01
Individuals seeking information about electronic cigarettes are increasingly turning to social media networks like Twitter. We surveyed dominant Twitter communications about e-cigarettes and smoking cessation, examining message sources, themes, and attitudes. Tweets from 2014 were searched for mentions of e-cigarettes and smoking cessation. A purposive sample was subjected to mixed-methods analysis. Twitter communication about e-cigarettes increased fivefold since 2012. In a sample of 300 tweets from high-authority users, attitudes about e-cigarettes as smoking cessation aids were favorable across user types (industry, press, public figures, fake accounts, and personal users), except for public health professionals, who lacked consensus and contributed negligibly to the conversation. The most prevalent message themes were marketing, news, and first-person experiences with e-cigarettes as smoking cessation aids. We identified several industry strategies to reach Twitter users. Our findings show that Twitter users are overwhelmingly exposed to messages that favor e-cigarettes as smoking cessation aids, even when disregarding commercial activity. This underlines the need for effective public health engagement with social media to provide reliable information about e-cigarettes and smoking cessation online.
Tan, Ziying; Liu, Xingyun; Liu, Xiaoqian; Cheng, Qijin; Zhu, Tingshao
2017-12-12
While Web-based interventions can be efficacious, engaging a target population's attention remains challenging. We argue that strategies to draw such a population's attention should be tailored to meet its needs. Increasing user engagement in online suicide intervention development requires feedback from this group to prevent people who have suicide ideation from seeking treatment. The goal of this study was to solicit feedback on the acceptability of the content of messaging from social media users with suicide ideation. To overcome the common concern of lack of engagement in online interventions and to ensure effective learning from the message, this research employs a customized design of both content and length of the message. In study 1, 17 participants suffering from suicide ideation were recruited. The first (n=8) group conversed with a professional suicide intervention doctor about its attitudes and suggestions for a direct message intervention. To ensure the reliability and consistency of the result, an identical interview was conducted for the second group (n=9). Based on the collected data, questionnaires about this intervention were formed. Study 2 recruited 4222 microblog users with suicide ideation via the Internet. The results of the group interviews in study 1 yielded little difference regarding the interview results; this difference may relate to the 2 groups' varied perceptions of direct message design. However, most participants reported that they would be most drawn to an intervention where they knew that the account was reliable. Out of 4222 microblog users, we received responses from 725 with completed questionnaires; 78.62% (570/725) participants were not opposed to online suicide intervention and they valued the link for extra suicide intervention information as long as the account appeared to be trustworthy. Their attitudes toward the intervention and the account were similar to those from study 1, and 3 important elements were found pertaining to the direct message: reliability of account name, brevity of the message, and details of the phone numbers of psychological intervention centers and psychological assessment. This paper proposed strategies for engaging target populations in online suicide interventions. ©Ziying Tan, Xingyun Liu, Xiaoqian Liu, Qijin Cheng, Tingshao Zhu. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 12.12.2017.
Database Migration for Command and Control
2002-11-01
Sql - proprietary JDP Private Area Air defense data Defended asset list Oracle 7.3.2 - Automated process (OLTP...TADIL warnings Oracle 7.3.2 Flat File - Discrete transaction with data upds - NRT response required Pull mission data Std SQL ...level execution data Oracle 7.3 User update External interfaces Auto/manual backup Messaging Proprietary replication (internally) SQL Web server
Teaching Controversial Topics to Skeptical High School Students
NASA Astrophysics Data System (ADS)
Ford, K. S.
2012-12-01
Tennessee passes the "Monkey Bill" (HB 0368, SB 0893), North Carolina's state government passes a law to criminalize reference in state documents to scientific models that predict sea level rise to reach at least one meter by the next century, and public concern still lags far behind the scientific community's concern on climate change. The American public and even science teachers across the country seem to have lost faith in the ability of the scientific community to unify a strong message about several important scientific lessons, including global warming in particular. This lack of a unified message has weakened the ability of science teachers to effectively teach the lesson of global warming. For science teachers in strongly conservative areas of the country, it is much easier to omit difficult topics and avoid angering parents and school board members. Teachers who do feel strongly about scientifically proven, yet publically controversial topics CAN teach these topics in conservative areas by confirming students' belief systems by being honest and open about motivations surrounding both sides of controversial topics, and by using vocabulary that avoids triggering negative perceptions about these controversial topics. For true learning and change of preconceived opinion to take place, it is important for students to come to the understanding in their own minds in an open and safe learning environment instead of having the message "preached" to them, which only serves to make them feel unintelligent and defensive if they disagree. This presentation will include lessons learned from a practicing science teacher who works in a community that overwhelmingly disputes the validity of human impacts on climate change.
Heffernan, Kayla Joanne; Chang, Shanton; Maclean, Skye Tamara; Callegari, Emma Teresa; Garland, Suzanne Marie; Reavley, Nicola Jane; Varigos, George Andrew; Wark, John Dennis
2016-02-09
The now ubiquitous catchphrase, "There's an app for that," rings true owing to the growing number of mobile phone apps. In excess of 97,000 eHealth apps are available in major app stores. Yet the effectiveness of these apps varies greatly. While a minority of apps are developed grounded in theory and in conjunction with health care experts, the vast majority are not. This is concerning given the Hippocratic notion of "do no harm." There is currently no unified formal theory for developing interactive eHealth apps, and development is especially difficult when complex messaging is required, such as in health promotion and prevention. This paper aims to provide insight into the creation of interactive eHealth apps for complex messaging, by leveraging the Safe-D case study, which involved complex messaging required to guide safe but sufficient UV exposure for vitamin D synthesis in users. We aim to create recommendations for developing interactive eHealth apps for complex messages based on the lessons learned during Safe-D app development. For this case study we developed an Apple and Android app, both named Safe-D, to safely improve vitamin D status in young women through encouraging safe ultraviolet radiation exposure. The app was developed through participatory action research involving medical and human computer interaction researchers, subject matter expert clinicians, external developers, and target users. The recommendations for development were created from analysis of the development process. By working with clinicians and implementing disparate design examples from the literature, we developed the Safe-D app. From this development process, recommendations for developing interactive eHealth apps for complex messaging were created: (1) involve a multidisciplinary team in the development process, (2) manage complex messages to engage users, and (3) design for interactivity (tailor recommendations, remove barriers to use, design for simplicity). This research has provided principles for developing interactive eHealth apps for complex messaging as guidelines by aggregating existing design concepts and expanding these concepts and new learnings from our development process. A set of guidelines to develop interactive eHealth apps generally, and specifically those for complex messaging, was previously missing from the literature; this research has contributed these principles. Safe-D delivers complex messaging simply, to aid education, and explicitly, considering user safety.
Heffernan, Kayla Joanne; Maclean, Skye Tamara; Callegari, Emma Teresa; Garland, Suzanne Marie; Reavley, Nicola Jane; Varigos, George Andrew; Wark, John Dennis
2016-01-01
Background The now ubiquitous catchphrase, “There’s an app for that,” rings true owing to the growing number of mobile phone apps. In excess of 97,000 eHealth apps are available in major app stores. Yet the effectiveness of these apps varies greatly. While a minority of apps are developed grounded in theory and in conjunction with health care experts, the vast majority are not. This is concerning given the Hippocratic notion of “do no harm.” There is currently no unified formal theory for developing interactive eHealth apps, and development is especially difficult when complex messaging is required, such as in health promotion and prevention. Objective This paper aims to provide insight into the creation of interactive eHealth apps for complex messaging, by leveraging the Safe-D case study, which involved complex messaging required to guide safe but sufficient UV exposure for vitamin D synthesis in users. We aim to create recommendations for developing interactive eHealth apps for complex messages based on the lessons learned during Safe-D app development. Methods For this case study we developed an Apple and Android app, both named Safe-D, to safely improve vitamin D status in young women through encouraging safe ultraviolet radiation exposure. The app was developed through participatory action research involving medical and human computer interaction researchers, subject matter expert clinicians, external developers, and target users. The recommendations for development were created from analysis of the development process. Results By working with clinicians and implementing disparate design examples from the literature, we developed the Safe-D app. From this development process, recommendations for developing interactive eHealth apps for complex messaging were created: (1) involve a multidisciplinary team in the development process, (2) manage complex messages to engage users, and (3) design for interactivity (tailor recommendations, remove barriers to use, design for simplicity). Conclusions This research has provided principles for developing interactive eHealth apps for complex messaging as guidelines by aggregating existing design concepts and expanding these concepts and new learnings from our development process. A set of guidelines to develop interactive eHealth apps generally, and specifically those for complex messaging, was previously missing from the literature; this research has contributed these principles. Safe-D delivers complex messaging simply, to aid education, and explicitly, considering user safety. PMID:26860623
Expectancy Theory in Media and Message Selection.
ERIC Educational Resources Information Center
Van Leuven, Jim
1981-01-01
Argues for reversing emphasis on uses and gratifications research in favor of an expectancy model which holds that selection of a particular medium depends on (1) the expectation that the choice will be followed by a message of interest and (2) the importance of that message in satisfying user's values. (PD)
ERIC Educational Resources Information Center
Skov-Ettrup, L. S.; Ringgaard, L. W.; Dalum, P.; Flensborg-Madsen, T.; Thygesen, L. C.; Tolstrup, J. S.
2014-01-01
The aim was to compare the effectiveness of untailored text messages for smoking cessation to tailored text messages delivered at a higher frequency. From February 2007 to August 2009, 2030 users of an internet-based smoking cessation program with optional text message support aged 15-25 years were consecutively randomized to versions of the…
Risk perceptions of smokeless tobacco among adolescents and adult users and nonusers
Liu, Sherry T.; Nemeth, Julianna M.; Klein, Elizabeth G.; Ferketich, Amy K.; Kwan, Mei-Po; Wewers, Mary Ellen
2015-01-01
The recent growth in smokeless tobacco (ST) consumption has raised questions about consumer risk perceptions of ST products, especially in high-risk vulnerable populations. This qualitative study examined risk perceptions of ST among adolescent and adult users and non-users in Ohio Appalachia. Focus groups and interviews were held with adolescents (n=53; mean age of 17 years) and adults (n=63; mean age of 34 years) from four Ohio Appalachian counties. Participants were asked about their perceptions of ST-related health risks, ST safety, and the relative safety of ST compared to cigarettes. Transcriptions were coded independently by two individuals. Overall, participants were knowledgeable about health problems from ST use (e.g., oral cancers, periodontal disease). Nearly all participants stated that ST use is not safe; however, there was disagreement about its relative safety. Some perceived all tobacco products as equally harmful; others believed that ST is safer than cigarettes for either the user or those around the user. Disagreements about ST relative safety may reflect mixed public health messages concerning the safety of ST. Comprehensive consumer messages about the relative safety of ST compared to cigarettes are needed. Messages should address the effect of ST on the health of the user as well as those exposed to the user. PMID:25832126
User preferences for a text message-based smoking cessation intervention.
Bock, Beth C; Heron, Kristin E; Jennings, Ernestine G; Magee, Joshua C; Morrow, Kathleen M
2013-04-01
Younger adults are more likely to smoke and less likely to seek treatment than older smokers. They are also frequent users of communication technology. In the current study, we conducted focus groups to obtain feedback about preferences for a text message-based smoking cessation program from potential users. Participants (N = 21, M age = 25.6 years, age range = 20-33 years) were current or recently quit smokers (M cigarettes/day = 12.8) who used text messaging. Participants completed questionnaires and participated in a 2-hour focus group. Focus groups were conducted using an a priori semistructured interview guide to promote discussion of the content and functionality of the intervention. Major themes from analysis of the focus groups included support for the acceptability of a text-based cessation program, suggestions for a more technologically broad-based program, and adjustments to the program structure. Participants recommended including social networking functions, user control of program output through an online profile, and text message features to promote interaction with the system. Interestingly, many participants suggested the program should begin on individuals' identified quit day, challenging the procedures used in most cessation programs, which begin by preparing participants for a future quit date. Overall, younger adult smokers appear to be interested in participating in a smoking cessation program that uses text messages and web-based elements. Qualitative feedback regarding the perceived optimal features and structure of a technology-based intervention challenged traditional methods of implementing smoking cessation interventions and will inform the development of future programs.
NASA Astrophysics Data System (ADS)
Mohd Salleh, Nurhidayah; Ariff, Mohd Shoki Md; Zakuan, Norhayati; Sulaiman, Zuraidah; Zameri Mat Saman, Muhamad
2016-05-01
The increase number of active users of social media, especially Facebook, stimulates viral advertising behaviour among them, thus attracting e-marketers to focus on viral advertising in promoting their products. In global market, use of Facebook platform indicated that food services/restaurant of food industry is ranked number 11 with 18.8% users’ response rate within the platform. This development calls for e-marketers in Malaysia to use Facebook as their viral advertising channel. Attitudinal factors affecting the viral advertising pass-on behaviour (VAPB) especially among members of social media is of interest to many researchers. The typical attitudinal factors used were attitude toward social media (ATSM), attitude toward advertising in social media (AASM) and attitude toward advertising in general (AAIG). Attitude toward advertised brand (ATAB) is important in fast food industry because users of social media tend to share their experience about tastes and features of the food. However, ATAB is less emphasized in the conceptual model between attitudinal factors and VAPB. These four factors of consumer attitude served as independent variables in the conceptual model of this study and their effect on viral advertising pass-on behaviour among members of Domino's Pizza Malaysia Facebook page was examined. Online survey using a set of questionnaire which was sent to the members of this group via private message was employed. A total of 254 sets of usable questionnaires were collected from the respondents. All the attitudinal factors, except for AASM, were found to have positive and significant effect on VAPB. AAIG exerted the strongest effect on VAPB. Therefore, e-marketers should emphasize on developing a favourable attitude toward advertising in general among members of a social media to get them involve in viral advertising. In addition, instilling a favourable attitude towards advertised brand is also vital as it influences the members to viral the brand among them. Managerial and theoretical implications of the study are discussed based on the results.
Extracting Association Patterns in Network Communications
Portela, Javier; Villalba, Luis Javier García; Trujillo, Alejandra Guadalupe Silva; Orozco, Ana Lucila Sandoval; Kim, Tai-hoon
2015-01-01
In network communications, mixes provide protection against observers hiding the appearance of messages, patterns, length and links between senders and receivers. Statistical disclosure attacks aim to reveal the identity of senders and receivers in a communication network setting when it is protected by standard techniques based on mixes. This work aims to develop a global statistical disclosure attack to detect relationships between users. The only information used by the attacker is the number of messages sent and received by each user for each round, the batch of messages grouped by the anonymity system. A new modeling framework based on contingency tables is used. The assumptions are more flexible than those used in the literature, allowing to apply the method to multiple situations automatically, such as email data or social networks data. A classification scheme based on combinatoric solutions of the space of rounds retrieved is developed. Solutions about relationships between users are provided for all pairs of users simultaneously, since the dependence of the data retrieved needs to be addressed in a global sense. PMID:25679311
Extracting association patterns in network communications.
Portela, Javier; Villalba, Luis Javier García; Trujillo, Alejandra Guadalupe Silva; Orozco, Ana Lucila Sandoval; Kim, Tai-hoon
2015-02-11
In network communications, mixes provide protection against observers hiding the appearance of messages, patterns, length and links between senders and receivers. Statistical disclosure attacks aim to reveal the identity of senders and receivers in a communication network setting when it is protected by standard techniques based on mixes. This work aims to develop a global statistical disclosure attack to detect relationships between users. The only information used by the attacker is the number of messages sent and received by each user for each round, the batch of messages grouped by the anonymity system. A new modeling framework based on contingency tables is used. The assumptions are more flexible than those used in the literature, allowing to apply the method to multiple situations automatically, such as email data or social networks data. A classification scheme based on combinatoric solutions of the space of rounds retrieved is developed. Solutions about relationships between users are provided for all pairs of users simultaneously, since the dependence of the data retrieved needs to be addressed in a global sense.
Information diffusion in structured online social networks
NASA Astrophysics Data System (ADS)
Li, Pei; Zhang, Yini; Qiao, Fengcai; Wang, Hui
2015-05-01
Nowadays, due to the word-of-mouth effect, online social networks have been considered to be efficient approaches to conduct viral marketing, which makes it of great importance to understand the diffusion dynamics in online social networks. However, most research on diffusion dynamics in epidemiology and existing social networks cannot be applied directly to characterize online social networks. In this paper, we propose models to characterize the information diffusion in structured online social networks with push-based forwarding mechanism. We introduce the term user influence to characterize the average number of times that messages are browsed which is incurred by a given type user generating a message, and study the diffusion threshold, above which the user influence of generating a message will approach infinity. We conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of use in understanding the diffusion dynamics in online social networks and also critical for advertisers in viral marketing who want to estimate the user influence before posting an advertisement.
Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R
2014-01-01
Background The United States Department of Veterans Affairs has implemented an electronic asynchronous “Secure Messaging” tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients’ experiences and preferences for using Secure Messaging. Objective The objectives of this mixed-methods study were to (1) characterize veterans’ experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans’ use of Secure Messaging. Methods We recruited 33 veterans who had access to and had previously used the portal’s Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants’ computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. Results The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving Secure Messaging. Veterans identified and demonstrated impediments to successful system usage that can be addressed with education, skill building, and system modifications. Analysis of secure message content data provided insights to reasons for use that were not disclosed by participants during interviews, specifically sensitive health topics such as erectile dysfunction and sexually transmitted disease inquiries. Conclusions Veterans perceive Secure Messaging in the My HealtheVet patient portal as a useful tool for communicating with health care teams. However, to maximize sustained utilization of Secure Messaging, marketing, education, skill building, and system modifications are needed. Data from this study can inform a large-scale quantitative assessment of Secure Messaging users’ experiences in a representative sample to validate qualitative findings. PMID:24610454
Mark 4A antenna control system data handling architecture study
NASA Technical Reports Server (NTRS)
Briggs, H. C.; Eldred, D. B.
1991-01-01
A high-level review was conducted to provide an analysis of the existing architecture used to handle data and implement control algorithms for NASA's Deep Space Network (DSN) antennas and to make system-level recommendations for improving this architecture so that the DSN antennas can support the ever-tightening requirements of the next decade and beyond. It was found that the existing system is seriously overloaded, with processor utilization approaching 100 percent. A number of factors contribute to this overloading, including dated hardware, inefficient software, and a message-passing strategy that depends on serial connections between machines. At the same time, the system has shortcomings and idiosyncrasies that require extensive human intervention. A custom operating system kernel and an obscure programming language exacerbate the problems and should be modernized. A new architecture is presented that addresses these and other issues. Key features of the new architecture include a simplified message passing hierarchy that utilizes a high-speed local area network, redesign of particular processing function algorithms, consolidation of functions, and implementation of the architecture in modern hardware and software using mainstream computer languages and operating systems. The system would also allow incremental hardware improvements as better and faster hardware for such systems becomes available, and costs could potentially be low enough that redundancy would be provided economically. Such a system could support DSN requirements for the foreseeable future, though thorough consideration must be given to hard computational requirements, porting existing software functionality to the new system, and issues of fault tolerance and recovery.
2013-08-20
Earth observation taken during day pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message: Looking southwest over northern Africa. Libya, Algeria, Niger.
Application of a distributed network in computational fluid dynamic simulations
NASA Technical Reports Server (NTRS)
Deshpande, Manish; Feng, Jinzhang; Merkle, Charles L.; Deshpande, Ashish
1994-01-01
A general-purpose 3-D, incompressible Navier-Stokes algorithm is implemented on a network of concurrently operating workstations using parallel virtual machine (PVM) and compared with its performance on a CRAY Y-MP and on an Intel iPSC/860. The problem is relatively computationally intensive, and has a communication structure based primarily on nearest-neighbor communication, making it ideally suited to message passing. Such problems are frequently encountered in computational fluid dynamics (CDF), and their solution is increasingly in demand. The communication structure is explicitly coded in the implementation to fully exploit the regularity in message passing in order to produce a near-optimal solution. Results are presented for various grid sizes using up to eight processors.
Approximate message passing with restricted Boltzmann machine priors
NASA Astrophysics Data System (ADS)
Tramel, Eric W.; Drémeau, Angélique; Krzakala, Florent
2016-07-01
Approximate message passing (AMP) has been shown to be an excellent statistical approach to signal inference and compressed sensing problems. The AMP framework provides modularity in the choice of signal prior; here we propose a hierarchical form of the Gauss-Bernoulli prior which utilizes a restricted Boltzmann machine (RBM) trained on the signal support to push reconstruction performance beyond that of simple i.i.d. priors for signals whose support can be well represented by a trained binary RBM. We present and analyze two methods of RBM factorization and demonstrate how these affect signal reconstruction performance within our proposed algorithm. Finally, using the MNIST handwritten digit dataset, we show experimentally that using an RBM allows AMP to approach oracle-support performance.
Tavares, Gabriela; Faisal, Aldo
2013-01-01
Human behaviour is highly individual by nature, yet statistical structures are emerging which seem to govern the actions of human beings collectively. Here we search for universal statistical laws dictating the timing of human actions in communication decisions. We focus on the distribution of the time interval between messages in human broadcast communication, as documented in Twitter, and study a collection of over 160,000 tweets for three user categories: personal (controlled by one person), managed (typically PR agency controlled) and bot-controlled (automated system). To test our hypothesis, we investigate whether it is possible to differentiate between user types based on tweet timing behaviour, independently of the content in messages. For this purpose, we developed a system to process a large amount of tweets for reality mining and implemented two simple probabilistic inference algorithms: 1. a naive Bayes classifier, which distinguishes between two and three account categories with classification performance of 84.6% and 75.8%, respectively and 2. a prediction algorithm to estimate the time of a user's next tweet with an R(2) ≈ 0.7. Our results show that we can reliably distinguish between the three user categories as well as predict the distribution of a user's inter-message time with reasonable accuracy. More importantly, we identify a characteristic power-law decrease in the tail of inter-message time distribution by human users which is different from that obtained for managed and automated accounts. This result is evidence of a universal law that permeates the timing of human decisions in broadcast communication and extends the findings of several previous studies of peer-to-peer communication.
Tavares, Gabriela; Faisal, Aldo
2013-01-01
Human behaviour is highly individual by nature, yet statistical structures are emerging which seem to govern the actions of human beings collectively. Here we search for universal statistical laws dictating the timing of human actions in communication decisions. We focus on the distribution of the time interval between messages in human broadcast communication, as documented in Twitter, and study a collection of over 160,000 tweets for three user categories: personal (controlled by one person), managed (typically PR agency controlled) and bot-controlled (automated system). To test our hypothesis, we investigate whether it is possible to differentiate between user types based on tweet timing behaviour, independently of the content in messages. For this purpose, we developed a system to process a large amount of tweets for reality mining and implemented two simple probabilistic inference algorithms: 1. a naive Bayes classifier, which distinguishes between two and three account categories with classification performance of 84.6% and 75.8%, respectively and 2. a prediction algorithm to estimate the time of a user's next tweet with an . Our results show that we can reliably distinguish between the three user categories as well as predict the distribution of a user's inter-message time with reasonable accuracy. More importantly, we identify a characteristic power-law decrease in the tail of inter-message time distribution by human users which is different from that obtained for managed and automated accounts. This result is evidence of a universal law that permeates the timing of human decisions in broadcast communication and extends the findings of several previous studies of peer-to-peer communication. PMID:23843945
Performance and Application of Parallel OVERFLOW Codes on Distributed and Shared Memory Platforms
NASA Technical Reports Server (NTRS)
Djomehri, M. Jahed; Rizk, Yehia M.
1999-01-01
The presentation discusses recent studies on the performance of the two parallel versions of the aerodynamics CFD code, OVERFLOW_MPI and _MLP. Developed at NASA Ames, the serial version, OVERFLOW, is a multidimensional Navier-Stokes flow solver based on overset (Chimera) grid technology. The code has recently been parallelized in two ways. One is based on the explicit message-passing interface (MPI) across processors and uses the _MPI communication package. This approach is primarily suited for distributed memory systems and workstation clusters. The second, termed the multi-level parallel (MLP) method, is simple and uses shared memory for all communications. The _MLP code is suitable on distributed-shared memory systems. For both methods, the message passing takes place across the processors or processes at the advancement of each time step. This procedure is, in effect, the Chimera boundary conditions update, which is done in an explicit "Jacobi" style. In contrast, the update in the serial code is done in more of the "Gauss-Sidel" fashion. The programming efforts for the _MPI code is more complicated than for the _MLP code; the former requires modification of the outer and some inner shells of the serial code, whereas the latter focuses only on the outer shell of the code. The _MPI version offers a great deal of flexibility in distributing grid zones across a specified number of processors in order to achieve load balancing. The approach is capable of partitioning zones across multiple processors or sending each zone and/or cluster of several zones into a single processor. The message passing across the processors consists of Chimera boundary and/or an overlap of "halo" boundary points for each partitioned zone. The MLP version is a new coarse-grain parallel concept at the zonal and intra-zonal levels. A grouping strategy is used to distribute zones into several groups forming sub-processes which will run in parallel. The total volume of grid points in each group are approximately balanced. A proper number of threads are initially allocated to each group, and in subsequent iterations during the run-time, the number of threads are adjusted to achieve load balancing across the processes. Each process exploits the multitasking directives already established in Overflow.
Case report: patient portal versus telephone recruitment for a surgical research study.
Baucom, R B; Ousley, J; Poulose, B K; Rosenbloom, S T; Jackson, G P
2014-01-01
Patient portal adoption has rapidly increased over the last decade. Most patient portal research has been done in primary care or medical specialties, and few studies have examined their use in surgical patients or for recruiting research subjects. No known studies have compared portal messaging with other approaches of recruitment. This case report describes our experience with patient portal versus telephone recruitment for a study involving long-term follow up of surgical patients. Participants were recruited for a study of recurrence after ventral hernia repair through telephone calls and patient portal messaging based on registration status with the portal. Potential subjects who did not have a portal account or whose portal messages were returned after 5 days were called. The proportion of participants enrolled with each method was determined and demographics of eligible patients, portal users, and participants were compared. 1359 patients were eligible for the hernia study, and enrollment was 35% (n=465). Most participants were recruited by telephone (84%, n=391); 16% (n=74) were recruited through portal messaging. Forty-four percent of eligible participants had a registered portal account, and 14% of users responded to the recruitment message. Portal users were younger than non-users (55 vs. 58 years, p<0.001); participants recruited through the portal versus telephone were also younger (54 vs. 59 years, p=0.001). Differences in the sex and racial distributions between users and non-users and between portal and telephone recruits were not significant. Portal versus telephone recruitment for a surgical research study demonstrated modest portal recruitment rates and similar demographics between recruitment methods. Published studies of portal-only recruitment in primary care or medical-specialty patient populations have demonstrated higher enrollment rates, but this case study demonstrates that portal recruitment for research studies in the surgical population is feasible, and it offers convenience to patients and researchers.
Passing messages between biological networks to refine predicted interactions.
