Turner, Raymond
2009-01-01
Computational models can be found everywhere in present day science and engineering. In providing a logical framework and foundation for the specification and design of specification languages, Raymond Turner uses this framework to introduce and study computable models. In doing so he presents the first systematic attempt to provide computational models with a logical foundation. Computable models have wide-ranging applications from programming language semantics and specification languages, through to knowledge representation languages and formalism for natural language semantics. They are al
Adolescents' Chunking of Computer Programs.
Magliaro, Susan; Burton, John K.
To investigate what children learn during computer programming instruction, students attending a summer computer camp were asked to recall either single lines or chunks of computer programs from either coherent or scrambled programs. The 16 subjects, ages 12 to 17, were divided into three instructional groups: (1) beginners, who were taught to…
Multidetector computed tomography of jaw lesions in children and adolescents
Full text: Jaw lesions in paediatric and adolescent population are uncommon and can arise in odontogenic or non-odontogenic tissues. With the advent of multidetector computed tomography (MDCT), algorithm for imaging jaw lesions has changed dramatically. This pictorial essay describes the imaging appearance of commonly encountered jaw lesions in children and adolescents with emphasis on MDCT findings
Why Adolescents Use a Computer-Based Health Information System.
Hawkins, Robert P.; And Others
The Body Awareness Resource Network (BARN) is a system of interactive computer programs designed to provide adolescents with confidential, nonjudgmental health information, behavior change strategies, and sources of referral. These programs cover five adolescent health areas: alcohol and other drugs, human sexuality, smoking prevention and…
Excessive recreational computer use and food consumption behaviour among adolescents.
L. Shi (Lu); Y. Mao (Yuping)
2010-01-01
textabstractINTRODUCTION: Using the 2005 California Health Interview Survey (CHIS) data, we explore the association between excessive recreational computer use and specific food consumption behavior among California's adolescents aged 12-17. METHOD: The adolescent component of CHIS 2005 measured the
Excessive recreational computer use and food consumption behaviour among adolescents
Mao Yuping; Shi Lu
2010-01-01
Abstract Introduction Using the 2005 California Health Interview Survey (CHIS) data, we explore the association between excessive recreational computer use and specific food consumption behavior among California's adolescents aged 12-17. Method The adolescent component of CHIS 2005 measured the respondents' average number of hours spent on viewing TV on a weekday, the average number of hours spent on viewing TV on a weekend day, the average number of hours spent on playing with a computer on ...
The Computational Development of Reinforcement Learning during Adolescence
Palminteri, S., Khamassi, M., Joffily, M., Coricelli, G.; Kilford, E. J.; Coricelli, G.; Blakemore, S J
2016-01-01
Adolescence is a period of life characterised by changes in learning and decision-making. Learning and decision-making do not rely on a unitary system, but instead require the coordination of different cognitive processes that can be mathematically formalised as dissociable computational modules. Here, we aimed to trace the developmental time-course of the computational modules responsible for learning from reward or punishment, and learning from counterfactual feedback. Adolescents and adult...
The Computational Development of Reinforcement Learning during Adolescence.
Stefano Palminteri; Emma J. Kilford; Giorgio Coricelli; Sarah-Jayne Blakemore
2016-01-01
Adolescence is a period of life characterised by changes in learning and decision-making. Learning and decision-making do not rely on a unitary system, but instead require the coordination of different cognitive processes that can be mathematically formalised as dissociable computational modules. Here, we aimed to trace the developmental time-course of the computational modules responsible for learning from reward or punishment, and learning from counterfactual feedback. Adolescents and adult...
Computational neurogenetic modeling
Benuskova, Lubica
2010-01-01
Computational Neurogenetic Modeling is a student text, introducing the scope and problems of a new scientific discipline - Computational Neurogenetic Modeling (CNGM). CNGM is concerned with the study and development of dynamic neuronal models for modeling brain functions with respect to genes and dynamic interactions between genes. These include neural network models and their integration with gene network models. This new area brings together knowledge from various scientific disciplines, such as computer and information science, neuroscience and cognitive science, genetics and molecular biol
Pediatric Computational Models
Soni, Bharat K.; Kim, Jong-Eun; Ito, Yasushi; Wagner, Christina D.; Yang, King-Hay
A computational model is a computer program that attempts to simulate a behavior of a complex system by solving mathematical equations associated with principles and laws of physics. Computational models can be used to predict the body's response to injury-producing conditions that cannot be simulated experimentally or measured in surrogate/animal experiments. Computational modeling also provides means by which valid experimental animal and cadaveric data can be extrapolated to a living person. Widely used computational models for injury biomechanics include multibody dynamics and finite element (FE) models. Both multibody and FE methods have been used extensively to study adult impact biomechanics in the past couple of decades.
The Computational Development of Reinforcement Learning during Adolescence.
Palminteri, Stefano; Kilford, Emma J; Coricelli, Giorgio; Blakemore, Sarah-Jayne
2016-06-01
Adolescence is a period of life characterised by changes in learning and decision-making. Learning and decision-making do not rely on a unitary system, but instead require the coordination of different cognitive processes that can be mathematically formalised as dissociable computational modules. Here, we aimed to trace the developmental time-course of the computational modules responsible for learning from reward or punishment, and learning from counterfactual feedback. Adolescents and adults carried out a novel reinforcement learning paradigm in which participants learned the association between cues and probabilistic outcomes, where the outcomes differed in valence (reward versus punishment) and feedback was either partial or complete (either the outcome of the chosen option only, or the outcomes of both the chosen and unchosen option, were displayed). Computational strategies changed during development: whereas adolescents' behaviour was better explained by a basic reinforcement learning algorithm, adults' behaviour integrated increasingly complex computational features, namely a counterfactual learning module (enabling enhanced performance in the presence of complete feedback) and a value contextualisation module (enabling symmetrical reward and punishment learning). Unlike adults, adolescent performance did not benefit from counterfactual (complete) feedback. In addition, while adults learned symmetrically from both reward and punishment, adolescents learned from reward but were less likely to learn from punishment. This tendency to rely on rewards and not to consider alternative consequences of actions might contribute to our understanding of decision-making in adolescence. PMID:27322574
The Computational Development of Reinforcement Learning during Adolescence.
Stefano Palminteri
2016-06-01
Full Text Available Adolescence is a period of life characterised by changes in learning and decision-making. Learning and decision-making do not rely on a unitary system, but instead require the coordination of different cognitive processes that can be mathematically formalised as dissociable computational modules. Here, we aimed to trace the developmental time-course of the computational modules responsible for learning from reward or punishment, and learning from counterfactual feedback. Adolescents and adults carried out a novel reinforcement learning paradigm in which participants learned the association between cues and probabilistic outcomes, where the outcomes differed in valence (reward versus punishment and feedback was either partial or complete (either the outcome of the chosen option only, or the outcomes of both the chosen and unchosen option, were displayed. Computational strategies changed during development: whereas adolescents' behaviour was better explained by a basic reinforcement learning algorithm, adults' behaviour integrated increasingly complex computational features, namely a counterfactual learning module (enabling enhanced performance in the presence of complete feedback and a value contextualisation module (enabling symmetrical reward and punishment learning. Unlike adults, adolescent performance did not benefit from counterfactual (complete feedback. In addition, while adults learned symmetrically from both reward and punishment, adolescents learned from reward but were less likely to learn from punishment. This tendency to rely on rewards and not to consider alternative consequences of actions might contribute to our understanding of decision-making in adolescence.
Variables of excessive computer internet use in childhood and adolescence
Thalemann, Ralf
2010-01-01
The aim of this doctoral thesis is the characterization of excessive computer and video gaming in terms of a behavioral addiction. Therefore, the development of a diagnostic psychometric instrument was central to differentiate between normal and pathological computer gaming in adolescence. In study 1, 323 children were asked about their video game playing behavior to assess the prevalence of pathological computer gaming. Data suggest that excessive computer and video game players use thei...
The CMS experiment at LHC has developed a baseline Computing Model addressing the needs of a computing system capable to operate in the first years of LHC running. It is focused on a data model with heavy streaming at the raw data level based on trigger, and on the achievement of the maximum flexibility in the use of distributed computing resources. The CMS distributed Computing Model includes a Tier-0 centre at CERN, a CMS Analysis Facility at CERN, several Tier-1 centres located at large regional computing centres, and many Tier-2 centres worldwide. The workflows have been identified, along with a baseline architecture for the data management infrastructure. This model is also being tested in Grid Service Challenges of increasing complexity, coordinated with the Worldwide LHC Computing Grid community
CHEN Shuyi; WEN Yingyou; ZHAO Hong
2006-01-01
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.
Adolescent Victims of Abuse: A Treatment Model.
Anderson-Merchant, Darlene
This paper presents a theory and model for treating adolescent victims of physical and sexual abuse and neglect. The theory examines issues related to abuse or neglect and the effect that an abusive history has on adolescent development. Specific issues noted are depression, anger, low self-esteem, self-shame, lack of trust, a sense of…
Computer Modeling and Simulation
Pronskikh, V. S. [Fermilab
2014-05-09
Verification and validation of computer codes and models used in simulation are two aspects of the scientific practice of high importance and have recently been discussed by philosophers of science. While verification is predominantly associated with the correctness of the way a model is represented by a computer code or algorithm, validation more often refers to model’s relation to the real world and its intended use. It has been argued that because complex simulations are generally not transparent to a practitioner, the Duhem problem can arise for verification and validation due to their entanglement; such an entanglement makes it impossible to distinguish whether a coding error or model’s general inadequacy to its target should be blamed in the case of the model failure. I argue that in order to disentangle verification and validation, a clear distinction between computer modeling (construction of mathematical computer models of elementary processes) and simulation (construction of models of composite objects and processes by means of numerical experimenting with them) needs to be made. Holding on to that distinction, I propose to relate verification (based on theoretical strategies such as inferences) to modeling and validation, which shares the common epistemology with experimentation, to simulation. To explain reasons of their intermittent entanglement I propose a weberian ideal-typical model of modeling and simulation as roles in practice. I suggest an approach to alleviate the Duhem problem for verification and validation generally applicable in practice and based on differences in epistemic strategies and scopes
Typologies of Computation and Computational Models
Burgin, Mark; Dodig-Crnkovic, Gordana
2013-01-01
We need much better understanding of information processing and computation as its primary form. Future progress of new computational devices capable of dealing with problems of big data, internet of things, semantic web, cognitive robotics and neuroinformatics depends on the adequate models of computation. In this article we first present the current state of the art through systematization of existing models and mechanisms, and outline basic structural framework of computation. We argue tha...
Computational Intelligence, Cyber Security and Computational Models
Anitha, R; Lekshmi, R; Kumar, M; Bonato, Anthony; Graña, Manuel
2014-01-01
This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.
