Sample records for writing message passing

  1. Efficient Data Generation and Publication as a Test Tool

    NASA Technical Reports Server (NTRS)

    Einstein, Craig Jakob

    2017-01-01

    A tool to facilitate the generation and publication of test data was created to test the individual components of a command and control system designed to launch spacecraft. Specifically, this tool was built to ensure messages are properly passed between system components. The tool can also be used to test whether the appropriate groups have access (read/write privileges) to the correct messages. The messages passed between system components take the form of unique identifiers with associated values. These identifiers are alphanumeric strings that identify the type of message and the additional parameters that are contained within the message. The values that are passed with the message depend on the identifier. The data generation tool allows for the efficient creation and publication of these messages. A configuration file can be used to set the parameters of the tool and also specify which messages to pass.

  2. Users manual for the Chameleon parallel programming tools

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gropp, W.; Smith, B.

    1993-06-01

    Message passing is a common method for writing programs for distributed-memory parallel computers. Unfortunately, the lack of a standard for message passing has hampered the construction of portable and efficient parallel programs. In an attempt to remedy this problem, a number of groups have developed their own message-passing systems, each with its own strengths and weaknesses. Chameleon is a second-generation system of this type. Rather than replacing these existing systems, Chameleon is meant to supplement them by providing a uniform way to access many of these systems. Chameleon`s goals are to (a) be very lightweight (low over-head), (b) be highlymore » portable, and (c) help standardize program startup and the use of emerging message-passing operations such as collective operations on subsets of processors. Chameleon also provides a way to port programs written using PICL or Intel NX message passing to other systems, including collections of workstations. Chameleon is tracking the Message-Passing Interface (MPI) draft standard and will provide both an MPI implementation and an MPI transport layer. Chameleon provides support for heterogeneous computing by using p4 and PVM. Chameleon`s support for homogeneous computing includes the portable libraries p4, PICL, and PVM and vendor-specific implementation for Intel NX, IBM EUI (SP-1), and Thinking Machines CMMD (CM-5). Support for Ncube and PVM 3.x is also under development.« less

  3. Statistics of Epidemics in Networks by Passing Messages

    NASA Astrophysics Data System (ADS)

    Shrestha, Munik Kumar

    Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result financial contagion gets worse with too much diversification. We also predict that financial system exhibits "robust yet fragile" behavior, with regions of the parameter space where contagion is rare but catastrophic whenever it occurs. In further results, we develop a message-passing approach to recurrent state epidemics like susceptible-infectious-susceptible and susceptible-infectious-recovered-susceptible where nodes can return to previously inhabited states and multiple waves of infection can pass through the population. Given that message-passing has been applied exclusively to models with one-way state changes like susceptible-infectious and susceptible-infectious-recovered, we develop message-passing for recurrent epidemics based on a new class of differential equations and demonstrate that our approach is simple and efficiently approximates results obtained from Monte Carlo simulation, and that the accuracy of message-passing is often superior to the pair approximation (which also takes second-order correlations into account).

  4. Implementation of a Serial Delay Insertion Type Loop Communication for a Real Time Multitransputer System.

    DTIC Science & Technology

    1985-06-01

    just pass the message WAIT NOW AFTER Rlock + timeo t -- if time is out write.screen( TIME IS OUT") MAIN PROGRAM* CHAN linki , link2, link3, link4...PAR D.I.Loop.Interface (link4, linkl,) D.I.Loop.Interface ( linki , link2, 2) D.I.Loop.Interface (link2, link3, 3) JD.I Loop.Interface (link3, link4, 4

  5. A Survey of Rollback-Recovery Protocols in Message-Passing Systems

    DTIC Science & Technology

    1999-06-01

    and M.A. Castillo. "Checkpointing through garbage collection." Technical report. Departamento de Ciencia de la Computation, Escuela de Ingenieria ...between consecutive checkpoints. It can be implemented by using the dirty-bit of the memory protection hardware or by emulating a dirty-bit in software [4...compare the program’s state with the previous checkpoint in software , and writing the difference in a new checkpoint [46]. The required storage and

  6. Launching Family Message Journals.

    ERIC Educational Resources Information Center

    Wollman-Bonilla, Julie

    This lesson introduces Family Message Journals, a tool for encouraging family involvement and supporting writing to reflect and learn. First and second graders are led into composing through demonstration, guided writing, and finally independent writing of messages that they will bring home for family to read and write a reply. During the three…

  7. Teaching Students the Persuasive Message through Small Group Activity

    ERIC Educational Resources Information Center

    Creelman, Valerie

    2008-01-01

    Teaching students to write persuasive messages is a critical feature of any undergraduate business communications course. For the persuasive writing module in the author's course, students write a persuasive message on the basis of the four-part indirect pattern often used for sales or fund-raising messages. The course text she uses identifies…

  8. Cryptology

    ERIC Educational Resources Information Center

    Tech Directions, 2011

    2011-01-01

    Cryptology, or cryptography, is the study of writing and deciphering hidden messages in codes, ciphers, and writings. It is almost as old as writing itself. Ciphers are messages in which letters are rearranged or substituted for other letters or numbers. Codes are messages in which letters are replaced by letter groups, syllables, or sentences.…

  9. Intel NX to PVM 3.2 message passing conversion library

    NASA Technical Reports Server (NTRS)

    Arthur, Trey; Nelson, Michael L.

    1993-01-01

    NASA Langley Research Center has developed a library that allows Intel NX message passing codes to be executed under the more popular and widely supported Parallel Virtual Machine (PVM) message passing library. PVM was developed at Oak Ridge National Labs and has become the defacto standard for message passing. This library will allow the many programs that were developed on the Intel iPSC/860 or Intel Paragon in a Single Program Multiple Data (SPMD) design to be ported to the numerous architectures that PVM (version 3.2) supports. Also, the library adds global operations capability to PVM. A familiarity with Intel NX and PVM message passing is assumed.

  10. Theoretic derivation of directed acyclic subgraph algorithm and comparisons with message passing algorithm

    NASA Astrophysics Data System (ADS)

    Ha, Jeongmok; Jeong, Hong

    2016-07-01

    This study investigates the directed acyclic subgraph (DAS) algorithm, which is used to solve discrete labeling problems much more rapidly than other Markov-random-field-based inference methods but at a competitive accuracy. However, the mechanism by which the DAS algorithm simultaneously achieves competitive accuracy and fast execution speed, has not been elucidated by a theoretical derivation. We analyze the DAS algorithm by comparing it with a message passing algorithm. Graphical models, inference methods, and energy-minimization frameworks are compared between DAS and message passing algorithms. Moreover, the performances of DAS and other message passing methods [sum-product belief propagation (BP), max-product BP, and tree-reweighted message passing] are experimentally compared.

  11. Writing, Technology and Teens

    ERIC Educational Resources Information Center

    Lenhart, Amanda; Arafeh, Sousan; Smith, Aaron

    2008-01-01

    Teenagers' lives are filled with writing. All teens write for school, and 93% of teens say they write for their own pleasure. Most notably, the vast majority of teens have eagerly embraced written communication with their peers as they share messages on their social network pages, in emails and instant messages online, and through fast-paced thumb…

  12. Writing by Any Other Name

    ERIC Educational Resources Information Center

    Yancey, Kathleen Blake

    2009-01-01

    People are writing as never before--in blogs and text messages and on MySpace and Facebook and Twitter. Teenagers do a good deal of this writing, and in some composing environments--for example, the text-messaging space of a cell phone--they are ahead of adults in their invention of new writing practices and new genres. At the same time, teenagers…

  13. Testing New Programming Paradigms with NAS Parallel Benchmarks

    NASA Technical Reports Server (NTRS)

    Jin, H.; Frumkin, M.; Schultz, M.; Yan, J.

    2000-01-01

    Over the past decade, high performance computing has evolved rapidly, not only in hardware architectures but also with increasing complexity of real applications. Technologies have been developing to aim at scaling up to thousands of processors on both distributed and shared memory systems. Development of parallel programs on these computers is always a challenging task. Today, writing parallel programs with message passing (e.g. MPI) is the most popular way of achieving scalability and high performance. However, writing message passing programs is difficult and error prone. Recent years new effort has been made in defining new parallel programming paradigms. The best examples are: HPF (based on data parallelism) and OpenMP (based on shared memory parallelism). Both provide simple and clear extensions to sequential programs, thus greatly simplify the tedious tasks encountered in writing message passing programs. HPF is independent of memory hierarchy, however, due to the immaturity of compiler technology its performance is still questionable. Although use of parallel compiler directives is not new, OpenMP offers a portable solution in the shared-memory domain. Another important development involves the tremendous progress in the internet and its associated technology. Although still in its infancy, Java promisses portability in a heterogeneous environment and offers possibility to "compile once and run anywhere." In light of testing these new technologies, we implemented new parallel versions of the NAS Parallel Benchmarks (NPBs) with HPF and OpenMP directives, and extended the work with Java and Java-threads. The purpose of this study is to examine the effectiveness of alternative programming paradigms. NPBs consist of five kernels and three simulated applications that mimic the computation and data movement of large scale computational fluid dynamics (CFD) applications. We started with the serial version included in NPB2.3. Optimization of memory and cache usage was applied to several benchmarks, noticeably BT and SP, resulting in better sequential performance. In order to overcome the lack of an HPF performance model and guide the development of the HPF codes, we employed an empirical performance model for several primitives found in the benchmarks. We encountered a few limitations of HPF, such as lack of supporting the "REDISTRIBUTION" directive and no easy way to handle irregular computation. The parallelization with OpenMP directives was done at the outer-most loop level to achieve the largest granularity. The performance of six HPF and OpenMP benchmarks is compared with their MPI counterparts for the Class-A problem size in the figure in next page. These results were obtained on an SGI Origin2000 (195MHz) with MIPSpro-f77 compiler 7.2.1 for OpenMP and MPI codes and PGI pghpf-2.4.3 compiler with MPI interface for HPF programs.

  14. How's the Weather?: Ice-Breaking and Fog-Lifting in Your Written Messages.

    ERIC Educational Resources Information Center

    Vassallo, Philip

    1994-01-01

    Describes two ways to combat "bad tone" and "unclear thinking" in writing. Describes "breaking the ice" as being aware of a written message's appearance--the message's readability. Explains that "fog-lifting" is accomplished by writing clearly, and by paying particular attention to the verb "to…

  15. Spelling for Writing: Student Activity Book. Level 5.

    ERIC Educational Resources Information Center

    Peet, Howard

    The Level 5 activity book is designed to help children learn that writing messages and stories will help them see the value of learning to spell. The workbook's program is based on the ideas that accurate spelling contributes to the clarity of written messages; spelling accuracy shows attention to detail, sending a positive message to teachers and…

  16. The Generational Impact of Technology on Formal Writing of Rural Middle School Students

    ERIC Educational Resources Information Center

    Land, Martha Ann

    2012-01-01

    The purpose of this study was to determine the impact text messages, social networks, Instant Messaging, email, and blogging had on rural middle school students' ability to decipher between formal and informal writing. Students completed self-evaluation logs, completed Formal and Informal Writing Assessments, and were scored on their use of…

  17. A Comparison of Automatic Parallelization Tools/Compilers on the SGI Origin 2000 Using the NAS Benchmarks

    NASA Technical Reports Server (NTRS)

    Saini, Subhash; Frumkin, Michael; Hribar, Michelle; Jin, Hao-Qiang; Waheed, Abdul; Yan, Jerry

    1998-01-01

    Porting applications to new high performance parallel and distributed computing platforms is a challenging task. Since writing parallel code by hand is extremely time consuming and costly, porting codes would ideally be automated by using some parallelization tools and compilers. In this paper, we compare the performance of the hand written NAB Parallel Benchmarks against three parallel versions generated with the help of tools and compilers: 1) CAPTools: an interactive computer aided parallelization too] that generates message passing code, 2) the Portland Group's HPF compiler and 3) using compiler directives with the native FORTAN77 compiler on the SGI Origin2000.

  18. Writing for the Instant Messaging and Text Messaging Generation: Using New Literacies to Support Writing Instruction

    ERIC Educational Resources Information Center

    Sweeny, Sheelah M.

    2010-01-01

    Writing, for adolescents who live in an age of digital communication, has taken on new importance and plays a prominent role in the way they socialize, share information, and structure communication. New literacies expand the literacy realm by considering the skills needed to function using media other than the printed page. Internet resources can…

  19. MPF: A portable message passing facility for shared memory multiprocessors

    NASA Technical Reports Server (NTRS)

    Malony, Allen D.; Reed, Daniel A.; Mcguire, Patrick J.

    1987-01-01

    The design, implementation, and performance evaluation of a message passing facility (MPF) for shared memory multiprocessors are presented. The MPF is based on a message passing model conceptually similar to conversations. Participants (parallel processors) can enter or leave a conversation at any time. The message passing primitives for this model are implemented as a portable library of C function calls. The MPF is currently operational on a Sequent Balance 21000, and several parallel applications were developed and tested. Several simple benchmark programs are presented to establish interprocess communication performance for common patterns of interprocess communication. Finally, performance figures are presented for two parallel applications, linear systems solution, and iterative solution of partial differential equations.

  20. Efficiently passing messages in distributed spiking neural network simulation.

    PubMed

    Thibeault, Corey M; Minkovich, Kirill; O'Brien, Michael J; Harris, Frederick C; Srinivasa, Narayan

    2013-01-01

    Efficiently passing spiking messages in a neural model is an important aspect of high-performance simulation. As the scale of networks has increased so has the size of the computing systems required to simulate them. In addition, the information exchange of these resources has become more of an impediment to performance. In this paper we explore spike message passing using different mechanisms provided by the Message Passing Interface (MPI). A specific implementation, MVAPICH, designed for high-performance clusters with Infiniband hardware is employed. The focus is on providing information about these mechanisms for users of commodity high-performance spiking simulators. In addition, a novel hybrid method for spike exchange was implemented and benchmarked.

  1. Hey! Guess What I Did in School Today: Using Family Message Journals to Improve Student Writing and Strengthen the School-Home Partnership

    ERIC Educational Resources Information Center

    Valerie, Lynda M.; Foss-Swanson, Sheila

    2012-01-01

    This article presents the rationale for and implementation of the family message journal as a writing tool. The family message journal provides multiple opportunities for students to develop as writers while strengthening the school-home connection. This article provides examples of rhetorical moves that indicate young writers are aware of their…

  2. Passing crisis and emergency risk communications: the effects of communication channel, information type, and repetition.

    PubMed

    Edworthy, Judy; Hellier, Elizabeth; Newbold, Lex; Titchener, Kirsteen

    2015-05-01

    Three experiments explore several factors which influence information transmission when warning messages are passed from person to person. In Experiment 1, messages were passed down chains of participants using five different modes of communication. Written communication channels resulted in more accurate message transmission than verbal. In addition, some elements of the message endured further down the chain than others. Experiment 2 largely replicated these effects and also demonstrated that simple repetition of a message eliminated differences between written and spoken communication. In a final field experiment, chains of participants passed information however they wanted to, with the proviso that half of the chains could not use telephones. Here, the lack of ability to use a telephone did not affect accuracy, but did slow down the speed of transmission from the recipient of the message to the last person in the chain. Implications of the findings for crisis and emergency risk communication are discussed. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  3. Verification of Faulty Message Passing Systems with Continuous State Space in PVS

    NASA Technical Reports Server (NTRS)

    Pilotto, Concetta; White, Jerome

    2010-01-01

    We present a library of Prototype Verification System (PVS) meta-theories that verifies a class of distributed systems in which agent commu nication is through message-passing. The theoretic work, outlined in, consists of iterative schemes for solving systems of linear equations , such as message-passing extensions of the Gauss and Gauss-Seidel me thods. We briefly review that work and discuss the challenges in formally verifying it.

  4. The serial message-passing schedule for LDPC decoding algorithms

    NASA Astrophysics Data System (ADS)

    Liu, Mingshan; Liu, Shanshan; Zhou, Yuan; Jiang, Xue

    2015-12-01

    The conventional message-passing schedule for LDPC decoding algorithms is the so-called flooding schedule. It has the disadvantage that the updated messages cannot be used until next iteration, thus reducing the convergence speed . In this case, the Layered Decoding algorithm (LBP) based on serial message-passing schedule is proposed. In this paper the decoding principle of LBP algorithm is briefly introduced, and then proposed its two improved algorithms, the grouped serial decoding algorithm (Grouped LBP) and the semi-serial decoding algorithm .They can improve LBP algorithm's decoding speed while maintaining a good decoding performance.

  5. Performance Comparison of a Matrix Solver on a Heterogeneous Network Using Two Implementations of MPI: MPICH and LAM

    NASA Technical Reports Server (NTRS)

    Phillips, Jennifer K.

    1995-01-01

    Two of the current and most popular implementations of the Message-Passing Standard, Message Passing Interface (MPI), were contrasted: MPICH by Argonne National Laboratory, and LAM by the Ohio Supercomputer Center at Ohio State University. A parallel skyline matrix solver was adapted to be run in a heterogeneous environment using MPI. The Message-Passing Interface Forum was held in May 1994 which lead to a specification of library functions that implement the message-passing model of parallel communication. LAM, which creates it's own environment, is more robust in a highly heterogeneous network. MPICH uses the environment native to the machine architecture. While neither of these free-ware implementations provides the performance of native message-passing or vendor's implementations, MPICH begins to approach that performance on the SP-2. The machines used in this study were: IBM RS6000, 3 Sun4, SGI, and the IBM SP-2. Each machine is unique and a few machines required specific modifications during the installation. When installed correctly, both implementations worked well with only minor problems.

  6. Extended write combining using a write continuation hint flag

    DOEpatents

    Chen, Dong; Gara, Alan; Heidelberger, Philip; Ohmacht, Martin; Vranas, Pavlos

    2013-06-04

    A computing apparatus for reducing the amount of processing in a network computing system which includes a network system device of a receiving node for receiving electronic messages comprising data. The electronic messages are transmitted from a sending node. The network system device determines when more data of a specific electronic message is being transmitted. A memory device stores the electronic message data and communicating with the network system device. A memory subsystem communicates with the memory device. The memory subsystem stores a portion of the electronic message when more data of the specific message will be received, and the buffer combines the portion with later received data and moves the data to the memory device for accessible storage.

  7. Implementing Multidisciplinary and Multi-Zonal Applications Using MPI

    NASA Technical Reports Server (NTRS)

    Fineberg, Samuel A.

    1995-01-01

    Multidisciplinary and multi-zonal applications are an important class of applications in the area of Computational Aerosciences. In these codes, two or more distinct parallel programs or copies of a single program are utilized to model a single problem. To support such applications, it is common to use a programming model where a program is divided into several single program multiple data stream (SPMD) applications, each of which solves the equations for a single physical discipline or grid zone. These SPMD applications are then bound together to form a single multidisciplinary or multi-zonal program in which the constituent parts communicate via point-to-point message passing routines. Unfortunately, simple message passing models, like Intel's NX library, only allow point-to-point and global communication within a single system-defined partition. This makes implementation of these applications quite difficult, if not impossible. In this report it is shown that the new Message Passing Interface (MPI) standard is a viable portable library for implementing the message passing portion of multidisciplinary applications. Further, with the extension of a portable loader, fully portable multidisciplinary application programs can be developed. Finally, the performance of MPI is compared to that of some native message passing libraries. This comparison shows that MPI can be implemented to deliver performance commensurate with native message libraries.

  8. Respectful Alignment of Programs as a Possible Factor in Remedial Writers' Pass Rates

    ERIC Educational Resources Information Center

    McDonald, Mary

    2017-01-01

    For over four years, students enrolled in remedial writing classes who attended eight writing center tutorials directly linked to their assignments had an average pass rate of 95.6 percent, whereas students who did not attend any writing center tutorials had an average pass rate of 39.4 percent. These correlations are just that--correlations that…

  9. MPI, HPF or OpenMP: A Study with the NAS Benchmarks

    NASA Technical Reports Server (NTRS)

    Jin, Hao-Qiang; Frumkin, Michael; Hribar, Michelle; Waheed, Abdul; Yan, Jerry; Saini, Subhash (Technical Monitor)

    1999-01-01

    Porting applications to new high performance parallel and distributed platforms is a challenging task. Writing parallel code by hand is time consuming and costly, but the task can be simplified by high level languages and would even better be automated by parallelizing tools and compilers. The definition of HPF (High Performance Fortran, based on data parallel model) and OpenMP (based on shared memory parallel model) standards has offered great opportunity in this respect. Both provide simple and clear interfaces to language like FORTRAN and simplify many tedious tasks encountered in writing message passing programs. In our study we implemented the parallel versions of the NAS Benchmarks with HPF and OpenMP directives. Comparison of their performance with the MPI implementation and pros and cons of different approaches will be discussed along with experience of using computer-aided tools to help parallelize these benchmarks. Based on the study,potentials of applying some of the techniques to realistic aerospace applications will be presented

  10. MPI, HPF or OpenMP: A Study with the NAS Benchmarks

    NASA Technical Reports Server (NTRS)

    Jin, H.; Frumkin, M.; Hribar, M.; Waheed, A.; Yan, J.; Saini, Subhash (Technical Monitor)

    1999-01-01

    Porting applications to new high performance parallel and distributed platforms is a challenging task. Writing parallel code by hand is time consuming and costly, but this task can be simplified by high level languages and would even better be automated by parallelizing tools and compilers. The definition of HPF (High Performance Fortran, based on data parallel model) and OpenMP (based on shared memory parallel model) standards has offered great opportunity in this respect. Both provide simple and clear interfaces to language like FORTRAN and simplify many tedious tasks encountered in writing message passing programs. In our study, we implemented the parallel versions of the NAS Benchmarks with HPF and OpenMP directives. Comparison of their performance with the MPI implementation and pros and cons of different approaches will be discussed along with experience of using computer-aided tools to help parallelize these benchmarks. Based on the study, potentials of applying some of the techniques to realistic aerospace applications will be presented.

  11. Efficient Implementation of Multigrid Solvers on Message-Passing Parrallel Systems

    NASA Technical Reports Server (NTRS)

    Lou, John

    1994-01-01

    We discuss our implementation strategies for finite difference multigrid partial differential equation (PDE) solvers on message-passing systems. Our target parallel architecture is Intel parallel computers: the Delta and Paragon system.

  12. Digitalk: Community, Convention, and Self-Expression

    ERIC Educational Resources Information Center

    Turner, Kristen Hawley

    2011-01-01

    Teens write all the time: They post messages to social networks; they chat via instant message (IM); they communicate by text. In all of these digital spaces, they write. However, the language that they use in these venues often does not follow the rules of standard written English (SWE). They experiment with language, manipulating SWE in ways…

  13. Writing a journal article: guidance for novice authors.

    PubMed

    Price, Bob

    2014-05-06

    This article focuses on writing for journal publication. The purpose of writing is explored, paying particular attention to the message to be conveyed and the readership to which that message is addressed.The process of drafting and revising an article for publication is outlined, after which attention is turned to the peer-review process, what peer reviewers are looking for in an article, and what might then be required of the author in redrafting the article to meet the expectations of the journal. Prospective authors are encouraged to research the journal to which they plan to submit their work, and to then target their writing to the readership of that publication.

  14. Message passing with parallel queue traversal

    DOEpatents

    Underwood, Keith D [Albuquerque, NM; Brightwell, Ronald B [Albuquerque, NM; Hemmert, K Scott [Albuquerque, NM

    2012-05-01

    In message passing implementations, associative matching structures are used to permit list entries to be searched in parallel fashion, thereby avoiding the delay of linear list traversal. List management capabilities are provided to support list entry turnover semantics and priority ordering semantics.

  15. Managing coherence via put/get windows

    DOEpatents

    Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton on Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Hoenicke, Dirk [Ossining, NY; Ohmacht, Martin [Yorktown Heights, NY

    2011-01-11

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  16. Managing coherence via put/get windows

    DOEpatents

    Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton on Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Hoenicke, Dirk [Ossining, NY; Ohmacht, Martin [Yorktown Heights, NY

    2012-02-21

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  17. Neighbourhood-consensus message passing and its potentials in image processing applications

    NASA Astrophysics Data System (ADS)

    Ružic, Tijana; Pižurica, Aleksandra; Philips, Wilfried

    2011-03-01

    In this paper, a novel algorithm for inference in Markov Random Fields (MRFs) is presented. Its goal is to find approximate maximum a posteriori estimates in a simple manner by combining neighbourhood influence of iterated conditional modes (ICM) and message passing of loopy belief propagation (LBP). We call the proposed method neighbourhood-consensus message passing because a single joint message is sent from the specified neighbourhood to the central node. The message, as a function of beliefs, represents the agreement of all nodes within the neighbourhood regarding the labels of the central node. This way we are able to overcome the disadvantages of reference algorithms, ICM and LBP. On one hand, more information is propagated in comparison with ICM, while on the other hand, the huge amount of pairwise interactions is avoided in comparison with LBP by working with neighbourhoods. The idea is related to the previously developed iterated conditional expectations algorithm. Here we revisit it and redefine it in a message passing framework in a more general form. The results on three different benchmarks demonstrate that the proposed technique can perform well both for binary and multi-label MRFs without any limitations on the model definition. Furthermore, it manifests improved performance over related techniques either in terms of quality and/or speed.

  18. Foundations for a healthy future.

    PubMed

    Riley, R; Green, J; Willis, S; Soden, E; Rushby, C; Postle, D; Wakeling, S

    1998-01-01

    Health promotion activities with children and young people are important as they take messages about health seriously and can be influential in spreading messages about healthy living to their friends and families. Child health professionals have an important role to play in passing on messages of positive health to children and young people. Peer education is a useful way of passing on messages about health to young people. This article shares examples of three health promotion projects with children in a community trust, looking at asthma, sex education and testicular examination.

  19. Real-Time Computer-Mediated Communication: Email and Instant Messaging Simulation

    ERIC Educational Resources Information Center

    Newman, Amy

    2007-01-01

    As computer-mediated communication becomes increasingly prevalent in the workplace, students need to apply effective writing principles to today's technologies. Email, in particular, requires interns and new hires to manage incoming messages, use an appropriate tone, and craft clear, concise messages. In addition, with instant messaging (IM)…

  20. Change over Time in Children's Co-Constructed Writing

    ERIC Educational Resources Information Center

    Harmey, Sinead Judith

    2015-01-01

    The development of expertise in writing is a complex but important achievement for young children as they become literate. Writing is a critical component of literacy development, yet there are few accounts of change over time in early writing development that attend to both changes in writing behaviors, the complexity of written messages, and the…

  1. When School Literacy and School Discipline Practices Intersect: Why Schools Punish Student Writing

    ERIC Educational Resources Information Center

    Amanti, Cathy

    2014-01-01

    This article provides an exposé of the ironic fact that students both learn to write and are punished for writing in schools. It explores and considers what type of student writing may precipitate a discipline event. These infractions consist primarily of unauthorized writing, such as text messages and writing on clothes, bodies, and walls, whose…

  2. Talking with Will Hobbs.

    ERIC Educational Resources Information Center

    James, Helen Foster

    2000-01-01

    This interview with author Will Hobbs, who has written books for young adults as well as picture books, discusses his writing process; writing historical novels; books that influenced him; other influences on his writing; and his message for readers. (LRW)

  3. NAS Parallel Benchmark. Results 11-96: Performance Comparison of HPF and MPI Based NAS Parallel Benchmarks. 1.0

    NASA Technical Reports Server (NTRS)

    Saini, Subash; Bailey, David; Chancellor, Marisa K. (Technical Monitor)

    1997-01-01

    High Performance Fortran (HPF), the high-level language for parallel Fortran programming, is based on Fortran 90. HALF was defined by an informal standards committee known as the High Performance Fortran Forum (HPFF) in 1993, and modeled on TMC's CM Fortran language. Several HPF features have since been incorporated into the draft ANSI/ISO Fortran 95, the next formal revision of the Fortran standard. HPF allows users to write a single parallel program that can execute on a serial machine, a shared-memory parallel machine, or a distributed-memory parallel machine. HPF eliminates the complex, error-prone task of explicitly specifying how, where, and when to pass messages between processors on distributed-memory machines, or when to synchronize processors on shared-memory machines. HPF is designed in a way that allows the programmer to code an application at a high level, and then selectively optimize portions of the code by dropping into message-passing or calling tuned library routines as 'extrinsics'. Compilers supporting High Performance Fortran features first appeared in late 1994 and early 1995 from Applied Parallel Research (APR) Digital Equipment Corporation, and The Portland Group (PGI). IBM introduced an HPF compiler for the IBM RS/6000 SP/2 in April of 1996. Over the past two years, these implementations have shown steady improvement in terms of both features and performance. The performance of various hardware/ programming model (HPF and MPI (message passing interface)) combinations will be compared, based on latest NAS (NASA Advanced Supercomputing) Parallel Benchmark (NPB) results, thus providing a cross-machine and cross-model comparison. Specifically, HPF based NPB results will be compared with MPI based NPB results to provide perspective on performance currently obtainable using HPF versus MPI or versus hand-tuned implementations such as those supplied by the hardware vendors. In addition we would also present NPB (Version 1.0) performance results for the following systems: DEC Alpha Server 8400 5/440, Fujitsu VPP Series (VX, VPP300, and VPP700), HP/Convex Exemplar SPP2000, IBM RS/6000 SP P2SC node (120 MHz) NEC SX-4/32, SGI/CRAY T3E, SGI Origin2000.

  4. Dispatching packets on a global combining network of a parallel computer

    DOEpatents

    Almasi, Gheorghe [Ardsley, NY; Archer, Charles J [Rochester, MN

    2011-07-19

    Methods, apparatus, and products are disclosed for dispatching packets on a global combining network of a parallel computer comprising a plurality of nodes connected for data communications using the network capable of performing collective operations and point to point operations that include: receiving, by an origin system messaging module on an origin node from an origin application messaging module on the origin node, a storage identifier and an operation identifier, the storage identifier specifying storage containing an application message for transmission to a target node, and the operation identifier specifying a message passing operation; packetizing, by the origin system messaging module, the application message into network packets for transmission to the target node, each network packet specifying the operation identifier and an operation type for the message passing operation specified by the operation identifier; and transmitting, by the origin system messaging module, the network packets to the target node.

  5. MPIRUN: A Portable Loader for Multidisciplinary and Multi-Zonal Applications

    NASA Technical Reports Server (NTRS)

    Fineberg, Samuel A.; Woodrow, Thomas S. (Technical Monitor)

    1994-01-01

    Multidisciplinary and multi-zonal applications are an important class of applications in the area of Computational Aerosciences. In these codes, two or more distinct parallel programs or copies of a single program are utilized to model a single problem. To support such applications, it is common to use a programming model where a program is divided into several single program multiple data stream (SPMD) applications, each of which solves the equations for a single physical discipline or grid zone. These SPMD applications are then bound together to form a single multidisciplinary or multi-zonal program in which the constituent parts communicate via point-to-point message passing routines. One method for implementing the message passing portion of these codes is with the new Message Passing Interface (MPI) standard. Unfortunately, this standard only specifies the message passing portion of an application, but does not specify any portable mechanisms for loading an application. MPIRUN was developed to provide a portable means for loading MPI programs, and was specifically targeted at multidisciplinary and multi-zonal applications. Programs using MPIRUN for loading and MPI for message passing are then portable between all machines supported by MPIRUN. MPIRUN is currently implemented for the Intel iPSC/860, TMC CM5, IBM SP-1 and SP-2, Intel Paragon, and workstation clusters. Further, MPIRUN is designed to be simple enough to port easily to any system supporting MPI.

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Painter, J.; McCormick, P.; Krogh, M.

    This paper presents the ACL (Advanced Computing Lab) Message Passing Library. It is a high throughput, low latency communications library, based on Thinking Machines Corp.`s CMMD, upon which message passing applications can be built. The library has been implemented on the Cray T3D, Thinking Machines CM-5, SGI workstations, and on top of PVM.

  7. How do I love thee? Let me count the words: the social effects of expressive writing.

    PubMed

    Slatcher, Richard B; Pennebaker, James W

    2006-08-01

    Writing about emotional experiences is associated with a host of positive outcomes. This study extended the expressive-writing paradigm to the realm of romantic relationships to examine the social effects of writing. For 3 consecutive days, one person from each of 86 dating couples either wrote about his or her deepest thoughts and feelings about the relationship or wrote about his or her daily activities. In the days before and after writing, instant messages were collected from the couples. Participants who wrote about their relationship were significantly more likely to still be dating their romantic partners 3 months later. Linguistic analyses of the instant messages revealed that participants and their partners used significantly more positive and negative emotion words in the days following the expressive-writing manipulation if the participants had written about their relationship than if they had written about their daily activities. Increases in positive emotion words partially mediated the relation between expressive writing and relationship stability.

  8. Because Digital Writing Matters: Improving Student Writing in Online and Multimedia Environments

    ERIC Educational Resources Information Center

    DeVoss, Danielle Nicole; Eidman-Aadahl, Elyse; Hicks, Troy

    2010-01-01

    As many teachers know, students may be adept at text messaging and communicating online but do not know how to craft a basic essay. In the classroom, students are increasingly required to create web-based or multi-media productions that also include writing. Since writing in and for the online realm often defies standard writing conventions, this…

  9. Simplifying and speeding the management of intra-node cache coherence

    DOEpatents

    Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton on Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Phillip [Cortlandt Manor, NY; Hoenicke, Dirk [Ossining, NY; Ohmacht, Martin [Yorktown Heights, NY

    2012-04-17

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  10. Managing coherence via put/get windows

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blumrich, Matthias A; Chen, Dong; Coteus, Paul W

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an areamore » of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.« less

  11. Promoting Linguistic Complexity, Greater Message Length and Ease of Engagement in Email Writing in People with Aphasia: Initial Evidence from a Study Utilizing Assistive Writing Software

    ERIC Educational Resources Information Center

    Thiel, Lindsey; Sage, Karen; Conroy, Paul

    2017-01-01

    Background: Improving email writing in people with aphasia could enhance their ability to communicate, promote interaction and reduce isolation. Spelling therapies have been effective in improving single-word writing. However, there has been limited evidence on how to achieve changes to everyday writing tasks such as email writing in people with…

  12. Promoting Creative Tension within Collaborative Writing Groups.

    ERIC Educational Resources Information Center

    Ewald, Helen Rothschild; MacCallum, Virginia

    1990-01-01

    Describes a collaborative writing assignment which features a series of interconnected business messages arising out of a case study and including inhouse memos and an analytical report. Shows how the design of a collaborative writing assignment can foster creative rather than debilitative tension. (RS)

  13. Motivating Smoking Cessation Text Messages: Perspectives from Pregnant Smokers.

    PubMed

    Schindler-Ruwisch, Jennifer M; Leavitt, Leah E; Macherelli, Laura E; Turner, Monique M; Abroms, Lorien C

    2018-06-01

    The purpose of this research is to analyze cessation text-messages written by pregnant smokers to elucidate the target population's preferred content and message attributes. To achieve this goal, the objectives of this study are three-fold; to qualitatively code messages written by pregnant smokers for frame, type of appeal, and intended target. Study participants were recruited as part of a larger trial of pregnant smokers who were enrolled in a text-messaging program or control group and surveyed 1 month post-enrollment. Each participant was asked to write a brief message to another pregnant smoker and two independent coders qualitatively analyzed responses. User generated messages (N = 51) were equally loss and gain framed, and the most common appeals were: fear, guilt, cognitive, hope and empathy, in order of most to least frequent. The target of the majority of the messages was the baby. Allowing pregnant smokers to write cessation text-messages for other pregnant women can provide relevant insight into intervention content. Specifically, pregnant smokers appear to equally promote gain and loss frames, but may prefer messages that include components of fear and guilt related to the impact of smoking on their baby. Additional research is needed to systematically uncover perspectives of pregnant smokers to ensure interventions are optimally effective.

  14. DMA engine for repeating communication patterns

    DOEpatents

    Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-09-21

    A parallel computer system is constructed as a network of interconnected compute nodes to operate a global message-passing application for performing communications across the network. Each of the compute nodes includes one or more individual processors with memories which run local instances of the global message-passing application operating at each compute node to carry out local processing operations independent of processing operations carried out at other compute nodes. Each compute node also includes a DMA engine constructed to interact with the application via Injection FIFO Metadata describing multiple Injection FIFOs where each Injection FIFO may containing an arbitrary number of message descriptors in order to process messages with a fixed processing overhead irrespective of the number of message descriptors included in the Injection FIFO.

  15. Two Women with Multiple Disabilities Communicate with Distant Partners via a Special Text Messaging System

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; O'Reilly, Mark F.; Singh, Nirbhay N.; Sigafoos, Jeff; Green, Vanessa A.; Oliva, Doretta; Alberti, Gloria; Carrella, Luigina

    2013-01-01

    This study extended the research on a special text messaging system, which allows persons with multiple disabilities to (a) write and send messages to distant partners and (b) have messages from those partners read out to them. The study involved two women with multiple disabilities (including blindness or minimal residual vision). The system…

  16. Writing for New Readers: Message-Making in Print. Workshop Series. Occasional Papers on Basic Education. Paper Nr. 1.

    ERIC Educational Resources Information Center

    Bhola, H. S.

    At the heart of the enterprise of providing reading materials to new readers is the writer. The writer must write before the new literates can read and must write both effectively and interestingly. Although talent helps, acquired skills play an important part in writing, especially in expository writing. More important, to enable them to produce…

  17. Writing a case report: polishing a gem?

    PubMed

    Papanas, N; Lazarides, M K

    2008-08-01

    Case reports describe patient cases which are of particular interest due to their novelty and their potential message for clinical practice. While there are several types of case reports, originality and clinical implications constitute the main virtues by which case reports are judged. Defining the educational message and choosing the right audience are vital steps in the process of writing. Generally, a case report is structured, its main components being the abstract, the introduction, the case description and the discussion. Guidelines and tips for writing case reports are not enough for making a successful author, but they help, especially less experienced doctors, to exercise and improve their writing. If properly prepared, case reports can still communicate new observations in an interesting and pleasant way, thereby enriching our knowledge, even in the era of evidence-based medicine.

  18. Cooperative Data Sharing: Simple Support for Clusters of SMP Nodes

    NASA Technical Reports Server (NTRS)

    DiNucci, David C.; Balley, David H. (Technical Monitor)

    1997-01-01

    Libraries like PVM and MPI send typed messages to allow for heterogeneous cluster computing. Lower-level libraries, such as GAM, provide more efficient access to communication by removing the need to copy messages between the interface and user space in some cases. still lower-level interfaces, such as UNET, get right down to the hardware level to provide maximum performance. However, these are all still interfaces for passing messages from one process to another, and have limited utility in a shared-memory environment, due primarily to the fact that message passing is just another term for copying. This drawback is made more pertinent by today's hybrid architectures (e.g. clusters of SMPs), where it is difficult to know beforehand whether two communicating processes will share memory. As a result, even portable language tools (like HPF compilers) must either map all interprocess communication, into message passing with the accompanying performance degradation in shared memory environments, or they must check each communication at run-time and implement the shared-memory case separately for efficiency. Cooperative Data Sharing (CDS) is a single user-level API which abstracts all communication between processes into the sharing and access coordination of memory regions, in a model which might be described as "distributed shared messages" or "large-grain distributed shared memory". As a result, the user programs to a simple latency-tolerant abstract communication specification which can be mapped efficiently to either a shared-memory or message-passing based run-time system, depending upon the available architecture. Unlike some distributed shared memory interfaces, the user still has complete control over the assignment of data to processors, the forwarding of data to its next likely destination, and the queuing of data until it is needed, so even the relatively high latency present in clusters can be accomodated. CDS does not require special use of an MMU, which can add overhead to some DSM systems, and does not require an SPMD programming model. unlike some message-passing interfaces, CDS allows the user to implement efficient demand-driven applications where processes must "fight" over data, and does not perform copying if processes share memory and do not attempt concurrent writes. CDS also supports heterogeneous computing, dynamic process creation, handlers, and a very simple thread-arbitration mechanism. Additional support for array subsections is currently being considered. The CDS1 API, which forms the kernel of CDS, is built primarily upon only 2 communication primitives, one process initiation primitive, and some data translation (and marshalling) routines, memory allocation routines, and priority control routines. The entire current collection of 28 routines provides enough functionality to implement most (or all) of MPI 1 and 2, which has a much larger interface consisting of hundreds of routines. still, the API is small enough to consider integrating into standard os interfaces for handling inter-process communication in a network-independent way. This approach would also help to solve many of the problems plaguing other higher-level standards such as MPI and PVM which must, in some cases, "play OS" to adequately address progress and process control issues. The CDS2 API, a higher level of interface roughly equivalent in functionality to MPI and to be built entirely upon CDS1, is still being designed. It is intended to add support for the equivalent of communicators, reduction and other collective operations, process topologies, additional support for process creation, and some automatic memory management. CDS2 will not exactly match MPI, because the copy-free semantics of communication from CDS1 will be supported. CDS2 application programs will be free to carefully also use CDS1. CDS1 has been implemented on networks of workstations running unmodified Unix-based operating systems, using UDP/IP and vendor-supplied high- performance locks. Although its inter-node performance is currently unimpressive due to rudimentary implementation technique, it even now outperforms highly-optimized MPI implementation on intra-node communication due to its support for non-copy communication. The similarity of the CDS1 architecture to that of other projects such as UNET and TRAP suggests that the inter-node performance can be increased significantly to surpass MPI or PVM, and it may be possible to migrate some of its functionality to communication controllers.

  19. Improving Argumentative Writing: Effects of a Blended Learning Approach and Gamification

    ERIC Educational Resources Information Center

    Lam, Yau Wai; Hew, Khe Foon; Chiu, Kin Fung

    2018-01-01

    This study investigated the effectiveness of a blended learning approach--involving the thesis, analysis, and synthesis key (TASK) procedural strategy; online Edmodo discussions; online message labels; and writing models--on student argumentative writing in a Hong Kong secondary school. It also examined whether the application of digital game…

  20. Grammar-Guided Writing for AAC Users

    ERIC Educational Resources Information Center

    Hunnicutt, Sheri; Magnuson, Tina

    2007-01-01

    A method of grammar-guided writing has been devised to guide graphic sign users through the construction of text messages for use in e-mail and other applications with a remote receiver. The purpose is to promote morphologically and syntactically correct sentences. The available grammatical structures in grammar-guided writing are the highest…

  1. Message Passing vs. Shared Address Space on a Cluster of SMPs

    NASA Technical Reports Server (NTRS)

    Shan, Hongzhang; Singh, Jaswinder Pal; Oliker, Leonid; Biswas, Rupak

    2000-01-01

    The convergence of scalable computer architectures using clusters of PCs (or PC-SMPs) with commodity networking has become an attractive platform for high end scientific computing. Currently, message-passing and shared address space (SAS) are the two leading programming paradigms for these systems. Message-passing has been standardized with MPI, and is the most common and mature programming approach. However message-passing code development can be extremely difficult, especially for irregular structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality, and high protocol overhead. In this paper, we compare the performance of and programming effort, required for six applications under both programming models on a 32 CPU PC-SMP cluster. Our application suite consists of codes that typically do not exhibit high efficiency under shared memory programming. due to their high communication to computation ratios and complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of our applications: however, on certain classes of problems SAS performance is competitive with MPI. We also present new algorithms for improving the PC cluster performance of MPI collective operations.

  2. Warning: You Have an E-Mail Message.

    ERIC Educational Resources Information Center

    Piirto, John

    1997-01-01

    A survey of 101 faculty in a variety of disciplines found that most do not give much attention to the composition of electronic mail messages and are not bothered much when receiving messages containing mechanical or composition errors. Results suggest faculty should be cautious about relaxing the rules of grammar, punctuation, and good writing in…

  3. Simple Algorithms for Distributed Leader Election in Anonymous Synchronous Rings and Complete Networks Inspired by Neural Development in Fruit Flies.

    PubMed

    Xu, Lei; Jeavons, Peter

    2015-11-01

    Leader election in anonymous rings and complete networks is a very practical problem in distributed computing. Previous algorithms for this problem are generally designed for a classical message passing model where complex messages are exchanged. However, the need to send and receive complex messages makes such algorithms less practical for some real applications. We present some simple synchronous algorithms for distributed leader election in anonymous rings and complete networks that are inspired by the development of the neural system of the fruit fly. Our leader election algorithms all assume that only one-bit messages are broadcast by nodes in the network and processors are only able to distinguish between silence and the arrival of one or more messages. These restrictions allow implementations to use a simpler message-passing architecture. Even with these harsh restrictions our algorithms are shown to achieve good time and message complexity both analytically and experimentally.

  4. Static Noise Margin Enhancement by Flex-Pass-Gate SRAM

    NASA Astrophysics Data System (ADS)

    O'Uchi, Shin-Ichi; Masahara, Meishoku; Sakamoto, Kunihiro; Endo, Kazuhiko; Liu, Yungxun; Matsukawa, Takashi; Sekigawa, Toshihiro; Koike, Hanpei; Suzuki, Eiichi

    A Flex-Pass-Gate SRAM, i.e. a fin-type-field-effect-transistor- (FinFET-) based SRAM, is proposed to enhance noise margin during both read and write operations. In its cell, the flip-flop is composed of usual three-terminal- (3T-) FinFETs while pass gates are composed of four-terminal- (4T-) FinFETs. The 4T-FinFETs enable to adopt a dynamic threshold-voltage control in the pass gates. During a write operation, the threshold voltage of the pass gates is lowered to enhance the writing speed and stability. During the read operation, on the other hand, the threshold voltage is raised to enhance the static noise margin. An asymmetric-oxide 4T-FinFET is helpful to manage the leakage current through the pass gate. In this paper, a design strategy of the pass gate with an asymmetric gate oxide is considered, and a TCAD-based Monte Carlo simulation reveals that the Flex-Pass-Gate SRAM based on that design strategy is expected to be effective in half-pitch 32-nm technology for low-standby-power (LSTP) applications, even taking into account the variability in the device performance.

  5. A message passing kernel for the hypercluster parallel processing test bed

    NASA Technical Reports Server (NTRS)

    Blech, Richard A.; Quealy, Angela; Cole, Gary L.

    1989-01-01

    A Message-Passing Kernel (MPK) for the Hypercluster parallel-processing test bed is described. The Hypercluster is being developed at the NASA Lewis Research Center to support investigations of parallel algorithms and architectures for computational fluid and structural mechanics applications. The Hypercluster resembles the hypercube architecture except that each node consists of multiple processors communicating through shared memory. The MPK efficiently routes information through the Hypercluster, using a message-passing protocol when necessary and faster shared-memory communication whenever possible. The MPK also interfaces all of the processors with the Hypercluster operating system (HYCLOPS), which runs on a Front-End Processor (FEP). This approach distributes many of the I/O tasks to the Hypercluster processors and eliminates the need for a separate I/O support program on the FEP.

  6. Information Management and Learning in Computer Conferences: Coping with Irrelevant and Unconnected Messages.

    ERIC Educational Resources Information Center

    Schwan, Stephan; Straub, Daniela; Hesse, Friedrich W.