Glass, Kimberly; Huttenhower, Curtis; Quackenbush, John; Yuan, Guo-Cheng
2013-01-01
Regulatory network reconstruction is a fundamental problem in computational biology. There are significant limitations to such reconstruction using individual datasets, and increasingly people attempt to construct networks using multiple, independent datasets obtained from complementary sources, but methods for this integration are lacking. We developed PANDA (Passing Attributes between Networks for Data Assimilation), a message-passing model using multiple sources of information to predict regulatory relationships, and used it to integrate protein-protein interaction, gene expression, and sequence motif data to reconstruct genome-wide, condition-specific regulatory networks in yeast as a model. The resulting networks were not only more accurate than those produced using individual data sets and other existing methods, but they also captured information regarding specific biological mechanisms and pathways that were missed using other methodologies. PANDA is scalable to higher eukaryotes, applicable to specific tissue or cell type data and conceptually generalizable to include a variety of regulatory, interaction, expression, and other genome-scale data. An implementation of the PANDA algorithm is available at www.sourceforge.net/projects/panda-net.
Clandestine Transmissions and Operations of Embedded Software on Cellular Mobile Devices
2011-09-01
Register EMS Enhanced Message Service FDMA Frequency Division Multiple Access GMT Greenwich Mean Time GMSC Gateway Mobile Switching Center...Message Switching Center SMS-IWMSC SMS-Interworking Mobile-Service Switching Center TCH Traffic Channels TDMA Time Division Multiple Access TP...assume the user will not attempt to re-program the device. Finally, we assume that the owner and user do not have root access and cannot disable any
A practical approach to portability and performance problems on massively parallel supercomputers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beazley, D.M.; Lomdahl, P.S.
1994-12-08
We present an overview of the tactics we have used to achieve a high-level of performance while improving portability for a large-scale molecular dynamics code SPaSM. SPaSM was originally implemented in ANSI C with message passing for the Connection Machine 5 (CM-5). In 1993, SPaSM was selected as one of the winners in the IEEE Gordon Bell Prize competition for sustaining 50 Gflops on the 1024 node CM-5 at Los Alamos National Laboratory. Achieving this performance on the CM-5 required rewriting critical sections of code in CDPEAC assembler language. In addition, the code made extensive use of CM-5 parallel I/Omore » and the CMMD message passing library. Given this highly specialized implementation, we describe how we have ported the code to the Cray T3D and high performance workstations. In addition we will describe how it has been possible to do this using a single version of source code that runs on all three platforms without sacrificing any performance. Sound too good to be true? We hope to demonstrate that one can realize both code performance and portability without relying on the latest and greatest prepackaged tool or parallelizing compiler.« less
NASA Astrophysics Data System (ADS)
Ramiller, Chuck; Taylor, Trey; Rafferty, Tom H.; Cornell, Mark E.; Rafal, Marc; Savage, Richard
2010-07-01
The Hobby-Eberly Telescope (HET) will be undergoing a major upgrade as a precursor to the HET Dark Energy Experiment (HETDEX‡). As part of this upgrade, the Prime Focus Instrument Package (PFIP) will be replaced with a new design that supports the HETDEX requirements along with the existing suite of instruments and anticipated future additions. This paper describes the new PFIP control system hardware plus the physical constraints and other considerations driving its design. Because of its location at the top end of the telescope, the new PFIP is essentially a stand-alone remote automation island containing over a dozen subsystems. Within the PFIP, motion controllers and modular IO systems are interconnected using a local Controller Area Network (CAN) bus and the CANOpen messaging protocol. CCD cameras that are equipped only with USB 2.0 interfaces are connected to a local Ethernet network via small microcontroller boards running embedded Linux. Links to ground-level systems pass through a 100 m cable bundle and use Ethernet over fiber optic cable exclusively; communications are either direct or through Ethernet/CAN gateways that pass CANOpen messages transparently. All of the control system hardware components are commercially available, designed for rugged industrial applications, and rated for extended temperature operation down to -10 °C.
Software Design Document MCC CSCI (1). Volume 1 Sections 1.0-2.18
1991-06-01
AssociationUserProtocol /simnet/common!include/prot ____________________ ____________________ ocol/p assoc.h Primitive long Standard C type...Information. 2.2.1.4.2 ProcessMessage ProcessMessage processes a message from another process. type describes the message as either one-way, a synchronous or...Macintosh Consoles. This is sometimes necessary due to normal clock skew so that operations among the MCC components will remain synchronized . This
Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies
Uhlemann, Elisabeth
2018-01-01
Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications. PMID:29570676
Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies.
Balador, Ali; Uhlemann, Elisabeth; Calafate, Carlos T; Cano, Juan-Carlos
2018-03-23
Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.
Towards ontology personalization to enrich social conversations on AAC systems
NASA Astrophysics Data System (ADS)
Mancilla V., Daniela; Sastoque H., Sebastian; Iregui G., Marcela
2015-01-01
Communication is one of the essential needs of human beings. Augmentative and Alternative Communication Systems (AAC) seek to help in the generation of oral and written language to people with physical disorders that limit their natural communication. These systems present significant challenges such as: the composition of consistent messages according to syntactic and semantic rules, the improvement of message production times, the application to social contexts and, consequently, the incorporation of user-specific information. This work presents an original ontology personalization approach for an AAC instant messaging system incorporating personalized information to improve the efficacy and efficiency of the message production. This proposal is based on a projection of a general ontology into a more specific one, avoiding storage redundancy and data coupling, representing a big opportunity to enrich communication capabilities of current AAC systems. The evaluation was performed for a study case based on an AAC system for assistance in composing messages. The results show that adding user-specific information allows generation of enriched phrases, so improving the accuracy of the message, facilitating the communication process.
Using PVM to host CLIPS in distributed environments
NASA Technical Reports Server (NTRS)
Myers, Leonard; Pohl, Kym
1994-01-01
It is relatively easy to enhance CLIPS (C Language Integrated Production System) to support multiple expert systems running in a distributed environment with heterogeneous machines. The task is minimized by using the PVM (Parallel Virtual Machine) code from Oak Ridge Labs to provide the distributed utility. PVM is a library of C and FORTRAN subprograms that supports distributive computing on many different UNIX platforms. A PVM deamon is easily installed on each CPU that enters the virtual machine environment. Any user with rsh or rexec access to a machine can use the one PVM deamon to obtain a generous set of distributed facilities. The ready availability of both CLIPS and PVM makes the combination of software particularly attractive for budget conscious experimentation of heterogeneous distributive computing with multiple CLIPS executables. This paper presents a design that is sufficient to provide essential message passing functions in CLIPS and enable the full range of PVM facilities.
Decaf: Decoupled Dataflows for In Situ High-Performance Workflows
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dreher, M.; Peterka, T.
Decaf is a dataflow system for the parallel communication of coupled tasks in an HPC workflow. The dataflow can perform arbitrary data transformations ranging from simply forwarding data to complex data redistribution. Decaf does this by allowing the user to allocate resources and execute custom code in the dataflow. All communication through the dataflow is efficient parallel message passing over MPI. The runtime for calling tasks is entirely message-driven; Decaf executes a task when all messages for the task have been received. Such a messagedriven runtime allows cyclic task dependencies in the workflow graph, for example, to enact computational steeringmore » based on the result of downstream tasks. Decaf includes a simple Python API for describing the workflow graph. This allows Decaf to stand alone as a complete workflow system, but Decaf can also be used as the dataflow layer by one or more other workflow systems to form a heterogeneous task-based computing environment. In one experiment, we couple a molecular dynamics code with a visualization tool using the FlowVR and Damaris workflow systems and Decaf for the dataflow. In another experiment, we test the coupling of a cosmology code with Voronoi tessellation and density estimation codes using MPI for the simulation, the DIY programming model for the two analysis codes, and Decaf for the dataflow. Such workflows consisting of heterogeneous software infrastructures exist because components are developed separately with different programming models and runtimes, and this is the first time that such heterogeneous coupling of diverse components was demonstrated in situ on HPC systems.« less
Earth observation taken by the Expedition 46 crew
2016-01-23
ISS046e021993 (01/23/2016) --- Earth observation of the coast of Oman taken during a night pass by the Expedition 46 crew aboard the International Space Station. NASA astronaut Tim Kopra tweeted this image out with this message: "Passing over the Gulf of #Oman at night -- city lights of #Muscat #Dubai #AbuDhabi and #Doha in the distance".
Walther, Joseph B; Jang, Jeong-Woo; Hanna Edwards, Ashley A
2018-01-01
Unlike traditional media, social media systems often present information of different types from different kinds of contributors within a single message pane, a juxtaposition of potential influences that challenges traditional health communication processing. One type of social media system, question-and-answer advice systems, provides peers' answers to health-related questions, which yet other peers read and rate. Responses may appear good or bad, responders may claim expertise, and others' aggregated evaluations of an answer's usefulness may affect readers' judgments. An experiment explored how answer feasibility, expertise claims, and user-generated ratings affected readers' assessments of advice about anonymous HIV testing. Results extend the heuristic-systematic model of persuasion (Chaiken, 1980) and warranting theory (Walther & Parks, 2002). Information that is generally associated with both systematic and heuristic processes influenced readers' evaluations. Moreover, content-level cues affected judgments about message sources unexpectedly. When conflicting cues were present, cues with greater warranting value (consensus user-generated ratings) had greater influence on outcomes than less warranted cues (self-promoted expertise). Findings present a challenge to health professionals' concerns about the reliability of online health information systems.
Preliminary PANSAT ground station software design and use of an expert system to analyze telemetry
NASA Astrophysics Data System (ADS)
Lawrence, Gregory W.
1994-03-01
The Petite Amateur Navy Satellite (PANSAT) is a communications satellite designed to be used by civilian amateur radio operators. A master ground station is being built at the Naval Postgraduate School. This computer system performs satellite commands, displays telemetry, trouble-shoots problems, and passes messages. The system also controls an open loop tracking antenna. This paper concentrates on the telemetry display, decoding, and interpretation through artificial intelligence (AI). The telemetry is displayed in an easily interpretable format, so that any user can understand the current health of the satellite and be cued as to any problems and possible solutions. Only the master ground station has the ability to receive all telemetry and send commands to the spacecraft; civilian ham users do not have access to this information. The telemetry data is decommutated and analyzed before it is displayed to the user, so that the raw data will not have to be interpreted by ground users. The analysis will use CLIPS imbedded in the code, and derive its inputs from telemetry decommutation. The program is an expert system using a forward chaining set of rules based on the expected operation and parameters of the satellite. By building the rules during the construction and design of the satellite, the telemetry can be well understood and interpreted after the satellite is launched and the designers may no longer be available to provide input to the problem.
A Multirelational Social Network Analysis of an Online Health Community for Smoking Cessation.
Zhao, Kang; Wang, Xi; Cha, Sarah; Cohn, Amy M; Papandonatos, George D; Amato, Michael S; Pearson, Jennifer L; Graham, Amanda L
2016-08-25
Online health communities (OHCs) provide a convenient and commonly used way for people to connect around shared health experiences, exchange information, and receive social support. Users often interact with peers via multiple communication methods, forming a multirelational social network. Use of OHCs is common among smokers, but to date, there have been no studies on users' online interactions via different means of online communications and how such interactions are related to smoking cessation. Such information can be retrieved in multirelational social networks and could be useful in the design and management of OHCs. To examine the social network structure of an OHC for smoking cessation using a multirelational approach, and to explore links between subnetwork position (ie, centrality) and smoking abstinence. We used NetworkX to construct 4 subnetworks based on users' interactions via blogs, group discussions, message boards, and private messages. We illustrated topological properties of each subnetwork, including its degree distribution, density, and connectedness, and compared similarities among these subnetworks by correlating node centrality and measuring edge overlap. We also investigated coevolution dynamics of this multirelational network by analyzing tie formation sequences across subnetworks. In a subset of users who participated in a randomized, smoking cessation treatment trial, we conducted user profiling based on users' centralities in the 4 subnetworks and identified user groups using clustering techniques. We further examined 30-day smoking abstinence at 3 months postenrollment in relation to users' centralities in the 4 subnetworks. The 4 subnetworks have different topological characteristics, with message board having the most nodes (36,536) and group discussion having the highest network density (4.35×10(-3)). Blog and message board subnetworks had the most similar structures with an in-degree correlation of .45, out-degree correlation of .55, and Jaccard coefficient of .23 for edge overlap. A new tie in the group discussion subnetwork had the lowest probability of triggering subsequent ties among the same two users in other subnetworks: 6.33% (54,142/855,893) for 2-tie sequences and 2.13% (18,207/855,893) for 3-tie sequences. Users' centralities varied across the 4 subnetworks. Among a subset of users enrolled in a randomized trial, those with higher centralities across subnetworks generally had higher abstinence rates, although high centrality in the group discussion subnetwork was not associated with higher abstinence rates. A multirelational approach revealed insights that could not be obtained by analyzing the aggregated network alone, such as the ineffectiveness of group discussions in triggering social ties of other types, the advantage of blogs, message boards, and private messages in leading to subsequent social ties of other types, and the weak connection between one's centrality in the group discussion subnetwork and smoking abstinence. These insights have implications for the design and management of online social networks for smoking cessation.
Hébert, Emily T; Vandewater, Elizabeth A; Businelle, Michael S; Harrell, Melissa B; Kelder, Steven H; Perry, Cheryl L
2017-10-01
Existing measures of tobacco marketing and messaging exposure are limited, relying on recall, recognition, or proxy measures. This study aimed to determine the feasibility and reliability of a mobile application for the measurement of tobacco and e-cigarette marketing and message exposure using ecological momentary assessment (EMA). Young adults from Austin, TX (n=181, ages 18-29) were instructed to use a mobile application to record all sightings of marketing or social media related to tobacco (including e-cigarettes) in real-time for 28days (Event EMAs). Tobacco product use and recall of message encounters were assessed daily using an app-initiated EMA (Daily EMAs). The mobile app was a feasible and acceptable method to measure exposure to tobacco messages. The majority of messages (45.0%) were seen on the Internet, and many were user-generated. Thirty-day recall of messages at baseline was poorly correlated with messages reported via Event EMA during the study period; however, the correlation between post-study 30-day recall and Event EMA was much stronger (r=0.603 for industry-sponsored messages, r=0.599 for user-generated messages). Correlations between Daily EMAs and 30-day recall of message exposure (baseline and post-study) were small (baseline: r=0.329-0.389) to large (post-study: r=0.656-0.766). These findings suggest that EMA is a feasible and reliable method for measuring tobacco message exposure, especially given the prevalence of messages encountered online and on social media. Recall measures are limited in their ability to accurately represent marketing exposure, but might be improved by a period of priming or clearer response categories. Copyright © 2017 Elsevier Ltd. All rights reserved.
Location Privacy Protection on Social Networks
NASA Astrophysics Data System (ADS)
Zhan, Justin; Fang, Xing
Location information is considered as private in many scenarios. Protecting location information on mobile ad-hoc networks has attracted much research in past years. However, location information protection on social networks has not been paid much attention. In this paper, we present a novel location privacy protection approach on the basis of user messages in social networks. Our approach grants flexibility to users by offering them multiple protecting options. To the best of our knowledge, this is the first attempt to protect social network users' location information via text messages. We propose five algorithms for location privacy protection on social networks.
Using the Ecological Model to understand influences on college student vaping.
Cheney, Marshall K; Gowin, Mary; Clawson, Ashley H
2018-02-16
Objective The Ecological Model was used to examine the social and environmental influences of the college environment on e-cigarette use (vaping) among college students. Undergraduate college student e-cigarette users (vapers) across three large college campuses in the southwest US from Jan 2015- Aug 2016. Thirty-three interviews were conducted. Transcribed interviews were coded then analyzed for themes. College student vapers report multiple levels of influence on their vaping beyond personal beliefs and peer influences, including parents, explicit campus and community messaging, community member requests, and respect for others. College student vapers also describe constant associations with smokers in allowable public places to vape. Parents, community members, campus policy, and the physical environment all influence where and when college students vape. Health communication messages to prevent college student vaping should incorporate alternative messages that are important to college students, such as respect for others and social image.
Mean-field message-passing equations in the Hopfield model and its generalizations
NASA Astrophysics Data System (ADS)
Mézard, Marc
2017-02-01
Motivated by recent progress in using restricted Boltzmann machines as preprocessing algorithms for deep neural network, we revisit the mean-field equations [belief-propagation and Thouless-Anderson Palmer (TAP) equations] in the best understood of such machines, namely the Hopfield model of neural networks, and we explicit how they can be used as iterative message-passing algorithms, providing a fast method to compute the local polarizations of neurons. In the "retrieval phase", where neurons polarize in the direction of one memorized pattern, we point out a major difference between the belief propagation and TAP equations: The set of belief propagation equations depends on the pattern which is retrieved, while one can use a unique set of TAP equations. This makes the latter method much better suited for applications in the learning process of restricted Boltzmann machines. In the case where the patterns memorized in the Hopfield model are not independent, but are correlated through a combinatorial structure, we show that the TAP equations have to be modified. This modification can be seen either as an alteration of the reaction term in TAP equations or, more interestingly, as the consequence of message passing on a graphical model with several hidden layers, where the number of hidden layers depends on the depth of the correlations in the memorized patterns. This layered structure is actually necessary when one deals with more general restricted Boltzmann machines.
Evaluation of an interactive electronic health education tool in rural Afghanistan.
Kim, Glen; Griffin, Suzanne; Nadem, Hedeyat; Aria, Jawad; Lawry, Lynn
2008-01-01
Low education levels may limit community-based health worker (CHW) efforts in rural Afghanistan. In 2004, LeapFrog Enterprises and the United States Department of Health and Human Services developed the Afghan Family Health Book (AFHB), an interactive, electronic picture book, to communicate public health messages in rural Afghanistan. Changes in health knowledge among households exposed to the AFHB vs. CHWs were compared. From January-June 2005, baseline and follow-up panel surveys were administered in Pashto-speaking Laghman and Dari-speaking Kabul provinces. Within each province, an AFHB and a CHW district were randomly sampled using a stratified, 2-staged cluster sample design (total 98 clusters and 3,372 households). Surveys tested knowledge of 17 health domains at baseline and on follow-up at three months. For each domain, multivariate logistic regression was used to assess the effect of the AFHB on followup pass rates, controlling for demographics and differences in baseline knowledge. Both AFHB and CHW resulted in statistically significant changes in pass rates on follow-up, although there were greater gains among AFHB users for five domains among Pashto-speakers (micronutrients, malaria, sexually transmitted diseases, postpartum care, and breast-feeding) and seven domains among Dari-speakers (diet, malaria, mental health, birth-spacing, and prenatal/neonatal/postpartum care). Community-based health workers effected greater knowledge gains only for the Dari breast-feeding module. Participants favored CHW over the AFHB, which they found poorly translated and difficult to use. The AFHB has potential to improve public health knowledge among rural Afghans. Future efforts may benefit from involvement of local health agencies and the integration of interactive technology with traditional CHW approaches.
2013-08-03
Earth observation taken during day pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message: Perhaps a dandelion losing its seeds in the wind? Love clouds!
Paralysis is the loss of muscle function in part of your body. It happens when something goes ... way messages pass between your brain and muscles. Paralysis can be complete or partial. It can occur ...
Benchmarking hypercube hardware and software
NASA Technical Reports Server (NTRS)
Grunwald, Dirk C.; Reed, Daniel A.
1986-01-01
It was long a truism in computer systems design that balanced systems achieve the best performance. Message passing parallel processors are no different. To quantify the balance of a hypercube design, an experimental methodology was developed and the associated suite of benchmarks was applied to several existing hypercubes. The benchmark suite includes tests of both processor speed in the absence of internode communication and message transmission speed as a function of communication patterns.
Data transfer using complete bipartite graph
NASA Astrophysics Data System (ADS)
Chandrasekaran, V. M.; Praba, B.; Manimaran, A.; Kailash, G.
2017-11-01
Information exchange extent is an estimation of the amount of information sent between two focuses on a framework in a given time period. It is an extremely significant perception in present world. There are many ways of message passing in the present situations. Some of them are through encryption, decryption, by using complete bipartite graph. In this paper, we recommend a method for communication using messages through encryption of a complete bipartite graph.
PELE web server: atomistic study of biomolecular systems at your fingertips.
Madadkar-Sobhani, Armin; Guallar, Victor
2013-07-01
PELE, Protein Energy Landscape Exploration, our novel technology based on protein structure prediction algorithms and a Monte Carlo sampling, is capable of modelling the all-atom protein-ligand dynamical interactions in an efficient and fast manner, with two orders of magnitude reduced computational cost when compared with traditional molecular dynamics techniques. PELE's heuristic approach generates trial moves based on protein and ligand perturbations followed by side chain sampling and global/local minimization. The collection of accepted steps forms a stochastic trajectory. Furthermore, several processors may be run in parallel towards a collective goal or defining several independent trajectories; the whole procedure has been parallelized using the Message Passing Interface. Here, we introduce the PELE web server, designed to make the whole process of running simulations easier and more practical by minimizing input file demand, providing user-friendly interface and producing abstract outputs (e.g. interactive graphs and tables). The web server has been implemented in C++ using Wt (http://www.webtoolkit.eu) and MySQL (http://www.mysql.com). The PELE web server, accessible at http://pele.bsc.es, is free and open to all users with no login requirement.
Design and evaluation of Nemesis, a scalable, low-latency, message-passing communication subsystem.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buntinas, D.; Mercier, G.; Gropp, W.
2005-12-02
This paper presents a new low-level communication subsystem called Nemesis. Nemesis has been designed and implemented to be scalable and efficient both in the intranode communication context using shared-memory and in the internode communication case using high-performance networks and is natively multimethod-enabled. Nemesis has been integrated in MPICH2 as a CH3 channel and delivers better performance than other dedicated communication channels in MPICH2. Furthermore, the resulting MPICH2 architecture outperforms other MPI implementations in point-to-point benchmarks.
High-energy physics software parallelization using database techniques
NASA Astrophysics Data System (ADS)
Argante, E.; van der Stok, P. D. V.; Willers, I.
1997-02-01
A programming model for software parallelization, called CoCa, is introduced that copes with problems caused by typical features of high-energy physics software. By basing CoCa on the database transaction paradimg, the complexity induced by the parallelization is for a large part transparent to the programmer, resulting in a higher level of abstraction than the native message passing software. CoCa is implemented on a Meiko CS-2 and on a SUN SPARCcenter 2000 parallel computer. On the CS-2, the performance is comparable with the performance of native PVM and MPI.
CERESVis: A QC Tool for CERES that Leverages Browser Technology for Data Validation
NASA Astrophysics Data System (ADS)
Chu, C.; Sun-Mack, S.; Heckert, E.; Chen, Y.; Doelling, D.
2015-12-01
In this poster, we are going to present three user interfaces that CERES team uses to validate pixel-level data. Besides our home grown tools, we will aslo present the browser technology that we use to provide interactive interfaces, such as jquery, HighCharts and Google Earth. We pass data to the users' browsers and use the browsers to do some simple computations. The three user interfaces are: Thumbnails -- it displays hundrends images to allow users to browse 24-hour data files in few seconds. Multiple-synchronized cursors -- it allows users to compare multiple images side by side. Bounding Boxes and Histograms -- it allows users to draw multiple bounding boxes on an image and the browser computes/display the histograms.
Instant Messaging for Creating Interactive and Collaborative m-Learning Environments
ERIC Educational Resources Information Center
Kadirire, James
2007-01-01
"Instant Messaging" (IM) and "Presence," which is essentially the ability of being able to detect if other users are logged in on the network and send them messages in real time, has become one of the most popular applications of the Internet, causing people to want to stay connected to the Internet for inordinate amounts of…
The Critical Periphery in the Growth of Social Protests.
Barberá, Pablo; Wang, Ning; Bonneau, Richard; Jost, John T; Nagler, Jonathan; Tucker, Joshua; González-Bailón, Sandra
2015-01-01
Social media have provided instrumental means of communication in many recent political protests. The efficiency of online networks in disseminating timely information has been praised by many commentators; at the same time, users are often derided as "slacktivists" because of the shallow commitment involved in clicking a forwarding button. Here we consider the role of these peripheral online participants, the immense majority of users who surround the small epicenter of protests, representing layers of diminishing online activity around the committed minority. We analyze three datasets tracking protest communication in different languages and political contexts through the social media platform Twitter and employ a network decomposition technique to examine their hierarchical structure. We provide consistent evidence that peripheral participants are critical in increasing the reach of protest messages and generating online content at levels that are comparable to core participants. Although committed minorities may constitute the heart of protest movements, our results suggest that their success in maximizing the number of online citizens exposed to protest messages depends, at least in part, on activating the critical periphery. Peripheral users are less active on a per capita basis, but their power lies in their numbers: their aggregate contribution to the spread of protest messages is comparable in magnitude to that of core participants. An analysis of two other datasets unrelated to mass protests strengthens our interpretation that core-periphery dynamics are characteristically important in the context of collective action events. Theoretical models of diffusion in social networks would benefit from increased attention to the role of peripheral nodes in the propagation of information and behavior.
Statistical physics of hard combinatorial optimization: Vertex cover problem
NASA Astrophysics Data System (ADS)
Zhao, Jin-Hua; Zhou, Hai-Jun
2014-07-01
Typical-case computation complexity is a research topic at the boundary of computer science, applied mathematics, and statistical physics. In the last twenty years, the replica-symmetry-breaking mean field theory of spin glasses and the associated message-passing algorithms have greatly deepened our understanding of typical-case computation complexity. In this paper, we use the vertex cover problem, a basic nondeterministic-polynomial (NP)-complete combinatorial optimization problem of wide application, as an example to introduce the statistical physical methods and algorithms. We do not go into the technical details but emphasize mainly the intuitive physical meanings of the message-passing equations. A nonfamiliar reader shall be able to understand to a large extent the physics behind the mean field approaches and to adjust the mean field methods in solving other optimization problems.
Moghadasi, Mohammad; Kozakov, Dima; Mamonov, Artem B.; Vakili, Pirooz; Vajda, Sandor; Paschalidis, Ioannis Ch.
2013-01-01
We introduce a message-passing algorithm to solve the Side Chain Positioning (SCP) problem. SCP is a crucial component of protein docking refinement, which is a key step of an important class of problems in computational structural biology called protein docking. We model SCP as a combinatorial optimization problem and formulate it as a Maximum Weighted Independent Set (MWIS) problem. We then employ a modified and convergent belief-propagation algorithm to solve a relaxation of MWIS and develop randomized estimation heuristics that use the relaxed solution to obtain an effective MWIS feasible solution. Using a benchmark set of protein complexes we demonstrate that our approach leads to more accurate docking predictions compared to a baseline algorithm that does not solve the SCP. PMID:23515575
Multi-partitioning for ADI-schemes on message passing architectures
NASA Technical Reports Server (NTRS)
Vanderwijngaart, Rob F.
1994-01-01
A kind of discrete-operator splitting called Alternating Direction Implicit (ADI) has been found to be useful in simulating fluid flow problems. In particular, it is being used to study the effects of hot exhaust jets from high performance aircraft on landing surfaces. Decomposition techniques that minimize load imbalance and message-passing frequency are described. Three strategies that are investigated for implementing the NAS Scalar Penta-diagonal Parallel Benchmark (SP) are transposition, pipelined Gaussian elimination, and multipartitioning. The multipartitioning strategy, which was used on Ethernet, was found to be the most efficient, although it was considered only a moderate success because of Ethernet's limited communication properties. The efficiency derived largely from the coarse granularity of the strategy, which reduced latencies and allowed overlap of communication and computation.