The CMS Computing Model was developed and documented in 2004. Since then the model has evolved to be more flexible and to take advantage of new techniques, but many of the original concepts remain and are in active use. In this presentation we will discuss the changes planned for the restart of the LHC program in 2015. We will discuss the changes planning in the use and definition of the computing tiers that were defined with the MONARC project. We will present how we intend to use new services and infrastructure to provide more efficient and transparent access to the data. We will discuss the computing plans to make better use of the computing capacity by scheduling more of the processor nodes, making better use of the disk storage, and more intelligent use of the networking.
Grandi, Claudio; Colling, D; Fisk, I; Girone, M
2014-01-01
The CMS Computing Model was developed and documented in 2004. Since then the model has evolved to be more flexible and to take advantage of new techniques, but many of the original concepts remain and are in active use. In this presentation we will discuss the changes planned for the restart of the LHC program in 2015. We will discuss the changes planning in the use and definition of the computing tiers, that were defined with the MONARC project. We will present how we intend to use new services and infrastructure to provide more efficient and transparent access to the data. We will discuss the computing plans to make better use of the computing capacity by scheduling more of the processor nodes, making better use of the disk storage, and more intelligent use of the networking.
Emerging Hybrid Computational Models
Neruda, Roman
Berlin : Springer, 2006 - (Huang, D.; Li, K.; Irwin, G.), s. 379-389 ISBN 3-540-37274-1. - (Lecture Notes in Artificial Intelligence . 4114). [ICIC 2006. International Conference on Intelligent Computing. Kunming (CN), 16.08.2006-19.08.2006] R&D Projects: GA MŠk 1M0567 Grant ostatní: HPC-Europa(XE) RII3-CT-2003-506079 Institutional research plan: CEZ:AV0Z10300504 Keywords : computational intelligence * intelligent agents * hybrid models Subject RIV: IN - Informatics, Computer Science
Computational models of planning.
Geffner, Hector
2013-07-01
The selection of the action to do next is one of the central problems faced by autonomous agents. Natural and artificial systems address this problem in various ways: action responses can be hardwired, they can be learned, or they can be computed from a model of the situation, the actions, and the goals. Planning is the model-based approach to action selection and a fundamental ingredient of intelligent behavior in both humans and machines. Planning, however, is computationally hard as the consideration of all possible courses of action is not computationally feasible. The problem has been addressed by research in Artificial Intelligence that in recent years has uncovered simple but powerful computational principles that make planning feasible. The principles take the form of domain-independent methods for computing heuristics or appraisals that enable the effective generation of goal-directed behavior even over huge spaces. In this paper, we look at several planning models, at methods that have been shown to scale up to large problems, and at what these methods may suggest about the human mind. WIREs Cogn Sci 2013, 4:341-356. doi: 10.1002/wcs.1233 The authors have declared no conflicts of interest for this article. For further resources related to this article, please visit the WIREs website. PMID:26304223
Perceived problems with computer gaming and internet use among adolescents
Holstein, Bjørn E; Pedersen, Trine Pagh; Bendtsen, Pernille;
2014-01-01
new measures of perceived problems related to computer and console gaming and internet use among adolescents are appropriate, reliable and valid for use in non-clinical surveys about young people's everyday life and behaviour. These new measures do not assess Internet Gaming Disorder as it is listed......BACKGROUND: Existing instruments for measuring problematic computer and console gaming and internet use are often lengthy and often based on a pathological perspective. The objective was to develop and present a new and short non-clinical measurement tool for perceived problems related to computer...... weekdays on computer- and console-gaming and internet use for communication and surfing. The outcome measures were three indexes on perceived problems related to computer and console gaming and internet use. RESULTS: The three new indexes showed high face validity and acceptable internal consistency. Most...
Understanding Student Computational Thinking with Computational Modeling
Aiken, John M.; Caballero, Marcos D.; Douglas, Scott S.; Burk, John B.; Scanlon, Erin M.; Thoms, Brian D.; Schatz, Michael F.
2012-01-01
Recently, the National Research Council's framework for next generation science standards highlighted "computational thinking" as one of its "fundamental practices". 9th Grade students taking a physics course that employed the Modeling Instruction curriculum were taught to construct computational models of physical systems. Student computational thinking was assessed using a proctored programming assignment, written essay, and a series of think-aloud interviews, where the students produced an...
Excessive recreational computer use and food consumption behaviour among adolescents
Mao Yuping
2010-08-01
Full Text Available Abstract Introduction Using the 2005 California Health Interview Survey (CHIS data, we explore the association between excessive recreational computer use and specific food consumption behavior among California's adolescents aged 12-17. Method The adolescent component of CHIS 2005 measured the respondents' average number of hours spent on viewing TV on a weekday, the average number of hours spent on viewing TV on a weekend day, the average number of hours spent on playing with a computer on a weekday, and the average number of hours spent on playing with computers on a weekend day. We recode these four continuous variables into four variables of "excessive media use," and define more than three hours of using a medium per day as "excessive." These four variables are then used in logistic regressions to predict different food consumption behaviors on the previous day: having fast food, eating sugary food more than once, drinking sugary drinks more than once, and eating more than five servings of fruits and vegetables. We use the following variables as covariates in the logistic regressions: age, gender, race/ethnicity, parental education, household poverty status, whether born in the U.S., and whether living with two parents. Results Having fast food on the previous day is associated with excessive weekday TV viewing (O.R. = 1.38, p Conclusion Excessive recreational computer use independently predicts undesirable eating behaviors that could lead to overweight and obesity. Preventive measures ranging from parental/youth counseling to content regulations might be addressing the potential undesirable influence from excessive computer use on eating behaviors among children and adolescents.
Kolar, Jan
2013-01-01
15 minutes talk on practical implementation of the Geospatial Manged Objects and the concepts described in the article "Bytecode Unification of Computable Geospatial Models". The time index of the presentation: 1m 43s Minimalistic GMO 4m 08s Functional GMO Definition 6m 07s Accessing GMOs from Shell using Scala scripts 9m 24s Viewing GMOs using Virtual Globe component 12m 03s GRIFIN implementation of GMO technology 12m 36s GMO software clients using GRIFIN ...
Understanding Student Computational Thinking with Computational Modeling
Aiken, John M; Douglas, Scott S; Burk, John B; Scanlon, Erin M; Thoms, Brian D; Schatz, Michael F
2012-01-01
Recently, the National Research Council's framework for next generation science standards highlighted "computational thinking" as one of its "fundamental practices". Students taking a physics course that employed the Arizona State University's Modeling Instruction curriculum were taught to construct computational models of physical systems. Student computational thinking was assessed using a proctored programming assignment, written essay, and a series of think-aloud interviews, where the students produced and discussed a computational model of a baseball in motion via a high-level programming environment (VPython). Roughly a third of the students in the study were successful in completing the programming assignment. Student success on this assessment was tied to how students synthesized their knowledge of physics and computation. On the essay and interview assessments, students displayed unique views of the relationship between force and motion; those who spoke of this relationship in causal (rather than obs...
Cilesiz, Sebnem
2009-01-01
Computer use is a widespread leisure activity for adolescents. Leisure contexts, such as Internet cafes, constitute specific social environments for computer use and may hold significant educational potential. This article reports a phenomenological study of adolescents' experiences of educational computer use at Internet cafes in Turkey. The…
The ATLAS computing model was constructed to exploit the opportunities of the Grid in handling the large volumes of data from the Large Hadron Collider and to allow easy and relatively local access to data for all of its collaborators worldwide. Despite delays with collision data, the model has now been tested with beam-related and cosmic ray data, and much has been learned. The model has retained its overall design, but with adjustments for the actual functionality of the delivered Grid middleware and services, and for the realities of data access. While much has still to be learned, the model has worked effectively. This presentation will cover the roles of the various Tiers, the resources required and the expected workflows. (author)
Frank, M; Pacheco, Andreu
1998-01-01
This document is a first attempt to describe the LHCb computing model. The CPU power needed to process data for the event filter and reconstruction is estimated to be 2.2 \\Theta 106 MIPS. This will be installed at the experiment and will be reused during non data-taking periods for reprocessing. The maximal I/O of these activities is estimated to be around 40 MB/s.We have studied three basic models concerning the placement of the CPU resources for the other computing activities, Monte Carlo-simulation (1:4 \\Theta 106 MIPS) and physics analysis (0:5 \\Theta 106 MIPS): CPU resources may either be located at the physicist's homelab, national computer centres (Regional Centres) or at CERN.The CPU resources foreseen for analysis are sufficient to allow 100 concurrent analyses. It is assumed that physicists will work in physics groups that produce analysis data at an average rate of 4.2 MB/s or 11 TB per month. However, producing these group analysis data requires reading capabilities of 660 MB/s. It is further assu...
Kopper, Claudio, E-mail: claudio.kopper@nikhef.nl [NIKHEF, Science Park 105, 1098 XG Amsterdam (Netherlands)
2013-10-11
Completed in 2008, Antares is now the largest water Cherenkov neutrino telescope in the Northern Hemisphere. Its main goal is to detect neutrinos from galactic and extra-galactic sources. Due to the high background rate of atmospheric muons and the high level of bioluminescence, several on-line and off-line filtering algorithms have to be applied to the raw data taken by the instrument. To be able to handle this data stream, a dedicated computing infrastructure has been set up. The paper covers the main aspects of the current official Antares computing model. This includes an overview of on-line and off-line data handling and storage. In addition, the current usage of the “IceTray” software framework for Antares data processing is highlighted. Finally, an overview of the data storage formats used for high-level analysis is given.
Completed in 2008, Antares is now the largest water Cherenkov neutrino telescope in the Northern Hemisphere. Its main goal is to detect neutrinos from galactic and extra-galactic sources. Due to the high background rate of atmospheric muons and the high level of bioluminescence, several on-line and off-line filtering algorithms have to be applied to the raw data taken by the instrument. To be able to handle this data stream, a dedicated computing infrastructure has been set up. The paper covers the main aspects of the current official Antares computing model. This includes an overview of on-line and off-line data handling and storage. In addition, the current usage of the “IceTray” software framework for Antares data processing is highlighted. Finally, an overview of the data storage formats used for high-level analysis is given
Adolescent girls' energy expenditure during dance simulation active computer gaming.