    2002-01-01

    Describes a study of computer conferencing where learners interacted over the course of four log-in sessions to acquire the knowledge sufficient to pass a learning test. Studied the number of messages irrelevant to the topic, explicit threading of messages, reading times of relevant messages, and learning outcomes. (LRW)

  7. Hand preference for sending mobile-phone text messages: associations with sex, writing hand, and throwing hand.

    PubMed

    Lambert, Anthony; Hallett, Charlene

    2009-07-01

    Hand preference for sending mobile-phone text messages ("texting") and its relationship with hand preference for other activities were investigated in a questionnaire study with 886 participants. Overall rates of both sinistrality and dextrality were reduced for texting, in comparison with other activities, due to the substantial number of individuals who use both hands simultaneously when performing this activity. Because they both involve verbal expression, it was hypothesised that the association between hand preferences for texting and writing might be stronger than the association between either of these tasks and more spatial activities, such as throwing. This prediction was not confirmed, either in the sample as a whole or in a sub-group of individuals who reported writing and throwing with opposite hands. Females were less likely than males to use their left hand when sending text messages. Implications of these findings are discussed, in relation to theoretical views of handedness and in relation to practical aspects of mobile-phone design.

  8. Invisible Ink Marking in ECL Membrane Assays.

    PubMed

    Kurien, Biji T

    2015-01-01

    Invisible ink and writing secret messages have been part of man's fantasy, having proven useful in clandestine and high sensitivity areas. Security inks, made up of invisible materials that give printed, anti-photocopy images capable of being read only under special environments, have become important. An ink formulation based on silicon(IV) 2,3-naphthalocyanine bis(trihexylsilyloxide) as colorant, invisible to the naked eye but infrared readable, has been described earlier. Biometric DNA ink has also been developed for security authentication. In lighter vein, many budding scientists and others have often experimented with writing secret messages on paper, either for purposes of fun or actually sending secret messages to friends. It involved the use of lemon juice, milk, or other solutions that could be used with a dip pen, brush, or a fountain pen to write invisible messages on a blank white paper. Words turn up as magic when the paper is exposed to heat in one form or the other. Here, we attempt to end this book on a slightly humorous note by showing that invisible messages can be written on nitrocellulose membranes (but not on polyvinylidene difluoride membranes) using an appropriately diluted horse radish peroxidase/alkaline phosphatase anti-IgG conjugate (rabbit, mouse, or human anti-IgG). The message is written on the membrane, preferably with a fountain pen, and the membrane is allowed to dry. Regular detection with enhanced chemiluminescence plus or nitro blue tetrazolium/5-bromo-4-chloro-3-indolyl phosphate systems is used to unravel the secret message. In addition, this method could be used to mark nitrocellulose membranes for orientation purposes using ECL detection system and thus can eliminate the use of autoradiography pens.

  9. Research on Writing Conventions: U R What U Write

    ERIC Educational Resources Information Center

    Nelson, Leah; Feinstein, Sheryl G.

    2007-01-01

    The purpose of this quantitative study is to determine how secondary students use conventions in classroom composition assignments compared to the Internet writing outlets of e-mail, instant messaging, and blogs. Thirty-two ninth grade students were identified to participate in this study. Half of the participants were deeply involved in online…

  10. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response

    PubMed Central

    Sutton, Jeannette; Gibson, C. Ben; Spiro, Emma S.; League, Cedar; Fitzhugh, Sean M.; Butts, Carter T.

    2015-01-01

    Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not) perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials’ Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events. PMID:26295584

  11. MPI-IO: A Parallel File I/O Interface for MPI Version 0.3

    NASA Technical Reports Server (NTRS)

    Corbett, Peter; Feitelson, Dror; Hsu, Yarsun; Prost, Jean-Pierre; Snir, Marc; Fineberg, Sam; Nitzberg, Bill; Traversat, Bernard; Wong, Parkson

    1995-01-01

    Thanks to MPI [9], writing portable message passing parallel programs is almost a reality. One of the remaining problems is file I/0. Although parallel file systems support similar interfaces, the lack of a standard makes developing a truly portable program impossible. Further, the closest thing to a standard, the UNIX file interface, is ill-suited to parallel computing. Working together, IBM Research and NASA Ames have drafted MPI-I0, a proposal to address the portable parallel I/0 problem. In a nutshell, this proposal is based on the idea that I/0 can be modeled as message passing: writing to a file is like sending a message, and reading from a file is like receiving a message. MPI-IO intends to leverage the relatively wide acceptance of the MPI interface in order to create a similar I/0 interface. The above approach can be materialized in different ways. The current proposal represents the result of extensive discussions (and arguments), but is by no means finished. Many changes can be expected as additional participants join the effort to define an interface for portable I/0. This document is organized as follows. The remainder of this section includes a discussion of some issues that have shaped the style of the interface. Section 2 presents an overview of MPI-IO as it is currently defined. It specifies what the interface currently supports and states what would need to be added to the current proposal to make the interface more complete and robust. The next seven sections contain the interface definition itself. Section 3 presents definitions and conventions. Section 4 contains functions for file control, most notably open. Section 5 includes functions for independent I/O, both blocking and nonblocking. Section 6 includes functions for collective I/O, both blocking and nonblocking. Section 7 presents functions to support system-maintained file pointers, and shared file pointers. Section 8 presents constructors that can be used to define useful filetypes (the role of filetypes is explained in Section 2 below). Section 9 presents how the error handling mechanism of MPI is supported by the MPI-IO interface. All this is followed by a set of appendices, which contain information about issues that have not been totally resolved yet, and about design considerations. The reader can find there the motivation behind some of our design choices. More information on this would definitely be welcome and will be included in a further release of this document. The first appendix contains a description of MPI-I0's 'hints' structure which is used when opening a file. Appendix B is a discussion of various issues in the support for file pointers. Appendix C explains what we mean in talking about atomic access. Appendix D provides detailed examples of filetype constructors, and Appendix E contains a collection of arguments for and against various design decisions.

  12. The Edge-Disjoint Path Problem on Random Graphs by Message-Passing.

    PubMed

    Altarelli, Fabrizio; Braunstein, Alfredo; Dall'Asta, Luca; De Bacco, Caterina; Franz, Silvio

    2015-01-01

    We present a message-passing algorithm to solve a series of edge-disjoint path problems on graphs based on the zero-temperature cavity equations. Edge-disjoint paths problems are important in the general context of routing, that can be defined by incorporating under a unique framework both traffic optimization and total path length minimization. The computation of the cavity equations can be performed efficiently by exploiting a mapping of a generalized edge-disjoint path problem on a star graph onto a weighted maximum matching problem. We perform extensive numerical simulations on random graphs of various types to test the performance both in terms of path length minimization and maximization of the number of accommodated paths. In addition, we test the performance on benchmark instances on various graphs by comparison with state-of-the-art algorithms and results found in the literature. Our message-passing algorithm always outperforms the others in terms of the number of accommodated paths when considering non trivial instances (otherwise it gives the same trivial results). Remarkably, the largest improvement in performance with respect to the other methods employed is found in the case of benchmarks with meshes, where the validity hypothesis behind message-passing is expected to worsen. In these cases, even though the exact message-passing equations do not converge, by introducing a reinforcement parameter to force convergence towards a sub optimal solution, we were able to always outperform the other algorithms with a peak of 27% performance improvement in terms of accommodated paths. On random graphs, we numerically observe two separated regimes: one in which all paths can be accommodated and one in which this is not possible. We also investigate the behavior of both the number of paths to be accommodated and their minimum total length.

  13. The Edge-Disjoint Path Problem on Random Graphs by Message-Passing

    PubMed Central

    2015-01-01

    We present a message-passing algorithm to solve a series of edge-disjoint path problems on graphs based on the zero-temperature cavity equations. Edge-disjoint paths problems are important in the general context of routing, that can be defined by incorporating under a unique framework both traffic optimization and total path length minimization. The computation of the cavity equations can be performed efficiently by exploiting a mapping of a generalized edge-disjoint path problem on a star graph onto a weighted maximum matching problem. We perform extensive numerical simulations on random graphs of various types to test the performance both in terms of path length minimization and maximization of the number of accommodated paths. In addition, we test the performance on benchmark instances on various graphs by comparison with state-of-the-art algorithms and results found in the literature. Our message-passing algorithm always outperforms the others in terms of the number of accommodated paths when considering non trivial instances (otherwise it gives the same trivial results). Remarkably, the largest improvement in performance with respect to the other methods employed is found in the case of benchmarks with meshes, where the validity hypothesis behind message-passing is expected to worsen. In these cases, even though the exact message-passing equations do not converge, by introducing a reinforcement parameter to force convergence towards a sub optimal solution, we were able to always outperform the other algorithms with a peak of 27% performance improvement in terms of accommodated paths. On random graphs, we numerically observe two separated regimes: one in which all paths can be accommodated and one in which this is not possible. We also investigate the behavior of both the number of paths to be accommodated and their minimum total length. PMID:26710102

  14. Strategies to Advance College-Ready Writing Competencies

    ERIC Educational Resources Information Center

    Wang, Manhui Amy

    2013-01-01

    While many college students at two-year public colleges need Basic Writing classes before entering college-level writing courses, only 34% have successfully passed their Basic Writing classes (Ternes, 2008). Troyo (2000) maintained that the reason students failed in Basic Writing classes was that more research-based effective teaching strategies…

  15. Research to Practice: Integrating Reading and Writing in a Kindergarten Curriculum. Technical Report No. 415.

    ERIC Educational Resources Information Center

    Kawakami-Arakaki, Alice J.; And Others

    Based on emergent literacy research, two components of reading and writing--the morning message and the writing process--were developed in a laboratory school kindergarten by teacher-researcher collaboration and later disseminated to both public and private schools through a project conducted for the Kamehameha Schools, a private school in…

  16. Young Learner Writing Performance in Swiss Elementary Schools--Which Teacher Variables Matter?

    ERIC Educational Resources Information Center

    Loder Buechel, Laura

    2015-01-01

    Elementary school English language teachers in Swiss public schools often question the role of writing in early years language instruction because there is a significant disparity in messages they receive from Board of Education members, from fellow teachers and from teacher trainers. This study describes the issues concerning writing in the first…

  17. Message passing with a limited number of DMA byte counters

    DOEpatents

    Blocksome, Michael [Rochester, MN; Chen, Dong [Croton on Hudson, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Kumar, Sameer [White Plains, NY; Parker, Jeffrey J [Rochester, MN

    2011-10-04

    A method for passing messages in a parallel computer system constructed as a plurality of compute nodes interconnected as a network where each compute node includes a DMA engine but includes only a limited number of byte counters for tracking a number of bytes that are sent or received by the DMA engine, where the byte counters may be used in shared counter or exclusive counter modes of operation. The method includes using rendezvous protocol, a source compute node deterministically sending a request to send (RTS) message with a single RTS descriptor using an exclusive injection counter to track both the RTS message and message data to be sent in association with the RTS message, to a destination compute node such that the RTS descriptor indicates to the destination compute node that the message data will be adaptively routed to the destination node. Using one DMA FIFO at the source compute node, the RTS descriptors are maintained for rendezvous messages destined for the destination compute node to ensure proper message data ordering thereat. Using a reception counter at a DMA engine, the destination compute node tracks reception of the RTS and associated message data and sends a clear to send (CTS) message to the source node in a rendezvous protocol form of a remote get to accept the RTS message and message data and processing the remote get (CTS) by the source compute node DMA engine to provide the message data to be sent.

  18. Distributed parallel messaging for multiprocessor systems

    DOEpatents

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  19. Public-channel cryptography based on mutual chaos pass filters.

    PubMed

    Klein, Einat; Gross, Noam; Kopelowitz, Evi; Rosenbluh, Michael; Khaykovich, Lev; Kinzel, Wolfgang; Kanter, Ido

    2006-10-01

    We study the mutual coupling of chaotic lasers and observe both experimentally and in numeric simulations that there exists a regime of parameters for which two mutually coupled chaotic lasers establish isochronal synchronization, while a third laser coupled unidirectionally to one of the pair does not synchronize. We then propose a cryptographic scheme, based on the advantage of mutual coupling over unidirectional coupling, where all the parameters of the system are public knowledge. We numerically demonstrate that in such a scheme the two communicating lasers can add a message signal (compressed binary message) to the transmitted coupling signal and recover the message in both directions with high fidelity by using a mutual chaos pass filter procedure. An attacker, however, fails to recover an errorless message even if he amplifies the coupling signal.

  20. An implementation and performance measurement of the progressive retry technique

    NASA Technical Reports Server (NTRS)

    Suri, Gaurav; Huang, Yennun; Wang, Yi-Min; Fuchs, W. Kent; Kintala, Chandra

    1995-01-01

    This paper describes a recovery technique called progressive retry for bypassing software faults in message-passing applications. The technique is implemented as reusable modules to provide application-level software fault tolerance. The paper describes the implementation of the technique and presents results from the application of progressive retry to two telecommunications systems. the results presented show that the technique is helpful in reducing the total recovery time for message-passing applications.

  1. Belief propagation decoding of quantum channels by passing quantum messages

    NASA Astrophysics Data System (ADS)

    Renes, Joseph M.

    2017-07-01

    The belief propagation (BP) algorithm is a powerful tool in a wide range of disciplines from statistical physics to machine learning to computational biology, and is ubiquitous in decoding classical error-correcting codes. The algorithm works by passing messages between nodes of the factor graph associated with the code and enables efficient decoding of the channel, in some cases even up to the Shannon capacity. Here we construct the first BP algorithm which passes quantum messages on the factor graph and is capable of decoding the classical-quantum channel with pure state outputs. This gives explicit decoding circuits whose number of gates is quadratic in the code length. We also show that this decoder can be modified to work with polar codes for the pure state channel and as part of a decoder for transmitting quantum information over the amplitude damping channel. These represent the first explicit capacity-achieving decoders for non-Pauli channels.

  2. LCAMP: Location Constrained Approximate Message Passing for Compressed Sensing MRI

    PubMed Central

    Sung, Kyunghyun; Daniel, Bruce L; Hargreaves, Brian A

    2016-01-01

    Iterative thresholding methods have been extensively studied as faster alternatives to convex optimization methods for solving large-sized problems in compressed sensing. A novel iterative thresholding method called LCAMP (Location Constrained Approximate Message Passing) is presented for reducing computational complexity and improving reconstruction accuracy when a nonzero location (or sparse support) constraint can be obtained from view shared images. LCAMP modifies the existing approximate message passing algorithm by replacing the thresholding stage with a location constraint, which avoids adjusting regularization parameters or thresholding levels. This work is first compared with other conventional reconstruction methods using random 1D signals and then applied to dynamic contrast-enhanced breast MRI to demonstrate the excellent reconstruction accuracy (less than 2% absolute difference) and low computation time (5 - 10 seconds using Matlab) with highly undersampled 3D data (244 × 128 × 48; overall reduction factor = 10). PMID:23042658

  3. Efficient Tracing for On-the-Fly Space-Time Displays in a Debugger for Message Passing Programs

    NASA Technical Reports Server (NTRS)

    Hood, Robert; Matthews, Gregory

    2001-01-01

    In this work we describe the implementation of a practical mechanism for collecting and displaying trace information in a debugger for message passing programs. We introduce a trace format that is highly compressible while still providing information adequate for debugging purposes. We make the mechanism convenient for users to access by incorporating the trace collection in a set of wrappers for the MPI (message passing interface) communication library. We implement several debugger operations that use the trace display: consistent stoplines, undo, and rollback. They all are implemented using controlled replay, which executes at full speed in target processes until the appropriate position in the computation is reached. They provide convenient mechanisms for getting to places in the execution where the full power of a state-based debugger can be brought to bear on isolating communication errors.

  4. Design of a network for concurrent message passing systems

    NASA Astrophysics Data System (ADS)

    Song, Paul Y.

    1988-08-01

    We describe the design of the network design frame (NDF), a self-timed routing chip for a message-passing concurrent computer. The NDF uses a partitioned data path, low-voltage output drivers, and a distributed token-passing arbiter to provide a bandwidth of 450 Mbits/sec into the network. Wormhole routing and bidirectional virtual channels are used to provide low latency communications, less than 2us latency to deliver a 216 bit message across the diameter of a 1K node mess-connected machine. To support concurrent software systems, the NDF provides two logical networks, one for user messages and one for system messages. The two networks share the same set of physical wires. To facilitate the development of network nodes, the NDF is a design frame. The NDF circuitry is integrated into the pad frame of a chip leaving the center of the chip uncommitted. We define an analytic framework in which to study the effects of network size, network buffering capacity, bidirectional channels, and traffic on this class of networks. The response of the network to various combinations of these parameters are obtained through extensive simulation of the network model. Through simulation, we are able to observe the macro behavior of the network as opposed to the micro behavior of the NDF routing controller.

  5. From "What Did I Write?" to "Is This Right?": Intention, Convention, and Accountability in Early Literacy

    ERIC Educational Resources Information Center

    Wohlwend, Karen E.

    2008-01-01

    When children enter public kindergartens in the current atmosphere of high-stakes testing, they often encounter an emphasis on correctness that casts doubt on the integrity of their personally invented messages, prompting them to ask not "What did I write?" but "Is this right?" This ethnographic case study examines early writing by 23 kindergarten…

  6. Beyond the Page: Peers Influence Pre-Kindergarten Writing through Image, Movement, and Talk

    ERIC Educational Resources Information Center

    Kissel, Brian T.

    2009-01-01

    The purpose of this article is to show how pre-kindergarten children influence the writing of peers as they construct messages through images, movement, and talk. The author observed and listened to students as they engaged in the process of writing, then asked them about the meanings of their final written products. He found that pre-kindergarten…

  7. "This Is a Message for …": Third Graders' Use of Written Text Functions to Facilitate Interpersonal Relationships

    ERIC Educational Resources Information Center

    Jaeger, Elizabeth L.

    2016-01-01

    This article describes the ways in which a class of 7- and 8-year-old children used writing to communicate. Using Halliday's Systemic Functional Linguistics as a theoretical frame, I examine what functions these messages served, how functions varied from child to child and how the practice of message-sending evolved over time. Analysis of data…

  8. Exploring the Relationship between Children's Knowledge of Text Message Abbreviations and School Literacy Outcomes

    ERIC Educational Resources Information Center

    Plester, Beverly; Wood, Clare; Joshi, Puja

    2009-01-01

    This paper presents a study of 88 British 10-12-year-old children's knowledge of text message (SMS) abbreviations ("textisms") and how it relates to their school literacy attainment. As a measure of textism knowledge, the children were asked to compose text messages they might write if they were in each of a set of scenarios. Their text…

  9. How Do Skilled and Less-Skilled Spellers Write Text Messages? A Longitudinal Study

    ERIC Educational Resources Information Center

    Bernicot, J.; Goumi, A.; Bert-Erboul, A.; Volckaert-Legrier, O.

    2014-01-01

    The link between students' spelling level and their text-messaging practice gives rise to numerous questions from teachers, parents and the media. A corpus of 4524 text messages produced in daily-life situations by students in sixth and seventh grade (n?=?19, 11-12 years of age) was compiled. None of the participants had ever owned or used a…

  10. The chemical life(1).

    PubMed

    Hodges, Nathan

    2015-01-01

    You write this narrative autoethnography to open up a conversation about our chemical lives. You go through your day with chemical mindfulness, questioning taken-for-granted ideas about natural and artificial, healthy and unhealthy, dependency and addiction, trying to understand the chemical messages we consume through the experiences of everyday life. You reflect on how messages about chemicals influence and structure our lives and why some chemicals are celebrated and some are condemned. Using a second-person narrative voice, you show how the personal is relational and the chemical is cultural. You write because you seek a connection, a chemical bond.

  11. An Interpersonal Approach to Writing Negative Messages.

    ERIC Educational Resources Information Center

    Salerno, Douglas

    1988-01-01

    Asserts that textbook advice regarding buffers and negative messages is simplistic and frequently wrong, and analyses 22 job-refusal letters and their effectiveness. Claims that recent research on cognitive complexity and social perspective-taking suggests the need for more sophisticated audience analysis protocols for dealing with the negative…

  12. The Tricks of the Trade.

    ERIC Educational Resources Information Center

    Cross, Mary

    1982-01-01

    Teaching students copywriting gives them writing techniques that will help them boil a 100-word message down to 20 for a letter, write a memo that is memorable because of its clarity and word choice, or produce a report that offers findings in a readable, believable way. (HOD)

  13. How much importance do we give to target audiences in article writing?

    PubMed

    Nedjat, Sima; Nedjat, Saharnaz; Gholami, Jaleh; Ashoorkhani, Mahnaz; Maleki, Katayoun; Hejrie, Soroush Mortaz; Majdzadeh, Reza

    2010-01-01

    Writing papers can be used as a means to convey a message. Knowledge transfer is also about conveying the right message to the right target audience. The aim of this study was to determine the proportion of articles that had mentioned a clear message and the target audience in the abstract and the article as a whole, and also to examine their association with different determinant factors. Articles published from 2001 to 2006 that were based on clinical and health system research conducted on Iranian populations and on maternal care, diabetes and tuberculosis were searched systematically in domestic and international databases. Eventually checklists (Additional file 1) were completed for 795 articles. Overall, 98.5% of articles had a clear message, whereas 12.5% had addressed the direct target audience. Presence of a clear message in formatted abstracts were seen 3.6 times more (CI95%: 1.5-8.7) than in articles without formatted abstracts (p = 0.005). Addressing of the direct target audience was seen twice as much in health system research articles as compared to clinical studies, odds ratio was 2.3 (CI95%: 1.47-3.48, p<0.001). Creating a format for journal abstracts seems to be an effective intervention for presenting the message in articles.

  14. The graphical brain: Belief propagation and active inference

    PubMed Central

    Friston, Karl J.; Parr, Thomas; de Vries, Bert

    2018-01-01

    This paper considers functional integration in the brain from a computational perspective. We ask what sort of neuronal message passing is mandated by active inference—and what implications this has for context-sensitive connectivity at microscopic and macroscopic levels. In particular, we formulate neuronal processing as belief propagation under deep generative models. Crucially, these models can entertain both discrete and continuous states, leading to distinct schemes for belief updating that play out on the same (neuronal) architecture. Technically, we use Forney (normal) factor graphs to elucidate the requisite message passing in terms of its form and scheduling. To accommodate mixed generative models (of discrete and continuous states), one also has to consider link nodes or factors that enable discrete and continuous representations to talk to each other. When mapping the implicit computational architecture onto neuronal connectivity, several interesting features emerge. For example, Bayesian model averaging and comparison, which link discrete and continuous states, may be implemented in thalamocortical loops. These and other considerations speak to a computational connectome that is inherently state dependent and self-organizing in ways that yield to a principled (variational) account. We conclude with simulations of reading that illustrate the implicit neuronal message passing, with a special focus on how discrete (semantic) representations inform, and are informed by, continuous (visual) sampling of the sensorium. Author Summary This paper considers functional integration in the brain from a computational perspective. We ask what sort of neuronal message passing is mandated by active inference—and what implications this has for context-sensitive connectivity at microscopic and macroscopic levels. In particular, we formulate neuronal processing as belief propagation under deep generative models that can entertain both discrete and continuous states. This leads to distinct schemes for belief updating that play out on the same (neuronal) architecture. Technically, we use Forney (normal) factor graphs to characterize the requisite message passing, and link this formal characterization to canonical microcircuits and extrinsic connectivity in the brain. PMID:29417960

  15. CSlib, a library to couple codes via Client/Server messaging

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Plimpton, Steve

    The CSlib is a small, portable library which enables two (or more) independent simulation codes to be coupled, by exchanging messages with each other. Both codes link to the library when they are built, and can them communicate with each other as they run. The messages contain data or instructions that the two codes send back-and-forth to each other. The messaging can take place via files, sockets, or MPI. The latter is a standard distributed-memory message-passing library.

  16. Design and Implementation of an Operations Module for the ARGOS paperless Ship System

    DTIC Science & Technology

    1989-06-01

    A. OPERATIONS STACK SCRIPTS SCRIPTS FOR STACK: operations * BACKGROUND #1: Operations * on openStack hide message box show menuBar pass openStack end... openStack ** CARD #1, BUTTON #1: Up ***** on mouseUp visual effect zoom out go to card id 10931 of stack argos end mouseUp ** CARD #1, BUTTON #2...STACK SCRIPTS SCRIPTS FOR STACK: Reports ** BACKGROUND #1: Operations * on openStack hie message box show menuBar pass openStack end openStack ** CARD #1

  17. Experiences Using OpenMP Based on Compiler Directed Software DSM on a PC Cluster

    NASA Technical Reports Server (NTRS)

    Hess, Matthias; Jost, Gabriele; Mueller, Matthias; Ruehle, Roland; Biegel, Bryan (Technical Monitor)

    2002-01-01

    In this work we report on our experiences running OpenMP (message passing) programs on a commodity cluster of PCs (personal computers) running a software distributed shared memory (DSM) system. We describe our test environment and report on the performance of a subset of the NAS (NASA Advanced Supercomputing) Parallel Benchmarks that have been automatically parallelized for OpenMP. We compare the performance of the OpenMP implementations with that of their message passing counterparts and discuss performance differences.

  18. Charon Message-Passing Toolkit for Scientific Computations

    NASA Technical Reports Server (NTRS)

    VanderWijngaart, Rob F.; Yan, Jerry (Technical Monitor)

    2000-01-01

    Charon is a library, callable from C and Fortran, that aids the conversion of structured-grid legacy codes-such as those used in the numerical computation of fluid flows-into parallel, high- performance codes. Key are functions that define distributed arrays, that map between distributed and non-distributed arrays, and that allow easy specification of common communications on structured grids. The library is based on the widely accepted MPI message passing standard. We present an overview of the functionality of Charon, and some representative results.

  19. Delivering the "Write" Message: The Memo and Transformational Leadership.

    ERIC Educational Resources Information Center

    Lamb, Bill; And Others

    Since the vast majority of conflict situations arise from a breakdown in the communication process, where one individual misunderstands something generated by another, the crucial challenge for leaders lies in avoiding misunderstandings. Leaders must remember, when formulating all sorts of correspondence, that when a "sender" forms a message and…

  20. Another Job for English Teachers: Showing Colleagues How to Teach Writing.

    ERIC Educational Resources Information Center

    Knudson, Ruth

    1986-01-01

    Describes the implementation of a content area writing program in a middle school. Observes that many teachers were resistant to the task and passed their frustration on to the English teachers. However, most were pleased with the improvement in students' writing due to the increase in the amount of required writing. (SRT)

  1. Couriers in the Inca Empire: Getting Your Message Across. [Lesson Plan].

    ERIC Educational Resources Information Center

    2002

    This lesson shows how the Inca communicated across the vast stretches of their mountain realm, the largest empire of the pre-industrial world. The lesson explains how couriers carried messages along mountain-ridge roads, up and down stone steps, and over chasm-spanning footbridges. It states that couriers could pass a message from Quito (Ecuador)…

  2. Inference in the brain: Statistics flowing in redundant population codes

    PubMed Central

    Pitkow, Xaq; Angelaki, Dora E

    2017-01-01

    It is widely believed that the brain performs approximate probabilistic inference to estimate causal variables in the world from ambiguous sensory data. To understand these computations, we need to analyze how information is represented and transformed by the actions of nonlinear recurrent neural networks. We propose that these probabilistic computations function by a message-passing algorithm operating at the level of redundant neural populations. To explain this framework, we review its underlying concepts, including graphical models, sufficient statistics, and message-passing, and then describe how these concepts could be implemented by recurrently connected probabilistic population codes. The relevant information flow in these networks will be most interpretable at the population level, particularly for redundant neural codes. We therefore outline a general approach to identify the essential features of a neural message-passing algorithm. Finally, we argue that to reveal the most important aspects of these neural computations, we must study large-scale activity patterns during moderately complex, naturalistic behaviors. PMID:28595050

  3. Writing Treatment for Aphasia: A Texting Approach

    ERIC Educational Resources Information Center

    Beeson, Pelagie M.; Higginson, Kristina; Rising, Kindle

    2013-01-01

    Purpose: Treatment studies have documented the therapeutic and functional value of lexical writing treatment for individuals with severe aphasia. The purpose of this study was to determine whether such retraining could be accomplished using the typing feature of a cellular telephone, with the ultimate goal of using text messaging for…

  4. Web-Based Interactive Writing Environment: Development and Evaluation

    ERIC Educational Resources Information Center

    Yang, Jie Chi; Ko, Hwa Wei; Chung, I. Ling

    2005-01-01

    This study reports the development and evaluation of a web-based interactive writing environment designed for elementary school students. The environment includes three writing themes, "story pass on", "story chameleon" and "thousand ideas", to encourage reading comprehension, creativity and problem-solving skills of…

  5. The effects of smartphone multitasking on gait and dynamic balance.

    PubMed

    Lee, Jeon Hyeong; Lee, Myoung Hee

    2018-02-01

    [Purpose] This study was performed to analyze the influence of smartphone multitasking on gait and dynamic balance. [Subjects and Methods] The subjects were 19 male and 20 female university students. There were 4 types of gait tasks: General Gait (walking without a task), Task Gait 1 (walking while writing a message), Task Gait 2 (walking while writing a message and listening to music), Task Gait 3 (walking while writing a message and having a conversation). To exclude the learning effect, the order of tasks was randomized. The Zebris FDM-T treadmill system (Zebris Medical GmbH, Germany) was used to measure left and right step length and width, and a 10 m walking test (10MWT) was conducted for gait velocity. In addition, a Timed Up and Go test (TUG) was used to measure dynamic balance. All the tasks were performed 3 times, and the mean of the measured values was analyzed. [Results] There were no statistically significant differences in step length and width. There were statistically significant differences in the 10MWT and TUG tests. [Conclusion] Using a smartphone while walking decreases a person's dynamic balance and walking ability. It is considered that accident rates are higher when using a smartphone.

  6. Critical field-exponents for secure message-passing in modular networks

    NASA Astrophysics Data System (ADS)

    Shekhtman, Louis M.; Danziger, Michael M.; Bonamassa, Ivan; Buldyrev, Sergey V.; Caldarelli, Guido; Zlatić, Vinko; Havlin, Shlomo

    2018-05-01

    We study secure message-passing in the presence of multiple adversaries in modular networks. We assume a dominant fraction of nodes in each module have the same vulnerability, i.e., the same entity spying on them. We find both analytically and via simulations that the links between the modules (interlinks) have effects analogous to a magnetic field in a spin-system in that for any amount of interlinks the system no longer undergoes a phase transition. We then define the exponents δ, which relates the order parameter (the size of the giant secure component) at the critical point to the field strength (average number of interlinks per node), and γ, which describes the susceptibility near criticality. These are found to be δ = 2 and γ = 1 (with the scaling of the order parameter near the critical point given by β = 1). When two or more vulnerabilities are equally present in a module we find δ = 1 and γ = 0 (with β ≥ 2). Apart from defining a previously unidentified universality class, these exponents show that increasing connections between modules is more beneficial for security than increasing connections within modules. We also measure the correlation critical exponent ν, and the upper critical dimension d c , finding that ν {d}c=3 as for ordinary percolation, suggesting that for secure message-passing d c = 6. These results provide an interesting analogy between secure message-passing in modular networks and the physics of magnetic spin-systems.

  7. Data communications in a parallel active messaging interface of a parallel computer

    DOEpatents

    Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.

    2014-09-02

    Eager send data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints that specify a client, a context, and a task, including receiving an eager send data communications instruction with transfer data disposed in a send buffer characterized by a read/write send buffer memory address in a read/write virtual address space of the origin endpoint; determining for the send buffer a read-only send buffer memory address in a read-only virtual address space, the read-only virtual address space shared by both the origin endpoint and the target endpoint, with all frames of physical memory mapped to pages of virtual memory in the read-only virtual address space; and communicating by the origin endpoint to the target endpoint an eager send message header that includes the read-only send buffer memory address.

  8. Data communications in a parallel active messaging interface of a parallel computer

    DOEpatents

    Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.

    2014-09-16

    Eager send data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints that specify a client, a context, and a task, including receiving an eager send data communications instruction with transfer data disposed in a send buffer characterized by a read/write send buffer memory address in a read/write virtual address space of the origin endpoint; determining for the send buffer a read-only send buffer memory address in a read-only virtual address space, the read-only virtual address space shared by both the origin endpoint and the target endpoint, with all frames of physical memory mapped to pages of virtual memory in the read-only virtual address space; and communicating by the origin endpoint to the target endpoint an eager send message header that includes the read-only send buffer memory address.

  9. Collective operations in a file system based execution model

    DOEpatents

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-12

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  10. Collective operations in a file system based execution model

    DOEpatents

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-19

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  11. Knowledge and Processes That Predict Proficiency in Digital Literacy

    ERIC Educational Resources Information Center

    Bulger, Monica E.; Mayer, Richard E.; Metzger, Miriam J.

    2014-01-01

    Proficiency in digital literacy refers to the ability to read and write using online sources, and includes the ability to select sources relevant to the task, synthesize information into a coherent message, and communicate the message with an audience. The present study examines the determinants of digital literacy proficiency by asking 150…

  12. Instant Messaging Language in Jordanian Female School Students' Writing

    ERIC Educational Resources Information Center

    Rabab'ah, Ghaleb A.; Rabab'ah, Bayan B.; Suleiman, Nour A.

    2016-01-01

    This study seeks to examine the existence of Instant Messaging language phenomenon among female teenagers in some Jordanian private schools and its influence on their learning experience, mainly literacy. It also raises questions about the characteristics of textese as well as teachers' attitude towards their students' use of SMS language in their…

  13. University Students Vary Their Use of Textese in Digital Messages to Suit the Recipient

    ERIC Educational Resources Information Center

    Kemp, Nenagh; Clayton, Jennifer

    2017-01-01

    Background: The casual, abbreviated writing style sometimes known as "textese" (e.g., sorry im late ?) has become widespread with the rise of digital communication. We explored Australian university students' views on, and use of, textese across three modalities (text message, Facebook post, email) and three recipient types (friends,…

  14. PRAIS: Distributed, real-time knowledge-based systems made easy

    NASA Technical Reports Server (NTRS)

    Goldstein, David G.

    1990-01-01

    This paper discusses an architecture for real-time, distributed (parallel) knowledge-based systems called the Parallel Real-time Artificial Intelligence System (PRAIS). PRAIS strives for transparently parallelizing production (rule-based) systems, even when under real-time constraints. PRAIS accomplishes these goals by incorporating a dynamic task scheduler, operating system extensions for fact handling, and message-passing among multiple copies of CLIPS executing on a virtual blackboard. This distributed knowledge-based system tool uses the portability of CLIPS and common message-passing protocols to operate over a heterogeneous network of processors.

  15. Gene-network inference by message passing

    NASA Astrophysics Data System (ADS)

    Braunstein, A.; Pagnani, A.; Weigt, M.; Zecchina, R.

    2008-01-01

    The inference of gene-regulatory processes from gene-expression data belongs to the major challenges of computational systems biology. Here we address the problem from a statistical-physics perspective and develop a message-passing algorithm which is able to infer sparse, directed and combinatorial regulatory mechanisms. Using the replica technique, the algorithmic performance can be characterized analytically for artificially generated data. The algorithm is applied to genome-wide expression data of baker's yeast under various environmental conditions. We find clear cases of combinatorial control, and enrichment in common functional annotations of regulated genes and their regulators.

  16. Optimal mapping of neural-network learning on message-passing multicomputers

    NASA Technical Reports Server (NTRS)

    Chu, Lon-Chan; Wah, Benjamin W.

    1992-01-01

    A minimization of learning-algorithm completion time is sought in the present optimal-mapping study of the learning process in multilayer feed-forward artificial neural networks (ANNs) for message-passing multicomputers. A novel approximation algorithm for mappings of this kind is derived from observations of the dominance of a parallel ANN algorithm over its communication time. Attention is given to both static and dynamic mapping schemes for systems with static and dynamic background workloads, as well as to experimental results obtained for simulated mappings on multicomputers with dynamic background workloads.

  17. Trace-Driven Debugging of Message Passing Programs

    NASA Technical Reports Server (NTRS)

    Frumkin, Michael; Hood, Robert; Lopez, Louis; Bailey, David (Technical Monitor)

    1998-01-01

    In this paper we report on features added to a parallel debugger to simplify the debugging of parallel message passing programs. These features include replay, setting consistent breakpoints based on interprocess event causality, a parallel undo operation, and communication supervision. These features all use trace information collected during the execution of the program being debugged. We used a number of different instrumentation techniques to collect traces. We also implemented trace displays using two different trace visualization systems. The implementation was tested on an SGI Power Challenge cluster and a network of SGI workstations.

  18. The Lexical Breadth of Undergraduate Novice Level Writing Competency

    ERIC Educational Resources Information Center

    Douglas, Scott Roy

    2013-01-01

    This study builds on previous work exploring reading and listening lexical thresholds (Nation, 2006; Laufer & Ravenhorst-Kalovski, 2010; Schmitt, Jiang, & Grabe, 2011) in order to investigate productive vocabulary targets that mark successful entry-level undergraduate writing. Papers that passed the Effective Writing Test (EWT) were chosen…

  19. Popular Nonfiction Authors for Children. A Biographical and Thematic Guide.

    ERIC Educational Resources Information Center

    Wyatt, Flora R.; Coggins, Margaret; Imber, Jane Hunter

    This sourcebook provides brief biographies of 65 popular children's nonfiction authors. Each profile focuses on how authors go about writing information books by giving a firsthand account of the challenges and rewards of nonfiction writing. Each biography provides a selected bibliography of the author's work, a photo, and a message to the student…

  20. More Students Master "Basics" on Writing NAEP

    ERIC Educational Resources Information Center

    Manzo, Kathleen Kennedy

    2008-01-01

    At a time when many teenagers are consumed by such activities as text-messaging, blogging, and social networking, more middle and high school students than in the past have mastered the formal "basic" writing skills needed to express ideas or share information, national assessment results released last week show. But just small proportions--33…

  1. Dear Reader, Please Write!

    ERIC Educational Resources Information Center

    Giles, Rebecca McMahon

    2008-01-01

    In our modern world of cellular phone calls, text messaging, and electronic mail, letter writing has become a lost art. What better way to motivate today's youth to experience the pleasure of "snail mail" than by reading a tale told through a series of such correspondence? The winning combination of a good story line and entertaining…

  2. Integrating Reading, Writing, and Thinking Skills into the Music Class.

    ERIC Educational Resources Information Center

    Duke, Charles R.

    Music education is uniquely suited to reinforce several basic skills that are part of the overall reading and writing processes of students. These skills include freedom of expression and the fluency of ideas, identifying a composer's purpose and message, and reasoning and comprehension. Musicians should develop the habit of using journals for…

  3. Gauge-free cluster variational method by maximal messages and moment matching.

    PubMed

    Domínguez, Eduardo; Lage-Castellanos, Alejandro; Mulet, Roberto; Ricci-Tersenghi, Federico

    2017-04-01

    We present an implementation of the cluster variational method (CVM) as a message passing algorithm. The kind of message passing algorithm used for CVM, usually named generalized belief propagation (GBP), is a generalization of the belief propagation algorithm in the same way that CVM is a generalization of the Bethe approximation for estimating the partition function. However, the connection between fixed points of GBP and the extremal points of the CVM free energy is usually not a one-to-one correspondence because of the existence of a gauge transformation involving the GBP messages. Our contribution is twofold. First, we propose a way of defining messages (fields) in a generic CVM approximation, such that messages arrive on a given region from all its ancestors, and not only from its direct parents, as in the standard parent-to-child GBP. We call this approach maximal messages. Second, we focus on the case of binary variables, reinterpreting the messages as fields enforcing the consistency between the moments of the local (marginal) probability distributions. We provide a precise rule to enforce all consistencies, avoiding any redundancy, that would otherwise lead to a gauge transformation on the messages. This moment matching method is gauge free, i.e., it guarantees that the resulting GBP is not gauge invariant. We apply our maximal messages and moment matching GBP to obtain an analytical expression for the critical temperature of the Ising model in general dimensions at the level of plaquette CVM. The values obtained outperform Bethe estimates, and are comparable with loop corrected belief propagation equations. The method allows for a straightforward generalization to disordered systems.

  4. Gauge-free cluster variational method by maximal messages and moment matching

    NASA Astrophysics Data System (ADS)

    Domínguez, Eduardo; Lage-Castellanos, Alejandro; Mulet, Roberto; Ricci-Tersenghi, Federico

    2017-04-01

    We present an implementation of the cluster variational method (CVM) as a message passing algorithm. The kind of message passing algorithm used for CVM, usually named generalized belief propagation (GBP), is a generalization of the belief propagation algorithm in the same way that CVM is a generalization of the Bethe approximation for estimating the partition function. However, the connection between fixed points of GBP and the extremal points of the CVM free energy is usually not a one-to-one correspondence because of the existence of a gauge transformation involving the GBP messages. Our contribution is twofold. First, we propose a way of defining messages (fields) in a generic CVM approximation, such that messages arrive on a given region from all its ancestors, and not only from its direct parents, as in the standard parent-to-child GBP. We call this approach maximal messages. Second, we focus on the case of binary variables, reinterpreting the messages as fields enforcing the consistency between the moments of the local (marginal) probability distributions. We provide a precise rule to enforce all consistencies, avoiding any redundancy, that would otherwise lead to a gauge transformation on the messages. This moment matching method is gauge free, i.e., it guarantees that the resulting GBP is not gauge invariant. We apply our maximal messages and moment matching GBP to obtain an analytical expression for the critical temperature of the Ising model in general dimensions at the level of plaquette CVM. The values obtained outperform Bethe estimates, and are comparable with loop corrected belief propagation equations. The method allows for a straightforward generalization to disordered systems.

  5. Multiple node remote messaging

    DOEpatents

    Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Ohmacht, Martin; Salapura, Valentina; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  6. [Dyslexia as a disfunction in successive processing].

    PubMed

    Pérez-Alvarez, F; Timoneda-Gallart, C

    We present a study on reading and writing difficulties after normal instruction during a year. Verifying if these patients showed a specific pattern of PASS (Planning, Attention, Sequential and Simultaneous) cognitive processing; if so, it allows us a rapid diagnosis and a useful cognitive remediation according to the PASS theory of intelligence. Thirty patients were selected from neuropediatric patients because of learning disability. They were selected according to their performance on several tests of phonological aware and a test of writing to discover errors in spelling. Patients with verbal language problems, as in dysphasia, and patients with learning difficulty not determined by reading or writing were ruled out. A control group of 300 scholars was used. The translated DN:CAS battery was administered to the study group and the control group for assessing the PASS cognitive processing. Statistical factorial analysis of the control group was performed as a validity confirmation to discriminate the four PASS cognitive processes. Cluster analysis of the study group was performed to discriminate its homogeneity. Differences between means were tested with the t-Student. The four PASS cognitive processes were identified in the control group. The study group scored less than minus 1 SD in successive processing, the rest of the processes being clearly higher than minus 1 SD, and the mean of study group was inferior to control group (p = 0.001). A kind of dyslexia may be defined by disfunction in PASS successive processing.

  7. Strategy Instruction in Writing for Adult Literacy Learners

    ERIC Educational Resources Information Center

    MacArthur, Charles A.; Lembo, Leah

    2009-01-01

    This study investigated the effectiveness of cognitive strategy instruction in writing with adult literacy learners. Three middle-aged African-American adults participating in adult education with the goal of passing the GED received tutoring in a strategy for planning, writing, and revising persuasive essays along with self-regulation strategies.…

  8. Computer Networking for Collegial Exchange among Teachers: A Summary of Findings and Recommendations. Technical Report.

    ERIC Educational Resources Information Center

    West, Mary Maxwell; McSwiney, Eileen

    Asynchronous computer-based conferencing offers several unique capabilities as a medium. Participants can read and write messages at whatever time is convenient for them, groups can interact even though participants are geographically separated, and messages are available to readers almost instantly. Because the medium has served for over a decade…

  9. Young People's Everyday Literacies: The Language Features of Instant Messaging

    ERIC Educational Resources Information Center

    Haas, Christina; Takayoshi, Pamela

    2011-01-01

    In this article, we examine writing in the context of new communication technologies as a kind of everyday literacy. Using an inductive approach developed from grounded theory, we analyzed a 32,000-word corpus of college students' Instant Messaging (IM) exchanges. Through our analysis of this corpus, we identify a fifteen-item taxonomy of IM…

  10. Empirical analysis of knowledge bases to support structured output in the Arden syntax.

    PubMed

    Jenders, Robert A

    2013-01-01

    Structured output has been suggested for the Arden Syntax to facilitate interoperability. Tabulate the components of WRITE statements in a corpus of medical logic modules (MLMs)in order to validate requiring structured output. WRITE statements were tabulated in 258 MLMs from 2 organizations. In a total of 351 WRITE statements, email destinations (226) predominated, and 39 orders and 40 coded output elements also were tabulated. Free-text strings predominated as the message data. Arden WRITE statements contain considerable potentially structured data now included as free text. A future, normative structured WRITE statement must address a variety of data types and destinations.

  11. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm

    NASA Astrophysics Data System (ADS)

    Rachmawati, D.; Budiman, M. A.; Aulya, L.

    2018-02-01

    Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

  12. Ordering Traces Logically to Identify Lateness in Message Passing Programs

    DOE PAGES

    Isaacs, Katherine E.; Gamblin, Todd; Bhatele, Abhinav; ...

    2015-03-30

    Event traces are valuable for understanding the behavior of parallel programs. However, automatically analyzing a large parallel trace is difficult, especially without a specific objective. We aid this endeavor by extracting a trace's logical structure, an ordering of trace events derived from happened-before relationships, while taking into account developer intent. Using this structure, we can calculate an operation's delay relative to its peers on other processes. The logical structure also serves as a platform for comparing and clustering processes as well as highlighting communication patterns in a trace visualization. We present an algorithm for determining this idealized logical structure frommore » traces of message passing programs, and we develop metrics to quantify delays and differences among processes. We implement our techniques in Ravel, a parallel trace visualization tool that displays both logical and physical timelines. Rather than showing the duration of each operation, we display where delays begin and end, and how they propagate. As a result, we apply our approach to the traces of several message passing applications, demonstrating the accuracy of our extracted structure and its utility in analyzing these codes.« less

  13. Dust Dynamics in Protoplanetary Disks: Parallel Computing with PVM

    NASA Astrophysics Data System (ADS)

    de La Fuente Marcos, Carlos; Barge, Pierre; de La Fuente Marcos, Raúl

    2002-03-01

    We describe a parallel version of our high-order-accuracy particle-mesh code for the simulation of collisionless protoplanetary disks. We use this code to carry out a massively parallel, two-dimensional, time-dependent, numerical simulation, which includes dust particles, to study the potential role of large-scale, gaseous vortices in protoplanetary disks. This noncollisional problem is easy to parallelize on message-passing multicomputer architectures. We performed the simulations on a cache-coherent nonuniform memory access Origin 2000 machine, using both the parallel virtual machine (PVM) and message-passing interface (MPI) message-passing libraries. Our performance analysis suggests that, for our problem, PVM is about 25% faster than MPI. Using PVM and MPI made it possible to reduce CPU time and increase code performance. This allows for simulations with a large number of particles (N ~ 105-106) in reasonable CPU times. The performances of our implementation of the pa! rallel code on an Origin 2000 supercomputer are presented and discussed. They exhibit very good speedup behavior and low load unbalancing. Our results confirm that giant gaseous vortices can play a dominant role in giant planet formation.