Parallel and fault-tolerant algorithms for hypercube multiprocessors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aykanat, C.
1988-01-01
Several techniques for increasing the performance of parallel algorithms on distributed-memory message-passing multi-processor systems are investigated. These techniques are effectively implemented for the parallelization of the Scaled Conjugate Gradient (SCG) algorithm on a hypercube connected message-passing multi-processor. Significant performance improvement is achieved by using these techniques. The SCG algorithm is used for the solution phase of an FE modeling system. Almost linear speed-up is achieved, and it is shown that hypercube topology is scalable for an FE class of problem. The SCG algorithm is also shown to be suitable for vectorization, and near supercomputer performance is achieved on a vectormore » hypercube multiprocessor by exploiting both parallelization and vectorization. Fault-tolerance issues for the parallel SCG algorithm and for the hypercube topology are also addressed.« less
Ultrascalable petaflop parallel supercomputer
Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Chiu, George [Cross River, NY; Cipolla, Thomas M [Katonah, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Hall, Shawn [Pleasantville, NY; Haring, Rudolf A [Cortlandt Manor, NY; Heidelberger, Philip [Cortlandt Manor, NY; Kopcsay, Gerard V [Yorktown Heights, NY; Ohmacht, Martin [Yorktown Heights, NY; Salapura, Valentina [Chappaqua, NY; Sugavanam, Krishnan [Mahopac, NY; Takken, Todd [Brewster, NY
2010-07-20
A massively parallel supercomputer of petaOPS-scale includes node architectures based upon System-On-a-Chip technology, where each processing node comprises a single Application Specific Integrated Circuit (ASIC) having up to four processing elements. The ASIC nodes are interconnected by multiple independent networks that optimally maximize the throughput of packet communications between nodes with minimal latency. The multiple networks may include three high-speed networks for parallel algorithm message passing including a Torus, collective network, and a Global Asynchronous network that provides global barrier and notification functions. These multiple independent networks may be collaboratively or independently utilized according to the needs or phases of an algorithm for optimizing algorithm processing performance. The use of a DMA engine is provided to facilitate message passing among the nodes without the expenditure of processing resources at the node.
Simplifying HL7 Version 3 messages.
Worden, Robert; Scott, Philip
2011-01-01
HL7 Version 3 offers a semantically robust method for healthcare interoperability but has been criticized as overly complex to implement. This paper reviews initiatives to simplify HL7 Version 3 messaging and presents a novel approach based on semantic mapping. Based on user-defined definitions, precise transforms between simple and full messages are automatically generated. Systems can be interfaced with the simple messages and achieve interoperability with full Version 3 messages through the transforms. This reduces the costs of HL7 interfacing and will encourage better uptake of HL7 Version 3 and CDA.
A Multi-Level Parallelization Concept for High-Fidelity Multi-Block Solvers
NASA Technical Reports Server (NTRS)
Hatay, Ferhat F.; Jespersen, Dennis C.; Guruswamy, Guru P.; Rizk, Yehia M.; Byun, Chansup; Gee, Ken; VanDalsem, William R. (Technical Monitor)
1997-01-01
The integration of high-fidelity Computational Fluid Dynamics (CFD) analysis tools with the industrial design process benefits greatly from the robust implementations that are transportable across a wide range of computer architectures. In the present work, a hybrid domain-decomposition and parallelization concept was developed and implemented into the widely-used NASA multi-block Computational Fluid Dynamics (CFD) packages implemented in ENSAERO and OVERFLOW. The new parallel solver concept, PENS (Parallel Euler Navier-Stokes Solver), employs both fine and coarse granularity in data partitioning as well as data coalescing to obtain the desired load-balance characteristics on the available computer platforms. This multi-level parallelism implementation itself introduces no changes to the numerical results, hence the original fidelity of the packages are identically preserved. The present implementation uses the Message Passing Interface (MPI) library for interprocessor message passing and memory accessing. By choosing an appropriate combination of the available partitioning and coalescing capabilities only during the execution stage, the PENS solver becomes adaptable to different computer architectures from shared-memory to distributed-memory platforms with varying degrees of parallelism. The PENS implementation on the IBM SP2 distributed memory environment at the NASA Ames Research Center obtains 85 percent scalable parallel performance using fine-grain partitioning of single-block CFD domains using up to 128 wide computational nodes. Multi-block CFD simulations of complete aircraft simulations achieve 75 percent perfect load-balanced executions using data coalescing and the two levels of parallelism. SGI PowerChallenge, SGI Origin 2000, and a cluster of workstations are the other platforms where the robustness of the implementation is tested. The performance behavior on the other computer platforms with a variety of realistic problems will be included as this on-going study progresses.
Mutti-Packer, Seema; Reid, Jessica L; Thrasher, James F; Romer, Daniel; Fong, Geoffrey T; Gupta, Prakash C; Pednekar, Mangesh S; Nargis, Nigar; Hammond, David
2017-10-01
There is strong evidence showing that pictorial health warnings are more effective than text-only warnings. However, much of this evidence comes from high-income countries and is limited to cigarette packaging. Moreover, few studies have identified mechanisms that might explain the impact of warnings. The current study examined the potential mediating role of negative affect and the moderating influence of message credibility in perceived effectiveness of smokeless tobacco warnings in two low- and middle-income countries (LMICs). Field interviews were conducted in India and Bangladesh, with adult (19+ years) smokeless tobacco users (n=1053), and youth (16-18years) users (n=304) and non-users (n=687). Respondents were randomly assigned to view warnings in one of four conditions: (1) Text-only, (2) pictorial with symbolic imagery, (3) pictorial with graphic images of health effects, or (4) pictorial with personalized graphic images plus a personal testimonial. The findings provide support for the mediating influence of negative affect in perceived effectiveness, for adult and youth smokeless tobacco users who viewed pictorial warnings (vs. text-only), and graphic health warnings (vs. personal testimonials). Among adults, message credibility moderated the indirect effect; the association was stronger when credibility was high and weaker when it was low. Among youth users and non-users, message credibility did not moderate the indirect effect. Consistent with research from high-income countries, these findings highlight the importance of selecting imagery that will elicit negative emotional reactions and be perceived as credible. Differential effects among adults and youth highlight the importance of pre-testing images. Copyright © 2017 Elsevier Ltd. All rights reserved.
Chernick, Lauren Stephanie; Schnall, Rebecca; Stockwell, Melissa S; Castaño, Paula M; Higgins, Tracy; Westhoff, Carolyn; Santelli, John; Dayan, Peter S
2016-09-29
Over 15 million adolescents use the emergency department (ED) each year in the United States. Adolescent females who use the ED for medical care have been found to be at high risk for unintended pregnancy. Given that adolescents represent the largest users of text messaging and are receptive to receiving text messages related to their sexual health, the ED visit represents an opportunity for intervention. The aim of this qualitative study was to explore interest in and preferences for the content, frequency, and timing of an ED-based text message intervention to prevent pregnancy for adolescent females. We conducted semistructured, open-ended interviews in one urban ED in the United States with adolescent females aged 14-19 years. Eligible subjects were adolescents who were sexually active in the past 3 months, presented to the ED for a reproductive health complaint, owned a mobile phone, and did not use effective contraception. Using an interview guide, enrollment continued until saturation of key themes. The investigators designed sample text messages using the Health Beliefs Model and participants viewed these on a mobile phone. The team recorded, transcribed, and coded interviews based on thematic analysis using the qualitative analysis software NVivo and Excel. Participants (n=14) were predominantly Hispanic (13/14; 93%), insured (13/14; 93%), ED users in the past year (12/14; 86%), and frequent text users (10/14; 71% had sent or received >30 texts per day). All were interested in receiving text messages from the ED about pregnancy prevention, favoring messages that were "brief," "professional," and "nonaccusatory." Respondents favored texts with links to websites, repeated information regarding places to receive "confidential" care, and focused information on contraception options and misconceptions. Preferences for text message frequency varied from daily to monthly, with random hours of delivery to maintain "surprise." No participant feared that text messages would violate her privacy. Adolescent female patients at high pregnancy risk are interested in ED-based pregnancy prevention provided by texting. Understanding preferences for the content, frequency, and timing of messages can guide in designing future interventions in the ED.
van Stolk-Cooke, Katherine; Morgenstern, Jon; Kuerbis, Alexis N; Markle, Kendra
2014-01-01
Background Mobile messaging interventions have been shown to improve outcomes across a number of mental health and health-related conditions, but there are still significant gaps in our knowledge of how to construct and deliver the most effective brief messaging interventions. Little is known about the ways in which subtle linguistic variations in message content can affect user receptivity and preferences. Objective The aim of this study was to determine whether any global messaging preferences existed for different types of language content, and how certain characteristics moderate those preferences, in an effort to inform the development of mobile messaging interventions. Methods This study examined user preferences for messages within 22 content groupings. Groupings were presented online in dyads of short messages that were identical in their subject matter, but structurally or linguistically varied. Participants were 277 individuals residing in the United States who were recruited and compensated through Amazon’s Mechanical Turk (MTurk) system. Participants were instructed to select the message in each dyad that they would prefer to receive to help them achieve a personal goal of their choosing. Results Results indicate global preferences of more than 75% of subjects for certain types of messages, such as those that were grammatically correct, free of textese, benefit-oriented, polite, nonaggressive, and directive as opposed to passive, among others. For several classes of messages, few or no clear global preferences were found. There were few personality- and trait-based moderators of message preferences, but subtle manipulations of message structure, such as changing “Try to…” to “You might want to try to…” affected message choice. Conclusions The results indicate that individuals are sensitive to variations in the linguistic content of text messages designed to help them achieve a personal goal and, in some cases, have clear preferences for one type of message over another. Global preferences were indicated for messages that contained accurate spelling and grammar, as well as messages that emphasize the positive over the negative. Research implications and a guide for developing short messages for goal-directed behaviors are presented in this paper. PMID:24500775
NASA Astrophysics Data System (ADS)
Rico, H.; Hauksson, E.; Thomas, E.; Friberg, P.; Given, D.
2002-12-01
The California Integrated Seismic Network (CISN) Display is part of a Web-enabled earthquake notification system alerting users in near real-time of seismicity, and also valuable geophysical information following a large earthquake. It will replace the Caltech/USGS Broadcast of Earthquakes (CUBE) and Rapid Earthquake Data Integration (REDI) Display as the principal means of delivering graphical earthquake information to users at emergency operations centers, and other organizations. Features distinguishing the CISN Display from other GUI tools are a state-full client/server relationship, a scalable message format supporting automated hyperlink creation, and a configurable platform-independent client with a GIS mapping tool; supporting the decision-making activities of critical users. The CISN Display is the front-end of a client/server architecture known as the QuakeWatch system. It is comprised of the CISN Display (and other potential clients), message queues, server, server "feeder" modules, and messaging middleware, schema and generators. It is written in Java, making it platform-independent, and offering the latest in Internet technologies. QuakeWatch's object-oriented design allows components to be easily upgraded through a well-defined set of application programming interfaces (APIs). Central to the CISN Display's role as a gateway to other earthquake products is its comprehensive XML-schema. The message model starts with the CUBE message format, but extends it by provisioning additional attributes for currently available products, and those yet to be considered. The supporting metadata in the XML-message provides the data necessary for the client to create a hyperlink and associate it with a unique event ID. Earthquake products deliverable to the CISN Display are ShakeMap, Ground Displacement, Focal Mechanisms, Rapid Notifications, OES Reports, and Earthquake Commentaries. Leveraging the power of the XML-format, the CISN Display provides prompt access to earthquake information on the Web. The links are automatically created when product generators deliver CUBE formatted packets to a Quake Data Distribution System (QDDS) hub (new distribution methods may be used later). The "feeder" modules tap into the QDDS hub and convert the packets into XML-messages. These messages are forwarded to message queues, and then distributed to clients where URLs are dynamically created for these products and linked to events on the CISN Display map. The products may be downloaded out-of-band; and with the inclusion of a GIS mapping tool users can plot organizational assets on the CISN Display map and overlay them against key spectral data, such as ground accelerations. This gives Emergency Response Managers information useful in allocating limited personnel and resources after a major event. At the heart of the system's robustness is a well-established and reliable set of communication protocols for best-effort delivery of data. For critical users a Common Object Request Broker Architecture (CORBA) state-full connection is used via a dedicated signaling channel. The system employs several CORBA methods that alert users of changes in the link status. Loss of connectivity triggers a strategy that attempts to reconnect through various physical and logical paths. Thus, by building on past application successes and proven Internet advances the CISN Display targets a specific audience by providing enhancements previously not available from other applications.
The effect of verbal interpretive message on day user impacts at Mount Rainer National Park
Anne Kernan; Ellen Drogin
1995-01-01
The behaviors of 434 hikers visiting the heavily used Bench Lake/Snow Lake Trail at Mount Rainier National Park were observed to assess the effect of a verbal interpretive message on compliance with minimum impact hiking recommendations. Significant relationships were found between compliance and message exposure, and a variety of situational and demographic variables...
2016-01-22
basic mechanism of link-based routing schemes is the broadcasting of a control message (called a “ hello ”) to all of its neighbors. If a response is...to a destination by using the set of ex- changed hello messages between users of the network. With suciently high frequency, hello messages are suc
NASA Technical Reports Server (NTRS)
Goldgof, Gregory M.
2005-01-01
Distributed systems allow scientists from around the world to plan missions concurrently, while being updated on the revisions of their colleagues in real time. However, permitting multiple clients to simultaneously modify a single data repository can quickly lead to data corruption or inconsistent states between users. Since our message broker, the Java Message Service, does not ensure that messages will be received in the order they were published, we must implement our own numbering scheme to guarantee that changes to mission plans are performed in the correct sequence. Furthermore, distributed architectures must ensure that as new users connect to the system, they synchronize with the database without missing any messages or falling into an inconsistent state. Robust systems must also guarantee that all clients will remain synchronized with the database even in the case of multiple client failure, which can occur at any time due to lost network connections or a user's own system instability. The final design for the distributed system behind the Mars rover mission planning software fulfills all of these requirements and upon completion will be deployed to MER at the end of 2005 as well as Phoenix (2007) and MSL (2009).
A satellite-based personal communication system for the 21st century
NASA Technical Reports Server (NTRS)
Sue, Miles K.; Dessouky, Khaled; Levitt, Barry; Rafferty, William
1990-01-01
Interest in personal communications (PCOMM) has been stimulated by recent developments in satellite and terrestrial mobile communications. A personal access satellite system (PASS) concept was developed at the Jet Propulsion Laboratory (JPL) which has many attractive user features, including service diversity and a handheld terminal. Significant technical challenges addressed in formulating the PASS space and ground segments are discussed. PASS system concept and basic design features, high risk enabling technologies, an optimized multiple access scheme, alternative antenna coverage concepts, the use of non-geostationary orbits, user terminal radiation constraints, and user terminal frequency reference are covered.
Visual and somatic sensory feedback of brain activity for intuitive surgical robot manipulation.
Miura, Satoshi; Matsumoto, Yuya; Kobayashi, Yo; Kawamura, Kazuya; Nakashima, Yasutaka; Fujie, Masakatsu G
2015-01-01
This paper presents a method to evaluate the hand-eye coordination of the master-slave surgical robot by measuring the activation of the intraparietal sulcus in users brain activity during controlling virtual manipulation. The objective is to examine the changes in activity of the intraparietal sulcus when the user's visual or somatic feedback is passed through or intercepted. The hypothesis is that the intraparietal sulcus activates significantly when both the visual and somatic sense pass feedback, but deactivates when either visual or somatic is intercepted. The brain activity of three subjects was measured by the functional near-infrared spectroscopic-topography brain imaging while they used a hand controller to move a virtual arm of a surgical simulator. The experiment was performed several times with three conditions: (i) the user controlled the virtual arm naturally under both visual and somatic feedback passed, (ii) the user moved with closed eyes under only somatic feedback passed, (iii) the user only gazed at the screen under only visual feedback passed. Brain activity showed significantly better control of the virtual arm naturally (p<;0.05) when compared with moving with closed eyes or only gazing among all participants. In conclusion, the brain can activate according to visual and somatic sensory feedback agreement.
Passing Messages between Biological Networks to Refine Predicted Interactions
Glass, Kimberly; Huttenhower, Curtis; Quackenbush, John; Yuan, Guo-Cheng
2013-01-01
Regulatory network reconstruction is a fundamental problem in computational biology. There are significant limitations to such reconstruction using individual datasets, and increasingly people attempt to construct networks using multiple, independent datasets obtained from complementary sources, but methods for this integration are lacking. We developed PANDA (Passing Attributes between Networks for Data Assimilation), a message-passing model using multiple sources of information to predict regulatory relationships, and used it to integrate protein-protein interaction, gene expression, and sequence motif data to reconstruct genome-wide, condition-specific regulatory networks in yeast as a model. The resulting networks were not only more accurate than those produced using individual data sets and other existing methods, but they also captured information regarding specific biological mechanisms and pathways that were missed using other methodologies. PANDA is scalable to higher eukaryotes, applicable to specific tissue or cell type data and conceptually generalizable to include a variety of regulatory, interaction, expression, and other genome-scale data. An implementation of the PANDA algorithm is available at www.sourceforge.net/projects/panda-net. PMID:23741402
Challenge: How Effective is Routing for Wireless Networking
2017-03-03
sage (called a“ hello ”) to all of its neighbors. If a series of hello messages are exchanged between two users, a link is considered to exist between...these schemes. A brief description of ETX is as follows. For a given window of time, the number of hello packets that a user receives from a neighbor is...counted. A cost is then assigned to the link based on how many hello messages were heard; a link that has fewer hellos successfully transmitted across
Challenge: How Effective is Routing for Wireless Networking
2015-09-07
sage (called a“ hello ”) to all of its neighbors. If a series of hello messages are exchanged between two users, a link is considered to exist between...these schemes. A brief description of ETX is as follows. For a given window of time, the number of hello packets that a user receives from a neighbor is...counted. A cost is then assigned to the link based on how many hello messages were heard; a link that has fewer hellos successfully transmitted across
Applications of Probabilistic Combiners on Linear Feedback Shift Register Sequences
2016-12-01
on the resulting output strings show a drastic increase in complexity, while simultaneously passing the stringent randomness tests required by the...a three-variable function. Our tests on the resulting output strings show a drastic increase in complex- ity, while simultaneously passing the...10001101 01000010 11101001 Decryption of a message that has been encrypted using bitwise XOR is quite simple. Since each bit is its own additive inverse
The model of microblog message diffusion based on complex social network
NASA Astrophysics Data System (ADS)
Zhang, Wei; Bai, Shu-Ying; Jin, Rui
2014-05-01
Microblog is a micromessage communication network in which users are the nodes and the followship between users are the edges. Sina Weibo is a typical case of these microblog service websites. As the enormous scale of nodes and complex links in the network, we choose a sample network crawled in Sina Weibo as the base of empirical analysis. The study starts with the analysis of its topological features, and brings in epidemiological SEIR model to explore the mode of message spreading throughout the microblog network. It is found that the network is obvious small-world and scale-free, which made it succeed in transferring messages and failed in resisting negative influence. In addition, the paper focuses on the rich nodes as they constitute a typical feature of Sina Weibo. It is also found that whether the message starts with a rich node will not account for its final coverage. Actually, the rich nodes always play the role of pivotal intermediaries who speed up the spreading and make the message known by much more people.
The equipment access software for a distributed UNIX-based accelerator control system
NASA Astrophysics Data System (ADS)
Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé
1994-12-01
This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.
2013-07-26
Earth observation taken during day pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message: Never tire of finding shapes in the clouds! These look very botanical to me. Simply perfect.
Sen. Alexander, Lamar [R-TN
2011-07-28
Senate - 12/19/2012 Message on House action received in Senate and at desk: House amendments to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Alvioli, M.; Baum, R.L.
2016-01-01
We describe a parallel implementation of TRIGRS, the Transient Rainfall Infiltration and Grid-Based Regional Slope-Stability Model for the timing and distribution of rainfall-induced shallow landslides. We have parallelized the four time-demanding execution modes of TRIGRS, namely both the saturated and unsaturated model with finite and infinite soil depth options, within the Message Passing Interface framework. In addition to new features of the code, we outline details of the parallel implementation and show the performance gain with respect to the serial code. Results are obtained both on commercial hardware and on a high-performance multi-node machine, showing the different limits of applicability of the new code. We also discuss the implications for the application of the model on large-scale areas and as a tool for real-time landslide hazard monitoring.
NASA Astrophysics Data System (ADS)
Min, Byungjoon
2018-01-01
Identifying the most influential spreaders is one of outstanding problems in physics of complex systems. So far, many approaches have attempted to rank the influence of nodes but there is still the lack of accuracy to single out influential spreaders. Here, we directly tackle the problem of finding important spreaders by solving analytically the expected size of epidemic outbreaks when spreading originates from a single seed. We derive and validate a theory for calculating the size of epidemic outbreaks with a single seed using a message-passing approach. In addition, we find that the probability to occur epidemic outbreaks is highly dependent on the location of the seed but the size of epidemic outbreaks once it occurs is insensitive to the seed. We also show that our approach can be successfully adapted into weighted networks.
Generalized hypercube structures and hyperswitch communication network
NASA Technical Reports Server (NTRS)
Young, Steven D.
1992-01-01
This paper discusses an ongoing study that uses a recent development in communication control technology to implement hybrid hypercube structures. These architectures are similar to binary hypercubes, but they also provide added connectivity between the processors. This added connectivity increases communication reliability while decreasing the latency of interprocessor message passing. Because these factors directly determine the speed that can be obtained by multiprocessor systems, these architectures are attractive for applications such as remote exploration and experimentation, where high performance and ultrareliability are required. This paper describes and enumerates these architectures and discusses how they can be implemented with a modified version of the hyperswitch communication network (HCN). The HCN is analyzed because it has three attractive features that enable these architectures to be effective: speed, fault tolerance, and the ability to pass multiple messages simultaneously through the same hyperswitch controller.
Dynamics of backlight luminance for using smartphone in dark environment
NASA Astrophysics Data System (ADS)
Na, Nooree; Jang, Jiho; Suk, Hyeon-Jeong
2014-02-01
This study developed dynamic backlight luminance, which gradually changes as time passes for comfortable use of a smartphone display in a dark environment. The study was carried out in two stages. In the first stage, a user test was conducted to identify the optimal luminance by assessing the facial squint level, subjective glare evaluation, eye blink frequency and users' subjective preferences. Based on the results of the user test, the dynamics of backlight luminance was designed. It has two levels of luminance: the optimal level for initial viewing to avoid sudden glare or fatigue to users' eyes, and the optimal level for constant viewing, which is comfortable, but also bright enough for constant reading of the displayed material. The luminance for initial viewing starts from 10 cd/m2, and it gradually increases to 40 cd/m2 for users' visual comfort at constant viewing for 20 seconds; In the second stage, a validation test on dynamics of backlight luminance was conducted to verify the effectiveness of the developed dynamics. It involving users' subjective preferences, eye blink frequency, and brainwave analysis using the electroencephalogram (EEG) to confirm that the proposed dynamic backlighting enhances users' visual comfort and visual cognition, particularly for using smartphones in a dark environment.
Hébert, Emily T; Stevens, Elise M; Frank, Summer G; Kendzor, Darla E; Wetter, David W; Zvolensky, Michael J; Buckner, Julia D; Businelle, Michael S
2018-03-01
Smartphone apps can provide real-time, tailored interventions for smoking cessation. The current study examines the effectiveness of a smartphone-based smoking cessation application that assessed risk for imminent smoking lapse multiple times per day and provided messages tailored to current smoking lapse risk and specific lapse triggers. Participants (N=59) recruited from a safety-net hospital smoking cessation clinic completed phone-based ecological momentary assessments (EMAs) 5 times/day for 3 consecutive weeks (1week pre-quit, 2weeks post-quit). Risk for smoking lapse was estimated in real-time using a novel weighted lapse risk estimator. With each EMA, participants received messages tailored to current level of risk for imminent smoking lapse and self-reported presence of smoking urge, stress, cigarette availability, and motivation to quit. Generalized linear mixed model analyses determined whether messages tailored to specific lapse risk factors were associated with greater reductions in these triggers than messages not tailored to specific triggers. Overall, messages tailored to smoking urge, cigarette availability, or stress corresponded with greater reductions in those triggers than messages that were not tailored to specific triggers (p's=0.02 to <0.001). Although messages tailored to stress were associated with greater reductions in stress than messages not tailored to stress, the association was non-significant (p=0.892) when only moments of high stress were included in the analysis. Mobile technology can be used to conduct real-time smoking lapse risk assessment and provide tailored treatment content. Findings provide initial evidence that tailored content may impact users' urge to smoke, stress, and cigarette availability. Copyright © 2017 Elsevier Ltd. All rights reserved.
Harris, Lynne T.; Koepsell, Thomas D.; Haneuse, Sebastien J.; Martin, Diane P.; Ralston, James D.
2013-01-01
OBJECTIVE To study differences in glycemic control and HbA1c testing associated with use of secure electronic patient-provider messaging. We hypothesized that messaging use would be associated with better glycemic control and a higher rate of adherence to HbA1c testing recommendations. RESEARCH DESIGN AND METHODS Retrospective observational study of secure messaging at Group Health, a large nonprofit health care system. Our analysis included adults with diabetes who had registered for access to a shared electronic medical record (SMR) between 2003 and 2006. We fit log-linear regression models, using generalized estimating equations, to estimate the adjusted rate ratio of meeting three indicators of glycemic control (HbA1c <7%, HbA1c <8%, and HbA1c >9%) and HbA1c testing adherence by level of previous messaging use. Multiple imputation and inverse probability weights were used to account for missing data. RESULTS During the study period, 6,301 adults with diabetes registered for access to the SMR. Of these individuals, 74% used messaging at least once during that time. Frequent use of messaging during the previous calendar quarter was associated with a higher rate of good glycemic control (HbA1c <7%: rate ratio, 1.26 [95% CI, 1.15–1.37]) and a higher rate testing adherence (1.20 [1.15–1.25]). CONCLUSIONS Among SMR users, recent and frequent messaging use was associated with better glycemic control and a higher rate of HbA1c testing adherence. These results suggest that secure messaging may facilitate important processes of care and help some patients to achieve or maintain adequate glycemic control. PMID:23628618
Developing a Point-of-Sale Health Communication Campaign for Cigarillos and Waterpipe Tobacco.