Fawkner, Samantha G; Niven, Alisa; Thin, Alasdair G; Macdonald, Mhairi J; Oakes, Jemma R
2010-01-01
The objective of this study was to determine the energy expended and intensity of physical activity achieved by adolescent girls while playing on a dance simulation game. Twenty adolescent girls were recruited from a local secondary school. Resting oxygen uptake (VO(2)) and heart rate were analysed while sitting quietly and subsequently during approximately 30 min of game play, with 10 min at each of three increasing levels of difficulty. Energy expenditure was predicted from VO(2) at rest and during game play at three levels of play, from which the metabolic equivalents (METS) of game playing were derived. Mean +/- standard deviation energy expenditure for levels 1, 2, and 3 was 3.63 +/- 0.58, 3.65 +/- 0.54, and 4.14 +/- 0.71 kcal . min(-1) respectively, while mean activity for each level of play was at least of moderate intensity (>3 METS). Dance simulation active computer games provide an opportunity for most adolescent girls to exercise at moderate intensity. Therefore, regular playing might contribute to daily physical activity recommendations for good health in this at-risk population. PMID:20013462
Wong, Michelle S.; Nau, Claudia; Kharmats, Anna Yevgenyevna; Vedovato, Gabriela Milhassi; Cheskin, Lawrence J.; Gittelsohn, Joel; Lee, Bruce Y.
2015-01-01
Background Product placement influences consumer choices in retail stores. While sugar sweetened beverage (SSB) manufacturers expend considerable effort and resources to determine how product placement may increase SSB purchases, the information is proprietary and not available to the public health and research community. This study aims to quantify the effect of non-SSB product placement in corner stores on adolescent beverage purchasing behavior. Corner stores are small privately owned reta...
Two Models of Adolescent Self-Mutilation.
Ross, Shana; Heath, Nancy Lee
2003-01-01
Hostility and anxiety reduction models were simultaneously tested in order to determine whether self-mutilation (SM) in adolescence was characterized by greater feelings of anxiety and hostility. Students who SM reported significantly more anxiety and more intropunitive and extrapunitive hostility. Prior to SM feelings of both hostility and…
Plasticity modeling & computation
Borja, Ronaldo I
2013-01-01
There have been many excellent books written on the subject of plastic deformation in solids, but rarely can one find a textbook on this subject. “Plasticity Modeling & Computation” is a textbook written specifically for students who want to learn the theoretical, mathematical, and computational aspects of inelastic deformation in solids. It adopts a simple narrative style that is not mathematically overbearing, and has been written to emulate a professor giving a lecture on this subject inside a classroom. Each section is written to provide a balance between the relevant equations and the explanations behind them. Where relevant, sections end with one or more exercises designed to reinforce the understanding of the “lecture.” Color figures enhance the presentation and make the book very pleasant to read. For professors planning to use this textbook for their classes, the contents are sufficient for Parts A and B that can be taught in sequence over a period of two semesters or quarters.
Heo, Gyun
2013-01-01
The purpose of the present study was to identify latent classes resting on early adolescents' change trajectory patterns in using computers and the Internet for learning and to test the effects of gender, self-control, self-esteem, and game use in South Korea. Latent growth mixture modeling (LGMM) was used to identify subpopulations in the Korea…
Pipe network flow analysis was among the first civil engineering applications programmed for solution on the early commercial mainframe computers in the 1960s. Since that time, advancements in analytical techniques and computing power have enabled us to solve systems with tens o...
Computational modeling of concrete flow
Roussel, Nicolas; Geiker, Mette Rica; Dufour, Frederic; Thrane, Lars Nyholm; Szabo, Peter
2007-01-01
This paper provides a general overview of the present status regarding computational modeling of the flow of fresh concrete. The computational modeling techniques that can be found in the literature may be divided into three main families: single fluid simulations, numerical modeling of discrete...
A Novel Forensic Computing Model
XU Yunfeng; LU Yansheng
2006-01-01
According to the requirement of computer forensic and network forensic, a novel forensic computing model is presented, which exploits XML/OEM/RM data model, Data fusion technology, forensic knowledgebase, inference mechanism of expert system and evidence mining engine. This model takes advantage of flexility and openness, so it can be widely used in mining evidence.
Computational modeling in biomechanics
Mofrad, Mohammad
2010-01-01
This book provides a glimpse of the diverse and important roles that modern computational technology is playing in various areas of biomechanics. It includes unique chapters on ab initio quantum mechanical, molecular dynamic and scale coupling methods..
A physicist's model of computation
An attempt is presented to make a statement about what a computer is and how it works from the perspective of physics. The single observation that computation can be a reversible process allows for the same kind of insight into computing as was obtained by Carnot's discovery that heat engines could be modelled as reversible processes. It allows us to bring computation into the realm of physics, where the power of physics allows us to ask and answer questions that seemed intractable from the viewpoint of computer science. Strangely enough, this effort makes it clear why computers get cheaper every year. (author) 14 refs., 4 figs
Computational Reasoning across Multiple Models
Tsafnat, Guy; Coiera, Enrico W.
2009-01-01
Computational support of clinical decisions frequently requires the integration of data in a variety of formats and from multiple sources and domains. Some impressive multiscale computational models of biological phenomena have been developed as part of the study of disease and healthcare systems. One can now contemplate harnessing these models arising from computational biology and using highly interconnected clinical data to support clinical decision-making. Indeed, understanding how to bui...
Computer-Aided Modeling Framework
Fedorova, Marina; Sin, Gürkan; Gani, Rafiqul
Models are playing important roles in design and analysis of chemicals based products and the processes that manufacture them. Computer-aided methods and tools have the potential to reduce the number of experiments, which can be expensive and time consuming, and there is a benefit of working with...... development and application. The proposed work is a part of the project for development of methods and tools that will allow systematic generation, analysis and solution of models for various objectives. It will use the computer-aided modeling framework that is based on a modeling methodology, which combines...... contribution, the concept of template-based modeling is presented and application is highlighted for the specific case of catalytic membrane fixed bed models. The modeling template is integrated in a generic computer-aided modeling framework. Furthermore, modeling templates enable the idea of model reuse as...
Dispersion modeling using personal computers
Schulze, Richard H.
The widespread availability of personal computers and PC versions of models for these computers is changing the way dispersion modeling is performed. Research scientists, environmental engineers and meteorologists, whether associated with institutes, industry or regulatory agencies, can use screening models to determine the effect of proposed changes, and when more complicated studies are warranted. As model use becomes more egalitarian, better use of intellectual talent among modelers will occur. Scientists can focus on more difficult problems while industry and agency personnel can focus on more routine issues. Moreover, the presently available models enable nearly anyone with some scientific training to perform modeling and make reasonable estimates of air quality changes.
A Study of the Correlation between Computer Games and Adolescent Behavioral Problems
Shokouhi-Moqhaddam, Solmaz; Khezri-Moghadam, Noshiravan; Javanmard, Zeinab; Sarmadi-Ansar, Hassan; Aminaee, Mehran; Shokouhi-Moqhaddam, Majid; Zivari-Rahman, Mahmoud
2013-01-01
Background Today, due to developing communicative technologies, computer games and other audio-visual media as social phenomena, are very attractive and have a great effect on children and adolescents. The increasing popularity of these games among children and adolescents results in the public uncertainties about plausible harmful effects of these games. This study aimed to investigate the correlation between computer games and behavioral problems on male guidance school students. Methods Th...
Computer-Aided Modeling Framework
Fedorova, Marina; Sin, Gürkan; Gani, Rafiqul
them. As the required models may be complex and require multiple time and/or length scales, their development and application for product-process design is not trivial. Therefore, a systematic modeling framework can contribute by significantly reducing the time and resources needed for model...... development and application. The proposed work is a part of the project for development of methods and tools that will allow systematic generation, analysis and solution of models for various objectives. It will use the computer-aided modeling framework that is based on a modeling methodology, which combines...... contribution, the concept of template-based modeling is presented and application is highlighted for the specific case of catalytic membrane fixed bed models. The modeling template is integrated in a generic computer-aided modeling framework. Furthermore, modeling templates enable the idea of model reuse as...
Conti-Ramsden, Gina; Durkin, Kevin; Walker, Allan J.
2010-01-01
Individuals who are anxious about computers may be at a disadvantage in their learning. This investigation focused on the use of home computers for educational purposes. It compared computer anxiety in adolescents with and without a history of special needs related to language difficulties. Participants were 55 17-year-olds with specific language…
Modeling Developmental Complexity in Adolescence: Hormones and Behavior in Context.
Susman, Elizabeth J.
1997-01-01
The links between endocrine physiological processes and adolescent psychological processes are the focus of this article. Presents a brief history of biopsychosocial research in adolescent development. Discusses four models for conceptualizing hormone-behavior research as illustrative of biopsychosocial models. Concludes with challenges and…
Harju, Outi; Luukkonen, Anu-Helmi; Hakko, Helinä; Räsänen, Pirkko; Riala, Kaisa
2011-01-01
The Internet plays a major role in adolescents' free time activities and communication nowadays. The aim here was to investigate the possibility of an association of computers and video games or sports (team, individual) with psychiatric disorders among underage psychiatric inpatients. The series of adolescents (n = 508) had been diagnosed using semistructured interviews (K-SADS-PL). The results showed that an interest in computers and video games did not increase the risk of any specific psychiatric disorder among these adolescent inpatients, but the likelihood of a substance-related disorder was statistically significantly lower among the boys with computers as a hobby. Team sports were related to increased likelihood of conduct disorder among the boys, whereas the likelihood of an affective disorder was reduced. No such association was found in individual sports or among the girls. We conclude that social contacts and peers play an important role in preventing adolescent depression. PMID:21288072
Cosmic Logic: a Computational Model
Vanchurin, Vitaly
2015-01-01
We initiate a formal study of logical inferences in context of the measure problem in cosmology or what we call cosmic logic. We describe a simple computational model of cosmic logic suitable for analysis of, for example, discretized cosmological systems. The construction is based on a particular model of computation, developed by Alan Turing, with cosmic observers (CO), cosmic measures (CM) and cosmic symmetries (CS) described by Turing machines. CO machines always start with a blank tape an...
Patient-Specific Computational Modeling
Peña, Estefanía
2012-01-01
This book addresses patient-specific modeling. It integrates computational modeling, experimental procedures, imagine clinical segmentation and mesh generation with the finite element method (FEM) to solve problems in computational biomedicine and bioengineering. Specific areas of interest include cardiovascular problems, ocular and muscular systems and soft tissue modeling. Patient-specific modeling has been the subject of serious research over the last seven years and interest in the area is continually growing and this area is expected to further develop in the near future.
Computational models of epileptiform activity.