  14. Parallel, Distributed Scripting with Python

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, P J

    2002-05-24

    Parallel computers used to be, for the most part, one-of-a-kind systems which were extremely difficult to program portably. With SMP architectures, the advent of the POSIX thread API and OpenMP gave developers ways to portably exploit on-the-box shared memory parallelism. Since these architectures didn't scale cost-effectively, distributed memory clusters were developed. The associated MPI message passing libraries gave these systems a portable paradigm too. Having programmers effectively use this paradigm is a somewhat different question. Distributed data has to be explicitly transported via the messaging system in order for it to be useful. In high level languages, the MPI librarymore » gives access to data distribution routines in C, C++, and FORTRAN. But we need more than that. Many reasonable and common tasks are best done in (or as extensions to) scripting languages. Consider sysadm tools such as password crackers, file purgers, etc ... These are simple to write in a scripting language such as Python (an open source, portable, and freely available interpreter). But these tasks beg to be done in parallel. Consider the a password checker that checks an encrypted password against a 25,000 word dictionary. This can take around 10 seconds in Python (6 seconds in C). It is trivial to parallelize if you can distribute the information and co-ordinate the work.« less

  15. The effects of smartphone multitasking on gait and dynamic balance

    PubMed Central

    Lee, Jeon Hyeong; Lee, Myoung Hee

    2018-01-01

    [Purpose] This study was performed to analyze the influence of smartphone multitasking on gait and dynamic balance. [Subjects and Methods] The subjects were 19 male and 20 female university students. There were 4 types of gait tasks: General Gait (walking without a task), Task Gait 1 (walking while writing a message), Task Gait 2 (walking while writing a message and listening to music), Task Gait 3 (walking while writing a message and having a conversation). To exclude the learning effect, the order of tasks was randomized. The Zebris FDM-T treadmill system (Zebris Medical GmbH, Germany) was used to measure left and right step length and width, and a 10 m walking test (10MWT) was conducted for gait velocity. In addition, a Timed Up and Go test (TUG) was used to measure dynamic balance. All the tasks were performed 3 times, and the mean of the measured values was analyzed. [Results] There were no statistically significant differences in step length and width. There were statistically significant differences in the 10MWT and TUG tests. [Conclusion] Using a smartphone while walking decreases a person’s dynamic balance and walking ability. It is considered that accident rates are higher when using a smartphone. PMID:29545698

  16. TravelAid : in-vehicle signing and variable speed limit evaluation

    DOT National Transportation Integrated Search

    2001-12-01

    This report discusses the effectiveness of using variable message signs (VMSs) and in-vehicle traffic advisory systems (IVUs) on a mountainous pass (Snoqualmie Pass on Interstate 90 in Washington State) for changing driver behavior. As part of this p...

  17. Theme and Thematic Progression in English Writing Teaching

    ERIC Educational Resources Information Center

    Jing, Wei

    2015-01-01

    Theme and thematic progression (T/TP) is a major aspect of the way that speakers construct their messages in a way which makes them fit smoothly into the unfolding language event. While studies have illustrated the usefulness of observing T/TP to identify English learners' writing difficulties and suggested that T/TP should be included in English…

  18. Building Vocabulary and Improving Writing While Developing a Tourist Brochure

    ERIC Educational Resources Information Center

    Johari, Siti Katijah

    2008-01-01

    Writing, and the vocabulary building that goes with it, is a more complex process than merely putting words on a page. In the process of acquiring vocabulary, for example, students need to understand not just what individual words mean but also which combinations of these words in sentences or paragraphs convey a meaningful message to the reader…

  19. From Error Correction to Meaning Making: Reconstructing Student Perceptions of Revision

    ERIC Educational Resources Information Center

    Barrett, Catherine; Junio, Rachel Wright

    2017-01-01

    For most students, revision is viewed as a punishment for not writing well enough. However, what if students' negative perceptions of revision shifted to view revision as an opportunity to better develop the meaning and message of texts. Revision, like all processes in writing, is complex, cognitively demanding, and requires students to be able to…

  20. Technology and Secondary Writing: A Review of the Literature

    ERIC Educational Resources Information Center

    Blankenship, Matthew U.; Margarella, Erin E.

    2014-01-01

    This article reports a review of the literature that focused on relationship between writing instruction and technology in the secondary classroom since the passing of the No Child Left Behind Act over the past two decades. Based on the search, six themes have emerged across the fields of writing instruction and assessment. Within writing…

  1. Implementing TCP/IP and a socket interface as a server in a message-passing operating system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hipp, E.; Wiltzius, D.

    1990-03-01

    The UNICOS 4.3BSD network code and socket transport interface are the basis of an explicit network server for NLTSS, a message passing operating system on the Cray YMP. A BSD socket user library provides access to the network server using an RPC mechanism. The advantages of this server methodology are its modularity and extensibility to migrate to future protocol suites (e.g. OSI) and transport interfaces. In addition, the network server is implemented in an explicit multi-tasking environment to take advantage of the Cray YMP multi-processor platform. 19 refs., 5 figs.

  2. A real-time MPEG software decoder using a portable message-passing library

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kwong, Man Kam; Tang, P.T. Peter; Lin, Biquan

    1995-12-31

    We present a real-time MPEG software decoder that uses message-passing libraries such as MPL, p4 and MPI. The parallel MPEG decoder currently runs on the IBM SP system but can be easil ported to other parallel machines. This paper discusses our parallel MPEG decoding algorithm as well as the parallel programming environment under which it uses. Several technical issues are discussed, including balancing of decoding speed, memory limitation, 1/0 capacities, and optimization of MPEG decoding components. This project shows that a real-time portable software MPEG decoder is feasible in a general-purpose parallel machine.

  3. Complexity of parallel implementation of domain decomposition techniques for elliptic partial differential equations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gropp, W.D.; Keyes, D.E.

    1988-03-01

    The authors discuss the parallel implementation of preconditioned conjugate gradient (PCG)-based domain decomposition techniques for self-adjoint elliptic partial differential equations in two dimensions on several architectures. The complexity of these methods is described on a variety of message-passing parallel computers as a function of the size of the problem, number of processors and relative communication speeds of the processors. They show that communication startups are very important, and that even the small amount of global communication in these methods can significantly reduce the performance of many message-passing architectures.

  4. n-body simulations using message passing parallel computers.

    NASA Astrophysics Data System (ADS)

    Grama, A. Y.; Kumar, V.; Sameh, A.

    The authors present new parallel formulations of the Barnes-Hut method for n-body simulations on message passing computers. These parallel formulations partition the domain efficiently incurring minimal communication overhead. This is in contrast to existing schemes that are based on sorting a large number of keys or on the use of global data structures. The new formulations are augmented by alternate communication strategies which serve to minimize communication overhead. The impact of these communication strategies is experimentally studied. The authors report on experimental results obtained from an astrophysical simulation on an nCUBE2 parallel computer.

  5. SETI-EC: SETI Encryption Code

    NASA Astrophysics Data System (ADS)

    Heller, René

    2018-03-01

    The SETI Encryption code, written in Python, creates a message for use in testing the decryptability of a simulated incoming interstellar message. The code uses images in a portable bit map (PBM) format, then writes the corresponding bits into the message, and finally returns both a PBM image and a text (TXT) file of the entire message. The natural constants (c, G, h) and the wavelength of the message are defined in the first few lines of the code, followed by the reading of the input files and their conversion into 757 strings of 359 bits to give one page. Each header of a page, i.e. the little-endian binary code translation of the tempo-spatial yardstick, is calculated and written on-the-fly for each page.

  6. Resist heating effect on e-beam mask writing at 75 kV and 60 A/cm2

    NASA Astrophysics Data System (ADS)

    Benes, Zdenek; Deverich, Christina; Huang, Chester; Lawliss, Mark

    2003-12-01

    Resist heating has been known to be one of the main contributors to local CD variation in mask patterning using variable shape e-beam tools. Increasingly complex mask patterns require increased number of shapes which drives the need for higher electron beam current densities to maintain reasonable write times. As beam current density is increased, CD error resulting from resist heating may become a dominating contributor to local CD variations. In this experimental study, the IBM EL4+ mask writer with high voltage and high current density has been used to quantitatively investigate the effect of resist heating on the local CD uniformity. ZEP 7000 and several chemically amplified resists have been evaluated under various exposure conditions (single-pass, multi-pass, variable spot size) and pattern densities. Patterns were designed specifically to allow easy measurement of local CD variations with write strategies designed to maximize the effect of resist heating. Local CD variations as high as 15 nm in 18.75 × 18.75 μm sub-field size have been observed for ZEP 7000 in a single-pass writing with full 1000 nm spots at 50% pattern density. This number can be reduced by increasing the number of passes or by decreasing the maximum spot size. The local CD variation has been reduced to as low as 2 nm for ZEP 7000 for the same pattern under modified exposure conditions. The effectiveness of various writing strategies is discussed as well as their possible deficiencies. Minimal or no resist heating effects have been observed for the chemically amplified resists studied. The results suggest that the resist heating effect can be well controlled by careful selection of the resist/process system and/or writing strategy and that resist heating does not have to pose a problem for high throughput e-beam mask making that requires high voltage and high current densities.

  7. Murmer, a message generator and reporter for Unix, VMS, and VxWorks

    NASA Astrophysics Data System (ADS)

    Oleynik, G.; Appleton, B.; Moore, C.; Sergey, G.; Udumula, L.

    1994-02-01

    Murmer is a Unix based message generation, reporting, display, and logging system that we have developed for use in data acquisition systems at Fermilab. Murmer is a tool for the production and management of message reporting. Its usefulness ranges from software product development and maintenance to system level shakedown and diagnostics. Murmer provides a VMS MESSAGE-like function code generation utility, a client routine package for sending these codes over the network to a central server, and a server which translates the codes into meaningful visual information, writes the information to a logfile, and display it on B&W or color X windows. Because Murmer stores message information in keyed access files, it can provide advanced features such as popping up help when a displayed message is clicked on by the mouse and executing 'action' shell scripts when selected messages are received by the server.

  8. Television and Radio Ads as Resources for Reading and Writing.

    ERIC Educational Resources Information Center

    Moss, R. Kay; Stansell, John C.

    Young children learn many important things about language from the television and radio ads they encounter that can help them learn to read and write. They learn that print carries messages that are personally important to them, that whatever can be said can also be written, what some forms of written language look like, and that language use can…

  9. Linguistic Symbol Intraference in Textese and E-Mailese: Implications for Teaching and Learning Standard English

    ERIC Educational Resources Information Center

    Bode Ekundayo, Omowumi Steve

    2014-01-01

    This paper examines how senders of text messages and informal e-mail redeploy linguistic symbols innovatively to communicate. Even a cursory look at an SMS text (textese) and informal e-mail (e-mailese) will show that its style is different from that of formal writing. Two thousand twenty text messages and five hundred informal e-mail were studied…

  10. The Keck Task Library (KTL)

    NASA Technical Reports Server (NTRS)

    Lupton, W. F.; Conrad, A. R.

    1992-01-01

    KTL is a set of routines which eases the job of writing applications which must interact with a variety of underlying sub-systems (known as services). A typical application is an X Window user interface coordinating telescope and instruments. In order to connect to a service, application code specifies a service name--typically an instrument name--and a style, which defines the way in which the application will interact with the service. Two styles are currently supported: keyword, where the application reads and writes named keywords and the resulting inter-task message traffic is hidden; and message, where the application deals directly with messages. The keyword style is intended mainly for user interfaces, and the message style is intended mainly for lower-level applications. KTL applications are event driven: a typical application first connects to all its desired services, then expresses interest in specified events. The application then enters an event dispatch loop in which it waits for events and calls the appropriate service's event-handling routine. Each event is associated with a call-back routine which is invoked when the event occurs. Call-back routines may (and typically do) interact with other sub-systems and KTL provides the means of doing so without blocking the application (vital for X Window user interfaces). This approach is a marriage of ideas culled from the X window, ADAM, Keck instrument, and Keck telescope control systems. A novel feature of KTL is that it knows nothing about any services or styles. Instead it defines a generic set of routines which must be implemented by all services and styles (essentially open(), ioctl(), read(), write(), event(), and close()) and activates sharable libraries at run-time. Services have been implemented (in both keyword and message styles) for HIRES (the Keck high resolution echelle spectrograph built by Lick Observatory), LWS (the Keck long wavelength spectrometer built by UC San Diego), and the Keck telescope. Each of these implementations uses different underlying message systems: the Lick MUSIC system, RPC's, and direct sockets (respectively). Services for the remaining three front-line Keck instruments will be implemented over the next few months.

  11. Using Written Narratives in Public Health Practice: A Creative Writing Perspective

    PubMed Central

    Kreuter, Matthew W.

    2014-01-01

    Narratives have become an increasingly common health communication tool in recent years. Vivid, engaging writing can help audiences identify with storytellers and understand health messages, but few public health practitioners are trained to create such stories. A transdisciplinary perspective, informed by both creative writing advice and evidence-based public health practices, can help public health professionals use stories more effectively in their work. This article provides techniques for creating written narratives that communicate health information for chronic disease prevention. We guide public health professionals through the process of soliciting, writing, and revising such stories, and we discuss challenges and potential solutions. PMID:24901794

  12. Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Wang, Yi-Min

    1993-01-01

    Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.

  13. Relations Among Central Auditory Abilities, Socio-Economic Factors, Speech Delay, Phonic Abilities and Reading Achievement: A Longitudinal Study.

    ERIC Educational Resources Information Center

    Flowers, Arthur; Crandell, Edwin W.

    Three auditory perceptual processes (resistance to distortion, selective listening in the form of auditory dedifferentiation, and binaural synthesis) were evaluated by five assessment techniques: (1) low pass filtered speech, (2) accelerated speech, (3) competing messages, (4) accelerated plus competing messages, and (5) binaural synthesis.…

  14. Quantum cluster variational method and message passing algorithms revisited

    NASA Astrophysics Data System (ADS)

    Domínguez, E.; Mulet, Roberto

    2018-02-01

    We present a general framework to study quantum disordered systems in the context of the Kikuchi's cluster variational method (CVM). The method relies in the solution of message passing-like equations for single instances or in the iterative solution of complex population dynamic algorithms for an average case scenario. We first show how a standard application of the Kikuchi's CVM can be easily translated to message passing equations for specific instances of the disordered system. We then present an "ad hoc" extension of these equations to a population dynamic algorithm representing an average case scenario. At the Bethe level, these equations are equivalent to the dynamic population equations that can be derived from a proper cavity ansatz. However, at the plaquette approximation, the interpretation is more subtle and we discuss it taking also into account previous results in classical disordered models. Moreover, we develop a formalism to properly deal with the average case scenario using a replica-symmetric ansatz within this CVM for quantum disordered systems. Finally, we present and discuss numerical solutions of the different approximations for the quantum transverse Ising model and the quantum random field Ising model in two-dimensional lattices.

  15. Cognitive and Stylistic Features of Reporting and Classificatory Writing by Senior High School Students.

    ERIC Educational Resources Information Center

    Fox, Barry

    Differences between reporting and classificatory functions in writing were examined in the responses of grade 10 and grade 12 students: 60 who were successful English students, and 60 on the borderline of passing in each of the grades. The reporting tasks required students to write compositions describing their first day in a high school or some…

  16. 29 CFR 793.7 - “Announcer.”

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... introduce programs, read news announcements, present commercial messages, give station identification and..., or write advertising, promotional or similar type copy. An employee who is primarily engaged in the...

  17. Read-Write-Codes: An Erasure Resilient Encoding System for Flexible Reading and Writing in Storage Networks

    NASA Astrophysics Data System (ADS)

    Mense, Mario; Schindelhauer, Christian

    We introduce the Read-Write-Coding-System (RWC) - a very flexible class of linear block codes that generate efficient and flexible erasure codes for storage networks. In particular, given a message x of k symbols and a codeword y of n symbols, an RW code defines additional parameters k ≤ r,w ≤ n that offer enhanced possibilities to adjust the fault-tolerance capability of the code. More precisely, an RWC provides linear left(n,k,dright)-codes that have (a) minimum distance d = n - r + 1 for any two codewords, and (b) for each codeword there exists a codeword for each other message with distance of at most w. Furthermore, depending on the values r,w and the code alphabet, different block codes such as parity codes (e.g. RAID 4/5) or Reed-Solomon (RS) codes (if r = k and thus, w = n) can be generated. In storage networks in which I/O accesses are very costly and redundancy is crucial, this flexibility has considerable advantages as r and w can optimally be adapted to read or write intensive applications; only w symbols must be updated if the message x changes completely, what is different from other codes which always need to rewrite y completely as x changes. In this paper, we first state a tight lower bound and basic conditions for all RW codes. Furthermore, we introduce special RW codes in which all mentioned parameters are adjustable even online, that is, those RW codes are adaptive to changing demands. At last, we point out some useful properties regarding safety and security of the stored data.

  18. Reasons for College Students to Plagiarize in EFL Writing: Students' Motivation to Pass

    ERIC Educational Resources Information Center

    Al Darwish, Salwa; Sadeqi, Abdul Azeez

    2016-01-01

    EFL students acquire their writing skill through practice and hard work. However, there seems to be a lot of reasons why EFL students should find the task of composing an essay so difficult that leads them to plagiarize. For that, the present paper tries to find out the real motivation for EFL students to plagiarize in writing. This research was…

  19. Writing in the Disciplines versus Corporate Workplaces: On the Importance of Conflicting Disciplinary Discourses in the Open Source Movement and the Value of Intellectual Property

    ERIC Educational Resources Information Center

    Ballentine, Brian D.

    2009-01-01

    Writing programs and more specifically, Writing in the Disciplines (WID) initiatives have begun to embrace the use of and the ideology inherent to, open source software. The Conference on College Composition and Communication has passed a resolution stating that whenever feasible educators and their institutions consider open source applications.…

  20. Asbestos: Securing Untrusted Software with Interposition

    DTIC Science & Technology

    2005-09-01

    consistent intelligible interfaces to different types of resource. Message-based operating systems, such as Accent, Amoeba, Chorus, L4 , Spring...control on self-authenticating capabilities, precluding policies that restrict delegation. L4 uses a strict hierarchy of interpositions, useful for...the OS de- sign space amenable to secure application construction. Similar effects might be possible with message-passing microkernels , or unwieldy

  1. Performance Evaluation of Remote Memory Access (RMA) Programming on Shared Memory Parallel Computers

    NASA Technical Reports Server (NTRS)

    Jin, Hao-Qiang; Jost, Gabriele; Biegel, Bryan A. (Technical Monitor)

    2002-01-01

    The purpose of this study is to evaluate the feasibility of remote memory access (RMA) programming on shared memory parallel computers. We discuss different RMA based implementations of selected CFD application benchmark kernels and compare them to corresponding message passing based codes. For the message-passing implementation we use MPI point-to-point and global communication routines. For the RMA based approach we consider two different libraries supporting this programming model. One is a shared memory parallelization library (SMPlib) developed at NASA Ames, the other is the MPI-2 extensions to the MPI Standard. We give timing comparisons for the different implementation strategies and discuss the performance.

  2. Comparing the OpenMP, MPI, and Hybrid Programming Paradigm on an SMP Cluster

    NASA Technical Reports Server (NTRS)

    Jost, Gabriele; Jin, Hao-Qiang; anMey, Dieter; Hatay, Ferhat F.

    2003-01-01

    Clusters of SMP (Symmetric Multi-Processors) nodes provide support for a wide range of parallel programming paradigms. The shared address space within each node is suitable for OpenMP parallelization. Message passing can be employed within and across the nodes of a cluster. Multiple levels of parallelism can be achieved by combining message passing and OpenMP parallelization. Which programming paradigm is the best will depend on the nature of the given problem, the hardware components of the cluster, the network, and the available software. In this study we compare the performance of different implementations of the same CFD benchmark application, using the same numerical algorithm but employing different programming paradigms.

  3. ADAPTIVE TETRAHEDRAL GRID REFINEMENT AND COARSENING IN MESSAGE-PASSING ENVIRONMENTS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hallberg, J.; Stagg, A.

    2000-10-01

    A grid refinement and coarsening scheme has been developed for tetrahedral and triangular grid-based calculations in message-passing environments. The element adaption scheme is based on an edge bisection of elements marked for refinement by an appropriate error indicator. Hash-table/linked-list data structures are used to store nodal and element formation. The grid along inter-processor boundaries is refined and coarsened consistently with the update of these data structures via MPI calls. The parallel adaption scheme has been applied to the solution of a transient, three-dimensional, nonlinear, groundwater flow problem. Timings indicate efficiency of the grid refinement process relative to the flow solvermore » calculations.« less

  4. Steganography: Past, Present, Future

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Judge, J C

    Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. This paper will explore steganography from its earliest instances through potential future application.

  5. Statistical mechanics of unsupervised feature learning in a restricted Boltzmann machine with binary synapses

    NASA Astrophysics Data System (ADS)

    Huang, Haiping

    2017-05-01

    Revealing hidden features in unlabeled data is called unsupervised feature learning, which plays an important role in pretraining a deep neural network. Here we provide a statistical mechanics analysis of the unsupervised learning in a restricted Boltzmann machine with binary synapses. A message passing equation to infer the hidden feature is derived, and furthermore, variants of this equation are analyzed. A statistical analysis by replica theory describes the thermodynamic properties of the model. Our analysis confirms an entropy crisis preceding the non-convergence of the message passing equation, suggesting a discontinuous phase transition as a key characteristic of the restricted Boltzmann machine. Continuous phase transition is also confirmed depending on the embedded feature strength in the data. The mean-field result under the replica symmetric assumption agrees with that obtained by running message passing algorithms on single instances of finite sizes. Interestingly, in an approximate Hopfield model, the entropy crisis is absent, and a continuous phase transition is observed instead. We also develop an iterative equation to infer the hyper-parameter (temperature) hidden in the data, which in physics corresponds to iteratively imposing Nishimori condition. Our study provides insights towards understanding the thermodynamic properties of the restricted Boltzmann machine learning, and moreover important theoretical basis to build simplified deep networks.

  6. Principles for problem aggregation and assignment in medium scale multiprocessors

    NASA Technical Reports Server (NTRS)

    Nicol, David M.; Saltz, Joel H.

    1987-01-01

    One of the most important issues in parallel processing is the mapping of workload to processors. This paper considers a large class of problems having a high degree of potential fine grained parallelism, and execution requirements that are either not predictable, or are too costly to predict. The main issues in mapping such a problem onto medium scale multiprocessors are those of aggregation and assignment. We study a method of parameterized aggregation that makes few assumptions about the workload. The mapping of aggregate units of work onto processors is uniform, and exploits locality of workload intensity to balance the unknown workload. In general, a finer aggregate granularity leads to a better balance at the price of increased communication/synchronization costs; the aggregation parameters can be adjusted to find a reasonable granularity. The effectiveness of this scheme is demonstrated on three model problems: an adaptive one-dimensional fluid dynamics problem with message passing, a sparse triangular linear system solver on both a shared memory and a message-passing machine, and a two-dimensional time-driven battlefield simulation employing message passing. Using the model problems, the tradeoffs are studied between balanced workload and the communication/synchronization costs. Finally, an analytical model is used to explain why the method balances workload and minimizes the variance in system behavior.

  7. Proteus: a reconfigurable computational network for computer vision

    NASA Astrophysics Data System (ADS)

    Haralick, Robert M.; Somani, Arun K.; Wittenbrink, Craig M.; Johnson, Robert; Cooper, Kenneth; Shapiro, Linda G.; Phillips, Ihsin T.; Hwang, Jenq N.; Cheung, William; Yao, Yung H.; Chen, Chung-Ho; Yang, Larry; Daugherty, Brian; Lorbeski, Bob; Loving, Kent; Miller, Tom; Parkins, Larye; Soos, Steven L.

    1992-04-01

    The Proteus architecture is a highly parallel MIMD, multiple instruction, multiple-data machine, optimized for large granularity tasks such as machine vision and image processing The system can achieve 20 Giga-flops (80 Giga-flops peak). It accepts data via multiple serial links at a rate of up to 640 megabytes/second. The system employs a hierarchical reconfigurable interconnection network with the highest level being a circuit switched Enhanced Hypercube serial interconnection network for internal data transfers. The system is designed to use 256 to 1,024 RISC processors. The processors use one megabyte external Read/Write Allocating Caches for reduced multiprocessor contention. The system detects, locates, and replaces faulty subsystems using redundant hardware to facilitate fault tolerance. The parallelism is directly controllable through an advanced software system for partitioning, scheduling, and development. System software includes a translator for the INSIGHT language, a parallel debugger, low and high level simulators, and a message passing system for all control needs. Image processing application software includes a variety of point operators neighborhood, operators, convolution, and the mathematical morphology operations of binary and gray scale dilation, erosion, opening, and closing.

  8. PRATHAM: Parallel Thermal Hydraulics Simulations using Advanced Mesoscopic Methods

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Joshi, Abhijit S; Jain, Prashant K; Mudrich, Jaime A

    2012-01-01

    At the Oak Ridge National Laboratory, efforts are under way to develop a 3D, parallel LBM code called PRATHAM (PaRAllel Thermal Hydraulic simulations using Advanced Mesoscopic Methods) to demonstrate the accuracy and scalability of LBM for turbulent flow simulations in nuclear applications. The code has been developed using FORTRAN-90, and parallelized using the message passing interface MPI library. Silo library is used to compact and write the data files, and VisIt visualization software is used to post-process the simulation data in parallel. Both the single relaxation time (SRT) and multi relaxation time (MRT) LBM schemes have been implemented in PRATHAM.more » To capture turbulence without prohibitively increasing the grid resolution requirements, an LES approach [5] is adopted allowing large scale eddies to be numerically resolved while modeling the smaller (subgrid) eddies. In this work, a Smagorinsky model has been used, which modifies the fluid viscosity by an additional eddy viscosity depending on the magnitude of the rate-of-strain tensor. In LBM, this is achieved by locally varying the relaxation time of the fluid.« less

  9. How to write effective business letters: scribing information for pharmacists.

    PubMed

    Hamilton, C W

    1993-11-01

    Pharmacists frequently write letters but lack specific training on how to do it well. This review summarizes strategies for improving business correspondence, emphasizes basic writing guidelines, and offers practical advice for pharmacists. The first steps for effective communication are careful planning and identifying the main message to be conveyed. The purpose for writing should be stated in the opening paragraph of the letter. To ensure a successful outcome, actions needed should be clearly summarized and visually highlighted. The tone of the letter should reflect a reasonable speech pattern, not the cryptic writing found in many scientific papers. The layout of the letter should be inviting, which is readily achievable through judicious use of word processing. Many delivery options are available, such as traditional postal services, express mail, and facsimile transmission. Readers are encouraged to test these basic writing principles and decide for themselves whether these recommendations affect the success of business correspondence.

  10. Non-Discretionary Access Control for Decentralized Computing Systems

    DTIC Science & Technology

    1977-05-01

    Semaphores are inherently read-write objects to all users. Reed and Kanodia <Reed77> propose a scheme for process synchronization using...Capabilities 84 8.2.4.4 UNIX Style Naming 85 8.2.5 Garbage Collection 86 8.3 Synchronization Without Writing 87 9. Downgrading Information 89 9.1...intruder could not follow the rapid exchange of messages and would be unable to extract information. Farber and Larsen describe synchronization and

  11. Performance analysis of distributed applications using automatic classification of communication inefficiencies

    DOEpatents

    Vetter, Jeffrey S.

    2005-02-01

    The method and system described herein presents a technique for performance analysis that helps users understand the communication behavior of their message passing applications. The method and system described herein may automatically classifies individual communication operations and reveal the cause of communication inefficiencies in the application. This classification allows the developer to quickly focus on the culprits of truly inefficient behavior, rather than manually foraging through massive amounts of performance data. Specifically, the method and system described herein trace the message operations of Message Passing Interface (MPI) applications and then classify each individual communication event using a supervised learning technique: decision tree classification. The decision tree may be trained using microbenchmarks that demonstrate both efficient and inefficient communication. Since the method and system described herein adapt to the target system's configuration through these microbenchmarks, they simultaneously automate the performance analysis process and improve classification accuracy. The method and system described herein may improve the accuracy of performance analysis and dramatically reduce the amount of data that users must encounter.

  12. Advance directives from haematology departments: the patient's freedom of choice and communication with families. A qualitative analysis of 35 written documents.

    PubMed

    Trarieux-Signol, S; Bordessoule, D; Ceccaldi, J; Malak, S; Polomeni, A; Fargeas, J B; Signol, N; Pauliat, H; Moreau, S

    2018-01-02

    In France, advance directives are favourably perceived by most of the population, although the drafting rate is low. This ambivalence is challenging because advance directives are meant to promote the autonomy and freedom of choice of patients. The purpose of this study was to analyse the content of advance directives written by patients suffering from malignant haemopathies to better understand how patients put them into practice. These could be relevant as early as the initial diagnosis of haematological malignancies because of the uncertain course of the disease. This was a multicentre, qualitative, descriptive study. The advance directives written by patients with malignant haemopathies treated in one of the six French hospital departments were included in the study from 01/06/2008 to 15/04/2016. A thematic analysis of the advance directives was performed by two researchers: a senior haematologist and a research assistant. The median age of the patients was 69. Most were women (sex ratio: 0.59), living as a couple (57%), with lymphoid pathologies (66%), who were still alive two years after the instructions were written (63%) and had nominated a health care proxy (88.6%). Free texts (62.9%) were richer in content than pre-defined forms. The advance directives were used in three ways: for a purely legal purpose, to focus on medical treatments or actions, or to communicate a message to the family. Three main themes emerged: (1) refusal of medical treatment (100%), in which patients express refusal of life-sustaining care (97.1%). The actual treatments or the moment when they should be limited or stopped were not always mentioned in detail. (2) A desire for effective pain relief to avoid suffering (57.1%) and (3) messages for their family (34.3%), such as funeral arrangements (17.1%) and messages of love or trust (14.3%). Patients who write advance directives are not necessarily at the end of their lives. Their content mainly conveys treatment wishes, although patients also use them to pass on personal messages to their close family. This emerging role of advance directives to communicate messages within the family should be valued, even if it is not their original purpose.

  13. Evidence of Premeditation in Skin Messages in Suicide.

    PubMed

    Byard, Roger W

    2016-03-01

    A 34-year-old man with manic-depressive disorder was found dead sitting in a vehicle with a hose running from the exhaust pipe to the cabin. Numerous suicide notes were found inside his house. At autopsy, the decedent was wearing jeans and a long-sleeved windcheater. Upon removal of his clothes, a series of messages were also found written on the legs and forearm. Death was due to carbon monoxide toxicity with a blood level of carboxyhemoglobin of 84%. Skin messages represent a rare form of suicide note that may suggest that a suicide has not been planned, as the decedent may have used the nearest surface to write on. This case demonstrates, however, that skin messages may be more organized, being written prior to dressing and setting up the fatal episode. They also may compliment other notes and messages. © 2015 American Academy of Forensic Sciences.

  14. Low Power LDPC Code Decoder Architecture Based on Intermediate Message Compression Technique

    NASA Astrophysics Data System (ADS)

    Shimizu, Kazunori; Togawa, Nozomu; Ikenaga, Takeshi; Goto, Satoshi

    Reducing the power dissipation for LDPC code decoder is a major challenging task to apply it to the practical digital communication systems. In this paper, we propose a low power LDPC code decoder architecture based on an intermediate message-compression technique which features as follows: (i) An intermediate message compression technique enables the decoder to reduce the required memory capacity and write power dissipation. (ii) A clock gated shift register based intermediate message memory architecture enables the decoder to decompress the compressed messages in a single clock cycle while reducing the read power dissipation. The combination of the above two techniques enables the decoder to reduce the power dissipation while keeping the decoding throughput. The simulation results show that the proposed architecture improves the power efficiency up to 52% and 18% compared to that of the decoder based on the overlapped schedule and the rapid convergence schedule without the proposed techniques respectively.

  15. Physicians' messages in problematic sickness certification: a narrative analysis of case reports

    PubMed Central

    2011-01-01

    Background Many physicians find sickness certification tasks problematic. There is some knowledge about situations that are experienced as problematic, whereas less is understood about how physicians respond to the problems they face. One way to acquire such knowledge is to consider "reflection-in-action", aspects of which are expressed in the physician's interpretation of the patient's story. The aim of this study was to gain knowledge about the meaning content of case reports about problematic sickness certification. Specifically, we looked for possible messages to the colleagues intended to read the reports. Methods A narrative approach was used to analyse reports about problematic sickness certification cases that had been written by GPs and occupational health service physicians as part of a sickness insurance course. The analysis included elements from both thematic and structural analysis. Nineteen case reports were used in the actual analysis and 25 in the validation of the results. Main narrative qualities and structural features of the written case reports were explored. Results Five types of messages were identified in the case reports, here classified as "a call for help", "a call for understanding", "hidden worries", "in my opinion", and "appearing neutral". In the reports, the physicians tried to achieve neutrality in their writing, and the patients' stories tended to be interpreted within a traditional biomedical framework. In some cases there was an open request for help, in others it was not obvious that the physician had any problems. Overall, the messages were about having problems as such, rather than the specific features of the problems. Conclusions The case reports clearly demonstrated different ways of writing about problems that arise during sickness certification, from being neutral and not mentioning the problems to being emotionally involved and asking for help. The general character of the messages suggests that they are also relevant for case reports in problematic areas other than sickness certification. If pertinent relationships can be found between reflection-in-practice and the narrative writing about practice, they will provide an approach to further research concerning consultations perceived as problematic and also to medical education. PMID:21481257

  16. Teaching audience analysis to the technical student

    NASA Technical Reports Server (NTRS)

    Debs, M. B.; Brillhart, L. V.

    1981-01-01

    Teaching audience analysis, as practiced in a technical writing course for engineering students, is discussed. Audience analysis is described as the task of defining the audience for a particular piece of writing and determining those characteristics of the audience which constrain the writer and effect reception of the message. A mature technical writing style that shows the tension produced when a text is written to be read and understood is considered in terms of audience analysis. Techniques include: (1) conveying to students the concept that a reader with certain expectations exist, (2) team teaching to preserve the context of a given technical discipline, and (3) assigning a technical report that addresses a variety of readers, thus establishing the complexity of audience oriented writing.

  17. Earth Observation

    NASA Image and Video Library

    2013-08-20

    Earth observation taken during day pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message: Looking southwest over northern Africa. Libya, Algeria, Niger.

  18. Application of a distributed network in computational fluid dynamic simulations

    NASA Technical Reports Server (NTRS)

    Deshpande, Manish; Feng, Jinzhang; Merkle, Charles L.; Deshpande, Ashish

    1994-01-01

    A general-purpose 3-D, incompressible Navier-Stokes algorithm is implemented on a network of concurrently operating workstations using parallel virtual machine (PVM) and compared with its performance on a CRAY Y-MP and on an Intel iPSC/860. The problem is relatively computationally intensive, and has a communication structure based primarily on nearest-neighbor communication, making it ideally suited to message passing. Such problems are frequently encountered in computational fluid dynamics (CDF), and their solution is increasingly in demand. The communication structure is explicitly coded in the implementation to fully exploit the regularity in message passing in order to produce a near-optimal solution. Results are presented for various grid sizes using up to eight processors.

  19. Approximate message passing with restricted Boltzmann machine priors

    NASA Astrophysics Data System (ADS)

    Tramel, Eric W.; Drémeau, Angélique; Krzakala, Florent

    2016-07-01

    Approximate message passing (AMP) has been shown to be an excellent statistical approach to signal inference and compressed sensing problems. The AMP framework provides modularity in the choice of signal prior; here we propose a hierarchical form of the Gauss-Bernoulli prior which utilizes a restricted Boltzmann machine (RBM) trained on the signal support to push reconstruction performance beyond that of simple i.i.d. priors for signals whose support can be well represented by a trained binary RBM. We present and analyze two methods of RBM factorization and demonstrate how these affect signal reconstruction performance within our proposed algorithm. Finally, using the MNIST handwritten digit dataset, we show experimentally that using an RBM allows AMP to approach oracle-support performance.

  20. New NAS Parallel Benchmarks Results

    NASA Technical Reports Server (NTRS)

    Yarrow, Maurice; Saphir, William; VanderWijngaart, Rob; Woo, Alex; Kutler, Paul (Technical Monitor)

    1997-01-01

    NPB2 (NAS (NASA Advanced Supercomputing) Parallel Benchmarks 2) is an implementation, based on Fortran and the MPI (message passing interface) message passing standard, of the original NAS Parallel Benchmark specifications. NPB2 programs are run with little or no tuning, in contrast to NPB vendor implementations, which are highly optimized for specific architectures. NPB2 results complement, rather than replace, NPB results. Because they have not been optimized by vendors, NPB2 implementations approximate the performance a typical user can expect for a portable parallel program on distributed memory parallel computers. Together these results provide an insightful comparison of the real-world performance of high-performance computers. New NPB2 features: New implementation (CG), new workstation class problem sizes, new serial sample versions, more performance statistics.

  1. Beyond the One-Hour Outreach Talk: Introducing a Reading and Writing Program into a High School Science Class

    NASA Astrophysics Data System (ADS)

    Ratay, Douglas L.; Schairer, Ashley; Garland, Catherine A.; Gomez-Martin, Cynthia

    We present a discussion of a newly implemented one-year program that brings high-level science reading and writing into a remedial high school science class. In the program, articles from publications such as Scientific American and Astronomy magazines are used to teach current science topics and to reinforce reading and writing skills. These skills are critical for general knowledge, literacy, and for passing state standardized tests. Members of the astronomy community act as "writing coaches" to help guide the students through the reading and writing process. This program illustrates one way that astronomers can become involved with underserved populations.

  2. MNOS BORAM Manufacturing Methods and Technology Project.

    DTIC Science & Technology

    1980-02-01

    1OO0psec erase. 200psec write 4-11,4 13 complement checkerboard p~attern hegrir at address 63 arid count down group erase-write entire chit ) re’ad entire...letft side of thie unit. I w 0 channels are provided to communicate with devices Linder test. Inl ficlure 4-15, the i\\% ko cahles at thle iiht of’ the...FMS PAS PASS F-H 40 PAS-- 00r4I u sr: PASS FH. Fs FPS ’S . pH’- ( Ko 00 .-3 04 PASL rH .-. FPFA r A L C:" :’ -F P’ . l FM , P -- IF - H-" Fv

  3. Passing messages between biological networks to refine predicted interactions.

    PubMed

    Glass, Kimberly; Huttenhower, Curtis; Quackenbush, John; Yuan, Guo-Cheng

    2013-01-01

    Regulatory network reconstruction is a fundamental problem in computational biology. There are significant limitations to such reconstruction using individual datasets, and increasingly people attempt to construct networks using multiple, independent datasets obtained from complementary sources, but methods for this integration are lacking. We developed PANDA (Passing Attributes between Networks for Data Assimilation), a message-passing model using multiple sources of information to predict regulatory relationships, and used it to integrate protein-protein interaction, gene expression, and sequence motif data to reconstruct genome-wide, condition-specific regulatory networks in yeast as a model. The resulting networks were not only more accurate than those produced using individual data sets and other existing methods, but they also captured information regarding specific biological mechanisms and pathways that were missed using other methodologies. PANDA is scalable to higher eukaryotes, applicable to specific tissue or cell type data and conceptually generalizable to include a variety of regulatory, interaction, expression, and other genome-scale data. An implementation of the PANDA algorithm is available at www.sourceforge.net/projects/panda-net.

  4. A Natural Integration

    ERIC Educational Resources Information Center

    Coskie, Tracy; Hornof, Michelle; Trudel, Heidi

    2007-01-01

    A five-week study taught students how to write a field guide that identified the plants in a small wooded area they passed through on their way to their school playground. By creating this authentic genre of science writing, students came to understand and care for the natural world in their immediate environment. They also developed important…

  5. Earth observation taken by the Expedition 46 crew

    NASA Image and Video Library

    2016-01-23

    ISS046e021993 (01/23/2016) --- Earth observation of the coast of Oman taken during a night pass by the Expedition 46 crew aboard the International Space Station. NASA astronaut Tim Kopra tweeted this image out with this message: "Passing over the Gulf of #Oman at night -- city lights of #Muscat #Dubai #AbuDhabi and #Doha in the distance".

  6. Addressing the challenges of standalone multi-core simulations in molecular dynamics

    NASA Astrophysics Data System (ADS)

    Ocaya, R. O.; Terblans, J. J.

    2017-07-01

    Computational modelling in material science involves mathematical abstractions of force fields between particles with the aim to postulate, develop and understand materials by simulation. The aggregated pairwise interactions of the material's particles lead to a deduction of its macroscopic behaviours. For practically meaningful macroscopic scales, a large amount of data are generated, leading to vast execution times. Simulation times of hours, days or weeks for moderately sized problems are not uncommon. The reduction of simulation times, improved result accuracy and the associated software and hardware engineering challenges are the main motivations for many of the ongoing researches in the computational sciences. This contribution is concerned mainly with simulations that can be done on a "standalone" computer based on Message Passing Interfaces (MPI), parallel code running on hardware platforms with wide specifications, such as single/multi- processor, multi-core machines with minimal reconfiguration for upward scaling of computational power. The widely available, documented and standardized MPI library provides this functionality through the MPI_Comm_size (), MPI_Comm_rank () and MPI_Reduce () functions. A survey of the literature shows that relatively little is written with respect to the efficient extraction of the inherent computational power in a cluster. In this work, we discuss the main avenues available to tap into this extra power without compromising computational accuracy. We also present methods to overcome the high inertia encountered in single-node-based computational molecular dynamics. We begin by surveying the current state of the art and discuss what it takes to achieve parallelism, efficiency and enhanced computational accuracy through program threads and message passing interfaces. Several code illustrations are given. The pros and cons of writing raw code as opposed to using heuristic, third-party code are also discussed. The growing trend towards graphical processor units and virtual computing clouds for high-performance computing is also discussed. Finally, we present the comparative results of vacancy formation energy calculations using our own parallelized standalone code called Verlet-Stormer velocity (VSV) operating on 30,000 copper atoms. The code is based on the Sutton-Chen implementation of the Finnis-Sinclair pairwise embedded atom potential. A link to the code is also given.

  7. Mean-field message-passing equations in the Hopfield model and its generalizations

    NASA Astrophysics Data System (ADS)

    Mézard, Marc

    2017-02-01

    Motivated by recent progress in using restricted Boltzmann machines as preprocessing algorithms for deep neural network, we revisit the mean-field equations [belief-propagation and Thouless-Anderson Palmer (TAP) equations] in the best understood of such machines, namely the Hopfield model of neural networks, and we explicit how they can be used as iterative message-passing algorithms, providing a fast method to compute the local polarizations of neurons. In the "retrieval phase", where neurons polarize in the direction of one memorized pattern, we point out a major difference between the belief propagation and TAP equations: The set of belief propagation equations depends on the pattern which is retrieved, while one can use a unique set of TAP equations. This makes the latter method much better suited for applications in the learning process of restricted Boltzmann machines. In the case where the patterns memorized in the Hopfield model are not independent, but are correlated through a combinatorial structure, we show that the TAP equations have to be modified. This modification can be seen either as an alteration of the reaction term in TAP equations or, more interestingly, as the consequence of message passing on a graphical model with several hidden layers, where the number of hidden layers depends on the depth of the correlations in the memorized patterns. This layered structure is actually necessary when one deals with more general restricted Boltzmann machines.

  8. Earth Observation

    NASA Image and Video Library

    2013-08-03

    Earth observation taken during day pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message: Perhaps a dandelion losing its seeds in the wind? Love clouds!

  9. Paralysis

    MedlinePlus

    Paralysis is the loss of muscle function in part of your body. It happens when something goes ... way messages pass between your brain and muscles. Paralysis can be complete or partial. It can occur ...

  10. Advanced Numerical Techniques of Performance Evaluation. Volume 2

    DTIC Science & Technology

    1990-06-01

    multiprocessor environment. This factor is determined by the overhead of the primitives available in the system ( semaphore , monitor , or message... semaphore , monitor , or message passing primitives ) and U the programming ability of the user who implements the simulation. " t,: the sequential...Warp Operating System . i Pro" lftevcnth ACM Symposum on Operating Systems Princlplcs, pages 77 9:3, Auslin, TX, Nov wicr 1987. ACM. [121 D.R. Jefferson

  11. Benchmarking hypercube hardware and software

    NASA Technical Reports Server (NTRS)

    Grunwald, Dirk C.; Reed, Daniel A.

    1986-01-01

    It was long a truism in computer systems design that balanced systems achieve the best performance. Message passing parallel processors are no different. To quantify the balance of a hypercube design, an experimental methodology was developed and the associated suite of benchmarks was applied to several existing hypercubes. The benchmark suite includes tests of both processor speed in the absence of internode communication and message transmission speed as a function of communication patterns.

  12. Data transfer using complete bipartite graph

    NASA Astrophysics Data System (ADS)

    Chandrasekaran, V. M.; Praba, B.; Manimaran, A.; Kailash, G.

    2017-11-01

    Information exchange extent is an estimation of the amount of information sent between two focuses on a framework in a given time period. It is an extremely significant perception in present world. There are many ways of message passing in the present situations. Some of them are through encryption, decryption, by using complete bipartite graph. In this paper, we recommend a method for communication using messages through encryption of a complete bipartite graph.

  13. A three-year reflective writing program as part of introductory pharmacy practice experiences.

    PubMed

    Nuffer, Wesley; Vaughn, Jessica; Kerr, Kevin; Zielenski, Christopher; Toppel, Brianna; Johnson, Lauren; McCauley, Patrina; Turner, Christopher J

    2013-06-12

    To implement and evaluate a 3-year reflective writing program incorporated into introductory pharmacy practice experiences (IPPEs) in the first- through third-year of a doctor of pharmacy (PharmD) program. Reflective writing was integrated into 6 IPPE courses to develop students' lifelong learning skills. In their writing, students were required to self-assess their performance in patient care activities, identify and describe how they would incorporate learning opportunities, and then evaluate their progress. Practitioners, faculty members, and fourth-year PharmD students served as writing preceptors. The success of the writing program was assessed by reviewing class performance and surveying writing preceptor's opinions regarding the student's achievement of program objectives. Class pass rates averaged greater than 99% over the 8 years of the program and the large majority of the writing preceptors reported that student learning objectives were met. A support pool of 99 writing preceptors was created. A 3-year reflective writing program improved pharmacy students' reflection and reflective writing skills.

  14. Simulation of Finite-Precision Effects in Digital Filters.

    DTIC Science & Technology

    1991-12-12

    the output power due to roundoff noise [13:422][15:3591. To prevent overflow, the filter gains are < 1.0 at branch nodes where the signal enters. This...performed and prevented with a message to the user. A useful check for the user is one when the coefficients are quantized. If a quantized version of a...8217(55) ------------ ALL DONE - WRITE(6,1)’***** PLEASE ENTER NUMBER OR [RET] TO RUN PRGRAM *****’ WRITE(6,1)’ ENTER NUMBER [#]:’ READ(5,38,END=99,ERR

  15. Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks

    PubMed Central

    Lim, Chiwoo; Kim, Sang-Hyo

    2018-01-01

    In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA), is proposed for peer discovery of distributed device-to-device (D2D) communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR). The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA)-based discovery. PMID:29673167

  16. Statistical physics of hard combinatorial optimization: Vertex cover problem

    NASA Astrophysics Data System (ADS)

    Zhao, Jin-Hua; Zhou, Hai-Jun

    2014-07-01

    Typical-case computation complexity is a research topic at the boundary of computer science, applied mathematics, and statistical physics. In the last twenty years, the replica-symmetry-breaking mean field theory of spin glasses and the associated message-passing algorithms have greatly deepened our understanding of typical-case computation complexity. In this paper, we use the vertex cover problem, a basic nondeterministic-polynomial (NP)-complete combinatorial optimization problem of wide application, as an example to introduce the statistical physical methods and algorithms. We do not go into the technical details but emphasize mainly the intuitive physical meanings of the message-passing equations. A nonfamiliar reader shall be able to understand to a large extent the physics behind the mean field approaches and to adjust the mean field methods in solving other optimization problems.