Sutfin, Erin L; Cornacchione Ross, Jennifer; Lazard, Allison J; Orlan, Elizabeth; Suerken, Cynthia K; Wiseman, Kimberly D; Reboussin, Beth A; Wolfson, Mark; Noar, Seth M
2017-12-13
Adolescents and young adults smoke waterpipe tobacco (WT) and cigarillos, at least in part, based on erroneous beliefs that these products are safer than cigarettes. To address this challenge, we used a systematic, three-phase process to develop a health communication campaign to discourage WT and cigarillo smoking among at-risk (tobacco users and susceptible non-users) 16- to 25-year-olds. In Phase 1, we used a national phone survey (N = 896) to determine salient message beliefs. Participants reported constituents (i.e., harmful chemicals) emitted by the products were worrisome. In Phase 2, we developed and evaluated four message executions, with varying imagery, tone, and unappealing products with the same constituents, using focus groups (N = 38). Participants rated one execution highly, resulting in our development of a campaign where each message: (1) identified a tobacco product and constituent in the smoke; (2) included an image of an unappealing product containing the constituent (e.g., pesticides, gasoline) to grab attention; and (3) used a humorous sarcastic tone. In Phase 3, we tested the campaign messages (17 intervention and six control) with a nationally representative online survey (N = 1,636). Participants rated intervention and control messages highly with few differences between them. Exposure to messages resulted in significant increases in all risk beliefs from pre to post (p < 0.05). For WT, intervention messages increased beliefs about addiction more than control messages (p < 0.05). This systematic, iterative approach resulted in messages that show promise for discouraging WT and cigarillo use.
A Modern Operating System for Near-real-time Environmental Observatories
NASA Astrophysics Data System (ADS)
Orcutt, John; Vernon, Frank
2014-05-01
The NSF Ocean Observatory Initiative (OOI) provided an opportunity for expanding the capabilities for managing open, near-real-time (latencies of seconds) data from ocean observatories. The sensors deployed in this system largely return data from seafloor, cabled fiber optic cables as well as satellite telemetry. Bandwidth demands range from high-definition movies to the transmission of data via Iridium satellite. The extended Internet also provides an opportunity to not only return data, but to also control the sensors and platforms that comprise the observatory. The data themselves are openly available to any users. In order to provide heightened network security and overall reliability, the connections to and from the sensors/platforms are managed without Layer 3 of the Internet, but instead rely upon message passing using an open protocol termed Advanced Queuing Messaging Protocol (AMQP). The highest bandwidths in the system are in the Regional Scale Network (RSN) off Oregon and Washington and on the continent with highly reliable network connections between observatory components at 10 Gbps. The maintenance of metadata and life cycle histories of sensors and platforms is critical for providing data provenance over the years. The integrated cyberinfrastructure is best thought of as an operating system for the observatory - like the data, the software is also open and can be readily applied to new observatories, for example, in the rapidly evolving Arctic.
Factors influencing message dissemination through social media
NASA Astrophysics Data System (ADS)
Zheng, Zeyu; Yang, Huancheng; Fu, Yang; Fu, Dianzheng; Podobnik, Boris; Stanley, H. Eugene
2018-06-01
Online social networks strongly impact our daily lives. An internet user (a "Netizen") wants messages to be efficiently disseminated. The susceptible-infected-recovered (SIR) dissemination model is the traditional tool for exploring the spreading mechanism of information diffusion. We here test our SIR-based dissemination model on open and real-world data collected from Twitter. We locate and identify phase transitions in the message dissemination process. We find that message content is a stronger factor than the popularity of the sender. We also find that the probability that a message will be forwarded has a threshold that affects its ability to spread, and when the probability is above the threshold the message quickly achieves mass dissemination.
Haun, Jolie N; Patel, Nitin R; Lind, Jason D; Antinori, Nicole
2015-12-21
Secure email messaging is part of a national transformation initiative in the United States to promote new models of care that support enhanced patient-provider communication. To date, only a limited number of large-scale studies have evaluated users' experiences in using secure email messaging. To quantitatively assess veteran patients' experiences in using secure email messaging in a large patient sample. A cross-sectional mail-delivered paper-and-pencil survey study was conducted with a sample of respondents identified as registered for the Veteran Health Administrations' Web-based patient portal (My HealtheVet) and opted to use secure messaging. The survey collected demographic data, assessed computer and health literacy, and secure messaging use. Analyses conducted on survey data include frequencies and proportions, chi-square tests, and one-way analysis of variance. The majority of respondents (N=819) reported using secure messaging 6 months or longer (n=499, 60.9%). They reported secure messaging to be helpful for completing medication refills (n=546, 66.7%), managing appointments (n=343, 41.9%), looking up test results (n=350, 42.7%), and asking health-related questions (n=340, 41.5%). Notably, some respondents reported using secure messaging to address sensitive health topics (n=67, 8.2%). Survey responses indicated that younger age (P=.039) and higher levels of education (P=.025) and income (P=.003) were associated with more frequent use of secure messaging. Females were more likely to report using secure messaging more often, compared with their male counterparts (P=.098). Minorities were more likely to report using secure messaging more often, at least once a month, compared with nonminorities (P=.086). Individuals with higher levels of health literacy reported more frequent use of secure messaging (P=.007), greater satisfaction (P=.002), and indicated that secure messaging is a useful (P=.002) and easy-to-use (P≤.001) communication tool, compared with individuals with lower reported health literacy. Many respondents (n=328, 40.0%) reported that they would like to receive education and/or felt other veterans would benefit from education on how to access and use the electronic patient portal and secure messaging (n=652, 79.6%). Survey findings validated qualitative findings found in previous research, such that veterans perceive secure email messaging as a useful tool for communicating with health care teams. To maximize sustained utilization of secure email messaging, marketing, education, skill building, and system modifications are needed. These findings can inform ongoing efforts to promote the sustained use of this electronic tool to support for patient-provider communication.
Kernel User’s Manual Version 1.0
1989-02-01
especially on distributed systems. There are issues concerning functionality (amply documented in [ARTEWG 86b), customization , tool support (especially...a far lower level, including special device drivers, special message or signaling systems, and even a custom executive. There is far less general...functionality; the implementors of the language do not know how to satisfy the variety of needs of real-time applications; the vendors are unable to customize
Increasing the Automation and Autonomy for Spacecraft Operations with Criteria Action Table
NASA Technical Reports Server (NTRS)
Li, Zhen-Ping; Savki, Cetin
2005-01-01
The Criteria Action Table (CAT) is an automation tool developed for monitoring real time system messages for specific events and processes in order to take user defined actions based on a set of user-defined rules. CAT was developed by Lockheed Martin Space Operations as a part of a larger NASA effort at the Goddard Space Flight Center (GSFC) to create a component-based, middleware-based, and standard-based general purpose ground system architecture referred as GMSEC - the GSFC Mission Services Evolution Center. CAT has been integrated into the upgraded ground systems for Tropical Rainfall Measuring Mission (TRMM) and Small Explorer (SMEX) satellites and it plays the central role in their automation effort to reduce the cost and increase the reliability for spacecraft operations. The GMSEC architecture provides a standard communication interface and protocol for components to publish/describe messages to an information bus. It also provides a standard message definition so components can send and receive messages to the bus interface rather than each other, thus reducing the component-to-component coupling, interface, protocols, and link (socket) management. With the GMSEC architecture, components can publish standard event messages to the bus for all nominal, significant, and surprising events in regard to satellite, celestial, ground system, or any other activity. In addition to sending standard event messages, each GMSEC compliant component is required to accept and process GMSEC directive request messages.
NASA Technical Reports Server (NTRS)
Chamberlain, Robert G.; Duquette, William H.
2013-01-01
TRISA, the U.S. Army TRADOC G2 Intelligence Support Activity, received Athena 1 in 2009. They first used Athena 3 to support studies in 2011. This paper describes Athena 4, which they started using in October 2012. A final section discusses issues that are being considered for incorporation into Athena 5 and later. Athena's objective is to help skilled intelligence analysts anticipate the likely consequences of complex courses of action that use our country's entire power base, not just our military capabilities, for operations in troubled regions of the world. Measures of effectiveness emphasize who is in control and the effects of our actions on the attitudes and well-being of civilians. The planning horizon encompasses not weeks or months, but years. Athena is a scalable, laptop-based simulation with weekly resolution. Up to three months of simulated time can pass between game turns that require user interaction. Athena's geographic scope is nominally a country, but can be a region within a county. Geographic resolution is "neighborhoods", which are defined by the user and may be actual neighborhoods, provinces, or anything in between. Models encompass phenomena whose effects are expected to be relevant over a medium-term planning horizon-three months to three years. The scope and intrinsic complexity of the problem dictate a spiral development process. That is, the model is used during development and lessons learned are used to improve the model. Even more important is that while every version must consider the "big picture" at some level of detail, development priority is given to those issues that are most relevant to currently anticipated studies. For example, models of the delivery and effectiveness of information operations messaging were among the additions in Athena 4.
NASA Technical Reports Server (NTRS)
Chamberlain, Robert G.; Duquette, William H.
2013-01-01
TRISA, the U.S. Army TRADOC G2 Intelligence Support Activity, received Athena 1 in 2009. They first used Athena 3 to support studies in 2011. This paper describes Athena 4, which they started using in October 2012. A final section discusses issues that are being considered for incorporation into Athena 5 and later. Athena's objective is to help skilled intelligence analysts anticipate the likely consequences of complex courses of action that use our country's entire power base, not just our military capabilities, for operations in troubled regions of the world. Measures of effectiveness emphasize who is in control and the effects of our actions on the attitudes and well being of civilians. The planning horizon encompasses not weeks or months, but years.Athena is a scalable, laptop-based simulation with weekly resolution. Up to three months of simulated time can pass between game turns that require user interaction. Athena's geographic scope is nominally a country, but can be a region within a county. Geographic resolution is "neighborhoods", which are defined by the user and may be actual neighborhoods, provinces, or anything in between. Models encompass phenomena whose effects are expected to be relevant over a medium-term planning horizon--three months to three years.The scope and intrinsic complexity of the problem dictate a spiral development process. That is, the model is used during development and lessons learned are used to improve the model. Even more important is that while every version must consider the "big picture" at some level of detail, development priority is given to those issues that are most relevant to currently anticipated studies. For example, models of the delivery and effectiveness of information operations messaging were among the additions in Athena 4.
NASA Astrophysics Data System (ADS)
Green, Tim; Faulkner, Andrew; Rosen, Stuart; Macherey, Olivier
2005-07-01
Standard continuous interleaved sampling processing, and a modified processing strategy designed to enhance temporal cues to voice pitch, were compared on tests of intonation perception, and vowel perception, both in implant users and in acoustic simulations. In standard processing, 400 Hz low-pass envelopes modulated either pulse trains (implant users) or noise carriers (simulations). In the modified strategy, slow-rate envelope modulations, which convey dynamic spectral variation crucial for speech understanding, were extracted by low-pass filtering (32 Hz). In addition, during voiced speech, higher-rate temporal modulation in each channel was provided by 100% amplitude-modulation by a sawtooth-like wave form whose periodicity followed the fundamental frequency (F0) of the input. Channel levels were determined by the product of the lower- and higher-rate modulation components. Both in acoustic simulations and in implant users, the ability to use intonation information to identify sentences as question or statement was significantly better with modified processing. However, while there was no difference in vowel recognition in the acoustic simulation, implant users performed worse with modified processing both in vowel recognition and in formant frequency discrimination. It appears that, while enhancing pitch perception, modified processing harmed the transmission of spectral information.
Non-volatile memory for checkpoint storage
DOE Office of Scientific and Technical Information (OSTI.GOV)
Blumrich, Matthias A.; Chen, Dong; Cipolla, Thomas M.
A system, method and computer program product for supporting system initiated checkpoints in high performance parallel computing systems and storing of checkpoint data to a non-volatile memory storage device. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity. In one embodiment, themore » non-volatile memory is a pluggable flash memory card.« less
2013-08-03
Earth observation taken during day pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message: From southernmost point of orbit over the South Pacific- all clouds seemed to be leading to the South Pole.
2013-07-21
Earth observation taken during night pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message this is labeled as : Tehran, Iran. Lights along the coast of the Caspian Sea visible through clouds. July 21.
Whistleblower Protection Enhancement Act of 2010
Sen. Akaka, Daniel K. [D-HI
2009-02-03
Senate - 12/22/2010 Message on House action received in Senate and at desk: House amendments to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
2014-05-31
Earth Observation taken during a day pass by the Expedition 40 crew aboard the International Space Station (ISS). Folder lists this as: CEO - Arena de Sao Paolo. View used for Twitter message: Cloudy skies over São Paulo Brazil
Increasing seat belt use among part-time users : messages and strategies
DOT National Transportation Integrated Search
1998-02-01
Data indicate discrepancies between many persons' perceptions of themselves as seat belt users, and their actual behavior. The data also suggest that instead of targeting non-users, a greater increase in the national rate of seat belt use may be achi...
Schnall, Rebecca; Stockwell, Melissa S; Castaño, Paula M; Higgins, Tracy; Westhoff, Carolyn; Santelli, John; Dayan, Peter S
2016-01-01
Background Over 15 million adolescents use the emergency department (ED) each year in the United States. Adolescent females who use the ED for medical care have been found to be at high risk for unintended pregnancy. Given that adolescents represent the largest users of text messaging and are receptive to receiving text messages related to their sexual health, the ED visit represents an opportunity for intervention. Objective The aim of this qualitative study was to explore interest in and preferences for the content, frequency, and timing of an ED-based text message intervention to prevent pregnancy for adolescent females. Methods We conducted semistructured, open-ended interviews in one urban ED in the United States with adolescent females aged 14-19 years. Eligible subjects were adolescents who were sexually active in the past 3 months, presented to the ED for a reproductive health complaint, owned a mobile phone, and did not use effective contraception. Using an interview guide, enrollment continued until saturation of key themes. The investigators designed sample text messages using the Health Beliefs Model and participants viewed these on a mobile phone. The team recorded, transcribed, and coded interviews based on thematic analysis using the qualitative analysis software NVivo and Excel. Results Participants (n=14) were predominantly Hispanic (13/14; 93%), insured (13/14; 93%), ED users in the past year (12/14; 86%), and frequent text users (10/14; 71% had sent or received >30 texts per day). All were interested in receiving text messages from the ED about pregnancy prevention, favoring messages that were “brief,” “professional,” and “nonaccusatory.” Respondents favored texts with links to websites, repeated information regarding places to receive “confidential” care, and focused information on contraception options and misconceptions. Preferences for text message frequency varied from daily to monthly, with random hours of delivery to maintain “surprise.” No participant feared that text messages would violate her privacy. Conclusions Adolescent female patients at high pregnancy risk are interested in ED-based pregnancy prevention provided by texting. Understanding preferences for the content, frequency, and timing of messages can guide in designing future interventions in the ED. PMID:27687855
GPSS and Modeling of Computer Communication Networks.
1982-04-01
chains are used to alter the normal "flows" of transactions in a user defined manner. Transaction "flow" may be controlled on the basis of group ...authors refer to loops and rings interchangeably, including those who have designed loop networks with distributed control mechanisms [8,9,10,11,121...that detailed simulation of character by character transmission does not take place; rather, [ control message--data message-- control message! groupings
Lisiecka, Karolina; Rychwalska, Agnieszka; Samson, Katarzyna; Łucznik, Klara; Ziembowicz, Michał; Szóstek, Agnieszka; Nowak, Andrzej
2016-01-01
Rapid development of information and communications technologies (ICT) has triggered profound changes in how people manage their social contacts in both informal and professional contexts. ICT mediated communication may seem limited in possibilities compared to face-to-face encounters, but research shows that puzzlingly often it can be just as effective and satisfactory. We posit that ICT users employ specific communication strategies adapted to particular communication channels, which results in a comparable effectiveness of communication. In order to maintain a satisfactory level of conversational intelligibility they calibrate the content of their messages to a given medium's richness and adjust the whole conversation trajectory so that every stage of the communication process runs fluently. In the current study, we compared complex task solving trajectories in chat, mobile phone and face-to-face dyadic conversations. Media conditions did not influence the quality of decision outcomes or users' perceptions of the interaction, but they had impact on the amount of time devoted to each of the identified phases of decision development. In face-to-face contacts the evaluation stage of the discussion dominated the conversation; in the texting condition the orientation-evaluation-control phases were evenly distributed; and the phone condition provided a midpoint between these two extremes. The results show that contemporary ICT users adjust their communication behavior to the limitations and opportunities of various media through the regulation of attention directed to each stage of the discussion so that as a whole the communication process remains effective.
2015-11-11
reliable data message delivery. The basic mechanism of link-based routing schemes is the broadcasting of a control message (called a “ hello ”) to all of its...short- est path route to a destination by using the set of ex- changed hello messages between users of the network. With sufficiently high frequency... hello messages are suc- cessfully exchanged across a high error link, and since this link is of longer distance, it gets used to build a shortest path
2015-09-07
reliable data message delivery. The basic mechanism of link-based routing schemes is the broadcasting of a control message (called a “ hello ”) to all of its...short- est path route to a destination by using the set of ex- changed hello messages between users of the network. With sufficiently high frequency... hello messages are suc- cessfully exchanged across a high error link, and since this link is of longer distance, it gets used to build a shortest path
1979-12-01
Links between processes can be aLlocated strictLy to controL functions. In fact, the degree of separation of control and data is an important research is...delays or Loss of control messages. Cognoscienti agree that message-passing IPC schemes are equivalent in "power" to schemes which employ shared...THEORETICAL WORK Page 55 SECTION 6 THEORETICAL WORK 6.1 WORKING GRUP JIM REP.OR STRUCTURE of Discussion: Distributed system without central (or any) control
A 61-million-person experiment in social influence and political mobilization
Bond, Robert M.; Fariss, Christopher J.; Jones, Jason J.; Kramer, Adam D. I.; Marlow, Cameron; Settle, Jaime E.; Fowler, James H.
2013-01-01
Human behaviour is thought to spread through face-to-face social networks, but it is difficult to identify social influence effects in observational studies9–13, and it is unknown whether online social networks operate in the same way14–19. Here we report results from a randomized controlled trial of political mobilization messages delivered to 61 million Facebook users during the 2010 US congressional elections. The results show that the messages directly influenced political self-expression, information seeking and real-world voting behaviour of millions of people. Furthermore, the messages not only influenced the users who received them but also the users’ friends, and friends of friends. The effect of social transmission on real-world voting was greater than the direct effect of the messages themselves, and nearly all the transmission occurred between ‘close friends’ who were more likely to have a face-to-face relationship. These results suggest that strong ties are instrumental for spreading both online and real-world behaviour in human social networks. PMID:22972300
Performance analysis of local area networks
NASA Technical Reports Server (NTRS)
Alkhatib, Hasan S.; Hall, Mary Grace
1990-01-01
A simulation of the TCP/IP protocol running on a CSMA/CD data link layer was described. The simulation was implemented using the simula language, and object oriented discrete event language. It allows the user to set the number of stations at run time, as well as some station parameters. Those parameters are the interrupt time and the dma transfer rate for each station. In addition, the user may configure the network at run time with stations of differing characteristics. Two types are available, and the parameters of both types are read from input files at run time. The parameters include the dma transfer rate, interrupt time, data rate, average message size, maximum frame size and the average interarrival time of messages per station. The information collected for the network is the throughput and the mean delay per packet. For each station, the number of messages attempted as well as the number of messages successfully transmitted is collected in addition to the throughput and mean packet delay per station.
Ferranti, Jeffrey M; Gilbert, William; McCall, Jonathan; Shang, Howard; Barros, Tanya; Horvath, Monica M
2012-06-01
Failure to reach research subject recruitment goals is a significant impediment to the success of many clinical trials. Implementation of health-information technology has allowed retrospective analysis of data for cohort identification and recruitment, but few institutions have also leveraged real-time streams to support such activities. Duke Medicine has deployed a hybrid solution, The Duke Integrated Subject Cohort and Enrollment Research Network (DISCERN), that combines both retrospective warehouse data and clinical events contained in prospective Health Level 7 (HL7) messages to immediately alert study personnel of potential recruits as they become eligible. DISCERN analyzes more than 500000 messages daily in service of 12 projects. Users may receive results via email, text pages, or on-demand reports. Preliminary results suggest DISCERN's unique ability to reason over both retrospective and real-time data increases study enrollment rates while reducing the time required to complete recruitment-related tasks. The authors have introduced a preconfigured DISCERN function as a self-service feature for users. The DISCERN framework is adoptable primarily by organizations using both HL7 message streams and a data warehouse. More efficient recruitment may exacerbate competition for research subjects, and investigators uncomfortable with new technology may find themselves at a competitive disadvantage in recruitment. DISCERN's hybrid framework for identifying real-time clinical events housed in HL7 messages complements the traditional approach of using retrospective warehoused data. DISCERN is helpful in instances when the required clinical data may not be loaded into the warehouse and thus must be captured contemporaneously during patient care. Use of an open-source tool supports generalizability to other institutions at minimal cost.
No Pervasive Computing Without Intelligent Systems
NASA Astrophysics Data System (ADS)
Thompson, S. G.; Azvine, B.
It is interesting to think about the technologies that have become part of our everyday lives and compare their invention and development with those that have fallen by the wayside. Examples of failed technologies such as electrical cars and satellite mobile telephones are not uncommon, but more interestingly numerous other technologies such as instant messaging, text messaging, and b2c eCommerce have moved through the cycle of initial rejection, adoptionby a new user community, and adaptation to its needs, despite the early scepticism of many users and commentators.
Characterizing Deficiencies of Path-Based Routing for Wireless Multi-Hop Networks
2017-05-01
called a “ hello ”) to all of its neighbors. If a series of hello messages are exchanged between two users, a link is considered to exist between them...A brief description of ETX is as follows. For a given window of time, the number of hello packets that a user receives from a neighbor is counted. A...cost is then assigned to the link based on how many hello messages were heard; a link that has fewer hellos successfully transmitted across it will be
Terrorism Risk Insurance Program Reauthorization Act of 2014
Sen. Schumer, Charles E. [D-NY
2014-04-10
Senate - 12/11/2014 Message on House action received in Senate and at desk: House amendment to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Electronic Message Preservation Act
Rep. Hodes, Paul W. [D-NH-2
2009-03-09
Senate - 03/18/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Federal Financial Assistance Management Improvement Act of 2009
Sen. Voinovich, George V. [R-OH
2009-01-22
Senate - 12/15/2009 Message on House action received in Senate and at desk: House amendment to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Bachhuber, Marcus A; McGinty, Emma E; Kennedy-Hendricks, Alene; Niederdeppe, Jeff; Barry, Colleen L
2015-01-01
Barriers to public support for naloxone distribution include lack of knowledge, concerns about potential unintended consequences, and lack of sympathy for people at risk of overdose. A randomized survey experiment was conducted with a nationally-representative web-based survey research panel (GfK KnowledgePanel). Participants were randomly assigned to read different messages alone or in combination: 1) factual information about naloxone; 2) pre-emptive refutation of potential concerns about naloxone distribution; and 3) a sympathetic narrative about a mother whose daughter died of an opioid overdose. Participants were then asked if they support or oppose policies related to naloxone distribution. For each policy item, logistic regression models were used to test the effect of each message exposure compared with the no-exposure control group. The final sample consisted of 1,598 participants (completion rate: 72.6%). Factual information and the sympathetic narrative alone each led to higher support for training first responders to use naloxone, providing naloxone to friends and family members of people using opioids, and passing laws to protect people who administer naloxone. Participants receiving the combination of the sympathetic narrative and factual information, compared to factual information alone, were more likely to support all policies: providing naloxone to friends and family members (OR: 2.0 [95% CI: 1.4 to 2.9]), training first responders to use naloxone (OR: 2.0 [95% CI: 1.2 to 3.4]), passing laws to protect people if they administer naloxone (OR: 1.5 [95% CI: 1.04 to 2.2]), and passing laws to protect people if they call for medical help for an overdose (OR: 1.7 [95% CI: 1.2 to 2.5]). All messages increased public support, but combining factual information and the sympathetic narrative was most effective. Public support for naloxone distribution can be improved through education and sympathetic portrayals of the population who stands to benefit from these policies.
Parallelization of KENO-Va Monte Carlo code
NASA Astrophysics Data System (ADS)
Ramón, Javier; Peña, Jorge
1995-07-01
KENO-Va is a code integrated within the SCALE system developed by Oak Ridge that solves the transport equation through the Monte Carlo Method. It is being used at the Consejo de Seguridad Nuclear (CSN) to perform criticality calculations for fuel storage pools and shipping casks. Two parallel versions of the code: one for shared memory machines and other for distributed memory systems using the message-passing interface PVM have been generated. In both versions the neutrons of each generation are tracked in parallel. In order to preserve the reproducibility of the results in both versions, advanced seeds for random numbers were used. The CONVEX C3440 with four processors and shared memory at CSN was used to implement the shared memory version. A FDDI network of 6 HP9000/735 was employed to implement the message-passing version using proprietary PVM. The speedup obtained was 3.6 in both cases.
Statistical analysis of loopy belief propagation in random fields
NASA Astrophysics Data System (ADS)
Yasuda, Muneki; Kataoka, Shun; Tanaka, Kazuyuki
2015-10-01
Loopy belief propagation (LBP), which is equivalent to the Bethe approximation in statistical mechanics, is a message-passing-type inference method that is widely used to analyze systems based on Markov random fields (MRFs). In this paper, we propose a message-passing-type method to analytically evaluate the quenched average of LBP in random fields by using the replica cluster variation method. The proposed analytical method is applicable to general pairwise MRFs with random fields whose distributions differ from each other and can give the quenched averages of the Bethe free energies over random fields, which are consistent with numerical results. The order of its computational cost is equivalent to that of standard LBP. In the latter part of this paper, we describe the application of the proposed method to Bayesian image restoration, in which we observed that our theoretical results are in good agreement with the numerical results for natural images.
Li, J; Guo, L-X; Zeng, H; Han, X-B
2009-06-01
A message-passing-interface (MPI)-based parallel finite-difference time-domain (FDTD) algorithm for the electromagnetic scattering from a 1-D randomly rough sea surface is presented. The uniaxial perfectly matched layer (UPML) medium is adopted for truncation of FDTD lattices, in which the finite-difference equations can be used for the total computation domain by properly choosing the uniaxial parameters. This makes the parallel FDTD algorithm easier to implement. The parallel performance with different processors is illustrated for one sea surface realization, and the computation time of the parallel FDTD algorithm is dramatically reduced compared to a single-process implementation. Finally, some numerical results are shown, including the backscattering characteristics of sea surface for different polarization and the bistatic scattering from a sea surface with large incident angle and large wind speed.
NASA Technical Reports Server (NTRS)
Goldstein, David
1991-01-01
Extensions to an architecture for real-time, distributed (parallel) knowledge-based systems called the Parallel Real-time Artificial Intelligence System (PRAIS) are discussed. PRAIS strives for transparently parallelizing production (rule-based) systems, even under real-time constraints. PRAIS accomplished these goals (presented at the first annual C Language Integrated Production System (CLIPS) conference) by incorporating a dynamic task scheduler, operating system extensions for fact handling, and message-passing among multiple copies of CLIPS executing on a virtual blackboard. This distributed knowledge-based system tool uses the portability of CLIPS and common message-passing protocols to operate over a heterogeneous network of processors. Results using the original PRAIS architecture over a network of Sun 3's, Sun 4's and VAX's are presented. Mechanisms using the producer-consumer model to extend the architecture for fault-tolerance and distributed truth maintenance initiation are also discussed.
Flow of Emotional Messages in Artificial Social Networks
NASA Astrophysics Data System (ADS)
Chmiel, Anna; Hołyst, Janusz A.