Wendling, Fabrice; Benquet, Pascal; Bartolomei, Fabrice; Jirsa, Viktor
2016-02-15
We reviewed computer models that have been developed to reproduce and explain epileptiform activity. Unlike other already-published reviews on computer models of epilepsy, the proposed overview starts from the various types of epileptiform activity encountered during both interictal and ictal periods. Computational models proposed so far in the context of partial and generalized epilepsies are classified according to the following taxonomy: neural mass, neural field, detailed network and formal mathematical models. Insights gained about interictal epileptic spikes and high-frequency oscillations, about fast oscillations at seizure onset, about seizure initiation and propagation, about spike-wave discharges and about status epilepticus are described. This review shows the richness and complementarity of the various modeling approaches as well as the fruitful contribution of the computational neuroscience community in the field of epilepsy research. It shows that models have progressively gained acceptance and are now considered as an efficient way of integrating structural, functional and pathophysiological data about neural systems into "coherent and interpretable views". The advantages, limitations and future of modeling approaches are discussed. Perspectives in epilepsy research and clinical epileptology indicate that very promising directions are foreseen, like model-guided experiments or model-guided therapeutic strategy, among others. PMID:25843066
N.P.M. Ezendam (Nicole); A. Oenema (Anke); P.M. van de Looij-Jansen (Petra); J. Brug (Hans)
2008-01-01
textabstractComputer tailoring may be a promising technique for prevention of overweight in adolescents. However, very few well-developed, evidence-based computer-tailored interventions are available for this target group. We developed and evaluated a computer-tailored intervention for adolescents t
van de Looij-Jansen Petra M
2007-11-01
Full Text Available Abstract Background Computer tailoring may be a promising technique for prevention of overweight in adolescents. However, very few well-developed, evidence-based computer-tailored interventions are available for this target group. We developed and evaluated a computer-tailored intervention for adolescents targeting energy balance-related behaviours: i.e. consumption of snacks, sugar-sweetened beverages, fruit, vegetables, and fibre, physical activity, and sedentary behaviours. This paper describes the planned development of a school-based computer-tailored intervention aimed at improving energy balance-related behaviours in order to prevent excessive weight gain in adolescents, and the protocol for evaluating this intervention. Methods/design Intervention development: Informed by the Precaution Adoption Process Model and the Theory of Planned Behaviour, the computer-tailored intervention provided feedback on personal behaviour and suggestions on how to modify it. The intervention (VETisnietVET translated as 'FATaintPHAT' has been developed for use in the first year of secondary school during eight lessons. Evaluation design: The intervention will be evaluated in a cluster-randomised trial including 20 schools with a 4-months and a 2-years follow-up. Outcome measures are BMI, waist circumference, energy balance-related behaviours, and potential determinants of these behaviours. Process measures are appreciation of and satisfaction with the program, exposure to the program's content, and implementation facilitators and barriers measured among students and teachers. Discussion This project resulted in a theory and evidence-based intervention that can be implemented in a school setting. A large-scale randomised controlled trial with a short and long-term follow-up will provide sound statements about the effectiveness of this computer-tailored intervention in adolescents. Trial Registration ISRCTN15743786
Computer Modelling of Dynamic Processes
B. Rybakin
2000-10-01
Full Text Available Results of numerical modeling of dynamic problems are summed in the article up. These problems are characteristic for various areas of human activity, in particular for problem solving in ecology. The following problems are considered in the present work: computer modeling of dynamic effects on elastic-plastic bodies, calculation and determination of performances of gas streams in gas cleaning equipment, modeling of biogas formation processes.
Computer-Mediated communication and the role of adolescence in language development
Collins, M.; Vinicius, L.
2009-01-01
This study explores the relationship between human language and changes in language use during adolescence. After reviewing current theories for the origin and evolution of language, the article tests the hypothesis that sexual selection played a vital role in the development of language by examining sexual dimorphism in language in a sample of adolescents of known age and sex. The analyses relied on computer-mediated communication and data from online journals, which provide an insight into ...
Computational models of complex systems
Dabbaghian, Vahid
2014-01-01
Computational and mathematical models provide us with the opportunities to investigate the complexities of real world problems. They allow us to apply our best analytical methods to define problems in a clearly mathematical manner and exhaustively test our solutions before committing expensive resources. This is made possible by assuming parameter(s) in a bounded environment, allowing for controllable experimentation, not always possible in live scenarios. For example, simulation of computational models allows the testing of theories in a manner that is both fundamentally deductive and experimental in nature. The main ingredients for such research ideas come from multiple disciplines and the importance of interdisciplinary research is well recognized by the scientific community. This book provides a window to the novel endeavours of the research communities to present their works by highlighting the value of computational modelling as a research tool when investigating complex systems. We hope that the reader...
Computational Modeling of Multiphase Reactors.
Joshi, J B; Nandakumar, K
2015-01-01
Multiphase reactors are very common in chemical industry, and numerous review articles exist that are focused on types of reactors, such as bubble columns, trickle beds, fluid catalytic beds, etc. Currently, there is a high degree of empiricism in the design process of such reactors owing to the complexity of coupled flow and reaction mechanisms. Hence, we focus on synthesizing recent advances in computational and experimental techniques that will enable future designs of such reactors in a more rational manner by exploring a large design space with high-fidelity models (computational fluid dynamics and computational chemistry models) that are validated with high-fidelity measurements (tomography and other detailed spatial measurements) to provide a high degree of rigor. Understanding the spatial distributions of dispersed phases and their interaction during scale up are key challenges that were traditionally addressed through pilot scale experiments, but now can be addressed through advanced modeling. PMID:26134737
Computational models of adult neurogenesis
Cecchi, Guillermo A.; Magnasco, Marcelo O.
2005-10-01
Experimental results in recent years have shown that adult neurogenesis is a significant phenomenon in the mammalian brain. Little is known, however, about the functional role played by the generation and destruction of neurons in the context of an adult brain. Here, we propose two models where new projection neurons are incorporated. We show that in both models, using incorporation and removal of neurons as a computational tool, it is possible to achieve a higher computational efficiency that in purely static, synapse-learning-driven networks. We also discuss the implication for understanding the role of adult neurogenesis in specific brain areas like the olfactory bulb and the dentate gyrus.
Pervasive Computing and Prosopopoietic Modelling
Michelsen, Anders Ib
2011-01-01
’, on the horizon, ’calm’, it also points to a much more important and slightly different perspective: that of creative action upon novel forms of artifice. Most importantly for this article, ubiquity and pervasive computing is seen to point to the continuous existence throughout the computational heritage since...... the mid-20th century of a paradoxical distinction/complicity between the technical organisation of computed function and the human Being, in the sense of creative action upon such function. This paradoxical distinction/complicity promotes a chiastic (Merleau-Ponty) relationship of extension of one...... into the other. It also indicates a generative creation that itself points to important issues of ontology with methodological implications for the design of computing. In this article these implications will be conceptualised as prosopopoietic modeling on the basis of Bernward Joerges introduction...
Subgraph Colouring Technique for Computer with Data Driven Computation Model
Liberios Vokorokos; Branislav Madoš; Norbert Ádám; Marek Čajkovský
2013-01-01
Paper deals with the data driven computation control paradigm, which is alternative to the mainstream control flow model of program execution control. In the second part of the paper we are introducing computer architecture that is proposed at the Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics, Technical University of Košice, according to the data driven computation control model with use of tile computing principles. In the final part of the paper,...
DFI Computer Modeling Software (CMS)
Cazalet, E.G.; Deziel, L.B. Jr.; Haas, S.M.; Martin, T.W.; Nesbitt, D.M.; Phillips, R.L.
1979-10-01
The data base management system used to create, edit and store models data and solutions for the LEAP system is described. The software is entirely in FORTRAN-G for the IBM 370 series of computers and provides interface with a commercial data base system SYSTEM-2000.
Computer Modelling of Channel Furnace
Musil, Ladislav; Matička, O.
Poznan: Politechnika Poznanska, 2003 - (Nawrowski, R.; Warchlewska, D.), s. 391-394 ISBN 83-912306-4-3. [Konferencja Naukowo - Techniczna /8./. Poznan/Kiekrz (PL), 07.05.2003-09.05.2003] R&D Projects: GA ČR GA102/03/0047 Keywords : electromagnetic field * computer modelling Subject RIV: JA - Electronics ; Optoelectronics, Electrical Engineering
A computational model of affects
Turkia, Mika
2008-01-01
This article provides a simple logical structure, in which affective concepts (i.e. concepts related to emotions and feelings) can be defined. The set of affects defined is similar to the set of emotions covered in the OCC model (Ortony A., Collins A., and Clore G. L.: The Cognitive Structure of Emotions. Cambridge University Press, 1988), but the model presented in this article is fully computationally defined.
Getting computer models to communicate
Today's computers have the processing power to deliver detailed and global simulations of complex industrial processes such as the operation of a nuclear reactor core. So should we be producing new, global numerical models to take full advantage of this new-found power? If so, it would be a long-term job. There is, however, another solution; to couple the existing validated numerical models together so that they work as one. (authors)
The role of parents and related factors on adolescent computer use
Epstein, Jennifer A.
2012-01-01
Background. Research suggested the importance of parents on their adolescents’ computer activity. Spending too much time on the computer for recreational purposes in particular has been found to be related to areas of public health concern in children/adolescents, including obesity and substance use. Design and Methods. The goal of the research was to determine the association between recreational computer use and potentially linked factors (parental monitoring, social influences to use com...
Use of television, videogames, and computer among children and adolescents in Italy
Marinelli Paolo; Albano Luciana; Di Giuseppe Gabriella; Patriarca Alessandro; Angelillo Italo F
2009-01-01
Abstract Background This survey determined the practices about television (video inclusive), videogames, and computer use in children and adolescents in Italy. Methods A self-administered anonymous questionnaire covered socio-demographics; behaviour about television, videogames, computer, and sports; parental control over television, videogames, and computer. Results Overall, 54.1% and 61% always ate lunch or dinner in front of the television, 89.5% had a television in the bedroom while 52.5%...
Hydronic distribution system computer model
Andrews, J.W.; Strasser, J.J.
1994-10-01
A computer model of a hot-water boiler and its associated hydronic thermal distribution loop has been developed at Brookhaven National Laboratory (BNL). It is intended to be incorporated as a submodel in a comprehensive model of residential-scale thermal distribution systems developed at Lawrence Berkeley. This will give the combined model the capability of modeling forced-air and hydronic distribution systems in the same house using the same supporting software. This report describes the development of the BNL hydronics model, initial results and internal consistency checks, and its intended relationship to the LBL model. A method of interacting with the LBL model that does not require physical integration of the two codes is described. This will provide capability now, with reduced up-front cost, as long as the number of runs required is not large.
Mohammadi, Mehrnoosh; RezaeiDehaghani, Abdollah; Mehrabi, Tayebeh; RezaeiDehaghani, Ali
2016-01-01
Background: As adolescents spend much time on playing computer games, their mental and social effects should be considered. The present study aimed to investigate the association between playing computer games and the mental and social health among male adolescents in Iran in 2014. Materials and Methods: This is a cross-sectional study conducted on 210 adolescents selected by multi-stage random sampling. Data were collected by Goldberg and Hillier general health (28 items) and Kiez social hea...
Intervention Strategies with Adolescents: The Newton Model.
Green, Matt
The problem of adolescent drug/alcohol abuse seems to have once again intensified during the 1980s. When the school is the only constant in an adolescent's life and when those same teenagers bring drugs and alcohol-related problems to school, the school has an obligation to implement change. The first step is identification of the problem. Beyond…
Parallel computing in enterprise modeling.