  17. Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks.

    PubMed

    Lim, Chiwoo; Jang, Min; Kim, Sang-Hyo

    2018-04-17

    In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA), is proposed for peer discovery of distributed device-to-device (D2D) communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR). The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA)-based discovery.

  18. A Message Passing Approach to Side Chain Positioning with Applications in Protein Docking Refinement *

    PubMed Central

    Moghadasi, Mohammad; Kozakov, Dima; Mamonov, Artem B.; Vakili, Pirooz; Vajda, Sandor; Paschalidis, Ioannis Ch.

    2013-01-01

    We introduce a message-passing algorithm to solve the Side Chain Positioning (SCP) problem. SCP is a crucial component of protein docking refinement, which is a key step of an important class of problems in computational structural biology called protein docking. We model SCP as a combinatorial optimization problem and formulate it as a Maximum Weighted Independent Set (MWIS) problem. We then employ a modified and convergent belief-propagation algorithm to solve a relaxation of MWIS and develop randomized estimation heuristics that use the relaxed solution to obtain an effective MWIS feasible solution. Using a benchmark set of protein complexes we demonstrate that our approach leads to more accurate docking predictions compared to a baseline algorithm that does not solve the SCP. PMID:23515575

  19. Multi-partitioning for ADI-schemes on message passing architectures

    NASA Technical Reports Server (NTRS)

    Vanderwijngaart, Rob F.

    1994-01-01

    A kind of discrete-operator splitting called Alternating Direction Implicit (ADI) has been found to be useful in simulating fluid flow problems. In particular, it is being used to study the effects of hot exhaust jets from high performance aircraft on landing surfaces. Decomposition techniques that minimize load imbalance and message-passing frequency are described. Three strategies that are investigated for implementing the NAS Scalar Penta-diagonal Parallel Benchmark (SP) are transposition, pipelined Gaussian elimination, and multipartitioning. The multipartitioning strategy, which was used on Ethernet, was found to be the most efficient, although it was considered only a moderate success because of Ethernet's limited communication properties. The efficiency derived largely from the coarse granularity of the strategy, which reduced latencies and allowed overlap of communication and computation.

  20. Parallel and fault-tolerant algorithms for hypercube multiprocessors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aykanat, C.

    1988-01-01

    Several techniques for increasing the performance of parallel algorithms on distributed-memory message-passing multi-processor systems are investigated. These techniques are effectively implemented for the parallelization of the Scaled Conjugate Gradient (SCG) algorithm on a hypercube connected message-passing multi-processor. Significant performance improvement is achieved by using these techniques. The SCG algorithm is used for the solution phase of an FE modeling system. Almost linear speed-up is achieved, and it is shown that hypercube topology is scalable for an FE class of problem. The SCG algorithm is also shown to be suitable for vectorization, and near supercomputer performance is achieved on a vectormore » hypercube multiprocessor by exploiting both parallelization and vectorization. Fault-tolerance issues for the parallel SCG algorithm and for the hypercube topology are also addressed.« less

  1. Ultrascalable petaflop parallel supercomputer

    DOEpatents

    Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Chiu, George [Cross River, NY; Cipolla, Thomas M [Katonah, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Hall, Shawn [Pleasantville, NY; Haring, Rudolf A [Cortlandt Manor, NY; Heidelberger, Philip [Cortlandt Manor, NY; Kopcsay, Gerard V [Yorktown Heights, NY; Ohmacht, Martin [Yorktown Heights, NY; Salapura, Valentina [Chappaqua, NY; Sugavanam, Krishnan [Mahopac, NY; Takken, Todd [Brewster, NY

    2010-07-20

    A massively parallel supercomputer of petaOPS-scale includes node architectures based upon System-On-a-Chip technology, where each processing node comprises a single Application Specific Integrated Circuit (ASIC) having up to four processing elements. The ASIC nodes are interconnected by multiple independent networks that optimally maximize the throughput of packet communications between nodes with minimal latency. The multiple networks may include three high-speed networks for parallel algorithm message passing including a Torus, collective network, and a Global Asynchronous network that provides global barrier and notification functions. These multiple independent networks may be collaboratively or independently utilized according to the needs or phases of an algorithm for optimizing algorithm processing performance. The use of a DMA engine is provided to facilitate message passing among the nodes without the expenditure of processing resources at the node.

  2. Fault-tolerant processing system

    NASA Technical Reports Server (NTRS)

    Palumbo, Daniel L. (Inventor)

    1996-01-01

    A fault-tolerant, fiber optic interconnect, or backplane, which serves as a via for data transfer between modules. Fault tolerance algorithms are embedded in the backplane by dividing the backplane into a read bus and a write bus and placing a redundancy management unit (RMU) between the read bus and the write bus so that all data transmitted by the write bus is subjected to the fault tolerance algorithms before the data is passed for distribution to the read bus. The RMU provides both backplane control and fault tolerance.

  3. Incremental Parallelization of Non-Data-Parallel Programs Using the Charon Message-Passing Library

    NASA Technical Reports Server (NTRS)

    VanderWijngaart, Rob F.

    2000-01-01

    Message passing is among the most popular techniques for parallelizing scientific programs on distributed-memory architectures. The reasons for its success are wide availability (MPI), efficiency, and full tuning control provided to the programmer. A major drawback, however, is that incremental parallelization, as offered by compiler directives, is not generally possible, because all data structures have to be changed throughout the program simultaneously. Charon remedies this situation through mappings between distributed and non-distributed data. It allows breaking up the parallelization into small steps, guaranteeing correctness at every stage. Several tools are available to help convert legacy codes into high-performance message-passing programs. They usually target data-parallel applications, whose loops carrying most of the work can be distributed among all processors without much dependency analysis. Others do a full dependency analysis and then convert the code virtually automatically. Even more toolkits are available that aid construction from scratch of message passing programs. None, however, allows piecemeal translation of codes with complex data dependencies (i.e. non-data-parallel programs) into message passing codes. The Charon library (available in both C and Fortran) provides incremental parallelization capabilities by linking legacy code arrays with distributed arrays. During the conversion process, non-distributed and distributed arrays exist side by side, and simple mapping functions allow the programmer to switch between the two in any location in the program. Charon also provides wrapper functions that leave the structure of the legacy code intact, but that allow execution on truly distributed data. Finally, the library provides a rich set of communication functions that support virtually all patterns of remote data demands in realistic structured grid scientific programs, including transposition, nearest-neighbor communication, pipelining, gather/scatter, and redistribution. At the end of the conversion process most intermediate Charon function calls will have been removed, the non-distributed arrays will have been deleted, and virtually the only remaining Charon functions calls are the high-level, highly optimized communications. Distribution of the data is under complete control of the programmer, although a wide range of useful distributions is easily available through predefined functions. A crucial aspect of the library is that it does not allocate space for distributed arrays, but accepts programmer-specified memory. This has two major consequences. First, codes parallelized using Charon do not suffer from encapsulation; user data is always directly accessible. This provides high efficiency, and also retains the possibility of using message passing directly for highly irregular communications. Second, non-distributed arrays can be interpreted as (trivial) distributions in the Charon sense, which allows them to be mapped to truly distributed arrays, and vice versa. This is the mechanism that enables incremental parallelization. In this paper we provide a brief introduction of the library and then focus on the actual steps in the parallelization process, using some representative examples from, among others, the NAS Parallel Benchmarks. We show how a complicated two-dimensional pipeline-the prototypical non-data-parallel algorithm- can be constructed with ease. To demonstrate the flexibility of the library, we give examples of the stepwise, efficient parallel implementation of nonlocal boundary conditions common in aircraft simulations, as well as the construction of the sequence of grids required for multigrid.

  4. A Comparison of Newly-Trained and Experienced Raters on a Standardized Writing Assessment

    ERIC Educational Resources Information Center

    Attali, Yigal

    2016-01-01

    A short training program for evaluating responses to an essay writing task consisted of scoring 20 training essays with immediate feedback about the correct score. The same scoring session also served as a certification test for trainees. Participants with little or no previous rating experience completed this session and 14 trainees who passed an…

  5. Creating "A World Elsewhere"--The Self Resisting Society: A Cultural Perspective.

    ERIC Educational Resources Information Center

    Raschke, Debrah

    Teachers of composition have an obligation to students to know what assumptions underlie their teaching methodology. Every writing course, no matter what its format, represents a particular construct of reality, of seeing the world and the individual in the world, which, in addition to writing skills, is passed on to students. Several useful…

  6. Message Passing on GPUs

    NASA Astrophysics Data System (ADS)

    Stuart, J. A.

    2011-12-01

    This paper explores the challenges in implementing a message passing interface usable on systems with data-parallel processors, and more specifically GPUs. As a case study, we design and implement the ``DCGN'' API on NVIDIA GPUs that is similar to MPI and allows full access to the underlying architecture. We introduce the notion of data-parallel thread-groups as a way to map resources to MPI ranks. We use a method that also allows the data-parallel processors to run autonomously from user-written CPU code. In order to facilitate communication, we use a sleep-based polling system to store and retrieve messages. Unlike previous systems, our method provides both performance and flexibility. By running a test suite of applications with different communication requirements, we find that a tolerable amount of overhead is incurred, somewhere between one and five percent depending on the application, and indicate the locations where this overhead accumulates. We conclude that with innovations in chipsets and drivers, this overhead will be mitigated and provide similar performance to typical CPU-based MPI implementations while providing fully-dynamic communication.

  7. Internet Relay Chat.

    ERIC Educational Resources Information Center

    Simpson, Carol

    2000-01-01

    Describes Internet Relay Chats (IRCs), electronic conversations over the Internet that allow multiple users to write messages, and their applications to educational settings such as teacher collaboration and conversations between classes. Explains hardware and software requirements, IRC organization into nets and channels, and benefits and…

  8. Thus Spoke Galileo - The great scientist's ideas and their relevance to the present day

    NASA Astrophysics Data System (ADS)

    Frova, Andrea; Marenzana, Mariapiera

    2006-04-01

    Any reasonably educated person knows what is said about Galileo, but not what Galileo himself actually said. This has allowed a variety of different interpretations to be put upon his stands as a scientist and as a man, in particular from within the Catholic world, where a sense of guilt for his dramatic destiny has never been completely erased. Let him speak, then so that he can bring to everybody's attention, in particular the young, his message of reason, of intellectual honesty, of free thinking. A message that more than ever, is of great relevance in the rampant irrationality of the new millennium. The selection of writings offered here is preferred by a blunt self-portrait, which is of course a "forgery" - however, one that is based entirely on extracts from Galileo's writings and private letters, though he would never have dared, nor been allowed to write it himself. The anthology touches upon the themes dearest to Galileo and a lively commentary, from both the scientific and the literary-historical viewpoints, should help make the extracts accessible. The reader will be able to appreciate the work and the writing-style of a very great scientist and author and will probably also be surprised to find with the aid of a test with answers provided, just how many of the misconceptions about the "workings of the world" that were rife prior to Galileo, still survive today among the common beliefs of even well-educated, non scientific people.

  9. Linguistic analysis of communication in therapist-assisted internet-delivered cognitive behavior therapy for generalized anxiety disorder.

    PubMed

    Dirkse, Dale; Hadjistavropoulos, Heather D; Hesser, Hugo; Barak, Azy

    2015-01-01

    Therapist-assisted Internet-delivered cognitive behavior therapy (ICBT) involves elements of expressive writing through secure messaging with a therapist. Expressive writing has been associated with psychological and physical health benefits in past research; furthermore, certain linguistic dimensions in expressive writing have been identified as particularly beneficial to health, such as less frequent use of negative emotion words and greater use of positive emotion words. No research, to date, has analyzed linguistic dimensions in client communication over the course of therapist-assisted ICBT for individuals with symptoms of generalized anxiety. This naturalistic study examined messages sent to therapists during the course of ICBT using linguistic analysis, and explored covariation of word use with symptom improvement. Data were obtained from patients with symptoms of generalized anxiety (N = 59) who completed 12 modules of therapist-assisted ICBT and rated symptoms of anxiety, depression, and panic at the beginning of each module. Linguistic analysis categorized text submitted to therapists into different word categories. Results found that patients' use of negative emotion, anxiety, causation, and insight words reduced over the course of treatment, while past tense words increased. Furthermore, negative emotion words significantly covaried with symptom ratings over the course of treatment. While causal statements cannot be made, findings improve our understanding of patient communication in ICBT and suggest that the further study of linguistic dimensions as psychological indicators and the potential utility of expressive writing strategies in therapist-assisted ICBT may be worthwhile.

  10. Learning to Write: No Trespassing!

    ERIC Educational Resources Information Center

    Clyde, Jean Anne; Mills, Heidi

    1991-01-01

    Discusses the ways in which a group of first graders used literacy events to demonstrate their understanding of the functions and purpose of print. Students prepared signs and messages to each other during a three-day camping excursion. Examples of student signs are included. (BB)

  11. An investigation of the effects of reading and writing text-based messages while driving.

    DOT National Transportation Integrated Search

    2012-08-01

    Previous research, using driving simulation, crash data, and naturalistic methods, has begun to shed light on the dangers of texting while driving. Perhaps because of the dangers, no published work has experimentally investigated the dangers of texti...

  12. Three Ways of Looking at a Blackboard: A "Trivial" Approach to Writing and Speaking

    ERIC Educational Resources Information Center

    McDonald, Hal

    2006-01-01

    The author writes that his experience in teaching has taught him that the perfect text simply does not exist, however the closest approximation to perfection lies in the direction of the classical world. Hal McDonald says that he cannot see how one can teach rhetoric without passing through pedagogical territory first cleared by Aristotle,…

  13. Passing Messages between Biological Networks to Refine Predicted Interactions

    PubMed Central

    Glass, Kimberly; Huttenhower, Curtis; Quackenbush, John; Yuan, Guo-Cheng

    2013-01-01

    Regulatory network reconstruction is a fundamental problem in computational biology. There are significant limitations to such reconstruction using individual datasets, and increasingly people attempt to construct networks using multiple, independent datasets obtained from complementary sources, but methods for this integration are lacking. We developed PANDA (Passing Attributes between Networks for Data Assimilation), a message-passing model using multiple sources of information to predict regulatory relationships, and used it to integrate protein-protein interaction, gene expression, and sequence motif data to reconstruct genome-wide, condition-specific regulatory networks in yeast as a model. The resulting networks were not only more accurate than those produced using individual data sets and other existing methods, but they also captured information regarding specific biological mechanisms and pathways that were missed using other methodologies. PANDA is scalable to higher eukaryotes, applicable to specific tissue or cell type data and conceptually generalizable to include a variety of regulatory, interaction, expression, and other genome-scale data. An implementation of the PANDA algorithm is available at www.sourceforge.net/projects/panda-net. PMID:23741402

  14. Applications of Probabilistic Combiners on Linear Feedback Shift Register Sequences

    DTIC Science & Technology

    2016-12-01

    on the resulting output strings show a drastic increase in complexity, while simultaneously passing the stringent randomness tests required by the...a three-variable function. Our tests on the resulting output strings show a drastic increase in complex- ity, while simultaneously passing the...10001101 01000010 11101001 Decryption of a message that has been encrypted using bitwise XOR is quite simple. Since each bit is its own additive inverse

  15. Earth Observation

    NASA Image and Video Library

    2013-07-26

    Earth observation taken during day pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message: Never tire of finding shapes in the clouds! These look very botanical to me. Simply perfect.

  16. PREEMIE Reauthorization Act

    THOMAS, 112th Congress

    Sen. Alexander, Lamar [R-TN

    2011-07-28

    Senate - 12/19/2012 Message on House action received in Senate and at desk: House amendments to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  17. A Three-Year Reflective Writing Program as Part of Introductory Pharmacy Practice Experiences

    PubMed Central

    Vaughn, Jessica; Kerr, Kevin; Zielenski, Christopher; Toppel, Brianna; Johnson, Lauren; McCauley, Patrina; Turner, Christopher J.

    2013-01-01

    Objectives. To implement and evaluate a 3-year reflective writing program incorporated into introductory pharmacy practice experiences (IPPEs) in the first- through third-year of a doctor of pharmacy (PharmD) program. Design. Reflective writing was integrated into 6 IPPE courses to develop students’ lifelong learning skills. In their writing, students were required to self-assess their performance in patient care activities, identify and describe how they would incorporate learning opportunities, and then evaluate their progress. Practitioners, faculty members, and fourth-year PharmD students served as writing preceptors. Assessment. The success of the writing program was assessed by reviewing class performance and surveying writing preceptor’s opinions regarding the student’s achievement of program objectives. Class pass rates averaged greater than 99% over the 8 years of the program and the large majority of the writing preceptors reported that student learning objectives were met. A support pool of 99 writing preceptors was created. Conclusions. A 3-year reflective writing program improved pharmacy students’ reflection and reflective writing skills. PMID:23788811

  18. Electronic Cigarettes on Twitter – Spreading the Appeal of Flavors

    PubMed Central

    Chu, Kar-Hai; Unger, Jennifer B.; Cruz, Tess Boley; Soto, Daniel W.

    2016-01-01

    Objectives Social media platforms are used by tobacco companies to promote products. This study examines message content on Twitter from e-cigarette brands and determines if messages about flavors are more likely than non-flavor messages to be passed along to other viewers. Methods We examined Twitter data from 2 e-cigarette brands and identified messages that contained terms related to e-cigarette flavors. Results Flavor-related posts were retweeted at a significantly higher rate by e-cigarette brands (p = .04) and other Twitter users (p < .01) than non-flavor posts. Conclusions E-cigarette brands and other Twitter users pay attention to flavor-related posts and retweet them often. These findings suggest flavors continue to be an attractive characteristic and their marketing should be monitored closely. PMID:27853734

  19. Parallelization of the TRIGRS model for rainfall-induced landslides using the message passing interface

    USGS Publications Warehouse

    Alvioli, M.; Baum, R.L.

    2016-01-01

    We describe a parallel implementation of TRIGRS, the Transient Rainfall Infiltration and Grid-Based Regional Slope-Stability Model for the timing and distribution of rainfall-induced shallow landslides. We have parallelized the four time-demanding execution modes of TRIGRS, namely both the saturated and unsaturated model with finite and infinite soil depth options, within the Message Passing Interface framework. In addition to new features of the code, we outline details of the parallel implementation and show the performance gain with respect to the serial code. Results are obtained both on commercial hardware and on a high-performance multi-node machine, showing the different limits of applicability of the new code. We also discuss the implications for the application of the model on large-scale areas and as a tool for real-time landslide hazard monitoring.

  20. Identifying an influential spreader from a single seed in complex networks via a message-passing approach

    NASA Astrophysics Data System (ADS)

    Min, Byungjoon

    2018-01-01

    Identifying the most influential spreaders is one of outstanding problems in physics of complex systems. So far, many approaches have attempted to rank the influence of nodes but there is still the lack of accuracy to single out influential spreaders. Here, we directly tackle the problem of finding important spreaders by solving analytically the expected size of epidemic outbreaks when spreading originates from a single seed. We derive and validate a theory for calculating the size of epidemic outbreaks with a single seed using a message-passing approach. In addition, we find that the probability to occur epidemic outbreaks is highly dependent on the location of the seed but the size of epidemic outbreaks once it occurs is insensitive to the seed. We also show that our approach can be successfully adapted into weighted networks.

  1. The design of multi-core DSP parallel model based on message passing and multi-level pipeline

    NASA Astrophysics Data System (ADS)

    Niu, Jingyu; Hu, Jian; He, Wenjing; Meng, Fanrong; Li, Chuanrong

    2017-10-01

    Currently, the design of embedded signal processing system is often based on a specific application, but this idea is not conducive to the rapid development of signal processing technology. In this paper, a parallel processing model architecture based on multi-core DSP platform is designed, and it is mainly suitable for the complex algorithms which are composed of different modules. This model combines the ideas of multi-level pipeline parallelism and message passing, and summarizes the advantages of the mainstream model of multi-core DSP (the Master-Slave model and the Data Flow model), so that it has better performance. This paper uses three-dimensional image generation algorithm to validate the efficiency of the proposed model by comparing with the effectiveness of the Master-Slave and the Data Flow model.

  2. Generalized hypercube structures and hyperswitch communication network

    NASA Technical Reports Server (NTRS)

    Young, Steven D.

    1992-01-01

    This paper discusses an ongoing study that uses a recent development in communication control technology to implement hybrid hypercube structures. These architectures are similar to binary hypercubes, but they also provide added connectivity between the processors. This added connectivity increases communication reliability while decreasing the latency of interprocessor message passing. Because these factors directly determine the speed that can be obtained by multiprocessor systems, these architectures are attractive for applications such as remote exploration and experimentation, where high performance and ultrareliability are required. This paper describes and enumerates these architectures and discusses how they can be implemented with a modified version of the hyperswitch communication network (HCN). The HCN is analyzed because it has three attractive features that enable these architectures to be effective: speed, fault tolerance, and the ability to pass multiple messages simultaneously through the same hyperswitch controller.

  3. Eight questions to ask before writing an article.

    PubMed

    Albert, Tim

    2017-06-02

    Health professionals often have to write articles for publication in academic journals. Many of them find this difficult and suffer from one or more variations of writer's block. A good way of avoiding these setbacks is to prepare thoroughly for the writing project, and this article proposes eight different questions writers can ask before they start. The first is whether they are in a good position to complete the task, and if not whether they should try to negotiate their way out of the project. If they commit to going ahead, writers should work out where they will find the necessary time, and set deadlines for ensuring that they do. They should also decide on their co-authors, because getting them involved early should make the rewriting more straightforward as well as reducing the danger of ghost authors emerging once the work has been done. Writers should put their research away and reflect on the most appropriate message - a simple sentence that sums up the main implication of the paper. Armed with this message, they can identify a suitable journal for publication - and thereafter can use articles in this journal to guide them on matters of substance and style. If the article is published in that target journal authors can consider that they have written a successful paper.

  4. Step by Step to Your New Camp Brochure.

    ERIC Educational Resources Information Center

    Cole, Bill

    1993-01-01

    Describes steps in developing camp brochures: examining brochures of competing camps; deciding on a message; hiring professional designers and photographers; writing the copy; determining marketing strategies and quantity of brochures needed; reviewing final photo choices; evaluating the brochure; and planning for brochure mailings. (LP)

  5. Monuments to Academic Carelessness

    PubMed Central

    2014-01-01

    In 1942, Katherine Frost Bruner published an article titled “Of psychological writing: Being some valedictory remarks on style.” It was published in Journal of Abnormal and Social Psychology, the journal for which she served as editorial assistant between 1937 and 1941. Her collection of advice to writing scholars has been widely quoted, including by several editions of The Publication Manual of the American Psychological Association. The most frequently quoted message in Bruner’s article deals with the importance of making sure that references in academic texts are complete and accurate. Exploring the citation history of this particular message reveals an ironic point: the great majority of those who have quoted Bruner’s words on reference accuracy have not done so accurately. The case may serve as a reminder of the importance of the basic academic principle of striving to use primary sources. The most startling finding in this study is how frequently this principle is violated, even by authors who advise and educate academic writers. PMID:28479644

  6. Monuments to Academic Carelessness: The Self-fulfilling Prophecy of Katherine Frost Bruner.

    PubMed

    Rekdal, Ole Bjørn

    2014-09-01

    In 1942, Katherine Frost Bruner published an article titled "Of psychological writing: Being some valedictory remarks on style." It was published in Journal of Abnormal and Social Psychology , the journal for which she served as editorial assistant between 1937 and 1941. Her collection of advice to writing scholars has been widely quoted, including by several editions of The Publication Manual of the American Psychological Association . The most frequently quoted message in Bruner's article deals with the importance of making sure that references in academic texts are complete and accurate. Exploring the citation history of this particular message reveals an ironic point: the great majority of those who have quoted Bruner's words on reference accuracy have not done so accurately. The case may serve as a reminder of the importance of the basic academic principle of striving to use primary sources. The most startling finding in this study is how frequently this principle is violated, even by authors who advise and educate academic writers.

  7. Earth Observation

    NASA Image and Video Library

    2013-08-03

    Earth observation taken during day pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message: From southernmost point of orbit over the South Pacific- all clouds seemed to be leading to the South Pole.

  8. Earth Observation

    NASA Image and Video Library

    2013-07-21

    Earth observation taken during night pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message this is labeled as : Tehran, Iran. Lights along the coast of the Caspian Sea visible through clouds. July 21.

  9. Whistleblower Protection Enhancement Act of 2010

    THOMAS, 111th Congress

    Sen. Akaka, Daniel K. [D-HI

    2009-02-03

    Senate - 12/22/2010 Message on House action received in Senate and at desk: House amendments to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  10. Earth Observation

    NASA Image and Video Library

    2014-05-31

    Earth Observation taken during a day pass by the Expedition 40 crew aboard the International Space Station (ISS). Folder lists this as: CEO - Arena de Sao Paolo. View used for Twitter message: Cloudy skies over São Paulo Brazil

  11. Common Psycholinguistic Themes in Mass Murderer Manifestos

    ERIC Educational Resources Information Center

    Hamlett, Laura E.

    2017-01-01

    Mass murder in the United States is increasing, yet understanding of mass murderers is still relatively limited. Many perpetrators compose manifestos, which include journals, blogs, letters, videos, and other writings. Previous research has indicated that personal messages are of great social and psychological importance; however, there remains an…

  12. Interprocess Communication in Highly Distributed Systems - A Workshop Report - 20 to 22, November 1978.

    DTIC Science & Technology

    1979-12-01

    Links between processes can be aLlocated strictLy to controL functions. In fact, the degree of separation of control and data is an important research is...delays or Loss of control messages. Cognoscienti agree that message-passing IPC schemes are equivalent in "power" to schemes which employ shared...THEORETICAL WORK Page 55 SECTION 6 THEORETICAL WORK 6.1 WORKING GRUP JIM REP.OR STRUCTURE of Discussion: Distributed system without central (or any) control

  13. Health Literacy and Cancer Prevention: Two New Instruments to Assess Comprehension

    PubMed Central

    Mazor, Kathleen M.; Roblin, Douglas W.; Williams, Andrew E.; Greene, Sarah M.; Gaglio, Bridget; Field, Terry S.; Costanza, Mary E.; Han, Paul K. J.; Saccoccio, Laura; Calvi, Josephine; Cove, Erica; Cowan, Rebecca

    2012-01-01

    Objectives Ability to understand spoken health information is an important facet of health literacy, but to date, no instrument has been available to quantify patients’ ability in this area. We sought to develop a test to assess comprehension of spoken health messages related to cancer prevention and screening to fill this gap, and a complementary test of comprehension of written health messages. Methods We used the Sentence Verification Technique to write items based on realistic health messages about cancer prevention and screening, including media messages, clinical encounters and clinical print materials. Items were reviewed, revised, and pre-tested. Adults aged 40 to 70 participated in a pilot administration in Georgia, Hawaii, and Massachusetts. Results The Cancer Message Literacy Test-Listening is self-administered via touchscreen laptop computer. No reading is required. It takes approximately 1 hour. The Cancer Message Literacy Test-Reading is self-administered on paper. It takes approximately 10 minutes. Conclusions These two new tests will allow researchers to assess comprehension of spoken health messages, to examine the relationship between listening and reading literacy, and to explore the impact of each form of literacy on health-related outcomes. Practice Implications Researchers and clinicians now have a means of measuring comprehension of spoken health information. PMID:22244323

  14. Terrorism Risk Insurance Program Reauthorization Act of 2014

    THOMAS, 113th Congress

    Sen. Schumer, Charles E. [D-NY

    2014-04-10

    Senate - 12/11/2014 Message on House action received in Senate and at desk: House amendment to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  15. Electronic Message Preservation Act

    THOMAS, 111th Congress

    Rep. Hodes, Paul W. [D-NH-2

    2009-03-09

    Senate - 03/18/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  16. Federal Financial Assistance Management Improvement Act of 2009

    THOMAS, 111th Congress

    Sen. Voinovich, George V. [R-OH

    2009-01-22

    Senate - 12/15/2009 Message on House action received in Senate and at desk: House amendment to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  17. Messaging to Increase Public Support for Naloxone Distribution Policies in the United States: Results from a Randomized Survey Experiment.

    PubMed

    Bachhuber, Marcus A; McGinty, Emma E; Kennedy-Hendricks, Alene; Niederdeppe, Jeff; Barry, Colleen L

    2015-01-01

    Barriers to public support for naloxone distribution include lack of knowledge, concerns about potential unintended consequences, and lack of sympathy for people at risk of overdose. A randomized survey experiment was conducted with a nationally-representative web-based survey research panel (GfK KnowledgePanel). Participants were randomly assigned to read different messages alone or in combination: 1) factual information about naloxone; 2) pre-emptive refutation of potential concerns about naloxone distribution; and 3) a sympathetic narrative about a mother whose daughter died of an opioid overdose. Participants were then asked if they support or oppose policies related to naloxone distribution. For each policy item, logistic regression models were used to test the effect of each message exposure compared with the no-exposure control group. The final sample consisted of 1,598 participants (completion rate: 72.6%). Factual information and the sympathetic narrative alone each led to higher support for training first responders to use naloxone, providing naloxone to friends and family members of people using opioids, and passing laws to protect people who administer naloxone. Participants receiving the combination of the sympathetic narrative and factual information, compared to factual information alone, were more likely to support all policies: providing naloxone to friends and family members (OR: 2.0 [95% CI: 1.4 to 2.9]), training first responders to use naloxone (OR: 2.0 [95% CI: 1.2 to 3.4]), passing laws to protect people if they administer naloxone (OR: 1.5 [95% CI: 1.04 to 2.2]), and passing laws to protect people if they call for medical help for an overdose (OR: 1.7 [95% CI: 1.2 to 2.5]). All messages increased public support, but combining factual information and the sympathetic narrative was most effective. Public support for naloxone distribution can be improved through education and sympathetic portrayals of the population who stands to benefit from these policies.

  18. Parallelization of KENO-Va Monte Carlo code

    NASA Astrophysics Data System (ADS)

    Ramón, Javier; Peña, Jorge

    1995-07-01

    KENO-Va is a code integrated within the SCALE system developed by Oak Ridge that solves the transport equation through the Monte Carlo Method. It is being used at the Consejo de Seguridad Nuclear (CSN) to perform criticality calculations for fuel storage pools and shipping casks. Two parallel versions of the code: one for shared memory machines and other for distributed memory systems using the message-passing interface PVM have been generated. In both versions the neutrons of each generation are tracked in parallel. In order to preserve the reproducibility of the results in both versions, advanced seeds for random numbers were used. The CONVEX C3440 with four processors and shared memory at CSN was used to implement the shared memory version. A FDDI network of 6 HP9000/735 was employed to implement the message-passing version using proprietary PVM. The speedup obtained was 3.6 in both cases.

  19. Statistical analysis of loopy belief propagation in random fields

    NASA Astrophysics Data System (ADS)

    Yasuda, Muneki; Kataoka, Shun; Tanaka, Kazuyuki

    2015-10-01

    Loopy belief propagation (LBP), which is equivalent to the Bethe approximation in statistical mechanics, is a message-passing-type inference method that is widely used to analyze systems based on Markov random fields (MRFs). In this paper, we propose a message-passing-type method to analytically evaluate the quenched average of LBP in random fields by using the replica cluster variation method. The proposed analytical method is applicable to general pairwise MRFs with random fields whose distributions differ from each other and can give the quenched averages of the Bethe free energies over random fields, which are consistent with numerical results. The order of its computational cost is equivalent to that of standard LBP. In the latter part of this paper, we describe the application of the proposed method to Bayesian image restoration, in which we observed that our theoretical results are in good agreement with the numerical results for natural images.

  20. Message-passing-interface-based parallel FDTD investigation on the EM scattering from a 1-D rough sea surface using uniaxial perfectly matched layer absorbing boundary.

    PubMed

    Li, J; Guo, L-X; Zeng, H; Han, X-B

    2009-06-01

    A message-passing-interface (MPI)-based parallel finite-difference time-domain (FDTD) algorithm for the electromagnetic scattering from a 1-D randomly rough sea surface is presented. The uniaxial perfectly matched layer (UPML) medium is adopted for truncation of FDTD lattices, in which the finite-difference equations can be used for the total computation domain by properly choosing the uniaxial parameters. This makes the parallel FDTD algorithm easier to implement. The parallel performance with different processors is illustrated for one sea surface realization, and the computation time of the parallel FDTD algorithm is dramatically reduced compared to a single-process implementation. Finally, some numerical results are shown, including the backscattering characteristics of sea surface for different polarization and the bistatic scattering from a sea surface with large incident angle and large wind speed.

  1. Extensions to the Parallel Real-Time Artificial Intelligence System (PRAIS) for fault-tolerant heterogeneous cycle-stealing reasoning

    NASA Technical Reports Server (NTRS)

    Goldstein, David

    1991-01-01

    Extensions to an architecture for real-time, distributed (parallel) knowledge-based systems called the Parallel Real-time Artificial Intelligence System (PRAIS) are discussed. PRAIS strives for transparently parallelizing production (rule-based) systems, even under real-time constraints. PRAIS accomplished these goals (presented at the first annual C Language Integrated Production System (CLIPS) conference) by incorporating a dynamic task scheduler, operating system extensions for fact handling, and message-passing among multiple copies of CLIPS executing on a virtual blackboard. This distributed knowledge-based system tool uses the portability of CLIPS and common message-passing protocols to operate over a heterogeneous network of processors. Results using the original PRAIS architecture over a network of Sun 3's, Sun 4's and VAX's are presented. Mechanisms using the producer-consumer model to extend the architecture for fault-tolerance and distributed truth maintenance initiation are also discussed.

  2. How to pass exams on the run.

    PubMed

    Atkinson, J

    1988-09-17

    Yes, dear friends of my youth, it is I - he who left school with two 'O' levels, o music CSE [Illegible Word] a budgerigar; consolidating this by failing his SRN three times, finally getting on the only refresher course in England and passing in October 1979- the very last occasion to take an SRN for the fourth time. Have I got a cheek to write about passing exams? These experiences hove had their effect! I come to academic life late and have developed a hectic domestic, social and professional life meanwhile.

  3. The Vigenere Cipher with the TI-83

    ERIC Educational Resources Information Center

    Hamilton, Michael; Yankosky, Bill

    2004-01-01

    Cryptology, the science of secret writing, is a great way to introduce students to different areas of mathematics such as number theory, linear algebra, probability and statistics. Cryptology consists of two branches: cryptography and cryptanalysis. Cryptography is the science of designing techniques for encrypting and decrypting a message.…

  4. Steganography and Cryptography Inspired Enhancement of Introductory Programming Courses

    ERIC Educational Resources Information Center

    Kortsarts, Yana; Kempner, Yulia

    2015-01-01

    Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…

  5. The Book Trailer Project: Media Production within an Integrated Classroom

    ERIC Educational Resources Information Center

    Festa, Karen

    2017-01-01

    A special education co-teacher in an integrated elementary classroom describes key aspects of media literacy pedagogy for all students, including opportunities for critical analysis and creative media production. After elementary school students learned about author's craft, purpose, theme/message, three types of writing, and target audience, they…

  6. The Case for Slow Reading

    ERIC Educational Resources Information Center

    Newkirk, Thomas

    2010-01-01

    To truly comprehend and appreciate texts, we need to read more slowly. Schools should provide a counterbalance to our increasingly hectic digital environment, where so many of us read and write in abbreviated messages and through clicks of the mouse. To help students reclaim the acoustical properties of written language and appreciate the passages…

  7. Messages to Gail

    ERIC Educational Resources Information Center

    Selfe, Cindy, Ed.

    2012-01-01

    At the Computers and Writing 2011 Conference in Ann Arbor, Michigan, Gail E. Hawisher was celebrated for her many contributions to the field. At that conference, Hawisher gave a keynote address entitled "Our Work in the Profession: The Here and Now of the Future." This video publication includes contributions from scholars who wanted to share…

  8. The Mythology of Schooling: The Historiography of American and European Education in Comparative Perspective

    ERIC Educational Resources Information Center

    Kelly, Matthew Gardner

    2014-01-01

    This essay explores the historiography of American and European education, considering how educational historians communicate powerful messages about the purposes and promises of schooling through their writing. I divide the historiography of American education into four interpretive traditions: traditionalism, radical revisionism, progressive…

  9. Language Arts in the Science Curriculum.

    ERIC Educational Resources Information Center

    Ediger, Marlow

    Language arts experiences integrate well with quality science lessons and units of study. For example, there are many opportunities for listening, speaking, reading, and writing activities in science. Ideas gleaned in science need to be communicated in diverse ways involving one or more senders and receivers of messages. Students may read about…

  10. Historicity, The Television Critic, and the Third World Scholar.

    ERIC Educational Resources Information Center

    Oseguera, A. Anthony

    The communication technologies of television and common carriers have an important correlativity to message formation, due to their ability to bring the public information at lightning speed. Historicity, the science of writing history, can be used by the television critic in order to critique national and international broadcasting. Blacks,…

  11. A Philosophy of Jewish Education in Question Marks: A Possible Reading of Michael Rosenak's Last Speech

    ERIC Educational Resources Information Center

    Rosenak, Avinoam

    2014-01-01

    Writing this article presents me with an opportunity to look closely at the last speech that my father and mentor, Professor Michael (Mike) Rosenak z"l gave before his passing in 2013. I will write about this speech from a perspective that is based on my intimate familiarity with the questions that concerned him throughout his life. I will…

  12. Message passing with queues and channels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dozsa, Gabor J; Heidelberger, Philip; Kumar, Sameer

    In an embodiment, a send thread receives an identifier that identifies a destination node and a pointer to data. The send thread creates a first send request in response to the receipt of the identifier and the data pointer. The send thread selects a selected channel from among a plurality of channels. The selected channel comprises a selected hand-off queue and an identification of a selected message unit. Each of the channels identifies a different message unit. The selected hand-off queue is randomly accessible. If the selected hand-off queue contains an available entry, the send thread adds the first sendmore » request to the selected hand-off queue. If the selected hand-off queue does not contain an available entry, the send thread removes a second send request from the selected hand-off queue and sends the second send request to the selected message unit.« less

  13. Scalable Optical-Fiber Communication Networks

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Peterson, John C.

    1993-01-01

    Scalable arbitrary fiber extension network (SAFEnet) is conceptual fiber-optic communication network passing digital signals among variety of computers and input/output devices at rates from 200 Mb/s to more than 100 Gb/s. Intended for use with very-high-speed computers and other data-processing and communication systems in which message-passing delays must be kept short. Inherent flexibility makes it possible to match performance of network to computers by optimizing configuration of interconnections. In addition, interconnections made redundant to provide tolerance to faults.

  14. Domestic Minor Sex Trafficking Deterrence and Victims Support Act of 2010

    THOMAS, 111th Congress

    Sen. Wyden, Ron [D-OR

    2009-12-22

    Senate - 12/21/2010 Message on House action received in Senate and at desk: House amendment to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  15. Savage Exaggerations: Worshiping the Cosmology of Jonathan Kozol

    ERIC Educational Resources Information Center

    Winters, Marcus A.

    2006-01-01

    Jonathan Kozol has made a good living talking with students. His books chronicle travels among poor, minority children, most of them African Americans in struggling public schools. In the four decades that Kozol, now 70, has been writing books--11 so far--his message has hardly wavered: minority children are unsuccessful because rich, white…

  16. 77 FR 55183 - Effects of Foreign Policy-Based Export Controls

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-07

    ... or on paper to Regulatory Policy Division, Bureau of Industry and Security, Department of Commerce... Comment'' in the subject line of the email message or on the envelope if submitting comments on paper. All comments must be in writing (either submitted to regulations.gov , by email or on paper). All comments...

  17. What Works for Me

    ERIC Educational Resources Information Center

    DuPre, Carrie; Erickson, Samm; Diguette, Richard; Bobkoff, Michael; Ratliff, Gerald Lee; Dirk, Kerry

    2008-01-01

    This article presents the techniques used by six teachers for their writing classes. To help her students get their topics on paper, Carrie DuPre instructs her students to call themselves on their cellphones and leave themselves a message on voice mail. Samm Erickson asks his students with laptops to be "the researchers" in their literature class.…

  18. Academic Dishonesty: Behaviors, Sanctions, and Retention of Adjudicated College Students

    ERIC Educational Resources Information Center

    Olafson, Lori; Schraw, Gregory; Kehrwald, Nicholas

    2014-01-01

    Academic dishonesty, also known as academic misconduct, includes a variety of actions such as plagiarism, cheating on tests using text messaging or concealed notes, exchanging work with other students, buying essays from students or on the Internet, and having other students write examinations (Diekhoff, LaBeff, Shinohara, & Yasukawa, 1999;…

  19. Child Sexual Abuse in Early-Childhood Care and Education Settings

    ERIC Educational Resources Information Center

    Briggs, Freda

    2014-01-01

    When the author was adviser to the Australian Minister for Education for writing the national Safe Schools Framework (2003), meetings were held with early-childhood care and education administrators from all state, Catholic and independent sectors. Their unexpected message was that educators were facing new problems, those of child sexual abuse in…

  20. Inside the College Writing Gap: Exploring the Mixed Messages of Remediation Support

    ERIC Educational Resources Information Center

    Relles, Stefani R.; Duncheon, Julia C.

    2018-01-01

    This case study offers a qualitative perspective on a relationship between institutional structures and student outcomes. The data describe the conditions in 10 English remediation classrooms at one urban community college district. The study uses new literacies as a theoretical framework with which to understand how these conditions supported…

  1. Addressing Poverty Issues in Christian Schools: Teachers' Perspectives

    ERIC Educational Resources Information Center

    Bankston, Catherine

    2015-01-01

    The purpose of Christian education is to incorporate Biblical values in the curriculum, and one essential message in the Bible is to reach out and liberate the poor. Through interviews, writing protocols, a focus group meeting, and document analysis, this narrative study focuses on the question of how do Christian educators create pedagogical…

  2. Chaos synchronization communication using extremely unsymmetrical bidirectional injections.

    PubMed

    Zhang, Wei Li; Pan, Wei; Luo, Bin; Zou, Xi Hua; Wang, Meng Yao; Zhou, Zhi

    2008-02-01

    Chaos synchronization and message transmission between two semiconductor lasers with extremely unsymmetrical bidirectional injections (EUBIs) are discussed. By using EUBIs, synchronization is realized through injection locking. Numerical results show that if the laser subjected to strong injection serves as the receiver, chaos pass filtering (CPF) of the system is similar to that of unidirectional coupled systems. Moreover, if the other laser serves as the receiver, a stronger CPF can be obtained. Finally, we demonstrate that messages can be extracted successfully from either of the two transmission directions of the system.

  3. Automation Framework for Flight Dynamics Products Generation

    NASA Technical Reports Server (NTRS)

    Wiegand, Robert E.; Esposito, Timothy C.; Watson, John S.; Jun, Linda; Shoan, Wendy; Matusow, Carla

    2010-01-01

    XFDS provides an easily adaptable automation platform. To date it has been used to support flight dynamics operations. It coordinates the execution of other applications such as Satellite TookKit, FreeFlyer, MATLAB, and Perl code. It provides a mechanism for passing messages among a collection of XFDS processes, and allows sending and receiving of GMSEC messages. A unified and consistent graphical user interface (GUI) is used for the various tools. Its automation configuration is stored in text files, and can be edited either directly or using the GUI.

  4. Recognizing References to Physical Places Inside Short Texts by Using Patterns as a Sequence of Grammatical Categories

    NASA Astrophysics Data System (ADS)

    Romero, A.; Sol, D.

    2017-09-01

    Collecting data by crowdsourcing is an explored trend to support database population and update. This kind of data is unstructured and comes from text, in particular text in social networks. Geographic database is a particular case of database that can be populated by crowdsourcing which can be done when people report some urban event in a social network by writing a short message. An event can describe an accident or a non-functioning device in the urban area. The authorities then need to read and to interpret the message to provide some help for injured people or to fix a problem in a device installed in the urban area like a light or a problem on road. Our main interest is located on working with short messages organized in a collection. Most of the messages do not have geographical coordinates. The messages can then be classified by text patterns describing a location. In fact, people use a text pattern to describe an urban location. Our work tries to identify patterns inside a short text and to indicate when it describes a location. When a pattern is identified our approach look to describe the place where the event is located. The source messages used are tweets reporting events from several Mexican cities.

  5. Art messaging to engage homeless young adults.

    PubMed

    Nyamathi, Adeline; Slagle, Alexandra; Thomas, Alexandra; Hudson, Angela; Kahilifard, Farinaz; Avila, Glenna; Orser, Julie; Cuchilla, Manuel

    2011-01-01

    Art has been shown to be an empowering and engaging entity with numerous benefits to vulnerable populations, including the homeless persons and young adults. However, little is known how homeless young adults perceive the use of art as messages that can communicate the danger of initiating or continuing drug and alcohol use. The purpose of this study was to solicit perspectives of homeless, drug-using young adults as to how art can be used to design messages for their peers about the danger of initiating or continuing drug and alcohol use. Qualitative methodology via focus group discussions was utilized to engage 24 homeless young adults enrolled from a drop-in site in Santa Monica, California. The findings revealed support for a myriad of delivery styles, including in-person communication, flyers, music, documentary film, and creative writing. The young adults also provided insight into the importance of the thematic framework of messages. Such themes ranged from empowering and hopeful messages to those designed to scare young homeless adults into not experimenting with drugs. The findings indicate that in addition to messages communicating the need to prevent or reduce drug and alcohol use, homeless young adults respond to messages that remind them of goals and dreams they once had for their future, and to content that is personal, real, and truthful. Our research indicates that messages that reinforce protective factors such as hope for the future and self-esteem may be as important to homeless young adults as information about the risks and consequences of drug use.

  6. Disaster Relief Appropriations Act, 2013

    THOMAS, 112th Congress

    Rep. Rogers, Harold [R-KY-5

    2011-02-11

    Senate - 12/30/2012 Message on Senate action sent to the House. (All Actions) Notes: This bill was for a time the Senate legislative vehicle for Hurricane Sandy supplemental appropriations. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  7. Writing on wet paper

    NASA Astrophysics Data System (ADS)

    Fridrich, Jessica; Goljan, Miroslav; Lisonek, Petr; Soukal, David

    2005-03-01

    In this paper, we show that the communication channel known as writing in memory with defective cells is a relevant information-theoretical model for a specific case of passive warden steganography when the sender embeds a secret message into a subset C of the cover object X without sharing the selection channel C with the recipient. The set C could be arbitrary, determined by the sender from the cover object using a deterministic, pseudo-random, or a truly random process. We call this steganography "writing on wet paper" and realize it using low-density random linear codes with the encoding step based on the LT process. The importance of writing on wet paper for covert communication is discussed within the context of adaptive steganography and perturbed quantization steganography. Heuristic arguments supported by tests using blind steganalysis indicate that the wet paper steganography provides improved steganographic security for embedding in JPEG images and is less vulnerable to attacks when compared to existing methods with shared selection channels.