Models of message flows in an artificial group of users communicating via the Internet are introduced and investigated using numerical simulations. We assumed that messages possess an emotional character with a positive valence and that the willingness to send the next affective message to a given person increases with the number of messages received from this person. As a result, the weights of links between group members evolve over time. Memory effects are introduced, taking into account that the preferential selection of message receivers depends on the communication intensity during the recent period only. We also model the phenomenon of secondary social sharing when the reception of an emotional e-mail triggers the distribution of several emotional e-mails to other people.
NASA Astrophysics Data System (ADS)
Morone, Flaviano; Min, Byungjoon; Bo, Lin; Mari, Romain; Makse, Hernán A.
2016-07-01
We elaborate on a linear-time implementation of Collective-Influence (CI) algorithm introduced by Morone, Makse, Nature 524, 65 (2015) to find the minimal set of influencers in networks via optimal percolation. The computational complexity of CI is O(N log N) when removing nodes one-by-one, made possible through an appropriate data structure to process CI. We introduce two Belief-Propagation (BP) variants of CI that consider global optimization via message-passing: CI propagation (CIP) and Collective-Immunization-Belief-Propagation algorithm (CIBP) based on optimal immunization. Both identify a slightly smaller fraction of influencers than CI and, remarkably, reproduce the exact analytical optimal percolation threshold obtained in Random Struct. Alg. 21, 397 (2002) for cubic random regular graphs, leaving little room for improvement for random graphs. However, the small augmented performance comes at the expense of increasing running time to O(N2), rendering BP prohibitive for modern-day big-data. For instance, for big-data social networks of 200 million users (e.g., Twitter users sending 500 million tweets/day), CI finds influencers in 2.5 hours on a single CPU, while all BP algorithms (CIP, CIBP and BDP) would take more than 3,000 years to accomplish the same task.
Morone, Flaviano; Min, Byungjoon; Bo, Lin; Mari, Romain; Makse, Hernán A
2016-07-26
We elaborate on a linear-time implementation of Collective-Influence (CI) algorithm introduced by Morone, Makse, Nature 524, 65 (2015) to find the minimal set of influencers in networks via optimal percolation. The computational complexity of CI is O(N log N) when removing nodes one-by-one, made possible through an appropriate data structure to process CI. We introduce two Belief-Propagation (BP) variants of CI that consider global optimization via message-passing: CI propagation (CIP) and Collective-Immunization-Belief-Propagation algorithm (CIBP) based on optimal immunization. Both identify a slightly smaller fraction of influencers than CI and, remarkably, reproduce the exact analytical optimal percolation threshold obtained in Random Struct. Alg. 21, 397 (2002) for cubic random regular graphs, leaving little room for improvement for random graphs. However, the small augmented performance comes at the expense of increasing running time to O(N(2)), rendering BP prohibitive for modern-day big-data. For instance, for big-data social networks of 200 million users (e.g., Twitter users sending 500 million tweets/day), CI finds influencers in 2.5 hours on a single CPU, while all BP algorithms (CIP, CIBP and BDP) would take more than 3,000 years to accomplish the same task.
Xyce parallel electronic simulator users guide, version 6.1
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keiter, Eric R; Mei, Ting; Russo, Thomas V.
This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas; Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers; A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to developmore » new types of analysis without requiring the implementation of analysis-specific device models; Device models that are specifically tailored to meet Sandia's needs, including some radiationaware devices (for Sandia users only); and Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase-a message passing parallel implementation-which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.« less
Xyce parallel electronic simulator users' guide, Version 6.0.1.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keiter, Eric R; Mei, Ting; Russo, Thomas V.
This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to developmore » new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandias needs, including some radiationaware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase a message passing parallel implementation which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.« less
Morone, Flaviano; Min, Byungjoon; Bo, Lin; Mari, Romain; Makse, Hernán A.
2016-01-01
We elaborate on a linear-time implementation of Collective-Influence (CI) algorithm introduced by Morone, Makse, Nature 524, 65 (2015) to find the minimal set of influencers in networks via optimal percolation. The computational complexity of CI is O(N log N) when removing nodes one-by-one, made possible through an appropriate data structure to process CI. We introduce two Belief-Propagation (BP) variants of CI that consider global optimization via message-passing: CI propagation (CIP) and Collective-Immunization-Belief-Propagation algorithm (CIBP) based on optimal immunization. Both identify a slightly smaller fraction of influencers than CI and, remarkably, reproduce the exact analytical optimal percolation threshold obtained in Random Struct. Alg. 21, 397 (2002) for cubic random regular graphs, leaving little room for improvement for random graphs. However, the small augmented performance comes at the expense of increasing running time to O(N2), rendering BP prohibitive for modern-day big-data. For instance, for big-data social networks of 200 million users (e.g., Twitter users sending 500 million tweets/day), CI finds influencers in 2.5 hours on a single CPU, while all BP algorithms (CIP, CIBP and BDP) would take more than 3,000 years to accomplish the same task. PMID:27455878
Xyce parallel electronic simulator users guide, version 6.0.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keiter, Eric R; Mei, Ting; Russo, Thomas V.
This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to developmore » new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandias needs, including some radiationaware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase a message passing parallel implementation which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.« less
Message Design Guidelines For Screen-Based Programs.
ERIC Educational Resources Information Center
Rimar, G. I.
1996-01-01
Effective message design for screen-based computer or video instructional programs requires knowledge from many disciplines. Evaluates current conventions and suggests a new set of guidelines for screen-based designers. Discusses screen layout, highlighting and cueing, text font and style, text positioning, color, and graphical user interfaces for…
Charon Toolkit for Parallel, Implicit Structured-Grid Computations: Functional Design
NASA Technical Reports Server (NTRS)
VanderWijngaart, Rob F.; Kutler, Paul (Technical Monitor)
1997-01-01
In a previous report the design concepts of Charon were presented. Charon is a toolkit that aids engineers in developing scientific programs for structured-grid applications to be run on MIMD parallel computers. It constitutes an augmentation of the general-purpose MPI-based message-passing layer, and provides the user with a hierarchy of tools for rapid prototyping and validation of parallel programs, and subsequent piecemeal performance tuning. Here we describe the implementation of the domain decomposition tools used for creating data distributions across sets of processors. We also present the hierarchy of parallelization tools that allows smooth translation of legacy code (or a serial design) into a parallel program. Along with the actual tool descriptions, we will present the considerations that led to the particular design choices. Many of these are motivated by the requirement that Charon must be useful within the traditional computational environments of Fortran 77 and C. Only the Fortran 77 syntax will be presented in this report.
Automated Generation of Message-Passing Programs: An Evaluation Using CAPTools
NASA Technical Reports Server (NTRS)
Hribar, Michelle R.; Jin, Haoqiang; Yan, Jerry C.; Saini, Subhash (Technical Monitor)
1998-01-01
Scientists at NASA Ames Research Center have been developing computational aeroscience applications on highly parallel architectures over the past ten years. During that same time period, a steady transition of hardware and system software also occurred, forcing us to expend great efforts into migrating and re-coding our applications. As applications and machine architectures become increasingly complex, the cost and time required for this process will become prohibitive. In this paper, we present the first set of results in our evaluation of interactive parallelization tools. In particular, we evaluate CAPTool's ability to parallelize computational aeroscience applications. CAPTools was tested on serial versions of the NAS Parallel Benchmarks and ARC3D, a computational fluid dynamics application, on two platforms: the SGI Origin 2000 and the Cray T3E. This evaluation includes performance, amount of user interaction required, limitations and portability. Based on these results, a discussion on the feasibility of computer aided parallelization of aerospace applications is presented along with suggestions for future work.
Hazard of deceptive advertising of athletic footwear.
Robbins, S; Waked, E
1997-12-01
Athletic footwear are associated with frequent injury that are thought to result from repetitive impact. No scientific data suggest they protect well. Expensive athletic shoes are deceptively advertised to safeguard well through "cushioning impact", yet account for 123% greater injury frequency than the cheapest ones. This study tested the hypothesis that deceptive advertising creates a false sense of security with users of expensive athletic shoes, inducing attenuation of impact moderating behaviour, increased impact, and injury. Fifteen young healthy male volunteers confronted four surfaces: a bare force moment platform, and three with this platform covered by identical shoe sole material made to appear different and advertised divergently. Advertising messages suggested superior impact absorption and protection (deceptive message), poor impact absorption and high injury risk (warning message), and unknown impact absorption and safety (neutral message). Ground reaction forces were recorded for 10 barefoot footfalls, according to a protocol requiring stepping forward from perch to a surface 4.5 cm below. Impact varied as a function of advertising message (p < 0.001). Deceptive message equalled neutral message in eliciting higher impact than the warning message and the bare platform. Differences grew with repetitions (p < 0.001). These data provide a plausible mechanism explaining higher injury frequency in users of expensive athletic shoes. This is the first report to suggest: (1) deceptive advertising of protective devices may represent a public health hazard and may have to be eliminated presumably through regulation; (2) a tendency in humans to be less cautious when using new devices of unknown benefit because of overly positive attitudes associated with new technology and novel devices.
Hazard of deceptive advertising of athletic footwear.
Robbins, S; Waked, E
1997-01-01
OBJECTIVES: Athletic footwear are associated with frequent injury that are thought to result from repetitive impact. No scientific data suggest they protect well. Expensive athletic shoes are deceptively advertised to safeguard well through "cushioning impact", yet account for 123% greater injury frequency than the cheapest ones. This study tested the hypothesis that deceptive advertising creates a false sense of security with users of expensive athletic shoes, inducing attenuation of impact moderating behaviour, increased impact, and injury. METHODS: Fifteen young healthy male volunteers confronted four surfaces: a bare force moment platform, and three with this platform covered by identical shoe sole material made to appear different and advertised divergently. Advertising messages suggested superior impact absorption and protection (deceptive message), poor impact absorption and high injury risk (warning message), and unknown impact absorption and safety (neutral message). Ground reaction forces were recorded for 10 barefoot footfalls, according to a protocol requiring stepping forward from perch to a surface 4.5 cm below. RESULTS: Impact varied as a function of advertising message (p < 0.001). Deceptive message equalled neutral message in eliciting higher impact than the warning message and the bare platform. Differences grew with repetitions (p < 0.001). CONCLUSIONS: These data provide a plausible mechanism explaining higher injury frequency in users of expensive athletic shoes. This is the first report to suggest: (1) deceptive advertising of protective devices may represent a public health hazard and may have to be eliminated presumably through regulation; (2) a tendency in humans to be less cautious when using new devices of unknown benefit because of overly positive attitudes associated with new technology and novel devices. PMID:9429006
Shea, S; Sengupta, S; Crosswell, A; Clayton, P D
1992-01-01
The developing Integrated Academic Information System (IAIMS) at Columbia-Presbyterian Medical Center provides data sharing links between two separate corporate entities, namely Columbia University Medical School and The Presbyterian Hospital, using a network-based architecture. Multiple database servers with heterogeneous user authentication protocols are linked to this network. "One-stop information shopping" implies one log-on procedure per session, not separate log-on and log-off procedures for each server or application used during a session. These circumstances provide challenges at the policy and technical levels to data security at the network level and insuring smooth information access for end users of these network-based services. Five activities being conducted as part of our security project are described: (1) policy development; (2) an authentication server for the network; (3) Kerberos as a tool for providing mutual authentication, encryption, and time stamping of authentication messages; (4) a prototype interface using Kerberos services to authenticate users accessing a network database server; and (5) a Kerberized electronic signature.
Turk, Tahir; Chaturvedi, Pankaj; Murukutla, Nandita; Mallik, Vaishakhi; Sinha, Praveen; Mullin, Sandra
2017-07-01
The evidence on the efficacy of tobacco control messages in low and middle-income country (LMIC) settings is limited but growing. Low message salience and disengagement, in the face of tobacco control messages, are possible barriers to self-efficacy and cessation-related behaviours of tobacco users. Although adaptations of existing pretested graphic and emotional appeals have been found to impact on behaviours, more personalised, culturally relevant and compelling appeals may more fully engage message receivers to elicit optimal behavioural responses. The objective of these case studies is to use lessons learnt from high-income country tobacco control communication programmes, and adapt practical approaches to provide cost-effective, culturally nuanced, graphic and personalised messages from tobacco victims to achieve the optimal behavioural impact for population-level communication campaigns in the resource-constrained settings of LMICs. The 'raw and real' messaging approach, which emanated from message pretesting in India, outlines creative and production processes for the production of tobacco victim testimonials, given the need to source patients, facing life-threatening conditions. This cost-efficient approach uses real tobacco victims, doctors and family members in a cinéma vérité style approach to achieve more personalised and culturally resonant messages. The methodological approach, used for the development of a number of patient testimonial messages initially in India, and later adapted for tobacco cessation, smoke-free and graphic health warning communication campaigns in other countries, is outlined. Findings from campaigns evaluated to date are encouraging as a result of the simple fact that true stories of local people's suffering are simply too difficult to ignore. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
NASA Astrophysics Data System (ADS)
Yoon, Eun-Jun
2012-07-01
In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.
Practical Formal Verification of MPI and Thread Programs
NASA Astrophysics Data System (ADS)
Gopalakrishnan, Ganesh; Kirby, Robert M.
Large-scale simulation codes in science and engineering are written using the Message Passing Interface (MPI). Shared memory threads are widely used directly, or to implement higher level programming abstractions. Traditional debugging methods for MPI or thread programs are incapable of providing useful formal guarantees about coverage. They get bogged down in the sheer number of interleavings (schedules), often missing shallow bugs. In this tutorial we will introduce two practical formal verification tools: ISP (for MPI C programs) and Inspect (for Pthread C programs). Unlike other formal verification tools, ISP and Inspect run directly on user source codes (much like a debugger). They pursue only the relevant set of process interleavings, using our own customized Dynamic Partial Order Reduction algorithms. For a given test harness, DPOR allows these tools to guarantee the absence of deadlocks, instrumented MPI object leaks and communication races (using ISP), and shared memory races (using Inspect). ISP and Inspect have been used to verify large pieces of code: in excess of 10,000 lines of MPI/C for ISP in under 5 seconds, and about 5,000 lines of Pthread/C code in a few hours (and much faster with the use of a cluster or by exploiting special cases such as symmetry) for Inspect. We will also demonstrate the Microsoft Visual Studio and Eclipse Parallel Tools Platform integrations of ISP (these will be available on the LiveCD).
Merat, Natasha; Louw, Tyron; Madigan, Ruth; Wilbrink, Marc; Schieben, Anna
2018-03-31
As the desire for deploying automated ("driverless") vehicles increases, there is a need to understand how they might communicate with other road users in a mixed traffic, urban, setting. In the absence of an active and responsible human controller in the driving seat, who might currently communicate with other road users in uncertain/conflicting situations, in the future, understanding a driverless car's behaviour and intentions will need to be relayed via easily comprehensible, intuitive and universally intelligible means, perhaps presented externally via new vehicle interfaces. This paper reports on the results of a questionnaire-based study, delivered to 664 participants, recruited during live demonstrations of an Automated Road Transport Systems (ARTS; SAE Level 4), in three European cities. The questionnaire sought the views of pedestrians and cyclists, focussing on whether respondents felt safe interacting with ARTS in shared space, and also what externally presented travel behaviour information from the ARTS was important to them. Results showed that most pedestrians felt safer when the ARTS were travelling in designated lanes, rather than in shared space, and the majority believed they had priority over the ARTS, in the absence of such infrastructure. Regardless of lane demarcations, all respondents highlighted the importance of receiving some communication information about the behaviour of the ARTS, with acknowledgement of their detection by the vehicle being the most important message. There were no clear patterns across the respondents, regarding preference of modality for these external messages, with cultural and infrastructural differences thought to govern responses. Generally, however, conventional signals (lights and beeps) were preferred to text-based messages and spoken words. The results suggest that until these driverless vehicles are able to provide universally comprehensible externally presented information or messages during interaction with other road users, they are likely to contribute to confusing and conflicting interactions between these actors, especially in a shared space setting, which may, therefore, reduce efficient traffic flow. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.
77 FR 16688 - Review of the Emergency Alert System
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-22
... the approximately three and one half-year window it is providing for intermediary device users is..., including the originator, event, location and the valid time period of the EAS message, from the CAP text... event, which it believes would provide more visual information to alert message viewers. The Commission...
Beyond Linear Syntax: An Image-Oriented Communication Aid
ERIC Educational Resources Information Center
Patel, Rupal; Pilato, Sam; Roy, Deb
2004-01-01
This article presents a novel AAC communication aid based on semantic rather than syntactic schema, leading to more natural message construction. Users interact with a two-dimensional spatially organized image schema, which depicts the semantic structure and contents of the message. An overview of the interface design is presented followed by…
Online Communication and Adolescent Relationships
ERIC Educational Resources Information Center
Subrahmanyam, Kaveri; Greenfield, Patricia
2008-01-01
Over the past decade, technology has become increasingly important in the lives of adolescents. As a group, adolescents are heavy users of newer electronic communication forms such as instant messaging, e-mail, and text messaging, as well as communication-oriented Internet sites such as blogs, social networking, and sites for sharing photos and…
User-Centric Secure Cross-Site Interaction Framework for Online Social Networking Services
ERIC Educational Resources Information Center
Ko, Moo Nam
2011-01-01
Social networking service is one of major technological phenomena on Web 2.0. Hundreds of millions of users are posting message, photos, and videos on their profiles and interacting with other users, but the sharing and interaction are limited within the same social networking site. Although users can share some content on a social networking site…
Schnierle, Jeanette; Florian, Hannah; Agarwal, Aradhna; Rundell, Kristen; McAlearney, Ann Scheck
2017-01-01
Background Patient portals have shown promise in engaging individuals in self-management of chronic conditions by allowing patients to input and track health information and exchange secure electronic messages with their providers. Past studies have identified patient barriers to portal use including usability issues, low health literacy, and concerns about loss of personal contact as well as provider concerns such as increased time spent responding to messages. However, to date, studies of both patient and provider perspectives on portal use have focused on the pre-implementation or initial implementation phases and do not consider how these issues may change as patients and providers gain greater experience with portals. Objective Our study examined the following research question: Within primary care offices with high rates of patient-portal use, what do experienced physician and patient users of the ambulatory portal perceive as the benefits and challenges of portal use in general and secure messaging in particular? Methods This qualitative study involved 42 interviews with experienced physician and patient users of an ambulatory patient portal, Epic’s MyChart. Participants were recruited from the Department of Family Medicine at a large Academic Medical Center (AMC) and included providers and their patients, who had been diagnosed with at least one chronic condition. A total of 29 patients and 13 primary care physicians participated in the interviews. All interviews were conducted by telephone and followed a semistructured interview guide. Interviews were transcribed verbatim to permit rigorous qualitative analysis. Both inductive and deductive methods were used to code and analyze the data iteratively, paying particular attention to themes involving secure messaging. Results Experienced portal users discussed several emergent themes related to a need for greater clarity on when and how to use the secure messaging feature. Patient concerns included worry about imposing on their physician’s time, the lack of provider compensation for responding to secure messages, and uncertainty about when to use secure messaging to communicate with their providers. Similarly, providers articulated a lack of clarity as to the appropriate way to communicate via MyChart and suggested that additional training for both patients and providers might be important. Patient training could include orienting patients to the “rules of engagement” at portal sign-up, either in the office or through an online tutorial. Conclusions As secure messaging through patient portals is increasingly being used as a method of physician-patient communication, both patients and providers are looking for guidance on how to appropriately engage with each other using this tool. Patients worry about whether their use is appropriate, and providers are concerned about the content of messages, which allow them to effectively manage patient questions. Our findings suggest that additional training may help address the concerns of both patients and providers, by providing “rules of engagement” for communication via patient portals. PMID:28676467
An, Lawrence C; Schillo, Barbara A; Saul, Jessie E; Wendling, Ann H; Klatt, Colleen M; Berg, Carla J; Ahulwalia, Jasjit S; Kavanaugh, Annette M; Christenson, Matthew; Luxenberg, Michael G
2008-12-20
The association between greater utilization of Web-assisted tobacco interventions and increased abstinence rates is well recognized. However, there is little information on how utilization of specific website features influences quitting. To determine the association between utilization of informational, interactive, and online community resources (eg. bulletin boards) and abstinence rates, with the broader objective to identify potential strategies for improving outcomes for Web-assisted tobacco interventions. In Spring 2004, a cohort of 607 quitplan.com users consented to participate in an evaluation of quitplan.com, a Minnesota branded version of QuitNet.com. We developed utilization measures for different site features: general information, interactive diagnostic tools and quit planning tools, online expert counseling, passive (ie, reading of bulletin boards) and active (ie, public posting) online community engagement, and one-to-one messaging with other virtual community members. Using bivariate, multivariate, and path analyses, we examined the relationship between utilization of specific site features and 30-day abstinence at 6 months. The most commonly used resources were the interactive quit planning tools (used by 77% of site users). Other informational resources (ie, quitting guides) were used more commonly (60% of users) than passive (38%) or active (24%) community features. Online community engagement through one-to-one messaging was low (11%) as was use of online counseling (5%). The 30-day abstinence rate among study participants at 6 months was 9.7% (95% Confidence Interval [CI] 7.3% - 12.1%). In the logistic regression model, neither the demographic data (eg, age, gender, education level, employment, or insurance status) nor the smoking-related data (eg, cigarettes per day, time to first morning cigarette, baseline readiness to quit) nor use of smoking cessation medications entered the model as significant predictors of abstinence. Individuals who used the interactive quit planning tools once, two to three times, or four or more times had an odds of abstinence of 0.65 (95% Confidence Interval [CI] 0.22 - 1.94), 1.87 (95% CI 0.77 - 4.56), and 2.35 (95% CI 1.0 - 5.58), respectively. The use of one-to-one messages (reference = none vs 1 or more) entered the final model as potential predictor for abstinence, though the significance of this measure was marginal (OR = 1.91, 95% CI 0.92 - 3.97, P = .083). In the path analysis, an apparent association between active online community engagement and abstinence was accounted for in large part by increased use of interactive quitting tools and one-to-one messaging. Use of interactive quitting tools, and perhaps one-to-one messaging with other members of the online community, was associated with increased abstinence rates among quitplan.com users. Designs that facilitate use of these features should be considered.
Klein, Elizabeth G; Quisenberry, Amanda J; Shoben, Abigail B; Cooper, Sarah; Ferketich, Amy K; Berman, Micah; Peters, Ellen; Wewers, Mary Ellen
2017-10-01
Little research has examined the impacts of graphic health warnings on the users of smokeless tobacco products. A convenience sample of past-month, male smokeless tobacco users (n = 142; 100% male) was randomly assigned to view a smokeless tobacco advertisement with a graphic health warning (GHW) or a text-only warning. Eye-tracking equipment measured viewing time, or dwell time, in milliseconds. Following the advertisement exposure, participants self-reported smokeless tobacco craving and recalled any content in the health warning message (unaided recall). Linear and logistic regression analyses evaluated the proportion of time viewing the GHW, craving, and GHW recall. Participants who viewed a GHW spent a significantly greater proportion of their ad viewing time on GHWs (2.87 seconds or 30%), compared to those viewing a text-only warning (2.05 seconds or 24%). Although there were no significant differences by condition in total advertisement viewing duration, those participants viewing a GHW had increased recall of health warning messages compared to the text-only warning (76% had any warning message recall compared to 53%; p < .05). Self-reported craving after advertisement exposure was lower in the GHW compared to text-only condition, but the difference was not statistically significant (a rating of 4.4 vs. 5.3 on a 10-point scale; p = .08). GHWs attracted greater attention and greater recall of health warning messages compared to text-only warnings among rural male smokeless tobacco users. Among a sample of rural smokeless tobacco users, GHWs attracted more attention and recall of health warning messages compared to text-only warnings when viewed within smokeless tobacco advertising. These findings provide additional empirical support that GHWs are an effective tobacco control tool for all tobacco products and advertisements. © The Author 2017. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Text messaging for addiction: a review.
Keoleian, Victoria; Polcin, Douglas; Galloway, Gantt P
2015-01-01
Individuals seeking treatment for addiction often experience barriers due to cost, lack of local treatment resources, or either school or work schedule conflicts. Text-messaging-based addiction treatment is inexpensive and has the potential to be widely accessible in real time. We conducted a comprehensive literature review identifying 11 published, randomized controlled trials (RCTs) evaluating text-messaging-based interventions for tobacco smoking, four studies for reducing alcohol consumption, one pilot study in former methamphetamine (MA) users, and one study based on qualitative interviews with cannabis users. Abstinence outcome results in RCTs of smokers willing to make a quit attempt have been positive overall in the short term and as far out as at six and 12 months. Studies aimed at reducing alcohol consumption have been promising. More data are needed to evaluate the feasibility, acceptability, and efficacy of this approach for other substance use problems.
MDMA (ecstasy/molly) use among African Americans: The perceived influence of hip-hop/rap music.
Rigg, Khary K; Estreet, Anthony T
2018-02-12
Over the past two decades, the demographic profile of MDMA (ecstasy/molly) users has changed. In particular, African American MDMA use has risen in some cities. One explanation of this new trend is the drug's recent popularity (as molly) in hip-hop/rap (HHR) music. Several top rappers endorse the drug as a way to have fun or get women "loose." There are currently no studies, however, that investigate the extent to which African American MDMA users listen to HHR music or the influence that these pro-MDMA messages have on their use of the drug. To address this gap, the current study used survey data to (a) identify the extent to which HHR music is listened to by African American MDMA users and (b) assess the perceived influence of HHR music on their decision to begin using. Qualitative interview data are also presented to contextualize the influence of these messages on their use of MDMA. The findings of this study suggest that African American MDMA users are high consumers of HHR music and that pro-MDMA messages in HHR music are influencing their expectations of the drug and their decision to initiate use. These findings add to the limited amount of research on African American MDMA use and have the potential to inform future interventions.
Dynamic Network Security Control Using Software Defined Networking
2016-03-24
Most importantly I thank my family for understanding, loving , and thriving in the hectic world of military spouse and children. Michael C. Todd v...RBAC poses access to objects as a user to member-of group relationship . This construct results in a set of rules to govern access to objects based...API. Agent Agent.py Event.py Message.py ModSysStatus.py Event Message ModSysStatus Event - Message - ModSysStatus Relationship Figure 12. Agent Design
Building automatic customer complaints filtering application based on Twitter in Bahasa Indonesia
NASA Astrophysics Data System (ADS)
Gunawan, D.; Siregar, R. P.; Rahmat, R. F.; Amalia, A.
2018-03-01
Twitter has become a media to provide communication between a company with its customers. The average number of Twitter active users monthly is 330 million. A lot of companies realize the potential of Twitter to establish good relationship with their customers. Therefore, they usually have one official Twitter account to act as customer care division. In Indonesia, one of the company that utilizes the potential of Twitter to reach their customers is PT Telkom. PT Telkom has an official customer service account (called @TelkomCare) to receive customers’ problem. However, because of this account is open for public, Twitter users might post all kind of messages (not only complaints) to Telkom Care account. This leads to a problem that the Telkom Care account contains not only the customer complaints but also compliment and ordinary message. Furthermore, the complaints should be distributed to relevant division such as “Indihome”, “Telkomsel”, “UseeTV”, and “Telepon” based on the content of the message. This research built the application that automatically filter twitter post messages into several pre-defined categories (based on existing divisions) using Naïve Bayes algorithm. This research is done by collecting Twitter message, data cleaning, data pre-processing, training and testing data, and evaluate the classification result. This research yields 97% accuracy to classify Twitter message into the categories mentioned earlier.