Goldsby, Michael E.; Armstrong, Robert C.; Shneider, Max S.; Vanderveen, Keith; Ray, Jaideep; Heath, Zach; Allan, Benjamin A.
2008-08-01
This report presents the results of our efforts to apply high-performance computing to entity-based simulations with a multi-use plugin for parallel computing. We use the term 'Entity-based simulation' to describe a class of simulation which includes both discrete event simulation and agent based simulation. What simulations of this class share, and what differs from more traditional models, is that the result sought is emergent from a large number of contributing entities. Logistic, economic and social simulations are members of this class where things or people are organized or self-organize to produce a solution. Entity-based problems never have an a priori ergodic principle that will greatly simplify calculations. Because the results of entity-based simulations can only be realized at scale, scalable computing is de rigueur for large problems. Having said that, the absence of a spatial organizing principal makes the decomposition of the problem onto processors problematic. In addition, practitioners in this domain commonly use the Java programming language which presents its own problems in a high-performance setting. The plugin we have developed, called the Parallel Particle Data Model, overcomes both of these obstacles and is now being used by two Sandia frameworks: the Decision Analysis Center, and the Seldon social simulation facility. While the ability to engage U.S.-sized problems is now available to the Decision Analysis Center, this plugin is central to the success of Seldon. Because Seldon relies on computationally intensive cognitive sub-models, this work is necessary to achieve the scale necessary for realistic results. With the recent upheavals in the financial markets, and the inscrutability of terrorist activity, this simulation domain will likely need a capability with ever greater fidelity. High-performance computing will play an important part in enabling that greater fidelity.
Cosmic logic: a computational model
Vanchurin, Vitaly
2016-02-01
We initiate a formal study of logical inferences in context of the measure problem in cosmology or what we call cosmic logic. We describe a simple computational model of cosmic logic suitable for analysis of, for example, discretized cosmological systems. The construction is based on a particular model of computation, developed by Alan Turing, with cosmic observers (CO), cosmic measures (CM) and cosmic symmetries (CS) described by Turing machines. CO machines always start with a blank tape and CM machines take CO's Turing number (also known as description number or Gödel number) as input and output the corresponding probability. Similarly, CS machines take CO's Turing number as input, but output either one if the CO machines are in the same equivalence class or zero otherwise. We argue that CS machines are more fundamental than CM machines and, thus, should be used as building blocks in constructing CM machines. We prove the non-computability of a CS machine which discriminates between two classes of CO machines: mortal that halts in finite time and immortal that runs forever. In context of eternal inflation this result implies that it is impossible to construct CM machines to compute probabilities on the set of all CO machines using cut-off prescriptions. The cut-off measures can still be used if the set is reduced to include only machines which halt after a finite and predetermined number of steps.
Minimal models of multidimensional computations.
Jeffrey D Fitzgerald
2011-03-01
Full Text Available The multidimensional computations performed by many biological systems are often characterized with limited information about the correlations between inputs and outputs. Given this limitation, our approach is to construct the maximum noise entropy response function of the system, leading to a closed-form and minimally biased model consistent with a given set of constraints on the input/output moments; the result is equivalent to conditional random field models from machine learning. For systems with binary outputs, such as neurons encoding sensory stimuli, the maximum noise entropy models are logistic functions whose arguments depend on the constraints. A constraint on the average output turns the binary maximum noise entropy models into minimum mutual information models, allowing for the calculation of the information content of the constraints and an information theoretic characterization of the system's computations. We use this approach to analyze the nonlinear input/output functions in macaque retina and thalamus; although these systems have been previously shown to be responsive to two input dimensions, the functional form of the response function in this reduced space had not been unambiguously identified. A second order model based on the logistic function is found to be both necessary and sufficient to accurately describe the neural responses to naturalistic stimuli, accounting for an average of 93% of the mutual information with a small number of parameters. Thus, despite the fact that the stimulus is highly non-Gaussian, the vast majority of the information in the neural responses is related to first and second order correlations. Our results suggest a principled and unbiased way to model multidimensional computations and determine the statistics of the inputs that are being encoded in the outputs.
Skin friction blistering: computer model.
Xing, Malcolm; Pan, Ning; Zhong, Wen; Maibach, Howard
2007-01-01
BACKGROUND/PURPOSE: Friction blisters, a common injury in sports and military operations, can adversely effect or even halt performance. Given its frequency and hazardous nature, recent research efforts appear limited. Blistering can be treated as a delamination phenomenon; similar issues in materials science have been extensively investigated in theory and experiment. An obstacle in studying blistering is the difficulty of conducting experiment on humans and animals. Computer modeling thus b...
A Cloud Computing Collaborative Architecture Model
Ali Bagherinia; Sohrab Hojjatkhah; Ali Jouharpoor; Akbar Bemana
2012-01-01
This research work present a model to execute long computational and other service in cloud computing that couldnt be executing in single computer system alone. While in all other existing cloud computing model users must pay cost for using cloud services this model is based on collaborative between each using system with other systems that they need to other services.
Effects of Violent and Non-Violent Computer Game Content on Memory Performance in Adolescents
Maass, Asja; Kollhorster, Kirsten; Riediger, Annemarie; MacDonald, Vanessa; Lohaus, Arnold
2011-01-01
The present study focuses on the short-term effects of electronic entertainment media on memory and learning processes. It compares the effects of violent versus non-violent computer game content in a condition of playing and in another condition of watching the same game. The participants consisted of 83 female and 94 male adolescents with a mean…
Playing Violent Video and Computer Games and Adolescent Self-Concept.
Funk, Jeanne B.; Buchman, Debra D.
1996-01-01
Documents current adolescent electronic game-playing habits, exploring associations among preference for violent games, frequency and location of play, and self-concept. Identifies marked gender differences in game-playing habits and in scores on a self-perception profile. Finds that for girls, more time playing video or computer games is…
Cosmic Logic: a Computational Model
Vanchurin, Vitaly
2015-01-01
We describe a simple computational model of cosmic logic suitable for analysis of, for example, discretized cosmological systems. The construction is based on a particular model of computation, developed by Alan Turing, with cosmic observers (CO), cosmic measures (CM) and cosmic symmetries (CS) described by Turing machines. CO machines always start with a blank tape and CM machines take CO's Turing number (also known as description number or G{\\" o}del number) as input and output the corresponding probability. Similarly, CS machines take CO's Turing number as input, but output either one if the CO machines are in the same equivalence class or zero otherwise. We argue that CS machines are more fundamental than CM machines and, thus, should be used as building blocks in constructing CM machines. We prove the non-computability of a CS machine which discriminates between two classes of CO machines: mortal that halts in finite time and immortal that runs forever. In context of eternal inflation this result implies...
The relationship between computer games and quality of life in adolescents
Dolatabadi, Nayereh Kasiri; Eslami, Ahmad Ali; Mostafavi, Firooze; Hassanzade, Akbar; Moradi, Azam
2013-01-01
Background: Term of doing computer games among teenagers is growing rapidly. This popular phenomenon can cause physical and psychosocial issues in them. Therefore, this study examined the relationship between computer games and quality of life domains in adolescents aging 12-15 years. Materials and Methods: In a cross-sectional study using the 2-stage stratified cluster sampling method, 444 male and female students in Borkhar were selected. The data collection tool consisted of 1) World Healt...
Computational Modeling in Tissue Engineering
2013-01-01
One of the major challenges in tissue engineering is the translation of biological knowledge on complex cell and tissue behavior into a predictive and robust engineering process. Mastering this complexity is an essential step towards clinical applications of tissue engineering. This volume discusses computational modeling tools that allow studying the biological complexity in a more quantitative way. More specifically, computational tools can help in: (i) quantifying and optimizing the tissue engineering product, e.g. by adapting scaffold design to optimize micro-environmental signals or by adapting selection criteria to improve homogeneity of the selected cell population; (ii) quantifying and optimizing the tissue engineering process, e.g. by adapting bioreactor design to improve quality and quantity of the final product; and (iii) assessing the influence of the in vivo environment on the behavior of the tissue engineering product, e.g. by investigating vascular ingrowth. The book presents examples of each...
MODEL IDENTIFICATION AND COMPUTER ALGEBRA.
Bollen, Kenneth A; Bauldry, Shawn
2010-10-01
Multiequation models that contain observed or latent variables are common in the social sciences. To determine whether unique parameter values exist for such models, one needs to assess model identification. In practice analysts rely on empirical checks that evaluate the singularity of the information matrix evaluated at sample estimates of parameters. The discrepancy between estimates and population values, the limitations of numerical assessments of ranks, and the difference between local and global identification make this practice less than perfect. In this paper we outline how to use computer algebra systems (CAS) to determine the local and global identification of multiequation models with or without latent variables. We demonstrate a symbolic CAS approach to local identification and develop a CAS approach to obtain explicit algebraic solutions for each of the model parameters. We illustrate the procedures with several examples, including a new proof of the identification of a model for handling missing data using auxiliary variables. We present an identification procedure for Structural Equation Models that makes use of CAS and that is a useful complement to current methods. PMID:21769158
Abedini, Yasamin; Zamani, Bibi Eshrat; Kheradmand, Ali; Rajabizadeh, Ghodratollah
2012-01-01
Background Addiction to computer (video) games in adolescents and its relationship with educational progress has recently attracted the attention of rearing and education experts as well as organizations and institutes involved in physical and mental health. The current research attempted to propose a structural model of the relationships between parenting styles, mothers’ occupation status, and addiction to computer games, self-control, and educational progress of secondary school students. ...
A Conceptual Model for Pervasive Computing
Ciarletta, Laurent; Dima, Alden
2000-01-01
As an emerging field, pervasive computing has not had the opportunity to develop a conceptual model similar to the OSI Reference Model used to describe computer networks. Such a model would be useful in properly classifying design issues and providing needed context. Inspired by the layers of abstraction provided by the OSI Reference Model, we present our Layered Pervasive Computing (LPC) model to facilitate discussion and analysis of pervasive computing systems by providing a much needed con...
Business model elements impacting cloud computing adoption
Bogataj, Kristina; Pucihar, Andreja; Sudzina, Frantisek
The paper presents a proposed research framework for identification of business model elements impacting Cloud Computing Adoption. We provide a definition of main Cloud Computing characteristics, discuss previous findings on factors impacting Cloud Computing Adoption, and investigate technology...... adoption theories, such as Diffusion of Innovations, Technology Acceptance Model, Unified Theory of Acceptance and Use of Technology. Further on, at research model for identification of Cloud Computing Adoption factors from a business model perspective is presented. The following business model building...
Modeling Computer Virus and Its Dynamics
Tao Dong; Xing He; Mei Peng; Junjian Huang
2013-01-01
Based on that the computer will be infected by infected computer and exposed computer, and some of the computers which are in suscepitible status and exposed status can get immunity by antivirus ability, a novel coumputer virus model is established. The dynamic behaviors of this model are investigated. First, the basic reproduction number R0, which is a threshold of the computer virus spreading in internet, is determined. Second, this model has a virus-free equilibrium P0, which means that th...