  8. Interactive Supercomputing’s Star-P Platform

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Edelman, Alan; Husbands, Parry; Leibman, Steve

    2006-09-19

    The thesis of this extended abstract is simple. High productivity comes from high level infrastructures. To measure this, we introduce a methodology that goes beyond the tradition of timing software in serial and tuned parallel modes. We perform a classroom productivity study involving 29 students who have written a homework exercise in a low level language (MPI message passing) and a high level language (Star-P with MATLAB client). Our conclusions indicate what perhaps should be of little surprise: (1) the high level language is always far easier on the students than the low level language. (2) The early versions ofmore » the high level language perform inadequately compared to the tuned low level language, but later versions substantially catch up. Asymptotically, the analogy must hold that message passing is to high level language parallel programming as assembler is to high level environments such as MATLAB, Mathematica, Maple, or even Python. We follow the Kepner method that correctly realizes that traditional speedup numbers without some discussion of the human cost of reaching these numbers can fail to reflect the true human productivity cost of high performance computing. Traditional data compares low level message passing with serial computation. With the benefit of a high level language system in place, in our case Star-P running with MATLAB client, and with the benefit of a large data pool: 29 students, each running the same code ten times on three evolutions of the same platform, we can methodically demonstrate the productivity gains. To date we are not aware of any high level system as extensive and interoperable as Star-P, nor are we aware of an experiment of this kind performed with this volume of data.« less

  9. Combining Distributed and Shared Memory Models: Approach and Evolution of the Global Arrays Toolkit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nieplocha, Jarek; Harrison, Robert J.; Kumar, Mukul

    2002-07-29

    Both shared memory and distributed memory models have advantages and shortcomings. Shared memory model is much easier to use but it ignores data locality/placement. Given the hierarchical nature of the memory subsystems in the modern computers this characteristic might have a negative impact on performance and scalability. Various techniques, such as code restructuring to increase data reuse and introducing blocking in data accesses, can address the problem and yield performance competitive with message passing[Singh], however at the cost of compromising the ease of use feature. Distributed memory models such as message passing or one-sided communication offer performance and scalability butmore » they compromise the ease-of-use. In this context, the message-passing model is sometimes referred to as?assembly programming for the scientific computing?. The Global Arrays toolkit[GA1, GA2] attempts to offer the best features of both models. It implements a shared-memory programming model in which data locality is managed explicitly by the programmer. This management is achieved by explicit calls to functions that transfer data between a global address space (a distributed array) and local storage. In this respect, the GA model has similarities to the distributed shared-memory models that provide an explicit acquire/release protocol. However, the GA model acknowledges that remote data is slower to access than local data and allows data locality to be explicitly specified and hence managed. The GA model exposes to the programmer the hierarchical memory of modern high-performance computer systems, and by recognizing the communication overhead for remote data transfer, it promotes data reuse and locality of reference. This paper describes the characteristics of the Global Arrays programming model, capabilities of the toolkit, and discusses its evolution.« less

  10. Performance Measurement, Visualization and Modeling of Parallel and Distributed Programs

    NASA Technical Reports Server (NTRS)

    Yan, Jerry C.; Sarukkai, Sekhar R.; Mehra, Pankaj; Lum, Henry, Jr. (Technical Monitor)

    1994-01-01

    This paper presents a methodology for debugging the performance of message-passing programs on both tightly coupled and loosely coupled distributed-memory machines. The AIMS (Automated Instrumentation and Monitoring System) toolkit, a suite of software tools for measurement and analysis of performance, is introduced and its application illustrated using several benchmark programs drawn from the field of computational fluid dynamics. AIMS includes (i) Xinstrument, a powerful source-code instrumentor, which supports both Fortran77 and C as well as a number of different message-passing libraries including Intel's NX Thinking Machines' CMMD, and PVM; (ii) Monitor, a library of timestamping and trace -collection routines that run on supercomputers (such as Intel's iPSC/860, Delta, and Paragon and Thinking Machines' CM5) as well as on networks of workstations (including Convex Cluster and SparcStations connected by a LAN); (iii) Visualization Kernel, a trace-animation facility that supports source-code clickback, simultaneous visualization of computation and communication patterns, as well as analysis of data movements; (iv) Statistics Kernel, an advanced profiling facility, that associates a variety of performance data with various syntactic components of a parallel program; (v) Index Kernel, a diagnostic tool that helps pinpoint performance bottlenecks through the use of abstract indices; (vi) Modeling Kernel, a facility for automated modeling of message-passing programs that supports both simulation -based and analytical approaches to performance prediction and scalability analysis; (vii) Intrusion Compensator, a utility for recovering true performance from observed performance by removing the overheads of monitoring and their effects on the communication pattern of the program; and (viii) Compatibility Tools, that convert AIMS-generated traces into formats used by other performance-visualization tools, such as ParaGraph, Pablo, and certain AVS/Explorer modules.

  11. Applications Performance Under MPL and MPI on NAS IBM SP2

    NASA Technical Reports Server (NTRS)

    Saini, Subhash; Simon, Horst D.; Lasinski, T. A. (Technical Monitor)

    1994-01-01

    On July 5, 1994, an IBM Scalable POWER parallel System (IBM SP2) with 64 nodes, was installed at the Numerical Aerodynamic Simulation (NAS) Facility Each node of NAS IBM SP2 is a "wide node" consisting of a RISC 6000/590 workstation module with a clock of 66.5 MHz which can perform four floating point operations per clock with a peak performance of 266 Mflop/s. By the end of 1994, 64 nodes of IBM SP2 will be upgraded to 160 nodes with a peak performance of 42.5 Gflop/s. An overview of the IBM SP2 hardware is presented. The basic understanding of architectural details of RS 6000/590 will help application scientists the porting, optimizing, and tuning of codes from other machines such as the CRAY C90 and the Paragon to the NAS SP2. Optimization techniques such as quad-word loading, effective utilization of two floating point units, and data cache optimization of RS 6000/590 is illustrated, with examples giving performance gains at each optimization step. The conversion of codes using Intel's message passing library NX to codes using native Message Passing Library (MPL) and the Message Passing Interface (NMI) library available on the IBM SP2 is illustrated. In particular, we will present the performance of Fast Fourier Transform (FFT) kernel from NAS Parallel Benchmarks (NPB) under MPL and MPI. We have also optimized some of Fortran BLAS 2 and BLAS 3 routines, e.g., the optimized Fortran DAXPY runs at 175 Mflop/s and optimized Fortran DGEMM runs at 230 Mflop/s per node. The performance of the NPB (Class B) on the IBM SP2 is compared with the CRAY C90, Intel Paragon, TMC CM-5E, and the CRAY T3D.

  12. Parallelization of a hydrological model using the message passing interface

    USGS Publications Warehouse

    Wu, Yiping; Li, Tiejian; Sun, Liqun; Chen, Ji

    2013-01-01

    With the increasing knowledge about the natural processes, hydrological models such as the Soil and Water Assessment Tool (SWAT) are becoming larger and more complex with increasing computation time. Additionally, other procedures such as model calibration, which may require thousands of model iterations, can increase running time and thus further reduce rapid modeling and analysis. Using the widely-applied SWAT as an example, this study demonstrates how to parallelize a serial hydrological model in a Windows® environment using a parallel programing technology—Message Passing Interface (MPI). With a case study, we derived the optimal values for the two parameters (the number of processes and the corresponding percentage of work to be distributed to the master process) of the parallel SWAT (P-SWAT) on an ordinary personal computer and a work station. Our study indicates that model execution time can be reduced by 42%–70% (or a speedup of 1.74–3.36) using multiple processes (two to five) with a proper task-distribution scheme (between the master and slave processes). Although the computation time cost becomes lower with an increasing number of processes (from two to five), this enhancement becomes less due to the accompanied increase in demand for message passing procedures between the master and all slave processes. Our case study demonstrates that the P-SWAT with a five-process run may reach the maximum speedup, and the performance can be quite stable (fairly independent of a project size). Overall, the P-SWAT can help reduce the computation time substantially for an individual model run, manual and automatic calibration procedures, and optimization of best management practices. In particular, the parallelization method we used and the scheme for deriving the optimal parameters in this study can be valuable and easily applied to other hydrological or environmental models.

  13. A Comparison of PETSC Library and HPF Implementations of an Archetypal PDE Computation

    NASA Technical Reports Server (NTRS)

    Hayder, M. Ehtesham; Keyes, David E.; Mehrotra, Piyush

    1997-01-01

    Two paradigms for distributed-memory parallel computation that free the application programmer from the details of message passing are compared for an archetypal structured scientific computation a nonlinear, structured-grid partial differential equation boundary value problem using the same algorithm on the same hardware. Both paradigms, parallel libraries represented by Argonne's PETSC, and parallel languages represented by the Portland Group's HPF, are found to be easy to use for this problem class, and both are reasonably effective in exploiting concurrency after a short learning curve. The level of involvement required by the application programmer under either paradigm includes specification of the data partitioning (corresponding to a geometrically simple decomposition of the domain of the PDE). Programming in SPAM style for the PETSC library requires writing the routines that discretize the PDE and its Jacobian, managing subdomain-to-processor mappings (affine global- to-local index mappings), and interfacing to library solver routines. Programming for HPF requires a complete sequential implementation of the same algorithm, introducing concurrency through subdomain blocking (an effort similar to the index mapping), and modest experimentation with rewriting loops to elucidate to the compiler the latent concurrency. Correctness and scalability are cross-validated on up to 32 nodes of an IBM SP2.

  14. Enabling Energy Saving Innovations Act

    THOMAS, 112th Congress

    Rep. Aderholt, Robert B. [R-AL-4

    2012-04-26

    Senate - 09/24/2012 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.6582, which became Public Law 112-210 on 12/18/2012. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  15. A Model for Speedup of Parallel Programs

    DTIC Science & Technology

    1997-01-01

    Sanjeev. K Setia . The interaction between mem- ory allocation and adaptive partitioning in message- passing multicomputers. In IPPS 󈨣 Workshop on Job...Scheduling Strategies for Parallel Processing, pages 89{99, 1995. [15] Sanjeev K. Setia and Satish K. Tripathi. A compar- ative analysis of static

  16. Interstate Recognition of Notarizations Act of 2010

    THOMAS, 111th Congress

    Rep. Aderholt, Robert B. [R-AL-4

    2009-10-14

    House - 11/17/2010 On motion to refer the bill and the accompanying veto message to the Committee on the Judiciary. Agreed to without objection. (All Actions) Tracker: This bill has the status Failed to pass over vetoHere are the steps for Status of Legislation:

  17. Communication Studies of DMP and SMP Machines

    NASA Technical Reports Server (NTRS)

    Sohn, Andrew; Biswas, Rupak; Chancellor, Marisa K. (Technical Monitor)

    1997-01-01

    Understanding the interplay between machines and problems is key to obtaining high performance on parallel machines. This paper investigates the interplay between programming paradigms and communication capabilities of parallel machines. In particular, we explicate the communication capabilities of the IBM SP-2 distributed-memory multiprocessor and the SGI PowerCHALLENGEarray symmetric multiprocessor. Two benchmark problems of bitonic sorting and Fast Fourier Transform are selected for experiments. Communication-efficient algorithms are developed to exploit the overlapping capabilities of the machines. Programs are written in Message-Passing Interface for portability and identical codes are used for both machines. Various data sizes and message sizes are used to test the machines' communication capabilities. Experimental results indicate that the communication performance of the multiprocessors are consistent with the size of messages. The SP-2 is sensitive to message size but yields a much higher communication overlapping because of the communication co-processor. The PowerCHALLENGEarray is not highly sensitive to message size and yields a low communication overlapping. Bitonic sorting yields lower performance compared to FFT due to a smaller computation-to-communication ratio.

  18. Approximate message passing for nonconvex sparse regularization with stability and asymptotic analysis

    NASA Astrophysics Data System (ADS)

    Sakata, Ayaka; Xu, Yingying

    2018-03-01

    We analyse a linear regression problem with nonconvex regularization called smoothly clipped absolute deviation (SCAD) under an overcomplete Gaussian basis for Gaussian random data. We propose an approximate message passing (AMP) algorithm considering nonconvex regularization, namely SCAD-AMP, and analytically show that the stability condition corresponds to the de Almeida-Thouless condition in spin glass literature. Through asymptotic analysis, we show the correspondence between the density evolution of SCAD-AMP and the replica symmetric (RS) solution. Numerical experiments confirm that for a sufficiently large system size, SCAD-AMP achieves the optimal performance predicted by the replica method. Through replica analysis, a phase transition between replica symmetric and replica symmetry breaking (RSB) region is found in the parameter space of SCAD. The appearance of the RS region for a nonconvex penalty is a significant advantage that indicates the region of smooth landscape of the optimization problem. Furthermore, we analytically show that the statistical representation performance of the SCAD penalty is better than that of \

  19. Message passing for integrating and assessing renewable generation in a redundant power grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zdeborova, Lenka; Backhaus, Scott; Chertkov, Michael

    2009-01-01

    A simplified model of a redundant power grid is used to study integration of fluctuating renewable generation. The grid consists of large number of generator and consumer nodes. The net power consumption is determined by the difference between the gross consumption and the level of renewable generation. The gross consumption is drawn from a narrow distribution representing the predictability of aggregated loads, and we consider two different distributions representing wind and solar resources. Each generator is connected to D consumers, and redundancy is built in by connecting R {le} D of these consumers to other generators. The lines are switchablemore » so that at any instance each consumer is connected to a single generator. We explore the capacity of the renewable generation by determining the level of 'firm' generation capacity that can be displaced for different levels of redundancy R. We also develop message-passing control algorithm for finding switch sellings where no generator is overloaded.« less

  20. Mapping a battlefield simulation onto message-passing parallel architectures

    NASA Technical Reports Server (NTRS)

    Nicol, David M.

    1987-01-01

    Perhaps the most critical problem in distributed simulation is that of mapping: without an effective mapping of workload to processors the speedup potential of parallel processing cannot be realized. Mapping a simulation onto a message-passing architecture is especially difficult when the computational workload dynamically changes as a function of time and space; this is exactly the situation faced by battlefield simulations. This paper studies an approach where the simulated battlefield domain is first partitioned into many regions of equal size; typically there are more regions than processors. The regions are then assigned to processors; a processor is responsible for performing all simulation activity associated with the regions. The assignment algorithm is quite simple and attempts to balance load by exploiting locality of workload intensity. The performance of this technique is studied on a simple battlefield simulation implemented on the Flex/32 multiprocessor. Measurements show that the proposed method achieves reasonable processor efficiencies. Furthermore, the method shows promise for use in dynamic remapping of the simulation.

  1. Spread spectrum image steganography.

    PubMed

    Marvel, L M; Boncelet, C R; Retter, C T

    1999-01-01

    In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

  2. Effects of Instruction on Chinese College Students' Thematic Choice in Academic Writing

    ERIC Educational Resources Information Center

    Wei, Jing

    2016-01-01

    The Theme is a major aspect of how speakers construct their messages in a way which makes them fit smoothly into the unfolding language event. Thematic choice provides clues as to how English learners organize information and shape their texts. Previous studies reveal that English learners deviated from English native speakers in their thematic…

  3. Mixed Messages and Missed Opportunities: Moments of Transformation in Writing Conferences and Teacher Education.

    ERIC Educational Resources Information Center

    Denyer, Jenny; Florio-Ruane, Susan

    1995-01-01

    Describes challenges for teacher educators who want to help students move beyond talk about text that recalls facts to talk that supports interpretation and crafting of text. A case study describes how one teacher candidate struggled to reconcile what she thought teaching was with new ways of talking about text. (SM)

  4. Exploring the Relationships between the Use of Text Message Language and the Literacy Skills of Dyslexic and Normal Students

    ERIC Educational Resources Information Center

    Hsu, Jung-Lung

    2013-01-01

    It is apparent that individuals using text abbreviations as a written convention is a continuingly growing phenomenon. This special writing convention has been referred to as textism usage. However, there is surprisingly little research investigating the impacts of textism use on dyslexic children's cognitive abilities associated with literacy…

  5. Exploring the Relationship between EFL College Students' Multimodal Literacy Practices and Identity on Academic Language Use

    ERIC Educational Resources Information Center

    Wu, Hsiao-Ping

    2011-01-01

    The study investigates whether the informal interactive written discourse in instant messaging (IM) is permeating the more formal writing of English-as-a-foreign-language (EFL) college students, and how students' identities are constructed in terms of English multiliteracies in Taiwan. The study is designed as a qualitative case study. The…

  6. Writing as Problem-Solving in Interdisciplinary Programs: Literature and the Age of Technology.

    ERIC Educational Resources Information Center

    Gershuny, H. Lee; Rosich, Daniel

    A proposed interdisciplinary course linking the areas of English and data processing is described in this paper. Expertise in both fields is perceived as a function of the processes of defining, recreating metaphors and models, locating assumptions within messages, and becoming aware of meaning. Potential enrollees include both students in the…

  7. Kingman and Heritage Islands Act of 2009

    THOMAS, 111th Congress

    Rep. Norton, Eleanor Holmes [D-DC-At Large

    2009-04-23

    Senate - 09/28/2010 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.6278, which became Public Law 111-328 on 12/22/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  8. Distance Learning and Public School Finance.

    ERIC Educational Resources Information Center

    Monahan, Brian; Wimber, Charles

    This discussion of the application of computers and telecommunications technology to distance learning begins by describing a workstation equipped to produce "lessonware" in such formats as audiocassettes, videocassettes, diskettes, and voice messages. Such workstations would be located in classrooms equipped with two-way reverse passes to a cable…

  9. Reducing Flight Delays Act of 2013

    THOMAS, 113th Congress

    Sen. Collins, Susan M. [R-ME

    2013-04-25

    Senate - 04/30/2013 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.1765, which became Public Law 113-9 on 5/1/2013. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  10. Temporary Bankruptcy Judgeships Extension Act of 2011

    THOMAS, 112th Congress

    Rep. Smith, Lamar [R-TX-21

    2011-03-10

    Senate - 04/23/2012 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.4967, which became Public Law 112-121 on 5/25/2012. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  11. Six degrees of depolarization. Comment on "Network science of biological systems at different scales: A review" by Marko Gosak et al.

    NASA Astrophysics Data System (ADS)

    Wedgwood, Kyle C. A.; Satin, Leslie S.

    2018-03-01

    In 1967, the social psychologist Stanley Milgram asked how many intermediates would be required for a letter from participants in various U.S. states to be received by a contact in Boston, given that participants were given only basic information about the contact, and were instructed only to pass along the message to someone that might know the intended recipient [27]. The surprising answer was that, in spite of the social and geographical distances covered, on average, only 6 people were required for the message to reach its intended target.

  12. A distributed infrastructure for publishing VO services: an implementation

    NASA Astrophysics Data System (ADS)

    Cepparo, Francesco; Scagnetto, Ivan; Molinaro, Marco; Smareglia, Riccardo

    2016-07-01

    This contribution describes both the design and the implementation details of a new solution for publishing VO services, enlightening its maintainable, distributed, modular and scalable architecture. Indeed, the new publisher is multithreaded and multiprocess. Multiple instances of the modules can run on different machines to ensure high performance and high availability, and this will be true both for the interface modules of the services and the back end data access ones. The system uses message passing to let its components communicate through an AMQP message broker that can itself be distributed to provide better scalability and availability.

  13. Driver distraction in an unusual environment: Effects of text-messaging in tunnels.

    PubMed

    Rudin-Brown, Christina M; Young, Kristie L; Patten, Christopher; Lenné, Michael G; Ceci, Ruggero

    2013-01-01

    Text messaging while driving can be distracting and significantly increases the risk of being involved in a collision. Compared to freeway driving, driving in a tunnel environment introduces factors that may interact with driver attentional resources to exacerbate the effects of distraction on driving safety. With planning and design of the 18km Stockholm Bypass tunnel ongoing, and because of the potentially devastating consequences of crashes in long tunnels, it is critical to assess the effects of driver distraction in a tunnel environment. Twenty-four participants (25-50 years) drove in simulated highway and tunnel road environments while reading and writing text messages using their own mobile phones. As expected, compared to driving alone, text messaging was associated with decrements in driving performance and visual scanning behavior, and increases in subjective workload. Speeds were slower compared to baseline (no text-messaging) driving when participants performed the text-messaging tasks in the tunnel environment compared to the freeway, suggesting that drivers may have attempted to compensate more for the increased text-messaging-related workload when they were in the tunnel. On the other hand, increases in lane deviation associated with the most complex text-messaging task were more pronounced in the tunnel compared to on the freeway. Collectively, results imply that driver distraction in tunnels is associated with generally similar driving decrements as freeway driving; however, the potential consequences of these decrements in tunnels remain significantly more serious. Future research should attempt to elucidate the nature of any differential compensatory behavior in tunnel, compared to freeway, driving. In the meantime, drivers should be advised to refrain from text messaging, especially when driving in tunnels. Copyright © 2012 Elsevier Ltd. All rights reserved.

  14. The therapeutic value of adolescents' blogging about social-emotional difficulties.

    PubMed

    Boniel-Nissim, Meyran; Barak, Azy

    2013-08-01

    Research shows that writing a personal diary is a valuable therapeutic means for relieving emotional distress and promoting well-being, and that diary writing during adolescence helps in coping with developmental challenges. Current technologies and cultural trends make it possible and normative to publish personal diaries on the Internet through blogs--interactive, online forms of the traditional personal diary. We examined the therapeutic value of blogging for adolescents who experience social-emotional difficulties. The field experiment included randomly assigned adolescents, preassessed as having social-emotional difficulties, to 6 groups (26-28 participants in each): Four groups were assigned to blogging (writing about their difficulties or free writing; either open or closed to responses), a group assigned to writing a diary on personal computers, and a no-treatment control group. Participants in the 5 writing groups were instructed to post messages at least twice a week over 10 weeks. Outcome measures included scales of social-emotional difficulties and self-esteem, a social activities checklist, and textual analyses of participants' posts. Measurement took place at pre- and postintervention and at follow-up 2 months later. Results showed that participants maintaining a blog significantly improved on all measures. Participants writing about their difficulties in blogs open to responses gained the most. These results were consistent in the follow-up evaluation. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  15. Nursing problem-based learning activity: song writing and singing.

    PubMed

    Chan, Zenobia C Y

    2014-08-01

    The function of song is not only to deliver individual's messages, but also to serve as a learning approach to facilitate students' learning. To observe the effectiveness of songs in facilitating students' learning, a Problem-based Learning (PBL) class with twenty students was divided into four groups with five students per group. Each group was asked to write a song based on two given scenarios, to sing the song out loud, and to participate in a follow-up focus group interview afterwards. The four songs reflected the students' understanding of academic knowledge and their perspectives toward the protagonists in the presented scenarios. Two songs are presented in this paper to demonstrate how the approach was carried out in the nursing PBL class. This paper aims to show the implication of song writing and singing in PBL and shed some light on teaching and learning. Copyright © 2014 Elsevier Ltd. All rights reserved.

  16. WinHPC System Programming | High-Performance Computing | NREL

    Science.gov Websites

    Programming WinHPC System Programming Learn how to build and run an MPI (message passing interface (mpi.h) and library (msmpi.lib) are. To build from the command line, run... Start > Intel Software Development Tools > Intel C++ Compiler Professional... > C++ Build Environment for applications running

  17. Implementing the PM Programming Language using MPI and OpenMP - a New Tool for Programming Geophysical Models on Parallel Systems

    NASA Astrophysics Data System (ADS)

    Bellerby, Tim

    2015-04-01

    PM (Parallel Models) is a new parallel programming language specifically designed for writing environmental and geophysical models. The language is intended to enable implementers to concentrate on the science behind the model rather than the details of running on parallel hardware. At the same time PM leaves the programmer in control - all parallelisation is explicit and the parallel structure of any given program may be deduced directly from the code. This paper describes a PM implementation based on the Message Passing Interface (MPI) and Open Multi-Processing (OpenMP) standards, looking at issues involved with translating the PM parallelisation model to MPI/OpenMP protocols and considering performance in terms of the competing factors of finer-grained parallelisation and increased communication overhead. In order to maximise portability, the implementation stays within the MPI 1.3 standard as much as possible, with MPI-2 MPI-IO file handling the only significant exception. Moreover, it does not assume a thread-safe implementation of MPI. PM adopts a two-tier abstract representation of parallel hardware. A PM processor is a conceptual unit capable of efficiently executing a set of language tasks, with a complete parallel system consisting of an abstract N-dimensional array of such processors. PM processors may map to single cores executing tasks using cooperative multi-tasking, to multiple cores or even to separate processing nodes, efficiently sharing tasks using algorithms such as work stealing. While tasks may move between hardware elements within a PM processor, they may not move between processors without specific programmer intervention. Tasks are assigned to processors using a nested parallelism approach, building on ideas from Reyes et al. (2009). The main program owns all available processors. When the program enters a parallel statement then either processors are divided out among the newly generated tasks (number of new tasks < number of processors) or tasks are divided out among the available processors (number of tasks > number of processors). Nested parallel statements may further subdivide the processor set owned by a given task. Tasks or processors are distributed evenly by default, but uneven distributions are possible under programmer control. It is also possible to explicitly enable child tasks to migrate within the processor set owned by their parent task, reducing load unbalancing at the potential cost of increased inter-processor message traffic. PM incorporates some programming structures from the earlier MIST language presented at a previous EGU General Assembly, while adopting a significantly different underlying parallelisation model and type system. PM code is available at www.pm-lang.org under an unrestrictive MIT license. Reference Ruymán Reyes, Antonio J. Dorta, Francisco Almeida, Francisco de Sande, 2009. Automatic Hybrid MPI+OpenMP Code Generation with llc, Recent Advances in Parallel Virtual Machine and Message Passing Interface, Lecture Notes in Computer Science Volume 5759, 185-195

  18. The Effects of Blogs versus Dialogue Journals on Open-Response Writing Scores and Attitudes of Grade Eight Science Students

    ERIC Educational Resources Information Center

    Erickson, Diane K.

    2010-01-01

    Today's students have grown up surrounded by technology. They use cell phones, word processors, and the Internet with ease, talking with peers in their community and around the world through e-mails, chatrooms, instant messaging, online discussions, and weblogs ("blogs"). In the midst of this technological explosion, adolescents face a…

  19. An Anthropologist Explores the Culture of Video Blogging

    ERIC Educational Resources Information Center

    Young, Jeffrey R.

    2007-01-01

    Michael L. Wesch, an assistant professor of cultural anthropology at Kansas State University, was writing a paper about social networking and other interactive tools, which are collectively referred to as Web 2.0, when he decided to make use of the technology to spread his message. So he put together a short video with examples of Web 2.0…

  20. A Comparative Analysis of E-Mail and Face-to-Face Communication in an Educational Environment

    ERIC Educational Resources Information Center

    Lightfoot, Jay M.

    2006-01-01

    Electronic mail (e-mail) is an extremely important medium for Internet-based education. Due to its unique characteristics, there is reason to be concerned that students do not put appropriate care into writing messages that are sent via e-mail. This has significant implications for the effectiveness of online learning environments. This paper…

  1. Language with Character: A Stratified Corpus Comparison of Individual Differences in E-Mail Communication

    ERIC Educational Resources Information Center

    Oberlander, Jon; Gill, Alastair J.

    2006-01-01

    To what extent does the wording and syntactic form of people's writing reflect their personalities? Using a bottom-up stratified corpus comparison, rather than the top-down content analysis techniques that have been used before, we examine a corpus of e-mail messages elicited from individuals of known personality, as measured by the Eysenck…

  2. Social Science for Counterterrorism: Putting the Pieces Together

    DTIC Science & Technology

    2009-01-01

    Term Communications In countering terrorism or insurgency, short-term communications efforts—such as crisis response or rapid message adaptation in...of time. Within the literature on crisis communications is a generally agreed- on list of preparatory actions an organization should take, including...writing a crisis response plan, assigning crisis spokespersons and teams, training staff for crises, identifying communications risks and vulner

  3. Critical Issues: Writing for Rosie: How a Journalist Uses (and Doesn't Use) Research.

    ERIC Educational Resources Information Center

    Mathews, Jay

    2000-01-01

    Suggests newspaper editors and television producers do not have much use for scholars or scholarship. Discusses ways major United States newspapers responded to the publication of the National Reading Panel's report. Suggest the relatively few stories published on the report was due to the fact that the message of the report was not new to…

  4. Developing an Invisible Message about Relative Acidities of Alcohols in the Natural Products Henna, Turmeric, Rose Petals, and Vitamin A

    ERIC Educational Resources Information Center

    Dewprashad, Brahmadeo; Hadir, Latifa

    2010-01-01

    An engaging and colorful demonstration was developed that illustrates the utility of resonance theory in predicting the relative acidities of alcohols. The demonstration can be used as an introduction to exercises that provide students with practice in writing resonance structures and in predicting relative acidities. The demonstration exploits…

  5. Timeless Stories East and West: The Philosophical Narratives of the "Bhagavad Gita" and "The Thin Red Line."

    ERIC Educational Resources Information Center

    Stroud, Scott R.

    Both film and ancient religious writing have much in common, especially in regard to their ability to convey powerful messages to modern audiences. A study analyzed the timeless meta-narratives in the ancient Hindu poem, the "Bhagavad Gita," and in the 1998 American film, "The Thin Red Line." It used the methodology of…

  6. Schema Theory Compared to Text-centered Theory as an Explanation for the Reader's Understanding of a Business Message.

    ERIC Educational Resources Information Center

    Faris, Kay A.; Smeltzer, Larry R.

    1997-01-01

    Examines variables affecting reader understanding of business writing. Notes that 57 business students and 82 non-business students read either a coherent or a non-coherent version of the same text and then took a test measuring their comprehension. Finds that background knowledge (schema theory) affected a reader's ability to understand business…

  7. Single beam write and/or replay of spatial heterodyne holograms

    DOEpatents

    Thomas, Clarence E.; Hanson, Gregory R.

    2007-11-20

    A method of writing a spatially heterodyne hologram having spatially heterodyne fringes includes: passing a single write beam through a spatial light modulator that digitally modulates said single write beam; and focusing the single write beam at a focal plane of a lens to impose a holographic diffraction grating pattern on the photorefractive crystal, the holographic diffraction grating pattern including the spatially heterodyne hologram having spatially heterodyne fringes, wherein only said single write beam is incident on said photorefractive crystal without a reference beam. A method of replaying a spatially heterodyne hologram having spatially heterodyne fringes at a replay angle includes: illuminating a photorefractive crystal having a holographic diffraction grating with a beam from a laser at an illumination angle, the holographic diffraction grating pattern including the spatially heterodyne hologram having spatially heterodyne fringes, wherein a difference between said illumination angle and said replay angle defines a diffraction angle .alpha. that is a function of a plane wave mathematically added to original object wave phase and amplitude data of said spatially heterodyne hologram having spatially heterodyne fringes.

  8. Information processing in the CNS: a supramolecular chemistry?

    PubMed

    Tozzi, Arturo

    2015-10-01

    How does central nervous system process information? Current theories are based on two tenets: (a) information is transmitted by action potentials, the language by which neurons communicate with each other-and (b) homogeneous neuronal assemblies of cortical circuits operate on these neuronal messages where the operations are characterized by the intrinsic connectivity among neuronal populations. In this view, the size and time course of any spike is stereotypic and the information is restricted to the temporal sequence of the spikes; namely, the "neural code". However, an increasing amount of novel data point towards an alternative hypothesis: (a) the role of neural code in information processing is overemphasized. Instead of simply passing messages, action potentials play a role in dynamic coordination at multiple spatial and temporal scales, establishing network interactions across several levels of a hierarchical modular architecture, modulating and regulating the propagation of neuronal messages. (b) Information is processed at all levels of neuronal infrastructure from macromolecules to population dynamics. For example, intra-neuronal (changes in protein conformation, concentration and synthesis) and extra-neuronal factors (extracellular proteolysis, substrate patterning, myelin plasticity, microbes, metabolic status) can have a profound effect on neuronal computations. This means molecular message passing may have cognitive connotations. This essay introduces the concept of "supramolecular chemistry", involving the storage of information at the molecular level and its retrieval, transfer and processing at the supramolecular level, through transitory non-covalent molecular processes that are self-organized, self-assembled and dynamic. Finally, we note that the cortex comprises extremely heterogeneous cells, with distinct regional variations, macromolecular assembly, receptor repertoire and intrinsic microcircuitry. This suggests that every neuron (or group of neurons) embodies different molecular information that hands an operational effect on neuronal computation.

  9. Promoting linguistic complexity, greater message length and ease of engagement in email writing in people with aphasia: initial evidence from a study utilizing assistive writing software.

    PubMed

    Thiel, Lindsey; Sage, Karen; Conroy, Paul

    2017-01-01

    Improving email writing in people with aphasia could enhance their ability to communicate, promote interaction and reduce isolation. Spelling therapies have been effective in improving single-word writing. However, there has been limited evidence on how to achieve changes to everyday writing tasks such as email writing in people with aphasia. One potential area that has been largely unexplored in the literature is the potential use of assistive writing technologies, despite some initial evidence that assistive writing software use can lead to qualitative and quantitative improvements to spontaneous writing. This within-participants case series design study aimed to investigate the effects of using assistive writing software to improve email writing in participants with dysgraphia related to aphasia. Eight participants worked through a hierarchy of writing tasks of increasing complexity within broad topic areas that incorporate the spheres of writing need of the participants: writing for domestic needs, writing for social needs and writing for business/administrative needs. Through completing these tasks, participants had the opportunity to use the various functions of the software, such as predictive writing, word banks and text to speech. Therapy also included training and practice in basic computer and email skills to encourage increased independence. Outcome measures included email skills, keyboard skills, email writing and written picture description tasks, and a perception of disability assessment. Four of the eight participants showed statistically significant improvements to spelling accuracy within emails when using the software. At a group level there was a significant increase in word length with the software; while four participants showed noteworthy changes to the range of word classes used. Enhanced independence in email use and improvements in participants' perceptions of their writing skills were also noted. This study provided some initial evidence that assistive writing technologies can support people with aphasia in email writing across a range of important performance parameters. However, more research is needed to measure the effects of these technologies on the writing of people with aphasia, and to determine the optimal compensatory mechanisms for specific people given the linguistic-strategic resources they bring to the task of email writing. © 2016 Royal College of Speech and Language Therapists.

  10. Increasing the Operational Value of Event Messages

    NASA Technical Reports Server (NTRS)

    Li, Zhenping; Savkli, Cetin; Smith, Dan

    2003-01-01

    Assessing the health of a space mission has traditionally been performed using telemetry analysis tools. Parameter values are compared to known operational limits and are plotted over various time periods. This presentation begins with the notion that there is an incredible amount of untapped information contained within the mission s event message logs. Through creative advancements in message handling tools, the event message logs can be used to better assess spacecraft and ground system status and to highlight and report on conditions not readily apparent when messages are evaluated one-at-a-time during a real-time pass. Work in this area is being funded as part of a larger NASA effort at the Goddard Space Flight Center to create component-based, middleware-based, standards-based general purpose ground system architecture referred to as GMSEC - the GSFC Mission Services Evolution Center. The new capabilities and operational concepts for event display, event data analyses and data mining are being developed by Lockheed Martin and the new subsystem has been named GREAT - the GMSEC Reusable Event Analysis Toolkit. Planned for use on existing and future missions, GREAT has the potential to increase operational efficiency in areas of problem detection and analysis, general status reporting, and real-time situational awareness.

  11. Scalable Replay with Partial-Order Dependencies for Message-Logging Fault Tolerance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lifflander, Jonathan; Meneses, Esteban; Menon, Harshita

    2014-09-22

    Deterministic replay of a parallel application is commonly used for discovering bugs or to recover from a hard fault with message-logging fault tolerance. For message passing programs, a major source of overhead during forward execution is recording the order in which messages are sent and received. During replay, this ordering must be used to deterministically reproduce the execution. Previous work in replay algorithms often makes minimal assumptions about the programming model and application in order to maintain generality. However, in many cases, only a partial order must be recorded due to determinism intrinsic in the code, ordering constraints imposed bymore » the execution model, and events that are commutative (their relative execution order during replay does not need to be reproduced exactly). In this paper, we present a novel algebraic framework for reasoning about the minimum dependencies required to represent the partial order for different concurrent orderings and interleavings. By exploiting this theory, we improve on an existing scalable message-logging fault tolerance scheme. The improved scheme scales to 131,072 cores on an IBM BlueGene/P with up to 2x lower overhead than one that records a total order.« less

  12. Patients in transition--improving hospital-home care collaboration through electronic messaging: providers' perspectives.

    PubMed

    Melby, Line; Brattheim, Berit J; Hellesø, Ragnhild

    2015-12-01

    To explore how the use of electronic messages support hospital and community care nurses' collaboration and communication concerning patients' admittance to and discharges from hospitals. Nurses in hospitals and in community care play a crucial role in the transfer of patients between the home and the hospital. Several studies have shown that transition situations are challenging due to a lack of communication and information exchange. Information and communication technologies may support nurses' work in these transition situations. An electronic message system was introduced in Norway to support patient transitions across the health care sector. A descriptive, qualitative interview study was conducted. One hospital and three adjacent communities were included in the study. We conducted semi-structured interviews with hospital nurses and community care nurses. In total, 41 persons were included in the study. The analysis stemmed from three main topics related to the aims of e-messaging: efficiency, quality and safety. These were further divided into sub-themes. All informants agreed that electronic messaging is more efficient, i.e. less time-consuming than previous means of communication. The shift from predominantly oral communication to writing electronic messages has brought attention to the content of the information exchanged, thereby leading to more conscious communication. Electronic messaging enables improved information security, thereby enhancing patient safety, but this depends on nurses using the system as intended. Nurses consider electronic messaging to be a useful tool for communication and collaboration in patient transitions. Patient transitions are demanding situations both for patients and for the nurses who facilitate the transitions. The introduction of information and communication technologies can support nurses' work in the transition situations, and this is likely to benefit the patients. © 2015 John Wiley & Sons Ltd.

  13. Open-mindedness can decrease persuasion amongst adolescents: The role of self-affirmation

    PubMed Central

    Good, Anna; Harris, Peter R; Jessop, Donna; Abraham, Charles

    2015-01-01

    Objectives Self-affirmation (e.g., by reflecting on important personal values) has been found to promote more open-minded appraisal of threatening health messages in at-risk adults. However, it is unclear how self-affirmation affects adolescents and whether it has differential effects on the impact of these messages amongst those at relatively lower and higher risk. The current study explored moderation by risk. Design Participants were randomly assigned to either a self-affirmation or a control condition before receiving a health message concerning physical activity. Methods Older adolescents (N = 125) completed a self-affirmation or control writing task before reading about the health consequences of not meeting recommendations to be physically active for at least 60 min daily. Most of the sample did not achieve these levels of activity (98%, N = 123). Consequently, the message informed these participants that – unless they changed their behaviour – they would be at higher risk of heart disease. Participants completed measures of responses to the message and behaviour-specific cognitions (e.g., self-efficacy) for meeting the recommendations. Results For relatively inactive participants, self-affirmation was associated with increased persuasion. However, for those who were moderately active (but not meeting recommendations), those in the self-affirmation condition were less persuaded by the message. Conclusions Whilst self-affirmation can increase message acceptance, there are circumstances when the open-mindedness it induces may decrease persuasion. The evidence provided in this study suggests that caution may be needed when recommendations are challenging and it could be considered reasonable to be sceptical about the need to change behaviour. PMID:24471418

  14. 47 CFR 13.203 - Examination elements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Examination elements. (a) A written examination (written Element) must prove that the examinee possesses the... pass the examination. Each written examination must consist of questions relating to the pertinent... be able to express oneself satisfactorily both orally and in writing; knowledge of and ability to...

  15. 47 CFR 13.203 - Examination elements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Examination elements. (a) A written examination (written Element) must prove that the examinee possesses the... pass the examination. Each written examination must consist of questions relating to the pertinent... be able to express oneself satisfactorily both orally and in writing; knowledge of and ability to...

  16. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    PubMed

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  17. E-mail, decisional styles, and rest breaks.

    PubMed

    Baker, James R; Phillips, James G

    2007-10-01

    E-mail is a common but problematic work application. A scale was created to measure tendencies to use e-mail to take breaks (e-breaking); and self-esteem and decisional style (vigilance, procrastination, buck-passing, hypervigilance) were used to predict the self-reported and actual e-mail behaviors of 133 participants (students and marketing employees). Individuals who were low in defensive avoidance (buck-passing) engaged in more e-mailing per week, both in time spent on e-mail and message volume. E-breakers were more likely to engage in behavioral procrastination and spent more time on personal e-mail.

  18. PyPanda: a Python package for gene regulatory network reconstruction

    PubMed Central

    van IJzendoorn, David G.P.; Glass, Kimberly; Quackenbush, John; Kuijjer, Marieke L.

    2016-01-01

    Summary: PANDA (Passing Attributes between Networks for Data Assimilation) is a gene regulatory network inference method that uses message-passing to integrate multiple sources of ‘omics data. PANDA was originally coded in C ++. In this application note we describe PyPanda, the Python version of PANDA. PyPanda runs considerably faster than the C ++ version and includes additional features for network analysis. Availability and implementation: The open source PyPanda Python package is freely available at http://github.com/davidvi/pypanda. Contact: mkuijjer@jimmy.harvard.edu or d.g.p.van_ijzendoorn@lumc.nl PMID:27402905

  19. PyPanda: a Python package for gene regulatory network reconstruction.

    PubMed

    van IJzendoorn, David G P; Glass, Kimberly; Quackenbush, John; Kuijjer, Marieke L

    2016-11-01

    PANDA (Passing Attributes between Networks for Data Assimilation) is a gene regulatory network inference method that uses message-passing to integrate multiple sources of 'omics data. PANDA was originally coded in C ++. In this application note we describe PyPanda, the Python version of PANDA. PyPanda runs considerably faster than the C ++ version and includes additional features for network analysis. The open source PyPanda Python package is freely available at http://github.com/davidvi/pypanda CONTACT: mkuijjer@jimmy.harvard.edu or d.g.p.van_ijzendoorn@lumc.nl. © The Author 2016. Published by Oxford University Press.

  20. To amend the DNA Analysis Backlog Elimination Act of 2000 to provide for Debbie Smith grants for auditing sexual assault evidence backlogs, and for other purposes.

    THOMAS, 112th Congress

    Sen. Cornyn, John [R-TX

    2012-05-24

    Senate - 01/02/2013 Message on House action received in Senate and at desk: House amendments to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  1. Support for Debugging Automatically Parallelized Programs

    NASA Technical Reports Server (NTRS)

    Hood, Robert; Jost, Gabriele

    2001-01-01

    This viewgraph presentation provides information on support sources available for the automatic parallelization of computer program. CAPTools, a support tool developed at the University of Greenwich, transforms, with user guidance, existing sequential Fortran code into parallel message passing code. Comparison routines are then run for debugging purposes, in essence, ensuring that the code transformation was accurate.

  2. Earth observation taken by the Expedition 43 crew.

    NASA Image and Video Library

    2015-03-13

    Earth observation taken during a day pass by the Expedition 43 crew aboard the International Space Station (ISS). Sent as part of Twitter message: #HappyStPatrickDay with best wishes from the #E43 crew! From space you can see the “Emerald Isle” is very green!

  3. New Frontier Congressional Gold Medal Act

    THOMAS, 111th Congress

    Sen. Nelson, Bill [D-FL

    2009-05-01

    Senate - 09/23/2010 Message received in the Senate: Returned to the Senate pursuant to the provisions of H.Res. 1653. (All Actions) Notes: For further action, see H.R.2245, which became Public Law 111-44 on 8/7/2009. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  4. Travel Promotion Act of 2009

    THOMAS, 111th Congress

    Sen. Dorgan, Byron L. [D-ND

    2009-05-12

    Senate - 09/23/2010 Message received in the Senate: Returned to the Senate pursuant to the provisions of H.Res. 1653. (All Actions) Notes: For further action, see H.R.1299, which became Public Law 111-145 on 3/4/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  5. Union Agitators

    ERIC Educational Resources Information Center

    Honawar, Vaishali

    2006-01-01

    A decade has passed since a few union leaders formed the network known as Teacher Union Reform Network (TURN) to search for innovative ways to enhance education. Selling their message has not always been easy. Created in 1995, TURN was the brain child of Adam Urbanski, the president of the Rochester (N.Y.) Teachers Association for the past 25…

  6. Monitoring Data-Structure Evolution in Distributed Message-Passing Programs

    NASA Technical Reports Server (NTRS)

    Sarukkai, Sekhar R.; Beers, Andrew; Woodrow, Thomas S. (Technical Monitor)

    1996-01-01

    Monitoring the evolution of data structures in parallel and distributed programs, is critical for debugging its semantics and performance. However, the current state-of-art in tracking and presenting data-structure information on parallel and distributed environments is cumbersome and does not scale. In this paper we present a methodology that automatically tracks memory bindings (not the actual contents) of static and dynamic data-structures of message-passing C programs, using PVM. With the help of a number of examples we show that in addition to determining the impact of memory allocation overheads on program performance, graphical views can help in debugging the semantics of program execution. Scalable animations of virtual address bindings of source-level data-structures are used for debugging the semantics of parallel programs across all processors. In conjunction with light-weight core-files, this technique can be used to complement traditional debuggers on single processors. Detailed information (such as data-structure contents), on specific nodes, can be determined using traditional debuggers after the data structure evolution leading to the semantic error is observed graphically.

  7. PVM Wrapper

    NASA Technical Reports Server (NTRS)

    Katz, Daniel

    2004-01-01

    PVM Wrapper is a software library that makes it possible for code that utilizes the Parallel Virtual Machine (PVM) software library to run using the message-passing interface (MPI) software library, without needing to rewrite the entire code. PVM and MPI are the two most common software libraries used for applications that involve passing of messages among parallel computers. Since about 1996, MPI has been the de facto standard. Codes written when PVM was popular often feature patterns of {"initsend," "pack," "send"} and {"receive," "unpack"} calls. In many cases, these calls are not contiguous and one set of calls may even exist over multiple subroutines. These characteristics make it difficult to obtain equivalent functionality via a single MPI "send" call. Because PVM Wrapper is written to run with MPI- 1.2, some PVM functions are not permitted and must be replaced - a task that requires some programming expertise. The "pvm_spawn" and "pvm_parent" function calls are not replaced, but a programmer can use "mpirun" and knowledge of the ranks of parent and child tasks with supplied macroinstructions to enable execution of codes that use "pvm_spawn" and "pvm_parent."

  8. Parallelized direct execution simulation of message-passing parallel programs

    NASA Technical Reports Server (NTRS)

    Dickens, Phillip M.; Heidelberger, Philip; Nicol, David M.

    1994-01-01

    As massively parallel computers proliferate, there is growing interest in findings ways by which performance of massively parallel codes can be efficiently predicted. This problem arises in diverse contexts such as parallelizing computers, parallel performance monitoring, and parallel algorithm development. In this paper we describe one solution where one directly executes the application code, but uses a discrete-event simulator to model details of the presumed parallel machine such as operating system and communication network behavior. Because this approach is computationally expensive, we are interested in its own parallelization specifically the parallelization of the discrete-event simulator. We describe methods suitable for parallelized direct execution simulation of message-passing parallel programs, and report on the performance of such a system, Large Application Parallel Simulation Environment (LAPSE), we have built on the Intel Paragon. On all codes measured to date, LAPSE predicts performance well typically within 10 percent relative error. Depending on the nature of the application code, we have observed low slowdowns (relative to natively executing code) and high relative speedups using up to 64 processors.