Message passing with queues and channels
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dozsa, Gabor J; Heidelberger, Philip; Kumar, Sameer
In an embodiment, a send thread receives an identifier that identifies a destination node and a pointer to data. The send thread creates a first send request in response to the receipt of the identifier and the data pointer. The send thread selects a selected channel from among a plurality of channels. The selected channel comprises a selected hand-off queue and an identification of a selected message unit. Each of the channels identifies a different message unit. The selected hand-off queue is randomly accessible. If the selected hand-off queue contains an available entry, the send thread adds the first sendmore » request to the selected hand-off queue. If the selected hand-off queue does not contain an available entry, the send thread removes a second send request from the selected hand-off queue and sends the second send request to the selected message unit.« less
Scalable Optical-Fiber Communication Networks
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Peterson, John C.
1993-01-01
Scalable arbitrary fiber extension network (SAFEnet) is conceptual fiber-optic communication network passing digital signals among variety of computers and input/output devices at rates from 200 Mb/s to more than 100 Gb/s. Intended for use with very-high-speed computers and other data-processing and communication systems in which message-passing delays must be kept short. Inherent flexibility makes it possible to match performance of network to computers by optimizing configuration of interconnections. In addition, interconnections made redundant to provide tolerance to faults.
Domestic Minor Sex Trafficking Deterrence and Victims Support Act of 2010
Sen. Wyden, Ron [D-OR
2009-12-22
Senate - 12/21/2010 Message on House action received in Senate and at desk: House amendment to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
NASA Astrophysics Data System (ADS)
Kasim, Shahreen; Hafit, Hanayanti; Leong, Tan Hua; Hashim, Rathiah; Ruslai, Husni; Jahidin, Kamaruzzaman; Syafwan Arshad, Mohammad
2016-11-01
Nowadays, some people facing the problem to wake up in the morning. This was result to absence of the classes, meetings, and even exams. The aim of this project is to develop an android application that can force the user to wake up. The method used in this application are pedometer and Short Message Service (SMS) function. This application need the user to take their smartphone and walk about 10 steps to disable it, when the alarm clock is activated. After that, when the alarm clock was rang, this alarm application has automatically send a message to the users’ friends or parents phone to wake them up.
Remote health coaching for interactive exercise with older adults in a home environment.
Jimison, Holly B; Hagler, Stuart; Kurillo, Gregorij; Bajcsy, Ruzena; Pavel, Misha
2015-01-01
Optimal health coaching interventions are tailored to individuals' needs, preferences, motivations, barriers, timing, and readiness to change. Technology approaches are useful in both monitoring a user's adherence to their behavior change goals and also in providing just-in-time feedback and coaching messages. User models that incorporate dynamically varying behavior change variables with algorithms that trigger tailored messages provide a framework for making health interventions more effective. These principles are applied in the described system for assisting older adults in meeting their physical exercise goals with a tailored interactive video system with just-in-time feedback and encouragement.
Using Mobile Phones to Collect Patient Data: Lessons Learned From the SIMPle Study
Tandan, Meera; Murphy, Andrew W; Vellinga, Akke
2017-01-01
Background Mobile phones offer new opportunities to efficiently and interactively collect real-time data from patients with acute illnesses, such as urinary tract infections (UTIs). One of the main benefits of using mobile data collection methods is automated data upload, which can reduce the chance of data loss, an issue when using other data collection methods such as paper-based surveys. Objective The aim was to explore differences in collecting data from patients with UTI using text messaging, a mobile phone app (UTI diary), and an online survey. This paper provides lessons learned from integrating mobile data collection into a randomized controlled trial. Methods Participants included UTI patients consulting in general practices that were participating in the Supporting the Improvement and Management of UTI (SIMPle) study. SIMPle was designed to improve prescribing antimicrobial therapies for UTI in the community. Patients were invited to reply to questions regarding their UTI either via a prospective text message survey, a mobile phone app (UTI diary), or a retrospective online survey. Data were collected from 329 patients who opted in to the text message survey, 71 UTI patients through the mobile phone UTI symptom diary app, and 91 online survey participants. Results The age profile of UTI diary app users was younger than that of the text message and online survey users. The largest dropout for both the text message survey respondents and UTI diary app users was after the initial opt-in message; once the participants completed question 1 of the text message survey or day 2 in the UTI diary app, they were more likely to respond to the remaining questions/days. Conclusions This feasibility study highlights the potential of using mobile data collection methods to capture patient data. As well as improving the efficiency of data collection, these novel approaches highlight the advantage of collecting data in real time across multiple time points. There was little variation in the number of patients responding between text message survey, UTI diary, and online survey, but more patients participated in the text message survey than the UTI diary app. The choice between designing a text message survey or UTI diary app will depend on the age profile of patients and the type of information the researchers’ desire. Trial Registration ClinicalTrials.gov NCT01913860; https://clinicaltrials.gov/ct2/show/NCT01913860 (Archived by WebCite at http://www.webcitation.org/6pfgCztgT). PMID:28442451
Using Mobile Phones to Collect Patient Data: Lessons Learned From the SIMPle Study.
Duane, Sinead; Tandan, Meera; Murphy, Andrew W; Vellinga, Akke
2017-04-25
Mobile phones offer new opportunities to efficiently and interactively collect real-time data from patients with acute illnesses, such as urinary tract infections (UTIs). One of the main benefits of using mobile data collection methods is automated data upload, which can reduce the chance of data loss, an issue when using other data collection methods such as paper-based surveys. The aim was to explore differences in collecting data from patients with UTI using text messaging, a mobile phone app (UTI diary), and an online survey. This paper provides lessons learned from integrating mobile data collection into a randomized controlled trial. Participants included UTI patients consulting in general practices that were participating in the Supporting the Improvement and Management of UTI (SIMPle) study. SIMPle was designed to improve prescribing antimicrobial therapies for UTI in the community. Patients were invited to reply to questions regarding their UTI either via a prospective text message survey, a mobile phone app (UTI diary), or a retrospective online survey. Data were collected from 329 patients who opted in to the text message survey, 71 UTI patients through the mobile phone UTI symptom diary app, and 91 online survey participants. The age profile of UTI diary app users was younger than that of the text message and online survey users. The largest dropout for both the text message survey respondents and UTI diary app users was after the initial opt-in message; once the participants completed question 1 of the text message survey or day 2 in the UTI diary app, they were more likely to respond to the remaining questions/days. This feasibility study highlights the potential of using mobile data collection methods to capture patient data. As well as improving the efficiency of data collection, these novel approaches highlight the advantage of collecting data in real time across multiple time points. There was little variation in the number of patients responding between text message survey, UTI diary, and online survey, but more patients participated in the text message survey than the UTI diary app. The choice between designing a text message survey or UTI diary app will depend on the age profile of patients and the type of information the researchers' desire. ClinicalTrials.gov NCT01913860; https://clinicaltrials.gov/ct2/show/NCT01913860 (Archived by WebCite at http://www.webcitation.org/6pfgCztgT). ©Sinead Duane, Meera Tandan, Andrew W Murphy, Akke Vellinga. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 25.04.2017.
2013-01-01
Background Few validated guidelines exist for developing messages in health promotion practice. In clinical practice, the Appraisal of Guidelines, Research, and Evaluation II (AGREE II) Instrument is the international gold standard for guideline assessment, development, and reporting. In a case study format, this paper describes the application of the AGREE II principles to guide the development of health promotion guidelines for constructing messages to supplement the new Canadian Physical Activity Guidelines (CPAG) released in 2011. Methods The AGREE II items were modified to suit the objectives of developing messages that (1) clarify key components of the new CPAG and (2) motivate Canadians to meet the CPAG. The adapted AGREE II Instrument was used as a systematic guide for the recommendation development process. Over a two-day meeting, five workgroups (one for each CPAG – child, youth, adult, older adult – and one overarching group) of five to six experts (including behavior change, messaging, and exercise physiology researchers, key stakeholders, and end users) reviewed and discussed evidence for creating and targeting messages to supplement the new CPAG. Recommendations were summarized and reviewed by workgroup experts. The recommendations were pilot tested among end users and then finalized by the workgroup. Results The AGREE II was a useful tool in guiding the development of evidence-based specific recommendations for constructing and disseminating messages that supplement and increase awareness of the new CPAG (child, youth, adults, and older adults). The process also led to the development of sample messages and provision of a rationale alongside the recommendations. Conclusions To our knowledge, these are the first set of evidence-informed recommendations for constructing and disseminating messages supplementing physical activity guidelines. This project also represents the first application of international standards for guideline development (i.e., AGREE II) to the creation of practical recommendations specifically aimed to inform health promotion and public health practice. The messaging recommendations have the potential to increase the public health impact of evidence-based guidelines. PMID:23634998
Hyperswitch Communication Network Computer
NASA Technical Reports Server (NTRS)
Peterson, John C.; Chow, Edward T.; Priel, Moshe; Upchurch, Edwin T.
1993-01-01
Hyperswitch Communications Network (HCN) computer is prototype multiple-processor computer being developed. Incorporates improved version of hyperswitch communication network described in "Hyperswitch Network For Hypercube Computer" (NPO-16905). Designed to support high-level software and expansion of itself. HCN computer is message-passing, multiple-instruction/multiple-data computer offering significant advantages over older single-processor and bus-based multiple-processor computers, with respect to price/performance ratio, reliability, availability, and manufacturing. Design of HCN operating-system software provides flexible computing environment accommodating both parallel and distributed processing. Also achieves balance among following competing factors; performance in processing and communications, ease of use, and tolerance of (and recovery from) faults.
Aspen: A microsimulation model of the economy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Basu, N.; Pryor, R.J.; Quint, T.
1996-10-01
This report presents, Aspen. Sandia National Laboratories is developing this new agent-based microeconomic simulation model of the U.S. economy. The model is notable because it allows a large number of individual economic agents to be modeled at a high level of detail and with a great degree of freedom. Some features of Aspen are (a) a sophisticated message-passing system that allows individual pairs of agents to communicate, (b) the use of genetic algorithms to simulate the learning of certain agents, and (c) a detailed financial sector that includes a banking system and a bond market. Results from runs of themore » model are also presented.« less
Connected vehicle pilot - privacy white paper.
DOT National Transportation Integrated Search
2016-09-21
Connected Vehicle (CV) technologies is beneficial when users feel safe in broadcasting their Basic Safety Message and trust in their safety and mobility applications. Users must also accept and have a right to know how their privacy is impacted by be...
Advanced Shipboard Control Systems
2001-05-07
Nov 1989: 41-47. Carnivale, J. A. DD-21 Presentation. Jan 1999. Deitel H.M. and P. J. Deitel . C++ How To Program . Upper Saddle River...One distinct advantage to an OSI model is that each level of the network is clearly defined, allowing different users to understand how a specific...Pri) field that tells the layer how this message is to be sent. The L2Hdr is an 8 bit section of the Link Protocol Data Unit/MAC Protocol Data
NASA Astrophysics Data System (ADS)
Gaik Tay, Kim; Cheong, Tau Han; Foong Lee, Ming; Kek, Sie Long; Abdul-Kahar, Rosmila
2017-08-01
In the previous work on Euler’s spreadsheet calculator for solving an ordinary differential equation, the Visual Basic for Application (VBA) programming was used, however, a graphical user interface was not developed to capture users input. This weakness may make users confuse on the input and output since those input and output are displayed in the same worksheet. Besides, the existing Euler’s spreadsheet calculator is not interactive as there is no prompt message if there is a mistake in inputting the parameters. On top of that, there are no users’ instructions to guide users to input the derivative function. Hence, in this paper, we improved previous limitations by developing a user-friendly and interactive graphical user interface. This improvement is aimed to capture users’ input with users’ instructions and interactive prompt error messages by using VBA programming. This Euler’s graphical user interface spreadsheet calculator is not acted as a black box as users can click on any cells in the worksheet to see the formula used to implement the numerical scheme. In this way, it could enhance self-learning and life-long learning in implementing the numerical scheme in a spreadsheet and later in any programming language.
Chaos synchronization communication using extremely unsymmetrical bidirectional injections.
Zhang, Wei Li; Pan, Wei; Luo, Bin; Zou, Xi Hua; Wang, Meng Yao; Zhou, Zhi
2008-02-01
Chaos synchronization and message transmission between two semiconductor lasers with extremely unsymmetrical bidirectional injections (EUBIs) are discussed. By using EUBIs, synchronization is realized through injection locking. Numerical results show that if the laser subjected to strong injection serves as the receiver, chaos pass filtering (CPF) of the system is similar to that of unidirectional coupled systems. Moreover, if the other laser serves as the receiver, a stronger CPF can be obtained. Finally, we demonstrate that messages can be extracted successfully from either of the two transmission directions of the system.
Using Text Message Surveys to Evaluate a Mobile Sexual Health Question-and-Answer Service.
Willoughby, Jessica Fitts; L'Engle, Kelly Ladin; Jackson, Kennon; Brickman, Jared
2018-01-01
Text message programs for sexual health are becoming increasingly popular as practitioners aim to meet youth on media they use frequently. Two-way mobile health (mHealth) interventions allow for feedback solicitation from participants. This study explores the use of a text message survey to assess demographics and program feedback from users of an adolescent sexual health text message question-and-answer service. Development and feasibility of the short-message service survey are discussed. The text message survey achieved a 43.9% response rate, which is comparable to response rates of surveys conducted via other methods. When compared to respondents who used the service and completed an online in-school questionnaire, text survey respondents were more likely to be female and older. They also reported higher service satisfaction. Results have implications for text message service providers and researchers. This article examines a community application of a new intervention strategy and research methodology.
Diabetes education via mobile text messaging.
Wangberg, Silje C; Arsand, Eirik; Andersson, Niklas
2006-01-01
Living with diabetes makes great educational demands on a family. We have tested the feasibility of using the mobile phone short message service (SMS) for reaching people with diabetes information. We also assessed user satisfaction and perceived pros and cons of the medium through interviews. Eleven parents of children with type 1 diabetes received messages for 11 weeks. The parents were positive about the system and said that they would like to continue to use it. The pop-up reminding effect of SMS messages in busy everyday life was noted as positive. Some parents experienced the messages as somewhat intrusive, arriving too often and at inconvenient times. The parents also noted the potential of the messages to facilitate communication with their adolescent children. The inability to store all of the messages or to print them out were seen as major disadvantages. Overall, the SMS seems to hold promise as means of delivering diabetes information.
ERIC Educational Resources Information Center
Elias, Mohd Syahrizad; Mohamad Ali, Ahmad Zamzuri
2016-01-01
Simulation-aided learning has capability in improving student's learning performance. However, the positive effect of simulation-aided learning still being discussed, which at times has not played the purported role expected. To address these problems, Multimedia Instructional Message (MIM) appeared to be an essential supporting tool in ensuring…
Text-Message Abbreviations and Language Skills in High School and University Students
ERIC Educational Resources Information Center
De Jonge, Sarah; Kemp, Nenagh
2012-01-01
This study investigated the use of text-message abbreviations (textisms) in Australian adolescents and young adults, and relations between textism use and literacy abilities. Fifty-two high school students aged 13-15 years, and 53 undergraduates aged 18-24 years, all users of predictive texting, translated conventional English sentences into…
No A 4 U: The Relationship between Multitasking and Academic Performance
ERIC Educational Resources Information Center
Junco, Reynol; Cotten, Shelia R.
2012-01-01
The proliferation and ease of access to information and communication technologies (ICTs) such as Facebook, text messaging, and instant messaging has resulted in ICT users being presented with more real-time streaming data than ever before. Unfortunately, this has also resulted in individuals increasingly engaging in multitasking as an information…
Targeting hearing health messages for users of personal listening devices.
Punch, Jerry L; Elfenbein, Jill L; James, Richard R
2011-06-01
To summarize the literature on patterns and risks of personal listening device (PLD) use, which is ubiquitous among teenagers and young adults. The review emphasizes risk awareness, health concerns of PLD users, inclination to take actions to prevent hearing loss from exposure to loud music, and specific instructional messages that are likely to motivate such preventive actions. We conducted a systematic, critical review of the English-language scholarly literature on the topic of PLDs and their potential effects on human hearing. We used popular database search engines to locate relevant professional journals, books, recent conference papers, and other reference sources. Adolescents and young adults appear to have somewhat different perspectives on risks to hearing posed by PLD use. Messages designed to suggest actions they might take in avoiding or reducing these risks, therefore, need to be targeted to achieve optimal outcomes. We offer specific recommendations regarding the framing and content of educational messages that are most likely to be effective in reducing the potentially harmful effects of loud music on hearing in these populations, and we note future research needs.
Underhill, Kristen; Morrow, Kathleen M; Colleran, Christopher; Calabrese, Sarah K; Operario, Don; Salovey, Peter; Mayer, Kenneth H
2016-07-01
We investigated message comprehension and message framing preferences for communicating about PrEP efficacy with US MSM. We conducted eight focus groups (n = 38) and n = 56 individual interviews with MSM in Providence, RI. Facilitators probed comprehension, credibility, and acceptability of efficacy messages, including percentages, non-numerical paraphrases, efficacy ranges versus point estimates, and success- versus failure-framed messages. Our findings indicated a range of comprehension and operational understandings of efficacy messages. Participants tended to prefer percentage-based and success-framed messages, although preferences varied for communicating about efficacy using a single percentage versus a range. Participants reported uncertainty about how to interpret numerical estimates, and many questioned whether trial results would predict personal effectiveness. These results suggest that providers and researchers implementing PrEP may face challenges in communicating with users about efficacy. Efforts to educate MSM about PrEP should incorporate percentage-based information, and message framing decisions may influence message credibility and overall PrEP acceptability.
Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
Liao, Yongjian; He, Yichuan; Li, Fagen; Jiang, Shaoquan; Zhou, Shijie
2018-01-10
Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users' data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their "verify-then-decrypt" skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user.
Ahn, Sun Joo Grace
2015-01-01
In immersive virtual environments (IVEs), users may observe negative consequences of a risky health behavior in a personally involving way via digital simulations. In the context of an ongoing health promotion campaign, IVEs coupled with pamphlets are proposed as a novel messaging strategy to heighten personal relevance and involvement with the issue of soft-drink consumption and obesity, as well as perceptions that the risk is proximal and imminent. The framework of construal level theory guided the design of a 2 (tailoring: other vs. self) × 2 (medium: pamphlet only vs. pamphlet with IVEs) between-subjects experiment to test the efficacy in reducing the consumption of soft drinks over 1 week. Immediately following exposure, tailoring the message to the self (vs. other) seemed to be effective in reducing intentions to consume soft drinks. The effect of tailoring dissipated after 1 week, and measures of actual soft-drink consumption 1 week following experimental treatments demonstrated that coupling IVEs with the pamphlet was more effective. Behavioral intention was a significant predictor of actual behavior, but underlying mechanisms driving intentions and actual behavior were distinct. Results prescribed a messaging strategy that incorporates both tailoring and coupling IVEs with traditional media to increase behavioral changes over time.
SU-F-T-301: Planar Dose Pass Rate Inflation Due to the MapCHECK Measurement Uncertainty Function
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bailey, D; Spaans, J; Kumaraswamy, L
Purpose: To quantify the effect of the Measurement Uncertainty function on planar dosimetry pass rates, as analyzed with Sun Nuclear Corporation analytic software (“MapCHECK” or “SNC Patient”). This optional function is toggled on by default upon software installation, and automatically increases the user-defined dose percent difference (%Diff) tolerance for each planar dose comparison. Methods: Dose planes from 109 IMRT fields and 40 VMAT arcs were measured with the MapCHECK 2 diode array, and compared to calculated planes from a commercial treatment planning system. Pass rates were calculated within the SNC analytic software using varying calculation parameters, including Measurement Uncertainty onmore » and off. By varying the %Diff criterion for each dose comparison performed with Measurement Uncertainty turned off, an effective %Diff criterion was defined for each field/arc corresponding to the pass rate achieved with MapCHECK Uncertainty turned on. Results: For 3%/3mm analysis, the Measurement Uncertainty function increases the user-defined %Diff by 0.8–1.1% average, depending on plan type and calculation technique, for an average pass rate increase of 1.0–3.5% (maximum +8.7%). For 2%, 2 mm analysis, the Measurement Uncertainty function increases the user-defined %Diff by 0.7–1.2% average, for an average pass rate increase of 3.5–8.1% (maximum +14.2%). The largest increases in pass rate are generally seen with poorly-matched planar dose comparisons; the MapCHECK Uncertainty effect is markedly smaller as pass rates approach 100%. Conclusion: The Measurement Uncertainty function may substantially inflate planar dose comparison pass rates for typical IMRT and VMAT planes. The types of uncertainties incorporated into the function (and their associated quantitative estimates) as described in the software user’s manual may not accurately estimate realistic measurement uncertainty for the user’s measurement conditions. Pass rates listed in published reports or otherwise compared to the results of other users or vendors should clearly indicate whether the Measurement Uncertainty function is used.« less
Disaster Relief Appropriations Act, 2013
Rep. Rogers, Harold [R-KY-5
2011-02-11
Senate - 12/30/2012 Message on Senate action sent to the House. (All Actions) Notes: This bill was for a time the Senate legislative vehicle for Hurricane Sandy supplemental appropriations. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Liang, Yuhua Jake; Lee, Seungcheol Austin
2016-09-01
Human-robot interaction (HRI) will soon transform and shift the communication landscape such that people exchange messages with robots. However, successful HRI requires people to trust robots, and, in turn, the trust affects the interaction. Although prior research has examined the determinants of human-robot trust (HRT) during HRI, no research has examined the messages that people received before interacting with robots and their effect on HRT. We conceptualize these messages as SMART (Strategic Messages Affecting Robot Trust). Moreover, we posit that SMART can ultimately affect actual HRI outcomes (i.e., robot evaluations, robot credibility, participant mood) by affording the persuasive influences from user-generated content (UGC) on participatory Web sites. In Study 1, participants were assigned to one of two conditions (UGC/control) in an original experiment of HRT. Compared with the control (descriptive information only), results showed that UGC moderated the correlation between HRT and interaction outcomes in a positive direction (average Δr = +0.39) for robots as media and robots as tools. In Study 2, we explored the effect of robot-generated content but did not find similar moderation effects. These findings point to an important empirical potential to employ SMART in future robot deployment.
Buis, Lorraine R; Hirzel, Lindsey; Turske, Scott A; Des Jardins, Terrisca R; Yarandi, Hossein; Bondurant, Patricia
2013-12-19
Although there is great enthusiasm in both the public and private sector for the further development and use of large-scale consumer-facing public health applications for mobile platforms, little is known about user experience and satisfaction with this type of approach. As a part of the Beacon Community Cooperative Agreement Program, txt4health, a public-facing, mobile phone-based health information service targeting type 2 diabetes, was launched in 3 Beacon Communities: the Southeast Michigan Beacon Community in Detroit, MI, the Greater Cincinnati Beacon Community in Cincinnati, OH, and the Crescent City Beacon Community in New Orleans, LA. This program was marketed via large public health campaigns and drew many users within the respective communities. The purpose of this investigation was to use the RE-AIM framework to document txt4health efficacy by focusing on perceptions of satisfaction, usage, and behavior change among individuals who used txt4health in pilot studies in Southeast Michigan and Greater Cincinnati. We conducted a multimodal user survey with txt4health users recruited via text message through the program to understand participant perceptions of program use and satisfaction, as well as self-reported perceptions of behavior change as a result of using txt4health. Txt4health users reported very high levels of program satisfaction, with 67.1% (108/161) reporting satisfaction scores of ≥8 on a 10-point scale, with 10 equivalent to most satisfied (mean 8.2, SD 1.6). All survey participants agreed/strongly agreed that the messages included in txt4health were clear and easy to understand (100.0%, 160/160), and most found txt4health made them knowledgeable about their risk for type 2 diabetes (88.1%, 140/159) and made them conscious of their diet and physical activity (88.8%, 142/160). Most participants reported that txt4health helped them to make behavior changes related to diet; after having completed txt4health, most agreed/strongly agreed that they are more likely to replace sugary drinks, such as juice or soda, with water (78.0%, 124/159), have a piece of fresh fruit instead of dessert (74.2%, 118/159), substitute a small salad for chips or fries when dining out (76.1%, 121/159), buy healthier foods when grocery shopping (79.7%, 126/158), and eat more grilled, baked, or broiled foods instead of fried (75.5%, 120/159). Results from this study suggest that participants in txt4health, a large-scale, public health-focused text message program targeting type 2 diabetes, have positive perceptions of the program and that participation has led to positive behavior change.
National Severe Storms Forecast Center
NASA Technical Reports Server (NTRS)
1977-01-01
The principal mission of the National Severe Storms Forecast Center (NSSFC) is to maintain a continuous watch of weather developments that are capable of producing severe local storms, including tornadoes, and to prepare and issue messages designated as either Weather Outlooks or Tornado or Severe Thunderstorm Watches for dissemination to the public and aviation services. In addition to its assigned responsibility at the national level, the NSSFC is involved in a number of programs at the regional and local levels. Subsequent subsections and paragraphs describe the NSSFC, its users, inputs, outputs, interfaces, capabilities, workload, problem areas, and future plans in more detail.
Twitmographics: Learning the Emergent Properties of the Twitter Community
NASA Astrophysics Data System (ADS)
Cheong, Marc; Lee, Vincent
This paper presents a framework for discovery of the emergent properties of users of the Twitter microblogging platform. The novelty of our methodology is the use of machine-learning methods to deduce user demographic information and online usage patterns and habits not readily apparent from the raw messages posted on Twitter. This is different from existing social network analysis performed on de facto social networks such as Face-book, in the sense that we use publicly available metadata from Twitter messages to explore the inherent characteristics about different segments of the Twitter community, in a simple yet effective manner. Our framework is coupled with the self-organizing map visualization method, and tested on a corpus of messages which deal with issues of socio politi-cal and economic impact, to gain insight into the properties of human interaction via Twitter as a medium for computer-mediated self-expression.
Text Messaging for Addiction: A Review
Keoleian, Victoria; Polcin, Douglas; Galloway, Gantt P.