Possibilities of Economic Regulations Modelling Using Computers
Algirdas Jakutis
2011-04-01
Full Text Available This article presents possibilities of using computers for economic regulations modelling. The introduction gives a computer history and shows possibilities to use computers in many different ways. Research on the combination of economic regulations is carried out. Human and computer functions using economic regulations are presented. Research shows modelling possibilities of economic regulations with computer, text editors, text editing options. The article also presents economic regulations modelling algorithms and programs.
International Conference on Computational Intelligence, Cyber Security, and Computational Models
Ramasamy, Vijayalakshmi; Sheen, Shina; Veeramani, C; Bonato, Anthony; Batten, Lynn
2016-01-01
This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17 – 19, 2015. This book enriches with innovations in broad areas of research like computational modeling, computational intelligence and cyber security. These emerging inter disciplinary research areas have helped to solve multifaceted problems and gained lot of attention in recent years. This encompasses theory and applications, to provide design, analysis and modeling of the aforementioned key areas.
Social contagion and adolescent sexual behavior: a developmental EMOSA model.
Rodgers, J L; Rowe, D C
1993-07-01
Epidemic Models of the Onset of Social Activities (EMOSA models) describe the spread of adolescent transition behaviors (e.g., sexuality, smoking, and drinking) through an interacting adolescent network. A theory of social contagion is defined to explain how social influence affects sexual development. Contacts within a network can, with some transition rate or probability, result in an increase in level of sexual experience. Five stages of sexual development are posited. One submodel proposes a systematic progression through these stages; a competing submodel treats each as an independent process. These models are represented in sets of dynamically interacting recursive equations, which are fit to empirical prevalence data to estimate parameters. Model adjustments are substantively interpretable and can be used to test for and better understand social interaction processes that affect adolescent sexual behavior. PMID:8356187
Towards the Epidemiological Modeling of Computer Viruses
Xiaofan Yang; Lu-Xing Yang
2012-01-01
Epidemic dynamics of computer viruses is an emerging discipline aiming to understand the way that computer viruses spread on networks. This paper is intended to establish a series of rational epidemic models of computer viruses. First, a close inspection of some common characteristics shared by all typical computer viruses clearly reveals the flaws of previous models. Then, a generic epidemic model of viruses, which is named as the SLBS model, is proposed. Finally, diverse generalizations of ...
A twin study of computer anxiety in Turkish adolescents.
Deryakulu, Deniz; Calışkan, Erkan
2012-04-01
The present study investigated computer anxiety within a sample of Turkish twins aged 10-18. A total of 185 twin-pairs participated in the study. Of the twins, 64 pairs (34.6 percent) were monozygotic (MZ) and 121 pairs (65.4 percent) were dizygotic (DZ). Of the 121 DZ twins, 54 pairs (44.63 percent) were same-sex twins and 67 pairs (55.37 percent) were opposite-sex twins. Computer anxiety was assessed using Computer Anxiety Rating Scale-Turkish Version (CARS-TV), one of the three main scales of "Measuring Technophobia Instruments" developed by Rosen and Weil. The results of paired t test comparisons showed no significant differences in MZ and same-sex DZ twin-pairs' levels of computer anxiety. On the other hand, a significant difference was found in opposite-sex DZ twin-pairs' level of computer anxiety. Interesting enough, males appeared to be more computer anxious than their female co-twins. In the present study, using Falconer's formula, heritability estimate for computer anxiety was derived from correlations based on MZ and DZ twins' mean scores on CARS-TV. The results showed that 57 percent of the variance in computer anxiety was from genetics and 41.5 percent was from nonshared environmental factors. Shared environmental influence, on the other hand, was very small and negligible. Interpretations of results and potential directions for future research are presented. PMID:22394420
The role of parents and related factors on adolescent computer use
Jennifer A. Epstein
2012-02-01
Full Text Available Background. Research suggested the importance of parents on their adolescents’ computer activity. Spending too much time on the computer for recreational purposes in particular has been found to be related to areas of public health concern in children/adolescents, including obesity and substance use. Design and Methods. The goal of the research was to determine the association between recreational computer use and potentially linked factors (parental monitoring, social influences to use computers including parents, age of first computer use, self-control, and particular internet activities. Participants (aged 13-17 years and residing in the United States were recruited via the Internet to complete an anonymous survey online using a survey tool. The target sample of 200 participants who completed the survey was achieved. The sample’s average age was 16 and was 63% girls. Results. A set of regressions with recreational computer use as dependent variables were run. Conclusions. Less parental monitoring, younger age at first computer use, listening or downloading music from the internet more frequently, using the internet for educational purposes less frequently, and parent’s use of the computer for pleasure was related to spending a greater percentage of time on non-school computer use. These findings suggest the importance of parental monitoring and parental computer use on their children’s own computer use, and the influence of some internet activities on adolescent computer use. Finally, programs aimed at parents to help them increase the age when their children start using computers and learn how to place limits on recreational computer use are needed.
Ranked retrieval of Computational Biology models
Henkel Ron; Endler Lukas; Peters Andre; Le Novère Nicolas; Waltemath Dagmar
2010-01-01
Abstract Background The study of biological systems demands computational support. If targeting a biological problem, the reuse of existing computational models can save time and effort. Deciding for potentially suitable models, however, becomes more challenging with the increasing number of computational models available, and even more when considering the models' growing complexity. Firstly, among a set of potential model candidates it is difficult to decide for the model that best suits on...
Lang, Jason M.; Waterman, Jill; Baker, Bruce L.
2009-01-01
Computeen, a preventive technology and psychosocial skills development program for at-risk adolescents, was designed to improve computer skills, self-esteem, and school attitudes, and reduce behavior problems, by combining elements of community-based and empirically supported prevention programs. Fifty-five mostly Latino adolescents from 12 to 16…
Prevalence of headache in adolescents and association with use of computer and videogames.
Xavier, Michelle Katherine Andrade; Pitangui, Ana Carolina Rodarti; Silva, Georgia Rodrigues Reis; Oliveira, Valéria Mayaly Alves de; Beltrão, Natália Barros; Araújo, Rodrigo Cappato de
2015-11-01
The aim of this study was to determine the prevalence of headache in adolescents and its association with excessive use of electronic devices and games. The sample comprised 954 adolescents of both sexes (14 to 19 years) who answered a questionnaire about use of computers and electronic games, presence of headache and physical activity. The binary and multinomial logistic regression, with significance level of 5% was used for inferential analysis. The prevalence of headache was 80.6%. The excessive use of electronics devices proved to be a risk factor (OR = 1.21) for headache. Subjects aged between 14 and 16 years were less likely to report headache (OR = 0.64). Regarding classification, 17.9% of adolescents had tension-type headache, 19.3% had migraine and 43.4% other types of headache. The adolescents aged form 14 to 16 years had lower chance (OR ≤ 0.68) to report the tension-type headache and other types of headache. The excessive use of digital equipment, electronic games and attending the third year of high school proved to be risk factors for migraine-type development (OR ≥ 1.84). There was a high prevalence of headache in adolescents and high-time use of electronic devices. We observed an association between excessive use of electronic devices and the presence of headache, and this habit is considered a risk factor, especially for the development of migraine-type. PMID:26602725
A Computationally Efficient Bedrock Model
Fastook, J. L.
2002-05-01
Full treatments of the Earth's crust, mantle, and core for ice sheet modeling are often computationally overwhelming, in that the requirements to calculate a full self-gravitating spherical Earth model for the time-varying load history of an ice sheet are considerably greater than the computational requirements for the ice dynamics and thermodynamics combined. For this reason, we adopt a ``reasonable'' approximation for the behavior of the deforming bedrock beneath the ice sheet. This simpler model of the Earth treats the crust as an elastic plate supported from below by a hydrostatic fluid. Conservation of linear and angular momentum for an elastic plate leads to the classical Poisson-Kirchhoff fourth order differential equation in the crustal displacement. By adding a time-dependent term this treatment allows for an exponentially-decaying response of the bed to loading and unloading events. This component of the ice sheet model (along with the ice dynamics and thermodynamics) is solved using the Finite Element Method (FEM). C1 FEMs are difficult to implement in more than one dimension, and as such the engineering community has turned away from classical Poisson-Kirchhoff plate theory to treatments such as Reissner-Mindlin plate theory, which are able to accommodate transverse shear and hence require only C0 continuity of basis functions (only the function, and not the derivative, is required to be continuous at the element boundary) (Hughes 1987). This method reduces the complexity of the C1 formulation by adding additional degrees of freedom (the transverse shear in x and y) at each node. This ``reasonable'' solution is compared with two self-gravitating spherical Earth models (1. Ivins et al. (1997) and James and Ivins (1998) } and 2. Tushingham and Peltier 1991 ICE3G run by Jim Davis and Glenn Milne), as well as with preliminary results of residual rebound rates measured with GPS by the BIFROST project. Modeled responses of a simulated ice sheet experiencing a
Computer model of running crown forest fire
Barovik, D. V.; Taranchuk, V. B.
2010-01-01
Adapted mathematical model of running crown forest fire propagation is considered. The results of computer modelling and the peculiarities of forest fire behavior in heterogeneous forests are discussed.
Adolescent computer use and alcohol use: what are the role of quantity and content of computer use?
Epstein, Jennifer A
2011-05-01
The purpose of this study was to examine the relationship between computer use and alcohol use among adolescents. In particular, the goal of the research was to determine the role of lifetime drinking and past month drinking on quantity as measured by amount of time on the computer (for school work and excluding school work) and on content as measured by the frequency of a variety of activities on the internet (e.g., e-mail, searching for information, social networking, listen to/download music). Participants (aged 13-17 years and residing in the United States) were recruited via the internet to complete an anonymous survey online using a popular survey tool (N=270). Their average age was 16 and the sample was predominantly female (63% girls). A series of analyses was conducted with the computer use measures as dependent variables (hours on the computer per week for school work and excluding school work; various internet activities including e-mail, searching for information, social networking, listen to/download music) controlling for gender, age, academic performance and age of first computer use. Based on the results, past month drinkers used the computer more hours per week excluding school work than those who did not. As expected, there were no differences in hours based on alcohol use for computer use for school work. Drinking also had relationships with more frequent social networking and listening to/downloading music. These findings suggest that both quantity and content of computer use were related to adolescent drinking. PMID:21295917
Computational modeling of radionuclide resuspension
Freshly fallen radionuclide materials after an energetic release from a Radiological Dispersal Device (RDD) or by a nuclear accident similar to Chernobyl can be re-suspended back into air by wind or human activities. Re-suspended microscopic radionuclides can be a threat to humans who are in the immediate vicinity of the fallout. Wind tunnel experiments were conducted at the Wehrwissenschaftliches Institut fuer Schutztechnologien (WIS) facility in Germany and Computational Fluid Dynamics (CFD) analysis using FLUENT software was conducted at the University of Ontario Institute of Technology (UOIT) in Canada to determine the re-suspension factors of radioactive lanthanum oxide (140La2O3) powder which was used as a surrogate for RDD fallout. Both experimental and computational results show a linear increase in re-suspension factor from 0.25 μm to 1 μm particle sizes and exponentially decrease in re-suspension factor from 1 μm to 6 μm particle sizes. Results found using FLUENT software over-predicted the re-suspension factors for particle sizes between 1 μm and 3 μm. The over-prediction was attributed to surface roughness effects, and suggests the need to include natural surface profile with microscopic surface roughness elements into full CFD model to simulate physical behavior of the particles trapped in between roughness elements. (authors)
A Computational Model of Music Composition
Oberholtzer, Josiah W.