  9. Message Passing and Shared Address Space Parallelism on an SMP Cluster

    NASA Technical Reports Server (NTRS)

    Shan, Hongzhang; Singh, Jaswinder P.; Oliker, Leonid; Biswas, Rupak; Biegel, Bryan (Technical Monitor)

    2002-01-01

    Currently, message passing (MP) and shared address space (SAS) are the two leading parallel programming paradigms. MP has been standardized with MPI, and is the more common and mature approach; however, code development can be extremely difficult, especially for irregularly structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality and high protocol overhead. In this paper, we compare the performance of and the programming effort required for six applications under both programming models on a 32-processor PC-SMP cluster, a platform that is becoming increasingly attractive for high-end scientific computing. Our application suite consists of codes that typically do not exhibit scalable performance under shared-memory programming due to their high communication-to-computation ratios and/or complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of our applications, while being competitive for the others. A hybrid MPI+SAS strategy shows only a small performance advantage over pure MPI in some cases. Finally, improved implementations of two MPI collective operations on PC-SMP clusters are presented.

  10. Evoking a Spirit of Play: M&M's[R] Stories and (Un)Real Possibilities for Teaching Secondary Literacy

    ERIC Educational Resources Information Center

    Carlson, David Lee; Clay, Tracy

    2010-01-01

    Current research on the teaching of writing puts some secondary English teachers in a bind. While many teachers understand that the best ways for students to develop into strong writers is to encourage them to select personally relevant topics, de-emphasize mechanics, and provide opportunities to take risks, the message they receive from state and…

  11. Steganography and Steganalysis in Digital Images

    DTIC Science & Technology

    2012-01-01

    Nonetheless, to hide a message in a BMP using this algorithm it would require a large image used as a cover. STEGANOGRAPHY TOOLS There were eight tools in...REPORT Steganography and Steganalysis in Digital Images 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Steganography (from the Greek for "covered writing...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Least Significant Bit ( LSB ), steganography , steganalysis, stegogramme. Dr. Jeff Duffany

  12. Introducing Professional Writing Skills to Future Naval Officers: An Adjunct to NPS Distance Learning

    DTIC Science & Technology

    2008-12-18

    make smart organizational and stylistic choices—resulting in messages that are quick to read, easy to understand, and effective in serving their...analyzed the work of research specialists, cognitive psychologists, professional naval writers, and business communication researchers. Also in the...memory and Bever’s (1972) work on short- and long- term effect on sentence processing provides important information on cognitive information

  13. Strategies for lowering attrition rates and raising NCLEX-RN pass rates.

    PubMed

    Higgins, Bonnie

    2005-12-01

    This study was designed to determine strategies to raise the NCLEX-RN pass rate and lower the attrition rate in a community college nursing program. Ex-post facto data were collected from 213 former nursing student records. Qualitative data were collected from 10 full-time faculty, 30 new graduates, and 45 directors of associate degree nursing programs in Texas. The findings linked the academic variables of two biology courses and three components of the preadmission test to completion of the nursing program. A relationship was found between one biology course, the science component of the preadmission test, the HESI Exit Examination score, and the nursing skills course to passing the NCLEX-RN. Qualitative data indicated preadmission requirements, campus counselors, remediation, faculty, test-item writing, and teaching method were instrumental in completion of the program and passing the NCLEX-RN.

  14. Method of data communications with reduced latency

    DOEpatents

    Blocksome, Michael A; Parker, Jeffrey J

    2013-11-05

    Data communications with reduced latency, including: writing, by a producer, a descriptor and message data into at least two descriptor slots of a descriptor buffer, the descriptor buffer comprising allocated computer memory segmented into descriptor slots, each descriptor slot having a fixed size, the descriptor buffer having a header pointer that identifies a next descriptor slot to be processed by a DMA controller, the descriptor buffer having a tail pointer that identifies a descriptor slot for entry of a next descriptor in the descriptor buffer; recording, by the producer, in the descriptor a value signifying that message data has been written into descriptor slots; and setting, by the producer, in dependence upon the recorded value, a tail pointer to point to a next open descriptor slot.

  15. A qualitative analysis of email interactions of children who use augmentative and alternative communication.

    PubMed

    Sundqvist, Anett; Rönnberg, Jerker

    2010-12-01

    The aim of this study was to introduce email as a form of interaction for a group of six children who used augmentative and alternative communication. In a 12-week exploratory study, aspects of the email messages sent were analyzed. The content of the messages was analyzed by an inductive qualitative method, and seven descriptive categories emerged. The most frequently occurring categories were Social Etiquette, Personal/Family Statistics and Personal Common Ground. The children utilized different email strategies that included use of most of the above-mentioned categories. Through the email writing practice, the children developed new social skills and increased their social participation. Email practice may be a good strategy to increase children's social networks.

  16. Low-pass filtering of noisy Schlumberger sounding curves. Part I: Theory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Patella, D.

    1986-02-01

    A contribution is given to the solution of the problem of filtering noise-degraded Schlumberger sounding curves. It is shown that the transformation to the pole-pole system is actually a smoothing operation that filters high-frequency noise. In the case of residual noise contamination in the transformed pole-pole curve, it is demonstrated that a subsequent application of a conventional rectangular low-pass filter, with cut-off frequency not less than the right-hand frequency limit of the main message pass-band, may satisfactorily solve the problem by leaving a pole-pole curve available for interpretation. An attempt is also made to understand the essential peculiarities of themore » pole-pole system as far as penetration depth, resolving power and selectivity power are concerned.« less

  17. Deaf and hard of hearing Americans' instant messaging and e-mail use: a national survey.

    PubMed

    Bowe, Frank G

    2002-10-01

    An online survey of 884 deaf and hard of hearing adults asked about their current and past use of communication technologies, notably TTY, telecommunications relay services, e-mail, and instant messaging (IM). Results showed that respondents were using e-mail and IM far more than TTY and relay services. The study participants virtually all had e-mail and IM at home. In fact, about one quarter had a high-speed ("broadband") connection at home. While the vast majority also had and used e-mail at work, just 1 in 3 had IM at his or her place of employment. The findings have several implications. Most important for educators is that strong reading and writing skills are essential if adults who are deaf or hard of hearing are to take advantage of today's communications technologies. Another conclusion is that some workers who are deaf or hard of hearing appear to face discrimination in employment because office policies forbid the use of a highly effective reasonable accommodation, instant messaging.

  18. A Model of Pantun Learning to Develop Elementary Student’s Entrepreneurship Awareness

    NASA Astrophysics Data System (ADS)

    Asteria, P. V.; Yulianto, B.

    2018-01-01

    The principle of entrepreneurship should be instilled from an early age. Pantun is one of Indonesian local culture taught for the elementary school student. Therefore, this study aims to describe (1) the ability to understand the content from pantun based entrepreneurship, (2) the ability to determine the messages from pantun based entrepreneurship, and (3) the ability to apply the messages from pantun based entrepreneurship into their real life. The research type is descriptive quantitative and conducted on the subject of 35 students from SDN Margomulyo I Ngawi. The data is the student’s skill in reading comprehension from the pantun based entrepreneurship with the writing test items instrument. The results showed that the student’s ability to determine the content from pantun based entrepreneurship shows achievement by an average of 9.3 (include an excellent category) and the ability of students to determine the entrepreneurship messages by an average of 7.8 (good). Meanwhile, the average student’s ability to apply the entrepreneurship messages in pantun into their real life by an average of 8.7 (excellent). Overall, the student’s skill in reading comprehension from the pantun based entrepreneurship as a whole reached an average of 86.4 (excellent category).

  19. Exploring detection of contact vs. fantasy online sexual offenders in chats with minors: Statistical discourse analysis of self-disclosure and emotion words.

    PubMed

    Chiu, Ming Ming; Seigfried-Spellar, Kathryn C; Ringenberg, Tatiana R

    2018-07-01

    This exploratory study is the first to identify content differences between youths' online chats with contact child sex offenders (CCSOs; seek to meet with youths) and those with fantasy child sex offenders (FCSOs; do not meet with youths) using statistical discourse analysis (SDA). Past studies suggest that CCSOs share their experiences and emotions with targeted youths (self-disclosure grooming tactic) and encourage them to reciprocate, to build trust and closer relationships through a cycle of self-disclosures. In this study, we examined 36,029 words in 4,353 messages within 107 anonymized online chat sessions by 21 people, specifically 12 youths and 9 arrested sex offenders (5 CCSOs and 4 FCSOs), using SDA. Results showed that CCSOs were more likely than FCSOs to write online messages with specific words (first person pronouns, negative emotions and positive emotions), suggesting the use of self-disclosure grooming tactics. CCSO's self-disclosure messages elicited corresponding self-disclosure messages from their targeted youths. These results suggest that CCSOs use grooming tactics that help engender youths' trust to meet in the physical world, but FCSOs do not. Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. Message passing with queues and channels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dozsa, Gabor J; Heidelberger, Philip; Kumar, Sameer

    In an embodiment, a reception thread receives a source node identifier, a type, and a data pointer from an application and, in response, creates a receive request. If the source node identifier specifies a source node, the reception thread adds the receive request to a fast-post queue. If a message received from a network does not match a receive request on a posted queue, a polling thread adds a receive request that represents the message to an unexpected queue. If the fast-post queue contains the receive request, the polling thread removes the receive request from the fast-post queue. If themore » receive request that was removed from the fast-post queue does not match the receive request on the unexpected queue, the polling thread adds the receive request that was removed from the fast-post queue to the posted queue. The reception thread and the polling thread execute asynchronously from each other.« less

  1. Secure Web-Site Access with Tickets and Message-Dependent Digests

    USGS Publications Warehouse

    Donato, David I.

    2008-01-01

    Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.

  2. Real time explosive hazard information sensing, processing, and communication for autonomous operation

    DOEpatents

    Versteeg, Roelof J; Few, Douglas A; Kinoshita, Robert A; Johnson, Doug; Linda, Ondrej

    2015-02-24

    Methods, computer readable media, and apparatuses provide robotic explosive hazard detection. A robot intelligence kernel (RIK) includes a dynamic autonomy structure with two or more autonomy levels between operator intervention and robot initiative A mine sensor and processing module (ESPM) operating separately from the RIK perceives environmental variables indicative of a mine using subsurface perceptors. The ESPM processes mine information to determine a likelihood of a presence of a mine. A robot can autonomously modify behavior responsive to an indication of a detected mine. The behavior is modified between detection of mines, detailed scanning and characterization of the mine, developing mine indication parameters, and resuming detection. Real time messages are passed between the RIK and the ESPM. A combination of ESPM bound messages and RIK bound messages cause the robot platform to switch between modes including a calibration mode, the mine detection mode, and the mine characterization mode.

  3. Real time explosive hazard information sensing, processing, and communication for autonomous operation

    DOEpatents

    Versteeg, Roelof J.; Few, Douglas A.; Kinoshita, Robert A.; Johnson, Douglas; Linda, Ondrej

    2015-12-15

    Methods, computer readable media, and apparatuses provide robotic explosive hazard detection. A robot intelligence kernel (RIK) includes a dynamic autonomy structure with two or more autonomy levels between operator intervention and robot initiative A mine sensor and processing module (ESPM) operating separately from the RIK perceives environmental variables indicative of a mine using subsurface perceptors. The ESPM processes mine information to determine a likelihood of a presence of a mine. A robot can autonomously modify behavior responsive to an indication of a detected mine. The behavior is modified between detection of mines, detailed scanning and characterization of the mine, developing mine indication parameters, and resuming detection. Real time messages are passed between the RIK and the ESPM. A combination of ESPM bound messages and RIK bound messages cause the robot platform to switch between modes including a calibration mode, the mine detection mode, and the mine characterization mode.

  4. Machine-checked proofs of the design and implementation of a fault-tolerant circuit

    NASA Technical Reports Server (NTRS)

    Bevier, William R.; Young, William D.

    1990-01-01

    A formally verified implementation of the 'oral messages' algorithm of Pease, Shostak, and Lamport is described. An abstract implementation of the algorithm is verified to achieve interactive consistency in the presence of faults. This abstract characterization is then mapped down to a hardware level implementation which inherits the fault-tolerant characteristics of the abstract version. All steps in the proof were checked with the Boyer-Moore theorem prover. A significant results is the demonstration of a fault-tolerant device that is formally specified and whose implementation is proved correct with respect to this specification. A significant simplifying assumption is that the redundant processors behave synchronously. A mechanically checked proof that the oral messages algorithm is 'optimal' in the sense that no algorithm which achieves agreement via similar message passing can tolerate a larger proportion of faulty processor is also described.

  5. 47 CFR 13.203 - Examination elements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Examination elements. (a) A written examination (written Element) must prove that the examinee possesses the... pass the examination. Each written examination must consist of questions relating to the pertinent... knowledge of English to be able to express oneself satisfactorily both orally and in writing; knowledge of...

  6. 47 CFR 13.203 - Examination elements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Examination elements. (a) A written examination (written Element) must prove that the examinee possesses the... pass the examination. Each written examination must consist of questions relating to the pertinent... knowledge of English to be able to express oneself satisfactorily both orally and in writing; knowledge of...

  7. Parallel community climate model: Description and user`s guide

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Drake, J.B.; Flanery, R.E.; Semeraro, B.D.

    This report gives an overview of a parallel version of the NCAR Community Climate Model, CCM2, implemented for MIMD massively parallel computers using a message-passing programming paradigm. The parallel implementation was developed on an Intel iPSC/860 with 128 processors and on the Intel Delta with 512 processors, and the initial target platform for the production version of the code is the Intel Paragon with 2048 processors. Because the implementation uses a standard, portable message-passing libraries, the code has been easily ported to other multiprocessors supporting a message-passing programming paradigm. The parallelization strategy used is to decompose the problem domain intomore » geographical patches and assign each processor the computation associated with a distinct subset of the patches. With this decomposition, the physics calculations involve only grid points and data local to a processor and are performed in parallel. Using parallel algorithms developed for the semi-Lagrangian transport, the fast Fourier transform and the Legendre transform, both physics and dynamics are computed in parallel with minimal data movement and modest change to the original CCM2 source code. Sequential or parallel history tapes are written and input files (in history tape format) are read sequentially by the parallel code to promote compatibility with production use of the model on other computer systems. A validation exercise has been performed with the parallel code and is detailed along with some performance numbers on the Intel Paragon and the IBM SP2. A discussion of reproducibility of results is included. A user`s guide for the PCCM2 version 2.1 on the various parallel machines completes the report. Procedures for compilation, setup and execution are given. A discussion of code internals is included for those who may wish to modify and use the program in their own research.« less

  8. High Performance Programming Using Explicit Shared Memory Model on Cray T3D1

    NASA Technical Reports Server (NTRS)

    Simon, Horst D.; Saini, Subhash; Grassi, Charles

    1994-01-01

    The Cray T3D system is the first-phase system in Cray Research, Inc.'s (CRI) three-phase massively parallel processing (MPP) program. This system features a heterogeneous architecture that closely couples DEC's Alpha microprocessors and CRI's parallel-vector technology, i.e., the Cray Y-MP and Cray C90. An overview of the Cray T3D hardware and available programming models is presented. Under Cray Research adaptive Fortran (CRAFT) model four programming methods (data parallel, work sharing, message-passing using PVM, and explicit shared memory model) are available to the users. However, at this time data parallel and work sharing programming models are not available to the user community. The differences between standard PVM and CRI's PVM are highlighted with performance measurements such as latencies and communication bandwidths. We have found that the performance of neither standard PVM nor CRI s PVM exploits the hardware capabilities of the T3D. The reasons for the bad performance of PVM as a native message-passing library are presented. This is illustrated by the performance of NAS Parallel Benchmarks (NPB) programmed in explicit shared memory model on Cray T3D. In general, the performance of standard PVM is about 4 to 5 times less than obtained by using explicit shared memory model. This degradation in performance is also seen on CM-5 where the performance of applications using native message-passing library CMMD on CM-5 is also about 4 to 5 times less than using data parallel methods. The issues involved (such as barriers, synchronization, invalidating data cache, aligning data cache etc.) while programming in explicit shared memory model are discussed. Comparative performance of NPB using explicit shared memory programming model on the Cray T3D and other highly parallel systems such as the TMC CM-5, Intel Paragon, Cray C90, IBM-SP1, etc. is presented.

  9. coNCePTual

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pakin, Scott

    2004-05-13

    A frequently reinvented wheel among network researchers is a suite of programs that test a network’s performance. A problem with having umpteen versions of performance tests is that it leads to a variety in the way results are reported; colloquially, apples are often compared to oranges. Consider a bandwidth test. Does a bandwidth test run for a fixed number of iterations or a fixed length of time? Is bandwidth measured as ping-pong bandwidth (i.e., 2 * message length / round-trip time) or unidirectional throughput (N messages in one direction followed by a single acknowledgement message)? Is the acknowledgement message ofmore » minimal length or as long as the entire message? Does its length contribute to the total bandwidth? Is data sent unidirectionally or in both directions at once? How many warmup messages (if any) are sent before the timing loop? Is there a delay after the warmup messages (to give the network a chance to reclaim any scarce resources)? Are receives nonblocking (possibly allowing overlap in the NIC) or blocking? The motivation behind creating coNCePTuaL, a simple specification language designed for describing network benchmarks, is that it enables a benchmark to be described sufficiently tersely as to fit easily in a report or research paper, facilitating peer review of the experimental setup and timing measurements. Because coNCePTuaL code is simple to write, network tests can be developed and deployed with low turnaround times -- useful when the results of one test suggest a following test that should be written. Because coNCePTuaL is special-purpose its run-time system can perform the following functions, which benchmark writers often neglect to implement: * logging information about the environment under which the benchmark ran: operating system, CPU architecture and clock speed, timer type and resolution, etc. * aborting a program if it takes longer than a predetermined length of time to complete * writing measurement data and descriptive statistics to a variety of output formats, including the input formats of various graph-plotting programs coNCePTuaL is not limited to network peformance tests, however. It can also be used for network verification. That is, coNCePTuaL programs can be used to locate failed links or to determine the frequency of bit errors --even those that may sneak past the networks CRC hardware. In addition, because coNCePTuaL is a very high-level language, the coNCePTuaL compiler’s backend has a great deal of potential. It would be possible for the backend to produce a variety of target formats such as Fortran + MPI, Perl + sockets, C + a network vendor’s low-level messaging layer, and so forth. It could directly manipulate a network simulator. It could feed into a graphics program to produce a space-time diagram of a coNCePTuaL program. The possibilities are endless.« less

  10. Approving the renewal of import restrictions contained in the Burmese Freedom and Democracy Act of 2003.

    THOMAS, 112th Congress

    Rep. Crowley, Joseph [D-NY-7

    2011-05-26

    Senate - 09/15/2011 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.2017, which became Public Law 112-33 on 9/30/2011. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  11. Final report: Compiled MPI. Cost-Effective Exascale Application Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gropp, William Douglas

    2015-12-21

    This is the final report on Compiled MPI: Cost-Effective Exascale Application Development, and summarizes the results under this project. The project investigated runtime enviroments that improve the performance of MPI (Message-Passing Interface) programs; work at Illinois in the last period of this project looked at optimizing data access optimizations expressed with MPI datatypes.

  12. Emergency Border Security Supplemental Appropriations Act, 2010

    THOMAS, 111th Congress

    Rep. Price, David E. [D-NC-4

    2010-07-27

    Senate - 09/23/2010 Message received in the Senate: Returned to the Senate pursuant to the provisions of H.Res. 1653. (All Actions) Notes: For further action, see H.R.6080, which became Public Law 111-230 on 8/13/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  13. A Down-to-Earth Educational Operating System for Up-in-the-Cloud Many-Core Architectures

    ERIC Educational Resources Information Center

    Ziwisky, Michael; Persohn, Kyle; Brylow, Dennis

    2013-01-01

    We present "Xipx," the first port of a major educational operating system to a processor in the emerging class of many-core architectures. Through extensions to the proven Embedded Xinu operating system, Xipx gives students hands-on experience with system programming in a distributed message-passing environment. We expose the software primitives…

  14. LDPC Codes--Structural Analysis and Decoding Techniques

    ERIC Educational Resources Information Center

    Zhang, Xiaojie

    2012-01-01

    Low-density parity-check (LDPC) codes have been the focus of much research over the past decade thanks to their near Shannon limit performance and to their efficient message-passing (MP) decoding algorithms. However, the error floor phenomenon observed in MP decoding, which manifests itself as an abrupt change in the slope of the error-rate curve,…

  15. Comprehensive Iran Sanctions, Accountability, and Divestment Act of 2009

    THOMAS, 111th Congress

    Sen. Dodd, Christopher J. [D-CT

    2009-11-19

    Senate - 09/23/2010 Message received in the Senate: Returned to the Senate pursuant to the provisions of H.Res. 1653. (All Actions) Notes: For further action, see H.R.2194, which became Public Law 111-195 on 7/1/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  16. Federal Aviation Administration Extension Act of 2010

    THOMAS, 111th Congress

    Sen. Rockefeller, John D., IV [D-WV

    2010-03-25

    Senate - 09/23/2010 Message received in the Senate: Returned to the Senate pursuant to the provisions of H.Res. 1653. (All Actions) Notes: For further action, see H.R.5147, which became Public Law 111-161 on 4/30/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  17. Minority Journalists Push Media to Maintain Diversity Commitment

    ERIC Educational Resources Information Center

    Anderson, Michelle D.

    2008-01-01

    In a media advisory released earlier this month, the National Association of Black Journalists (NABJ) had an urgent message for the newspaper industry: Diversity should not be treated like a passing fad and it should continue to be a top priority. The advocacy organization, where a majority of its 4,000 members are Black print journalists, warned…

  18. Plain words for nurses Alison Turnbull Plain words for nurses The Foundation of Nursing Studies 86 pages £6.50 0 9540091 0 X 095400910X [Formula: see text].

    PubMed

    2002-03-01

    This inspirational publication is one that practises what it preaches. It is about clear writing and provides very useful guidance to the nursing professional who wants to get an unclouded message across. It provides useful examples throughout to guide the reader and highlights how simple interventions can make big improvements.

  19. Construct User Guide

    DTIC Science & Technology

    2012-11-01

    validation using calibrated grounding. In 2007 BRIMS Conference Proceedings, Norfolk, VA. Simon, H. A. (1957). Administrative Behavior: A study of...Construct will write the output to the directory specified by the path name. Users should ensure that if they have opened any output files (e.g., in Excel... open an input file, it will exit and close. There are times when an error message is not present to the user in this situation! Users should ensure

  20. Can anonymous posters on medical forums be reidentified?

    PubMed

    Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-10-03

    Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being determined.

  1. Processing of Alcohol-Related Health Threat in At-Risk Drinkers: An Online Study of Gender-Related Self-Affirmation Effects.

    PubMed

    Kamboj, Sunjeev K; Place, Hannah; Barton, Jessica A; Linke, Stuart; Curran, H Valerie; Harris, Peter R

    2016-11-01

    Defensiveness in response to threatening health information related to excessive alcohol consumption prevents appropriate behaviour change. Alternatively, self-affirmation may improve cognitive-affective processing of threatening information, thus contributing to successful self-regulation. Effects of an online self-affirmation procedure were examined in at-risk university student drinkers. Participants were randomly assigned to a self-affirmation (writing about personally relevant values) or control task (writing about values relevant to another person) prior to presentation of alcohol-related threatening information. Assessment of prosocial feelings (e.g. 'love') after the task served as a manipulation check. Generic and personalized information regarding the link between alcohol use and cancer was presented, followed by assessment of perceived threat, message avoidance and derogation. Page dwell-times served as indirect indices of message engagement. Alcohol consumption and intention to drink less were assessed during the first online session and at 1-week and 1-month follow-up. Although self-affirmation resulted in higher levels of prosocial feelings immediately after the task, there was no effect on behaviour in the self-affirmation group. Effects on intention were moderated by gender, such that men showed lower intention immediately after self-affirmation, but this increased at 1-week follow-up. Women's intention to reduce consumption in the self-affirmation group reduced over time. Trend-level effects on indices of derogation and message acceptance were in the predicted direction only in men. It is feasible to perform self-affirmation procedures in an online environment with at-risk drinkers. However, use of internet-based procedures with this population may give rise to (gender-dependent) effects that are substantially diluted compared with lab-based experiments. © The Author 2016. Medical Council on Alcohol and Oxford University Press. All rights reserved.

  2. Computer Modeling and Optimization of OBOGS with Contaminants

    DTIC Science & Technology

    1986-10-10

    OBOGS model can be ucd to optimize and design OBOGS systems with respect to system parameters such as cycle time and bed and valve dimensions. 3. C N I...6,172) TP 172 FORMLATC FINAL OBSERVATION TIME (SEC’,T40,F.4,/) READ *, TF1 IF(TFl.LT.EPSI) GOTO 10 TF=TF 1 COTO 10 175 WRITE(6,177) TCYC 177 FORMAT...225,235,207 207 IF(N-10) 336,246,255 209 WRITE(6,210) DBYIN 210 FORMAT(’ BY-PASS VALVE DIAMETER (IN)’,T40,FS.4,/) READ -,DBYIN1 IFCDBYIN1.LT.EPSI

  3. From Our Practices to Yours: Key Messages for the Journey to Integrated Behavioral Health.

    PubMed

    Gold, Stephanie B; Green, Larry A; Peek, C J

    The historic, cultural separation of primary care and behavioral health has caused the spread of integrated care to lag behind other practice transformation efforts. The Advancing Care Together study was a 3-year evaluation of how practices implemented integrated care in their local contexts; at its culmination, practice leaders ("innovators") identified lessons learned to pass on to others. Individual feedback from innovators, key messages created by workgroups of innovators and the study team, and a synthesis of key messages from a facilitated discussion were analyzed for themes via immersion/crystallization. Five key themes were captured: (1) frame integrated care as a necessary paradigm shift to patient-centered, whole-person health care; (2) initialize: define relationships and protocols up-front, understanding they will evolve; (3) build inclusive, empowered teams to provide the foundation for integration; (4) develop a change management strategy of continuous evaluation and course-correction; and (5) use targeted data collection pertinent to integrated care to drive improvement and impart accountability. Innovators integrating primary care and behavioral health discerned key messages from their practical experience that they felt were worth sharing with others. Their messages present insight into the challenges unique to integrating care beyond other practice transformation efforts. © Copyright 2017 by the American Board of Family Medicine.

  4. Concurrent hypercube system with improved message passing

    NASA Technical Reports Server (NTRS)

    Peterson, John C. (Inventor); Tuazon, Jesus O. (Inventor); Lieberman, Don (Inventor); Pniel, Moshe (Inventor)

    1989-01-01

    A network of microprocessors, or nodes, are interconnected in an n-dimensional cube having bidirectional communication links along the edges of the n-dimensional cube. Each node's processor network includes an I/O subprocessor dedicated to controlling communication of message packets along a bidirectional communication link with each end thereof terminating at an I/O controlled transceiver. Transmit data lines are directly connected from a local FIFO through each node's communication link transceiver. Status and control signals from the neighboring nodes are delivered over supervisory lines to inform the local node that the neighbor node's FIFO is empty and the bidirectional link between the two nodes is idle for data communication. A clocking line between neighbors, clocks a message into an empty FIFO at a neighbor's node and vica versa. Either neighbor may acquire control over the bidirectional communication link at any time, and thus each node has circuitry for checking whether or not the communication link is busy or idle, and whether or not the receive FIFO is empty. Likewise, each node can empty its own FIFO and in turn deliver a status signal to a neighboring node indicating that the local FIFO is empty. The system includes features of automatic message rerouting, block message transfer and automatic parity checking and generation.

  5. Performance issues for domain-oriented time-driven distributed simulations

    NASA Technical Reports Server (NTRS)

    Nicol, David M.

    1987-01-01

    It has long been recognized that simulations form an interesting and important class of computations that may benefit from distributed or parallel processing. Since the point of parallel processing is improved performance, the recent proliferation of multiprocessors requires that we consider the performance issues that naturally arise when attempting to implement a distributed simulation. Three such issues are: (1) the problem of mapping the simulation onto the architecture, (2) the possibilities for performing redundant computation in order to reduce communication, and (3) the avoidance of deadlock due to distributed contention for message-buffer space. These issues are discussed in the context of a battlefield simulation implemented on a medium-scale multiprocessor message-passing architecture.

  6. Parallel integer sorting with medium and fine-scale parallelism

    NASA Technical Reports Server (NTRS)

    Dagum, Leonardo

    1993-01-01

    Two new parallel integer sorting algorithms, queue-sort and barrel-sort, are presented and analyzed in detail. These algorithms do not have optimal parallel complexity, yet they show very good performance in practice. Queue-sort designed for fine-scale parallel architectures which allow the queueing of multiple messages to the same destination. Barrel-sort is designed for medium-scale parallel architectures with a high message passing overhead. The performance results from the implementation of queue-sort on a Connection Machine CM-2 and barrel-sort on a 128 processor iPSC/860 are given. The two implementations are found to be comparable in performance but not as good as a fully vectorized bucket sort on the Cray YMP.

  7. Reducing Interprocessor Dependence in Recoverable Distributed Shared Memory

    NASA Technical Reports Server (NTRS)

    Janssens, Bob; Fuchs, W. Kent

    1994-01-01

    Checkpointing techniques in parallel systems use dependency tracking and/or message logging to ensure that a system rolls back to a consistent state. Traditional dependency tracking in distributed shared memory (DSM) systems is expensive because of high communication frequency. In this paper we show that, if designed correctly, a DSM system only needs to consider dependencies due to the transfer of blocks of data, resulting in reduced dependency tracking overhead and reduced potential for rollback propagation. We develop an ownership timestamp scheme to tolerate the loss of block state information and develop a passive server model of execution where interactions between processors are considered atomic. With our scheme, dependencies are significantly reduced compared to the traditional message-passing model.

  8. [Old age in primary school readers: a journey through the end of the 19th century to the start of the 21st century in Argentina].

    PubMed

    Oddone, María Julieta

    2013-04-01

    This article presents the content (discourse) analysis of messages transmitted by primary school readers in the period between 1880 to 2012. This study allowed us to explore the image of old age and aging that society has and passes on to new generations as well as the role assigned to this generational group. The historical periods that provide the context for the data were defined according to the continuity of or the turning points in the social values transmitted in the reading materials. The role assigned to elderly people and the image of old age that the Argentine society passed on and continues to pass on to younger generations demonstrate that each period described has its own model of aging.

  9. Changing State Policy in Texas for Remedial/Developmental Education.

    ERIC Educational Resources Information Center

    Cook, Charles M.

    The Texas Academic Skills Program (TASP), implemented in 1989, requires student assessment in reading, writing, and math prior to regular college course work. Students undergo continuous remediation until they are able to pass the assessment test. Though TASP advocates argue that the program helps maintain academic standards and provides students…

  10. Stitching-error reduction in gratings by shot-shifted electron-beam lithography

    NASA Technical Reports Server (NTRS)

    Dougherty, D. J.; Muller, R. E.; Maker, P. D.; Forouhar, S.

    2001-01-01

    Calculations of the grating spatial-frequency spectrum and the filtering properties of multiple-pass electron-beam writing demonstrate a tradeoff between stitching-error suppression and minimum pitch separation. High-resolution measurements of optical-diffraction patterns show a 25-dB reduction in stitching-error side modes.

  11. The Named-State Register File

    DTIC Science & Technology

    1993-08-01

    on the Lempel - Ziv [44] algo- rithm. Zip is compressing a single 8,017 byte file. " RTLSim An register transfer language simulator for the Message...package. gordoni@cs.adelaide.edu.au, Wynn Vale, 5127, Australia, 1.0 edition, October 1991. [44] Ziv J. and Lempel A. "A universal algorithm for...fixed hardware algorithm . Some data caches allow the program to explicitly allocate cache lines [68]. This allocation is only useful in writing new data

  12. Guidance on future art commissioning.

    PubMed

    2009-05-01

    Delegates at Building Better Healthcare's recent "National Patient Environment and the Arts Conference 2009" in London heard how national public arts think tank ixia has appointed Bristol-based arts and wellbeing development agency Willis Newson to write "concise and convincing guidance" on commissioning art for new healthcare facilities. A key message, during a joint presentation, was that integrating artwork into hospitals and other healthcare premises requires the earliest possible consideration to reap the maximum rewards.

  13. Air and Space Power Journal. Volume 22, Number 2, Summer 2008

    DTIC Science & Technology

    2008-01-01

    readers, it connotes and perpetuates an artificial distinction be- tween intelligence personnel and those who conduct operations.8 JP 1-02’s definition...intelligence springs from this legacy. in the industrial-age model, intelli - gence was a massive, personnel-intensive op- eration aimed at supporting...interpret its mean- ing, write a message, deliver it. the intelli - gence cycle was sequential. in an age when airpower itself was artifi- cially

  14. Commanding and Controlling Satellite Clusters (IEEE Intelligent Systems, November/December 2000)

    DTIC Science & Technology

    2000-01-01

    real - time operating system , a message-passing OS well suited for distributed...ground Flight processors ObjectAgent RTOS SCL RTOS RDMS Space command language Real - time operating system Rational database management system TS-21 RDMS...engineer with Princeton Satellite Systems. She is working with others to develop ObjectAgent software to run on the OSE Real Time Operating System .

  15. VAC: Versatile Advection Code

    NASA Astrophysics Data System (ADS)

    Tóth, Gábor; Keppens, Rony

    2012-07-01

    The Versatile Advection Code (VAC) is a freely available general hydrodynamic and magnetohydrodynamic simulation software that works in 1, 2 or 3 dimensions on Cartesian and logically Cartesian grids. VAC runs on any Unix/Linux system with a Fortran 90 (or 77) compiler and Perl interpreter. VAC can run on parallel machines using either the Message Passing Interface (MPI) library or a High Performance Fortran (HPF) compiler.

  16. Sharing Content and Experiences in Smart Environments

    NASA Astrophysics Data System (ADS)

    Plomp, Johan; Heinilä, Juhani; Ikonen, Veikko; Kaasinen, Eija; Välkkynen, Pasi

    Once upon a time… Stories used to be the only way to pass a message. The story teller would take his audience through the events by mere oration. Here and there he would hesitate, whisper, or gesticulate to emphasise his story or induce the right emotions in his audience. No doubt troubadourswere loved, they both brought news of the world as well as entertainment.

  17. Performance of hybrid programming models for multiscale cardiac simulations: preparing for petascale computation.

    PubMed

    Pope, Bernard J; Fitch, Blake G; Pitman, Michael C; Rice, John J; Reumann, Matthias

    2011-10-01

    Future multiscale and multiphysics models that support research into human disease, translational medical science, and treatment can utilize the power of high-performance computing (HPC) systems. We anticipate that computationally efficient multiscale models will require the use of sophisticated hybrid programming models, mixing distributed message-passing processes [e.g., the message-passing interface (MPI)] with multithreading (e.g., OpenMP, Pthreads). The objective of this study is to compare the performance of such hybrid programming models when applied to the simulation of a realistic physiological multiscale model of the heart. Our results show that the hybrid models perform favorably when compared to an implementation using only the MPI and, furthermore, that OpenMP in combination with the MPI provides a satisfactory compromise between performance and code complexity. Having the ability to use threads within MPI processes enables the sophisticated use of all processor cores for both computation and communication phases. Considering that HPC systems in 2012 will have two orders of magnitude more cores than what was used in this study, we believe that faster than real-time multiscale cardiac simulations can be achieved on these systems.

  18. Simulated Raman Spectral Analysis of Organic Molecules

    NASA Astrophysics Data System (ADS)

    Lu, Lu

    The advent of the laser technology in the 1960s solved the main difficulty of Raman spectroscopy, resulted in simplified Raman spectroscopy instruments and also boosted the sensitivity of the technique. Up till now, Raman spectroscopy is commonly used in chemistry and biology. As vibrational information is specific to the chemical bonds, Raman spectroscopy provides fingerprints to identify the type of molecules in the sample. In this thesis, we simulate the Raman Spectrum of organic and inorganic materials by General Atomic and Molecular Electronic Structure System (GAMESS) and Gaussian, two computational codes that perform several general chemistry calculations. We run these codes on our CPU-based high-performance cluster (HPC). Through the message passing interface (MPI), a standardized and portable message-passing system which can make the codes run in parallel, we are able to decrease the amount of time for computation and increase the sizes and capacities of systems simulated by the codes. From our simulations, we will set up a database that allows search algorithm to quickly identify N-H and O-H bonds in different materials. Our ultimate goal is to analyze and identify the spectra of organic matter compositions from meteorites and compared these spectra with terrestrial biologically-produced amino acids and residues.

  19. Petascale computation performance of lightweight multiscale cardiac models using hybrid programming models.

    PubMed

    Pope, Bernard J; Fitch, Blake G; Pitman, Michael C; Rice, John J; Reumann, Matthias

    2011-01-01

    Future multiscale and multiphysics models must use the power of high performance computing (HPC) systems to enable research into human disease, translational medical science, and treatment. Previously we showed that computationally efficient multiscale models will require the use of sophisticated hybrid programming models, mixing distributed message passing processes (e.g. the message passing interface (MPI)) with multithreading (e.g. OpenMP, POSIX pthreads). The objective of this work is to compare the performance of such hybrid programming models when applied to the simulation of a lightweight multiscale cardiac model. Our results show that the hybrid models do not perform favourably when compared to an implementation using only MPI which is in contrast to our results using complex physiological models. Thus, with regards to lightweight multiscale cardiac models, the user may not need to increase programming complexity by using a hybrid programming approach. However, considering that model complexity will increase as well as the HPC system size in both node count and number of cores per node, it is still foreseeable that we will achieve faster than real time multiscale cardiac simulations on these systems using hybrid programming models.

  20. PyPele Rewritten To Use MPI

    NASA Technical Reports Server (NTRS)

    Hockney, George; Lee, Seungwon

    2008-01-01

    A computer program known as PyPele, originally written as a Pythonlanguage extension module of a C++ language program, has been rewritten in pure Python language. The original version of PyPele dispatches and coordinates parallel-processing tasks on cluster computers and provides a conceptual framework for spacecraft-mission- design and -analysis software tools to run in an embarrassingly parallel mode. The original version of PyPele uses SSH (Secure Shell a set of standards and an associated network protocol for establishing a secure channel between a local and a remote computer) to coordinate parallel processing. Instead of SSH, the present Python version of PyPele uses Message Passing Interface (MPI) [an unofficial de-facto standard language-independent application programming interface for message- passing on a parallel computer] while keeping the same user interface. The use of MPI instead of SSH and the preservation of the original PyPele user interface make it possible for parallel application programs written previously for the original version of PyPele to run on MPI-based cluster computers. As a result, engineers using the previously written application programs can take advantage of embarrassing parallelism without need to rewrite those programs.

  1. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    PubMed

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  2. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    PubMed Central

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  3. Streaming data analytics via message passing with application to graph algorithms

    DOE PAGES

    Plimpton, Steven J.; Shead, Tim

    2014-05-06

    The need to process streaming data, which arrives continuously at high-volume in real-time, arises in a variety of contexts including data produced by experiments, collections of environmental or network sensors, and running simulations. Streaming data can also be formulated as queries or transactions which operate on a large dynamic data store, e.g. a distributed database. We describe a lightweight, portable framework named PHISH which enables a set of independent processes to compute on a stream of data in a distributed-memory parallel manner. Datums are routed between processes in patterns defined by the application. PHISH can run on top of eithermore » message-passing via MPI or sockets via ZMQ. The former means streaming computations can be run on any parallel machine which supports MPI; the latter allows them to run on a heterogeneous, geographically dispersed network of machines. We illustrate how PHISH can support streaming MapReduce operations, and describe streaming versions of three algorithms for large, sparse graph analytics: triangle enumeration, subgraph isomorphism matching, and connected component finding. Lastly, we also provide benchmark timings for MPI versus socket performance of several kernel operations useful in streaming algorithms.« less

  4. Teaching Controversial Topics to Skeptical High School Students

    NASA Astrophysics Data System (ADS)

    Ford, K. S.

    2012-12-01

    Tennessee passes the "Monkey Bill" (HB 0368, SB 0893), North Carolina's state government passes a law to criminalize reference in state documents to scientific models that predict sea level rise to reach at least one meter by the next century, and public concern still lags far behind the scientific community's concern on climate change. The American public and even science teachers across the country seem to have lost faith in the ability of the scientific community to unify a strong message about several important scientific lessons, including global warming in particular. This lack of a unified message has weakened the ability of science teachers to effectively teach the lesson of global warming. For science teachers in strongly conservative areas of the country, it is much easier to omit difficult topics and avoid angering parents and school board members. Teachers who do feel strongly about scientifically proven, yet publically controversial topics CAN teach these topics in conservative areas by confirming students' belief systems by being honest and open about motivations surrounding both sides of controversial topics, and by using vocabulary that avoids triggering negative perceptions about these controversial topics. For true learning and change of preconceived opinion to take place, it is important for students to come to the understanding in their own minds in an open and safe learning environment instead of having the message "preached" to them, which only serves to make them feel unintelligent and defensive if they disagree. This presentation will include lessons learned from a practicing science teacher who works in a community that overwhelmingly disputes the validity of human impacts on climate change.

  5. Emergence of acronyms in a community of language users

    NASA Astrophysics Data System (ADS)

    Javarone, Marco Alberto; Armano, Giuliano

    2013-11-01

    Language is a complex system that evolves over time, due to several phenomena. In recent years, new communication media are affecting interpersonal written communication. In particular, mobile phones and internet-based communication media are leading people to use a small number of characters when writing messages. Hence, acronyms or abbreviations are used in most cases. In particular, a mobile phone message is usually composed by short phrases, the social network Twitter only allows 140 characters per message and in many online forums users have limited space for questions and answers. Although the use of acronyms dates back to ancient times, nowadays this type of linguistic sign is gaining prestige. In this work, we study the introduction of acronyms in social systems. In particular, we define a simple game for the purpose of analyzing how the use of an acronym spreads in a population, considering its ability to create a shared meaning. We performed many numerical simulations according to the proposed model, showing the creation of acronyms to be the result of collective dynamics in a population.

  6. Multiplexed Sequence Encoding: A Framework for DNA Communication.

    PubMed

    Zakeri, Bijan; Carr, Peter A; Lu, Timothy K

    2016-01-01

    Synthetic DNA has great propensity for efficiently and stably storing non-biological information. With DNA writing and reading technologies rapidly advancing, new applications for synthetic DNA are emerging in data storage and communication. Traditionally, DNA communication has focused on the encoding and transfer of complete sets of information. Here, we explore the use of DNA for the communication of short messages that are fragmented across multiple distinct DNA molecules. We identified three pivotal points in a communication-data encoding, data transfer & data extraction-and developed novel tools to enable communication via molecules of DNA. To address data encoding, we designed DNA-based individualized keyboards (iKeys) to convert plaintext into DNA, while reducing the occurrence of DNA homopolymers to improve synthesis and sequencing processes. To address data transfer, we implemented a secret-sharing system-Multiplexed Sequence Encoding (MuSE)-that conceals messages between multiple distinct DNA molecules, requiring a combination key to reveal messages. To address data extraction, we achieved the first instance of chromatogram patterning through multiplexed sequencing, thereby enabling a new method for data extraction. We envision these approaches will enable more widespread communication of information via DNA.

  7. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  8. Bad News Has Wings: Dread Risk Mediates Social Amplification in Risk Communication.

    PubMed

    Jagiello, Robert D; Hills, Thomas T

    2018-05-29

    Social diffusion of information amplifies risk through processes of birth, death, and distortion of message content. Dread risk-involving uncontrollable, fatal, involuntary, and catastrophic outcomes (e.g., terrorist attacks and nuclear accidents)-may be particularly susceptible to amplification because of the psychological biases inherent in dread risk avoidance. To test this, initially balanced information about high or low dread topics was given to a set of individuals who then communicated this information through diffusion chains, each person passing a message to the next. A subset of these chains were also reexposed to the original information. We measured prior knowledge, perceived risk before and after transmission, and, at each link, number of positive and negative statements. Results showed that the more a message was transmitted the more negative statements it contained. This was highest for the high dread topic. Increased perceived risk and production of negative messages was closely related to the amount of negative information that was received, with domain knowledge mitigating this effect. Reexposue to the initial information was ineffectual in reducing bias, demonstrating the enhanced danger of socially transmitted information. © 2018 Society for Risk Analysis.

  9. Literacy: Tool for Empowering Women.

    ERIC Educational Resources Information Center

    United Nations, New York, NY. Office of Public Information.

    About two-thirds of the 963 million people in the world who cannot read and write are women, according to the United Nations. Women who are illiterate cannot pass on literacy skills to their children. The United Nations proclaimed 1990 International Literacy Year and conducted conferences for literacy. Education for women and girls was designated…

  10. Lawmakers Take Aim at Bullying

    ERIC Educational Resources Information Center

    Zubrzycki, Jaclyn

    2011-01-01

    The author reports on the issue of bullying that rose on state legislative agendas this year, with 21 states passing anti-bullying laws--some of which expanded schools' responsibilities to keep a check on any harassment that goes on among students. States set out to write clear definitions of bullying and to regulate school policies and…

  11. The Gamer Who Became Me

    ERIC Educational Resources Information Center

    Lobuts, John, Jr.

    2011-01-01

    This autobiography is an attempt to write and share the author's personal story, first as a learner, then as a teacher. It also attempts to share the educational gifts initially bestowed and then passed on from one generation to the next. The writer will talk about how games and simulations were first inherited and learned, then employed in…

  12. Embracing the Exit: Assessment, Trust, and the Teaching of Writing

    ERIC Educational Resources Information Center

    Eng, Joseph

    2006-01-01

    Historically, the Composition Program at Eastern Washington University (EWU), a comprehensive university in Cheney, WA, required a single essay sample from each composition student as the final exit exam; in practice, a student passed or failed the course based on an in-class argumentative essay, written in three consecutive class periods. Such a…

  13. 49 CFR 173.65 - Exceptions for Division 1.4G consumer fireworks.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) The device must pass a thermal stability test. The test must be performed by maintaining the device... thermal stability test; (3) The manufacturer of the Division 1.4G consumer firework applies in writing to... thermal stability test; and (iv) Signed certification declaring that the device for which certification is...

  14. 49 CFR 173.65 - Exceptions for Division 1.4G consumer fireworks.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) The device must pass a thermal stability test. The test must be performed by maintaining the device... thermal stability test; (3) The manufacturer of the Division 1.4G consumer firework applies in writing to... thermal stability test; and (iv) Signed certification declaring that the device for which certification is...

  15. Policy, Procedures and Required Practices Regarding Teacher Evaluations in (Arch)dioceses across the United States

    ERIC Educational Resources Information Center

    Connor, Ann Catherine

    2016-01-01

    The universal foundation of all Catholic Schools is passing on the faith and ensuring high quality academic instruction is provided by qualified Catholic educators. This directive was affirmed in a document entitled, "Renewing our Commitment to Catholic Elementary and Secondary Schools in the Third Millennium," writing, "All…

  16. Passing the Baton: Mentoring for Adoption of Active-Learning Pedagogies by Research-Active Junior Faculty

    ERIC Educational Resources Information Center

    Grimes, Catherine Leimkuhler; White, Harold B., III

    2015-01-01

    There are barriers to adoption of research-based teaching methods. Professional development workshops may inform faculty of these methods, but effective adoption often does not follow. In addition, newly-minted research-active faculty are often overwhelmed by the many new responsibilities (grant writing, group management, laboratory setup,…

  17. Narrative Nonfiction: A Writer Reflects on Writing Real Stories

    ERIC Educational Resources Information Center

    Hakim, Joy

    2016-01-01

    More than a decade has passed since "American Educator" featured the work of Joy Hakim, a writer whose nonfictional accounts of history and science have long fascinated students and teachers alike. With the advent of the Common Core State Standards, and their strong emphasis on nonfiction, Hakim's accounts may prove useful to educators…

  18. Ohio Proficiency Tests for Grade 12. Practice Test.

    ERIC Educational Resources Information Center

    Ohio State Dept. of Education, Columbus.