2015-01-01
Individuals seeking treatment for addiction often experience barriers due to cost, lack of local treatment resources, or either school or work schedule conflicts. Text messaging-based addiction treatment is inexpensive and has the potential to be widely accessible in real time. We conducted a comprehensive literature review identifying 11 published randomized controlled trials (RCTs) evaluating text messaging-based interventions for tobacco smoking, 4 studies for reducing alcohol consumption, 1 pilot study in former methamphetamine (MA) users, and 1 study based on qualitative interviews with cannabis users. Abstinence outcome results in RCTs of smokers willing to make a quit attempt have been positive overall in the short term and as far out as at 6 and 12 months. Studies aimed at reducing alcohol consumption have been promising. More data are needed to evaluate the feasibility, acceptability, and efficacy of this approach for other substance use problems. PMID:25950596
Combining Distributed and Shared Memory Models: Approach and Evolution of the Global Arrays Toolkit
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nieplocha, Jarek; Harrison, Robert J.; Kumar, Mukul
2002-07-29
Both shared memory and distributed memory models have advantages and shortcomings. Shared memory model is much easier to use but it ignores data locality/placement. Given the hierarchical nature of the memory subsystems in the modern computers this characteristic might have a negative impact on performance and scalability. Various techniques, such as code restructuring to increase data reuse and introducing blocking in data accesses, can address the problem and yield performance competitive with message passing[Singh], however at the cost of compromising the ease of use feature. Distributed memory models such as message passing or one-sided communication offer performance and scalability butmore » they compromise the ease-of-use. In this context, the message-passing model is sometimes referred to as?assembly programming for the scientific computing?. The Global Arrays toolkit[GA1, GA2] attempts to offer the best features of both models. It implements a shared-memory programming model in which data locality is managed explicitly by the programmer. This management is achieved by explicit calls to functions that transfer data between a global address space (a distributed array) and local storage. In this respect, the GA model has similarities to the distributed shared-memory models that provide an explicit acquire/release protocol. However, the GA model acknowledges that remote data is slower to access than local data and allows data locality to be explicitly specified and hence managed. The GA model exposes to the programmer the hierarchical memory of modern high-performance computer systems, and by recognizing the communication overhead for remote data transfer, it promotes data reuse and locality of reference. This paper describes the characteristics of the Global Arrays programming model, capabilities of the toolkit, and discusses its evolution.« less
Performance Measurement, Visualization and Modeling of Parallel and Distributed Programs
NASA Technical Reports Server (NTRS)
Yan, Jerry C.; Sarukkai, Sekhar R.; Mehra, Pankaj; Lum, Henry, Jr. (Technical Monitor)
1994-01-01
This paper presents a methodology for debugging the performance of message-passing programs on both tightly coupled and loosely coupled distributed-memory machines. The AIMS (Automated Instrumentation and Monitoring System) toolkit, a suite of software tools for measurement and analysis of performance, is introduced and its application illustrated using several benchmark programs drawn from the field of computational fluid dynamics. AIMS includes (i) Xinstrument, a powerful source-code instrumentor, which supports both Fortran77 and C as well as a number of different message-passing libraries including Intel's NX Thinking Machines' CMMD, and PVM; (ii) Monitor, a library of timestamping and trace -collection routines that run on supercomputers (such as Intel's iPSC/860, Delta, and Paragon and Thinking Machines' CM5) as well as on networks of workstations (including Convex Cluster and SparcStations connected by a LAN); (iii) Visualization Kernel, a trace-animation facility that supports source-code clickback, simultaneous visualization of computation and communication patterns, as well as analysis of data movements; (iv) Statistics Kernel, an advanced profiling facility, that associates a variety of performance data with various syntactic components of a parallel program; (v) Index Kernel, a diagnostic tool that helps pinpoint performance bottlenecks through the use of abstract indices; (vi) Modeling Kernel, a facility for automated modeling of message-passing programs that supports both simulation -based and analytical approaches to performance prediction and scalability analysis; (vii) Intrusion Compensator, a utility for recovering true performance from observed performance by removing the overheads of monitoring and their effects on the communication pattern of the program; and (viii) Compatibility Tools, that convert AIMS-generated traces into formats used by other performance-visualization tools, such as ParaGraph, Pablo, and certain AVS/Explorer modules.
Applications Performance Under MPL and MPI on NAS IBM SP2
NASA Technical Reports Server (NTRS)
Saini, Subhash; Simon, Horst D.; Lasinski, T. A. (Technical Monitor)
1994-01-01
On July 5, 1994, an IBM Scalable POWER parallel System (IBM SP2) with 64 nodes, was installed at the Numerical Aerodynamic Simulation (NAS) Facility Each node of NAS IBM SP2 is a "wide node" consisting of a RISC 6000/590 workstation module with a clock of 66.5 MHz which can perform four floating point operations per clock with a peak performance of 266 Mflop/s. By the end of 1994, 64 nodes of IBM SP2 will be upgraded to 160 nodes with a peak performance of 42.5 Gflop/s. An overview of the IBM SP2 hardware is presented. The basic understanding of architectural details of RS 6000/590 will help application scientists the porting, optimizing, and tuning of codes from other machines such as the CRAY C90 and the Paragon to the NAS SP2. Optimization techniques such as quad-word loading, effective utilization of two floating point units, and data cache optimization of RS 6000/590 is illustrated, with examples giving performance gains at each optimization step. The conversion of codes using Intel's message passing library NX to codes using native Message Passing Library (MPL) and the Message Passing Interface (NMI) library available on the IBM SP2 is illustrated. In particular, we will present the performance of Fast Fourier Transform (FFT) kernel from NAS Parallel Benchmarks (NPB) under MPL and MPI. We have also optimized some of Fortran BLAS 2 and BLAS 3 routines, e.g., the optimized Fortran DAXPY runs at 175 Mflop/s and optimized Fortran DGEMM runs at 230 Mflop/s per node. The performance of the NPB (Class B) on the IBM SP2 is compared with the CRAY C90, Intel Paragon, TMC CM-5E, and the CRAY T3D.
Parallelization of a hydrological model using the message passing interface
Wu, Yiping; Li, Tiejian; Sun, Liqun; Chen, Ji
2013-01-01
With the increasing knowledge about the natural processes, hydrological models such as the Soil and Water Assessment Tool (SWAT) are becoming larger and more complex with increasing computation time. Additionally, other procedures such as model calibration, which may require thousands of model iterations, can increase running time and thus further reduce rapid modeling and analysis. Using the widely-applied SWAT as an example, this study demonstrates how to parallelize a serial hydrological model in a Windows® environment using a parallel programing technology—Message Passing Interface (MPI). With a case study, we derived the optimal values for the two parameters (the number of processes and the corresponding percentage of work to be distributed to the master process) of the parallel SWAT (P-SWAT) on an ordinary personal computer and a work station. Our study indicates that model execution time can be reduced by 42%–70% (or a speedup of 1.74–3.36) using multiple processes (two to five) with a proper task-distribution scheme (between the master and slave processes). Although the computation time cost becomes lower with an increasing number of processes (from two to five), this enhancement becomes less due to the accompanied increase in demand for message passing procedures between the master and all slave processes. Our case study demonstrates that the P-SWAT with a five-process run may reach the maximum speedup, and the performance can be quite stable (fairly independent of a project size). Overall, the P-SWAT can help reduce the computation time substantially for an individual model run, manual and automatic calibration procedures, and optimization of best management practices. In particular, the parallelization method we used and the scheme for deriving the optimal parameters in this study can be valuable and easily applied to other hydrological or environmental models.
Comparative study of mothers' knowledge of children immunization before and after mass media.
el-Shazly, M K; Farghaly, N F; Abou Khatwa, S A; Ibrahim, A G
1991-01-01
Past experience about immunization programs calls for continuous monitoring of a healthy attitude among users towards vaccination. The aim of this study was to assess the effect of health education messages (mass media) on knowledge and practice of mothers as regards compulsory vaccination schedule. Data were collected from 250 females attending MCH centers during the first half of 1991 for either vaccinating their children or receiving antenatal care (exposed group). These data were compared to the data collected from a group of mothers before implementation of the intense mass media campaign on immunization (1983), (non-exposed group). There was a significant increase in the mean score of knowledge among the exposed mothers. The mass media messages became the main source of information among the majority of the exposed group. Females utilizing mass media as their main source of information were largely having a satisfactory level of knowledge. This study recommends enforcement of mass media educational campaigns on childhood immunization as well as reconsideration paid to the nature and content of messages.
A Context-Aware-Based Audio Guidance System for Blind People Using a Multimodal Profile Model
Lin, Qing; Han, Youngjoon
2014-01-01
A wearable guidance system is designed to provide context-dependent guidance messages to blind people while they traverse local pathways. The system is composed of three parts: moving scene analysis, walking context estimation and audio message delivery. The combination of a downward-pointing laser scanner and a camera is used to solve the challenging problem of moving scene analysis. By integrating laser data profiles and image edge profiles, a multimodal profile model is constructed to estimate jointly the ground plane, object locations and object types, by using a Bayesian network. The outputs of the moving scene analysis are further employed to estimate the walking context, which is defined as a fuzzy safety level that is inferred through a fuzzy logic model. Depending on the estimated walking context, the audio messages that best suit the current context are delivered to the user in a flexible manner. The proposed system is tested under various local pathway scenes, and the results confirm its efficiency in assisting blind people to attain autonomous mobility. PMID:25302812
New Enhancements in April 85 NASTRAN Release
NASA Technical Reports Server (NTRS)
Chan, G. C.
1985-01-01
Several features were added to COSMIC NASTRAN, along with some enhancements to improve or update existing capabilities. Most of these additions and enhancements were provided by industry users to be incorporated into NASTRAN for wider use. DIAG 48 provides a synopsis of significant developments in past NASTRAN releases (1983-1985) and indexes all diagnostic output messages and operation requests (DOMOR). Other features include: volume and surface computation of the 2-D and 3-D elements, NOLIN5 input and; NASTRAN PLOTOPT-N (where N = 2, 3, 4, or 5); shrink element plots; and output scan. A nonprint option on stress and force output request cards was added. Automated find and nofind options on the plot card, fully stressed design, high level plate elements, eigenvalue messages, and upgrading of all FORTRAN source code to the ANSI standard are enhancements made.
John J. Confer; Andrew J. Mowen; Alan K. Graefe; James D. Absher
2000-01-01
The Leave No Trace (LNT) educational program has the potential to provide wilderness users with useful minimum impact information. For LNT to be effective, managers need to understand who is most/least aware of minimum impact practices and how to expose users to LNT messages. This study examined LNT knowledge among various user groups at an Eastern wilderness area and...
2012-11-01
validation using calibrated grounding. In 2007 BRIMS Conference Proceedings, Norfolk, VA. Simon, H. A. (1957). Administrative Behavior: A study of...Construct will write the output to the directory specified by the path name. Users should ensure that if they have opened any output files (e.g., in Excel... open an input file, it will exit and close. There are times when an error message is not present to the user in this situation! Users should ensure
Analysis of an ABE Scheme with Verifiable Outsourced Decryption
He, Yichuan; Li, Fagen; Jiang, Shaoquan; Zhou, Shijie
2018-01-01
Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their “verify-then-decrypt” skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user. PMID:29320418
Modelling parallel programs and multiprocessor architectures with AXE
NASA Technical Reports Server (NTRS)
Yan, Jerry C.; Fineman, Charles E.
1991-01-01
AXE, An Experimental Environment for Parallel Systems, was designed to model and simulate for parallel systems at the process level. It provides an integrated environment for specifying computation models, multiprocessor architectures, data collection, and performance visualization. AXE is being used at NASA-Ames for developing resource management strategies, parallel problem formulation, multiprocessor architectures, and operating system issues related to the High Performance Computing and Communications Program. AXE's simple, structured user-interface enables the user to model parallel programs and machines precisely and efficiently. Its quick turn-around time keeps the user interested and productive. AXE models multicomputers. The user may easily modify various architectural parameters including the number of sites, connection topologies, and overhead for operating system activities. Parallel computations in AXE are represented as collections of autonomous computing objects known as players. Their use and behavior is described. Performance data of the multiprocessor model can be observed on a color screen. These include CPU and message routing bottlenecks, and the dynamic status of the software.
Comparative analysis of data base management systems
NASA Technical Reports Server (NTRS)
Smith, R.
1983-01-01
A study to determine if the Remote File Inquiry (RFI) system would handle the future requirements of the user community is discussed. RFI is a locally written and locally maintained on-line query/update package. The current and future on-line requirements of the user community were studied. Additional consideration was given to the types of data structuring the users required. The survey indicated the features of greatest benefit were: sort, subtotals, totals, record selection, storage of queries, global updating and the ability to page break. The major deficiencies were: one level of hierarchy, excessive response time, software unreliability, difficult to add, delete and modify records, complicated error messages and the lack of ability to perform interfield comparisons. Missing features users required were: formatted screens, interfield comparions, interfield arithmetic, multiple file access, security and data integrity. The survey team recommended Kennedy Space Center move forward to state-of-the-art software, a Data Base Management System which is thoroughly tested and easy to implement and use.
Examining Factors of Engagement With Digital Interventions for Weight Management: Rapid Review
2017-01-01
Background Digital interventions for weight management provide a unique opportunity to target daily lifestyle choices and eating behaviors over a sustained period of time. However, recent evidence has demonstrated a lack of user engagement with digital health interventions, impacting on the levels of intervention effectiveness. Thus, it is critical to identify the factors that may facilitate user engagement with digital health interventions to encourage behavior change and weight management. Objective The aim of this study was to identify and synthesize the available evidence to gain insights about users’ perspectives on factors that affect engagement with digital interventions for weight management. Methods A rapid review methodology was adopted. The search strategy was executed in the following databases: Web of Science, PsycINFO, and PubMed. Studies were eligible for inclusion if they investigated users’ engagement with a digital weight management intervention and were published from 2000 onwards. A narrative synthesis of data was performed on all included studies. Results A total of 11 studies were included in the review. The studies were qualitative, mixed-methods, or randomized controlled trials. Some of the studies explored features influencing engagement when using a Web-based digital intervention, others specifically explored engagement when accessing a mobile phone app, and some looked at engagement after text message (short message service, SMS) reminders. Factors influencing engagement with digital weight management interventions were found to be both user-related (eg, perceived health benefits) and digital intervention–related (eg, ease of use and the provision of personalized information). Conclusions The findings highlight the importance of incorporating user perspectives during the digital intervention development process to encourage engagement. The review contributes to our understanding of what facilitates user engagement and points toward a coproduction approach for developing digital interventions for weight management. Particularly, it highlights the importance of thinking about user-related and digital tool–related factors from the very early stages of the intervention development process. PMID:29061557
Durusoy, Raika; Hassoy, Hür; Özkurt, Ahmet; Karababa, Ali Osman
2017-06-02
Health outcomes of electromagnetic fields (EMF) from mobile phones and their base stations are of concern. Conducting multidisciplinary research, targeting children and exploring dose-response are recommended. Our objectives were to describe the mobile phone usage characteristics of high school students and to explore the association between mobile phone usage characteristics, high school EMF levels and self-reported symptoms. This cross-sectional study's data were collected by a survey questionnaire and by measuring school EMF levels between November 2009 and April 2011. A sample size of 2530 was calculated from a total of 20,493 students in 26 high schools and 2150 (85.0%) were included in the analysis. The frequencies of 23 symptoms were questioned and analysed according to 16 different aspects of mobile phone use and school EMF levels, exploring also dose-response. School EMF levels were measured with Aaronia Spectran HF-4060 device. Chi square and trend tests were used for univariate and logistic regression was used for multivariate analyses. Among participants, 2021 (94.0%) were using mobile phones and 129 (6.0%) were not. Among users, 49.4% were speaking <10 min and 52.2% were sending/receiving 75 or more messages per day. Headache, fatigue and sleep disturbances were observed respectively 1.90 (95% CI 1.30-2.77), 1.78 (1.21-2.63) and 1.53 (1.05-2.21) times more among mobile phone users. Dose-response relationships were observed especially for the number of calls per day, total duration of calls per day, total number of text messages per day, position and status of mobile phone at night and making calls while charging as exposures and headache, concentration difficulties, fatigue and sleep disturbances as general symptoms and warming of the ear and flushing as local symptoms. We found an association between mobile phone use and especially headache, concentration difficulties, fatigue, sleep disturbances and warming of the ear showing also dose-response. We have found limited associations between vicinity to base stations and some general symptoms; however, we did not find any association with school EMF levels. Decreasing the numbers of calls and messages, decreasing the duration of calls, using earphones, keeping the phone away from the head and body and similar precautions might decrease the frequencies or prevalence of the symptoms.
Enabling Energy Saving Innovations Act
Rep. Aderholt, Robert B. [R-AL-4
2012-04-26
Senate - 09/24/2012 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.6582, which became Public Law 112-210 on 12/18/2012. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
A Model for Speedup of Parallel Programs
1997-01-01
Sanjeev. K Setia . The interaction between mem- ory allocation and adaptive partitioning in message- passing multicomputers. In IPPS Workshop on Job...Scheduling Strategies for Parallel Processing, pages 89{99, 1995. [15] Sanjeev K. Setia and Satish K. Tripathi. A compar- ative analysis of static
Interstate Recognition of Notarizations Act of 2010
Rep. Aderholt, Robert B. [R-AL-4
2009-10-14
House - 11/17/2010 On motion to refer the bill and the accompanying veto message to the Committee on the Judiciary. Agreed to without objection. (All Actions) Tracker: This bill has the status Failed to pass over vetoHere are the steps for Status of Legislation:
Communication Studies of DMP and SMP Machines
NASA Technical Reports Server (NTRS)
Sohn, Andrew; Biswas, Rupak; Chancellor, Marisa K. (Technical Monitor)
1997-01-01
Understanding the interplay between machines and problems is key to obtaining high performance on parallel machines. This paper investigates the interplay between programming paradigms and communication capabilities of parallel machines. In particular, we explicate the communication capabilities of the IBM SP-2 distributed-memory multiprocessor and the SGI PowerCHALLENGEarray symmetric multiprocessor. Two benchmark problems of bitonic sorting and Fast Fourier Transform are selected for experiments. Communication-efficient algorithms are developed to exploit the overlapping capabilities of the machines. Programs are written in Message-Passing Interface for portability and identical codes are used for both machines. Various data sizes and message sizes are used to test the machines' communication capabilities. Experimental results indicate that the communication performance of the multiprocessors are consistent with the size of messages. The SP-2 is sensitive to message size but yields a much higher communication overlapping because of the communication co-processor. The PowerCHALLENGEarray is not highly sensitive to message size and yields a low communication overlapping. Bitonic sorting yields lower performance compared to FFT due to a smaller computation-to-communication ratio.
Joining the Twitter Conversation
ERIC Educational Resources Information Center
Hagman, Jessica
2012-01-01
Twitter is a microblogging site, one where users send out messages of no more than 140 characters. The messages, known as tweets, can be seen by anyone who follows the account. Twitter is free, but free as in kittens, not as in pizza. To use it effectively, it will take time to learn the language and develop content. When used effectively, Twitter…
Sources of HIV-Prevention Information for Individuals at High Risk.
ERIC Educational Resources Information Center
Sagrestano, Lynda M.; Heiss-Wendt, Renate M.; Mizan, Ainon N.; Kittleson, Mark J.; Sarvela, Paul D.
2001-01-01
Identified the best methods of reaching people at high risk with HIV-prevention messages. Data from men who had sex with men, injection drug users, sex workers, HIV-positive people, heterosexuals, migrant workers, and perinatal women indicated that over 70 percent were exposed to HIV-prevention messages, though sources of exposure varied by risk…
Instant Messaging: A Written or an Oral Genre?
ERIC Educational Resources Information Center
Majidi, Mojdeh
2005-01-01
This study aims to investigate Instant Messaging from the new rhetorical genre perspective. Considering IM as a primary genre (Bakhtin, 1986) I intend to examine its social motive and social and textual features. Also, using Vygotsky's (1978, 1986) concept of situated learning, I will explain how IM users learn the genre to communicate through it.…
NASA Astrophysics Data System (ADS)
Sakata, Ayaka; Xu, Yingying
2018-03-01
We analyse a linear regression problem with nonconvex regularization called smoothly clipped absolute deviation (SCAD) under an overcomplete Gaussian basis for Gaussian random data. We propose an approximate message passing (AMP) algorithm considering nonconvex regularization, namely SCAD-AMP, and analytically show that the stability condition corresponds to the de Almeida-Thouless condition in spin glass literature. Through asymptotic analysis, we show the correspondence between the density evolution of SCAD-AMP and the replica symmetric (RS) solution. Numerical experiments confirm that for a sufficiently large system size, SCAD-AMP achieves the optimal performance predicted by the replica method. Through replica analysis, a phase transition between replica symmetric and replica symmetry breaking (RSB) region is found in the parameter space of SCAD. The appearance of the RS region for a nonconvex penalty is a significant advantage that indicates the region of smooth landscape of the optimization problem. Furthermore, we analytically show that the statistical representation performance of the SCAD penalty is better than that of \
Mapping a battlefield simulation onto message-passing parallel architectures
NASA Technical Reports Server (NTRS)
Nicol, David M.
1987-01-01
Perhaps the most critical problem in distributed simulation is that of mapping: without an effective mapping of workload to processors the speedup potential of parallel processing cannot be realized. Mapping a simulation onto a message-passing architecture is especially difficult when the computational workload dynamically changes as a function of time and space; this is exactly the situation faced by battlefield simulations. This paper studies an approach where the simulated battlefield domain is first partitioned into many regions of equal size; typically there are more regions than processors. The regions are then assigned to processors; a processor is responsible for performing all simulation activity associated with the regions. The assignment algorithm is quite simple and attempts to balance load by exploiting locality of workload intensity. The performance of this technique is studied on a simple battlefield simulation implemented on the Flex/32 multiprocessor. Measurements show that the proposed method achieves reasonable processor efficiencies. Furthermore, the method shows promise for use in dynamic remapping of the simulation.
Guide to a condensed form of NASTRAN
NASA Technical Reports Server (NTRS)
Rogers, J. L., Jr.
1978-01-01
A limited capability form of NASTRAN level 16 is presented to meet the needs of universities and small consulting firms. The input cards, the programming language of the direct matrix abstraction program, the plotting, the problem definition, and the modules' diagnostic messages are described. Sample problems relating to the analysis of linear static, vibration, and buckling are included. This guide can serve as a handbook for instructional courses in the use of NASTRAN or for users who need only the capability provided by the condensed form.
Autoplan: A self-processing network model for an extended blocks world planning environment
NASA Technical Reports Server (NTRS)
Dautrechy, C. Lynne; Reggia, James A.; Mcfadden, Frank
1990-01-01
Self-processing network models (neural/connectionist models, marker passing/message passing networks, etc.) are currently undergoing intense investigation for a variety of information processing applications. These models are potentially very powerful in that they support a large amount of explicit parallel processing, and they cleanly integrate high level and low level information processing. However they are currently limited by a lack of understanding of how to apply them effectively in many application areas. The formulation of self-processing network methods for dynamic, reactive planning is studied. The long-term goal is to formulate robust, computationally effective information processing methods for the distributed control of semiautonomous exploration systems, e.g., the Mars Rover. The current research effort is focusing on hierarchical plan generation, execution and revision through local operations in an extended blocks world environment. This scenario involves many challenging features that would be encountered in a real planning and control environment: multiple simultaneous goals, parallel as well as sequential action execution, action sequencing determined not only by goals and their interactions but also by limited resources (e.g., three tasks, two acting agents), need to interpret unanticipated events and react appropriately through replanning, etc.
Access Protocol For An Industrial Optical Fibre LAN
NASA Astrophysics Data System (ADS)
Senior, John M.; Walker, William M.; Ryley, Alan
1987-09-01
A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.
Characterizing super-spreading in microblog: An epidemic-based information propagation model
NASA Astrophysics Data System (ADS)
Liu, Yu; Wang, Bai; Wu, Bin; Shang, Suiming; Zhang, Yunlei; Shi, Chuan
2016-12-01
As the microblogging services are becoming more prosperous in everyday life for users on Online Social Networks (OSNs), it is more favorable for hot topics and breaking news to gain more attraction very soon than ever before, which are so-called "super-spreading events". In the information diffusion process of these super-spreading events, messages are passed on from one user to another and numerous individuals are influenced by a relatively small portion of users, a.k.a. super-spreaders. Acquiring an awareness of super-spreading phenomena and an understanding of patterns of wide-ranged information propagations benefits several social media data mining tasks, such as hot topic detection, predictions of information propagation, harmful information monitoring and intervention. Taking into account that super-spreading in both information diffusion and spread of a contagious disease are analogous, in this study, we build a parameterized model, the SAIR model, based on well-known epidemic models to characterize super-spreading phenomenon in tweet information propagation accompanied with super-spreaders. For the purpose of modeling information diffusion, empirical observations on a real-world Weibo dataset are statistically carried out. Both the steady-state analysis on the equilibrium and the validation on real-world Weibo dataset of the proposed model are conducted. The case study that validates the proposed model shows that the SAIR model is much more promising than the conventional SIR model in characterizing a super-spreading event of information propagation. In addition, numerical simulations are carried out and discussed to discover how sensitively the parameters affect the information propagation process.
Henry, Jade Vu; Winters, Niall; Lakati, Alice; Oliver, Martin; Geniets, Anne; Mbae, Simon M; Wanjiru, Hannah
2016-06-20
An estimated half of all mobile phone users in Kenya use WhatsApp, an instant messaging platform that provides users an affordable way to send and receive text messages, photos, and other media at the one-to-one, one-to-many, many-to-one, or many-to-many levels. A mobile learning intervention aimed at strengthening supervisory support for community health workers (CHWs) in Kibera and Makueni, Kenya, created a WhatsApp group for CHWs and their supervisors to support supervision, professional development, and team building. We analyzed 6 months of WhatsApp chat logs (from August 19, 2014, to March 1, 2015) and conducted interviews with CHWs and their supervisors to understand how they used this instant messaging tool. During the study period, 1,830 posts were made by 41participants. Photos were a key component of the communication among CHWs and their supervisors: 430 (23.4%) of all posts contained photos or other media. Of the remaining 1,400 text-based posts, 87.6% (n = 1,227) related to at least 1 of 3 defined supervision objectives: (1) quality assurance, (2) communication and information, or (3) supportive environment. This supervision took place in the context of posts about the roll out of the new mobile learning intervention and the delivery of routine health care services, as well as team-building efforts and community development. Our preliminary investigation demonstrates that with minimal training, CHWs and their supervisors tailored the multi-way communication features of this mobile instant messaging technology to enact virtual one-to-one, group, and peer-to-peer forms of supervision and support, and they switched channels of communication depending on the supervisory objectives. We encourage additional research on how health workers incorporate mobile technologies into their practices to develop and implement effective supervisory systems that will safeguard patient privacy, strengthen the formal health system, and create innovative forms of community-based, digitally supported professional development for CHWs. © Henry et al.