2015-01-01
This thesis documents my research into formalized score control, in order to demonstrate a computational model of music composition. When working computationally, models provide an explicit formal description of what objects exist within a given domain, how they behave, and what transformations they afford. The clearer the model becomes, the easier it is to extend and to construct increasingly higher-order abstractions around that model. In other words, a clear computational model of music no...
Adolescents Family Models : A Cross-Cultural Study
Mayer, Boris
2009-01-01
This study explores and compares the family models of adolescents across ten cultures using a typological and multilevel approach. Thereby, it aims to empirically contribute to Kagitcibasi s (2007) theory of family change. This theory postulates the existence of three ideal-typical family models across cultures: a family model of independence prevailing in Western societies, a family model of (total) interdependence prevailing in non-industrialized agrarian cultures, and as a synthesis of the...
Cupola Furnace Computer Process Model
Seymour Katz
2004-12-31
The cupola furnace generates more than 50% of the liquid iron used to produce the 9+ million tons of castings annually. The cupola converts iron and steel into cast iron. The main advantages of the cupola furnace are lower energy costs than those of competing furnaces (electric) and the ability to melt less expensive metallic scrap than the competing furnaces. However the chemical and physical processes that take place in the cupola furnace are highly complex making it difficult to operate the furnace in optimal fashion. The results are low energy efficiency and poor recovery of important and expensive alloy elements due to oxidation. Between 1990 and 2004 under the auspices of the Department of Energy, the American Foundry Society and General Motors Corp. a computer simulation of the cupola furnace was developed that accurately describes the complex behavior of the furnace. When provided with the furnace input conditions the model provides accurate values of the output conditions in a matter of seconds. It also provides key diagnostics. Using clues from the diagnostics a trained specialist can infer changes in the operation that will move the system toward higher efficiency. Repeating the process in an iterative fashion leads to near optimum operating conditions with just a few iterations. More advanced uses of the program have been examined. The program is currently being combined with an ''Expert System'' to permit optimization in real time. The program has been combined with ''neural network'' programs to affect very easy scanning of a wide range of furnace operation. Rudimentary efforts were successfully made to operate the furnace using a computer. References to these more advanced systems will be found in the ''Cupola Handbook''. Chapter 27, American Foundry Society, Des Plaines, IL (1999).
Linguistics Computation, Automatic Model Generation, and Intensions
Nourani, Cyrus F.
1994-01-01
Techniques are presented for defining models of computational linguistics theories. The methods of generalized diagrams that were developed by this author for modeling artificial intelligence planning and reasoning are shown to be applicable to models of computation of linguistics theories. It is shown that for extensional and intensional interpretations, models can be generated automatically which assign meaning to computations of linguistics theories for natural languages. Keywords: Computa...
Computational biomechanics for medicine imaging, modeling and computing
Doyle, Barry; Wittek, Adam; Nielsen, Poul; Miller, Karol
2016-01-01
The Computational Biomechanics for Medicine titles provide an opportunity for specialists in computational biomechanics to present their latest methodologies and advancements. This volume comprises eighteen of the newest approaches and applications of computational biomechanics, from researchers in Australia, New Zealand, USA, UK, Switzerland, Scotland, France and Russia. Some of the interesting topics discussed are: tailored computational models; traumatic brain injury; soft-tissue mechanics; medical image analysis; and clinically-relevant simulations. One of the greatest challenges facing the computational engineering community is to extend the success of computational mechanics to fields outside traditional engineering, in particular to biology, the biomedical sciences, and medicine. We hope the research presented within this book series will contribute to overcoming this grand challenge.
Violence in Young Adolescents' Relationships: A Path Model
Josephson, Wendy L.; Proulx, Jocelyn B.
2008-01-01
A structural equation model based on social cognitive theory was used to predict relationship violence from young adolescents' knowledge, self-efficacy, attitudes, and alternative conflict strategies (n = 143 male and 147 female grade 7-9 students). A direct causal effect was supported for violence-tolerant attitudes and psychologically aggressive…
Adolescent Personality: A Five-Factor Model Construct Validation
Baker, Spencer T.; Victor, James B.; Chambers, Anthony L.; Halverson, Jr., Charles F.
2004-01-01
The purpose of this study was to investigate convergent and discriminant validity of the five-factor model of adolescent personality in a school setting using three different raters (methods): self-ratings, peer ratings, and teacher ratings. The authors investigated validity through a multitrait-multimethod matrix and a confirmatory factor…
Developmental Trajectories of Adolescent Popularity: A Growth Curve Modelling Analysis
Cillessen, Antonius H. N.; Borch, Casey
2006-01-01
Growth curve modelling was used to examine developmental trajectories of sociometric and perceived popularity across eight years in adolescence, and the effects of gender, overt aggression, and relational aggression on these trajectories. Participants were 303 initially popular students (167 girls, 136 boys) for whom sociometric data were…
Regional brain activation associated with addiction of computer games in adolescents
Yoo, Y. H.; Shin, O. J.; Ko, Y. W.; Kim, H. J.; Yun, M. J.; Lee, J. D. [College of Medicine, Yonsei Univ., Seoul (Korea, Republic of)
2001-07-01
Excessive computer game (CG) playing may cause not only behavioral addiction, but also potential negative effects on developing brain. It is necessary to reveal how brain is affected by excessive use of CG playing and behavioral addiction of it. By using PET, we address the issue seeking to identifying patterns of regional brain activation associated with behavioral addiction and excessive use of CG playing by adolescents. 6 normal control and 8 adolescents who were met by the criteria of behavioral addiction on the survey as addiction groups with an addiction of CG playing were participated. Initial screening survey which is the adapted version of DSM-IV for pathologic gambling was done. PET were performed twice in each participants both during resting state and after 20 min playing of CG. Psychological test including Youth Self Report (YSR), memory and attention test and vocabulary item from KWAIS were performed. Scores of the vocabulary item from KWAIS and social competence from YSR were significantly lower in the addiction group. On PET, addiction group showed higher resting metabolism on inferior frontal, premotor, prefrontal and superior temporal area. Adolescents with addiction of CG revealed different patterns of regional brain activation comparing to control groups. These suggest behavioral addiction and excessive use of CG may result in functional alteration of developing brain in adolescents.
Regional brain activation associated with addiction of computer games in adolescents
Excessive computer game (CG) playing may cause not only behavioral addiction, but also potential negative effects on developing brain. It is necessary to reveal how brain is affected by excessive use of CG playing and behavioral addiction of it. By using PET, we address the issue seeking to identifying patterns of regional brain activation associated with behavioral addiction and excessive use of CG playing by adolescents. 6 normal control and 8 adolescents who were met by the criteria of behavioral addiction on the survey as addiction groups with an addiction of CG playing were participated. Initial screening survey which is the adapted version of DSM-IV for pathologic gambling was done. PET were performed twice in each participants both during resting state and after 20 min playing of CG. Psychological test including Youth Self Report (YSR), memory and attention test and vocabulary item from KWAIS were performed. Scores of the vocabulary item from KWAIS and social competence from YSR were significantly lower in the addiction group. On PET, addiction group showed higher resting metabolism on inferior frontal, premotor, prefrontal and superior temporal area. Adolescents with addiction of CG revealed different patterns of regional brain activation comparing to control groups. These suggest behavioral addiction and excessive use of CG may result in functional alteration of developing brain in adolescents
Suicidal ideation in adolescents: an explanatory model using LISREL.
Park, Young-Joo; Ryu, Hosihn; Han, Kuemsun; Kwon, Jung Hye; Kim, Han Kyeom; Kang, Hyun Cheol; Yoon, Ji-Won; Cheon, Suk-Hee; Shin, Hyunjeong
2010-03-01
Suicidal ideation has been reported to be a major factor in attempted and completed suicides. The purpose of this study is to test a structural model to explain adolescent suicidal ideation. Specifically tested is the relationship between the predictor variables of trait anger, anger suppression, entrapment, psychosomatic symptoms, depression, and resilience and the dependent variable of suicidal ideation. Data are collected from a convenience sample of 11,393 students from 36 middle schools and 23 high schools in Korea. Trait anger, entrapment, psychosomatic symptoms, depression, and resilience have a direct effect on suicidal ideation whereas anger suppression shows a significant indirect effect on adolescent suicidal ideation. The predictor variables account for 39% of the variance in suicidal ideation. The study findings suggest that future programs for prevention or alleviation of adolescents' suicidal ideation need to use interventions that facilitate their resilience and reduce their anger, entrapment feeling, psychosomatic symptoms, and depression. PMID:20040734
The Fermilab Central Computing Facility architectural model
The goal of the current Central Computing Upgrade at Fermilab is to create a computing environment that maximizes total productivity, particularly for high energy physics analysis. The Computing Department and the Next Computer Acquisition Committee decided upon a model which includes five components: an interactive front end, a Large-Scale Scientific Computer (LSSC, a mainframe computing engine), a microprocessor farm system, a file server, and workstations. With the exception of the file server, all segments of this model are currently in production: a VAX/VMS Cluster interactive front end, an Amdahl VM computing engine, ACP farms, and (primarily) VMS workstations. This presentation will discuss the implementation of the Fermilab Central Computing Facility Architectural Model. Implications for Code Management in such a heterogeneous environment, including issues such as modularity and centrality, will be considered. Special emphasis will be placed on connectivity and communications between the front-end, LSSC, and workstations, as practiced at Fermilab. 2 figs
Financial aspects of cloud computing business models
Jäätmaa, Jaakko
2010-01-01
The purpose of the study was to explore financial aspects of cloud computing business models from information technology (IT) services provider’s perspective. The financial aspects were divided into revenue model and related pricing mechanisms and cost structure and related cost accounting mechanisms according to business model ontology. Cloud computing is a new computing paradigm and the latest megatrend in IT industry developed as a result of the convergence of numerous new and existing...
[Conceptual model of teasing and bullying in adolescents].