    High school seniors in Ohio who have passed all parts of the ninth-grade proficiency tests are required to take the twelfth-grade proficiency tests. These tests, in writing, reading, mathematics, citizenship, and science, are designed to measure twelfth-grade performance and to evaluate the learning that goes on between the minimum competencies of…

  19. Charter School Contracts. Policy Guide

    ERIC Educational Resources Information Center

    Cass, Rebecca

    2009-01-01

    The charter school concept was first introduced in 1991 when the Minnesota Legislature passed the nation's first charter school law. As of this writing in 2009, 40 states and the District of Columbia have charter school legislation. While the specific characteristics and nuances of these laws vary from state to state, almost every state law…

  20. Implementation and Evaluation of the Course Dossier Methodology

    ERIC Educational Resources Information Center

    Khanam, Wahidun N.; Kalman, Calvin S.

    2017-01-01

    It has been argued that for novice students to acquire a full understanding of scientific texts, they also need to pursue a recurrent construction of their comprehension of scientific concepts. The course dossier method has students examine concepts in multiple passes: (a) through reflective writing on text before it is considered in the…

  1. Information and the Origin of Qualia

    PubMed Central

    Orpwood, Roger

    2017-01-01

    This article argues that qualia are a likely outcome of the processing of information in local cortical networks. It uses an information-based approach and makes a distinction between information structures (the physical embodiment of information in the brain, primarily patterns of action potentials), and information messages (the meaning of those structures to the brain, and the basis of qualia). It develops formal relationships between these two kinds of information, showing how information structures can represent messages, and how information messages can be identified from structures. The article applies this perspective to basic processing in cortical networks or ensembles, showing how networks can transform between the two kinds of information. The article argues that an input pattern of firing is identified by a network as an information message, and that the output pattern of firing generated is a representation of that message. If a network is encouraged to develop an attractor state through attention or other re-entrant processes, then the message identified each time physical information is cycled through the network becomes “representation of the previous message”. Using an example of olfactory perception, it is shown how this piggy-backing of messages on top of previous messages could lead to olfactory qualia. The message identified on each pass of information could evolve from inner identity, to inner form, to inner likeness or image. The outcome is an olfactory quale. It is shown that the same outcome could result from information cycled through a hierarchy of networks in a resonant state. The argument for qualia generation is applied to other sensory modalities, showing how, through a process of brain-wide constraint satisfaction, a particular state of consciousness could develop at any given moment. Evidence for some of the key predictions of the theory is presented, using ECoG data and studies of gamma oscillations and attractors, together with an outline of what further evidence is needed to provide support for the theory. PMID:28484376

  2. Software Writing Skills for Your Research - Lessons Learned from Workshops in the Geosciences

    NASA Astrophysics Data System (ADS)

    Hammitzsch, Martin

    2016-04-01

    Findings presented in scientific papers are based on data and software. Once in a while they come along with data - but not commonly with software. However, the software used to gain findings plays a crucial role in the scientific work. Nevertheless, software is rarely seen publishable. Thus researchers may not reproduce the findings without the software which is in conflict with the principle of reproducibility in sciences. For both, the writing of publishable software and the reproducibility issue, the quality of software is of utmost importance. For many programming scientists the treatment of source code, e.g. with code design, version control, documentation, and testing is associated with additional work that is not covered in the primary research task. This includes the adoption of processes following the software development life cycle. However, the adoption of software engineering rules and best practices has to be recognized and accepted as part of the scientific performance. Most scientists have little incentive to improve code and do not publish code because software engineering habits are rarely practised by researchers or students. Software engineering skills are not passed on to followers as for paper writing skill. Thus it is often felt that the software or code produced is not publishable. The quality of software and its source code has a decisive influence on the quality of research results obtained and their traceability. So establishing best practices from software engineering to serve scientific needs is crucial for the success of scientific software. Even though scientists use existing software and code, i.e., from open source software repositories, only few contribute their code back into the repositories. So writing and opening code for Open Science means that subsequent users are able to run the code, e.g. by the provision of sufficient documentation, sample data sets, tests and comments which in turn can be proven by adequate and qualified reviews. This assumes that scientist learn to write and release code and software as they learn to write and publish papers. Having this in mind, software could be valued and assessed as a contribution to science. But this requires the relevant skills that can be passed to colleagues and followers. Therefore, the GFZ German Research Centre for Geosciences performed three workshops in 2015 to address the passing of software writing skills to young scientists, the next generation of researchers in the Earth, planetary and space sciences. Experiences in running these workshops and the lessons learned will be summarized in this presentation. The workshops have received support and funding by Software Carpentry, a volunteer organization whose goal is to make scientists more productive, and their work more reliable, by teaching them basic computing skills, and by FOSTER (Facilitate Open Science Training for European Research), a two-year, EU-Funded (FP7) project, whose goal to produce a European-wide training programme that will help to incorporate Open Access approaches into existing research methodologies and to integrate Open Science principles and practice in the current research workflow by targeting the young researchers and other stakeholders.

  3. Software architecture for time-constrained machine vision applications

    NASA Astrophysics Data System (ADS)

    Usamentiaga, Rubén; Molleda, Julio; García, Daniel F.; Bulnes, Francisco G.

    2013-01-01

    Real-time image and video processing applications require skilled architects, and recent trends in the hardware platform make the design and implementation of these applications increasingly complex. Many frameworks and libraries have been proposed or commercialized to simplify the design and tuning of real-time image processing applications. However, they tend to lack flexibility, because they are normally oriented toward particular types of applications, or they impose specific data processing models such as the pipeline. Other issues include large memory footprints, difficulty for reuse, and inefficient execution on multicore processors. We present a novel software architecture for time-constrained machine vision applications that addresses these issues. The architecture is divided into three layers. The platform abstraction layer provides a high-level application programming interface for the rest of the architecture. The messaging layer provides a message-passing interface based on a dynamic publish/subscribe pattern. A topic-based filtering in which messages are published to topics is used to route the messages from the publishers to the subscribers interested in a particular type of message. The application layer provides a repository for reusable application modules designed for machine vision applications. These modules, which include acquisition, visualization, communication, user interface, and data processing, take advantage of the power of well-known libraries such as OpenCV, Intel IPP, or CUDA. Finally, the proposed architecture is applied to a real machine vision application: a jam detector for steel pickling lines.

  4. Clandestine Message Passing in Virtual Environments

    DTIC Science & Technology

    2008-09-01

    accessed April 4, 2008). Weir, Laila. “Boring Game? Outsorce It.” (August 24, 2004). http://www.wired.com/ entertainment / music /news/2004/08/ 64638...Multiplayer Online MOVES - Modeling Virtual Environments and Simulation MTV – Music Television NPS - Naval Postgraduate School PAN – Personal Area...Network PSP - PlayStation Portable RPG – Role-playing Game SL - Second Life SVN - Subversion VE – Virtual Environments vMTV – Virtual Music

  5. An Ode to Stuart Hall's "The Supply of Demand": The Case of Post-Secondary Education in Ontario Fifty Years Later

    ERIC Educational Resources Information Center

    FitzGerald Murphy, Maggie

    2016-01-01

    Despite the fact that over fifty years have passed since its publication, Stuart Hall's article "The Supply of Demand" (1960), is remarkably relevant today. The central message that society must not be blinded by "prosperity" such that it no longer envisions and demands a better world is especially pertinent in light of the…

  6. The Guardian. Volume 9, Number 3, Winter 2007

    DTIC Science & Technology

    2007-01-01

    message correctly. Muslims will ultimately determine whether the ideology of al Qaeda, its affiliates, franchisees , and fellow travelers represents...opined that the effort would not work or would not pass the cost– benefit comparison. Others wanted to develop comprehensive NATO doctrine to guide...full BAT capability, the access-control benefits of BAT/HIIDE are a significant improvement to overall ISAF force protection, even in stand-alone mode

  7. PETSc Users Manual Revision 3.7

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Balay, Satish; Abhyankar, S.; Adams, M.

    This manual describes the use of PETSc for the numerical solution of partial differential equations and related problems on high-performance computers. The Portable, Extensible Toolkit for Scientific Computation (PETSc) is a suite of data structures and routines that provide the building blocks for the implementation of large-scale application codes on parallel (and serial) computers. PETSc uses the MPI standard for all message-passing communication.

  8. PETSc Users Manual Revision 3.8

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Balay, S.; Abhyankar, S.; Adams, M.

    This manual describes the use of PETSc for the numerical solution of partial differential equations and related problems on high-performance computers. The Portable, Extensible Toolkit for Scientific Computation (PETSc) is a suite of data structures and routines that provide the building blocks for the implementation of large-scale application codes on parallel (and serial) computers. PETSc uses the MPI standard for all message-passing communication.

  9. Statistical Inference in Graphical Models

    DTIC Science & Technology

    2008-06-17

    fuse probability theory and graph theory in such a way as to permit efficient rep- resentation and computation with probability distributions. They...message passing. 59 viii 1. INTRODUCTION In approaching real-world problems, we often need to deal with uncertainty. Probability and statis- tics provide a...dynamic programming methods. However, for many sensors of interest, the signal-to-noise ratio does not allow such a treatment. Another source of

  10. Teaching Margery and Julian in Anthology-Based Survey Courses

    ERIC Educational Resources Information Center

    Petersen, Zina

    2006-01-01

    Recognizing that many of us teach the medieval English women mystics Margery Kempe and Julian of Norwich in survey courses, this essay attempts to put these writers in context for teachers who may have only a passing familiarity with the period. Focusing on passages of their writings found in the Longman and Norton anthologies of British…

  11. Selected Key Factors that Contributed to Student Success on the California High School Exit Exam

    ERIC Educational Resources Information Center

    Allen, Michelle O.

    2009-01-01

    The California High School Exit Exam (CAHSEE) was developed to ensure that graduating students can demonstrate competency in reading, math, and writing. The high failure rates have created concern among stakeholders. The study was to identify factors that contributed to student success on passing the CAHSEE for students enrolled in SIATech in…

  12. 76 FR 35271 - Toyota Motor Corporation, Inc., on Behalf of Toyota Corporation, and Toyota Manufacturing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-16

    ..., symbols or pictograms are used, their meaning is explained to the consumer in writing, such as in the... vertical transverse and horizontal longitudinal planes intersecting at the horizontal centerline of each... longitudinal plane that passes through the center of the bar ( 25 mm); (4) The circle may be on a tag...

  13. FBI Attempt to Screen Archive Prompts Fears: Journalist's Family Wants to Block Search of Papers Held by University

    ERIC Educational Resources Information Center

    Carlson, Scott

    2006-01-01

    During his life and career as a muckraking journalist in Washington, Jack Anderson cultivated secret sources throughout the halls of government--sources who passed on information that allowed Anderson to investigate and write about Watergate, CIA assassination schemes, and countless scandals. His syndicated column, Washington Merry-Go-Round,…

  14. A flexible software architecture for scalable real-time image and video processing applications

    NASA Astrophysics Data System (ADS)

    Usamentiaga, Rubén; Molleda, Julio; García, Daniel F.; Bulnes, Francisco G.

    2012-06-01

    Real-time image and video processing applications require skilled architects, and recent trends in the hardware platform make the design and implementation of these applications increasingly complex. Many frameworks and libraries have been proposed or commercialized to simplify the design and tuning of real-time image processing applications. However, they tend to lack flexibility because they are normally oriented towards particular types of applications, or they impose specific data processing models such as the pipeline. Other issues include large memory footprints, difficulty for reuse and inefficient execution on multicore processors. This paper presents a novel software architecture for real-time image and video processing applications which addresses these issues. The architecture is divided into three layers: the platform abstraction layer, the messaging layer, and the application layer. The platform abstraction layer provides a high level application programming interface for the rest of the architecture. The messaging layer provides a message passing interface based on a dynamic publish/subscribe pattern. A topic-based filtering in which messages are published to topics is used to route the messages from the publishers to the subscribers interested in a particular type of messages. The application layer provides a repository for reusable application modules designed for real-time image and video processing applications. These modules, which include acquisition, visualization, communication, user interface and data processing modules, take advantage of the power of other well-known libraries such as OpenCV, Intel IPP, or CUDA. Finally, we present different prototypes and applications to show the possibilities of the proposed architecture.

  15. Illness and Internet empowerment: writing and reading breast cancer in cyberspace.

    PubMed

    Pitts, Victoria

    2004-01-01

    The Internet is now a site where women with breast cancer both read and write about the illness, and in doing so negotiate identity and definitions of situation in disembodied space. Cyberspace has been imagined as a liberatory realm where women can transgress gender roles, invent selves and create new forms of knowledge. This study explores the personal web pages of women with breast cancer with an interest in exploring the issue of 'cyber-agency' or empowerment in cyberspace. I suggest here that women's web pages might offer potentially critical opportunities for women's knowledge-making in relation to what are often highly political aspects of the body, gender and illness. However, the Internet is not an inherently empowering technology, and it can be a medium for affirming norms of femininity, consumerism, individualism and other powerful social messages.

  16. Can Anonymous Posters on Medical Forums be Reidentified?

    PubMed Central

    Bobicev, Victoria; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-01-01

    Background Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. Objective The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. Methods The messages were labeled by nicknames of the forum participants. We evaluated the system’s performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Results Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Conclusions Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being determined. PMID:24091380

  17. Evaluation Metrics for the Paragon XP/S-15

    NASA Technical Reports Server (NTRS)

    Traversat, Bernard; McNab, David; Nitzberg, Bill; Fineberg, Sam; Blaylock, Bruce T. (Technical Monitor)

    1993-01-01

    On February 17th 1993, the Numerical Aerodynamic Simulation (NAS) facility located at the NASA Ames Research Center installed a 224 node Intel Paragon XP/S-15 system. After its installation, the Paragon was found to be in a very immature state and was unable to support a NAS users' workload, composed of a wide range of development and production activities. As a first step towards addressing this problem, we implemented a set of metrics to objectively monitor the system as operating system and hardware upgrades were installed. The metrics were designed to measure four aspects of the system that we consider essential to support our workload: availability, utilization, functionality, and performance. This report presents the metrics collected from February 1993 to August 1993. Since its installation, the Paragon availability has improved from a low of 15% uptime to a high of 80%, while its utilization has remained low. Functionality and performance have improved from merely running one of the NAS Parallel Benchmarks to running all of them faster (between 1 and 2 times) than on the iPSC/860. In spite of the progress accomplished, fundamental limitations of the Paragon operating system are restricting the Paragon from supporting the NAS workload. The maximum operating system message passing (NORMA IPC) bandwidth was measured at 11 Mbytes/s, well below the peak hardware bandwidth (175 Mbytes/s), limiting overall virtual memory and Unix services (i.e. Disk and HiPPI I/O) performance. The high NX application message passing latency (184 microns), three times than on the iPSC/860, was found to significantly degrade performance of applications relying on small message sizes. The amount of memory available for an application was found to be approximately 10 Mbytes per node, indicating that the OS is taking more space than anticipated (6 Mbytes per node).

  18. Science and the art of case reporting in medicine.

    PubMed

    Pramono, Laurentius A

    2013-10-01

    The case report is one type of article published in medical journals. Not all case reports can be published. Case reports worth publishing are case reports that have good teaching points and good clinical messages. Writing case reports need academic and clinical skills, along with a taste of art to interest readers to read and study about the case we report. Case reports are expected to be a good tool to all clinicians to build their clinical reasoning and sharpen their clinical instincts.

  19. Choosing the Right Journal for a Scientific Paper.

    PubMed

    Bavdekar, Sandeep B; Save, Sushma

    2015-06-01

    Authors need to take the crucial decision of choosing the journal for their prospective manuscript before even starting to write it. Although, this choice is influenced by many factors, matching the intended recipients of the main message of the manuscript with a journal's readership should override all other consideration in journal selection. That done, availability of time-bound review process,journal's visibility, indexation in databases, regularity of publication, acceptance rate and expenses involved are some other factors that will help decide the choice.

  20. The Army and the Academy as Textual Communities: Exploring Mismatches in the Concepts of Attribution, Appropriation, and Shared Goals

    DTIC Science & Technology

    2010-01-01

    writing manual, Student Text 22-1, provides information on plagiarism violations, which are "subject to review and may be referred to an academic board...charges of plagiarism were leveled by an academic who recognized in the manual various ideas and text from previous published sources. In many ways...worried about academic plagiarism may believe that revealing variations in textual practices "sends a message" to students that rules can be bent in

  1. Saguaro: A Distributed Operating System Based on Pools of Servers.

    DTIC Science & Technology

    1988-03-25

    asynchronous message passing, multicast, and semaphores are supported. We have found this flexibility to be very useful for distributed programming. The...variety of communication primitives provided by SR has facilitated the research of Stella Atkins, who was a visiting professor at Arizona during Spring...data bits in a raw communication channel to help keep the source and destination synchronized , Psync explicitly embeds timing information drawn from the

  2. Parallel Ray Tracing Using the Message Passing Interface

    DTIC Science & Technology

    2007-09-01

    software is available for lens design and for general optical systems modeling. It tends to be designed to run on a single processor and can be very...Cameron, Senior Member, IEEE Abstract—Ray-tracing software is available for lens design and for general optical systems modeling. It tends to be designed to...National Aeronautics and Space Administration (NASA), optical ray tracing, parallel computing, parallel pro- cessing, prime numbers, ray tracing

  3. High-performance computing — an overview

    NASA Astrophysics Data System (ADS)

    Marksteiner, Peter

    1996-08-01

    An overview of high-performance computing (HPC) is given. Different types of computer architectures used in HPC are discussed: vector supercomputers, high-performance RISC processors, various parallel computers like symmetric multiprocessors, workstation clusters, massively parallel processors. Software tools and programming techniques used in HPC are reviewed: vectorizing compilers, optimization and vector tuning, optimization for RISC processors; parallel programming techniques like shared-memory parallelism, message passing and data parallelism; and numerical libraries.

  4. Control Transfer in Operating System Kernels

    DTIC Science & Technology

    1994-05-13

    microkernel system that runs less code in the kernel address space. To realize the performance benefit of allocating stacks in unmapped kseg0 memory, the...review how I modified the Mach 3.0 kernel to use continuations. Because of Mach’s message-passing microkernel structure, interprocess communication was...critical control transfer paths, deeply- nested call chains are undesirable in any case because of the function call overhead. 4.1.3 Microkernel Operating

  5. A bill to clarify the health care provided by the Secretary of Veterans Affairs that constitutes minimum essential coverage.

    THOMAS, 111th Congress

    Sen. Akaka, Daniel K. [D-HI

    2010-03-24

    Senate - 09/23/2010 Message received in the Senate: Returned to the Senate pursuant to the provisions of H.Res. 1653. (All Actions) Notes: For further action, see H.R.5014, which became Public Law 111-173 on 5/27/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  6. Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol

    DTIC Science & Technology

    2011-06-01

    use in a quantum key system can be defined in two ways :  The number of messages passed between Alice and Bob  The...classical and quantum environment. Post- quantum cryptography , which is generally used to describe classical quantum -resilient protocols, includes...composed of a one- way quantum channel and a two - way classical channel. Owing to the physics of the channel, the quantum channel is subject to

  7. FPGA implementation of low complexity LDPC iterative decoder

    NASA Astrophysics Data System (ADS)

    Verma, Shivani; Sharma, Sanjay

    2016-07-01

    Low-density parity-check (LDPC) codes, proposed by Gallager, emerged as a class of codes which can yield very good performance on the additive white Gaussian noise channel as well as on the binary symmetric channel. LDPC codes have gained lots of importance due to their capacity achieving property and excellent performance in the noisy channel. Belief propagation (BP) algorithm and its approximations, most notably min-sum, are popular iterative decoding algorithms used for LDPC and turbo codes. The trade-off between the hardware complexity and the decoding throughput is a critical factor in the implementation of the practical decoder. This article presents introduction to LDPC codes and its various decoding algorithms followed by realisation of LDPC decoder by using simplified message passing algorithm and partially parallel decoder architecture. Simplified message passing algorithm has been proposed for trade-off between low decoding complexity and decoder performance. It greatly reduces the routing and check node complexity of the decoder. Partially parallel decoder architecture possesses high speed and reduced complexity. The improved design of the decoder possesses a maximum symbol throughput of 92.95 Mbps and a maximum of 18 decoding iterations. The article presents implementation of 9216 bits, rate-1/2, (3, 6) LDPC decoder on Xilinx XC3D3400A device from Spartan-3A DSP family.

  8. "Some convincing arguments to pass back to nervous customers": the role of the tobacco retailer in the Australian tobacco industry's smoker reassurance campaign 1950-1978.

    PubMed

    Tofler, A; Chapman, S

    2003-12-01

    Epidemiological studies and reports on smoking and health published in the 1950s and 1960s threatened the tobacco industry worldwide, which acted to reassure smokers and counteract mounting evidence that smoking posed a serious risk to smokers' health. To document the use of tobacco retailers (1) as a conduit to pass messages of reassurance onto smokers, and (2) to recruit youth and women into smoking. Review of an extensive collection of Australian tobacco retail trade journals (1950-1978) for articles consistent with the industry's efforts to counter messages about smoking and health, and how to attract non-smokers, particularly youth and women. The main arguments advanced in the journals included the notion that air pollution and other substances cause cancer, that "statistics" did not constitute proof in the tobacco health scare, and that the industry was committed to research into the causes of cancer and into developing a "safer" cigarette. Numerous articles designed to be reiterated to customers were published, arguing against the link between tobacco and ill health. Tobacco retailers, salesmen and retail trade organisations played a significant role in dissembling the tobacco health nexus. Tobacco retail journals may be an important component in tobacco industry misinformation strategies.

  9. A Bayesian Model for Highly Accelerated Phase-Contrast MRI

    PubMed Central

    Rich, Adam; Potter, Lee C.; Jin, Ning; Ash, Joshua; Simonetti, Orlando P.; Ahmad, Rizwan

    2015-01-01

    Purpose Phase-contrast magnetic resonance imaging (PC-MRI) is a noninvasive tool to assess cardiovascular disease by quantifying blood flow; however, low data acquisition efficiency limits the spatial and temporal resolutions, real-time application, and extensions to 4D flow imaging in clinical settings. We propose a new data processing approach called Reconstructing Velocity Encoded MRI with Approximate message passing aLgorithms (ReVEAL) that accelerates the acquisition by exploiting data structure unique to PC-MRI. Theory and Methods ReVEAL models physical correlations across space, time, and velocity encodings. The proposed Bayesian approach exploits the relationships in both magnitude and phase among velocity encodings. A fast iterative recovery algorithm is introduced based on message passing. For validation, prospectively undersampled data are processed from a pulsatile flow phantom and five healthy volunteers. Results ReVEAL is in good agreement, quantified by peak velocity and stroke volume (SV), with reference data for acceleration rates R ≤ 10. For SV, Pearson r ≥ 0.996 for phantom imaging (n = 24) and r ≥ 0.956 for prospectively accelerated in vivo imaging (n = 10) for R ≤ 10. Conclusion ReVEAL enables accurate quantification of blood flow from highly undersampled data. The technique is extensible to 4D flow imaging, where higher acceleration may be possible due to additional redundancy. PMID:26444911

  10. EMPIRE and pyenda: Two ensemble-based data assimilation systems written in Fortran and Python

    NASA Astrophysics Data System (ADS)

    Geppert, Gernot; Browne, Phil; van Leeuwen, Peter Jan; Merker, Claire

    2017-04-01

    We present and compare the features of two ensemble-based data assimilation frameworks, EMPIRE and pyenda. Both frameworks allow to couple models to the assimilation codes using the Message Passing Interface (MPI), leading to extremely efficient and fast coupling between models and the data-assimilation codes. The Fortran-based system EMPIRE (Employing Message Passing Interface for Researching Ensembles) is optimized for parallel, high-performance computing. It currently includes a suite of data assimilation algorithms including variants of the ensemble Kalman and several the particle filters. EMPIRE is targeted at models of all kinds of complexity and has been coupled to several geoscience models, eg. the Lorenz-63 model, a barotropic vorticity model, the general circulation model HadCM3, the ocean model NEMO, and the land-surface model JULES. The Python-based system pyenda (Python Ensemble Data Assimilation) allows Fortran- and Python-based models to be used for data assimilation. Models can be coupled either using MPI or by using a Python interface. Using Python allows quick prototyping and pyenda is aimed at small to medium scale models. pyenda currently includes variants of the ensemble Kalman filter and has been coupled to the Lorenz-63 model, an advection-based precipitation nowcasting scheme, and the dynamic global vegetation model JSBACH.

  11. A practical approach to portability and performance problems on massively parallel supercomputers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beazley, D.M.; Lomdahl, P.S.

    1994-12-08

    We present an overview of the tactics we have used to achieve a high-level of performance while improving portability for a large-scale molecular dynamics code SPaSM. SPaSM was originally implemented in ANSI C with message passing for the Connection Machine 5 (CM-5). In 1993, SPaSM was selected as one of the winners in the IEEE Gordon Bell Prize competition for sustaining 50 Gflops on the 1024 node CM-5 at Los Alamos National Laboratory. Achieving this performance on the CM-5 required rewriting critical sections of code in CDPEAC assembler language. In addition, the code made extensive use of CM-5 parallel I/Omore » and the CMMD message passing library. Given this highly specialized implementation, we describe how we have ported the code to the Cray T3D and high performance workstations. In addition we will describe how it has been possible to do this using a single version of source code that runs on all three platforms without sacrificing any performance. Sound too good to be true? We hope to demonstrate that one can realize both code performance and portability without relying on the latest and greatest prepackaged tool or parallelizing compiler.« less

  12. Toward Abstracting the Communication Intent in Applications to Improve Portability and Productivity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mintz, Tiffany M; Hernandez, Oscar R; Kartsaklis, Christos

    Programming with communication libraries such as the Message Passing Interface (MPI) obscures the high-level intent of the communication in an application and makes static communication analysis difficult to do. Compilers are unaware of communication libraries specifics, leading to the exclusion of communication patterns from any automated analysis and optimizations. To overcome this, communication patterns can be expressed at higher-levels of abstraction and incrementally added to existing MPI applications. In this paper, we propose the use of directives to clearly express the communication intent of an application in a way that is not specific to a given communication library. Our communicationmore » directives allow programmers to express communication among processes in a portable way, giving hints to the compiler on regions of computations that can be overlapped with communication and relaxing communication constraints on the ordering, completion and synchronization of the communication imposed by specific libraries such as MPI. The directives can then be translated by the compiler into message passing calls that efficiently implement the intended pattern and be targeted to multiple communication libraries. Thus far, we have used the directives to express point-to-point communication patterns in C, C++ and Fortran applications, and have translated them to MPI and SHMEM.« less

  13. A new control system hardware architecture for the Hobby-Eberly Telescope prime focus instrument package

    NASA Astrophysics Data System (ADS)

    Ramiller, Chuck; Taylor, Trey; Rafferty, Tom H.; Cornell, Mark E.; Rafal, Marc; Savage, Richard

    2010-07-01

    The Hobby-Eberly Telescope (HET) will be undergoing a major upgrade as a precursor to the HET Dark Energy Experiment (HETDEX‡). As part of this upgrade, the Prime Focus Instrument Package (PFIP) will be replaced with a new design that supports the HETDEX requirements along with the existing suite of instruments and anticipated future additions. This paper describes the new PFIP control system hardware plus the physical constraints and other considerations driving its design. Because of its location at the top end of the telescope, the new PFIP is essentially a stand-alone remote automation island containing over a dozen subsystems. Within the PFIP, motion controllers and modular IO systems are interconnected using a local Controller Area Network (CAN) bus and the CANOpen messaging protocol. CCD cameras that are equipped only with USB 2.0 interfaces are connected to a local Ethernet network via small microcontroller boards running embedded Linux. Links to ground-level systems pass through a 100 m cable bundle and use Ethernet over fiber optic cable exclusively; communications are either direct or through Ethernet/CAN gateways that pass CANOpen messages transparently. All of the control system hardware components are commercially available, designed for rugged industrial applications, and rated for extended temperature operation down to -10 °C.

  14. Compiling global name-space programs for distributed execution

    NASA Technical Reports Server (NTRS)

    Koelbel, Charles; Mehrotra, Piyush

    1990-01-01

    Distributed memory machines do not provide hardware support for a global address space. Thus programmers are forced to partition the data across the memories of the architecture and use explicit message passing to communicate data between processors. The compiler support required to allow programmers to express their algorithms using a global name-space is examined. A general method is presented for analysis of a high level source program and along with its translation to a set of independently executing tasks communicating via messages. If the compiler has enough information, this translation can be carried out at compile-time. Otherwise run-time code is generated to implement the required data movement. The analysis required in both situations is described and the performance of the generated code on the Intel iPSC/2 is presented.

  15. The Raid distributed database system

    NASA Technical Reports Server (NTRS)

    Bhargava, Bharat; Riedl, John

    1989-01-01

    Raid, a robust and adaptable distributed database system for transaction processing (TP), is described. Raid is a message-passing system, with server processes on each site to manage concurrent processing, consistent replicated copies during site failures, and atomic distributed commitment. A high-level layered communications package provides a clean location-independent interface between servers. The latest design of the package delivers messages via shared memory in a configuration with several servers linked into a single process. Raid provides the infrastructure to investigate various methods for supporting reliable distributed TP. Measurements on TP and server CPU time are presented, along with data from experiments on communications software, consistent replicated copy control during site failures, and concurrent distributed checkpointing. A software tool for evaluating the implementation of TP algorithms in an operating-system kernel is proposed.

  16. Plasma Physics Calculations on a Parallel Macintosh Cluster

    NASA Astrophysics Data System (ADS)

    Decyk, Viktor; Dauger, Dean; Kokelaar, Pieter

    2000-03-01

    We have constructed a parallel cluster consisting of 16 Apple Macintosh G3 computers running the MacOS, and achieved very good performance on numerically intensive, parallel plasma particle-in-cell simulations. A subset of the MPI message-passing library was implemented in Fortran77 and C. This library enabled us to port code, without modification, from other parallel processors to the Macintosh cluster. For large problems where message packets are large and relatively few in number, performance of 50-150 MFlops/node is possible, depending on the problem. This is fast enough that 3D calculations can be routinely done. Unlike Unix-based clusters, no special expertise in operating systems is required to build and run the cluster. Full details are available on our web site: http://exodus.physics.ucla.edu/appleseed/.

  17. Plasma Physics Calculations on a Parallel Macintosh Cluster

    NASA Astrophysics Data System (ADS)

    Decyk, Viktor K.; Dauger, Dean E.; Kokelaar, Pieter R.

    We have constructed a parallel cluster consisting of 16 Apple Macintosh G3 computers running the MacOS, and achieved very good performance on numerically intensive, parallel plasma particle-in-cell simulations. A subset of the MPI message-passing library was implemented in Fortran77 and C. This library enabled us to port code, without modification, from other parallel processors to the Macintosh cluster. For large problems where message packets are large and relatively few in number, performance of 50-150 Mflops/node is possible, depending on the problem. This is fast enough that 3D calculations can be routinely done. Unlike Unix-based clusters, no special expertise in operating systems is required to build and run the cluster. Full details are available on our web site: http://exodus.physics.ucla.edu/appleseed/.

  18. Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies

    PubMed Central

    Uhlemann, Elisabeth

    2018-01-01

    Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications. PMID:29570676

  19. Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies.

    PubMed

    Balador, Ali; Uhlemann, Elisabeth; Calafate, Carlos T; Cano, Juan-Carlos

    2018-03-23

    Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.

  20. Assessing clarity of message communication for mandated USEPA drinking water quality reports.

    PubMed

    Phetxumphou, Katherine; Roy, Siddhartha; Davy, Brenda M; Estabrooks, Paul A; You, Wen; Dietrich, Andrea M

    2016-04-01

    The United States Environmental Protection Agency mandates that community water systems (CWSs), or drinking water utilities, provide annual consumer confidence reports (CCRs) reporting on water quality, compliance with regulations, source water, and consumer education. While certain report formats are prescribed, there are no criteria ensuring that consumers understand messages in these reports. To assess clarity of message, trained raters evaluated a national sample of 30 CCRs using the Centers for Disease Control Clear Communication Index (Index) indices: (1) Main Message/Call to Action; (2) Language; (3) Information Design; (4) State of the Science; (5) Behavioral Recommendations; (6) Numbers; and (7) Risk. Communication materials are considered qualifying if they achieve a 90% Index score. Overall mean score across CCRs was 50 ± 14% and none scored 90% or higher. CCRs did not differ significantly by water system size. State of the Science (3 ± 15%) and Behavioral Recommendations (77 ± 36%) indices were the lowest and highest, respectively. Only 63% of CCRs explicitly stated if the water was safe to drink according to federal and state standards and regulations. None of the CCRs had passing Index scores, signaling that CWSs are not effectively communicating with their consumers; thus, the Index can serve as an evaluation tool for CCR effectiveness and a guide to improve water quality communications.

  1. The Physical Therapy and Society Summit (PASS) Meeting: observations and opportunities.

    PubMed

    Kigin, Colleen M; Rodgers, Mary M; Wolf, Steven L

    2010-11-01

    The construct of delivering high-quality and cost-effective health care is in flux, and the profession must strategically plan how to meet the needs of society. In 2006, the House of Delegates of the American Physical Therapy Association passed a motion to convene a summit on "how physical therapists can meet current, evolving, and future societal health care needs." The Physical Therapy and Society Summit (PASS) meeting on February 27-28, 2009, in Leesburg, Virginia, sent a clear message that for physical therapists to be effective and thrive in the health care environment of the future, a paradigm shift is required. During the PASS meeting, participants reframed our traditional focus on the physical therapist and the patient/client (consumer) to one in which physical therapists are an integral part of a collaborative, multidisciplinary health care team with the health care consumer as its focus. The PASS Steering Committee recognized that some of the opportunities that surfaced during the PASS meeting may be disruptive or may not be within the profession's present strategic or tactical plans. Thus, adopting a framework that helps to establish the need for change that is provocative and potentially disruptive to our present care delivery, yet prioritizes opportunities, is a critical and essential step. Each of us in the physical therapy profession must take on post-PASS roles and responsibilities to accomplish the systemic change that is so intimately intertwined with our destiny. This article offers a perspective of the dynamic dialogue and suggestions that emerged from the PASS event, providing further opportunities for discussion and action within our profession.

  2. The evaluation of a peer-led question-writing task.

    PubMed

    Nwosu, Amara; Mason, Stephen; Roberts, Anita; Hugel, Heino

    2013-06-01

      Novel studies have previously highlighted the educational benefits of peer-led learning and peer marking of examinations. Limited data exist about the educational value of students writing their own exam questions and sharing these with other students.   To evaluate the potential for medical students to learn about palliative care through the process of writing examination questions. methods:  Fourth-year medical students on a palliative medicine rotation were invited to write a short-answer exam question in a similar format to the official examination run by the medical school. The questions were checked for accuracy and applicability by the coordinator, and were then distributed to students. The answers to the student-generated questions were discussed in a feedback forum at the end of the rotation.   Twenty students took part in the exercise. All agreed the exercise was beneficial to their learning. Eighteen (90%) students did not feel the task was too much additional work. Eight (40%) students felt more confident in passing the official medical school exams. Students enjoyed the exercise, with 19 (95%) indicating that they were keen to repeat this in the future.   Peer-led examination question writing could complement the delivery of palliative care teaching for medical students. © 2013 John Wiley & Sons Ltd.

  3. Open-mindedness can decrease persuasion amongst adolescents: the role of self-affirmation.

    PubMed

    Good, Anna; Harris, Peter R; Jessop, Donna; Abraham, Charles

    2015-05-01

    Self-affirmation (e.g., by reflecting on important personal values) has been found to promote more open-minded appraisal of threatening health messages in at-risk adults. However, it is unclear how self-affirmation affects adolescents and whether it has differential effects on the impact of these messages amongst those at relatively lower and higher risk. The current study explored moderation by risk. Participants were randomly assigned to either a self-affirmation or a control condition before receiving a health message concerning physical activity. Older adolescents (N = 125) completed a self-affirmation or control writing task before reading about the health consequences of not meeting recommendations to be physically active for at least 60 min daily. Most of the sample did not achieve these levels of activity (98%, N = 123). Consequently, the message informed these participants that - unless they changed their behaviour - they would be at higher risk of heart disease. Participants completed measures of responses to the message and behaviour-specific cognitions (e.g., self-efficacy) for meeting the recommendations. For relatively inactive participants, self-affirmation was associated with increased persuasion. However, for those who were moderately active (but not meeting recommendations), those in the self-affirmation condition were less persuaded by the message. Whilst self-affirmation can increase message acceptance, there are circumstances when the open-mindedness it induces may decrease persuasion. The evidence provided in this study suggests that caution may be needed when recommendations are challenging and it could be considered reasonable to be sceptical about the need to change behaviour. Statement of contribution What is already known on this subject? Self-affirmation can facilitate open-mindedness and sensitivity to whether health messages suggest high or low risk on the basis of current behaviour. What does this study add? Demonstrates that self-affirmation effects can be moderated by the extent of failure to meet recommendations. Shows that self-affirmation can be associated with less persuasion when challenging health guidelines are used. © 2014 The Authors. British Journal of Health Psychology published by John Wiley & Sons Ltd on behalf of British Psychological Society.

  4. Efficacy of Web-Based Collection of Strength-Based Testimonials for Text Message Extension of Youth Suicide Prevention Program: Randomized Controlled Experiment.

    PubMed

    Thiha, Phyo; Pisani, Anthony R; Gurditta, Kunali; Cherry, Erin; Peterson, Derick R; Kautz, Henry; Wyman, Peter A

    2016-11-09

    Equipping members of a target population to deliver effective public health messaging to peers is an established approach in health promotion. The Sources of Strength program has demonstrated the promise of this approach for "upstream" youth suicide prevention. Text messaging is a well-established medium for promoting behavior change and is the dominant communication medium for youth. In order for peer 'opinion leader' programs like Sources of Strength to use scalable, wide-reaching media such as text messaging to spread peer-to-peer messages, they need techniques for assisting peer opinion leaders in creating effective testimonials to engage peers and match program goals. We developed a Web interface, called Stories of Personal Resilience in Managing Emotions (StoryPRIME), which helps peer opinion leaders write effective, short-form messages that can be delivered to the target population in youth suicide prevention program like Sources of Strength. To determine the efficacy of StoryPRIME, a Web-based interface for remotely eliciting high school peer leaders, and helping them produce high-quality, personal testimonials for use in a text messaging extension of an evidence-based, peer-led suicide prevention program. In a double-blind randomized controlled experiment, 36 high school students wrote testimonials with or without eliciting from the StoryPRIME interface. The interface was created in the context of Sources of Strength-an evidence-based youth suicide prevention program-and 24 ninth graders rated these testimonials on relatability, usefulness/relevance, intrigue, and likability. Testimonials written with the StoryPRIME interface were rated as more relatable, useful/relevant, intriguing, and likable than testimonials written without StoryPRIME, P=.054. StoryPRIME is a promising way to elicit high-quality, personal testimonials from youth for prevention programs that draw on members of a target population to spread public health messages. ©Phyo Thiha, Anthony R Pisani, Kunali Gurditta, Erin Cherry, Derick R Peterson, Henry Kautz, Peter A Wyman. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 09.11.2016.

  5. Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC)

    NASA Astrophysics Data System (ADS)

    Ratnadewi; Pramono Adhie, Roy; Hutama, Yonatan; Saleh Ahmar, A.; Setiawan, M. I.

    2018-01-01

    Cryptography is a method used to create secure communication by manipulating sent messages during the communication occurred so only intended party that can know the content of that messages. Some of the most commonly used cryptography methods to protect sent messages, especially in the form of text, are DES and 3DES cryptography method. This research will explain the DES and 3DES cryptography method and its use for stored data security in smart cards that working in the NFC-based communication system. Several things that will be explained in this research is the ways of working of DES and 3DES cryptography method in doing the protection process of a data and software engineering through the creation of application using C++ programming language to realize and test the performance of DES and 3DES cryptography method in encrypted data writing process to smart cards and decrypted data reading process from smart cards. The execution time of the entering and the reading process data using a smart card DES cryptography method is faster than using 3DES cryptography.

  6. Multiplexed Sequence Encoding: A Framework for DNA Communication

    PubMed Central

    Zakeri, Bijan; Carr, Peter A.; Lu, Timothy K.

    2016-01-01

    Synthetic DNA has great propensity for efficiently and stably storing non-biological information. With DNA writing and reading technologies rapidly advancing, new applications for synthetic DNA are emerging in data storage and communication. Traditionally, DNA communication has focused on the encoding and transfer of complete sets of information. Here, we explore the use of DNA for the communication of short messages that are fragmented across multiple distinct DNA molecules. We identified three pivotal points in a communication—data encoding, data transfer & data extraction—and developed novel tools to enable communication via molecules of DNA. To address data encoding, we designed DNA-based individualized keyboards (iKeys) to convert plaintext into DNA, while reducing the occurrence of DNA homopolymers to improve synthesis and sequencing processes. To address data transfer, we implemented a secret-sharing system—Multiplexed Sequence Encoding (MuSE)—that conceals messages between multiple distinct DNA molecules, requiring a combination key to reveal messages. To address data extraction, we achieved the first instance of chromatogram patterning through multiplexed sequencing, thereby enabling a new method for data extraction. We envision these approaches will enable more widespread communication of information via DNA. PMID:27050646

  7. Scientists, Teachers and the "Scientific" Textbook: Interprofessional Relations and the Modernisation of Elementary Science Textbooks in Nineteenth-Century Sweden

    ERIC Educational Resources Information Center

    Hultén, Magnus

    2016-01-01

    In research on the development of a nineteenth-century "science for the people", initiatives by scientists or people well-trained in science has been emphasised, while the writings, roles and initiatives of elementary teachers are normally just mentioned in passing. In this study the development of nineteenth-century elementary science…

  8. What We Are Called to Do "When the Unthinkable Becomes the Thinkable and the Impossible Really Happens"

    ERIC Educational Resources Information Center

    Merchant, Betty

    2017-01-01

    Writing this article has been challenging and frustrating, as each passing day brings new assaults against the fundamental values of a democratic society. The core values associated with responsible citizenship, ethical behavior, respect for self and others are virtually absent from the speech and actions of many of the individuals entrusted with…

  9. Reflections of First-Year Teachers on School Culture: Questions, Hopes, and Challenges. New Directions for School Leadership.

    ERIC Educational Resources Information Center

    Donaldson, Morgaen L., Ed.; Poon, Brian, Ed.

    1999-01-01

    This collection of papers presents the reflections of five beginning public school teachers from the greater Boston area on their first years in teaching. They share lessons garnered from teaching, writing, and reflecting together on their introductory experiences. As their first months in teaching passed, they found themselves working in some…

  10. Porting Gravitational Wave Signal Extraction to Parallel Virtual Machine (PVM)

    NASA Technical Reports Server (NTRS)

    Thirumalainambi, Rajkumar; Thompson, David E.; Redmon, Jeffery

    2009-01-01

    Laser Interferometer Space Antenna (LISA) is a planned NASA-ESA mission to be launched around 2012. The Gravitational Wave detection is fundamentally the determination of frequency, source parameters, and waveform amplitude derived in a specific order from the interferometric time-series of the rotating LISA spacecrafts. The LISA Science Team has developed a Mock LISA Data Challenge intended to promote the testing of complicated nested search algorithms to detect the 100-1 millihertz frequency signals at amplitudes of 10E-21. However, it has become clear that, sequential search of the parameters is very time consuming and ultra-sensitive; hence, a new strategy has been developed. Parallelization of existing sequential search algorithms of Gravitational Wave signal identification consists of decomposing sequential search loops, beginning with outermost loops and working inward. In this process, the main challenge is to detect interdependencies among loops and partitioning the loops so as to preserve concurrency. Existing parallel programs are based upon either shared memory or distributed memory paradigms. In PVM, master and node programs are used to execute parallelization and process spawning. The PVM can handle process management and process addressing schemes using a virtual machine configuration. The task scheduling and the messaging and signaling can be implemented efficiently for the LISA Gravitational Wave search process using a master and 6 nodes. This approach is accomplished using a server that is available at NASA Ames Research Center, and has been dedicated to the LISA Data Challenge Competition. Historically, gravitational wave and source identification parameters have taken around 7 days in this dedicated single thread Linux based server. Using PVM approach, the parameter extraction problem can be reduced to within a day. The low frequency computation and a proxy signal-to-noise ratio are calculated in separate nodes that are controlled by the master using message and vector of data passing. The message passing among nodes follows a pattern of synchronous and asynchronous send-and-receive protocols. The communication model and the message buffers are allocated dynamically to address rapid search of gravitational wave source information in the Mock LISA data sets.

  11. Global Insurgency Strategy and the Salafi Jihad Movement

    DTIC Science & Technology

    2008-04-01

    Coll and Glasser,  is through public e­mail services such as  Hotmail . Here is how it  works: An operative opens an account on Hotmail , “writes a...secretly, reported by Coll and Glasser,  is through public e­mail services such as  Hotmail . Here is how it  works: An operative opens an account on... Hotmail , “writes a message  in draft form, saves it as a draft, and then transmits the e­mail account  name and password during chatter on a relatively

  12. A Parallel Workload Model and its Implications for Processor Allocation

    DTIC Science & Technology

    1996-11-01

    with SEV or AVG, both of which can tolerate c = 0.4 { 0.6 before their performance deteriorates signi cantly. On the other hand, Setia [10] has...Sanjeev. K Setia . The interaction between memory allocation and adaptive partitioning in message-passing multicomputers. In IPPS 󈨣 Workshop on Job...Scheduling Strategies for Parallel Processing, pages 89{99, 1995. [11] Sanjeev K. Setia and Satish K. Tripathi. An analysis of several processor

  13. Parallel deterministic neutronics with AMR in 3D

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clouse, C.; Ferguson, J.; Hendrickson, C.

    1997-12-31

    AMTRAN, a three dimensional Sn neutronics code with adaptive mesh refinement (AMR) has been parallelized over spatial domains and energy groups and runs on the Meiko CS-2 with MPI message passing. Block refined AMR is used with linear finite element representations for the fluxes, which allows for a straight forward interpretation of fluxes at block interfaces with zoning differences. The load balancing algorithm assumes 8 spatial domains, which minimizes idle time among processors.

  14. GENASIS Basics: Object-oriented utilitarian functionality for large-scale physics simulations (Version 2)

    NASA Astrophysics Data System (ADS)

    Cardall, Christian Y.; Budiardja, Reuben D.

    2017-05-01

    GenASiS Basics provides Fortran 2003 classes furnishing extensible object-oriented utilitarian functionality for large-scale physics simulations on distributed memory supercomputers. This functionality includes physical units and constants; display to the screen or standard output device; message passing; I/O to disk; and runtime parameter management and usage statistics. This revision -Version 2 of Basics - makes mostly minor additions to functionality and includes some simplifying name changes.