Henry, Jade Vu; Winters, Niall; Lakati, Alice; Oliver, Martin; Geniets, Anne; Mbae, Simon M; Wanjiru, Hannah
2016-01-01
ABSTRACT An estimated half of all mobile phone users in Kenya use WhatsApp, an instant messaging platform that provides users an affordable way to send and receive text messages, photos, and other media at the one-to-one, one-to-many, many-to-one, or many-to-many levels. A mobile learning intervention aimed at strengthening supervisory support for community health workers (CHWs) in Kibera and Makueni, Kenya, created a WhatsApp group for CHWs and their supervisors to support supervision, professional development, and team building. We analyzed 6 months of WhatsApp chat logs (from August 19, 2014, to March 1, 2015) and conducted interviews with CHWs and their supervisors to understand how they used this instant messaging tool. During the study period, 1,830 posts were made by 41participants. Photos were a key component of the communication among CHWs and their supervisors: 430 (23.4%) of all posts contained photos or other media. Of the remaining 1,400 text-based posts, 87.6% (n = 1,227) related to at least 1 of 3 defined supervision objectives: (1) quality assurance, (2) communication and information, or (3) supportive environment. This supervision took place in the context of posts about the roll out of the new mobile learning intervention and the delivery of routine health care services, as well as team-building efforts and community development. Our preliminary investigation demonstrates that with minimal training, CHWs and their supervisors tailored the multi-way communication features of this mobile instant messaging technology to enact virtual one-to-one, group, and peer-to-peer forms of supervision and support, and they switched channels of communication depending on the supervisory objectives. We encourage additional research on how health workers incorporate mobile technologies into their practices to develop and implement effective supervisory systems that will safeguard patient privacy, strengthen the formal health system, and create innovative forms of community-based, digitally supported professional development for CHWs. PMID:27353623
Franklin, Victoria Louise; Greene, Alexandra; Waller, Annalu; Greene, Stephen Alan
2008-01-01
Background Guidelines for optimizing type 1 diabetes in young people advocate intensive insulin therapy coupled with personal support from the health care team. “Sweet Talk” is a novel intervention designed to support patients between clinic visits using text messages sent to a mobile phone. Scheduled messages are tailored to patient profiles and diabetes self-management goals, and generic messages include topical “newsletters” and anonymized tips from other participants. The system also allows patients to submit data and questions to the diabetes care team. Objectives The aim was to explore how patients with type 1 diabetes interact with the Sweet Talk system in order to understand its utility to this user group. Methods Subjects were 64 young people with diabetes who were participating in the intervention arms of a randomized controlled trial. All text messages submitted to Sweet Talk during a 12-month period were recorded. Messaging patterns and content were analyzed using mixed quantitative and qualitative methods. Results Patients submitted 1180 messages during the observation period (mean 18.4, median 6). Messaging frequency ranged widely between participants (0-240) with a subset of 5 high users contributing 52% of the total. Patients’ clinical and sociodemographic characteristics were not associated with total messaging frequency, although girls sent significantly more messages unrelated to diabetes than did boys (P = .002). The content of patients’ messages fell into 8 main categories: blood glucose readings, diabetes questions, diabetes information, personal health administration, social messages, technical messages, message errors, and message responses. Unprompted submission of blood glucose values was the most frequent incoming message type (35% of total). Responses to requests for personal experiences and tips generated 40% of all the incoming messages, while topical news items also generated good responses. Patients also used the service to ask questions, submit information about their self-management, and order supplies. No patients nominated supporters to receive text messages about their self-management goals. Another option that was not used was the birthday reminder service. Conclusions Automated, scheduled text messaging successfully engaged young people with diabetes. While the system was primarily designed to provide “push” support to patients, submission of clinical data and queries illustrates that it was seen as a trusted medium for communicating with care providers. Responses to the newsletters and submission of personal experiences and tips for circulation to other participants also illustrate the potential value of such interventions for establishing a sense of community. Although participants submitted relatively few messages, positive responses to the system suggest that most derived passive support from reading the messages. The Sweet Talk system could be readily adapted to suit other chronic disease models and age groups, and the results of this study may help to inform the design of future text message support interventions. PMID:18653444
Alert Notification System Router
NASA Technical Reports Server (NTRS)
Gurganus, Joseph; Carey, Everett; Antonucci, Robert; Hitchener, Peter
2009-01-01
The Alert Notification System Router (ANSR) software provides satellite operators with notifications of key events through pagers, cell phones, and e-mail. Written in Java, this application is specifically designed to meet the mission-critical standards for mission operations while operating on a variety of hardware environments. ANSR is a software component that runs inside the Mission Operations Center (MOC). It connects to the mission's message bus using the GMSEC [Goddard Space Flight Center (GSFC) Mission Services Evolution Center (GMSEC)] standard. Other components, such as automation and monitoring components, can use ANSR to send directives to notify users or groups. The ANSR system, in addition to notifying users, can check for message acknowledgements from a user and escalate the notification to another user if there is no acknowledgement. When a firewall prevents ANSR from accessing the Internet directly, proxies can be run on the other side of the wall. These proxies can be configured to access the Internet, notify users, and poll for their responses. Multiple ANSRs can be run in parallel, providing a seamless failover capability in the event that one ANSR system becomes incapacitated.
HF-START: A Regional Radio Propagation Simulator
NASA Astrophysics Data System (ADS)
Hozumi, K.; Maruyama, T.; Saito, S.; Nakata, H.; Rougerie, S.; Yokoyama, T.; Jin, H.; Tsugawa, T.; Ishii, M.
2017-12-01
HF-START (HF Simulator Targeting for All-users' Regional Telecommunications) is a user-friendly simulator developed to meet the needs of space weather users. Prediction of communications failure due to space weather disturbances is of high priority. Space weather users from various backgrounds with high economic impact, i.e. airlines, telecommunication companies, GPS-related companies, insurance companies, international amateur radio union, etc., recently increase. Space weather information provided by Space Weather Information Center of NICT is, however, too professional to be understood and effectively used by the users. To overcome this issue, I try to translate the research level data to the user level data based on users' needs and provide an immediate usable data. HF-START is positioned to be a space weather product out of laboratory based truly on users' needs. It is originally for radio waves in HF band (3-30 MHz) but higher frequencies up to L band are planned to be covered. Regional ionospheric data in Japan and southeast Asia are employed as a reflector of skywave mode propagation. GAIA (Ground-to-topside model of Atmosphere and Ionosphere for Aeronomy) model will be used as ionospheric input for global simulation. To evaluate HF-START, an evaluation campaign for Japan region will be launched in coming months. If the campaign successes, it will be expanded to southeast Asia region as well. The final goal of HF-START is to provide the near-realtime necessary radio parameters as well as the warning message of radio communications failure to the radio and space weather users.
The Effect of Bad News and CEO Apology of Corporate on User Responses in Social Media
Cha, Meeyoung; Jeong, Jaeseung
2015-01-01
While social media has become an important platform for social reputation, the emotional responses of users toward bad news have not been investigated thoroughly. We analyzed a total of 20,773 Twitter messages by 15,513 users to assess the influence of bad news and public apology in social media. Based on both computerized, quantitative sentiment analysis and in-depth qualitative analysis, we found that rapid public apology effectively and immediately reduced the level of negative sentiment, where the degree of change in sentiments differed by the type of interactions users engaged in. The majority of users who directly conversed with corporate representatives on the new media were not typical consumers, but experts and practitioners. We extend the existing cognitive model and suggest the audiences’ psychological reaction model to describe the information processing process during and after an organizational crisis and response. We also discuss various measures through which companies can respond to a crisis properly in social media in a fashion that is different from conventional mass media. PMID:25951231
The Effect of Bad News and CEO Apology of Corporate on User Responses in Social Media.
Kim, Hoh; Park, Jaram; Cha, Meeyoung; Jeong, Jaeseung
2015-01-01
While social media has become an important platform for social reputation, the emotional responses of users toward bad news have not been investigated thoroughly. We analyzed a total of 20,773 Twitter messages by 15,513 users to assess the influence of bad news and public apology in social media. Based on both computerized, quantitative sentiment analysis and in-depth qualitative analysis, we found that rapid public apology effectively and immediately reduced the level of negative sentiment, where the degree of change in sentiments differed by the type of interactions users engaged in. The majority of users who directly conversed with corporate representatives on the new media were not typical consumers, but experts and practitioners. We extend the existing cognitive model and suggest the audiences' psychological reaction model to describe the information processing process during and after an organizational crisis and response. We also discuss various measures through which companies can respond to a crisis properly in social media in a fashion that is different from conventional mass media.
A user guide for the sign sizing program
Donna Sheehy; Kurt Krueger
1999-01-01
This user guide explains how to use the Forest Service Sign Sizing program. The program calculates the length and height of a rectangular sign panel for road and trail guide signs. Variable text messages and directional arrows can be mocked up using U.S. Federal Highway Administration standards. Users can make text or other changes and quickly determine the effect on...
Messages about appearance, food, weight and exercise in "tween" television.
Simpson, Courtney C; Kwitowski, Melissa; Boutte, Rachel; Gow, Rachel W; Mazzeo, Suzanne E
2016-12-01
Tweens (children ages ~8-14years) are a relatively recently defined age group, increasingly targeted by marketers. Individuals in this age group are particularly vulnerable to opinions and behaviors presented in media messages, given their level of cognitive and social development. However, little research has examined messages about appearance, food, weight, and exercise in television specifically targeting tweens, despite the popularity of this media type among this age group. This study used a content analytic approach to explore these messages in the five most popular television shows for tweens on the Disney Channel (as of 2015). Using a multiple-pass approach, relevant content in episodes from the most recently completed seasons of each show was coded. Appearance related incidents occurred in every episode; these most frequently mentioned attractiveness/beauty. Food related incidents were also present in every episode; typically, these situations were appearance and weight neutral. Exercise related incidents occurred in 53.3% of episodes; the majority expressed resistance to exercise. Weight related incidents occurred in 40.0% of the episodes; the majority praised the muscular ideal. Women were more likely to initiate appearance incidents, and men were more likely to initiate exercise incidents. These results suggest that programs specifically marketed to tweens reinforce appearance ideals, including stereotypes about female attractiveness and male athleticism, two constructs linked to eating pathology and body dissatisfaction. Given the developmental vulnerability of the target group, these findings are concerning, and highlight potential foci for prevention programming, including media literacy, for tweens. Copyright © 2016 Elsevier Ltd. All rights reserved.
Help Me Please!: Designing and Developing Application for Emergencies
NASA Astrophysics Data System (ADS)
Hong, Ng Ken; Hafit, Hanayanti; Wahid, Norfaradilla; Kasim, Shahreen; Yusof, Munirah Mohd
2017-08-01
Help Me Please! Application is an android platform emergency button application that is designed to transmit emergency messages to target receivers with real time information. The purpose of developing this application is to help people to notify any emergency circumstances via Short Message Service (SMS) in android platform. The application will receive the current location from Global Positioning System (GPS), will obtain the current time from the mobile device and send this information to the receivers when user presses the emergency button. Simultaneously, the application will keep sending the emergency alerts to receivers and will update to database based on the time interval set by user until user stop the function. Object-oriented Software Development model is employed to guide the development of this application with the knowledge of Java language and Android Studio. In conclusion, this application plays an important role in rescuing process when emergency circumstances happen. The rescue process will become more effective by notifying the emergency circumstances and send the current location of user to others in the early hours.
Integrating Communication and Navigation: Next Generation Broadcast Service (NGBS)
NASA Technical Reports Server (NTRS)
Donaldson, Jennifer
2017-01-01
NASA Goddard has been investing in technology demonstrations of a beacon service, now called Next Generation Broadcast Services (NGBS). NGBS is a global, space-based, communications and navigation service for users of Global Navigation Satellite Systems (GNSS) and the Tracking and Data Relay Satellite System (TDRSS). NGBS will provide an S-band beacon messaging source and radio navigation available to users at orbital altitudes 1400 km and below, increasing the autonomy and resiliency of onboard communication and navigation. NGBS will deliver both one-way radiometric (Doppler and pseudorange) and fast forward data transport services to users. Portions of the overall forward data volume will be allocated for fixed message types while the remaining data volume will be left for user forward command data. The NGBS signal will reside within the 2106.43 MHz spectrum currently allocated for the Space Networks multiple access forward (MAF) service and a live service demonstration is currently being planned via the 2nd and 3rd generation TDRS satellites.
In the Face of Cybersecurity: How the Common Information Model Can Be Used
DOE Office of Scientific and Technical Information (OSTI.GOV)
Skare, Paul; Falk, Herbert; Rice, Mark
2016-01-01
Efforts are underway to combine smart grid information, devices, networking, and emergency response information to create messages that are not dependent on specific standards development organizations (SDOs). This supports a future-proof approach of allowing changes in the canonical data models (CDMs) going forward without having to perform forklift replacements of solutions that use the messages. This also allows end users (electric utilities) to upgrade individual components of a larger system while keeping the message payload definitions intact. The goal is to enable public and private information sharing securely in a standards-based approach that can be integrated into existing operations. Wemore » provide an example architecture that could benefit from this multi-SDO, secure message approach. This article also describes how to improve message security« less
Assessing country-level efforts to link research to action.
Lavis, John N.; Lomas, Jonathan; Hamid, Maimunah; Sewankambo, Nelson K.
2006-01-01
We developed a framework for assessing country-level efforts to link research to action. The framework has four elements. The first element assesses the general climate (how those who fund research, universities, researchers and users of research support or place value on efforts to link research to action). The second element addresses the production of research (how priority setting ensures that users' needs are identified and how scoping reviews, systematic reviews and single studies are undertaken to address these needs). The third element addresses the mix of four clusters of activities used to link research to action. These include push efforts (how strategies are used to support action based on the messages arising from research), efforts to facilitate "user pull" (how "one-stop shopping" is provided for optimally packaged high-quality reviews either alone or as part of a national electronic library for health, how these reviews are profiled during "teachable moments" such as intense media coverage, and how rapid-response units meet users' needs for the best research), "user pull" efforts undertaken by those who use research (how users assess their capacity to use research and how structures and processes are changed to support the use of research) and exchange efforts (how meaningful partnerships between researchers and users help them to jointly ask and answer relevant questions). The fourth element addresses approaches to evaluation (how support is provided for rigorous evaluations of efforts to link research to action). PMID:16917649
Validation of the one pass measure for motivational interviewing competence.
McMaster, Fiona; Resnicow, Ken
2015-04-01
This paper examines the psychometric properties of the OnePass coding system: a new, user-friendly tool for evaluating practitioner competence in motivational interviewing (MI). We provide data on reliability and validity with the current gold-standard: Motivational Interviewing Treatment Integrity tool (MITI). We compared scores from 27 videotaped MI sessions performed by student counselors trained in MI and simulated patients using both OnePass and MITI, with three different raters for each tool. Reliability was estimated using intra-class coefficients (ICCs), and validity was assessed using Pearson's r. OnePass had high levels of inter-rater reliability with 19/23 items found from substantial to almost perfect agreement. Taking the pair of scores with the highest inter-rater reliability on the MITI, the concurrent validity between the two measures ranged from moderate to high. Validity was highest for evocation, autonomy, direction and empathy. OnePass appears to have good inter-rater reliability while capturing similar dimensions of MI as the MITI. Despite the moderate concurrent validity with the MITI, the OnePass shows promise in evaluating both traditional and novel interpretations of MI. OnePass may be a useful tool for developing and improving practitioner competence in MI where access to MITI coders is limited. Copyright © 2015. Published by Elsevier Ireland Ltd.
Xyce Parallel Electronic Simulator Users' Guide Version 6.8
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keiter, Eric R.; Aadithya, Karthik Venkatraman; Mei, Ting
This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows onemore » to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase$-$ a message passing parallel implementation $-$ which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.« less
A Multirelational Social Network Analysis of an Online Health Community for Smoking Cessation
Wang, Xi; Cha, Sarah; Cohn, Amy M; Papandonatos, George D; Amato, Michael S; Pearson, Jennifer L; Graham, Amanda L
2016-01-01
Background Online health communities (OHCs) provide a convenient and commonly used way for people to connect around shared health experiences, exchange information, and receive social support. Users often interact with peers via multiple communication methods, forming a multirelational social network. Use of OHCs is common among smokers, but to date, there have been no studies on users’ online interactions via different means of online communications and how such interactions are related to smoking cessation. Such information can be retrieved in multirelational social networks and could be useful in the design and management of OHCs. Objective To examine the social network structure of an OHC for smoking cessation using a multirelational approach, and to explore links between subnetwork position (ie, centrality) and smoking abstinence. Methods We used NetworkX to construct 4 subnetworks based on users’ interactions via blogs, group discussions, message boards, and private messages. We illustrated topological properties of each subnetwork, including its degree distribution, density, and connectedness, and compared similarities among these subnetworks by correlating node centrality and measuring edge overlap. We also investigated coevolution dynamics of this multirelational network by analyzing tie formation sequences across subnetworks. In a subset of users who participated in a randomized, smoking cessation treatment trial, we conducted user profiling based on users’ centralities in the 4 subnetworks and identified user groups using clustering techniques. We further examined 30-day smoking abstinence at 3 months postenrollment in relation to users’ centralities in the 4 subnetworks. Results The 4 subnetworks have different topological characteristics, with message board having the most nodes (36,536) and group discussion having the highest network density (4.35×10−3). Blog and message board subnetworks had the most similar structures with an in-degree correlation of .45, out-degree correlation of .55, and Jaccard coefficient of .23 for edge overlap. A new tie in the group discussion subnetwork had the lowest probability of triggering subsequent ties among the same two users in other subnetworks: 6.33% (54,142/855,893) for 2-tie sequences and 2.13% (18,207/855,893) for 3-tie sequences. Users’ centralities varied across the 4 subnetworks. Among a subset of users enrolled in a randomized trial, those with higher centralities across subnetworks generally had higher abstinence rates, although high centrality in the group discussion subnetwork was not associated with higher abstinence rates. Conclusions A multirelational approach revealed insights that could not be obtained by analyzing the aggregated network alone, such as the ineffectiveness of group discussions in triggering social ties of other types, the advantage of blogs, message boards, and private messages in leading to subsequent social ties of other types, and the weak connection between one’s centrality in the group discussion subnetwork and smoking abstinence. These insights have implications for the design and management of online social networks for smoking cessation. PMID:27562640
Kingman and Heritage Islands Act of 2009
Rep. Norton, Eleanor Holmes [D-DC-At Large
2009-04-23
Senate - 09/28/2010 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.6278, which became Public Law 111-328 on 12/22/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Distance Learning and Public School Finance.
ERIC Educational Resources Information Center
Monahan, Brian; Wimber, Charles
This discussion of the application of computers and telecommunications technology to distance learning begins by describing a workstation equipped to produce "lessonware" in such formats as audiocassettes, videocassettes, diskettes, and voice messages. Such workstations would be located in classrooms equipped with two-way reverse passes to a cable…
Reducing Flight Delays Act of 2013
Sen. Collins, Susan M. [R-ME
2013-04-25
Senate - 04/30/2013 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.1765, which became Public Law 113-9 on 5/1/2013. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Temporary Bankruptcy Judgeships Extension Act of 2011
Rep. Smith, Lamar [R-TX-21
2011-03-10
Senate - 04/23/2012 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.4967, which became Public Law 112-121 on 5/25/2012. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Achievable degrees of freedom of MIMO two-way relay interference channel with delayed CSIT
NASA Astrophysics Data System (ADS)
Li, Qingyun; Wu, Gang; Li, Shaoqian
2016-10-01
In this paper, assuming each node has delayed channel state information at the transmitter (CSIT), we investigate the achievable degrees of freedom (DOF) of MIMO two-way relay interference channel in frequency division duplex (FDD) systems, where there are K user pairs (i.e., 2K users) and each user in a user pair exchanges messages with the other user in the same user pair simultaneously via an intermediate relay. We propose a two-stage transmission scheme and derive the closed-form expressions for its achievable DOF.
Reuter, Katja; Ukpolo, Francis; Ward, Edward; Wilson, Melissa L; Angyan, Praveen
2016-06-29
Scarce information about clinical research, in particular clinical trials, is among the top reasons why potential participants do not take part in clinical studies. Without volunteers, on the other hand, clinical research and the development of novel approaches to preventing, diagnosing, and treating disease are impossible. Promising digital options such as social media have the potential to work alongside traditional methods to boost the promotion of clinical research. However, investigators and research institutions are challenged to leverage these innovations while saving time and resources. To develop and test the efficiency of a Web-based tool that automates the generation and distribution of user-friendly social media messages about clinical trials. Trial Promoter is developed in Ruby on Rails, HTML, cascading style sheet (CSS), and JavaScript. In order to test the tool and the correctness of the generated messages, clinical trials (n=46) were randomized into social media messages and distributed via the microblogging social media platform Twitter and the social network Facebook. The percent correct was calculated to determine the probability with which Trial Promoter generates accurate messages. During a 10-week testing phase, Trial Promoter automatically generated and published 525 user-friendly social media messages on Twitter and Facebook. On average, Trial Promoter correctly used the message templates and substituted the message parameters (text, URLs, and disease hashtags) 97.7% of the time (1563/1600). Trial Promoter may serve as a promising tool to render clinical trial promotion more efficient while requiring limited resources. It supports the distribution of any research or other types of content. The Trial Promoter code and installation instructions are freely available online.
Ukpolo, Francis; Ward, Edward; Wilson, Melissa L
2016-01-01
Background Scarce information about clinical research, in particular clinical trials, is among the top reasons why potential participants do not take part in clinical studies. Without volunteers, on the other hand, clinical research and the development of novel approaches to preventing, diagnosing, and treating disease are impossible. Promising digital options such as social media have the potential to work alongside traditional methods to boost the promotion of clinical research. However, investigators and research institutions are challenged to leverage these innovations while saving time and resources. Objective To develop and test the efficiency of a Web-based tool that automates the generation and distribution of user-friendly social media messages about clinical trials. Methods Trial Promoter is developed in Ruby on Rails, HTML, cascading style sheet (CSS), and JavaScript. In order to test the tool and the correctness of the generated messages, clinical trials (n=46) were randomized into social media messages and distributed via the microblogging social media platform Twitter and the social network Facebook. The percent correct was calculated to determine the probability with which Trial Promoter generates accurate messages. Results During a 10-week testing phase, Trial Promoter automatically generated and published 525 user-friendly social media messages on Twitter and Facebook. On average, Trial Promoter correctly used the message templates and substituted the message parameters (text, URLs, and disease hashtags) 97.7% of the time (1563/1600). Conclusions Trial Promoter may serve as a promising tool to render clinical trial promotion more efficient while requiring limited resources. It supports the distribution of any research or other types of content. The Trial Promoter code and installation instructions are freely available online. PMID:27357424
NASA Astrophysics Data System (ADS)
Wedgwood, Kyle C. A.; Satin, Leslie S.
2018-03-01
In 1967, the social psychologist Stanley Milgram asked how many intermediates would be required for a letter from participants in various U.S. states to be received by a contact in Boston, given that participants were given only basic information about the contact, and were instructed only to pass along the message to someone that might know the intended recipient [27]. The surprising answer was that, in spite of the social and geographical distances covered, on average, only 6 people were required for the message to reach its intended target.
A distributed infrastructure for publishing VO services: an implementation
NASA Astrophysics Data System (ADS)
Cepparo, Francesco; Scagnetto, Ivan; Molinaro, Marco; Smareglia, Riccardo
2016-07-01
This contribution describes both the design and the implementation details of a new solution for publishing VO services, enlightening its maintainable, distributed, modular and scalable architecture. Indeed, the new publisher is multithreaded and multiprocess. Multiple instances of the modules can run on different machines to ensure high performance and high availability, and this will be true both for the interface modules of the services and the back end data access ones. The system uses message passing to let its components communicate through an AMQP message broker that can itself be distributed to provide better scalability and availability.
Towards Collaborative Filtering Recommender Systems for Tailored Health Communications
Marlin, Benjamin M.; Adams, Roy J.; Sadasivam, Rajani; Houston, Thomas K.
2013-01-01
The goal of computer tailored health communications (CTHC) is to promote healthy behaviors by sending messages tailored to individual patients. Current CTHC systems collect baseline patient “profiles” and then use expert-written, rule-based systems to target messages to subsets of patients. Our main interest in this work is the study of collaborative filtering-based CTHC systems that can learn to tailor future message selections to individual patients based explicit feedback about past message selections. This paper reports the results of a study designed to collect explicit feedback (ratings) regarding four aspects of messages from 100 subjects in the smoking cessation support domain. Our results show that most users have positive opinions of most messages and that the ratings for all four aspects of the messages are highly correlated with each other. Finally, we conduct a range of rating prediction experiments comparing several different model variations. Our results show that predicting future ratings based on each user’s past ratings contributes the most to predictive accuracy. PMID:24551430
Zhang, Huijun; Mo, Lei
2016-01-01
Microblogs is one of the main social networking channels by which information is spread. Among them, Sina Weibo is one of the largest social networking channels in China. Millions of users repost information from Sina Weibo and share embedded emotion at the same time. The present study investigated participants' propensity to repost microblog messages of positive, negative, or neutral valence, and studied the neural correlates during resting state with the reposting rate of each type microblog messages. Participants preferred to repost negative messages relative to positive and neutral messages. Reposting rate of negative messages was positively correlated to the functional connectivity of temporoparietal junction (TPJ) with insula, and TPJ with dorsolateral prefrontal cortex. These results indicate that reposting negative messages is related to conflict resolution between the feeling of pain/disgust and the intention to repost significant information. Thus, resposting emotional microblog messages might be attributed to participants' appraisal of personal and recipient's interest, as well as their cognitive process for decision making.
HYDRA : High-speed simulation architecture for precision spacecraft formation simulation
NASA Technical Reports Server (NTRS)
Martin, Bryan J.; Sohl, Garett.
2003-01-01
e Hierarchical Distributed Reconfigurable Architecture- is a scalable simulation architecture that provides flexibility and ease-of-use which take advantage of modern computation and communication hardware. It also provides the ability to implement distributed - or workstation - based simulations and high-fidelity real-time simulation from a common core. Originally designed to serve as a research platform for examining fundamental challenges in formation flying simulation for future space missions, it is also finding use in other missions and applications, all of which can take advantage of the underlying Object-Oriented structure to easily produce distributed simulations. Hydra automates the process of connecting disparate simulation components (Hydra Clients) through a client server architecture that uses high-level descriptions of data associated with each client to find and forge desirable connections (Hydra Services) at run time. Services communicate through the use of Connectors, which abstract messaging to provide single-interface access to any desired communication protocol, such as from shared-memory message passing to TCP/IP to ACE and COBRA. Hydra shares many features with the HLA, although providing more flexibility in connectivity services and behavior overriding.
NASA Astrophysics Data System (ADS)
Hoggard, Amy
Cybersecurity awareness is an important issue that affects everyone who uses a computer or a mobile device. Canada and the United States both recognize the value of mitigating cybersecurity risks in terms of national safety, economic stability and protection of their citizens. The research performed compared the levels of cybersecurity awareness in Canadian and American Internet users. Canadian and American users were equally aware of cybersecurity measures, but were not implementing best practices to keep themselves safe. The research suggested users needed to understand why a cybersecurity measure was important before being motivated to implement it. Educational strategies were reviewed in both Canada and the United States and it was determined that although there were significant resources available, they were not being utilized by both the educators and the public. In order to increase cybersecurity awareness levels, nations should focus on increasing the public's awareness by using various types of messaging, such as cartoons, in media. One possible consideration is a compulsory awareness model before accessing the Internet. Cybersecurity topics should be included in the curriculum for students at all levels of education and a focus on providing training and resources to teachers will help increase the cybersecurity knowledge of children and youth.
Kamauu, Aaron W C; DuVall, Scott L; Wiggins, Richard H; Avrin, David E
2008-09-01
In the creation of interesting radiological cases in a digital teaching file, it is necessary to adjust the window and level settings of an image to effectively display the educational focus. The web-based applet described in this paper presents an effective solution for real-time window and level adjustments without leaving the picture archiving and communications system workstation. Optimized images are created, as user-defined parameters are passed between the applet and a servlet on the Health Insurance Portability and Accountability Act-compliant teaching file server.