  15. An HLA-Based Approach to Quantify Achievable Performance for Tactical Edge Applications

    DTIC Science & Technology

    2011-05-01

    in: Proceedings of the 2002 Fall Simulation Interoperability Workshop, 02F- SIW -068, Nov 2002. [16] P. Knight, et al. ―WBT RTI Independent...Benchmark Tests: Design, Implementation, and Updated Results‖, in: Proceedings of the 2002 Spring Simulation Interoperability Workshop, 02S- SIW -081, March...Interoperability Workshop, 98F- SIW -085, Nov 1998. [18] S. Ferenci and R. Fujimoto. ―RTI Performance on Shared Memory and Message Passing Architectures‖, in

  16. Integrating Research, Quality Improvement, and Medical Education for Better Handoffs and Safer Care: Disseminating, Adapting, and Implementing the I-PASS Program.

    PubMed

    Starmer, Amy J; Spector, Nancy D; West, Daniel C; Srivastava, Rajendu; Sectish, Theodore C; Landrigan, Christopher P

    2017-07-01

    In 2009 the I-PASS Study Group was formed by patient safety, medical education, health services research, and clinical experts from multiple institutions in the United States and Canada. When the I-PASS Handoff Program, which was developed by the I-PASS Study Group, was implemented in nine hospitals, it was associated with a 30% reduction in injuries due to medical errors and significant improvements in handoff processes, without any adverse effects on provider work flow. To effectively disseminate and adapt I-PASS for use across specialties and disciplines, a series of federally and privately funded dissemination and implementation projects were carried out following the publication of the initial study. The results of these efforts have informed ongoing initiatives intended to continue adapting and scaling the program. As of this writing, I-PASS Study Group members have directly worked with more than 50 hospitals to facilitate implementation of I-PASS. To further disseminate I-PASS, Study Group members delivered hundreds of academic presentations, including plenaries at scientific meetings, workshops, and institutional Grand Rounds. Some 3,563 individuals, representing more than 500 institutions in the 50 states in the United States, the District of Columbia, Puerto Rico, and 57 other countries, have requested access to I-PASS materials. Most recently, the I-PASS SM Patient Safety Institute has developed a virtual immersion training platform, mobile handoff observational tools, and processes to facilitate further spread of I-PASS. Implementation of I-PASS has been associated with substantial improvements in patient safety and can be applied to a variety of disciplines and types of patient handoffs. Widespread implementation of I-PASS has the potential to substantially improve patient safety in the United States and beyond. Copyright © 2017 The Joint Commission. Published by Elsevier Inc. All rights reserved.

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gorentla Venkata, Manjunath; Graham, Richard L; Ladd, Joshua S

    This paper describes the design and implementation of InfiniBand (IB) CORE-Direct based blocking and nonblocking broadcast operations within the Cheetah collective operation framework. It describes a novel approach that fully ofFLoads collective operations and employs only user-supplied buffers. For a 64 rank communicator, the latency of CORE-Direct based hierarchical algorithm is better than production-grade Message Passing Interface (MPI) implementations, 150% better than the default Open MPI algorithm and 115% better than the shared memory optimized MVAPICH implementation for a one kilobyte (KB) message, and for eight mega-bytes (MB) it is 48% and 64% better, respectively. Flat-topology broadcast achieves 99.9% overlapmore » in a polling based communication-computation test, and 95.1% overlap for a wait based test, compared with 92.4% and 17.0%, respectively, for a similar Central Processing Unit (CPU) based implementation.« less

  18. A highly symmetrical 10 transistor 2-read/write dual-port static random access memory bitcell design in 28 nm high-k/metal-gate planar bulk CMOS technology

    NASA Astrophysics Data System (ADS)

    Ishii, Yuichiro; Tanaka, Miki; Yabuuchi, Makoto; Sawada, Yohei; Tanaka, Shinji; Nii, Koji; Lu, Tien Yu; Huang, Chun Hsien; Sian Chen, Shou; Tse Kuo, Yu; Lung, Ching Cheng; Cheng, Osbert

    2018-04-01

    We propose a highly symmetrical 10 transistor (10T) 2-read/write (2RW) dual-port (DP) static random access memory (SRAM) bitcell in 28 nm high-k/metal-gate (HKMG) planar bulk CMOS. It replaces the conventional 8T 2RW DP SRAM bitcell without any area overhead. It significantly improves the robustness of process variations and an asymmetric issue between the true and bar bitline pairs. Measured data show that read current (I read) and read static noise margin (SNM) are respectively boosted by +20% and +15 mV by introducing the proposed bitcell with enlarged pull-down (PD) and pass-gate (PG) N-channel MOSs (NMOSs). The minimum operating voltage (V min) of the proposed 256 kbit 10T DP SRAM is 0.53 V in the TT process, 25 °C under the worst access condition with read/write disturbances, and improved by 90 mV (15%) compared with the conventional one.

  19. Highly flexible SRAM cells based on novel tri-independent-gate FinFET

    NASA Astrophysics Data System (ADS)

    Liu, Chengsheng; Zheng, Fanglin; Sun, Yabin; Li, Xiaojin; Shi, Yanling

    2017-10-01

    In this paper, a novel tri-independent-gate (TIG) FinFET is proposed for highly flexible SRAM cells design. To mitigate the read-write conflict, two kinds of SRAM cells based on TIG FinFETs are designed, and high tradeoff are obtained between read stability and speed. Both cells can offer multi read operations for frequency requirement with single voltage supply. In the first TIG FinFET SRAM cell, the strength of single-fin access transistor (TIG FinFET) can be flexibly adjusted by selecting five different modes to meet the needs of dynamic frequency design. Compared to the previous double-independent-gate (DIG) FinFET SRAM cell, 12.16% shorter read delay can be achieved with only 1.62% read stability decrement. As for the second TIG FinFET SRAM cell, pass-gate feedback technology is applied and double-fin TIG FinFETs are used as access transistors to solve the severe write-ability degradation. Three modes exist to flexibly adjust read speed and stability, and 68.2% larger write margin and 51.7% shorter write delay are achieved at only the expense of 26.2% increase in leakage power, with the same layout area as conventional FinFET SRAM cell.

  20. Predicting Social Anxiety Treatment Outcome Based on Therapeutic Email Conversations.

    PubMed

    Hoogendoorn, Mark; Berger, Thomas; Schulz, Ava; Stolz, Timo; Szolovits, Peter

    2017-09-01

    Predicting therapeutic outcome in the mental health domain is of utmost importance to enable therapists to provide the most effective treatment to a patient. Using information from the writings of a patient can potentially be a valuable source of information, especially now that more and more treatments involve computer-based exercises or electronic conversations between patient and therapist. In this paper, we study predictive modeling using writings of patients under treatment for a social anxiety disorder. We extract a wealth of information from the text written by patients including their usage of words, the topics they talk about, the sentiment of the messages, and the style of writing. In addition, we study trends over time with respect to those measures. We then apply machine learning algorithms to generate the predictive models. Based on a dataset of 69 patients, we are able to show that we can predict therapy outcome with an area under the curve of 0.83 halfway through the therapy and with a precision of 0.78 when using the full data (i.e., the entire treatment period). Due to the limited number of participants, it is hard to generalize the results, but they do show great potential in this type of information.

  1. Re-Visualizing the Instruction of Composition: Students, Authors, and the Logics of Writing Instruction.

    ERIC Educational Resources Information Center

    English, Todd M.

    This paper is conceived as an extended reflection on what has passed for a materialist epistemology--which may be one way to understand cultural work--in English Studies. Rather than providing any final answers to the questions of what the praxis says about the theory, the paper first examines the origin of the humanistic literary text and then…

  2. Staging a Christopher Columbus Play in a Culture of Illusion: Public Pedagogy in a Theatre of Genocide

    ERIC Educational Resources Information Center

    McKenna, Brian

    2011-01-01

    In the foreword to "The Politics of Genocide", political theorist Noam Chomsky writes that denial of the American Indian holocaust is a potent force in the United States. He argues that "the most unambiguous cases of genocide" are often "acknowledged by the perpetrators, and passed over as insignificant or even denied in retrospect by the…

  3. Performance and Application of Parallel OVERFLOW Codes on Distributed and Shared Memory Platforms

    NASA Technical Reports Server (NTRS)

    Djomehri, M. Jahed; Rizk, Yehia M.

    1999-01-01

    The presentation discusses recent studies on the performance of the two parallel versions of the aerodynamics CFD code, OVERFLOW_MPI and _MLP. Developed at NASA Ames, the serial version, OVERFLOW, is a multidimensional Navier-Stokes flow solver based on overset (Chimera) grid technology. The code has recently been parallelized in two ways. One is based on the explicit message-passing interface (MPI) across processors and uses the _MPI communication package. This approach is primarily suited for distributed memory systems and workstation clusters. The second, termed the multi-level parallel (MLP) method, is simple and uses shared memory for all communications. The _MLP code is suitable on distributed-shared memory systems. For both methods, the message passing takes place across the processors or processes at the advancement of each time step. This procedure is, in effect, the Chimera boundary conditions update, which is done in an explicit "Jacobi" style. In contrast, the update in the serial code is done in more of the "Gauss-Sidel" fashion. The programming efforts for the _MPI code is more complicated than for the _MLP code; the former requires modification of the outer and some inner shells of the serial code, whereas the latter focuses only on the outer shell of the code. The _MPI version offers a great deal of flexibility in distributing grid zones across a specified number of processors in order to achieve load balancing. The approach is capable of partitioning zones across multiple processors or sending each zone and/or cluster of several zones into a single processor. The message passing across the processors consists of Chimera boundary and/or an overlap of "halo" boundary points for each partitioned zone. The MLP version is a new coarse-grain parallel concept at the zonal and intra-zonal levels. A grouping strategy is used to distribute zones into several groups forming sub-processes which will run in parallel. The total volume of grid points in each group are approximately balanced. A proper number of threads are initially allocated to each group, and in subsequent iterations during the run-time, the number of threads are adjusted to achieve load balancing across the processes. Each process exploits the multitasking directives already established in Overflow.

  4. Developing an assessment in dental public health for clinical undergraduates attending a primary dental care outreach programme.

    PubMed

    Holmes, R D; Waterhouse, P J; Maguire, A; Hind, V; Lloyd, J; Tabari, D; Lowry, R J

    2011-02-01

    This paper describes the development and implementation of a Dental Public Health (DPH) assessment within the Primary Dental Care Outreach (PDCO) course at Newcastle University. The assessment was piloted alongside the delivery of the Bachelor of Dental Surgery (BDS) curriculum in accordance with established learning outcomes. To design and implement a pilot summative assessment, incorporating patients' social histories obtained by undergraduate students attending primary dental care outreach clinics. Undergraduates were tasked with obtaining a detailed social history from a patient seen during their two-year outreach attachment. Each student submitted a written account of their patient's social history and placed this in context by researching a number of demographic and social variables centred upon their patient's home residence. The final component involved writing a concise case feature for a nominated newspaper based upon the case history, where students were encouraged to identify one or more public health messages using language appropriate to a lay readership. Seventy one clinical undergraduates (98.6% of the year-group) subsequently submitted all components of the assessment. Eighty six per cent of the year-group was deemed to have passed the assessment with 9.9% achieving a 'Merit' grade and 76% a 'Satisfactory' grade. Following the assessment, students and clinical teachers were asked for their feedback through a focus group for staff, and a brief feedback form for students. Undergraduates subsequently reported greater awareness of the significance and importance of obtaining a detailed social history and its relevance when devising appropriate and realistic treatment plans. © 2011 John Wiley & Sons A/S.

  5. Learning classifier systems for single and multiple mobile robots in unstructured environments

    NASA Astrophysics Data System (ADS)

    Bay, John S.

    1995-12-01

    The learning classifier system (LCS) is a learning production system that generates behavioral rules via an underlying discovery mechanism. The LCS architecture operates similarly to a blackboard architecture; i.e., by posted-message communications. But in the LCS, the message board is wiped clean at every time interval, thereby requiring no persistent shared resource. In this paper, we adapt the LCS to the problem of mobile robot navigation in completely unstructured environments. We consider the model of the robot itself, including its sensor and actuator structures, to be part of this environment, in addition to the world-model that includes a goal and obstacles at unknown locations. This requires a robot to learn its own I/O characteristics in addition to solving its navigation problem, but results in a learning controller that is equally applicable, unaltered, in robots with a wide variety of kinematic structures and sensing capabilities. We show the effectiveness of this LCS-based controller through both simulation and experimental trials with a small robot. We then propose a new architecture, the Distributed Learning Classifier System (DLCS), which generalizes the message-passing behavior of the LCS from internal messages within a single agent to broadcast massages among multiple agents. This communications mode requires little bandwidth and is easily implemented with inexpensive, off-the-shelf hardware. The DLCS is shown to have potential application as a learning controller for multiple intelligent agents.

  6. The amplification of risk in experimental diffusion chains.

    PubMed

    Moussaïd, Mehdi; Brighton, Henry; Gaissmaier, Wolfgang

    2015-05-05

    Understanding how people form and revise their perception of risk is central to designing efficient risk communication methods, eliciting risk awareness, and avoiding unnecessary anxiety among the public. However, public responses to hazardous events such as climate change, contagious outbreaks, and terrorist threats are complex and difficult-to-anticipate phenomena. Although many psychological factors influencing risk perception have been identified in the past, it remains unclear how perceptions of risk change when propagated from one person to another and what impact the repeated social transmission of perceived risk has at the population scale. Here, we study the social dynamics of risk perception by analyzing how messages detailing the benefits and harms of a controversial antibacterial agent undergo change when passed from one person to the next in 10-subject experimental diffusion chains. Our analyses show that when messages are propagated through the diffusion chains, they tend to become shorter, gradually inaccurate, and increasingly dissimilar between chains. In contrast, the perception of risk is propagated with higher fidelity due to participants manipulating messages to fit their preconceptions, thereby influencing the judgments of subsequent participants. Computer simulations implementing this simple influence mechanism show that small judgment biases tend to become more extreme, even when the injected message contradicts preconceived risk judgments. Our results provide quantitative insights into the social amplification of risk perception, and can help policy makers better anticipate and manage the public response to emerging threats.

  7. The amplification of risk in experimental diffusion chains

    PubMed Central

    Moussaïd, Mehdi; Brighton, Henry; Gaissmaier, Wolfgang

    2015-01-01

    Understanding how people form and revise their perception of risk is central to designing efficient risk communication methods, eliciting risk awareness, and avoiding unnecessary anxiety among the public. However, public responses to hazardous events such as climate change, contagious outbreaks, and terrorist threats are complex and difficult-to-anticipate phenomena. Although many psychological factors influencing risk perception have been identified in the past, it remains unclear how perceptions of risk change when propagated from one person to another and what impact the repeated social transmission of perceived risk has at the population scale. Here, we study the social dynamics of risk perception by analyzing how messages detailing the benefits and harms of a controversial antibacterial agent undergo change when passed from one person to the next in 10-subject experimental diffusion chains. Our analyses show that when messages are propagated through the diffusion chains, they tend to become shorter, gradually inaccurate, and increasingly dissimilar between chains. In contrast, the perception of risk is propagated with higher fidelity due to participants manipulating messages to fit their preconceptions, thereby influencing the judgments of subsequent participants. Computer simulations implementing this simple influence mechanism show that small judgment biases tend to become more extreme, even when the injected message contradicts preconceived risk judgments. Our results provide quantitative insights into the social amplification of risk perception, and can help policy makers better anticipate and manage the public response to emerging threats. PMID:25902519

  8. Object-oriented knowledge representation for expert systems

    NASA Technical Reports Server (NTRS)

    Scott, Stephen L.

    1991-01-01

    Object oriented techniques have generated considerable interest in the Artificial Intelligence (AI) community in recent years. This paper discusses an approach for representing expert system knowledge using classes, objects, and message passing. The implementation is in version 4.3 of NASA's C Language Integrated Production System (CLIPS), an expert system tool that does not provide direct support for object oriented design. The method uses programmer imposed conventions and keywords to structure facts, and rules to provide object oriented capabilities.

  9. Temporal Proof Methodologies for Real-Time Systems,

    DTIC Science & Technology

    1990-09-01

    real time systems that communicate either through shared variables or by message passing and real time issues such as time-outs, process priorities (interrupts) and process scheduling. The authors exhibit two styles for the specification of real - time systems . While the first approach uses bounded versions of temporal operators the second approach allows explicit references to time through a special clock variable. Corresponding to two styles of specification the authors present and compare two fundamentally different proof

  10. Advances in Parallel Computing and Databases for Digital Pathology in Cancer Research

    DTIC Science & Technology

    2016-11-13

    these technologies and how we have used them in the past. We are interested in learning more about the needs of clinical pathologists as we continue to...such as image processing and correlation. Further, High Performance Computing (HPC) paradigms such as the Message Passing Interface (MPI) have been...Defense for Research and Engineering. such as pMatlab [4], or bcMPI [5] can significantly reduce the need for deep knowledge of parallel computing. In

  11. Experiences using OpenMP based on Computer Directed Software DSM on a PC Cluster

    NASA Technical Reports Server (NTRS)

    Hess, Matthias; Jost, Gabriele; Mueller, Matthias; Ruehle, Roland

    2003-01-01

    In this work we report on our experiences running OpenMP programs on a commodity cluster of PCs running a software distributed shared memory (DSM) system. We describe our test environment and report on the performance of a subset of the NAS Parallel Benchmarks that have been automaticaly parallelized for OpenMP. We compare the performance of the OpenMP implementations with that of their message passing counterparts and discuss performance differences.

  12. Discrete Event Simulation Modeling and Analysis of Key Leader Engagements

    DTIC Science & Technology

    2012-06-01

    to offer. GreenPlayer agents require four parameters, pC, pKLK, pTK, and pRK , which give probabilities for being corrupt, having key leader...HandleMessageRequest component. The same parameter constraints apply to these four parameters. The parameter pRK is the same parameter from the CreatePlayers component...whether the local Green player has resource critical knowledge by using the parameter pRK . It schedules an EndResourceKnowledgeRequest event, passing

  13. Parallel-Processing Test Bed For Simulation Software

    NASA Technical Reports Server (NTRS)

    Blech, Richard; Cole, Gary; Townsend, Scott

    1996-01-01

    Second-generation Hypercluster computing system is multiprocessor test bed for research on parallel algorithms for simulation in fluid dynamics, electromagnetics, chemistry, and other fields with large computational requirements but relatively low input/output requirements. Built from standard, off-shelf hardware readily upgraded as improved technology becomes available. System used for experiments with such parallel-processing concepts as message-passing algorithms, debugging software tools, and computational steering. First-generation Hypercluster system described in "Hypercluster Parallel Processor" (LEW-15283).

  14. Time-Dependent Simulations of Incompressible Flow in a Turbopump Using Overset Grid Approach

    NASA Technical Reports Server (NTRS)

    Kiris, Cetin; Kwak, Dochan

    2001-01-01

    This viewgraph presentation provides information on mathematical modelling of the SSME (space shuttle main engine). The unsteady SSME-rig1 start-up procedure from the pump at rest has been initiated by using 34.3 million grid points. The computational model for the SSME-rig1 has been completed. Moving boundary capability is obtained by using DCF module in OVERFLOW-D. MPI (Message Passing Interface)/OpenMP hybrid parallel code has been benchmarked.

  15. "Some convincing arguments to pass back to nervous customers": the role of the tobacco retailer in the Australian tobacco industry's smoker reassurance campaign 1950–1978

    PubMed Central

    Tofler, A; Chapman, S

    2003-01-01

    Background: Epidemiological studies and reports on smoking and health published in the 1950s and 1960s threatened the tobacco industry worldwide, which acted to reassure smokers and counteract mounting evidence that smoking posed a serious risk to smokers' health. Objective: To document the use of tobacco retailers (1) as a conduit to pass messages of reassurance onto smokers, and (2) to recruit youth and women into smoking. Methods: Review of an extensive collection of Australian tobacco retail trade journals (1950–1978) for articles consistent with the industry's efforts to counter messages about smoking and health, and how to attract non-smokers, particularly youth and women. Results: The main arguments advanced in the journals included the notion that air pollution and other substances cause cancer, that "statistics" did not constitute proof in the tobacco health scare, and that the industry was committed to research into the causes of cancer and into developing a "safer" cigarette. Conclusions: Numerous articles designed to be reiterated to customers were published, arguing against the link between tobacco and ill health. Tobacco retailers, salesmen and retail trade organisations played a significant role in dissembling the tobacco health nexus. Tobacco retail journals may be an important component in tobacco industry misinformation strategies. PMID:14645943

  16. Strategies for Energy Efficient Resource Management of Hybrid Programming Models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Dong; Supinski, Bronis de; Schulz, Martin

    2013-01-01

    Many scientific applications are programmed using hybrid programming models that use both message-passing and shared-memory, due to the increasing prevalence of large-scale systems with multicore, multisocket nodes. Previous work has shown that energy efficiency can be improved using software-controlled execution schemes that consider both the programming model and the power-aware execution capabilities of the system. However, such approaches have focused on identifying optimal resource utilization for one programming model, either shared-memory or message-passing, in isolation. The potential solution space, thus the challenge, increases substantially when optimizing hybrid models since the possible resource configurations increase exponentially. Nonetheless, with the accelerating adoptionmore » of hybrid programming models, we increasingly need improved energy efficiency in hybrid parallel applications on large-scale systems. In this work, we present new software-controlled execution schemes that consider the effects of dynamic concurrency throttling (DCT) and dynamic voltage and frequency scaling (DVFS) in the context of hybrid programming models. Specifically, we present predictive models and novel algorithms based on statistical analysis that anticipate application power and time requirements under different concurrency and frequency configurations. We apply our models and methods to the NPB MZ benchmarks and selected applications from the ASC Sequoia codes. Overall, we achieve substantial energy savings (8.74% on average and up to 13.8%) with some performance gain (up to 7.5%) or negligible performance loss.« less

  17. Weighted community detection and data clustering using message passing

    NASA Astrophysics Data System (ADS)

    Shi, Cheng; Liu, Yanchen; Zhang, Pan

    2018-03-01

    Grouping objects into clusters based on the similarities or weights between them is one of the most important problems in science and engineering. In this work, by extending message-passing algorithms and spectral algorithms proposed for an unweighted community detection problem, we develop a non-parametric method based on statistical physics, by mapping the problem to the Potts model at the critical temperature of spin-glass transition and applying belief propagation to solve the marginals corresponding to the Boltzmann distribution. Our algorithm is robust to over-fitting and gives a principled way to determine whether there are significant clusters in the data and how many clusters there are. We apply our method to different clustering tasks. In the community detection problem in weighted and directed networks, we show that our algorithm significantly outperforms existing algorithms. In the clustering problem, where the data were generated by mixture models in the sparse regime, we show that our method works all the way down to the theoretical limit of detectability and gives accuracy very close to that of the optimal Bayesian inference. In the semi-supervised clustering problem, our method only needs several labels to work perfectly in classic datasets. Finally, we further develop Thouless-Anderson-Palmer equations which heavily reduce the computation complexity in dense networks but give almost the same performance as belief propagation.

  18. Cellular automata with object-oriented features for parallel molecular network modeling.

    PubMed

    Zhu, Hao; Wu, Yinghui; Huang, Sui; Sun, Yan; Dhar, Pawan

    2005-06-01

    Cellular automata are an important modeling paradigm for studying the dynamics of large, parallel systems composed of multiple, interacting components. However, to model biological systems, cellular automata need to be extended beyond the large-scale parallelism and intensive communication in order to capture two fundamental properties characteristic of complex biological systems: hierarchy and heterogeneity. This paper proposes extensions to a cellular automata language, Cellang, to meet this purpose. The extended language, with object-oriented features, can be used to describe the structure and activity of parallel molecular networks within cells. Capabilities of this new programming language include object structure to define molecular programs within a cell, floating-point data type and mathematical functions to perform quantitative computation, message passing capability to describe molecular interactions, as well as new operators, statements, and built-in functions. We discuss relevant programming issues of these features, including the object-oriented description of molecular interactions with molecule encapsulation, message passing, and the description of heterogeneity and anisotropy at the cell and molecule levels. By enabling the integration of modeling at the molecular level with system behavior at cell, tissue, organ, or even organism levels, the program will help improve our understanding of how complex and dynamic biological activities are generated and controlled by parallel functioning of molecular networks. Index Terms-Cellular automata, modeling, molecular network, object-oriented.

  19. A Bayesian model for highly accelerated phase-contrast MRI.

    PubMed

    Rich, Adam; Potter, Lee C; Jin, Ning; Ash, Joshua; Simonetti, Orlando P; Ahmad, Rizwan

    2016-08-01

    Phase-contrast magnetic resonance imaging is a noninvasive tool to assess cardiovascular disease by quantifying blood flow; however, low data acquisition efficiency limits the spatial and temporal resolutions, real-time application, and extensions to four-dimensional flow imaging in clinical settings. We propose a new data processing approach called Reconstructing Velocity Encoded MRI with Approximate message passing aLgorithms (ReVEAL) that accelerates the acquisition by exploiting data structure unique to phase-contrast magnetic resonance imaging. The proposed approach models physical correlations across space, time, and velocity encodings. The proposed Bayesian approach exploits the relationships in both magnitude and phase among velocity encodings. A fast iterative recovery algorithm is introduced based on message passing. For validation, prospectively undersampled data are processed from a pulsatile flow phantom and five healthy volunteers. The proposed approach is in good agreement, quantified by peak velocity and stroke volume (SV), with reference data for acceleration rates R≤10. For SV, Pearson r≥0.99 for phantom imaging (n = 24) and r≥0.96 for prospectively accelerated in vivo imaging (n = 10) for R≤10. The proposed approach enables accurate quantification of blood flow from highly undersampled data. The technique is extensible to four-dimensional flow imaging, where higher acceleration may be possible due to additional redundancy. Magn Reson Med 76:689-701, 2016. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.

  20. Provenance Datasets Highlighting Capture Disparities

    DTIC Science & Technology

    2014-01-01

    Vistrails [20], Taverna [21] or Kepler [6], and an OS -observing system like PASS [18]. In less granular workflow systems, the data files, scripts...run, etc. are capturable as long as they are executed within the workflow system. In more granular OS -observing systems, the actual reads, writes...rolling up” very granular information to less granular information. OS -level capture knows that a socket was opened and that data was sent to a foreign

  1. How about Teaching Literacy with Science? Strategies Employing Whiteboards Can Be Used to Address "Common Core" Literacy Standards While Including Science Practices

    ERIC Educational Resources Information Center

    West, Andrew; Sullivan, Kelsey; Kirchner, Jana

    2016-01-01

    To an outside observer, there is nothing really novel about whiteboarding. An observer passing a classroom would see students using dry-erase markers to write and sketch their ideas on large, dry-erase-type boards. However, like so many things in education, the subtleties that an outside observer might not notice are the precise things that make…

  2. PREFACE: The IARU International Scientific Congress on Climate Change: Global Risks, Challenges and Decisions (10-12 March, Copenhagen, Denmark)

    NASA Astrophysics Data System (ADS)

    2009-01-01

    In an attempt to make the main results from the Congress on Climate Change: Global Risk, Challenges and Decisions available to the public as early as possible, the steering committee decided to publish all talks and posters presented at the Congress in this unique collection of abstracts, in time for the conference Further to the abstract collection the Congress will publish two more products in the near future as described in the following; a synthesis report with the main conclusions, and a book aimed at an academic audience 1 Two Products from the Congress Two products are being produced based on the presentations and discussions at the Congress The first product will be a synthesis report of the main conclusions from the Congress The synthesis report will be ready in June 2009 The synthesis has the purpose of explaining the current state of understanding man-made climate change and what we can do about it to the non-scientist, ie politicians, media and interested citizens The synthesis will build on the messages presented to the Danish Prime Minister, Mr Anders Fogh Rasmussen, host of the COP15, at the closing session of the Congress These six messages were drafted by the Writing Team (see below) based on input from the session chairs and a reading of the 1600+ abstracts submitted to the Congress The second product is a book aimed at an academic audience The book will include more detailed scientific results from all of the sessions and will be published by Cambridge University Press in 2010 It will be an extension and elaboration of the synthesis report Who's writing the Synthesis Report and the Book? A Writing Team consisting of 12 internationally respected scientists from all continents is responsible for developing both products When the synthesis report has been drafted by the Writing Team, it will be discussed in the Scientific Steering Committee of the Congress and reviewed by the Earth System Science Partnership (ESSP) and a group of experts identified by the IARU universities In keeping with normal scientific practice, a procedure for producing the synthesis report that has been adopted optimises the chances of arriving at a product that will receive a broad backing from the scientific community as being a message that can be sent to the non-scientific community and that explains current understanding in climate change science The Writing Team will also be responsible for writing the book Members of the Writing Team (in alphabetical order) Professor Joe Alcamo, University of Stellenbosch Dr Terry Barker, Cambridge University Professor Daniel Kammen, University of California - Berkeley Professor Rik Leemans, Environmental Systems Analysis Group, Wageningen University Professor Diana Liverman, Oxford University Professor Mohan Munasinghe, Chairman, Munasinghe Institute for Development (MIND) Dr Balgis Osman-Elasha, Higher Council for Environment and Natural Resources (HCENR), Sudan Professor Katherine Richardson, University of Copenhagen Professor John Schellnhuber, Potsdam Institute for Climate Impact Research and visiting professor at the University of Oxford Professor Will Steffen, Australian National University Professor Lord Nicholas Stern, London School of Economics and Political Science (LSE) Professor Ole Wæver, University of Copenhagen 2 Key Messages from the Congress Key Message 1: Climatic Trends Recent observations confirm that, given high rates of observed emissions, the worst-case IPCC scenario trajectories (or even worse) are being realized For many key parameters, the climate system is already moving beyond the patterns of natural variability within which our society and economy have developed and thrived These parameters include global mean surface temperature, sea-level rise, ocean and ice sheet dynamics, ocean acidification, and extreme climatic events There is a significant risk that many of the trends will accelerate, leading to an increasing risk of abrupt or irreversible climatic shifts Key Message 2: Social disruption The research community is providing much more information to support discussions on 'dangerous climate change' Recent observations show that societies are highly vulnerable to even modest levels of climate change, with poor nations and communities particularly at risk Temperature rises above 2°C will be very difficult for contemporary societies to cope with, and will increase the level of climate disruption through the rest of the century Key Message 3: Long-Term Strategy Rapid, sustained, and effective mitigation based on coordinated global and regional action is required to avoid 'dangerous climate change' regardless of how it is defined Weaker targets for 2020 increase the risk of crossing tipping points and make the task of meeting 2050 targets more difficult Delay in initiating effective mitigation actions increases significantly the long-term social and economic costs of both adaptation and mitigation Key Message 4: Equity Dimensions Climate change is having, and will have, strongly differential effects on people within and between countries and regions, on this generation and future generations, and on human societies and the natural world An effective, well-funded adaptation safety net is required for those people least capable of coping with climate change impacts, and a common but differentiated mitigation strategy is needed to protect the poor and most vulnerable Key Message 5: Inaction is Inexcusable There is no excuse for inaction We already have many tools and approaches - economic, technological, behavioral, management - to deal effectively with the climate change challenge But they must be vigorously and widely implemented to achieve the societal transformation required to decarbonize economies A wide range of benefits will flow from a concerted effort to alter our energy economy now, including sustainable energy job growth, reductions in the health and economic costs of climate change, and the restoration of ecosystems and revitalization of ecosystem services Key Message 6: Meeting the Challenge To achieve the societal transformation required to meet the climate change challenge, we must overcome a number of significant constraints and seize critical opportunities These include reducing inertia in social and economic systems; building on a growing public desire for governments to act on climate change; removing implicit and explicit subsidies; reducing the influence of vested interests that increase emissions and reduce resilience; enabling the shifts from ineffective governance and weak institutions to innovative leadership in government, the private sector and civil society; and engaging society in the transition to norms and practices that foster sustainability The editors of the volume are all the session chairs: Professor Agus Sari Dr Aled Jones Science Manager Anders Viksø-Nielsen Dr Andreas Barkman Professor Anette Reenberg Professor Ann Henderson-Sellers Professor Anthony J McMichael Dr Anthony Patt Dr Bette Otto-Bliesner Dr Cameron Hepburn Dr Carlos Nobre Dr Carol Turley Dr Chris Hope Professor Chris Turney Professor Claus Felby Professor Coleen Vogel Professor Dale Jamieson Professor Daniel M Kammen Senior Scientist Detlef F Sprinz Professor Diana Ürge-Vorsatz Professor Dorthe Dahl-Jensen PhD Fatima Denton Director Generel Frances Seymour Dr Frank Jotzo Professor Harold Mooney Director Henrik Bindslev Mr Jamie Pittock Professor Jacquie Burgess Dr James E Hansen Professor Jiahua Pan Dr Jill Jäger Professor Jim Skea Professor Johan Rockström Dr John Christensen Professor John Mitchell Professor John R Porter Professor Joyeeta Gupta Professor Jørgen E Olesen Professor Karen O'Brien Dr Kazuhiko Takeuchi Dr Katrine Krogh Andersen Professor Keith Paustian Professor Ken Caldeira Professor Kevin Anderson Dr Koko Warner Professor Konrad Steffen Professor Liping Zhou Professor Louise Fresco Professor Maria Carmen Lemos Professor Mark Ashton Dr Mark Stafford-Smith Dr Martin Claussen Dr Martin Visbeck Professor Mary Scholes Professor Masahide Kimoto Professor Matthew England Dr Maxwell Boykoff Dr Michael Raupach Professor Nathan Bindoff Professor Nicolas Gruber Professor Niels Elers Koch Professor Ole John Nielsen Professor Ole Wæver Professor Oran Young Dr Pamela Matson Dr Paul Baer Professor Paul Leadley Dr Pep Canadell Professor Pete Smith Professor Peter Gregory Professor Pier Vellinga Dr Rik Leemans Dr Roberto Bertollini Professor Roberto S Rodriguez Professor Scott Denning Dr Sivan Kartha Dr Thomas Downing Dr Tariq Banuri Professor Thomas Heyd Professor Tim Lenton Professor Timmons Roberts Professor Torkil Jønch Clausen Professor Warwick McKibbin Professor Wim C Turkenburg

  3. A software bus for thread objects

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Li, Dehuai

    1995-01-01

    The authors have implemented a software bus for lightweight threads in an object-oriented programming environment that allows for rapid reconfiguration and reuse of thread objects in discrete-event simulation experiments. While previous research in object-oriented, parallel programming environments has focused on direct communication between threads, our lightweight software bus, called the MiniBus, provides a means to isolate threads from their contexts of execution by restricting communications between threads to message-passing via their local ports only. The software bus maintains a topology of connections between these ports. It routes, queues, and delivers messages according to this topology. This approach allows for rapid reconfiguration and reuse of thread objects in other systems without making changes to the specifications or source code. A layered approach that provides the needed transparency to developers is presented. Examples of using the MiniBus are given, and the value of bus architectures in building and conducting simulations of discrete-event systems is discussed.

  4. An implementation and evaluation of the MPI 3.0 one-sided communication interface

    DOE PAGES

    Dinan, James S.; Balaji, Pavan; Buntinas, Darius T.; ...

    2016-01-09

    The Q1 Message Passing Interface (MPI) 3.0 standard includes a significant revision to MPI’s remote memory access (RMA) interface, which provides support for one-sided communication. MPI-3 RMA is expected to greatly enhance the usability and performance ofMPI RMA.We present the first complete implementation of MPI-3 RMA and document implementation techniques and performance optimization opportunities enabled by the new interface. Our implementation targets messaging-based networks and is publicly available in the latest release of the MPICH MPI implementation. Here using this implementation, we explore the performance impact of new MPI-3 functionality and semantics. Results indicate that the MPI-3 RMA interface providesmore » significant advantages over the MPI-2 interface by enabling increased communication concurrency through relaxed semantics in the interface and additional routines that provide new window types, synchronization modes, and atomic operations.« less

  5. An implementation and evaluation of the MPI 3.0 one-sided communication interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dinan, James S.; Balaji, Pavan; Buntinas, Darius T.

    The Q1 Message Passing Interface (MPI) 3.0 standard includes a significant revision to MPI’s remote memory access (RMA) interface, which provides support for one-sided communication. MPI-3 RMA is expected to greatly enhance the usability and performance ofMPI RMA.We present the first complete implementation of MPI-3 RMA and document implementation techniques and performance optimization opportunities enabled by the new interface. Our implementation targets messaging-based networks and is publicly available in the latest release of the MPICH MPI implementation. Here using this implementation, we explore the performance impact of new MPI-3 functionality and semantics. Results indicate that the MPI-3 RMA interface providesmore » significant advantages over the MPI-2 interface by enabling increased communication concurrency through relaxed semantics in the interface and additional routines that provide new window types, synchronization modes, and atomic operations.« less

  6. Non-invasive lightweight integration engine for building EHR from autonomous distributed systems.

    PubMed

    Angulo, Carlos; Crespo, Pere; Maldonado, José A; Moner, David; Pérez, Daniel; Abad, Irene; Mandingorra, Jesús; Robles, Montserrat

    2007-12-01

    In this paper we describe Pangea-LE, a message-oriented lightweight data integration engine that allows homogeneous and concurrent access to clinical information from disperse and heterogeneous data sources. The engine extracts the information and passes it to the requesting client applications in a flexible XML format. The XML response message can be formatted on demand by appropriate Extensible Stylesheet Language (XSL) transformations in order to meet the needs of client applications. We also present a real deployment in a hospital where Pangea-LE collects and generates an XML view of all the available patient clinical information. The information is presented to healthcare professionals in an Electronic Health Record (EHR) viewer Web application with patient search and EHR browsing capabilities. Implantation in a real setting has been a success due to the non-invasive nature of Pangea-LE which respects the existing information systems.

  7. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  8. Texting while driving: the development and validation of the distracted driving survey and risk score among young adults.

    PubMed

    Bergmark, Regan W; Gliklich, Emily; Guo, Rong; Gliklich, Richard E

    Texting while driving and other cell-phone reading and writing activities are high-risk activities associated with motor vehicle collisions and mortality. This paper describes the development and preliminary evaluation of the Distracted Driving Survey (DDS) and score. Survey questions were developed by a research team using semi-structured interviews, pilot-tested, and evaluated in young drivers for validity and reliability. Questions focused on texting while driving and use of email, social media, and maps on cellular phones with specific questions about the driving speeds at which these activities are performed. In 228 drivers 18-24 years old, the DDS showed excellent internal consistency (Cronbach's alpha = 0.93) and correlations with reported 12-month crash rates. The score is reported on a 0-44 scale with 44 being highest risk behaviors. For every 1 unit increase of the DDS score, the odds of reporting a car crash increases 7 %. The survey can be completed in two minutes, or less than five minutes if demographic and background information is included. Text messaging was common; 59.2 and 71.5 % of respondents said they wrote and read text messages, respectively, while driving in the last 30 days. The DDS is an 11-item scale that measures cell phone-related distracted driving risk and includes reading/viewing and writing subscores. The scale demonstrated strong validity and reliability in drivers age 24 and younger. The DDS may be useful for measuring rates of cell-phone related distracted driving and for evaluating public health interventions focused on reducing such behaviors.

  9. Texting while driving: the development and validation of the distracted driving survey and risk score among young adults.

    PubMed

    Bergmark, Regan W; Gliklich, Emily; Guo, Rong; Gliklich, Richard E

    2016-12-01

    Texting while driving and other cell-phone reading and writing activities are high-risk activities associated with motor vehicle collisions and mortality. This paper describes the development and preliminary evaluation of the Distracted Driving Survey (DDS) and score. Survey questions were developed by a research team using semi-structured interviews, pilot-tested, and evaluated in young drivers for validity and reliability. Questions focused on texting while driving and use of email, social media, and maps on cellular phones with specific questions about the driving speeds at which these activities are performed. In 228 drivers 18-24 years old, the DDS showed excellent internal consistency (Cronbach's alpha = 0.93) and correlations with reported 12-month crash rates. The score is reported on a 0-44 scale with 44 being highest risk behaviors. For every 1 unit increase of the DDS score, the odds of reporting a car crash increases 7 %. The survey can be completed in two minutes, or less than five minutes if demographic and background information is included. Text messaging was common; 59.2 and 71.5 % of respondents said they wrote and read text messages, respectively, while driving in the last 30 days. The DDS is an 11-item scale that measures cell phone-related distracted driving risk and includes reading/viewing and writing subscores. The scale demonstrated strong validity and reliability in drivers age 24 and younger. The DDS may be useful for measuring rates of cell-phone related distracted driving and for evaluating public health interventions focused on reducing such behaviors.

  10. Behavior of Flotsam in the California Current System Utilizing Surface Drift of RAFOS Floats

    DTIC Science & Technology

    2012-09-01

    drifter is most widely used (Lumpkin and Pazos 2006). The evolution and construction of the SVP drifter is described by Lumpkin and Pazos (2006). SVP...weight them down so that they were almost submerged in order to reduce the effect of the wind force on drifting objects (Lumpkin and Pazos 2007...by Argos (2011) and Lumpkin and Pazos (2007). As the satellite passes over the drifter, it begins receiving messages. To calculate the drifter’s

  11. Proof of Concept for the Rewrite Rule Machine: Interensemble Studies

    DTIC Science & Technology

    1994-02-23

    34 -,,, S2 •fbo fibo 0 1 Figure 1: Concurrent Rewriting of Fibonacci Expressions exploit a problem’s parallelism at several levels. We call this...property multigrain concurrency; it makes the RRM very well suited for solving not only homogeneous problems, but also complex, locally homogeneous but...interprocessor message passing over a network-is not well suited to data parallelism. A key goal of the RRM is to combine the best of these two approaches in a

  12. Alexander George Karczmar (1917-2017).

    PubMed

    Soreq, Hermona; Silman, Israel

    2017-12-01

    The neurochemistry community at large and the Advisory Board of The International Symposia on Cholinergic Mechanisms mourn the loss of Alexander George Karczmar, the elected Honorary President of these international symposia, who passed away peacefully in his Chicago home at the age of 100 on August 17, 2017. For many of us Alex was the essence of cholinergic signaling, and personified its versatile power to send messages between the brain and the peripheral tissues and organs, and to connect between body and soul. © 2017 International Society for Neurochemistry.

  13. Strategic and Tactical Decision-Making Under Uncertainty

    DTIC Science & Technology

    2006-01-03

    message passing algorithms. In recent work we applied this method to the problem of joint decoding of a low-density parity-check ( LDPC ) code and a partial...Joint Decoding of LDPC Codes and Partial-Response Channels." IEEE Transactions on Communications. Vol. 54, No. 7, 1149-1153, 2006. P. Pakzad and V...Michael I. Jordan PAGES U U U SAPR 20 19b. TELEPHONE NUMBER (Include area code ) 510/642-3806 Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39.18

  14. NAS Parallel Benchmarks. 2.4

    NASA Technical Reports Server (NTRS)

    VanderWijngaart, Rob; Biegel, Bryan A. (Technical Monitor)

    2002-01-01

    We describe a new problem size, called Class D, for the NAS Parallel Benchmarks (NPB), whose MPI source code implementation is being released as NPB 2.4. A brief rationale is given for how the new class is derived. We also describe the modifications made to the MPI (Message Passing Interface) implementation to allow the new class to be run on systems with 32-bit integers, and with moderate amounts of memory. Finally, we give the verification values for the new problem size.

  15. IMPETUS - Interactive MultiPhysics Environment for Unified Simulations.

    PubMed

    Ha, Vi Q; Lykotrafitis, George

    2016-12-08

    We introduce IMPETUS - Interactive MultiPhysics Environment for Unified Simulations, an object oriented, easy-to-use, high performance, C++ program for three-dimensional simulations of complex physical systems that can benefit a large variety of research areas, especially in cell mechanics. The program implements cross-communication between locally interacting particles and continuum models residing in the same physical space while a network facilitates long-range particle interactions. Message Passing Interface is used for inter-processor communication for all simulations. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Specification of Fenix MPI Fault Tolerance library version 1.0.1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gamble, Marc; Van Der Wijngaart, Rob; Teranishi, Keita

    This document provides a specification of Fenix, a software library compatible with the Message Passing Interface (MPI) to support fault recovery without application shutdown. The library consists of two modules. The first, termed process recovery , restores an application to a consistent state after it has suffered a loss of one or more MPI processes (ranks). The second specifies functions the user can invoke to store application data in Fenix managed redundant storage, and to retrieve it from that storage after process recovery.

  17. Relay Forward-Link File Management Services (MaROS Phase 2)

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Hy, Franklin H.; Gladden, Roy E.

    2013-01-01

    This software provides the service-level functionality to manage the delivery of files from a lander mission repository to an orbiter mission repository for eventual spacelink relay by the orbiter asset on a specific communications pass. It provides further functions to deliver and track a set of mission-defined messages detailing lander authorization instructions and orbiter data delivery state. All of the information concerning these transactions is persisted in a database providing a high level of accountability of the forward-link relay process.

  18. 8755 Emulator Design

    DTIC Science & Technology

    1988-12-01

    Break Control....................51 8755 I/O Control..................54 Z-100 Control Software................. 55 Pass User Memory...the emulator SRAM and the other is 55 for the target SRAM. If either signal is replaced by the NACK signal the host computer displays an error message...Block Diagram 69 AUU M/M 8 in Fiur[:. cemti Daga 70m F’M I-- ’I ANLAD AMam U52 COMM ow U2 i M.2 " -n ax- U 6_- Figure 2b. Schematic Diagram 71 )-M -A -I

  19. Some Aspects of Parallel Implementation of the Finite Element Method on Message Passing Architectures

    DTIC Science & Technology

    1988-05-01

    for Advanced Computer Studies and Department of Computer Science University of Maryland College Park, MD 20742 4, ABSTRACT We discuss some aspects of...Computer Studies and Technology & Dept. of Compute. Scienc II. CONTROLLING OFFICE NAME AND ADDRESS Viyriyf~ 12. REPORT DATE Department of the Navy uo...number)-1/ 2.) We study the performance of CG and PCG by examining its performance for u E (0,1), for solving the two model problems with an accuracy

  20. Satellite telemetry: performance of animal-tracking systems

    USGS Publications Warehouse

    Keating, Kim A.; Brewster, Wayne G.; Key, Carl H.

    1991-01-01

    t: We used 10 Telonics ST-3 platform transmitter terminals (PTT's) configured for wolves and ungulates to examine the performance of the Argos satellite telemetry system. Under near-optimal conditions, 68 percentile errors for location qualities (NQ) 1, 2, and 3 were 1,188, 903, and 361 m, respectively. Errors (rE) exceeded expected values for NQ = 2 and 3, varied greatly among PTT's, increased as the difference (HE) between the estimated and actual PTT elevations increased, and were correlated nonlinearly with maximum satellite pass height (P,). We present a model of the relationships among rE, HE, and PH. Errors were bimodally distributed along the east-west axis and tended to occur away from the satellite when HE was positive. A southeasterly bias increased with HE, probably due to the particular distribution of satellite passes and effects of HE on rE. Under near-optimal conditions, 21 sensor message was received for up to 64% of available (PH, 50) satellite passes, and a location (NQ 2 1) was calculated for up to 63% of such passes. Sampling frequencies of sensor and location data declined 13 and 70%, respectively, for PTT's in a valley bottom and 65 and 86%, respectively, for PTT's on animals that were in valley bottoms. Sampling frequencies were greater for ungulate than for wolf collars.

Top