Lien, Angela Shin-Yu; Dai, Yu-Tzu; Lee, Ya-Ling
2013-08-01
Teasing and bullying incident levels have increased markedly in recent years according to international news reports. School and community-level action to stop and prevent bullying is a key focus of government education policy worldwide. Teasing is a usual facet of social interaction among youth and is related to bullying behavior. Although teasing and bullying are significant concerns, references for relevant concept analysis are lacking in the nursing field. To facilitate early screening to identify high-risk bullies and help victims effectively stop bullying events, concept analysis is needed to clarify and distinguish between the two concepts of teasing and bullying. The aim of this study is to integrate relevant published literature to determine the reasons for and relationships between teasing and bullying. We chose obesity as an example to construct a teasing and bullying conceptual model for adolescents and used this model to explore the related factors and health impacts of obesity. We found that both teaser intent and recipient perceptions correlated with bullying behavior. Duration and severity may induce teasing to become bullying. Because weight-based teasing is common among adolescents, we chose obesity as an example issue to demonstrate our adolescents teasing and bullying concept model. We then integrated the antecedent and consequential factors of teasing and bullying for obese adolescents. Weight-control strategies can stop school bullying if early interventions are performed in high-risk populations. PMID:23922094
Computational Models for Nonlinear Aeroelastic Systems Project
National Aeronautics and Space Administration — Clear Science Corp. and Duke University propose to develop and demonstrate new and efficient computational methods of modeling nonlinear aeroelastic systems. The...
Computational nanophotonics modeling and applications
Musa, Sarhan M
2013-01-01
This reference offers tools for engineers, scientists, biologists, and others working with the computational techniques of nanophotonics. It introduces the key concepts of computational methods in a manner that is easily digestible for newcomers to the field. The book also examines future applications of nanophotonics in the technical industry and covers new developments and interdisciplinary research in engineering, science, and medicine. It provides an overview of the key computational nanophotonics and describes the technologies with an emphasis on how they work and their key benefits.
Computer Modeling of a Fusion Plasma
Cohen, B I
2000-12-15
Progress in the study of plasma physics and controlled fusion has been profoundly influenced by dramatic increases in computing capability. Computational plasma physics has become an equal partner with experiment and traditional theory. This presentation illustrates some of the progress in computer modeling of plasma physics and controlled fusion.
A computational model for feature binding
SHI ZhiWei; SHI ZhongZhi; LIU Xi; SHI ZhiPing
2008-01-01
The "Binding Problem" is an important problem across many disciplines, including psychology, neuroscience, computational modeling, and even philosophy. In this work, we proposed a novel computational model, Bayesian Linking Field Model, for feature binding in visual perception, by combining the idea of noisy neuron model, Bayesian method, Linking Field Network and competitive mechanism.Simulation Experiments demonstrated that our model perfectly fulfilled the task of feature binding in visual perception and provided us some enlightening idea for future research.
Computational cognitive models of summarization assessment skills
Lemaire, Benoît; Mandin, Sonia; Dessus, Philippe; Denhière, Guy
2005-01-01
This paper presents a general computational cognitive model of the way a summary is assessed by teachers. It is based on models of two subprocesses: determining the importance of sentences and guessing the cognitive rules that the student may have used. All models are based on Latent Semantic Analysis, a computational model of the representation of the meaning of words and sentences. Models' performances are compared with data from an experiment conducted with 278 middle school students. The ...
A computational model for feature binding
2008-01-01
The "Binding Problem" is an important problem across many disciplines, including psychology, neuroscience, computational modeling, and even philosophy. In this work, we proposed a novel computational model, Bayesian Linking Field Model, for feature binding in visual perception, by combining the idea of noisy neuron model, Bayesian method, Linking Field Network and competitive mechanism. Simulation Experiments demonstrated that our model perfectly fulfilled the task of feature binding in visual perception and provided us some enlightening idea for future research.
COLD-SAT Dynamic Model Computer Code
Bollenbacher, G.; Adams, N. S.
1995-01-01
COLD-SAT Dynamic Model (CSDM) computer code implements six-degree-of-freedom, rigid-body mathematical model for simulation of spacecraft in orbit around Earth. Investigates flow dynamics and thermodynamics of subcritical cryogenic fluids in microgravity. Consists of three parts: translation model, rotation model, and slosh model. Written in FORTRAN 77.
Computer Aided Continuous Time Stochastic Process Modelling
Kristensen, N.R.; Madsen, Henrik; Jørgensen, Sten Bay
2001-01-01
A grey-box approach to process modelling that combines deterministic and stochastic modelling is advocated for identification of models for model-based control of batch and semi-batch processes. A computer-aided tool designed for supporting decision-making within the corresponding modelling cycle...
Computational Emotion Model for Virtual Characters
Liu, Zhen
2008-01-01
Emotion is related to stimulus and cognitive appraisal. Emotion is very important for modern computer game. Emotion model of virtual characters is a challenging branch of computer science. A believable character should be provided with emotion and perception. In general, a virtual character is regarded as an autonomous agent with sense, perception, emotion behavior and action. A computational emotion model of virtual characters is presented in this chapter. The method is to construct virtual ...
Large Scale Computations in Air Pollution Modelling
Zlatev, Z.; Brandt, J.; Builtjes, P. J. H.;
Proceedings of the NATO Advanced Research Workshop on Large Scale Computations in Air Pollution Modelling, Sofia, Bulgaria, 6-10 July 1998......Proceedings of the NATO Advanced Research Workshop on Large Scale Computations in Air Pollution Modelling, Sofia, Bulgaria, 6-10 July 1998...
Savi Cakar, Firdevs; Karatas, Zeynep
2012-01-01
In this study, a developed model to explain a causal relationship between adolescent's self-esteem, perceived social support and hopelessness is tested. The purpose of the study is to explore the relationship between self-esteem, perceived social support and hopelessness in adolescents. A total of 257 adolescents, including 143 female and 114…
Raffaelli, Marcela; Armstrong, Jessica; Tran, Steve P; Griffith, Aisha N; Walker, Kathrin; Gutierrez, Vanessa
2016-06-01
Computer-assisted data collection offers advantages over traditional paper and pencil measures; however, little guidance is available regarding the logistics of conducting computer-assisted data collection with adolescents in group settings. To address this gap, we draw on our experiences conducting a multi-site longitudinal study of adolescent development. Structured questionnaires programmed on laptop computers using Audio Computer Assisted Self-Interviewing (ACASI) were administered to groups of adolescents in community-based and afterschool programs. Although implementing ACASI required additional work before entering the field, we benefited from reduced data processing time, high data quality, and high levels of youth motivation. Preliminary findings from an ethnically diverse sample of 265 youth indicate favorable perceptions of using ACASI. Using our experiences as a case study, we provide recommendations on selecting an appropriate data collection device (including hardware and software), preparing and testing the ACASI, conducting data collection in the field, and managing data. PMID:26950018
Model Railroading and Computer Fundamentals
McCormick, John W.
2007-01-01
Less than one half of one percent of all processors manufactured today end up in computers. The rest are embedded in other devices such as automobiles, airplanes, trains, satellites, and nearly every modern electronic device. Developing software for embedded systems requires a greater knowledge of hardware than developing for a typical desktop…
The Generic Model of Computation
Nachum Dershowitz
2012-01-01
Over the past two decades, Yuri Gurevich and his colleagues have formulated axiomatic foundations for the notion of algorithm, be it classical, interactive, or parallel, and formalized them in the new generic framework of abstract state machines. This approach has recently been extended to suggest a formalization of the notion of effective computation over arbitrary countable domains. The central notions are summarized herein.
Inna V. Petrova; Galina I. Efremova; Elena V. BELOVOL; Angelina A. Shagurova
2015-01-01
This paper is devoted to the problem of psychological addiction to video games. Features of influence of video games on the self-consciousness of adolescents are indicated. Distinctions between dependent behavior and a condition of preoccupation with video games are specified. Results of work which was carried out in Russia are designated. The purpose of the study was to investigate the influence of computer games on the “self-image” teenagers. 233 adolescents aged 13-15 years acted in qualit...
The promise and limits of computer modeling
Blilie, Charles
2007-01-01
Many books deal with the techniques of designing, building and testing computer models and simulations, but few have seriously examined what models are based on, their inherent limitations, and their essential role in extending human knowledge. This book fills this need.It focuses on computer models throughout, yet its exposition of the nature and limits of modeling is entirely general. A chapter on the development of celestial mechanics models illustrates how models progress and are essential to natural science. Chapters on models of global climate, population, economics and warfare, illustra
Etiological model of disordered eating behaviors in Brazilian adolescent girls.
Fortes, Leonardo de Sousa; Filgueiras, Juliana Fernandes; Oliveira, Fernanda da Costa; Almeida, Sebastião Sousa; Ferreira, Maria Elisa Caputo
2016-01-01
The objective was to construct an etiological model of disordered eating behaviors in Brazilian adolescent girls. A total of 1,358 adolescent girls from four cities participated. The study used psychometric scales to assess disordered eating behaviors, body dissatisfaction, media pressure, self-esteem, mood, depressive symptoms, and perfectionism. Weight, height, and skinfolds were measured to calculate body mass index (BMI) and percent body fat (%F). Structural equation modeling explained 76% of variance in disordered eating behaviors (F(9, 1,351) = 74.50; p = 0.001). The findings indicate that body dissatisfaction mediated the relationship between media pressures, self-esteem, mood, BMI, %F, and disordered eating behaviors (F(9, 1,351) = 59.89; p = 0.001). Although depressive symptoms were not related to body dissatisfaction, the model indicated a direct relationship with disordered eating behaviors (F(2, 1,356) = 23.98; p = 0.001). In conclusion, only perfectionism failed to fit the etiological model of disordered eating behaviors in Brazilian adolescent girls. PMID:27167040
Computational Modeling of Adult Neurogenesis.
Aimone, James B
2016-01-01
The restriction of adult neurogenesis to only a handful of regions of the brain is suggestive of some shared requirement for this dramatic form of structural plasticity. However, a common driver across neurogenic regions has not yet been identified. Computational studies have been invaluable in providing insight into the functional role of new neurons; however, researchers have typically focused on specific scales ranging from abstract neural networks to specific neural systems, most commonly the dentate gyrus area of the hippocampus. These studies have yielded a number of diverse potential functions for new neurons, ranging from an impact on pattern separation to the incorporation of time into episodic memories to enabling the forgetting of old information. This review will summarize these past computational efforts and discuss whether these proposed theoretical functions can be unified into a common rationale for why neurogenesis is required in these unique neural circuits. PMID:26933191
Economic growth models: symbolic and numerical computations
P. B. Vasconcelos
2013-11-01
Full Text Available Growth economic models play a crucial role in understanding countries development, inter-country macroeconomic relationship and, ultimately, to anticipate the effects on endogenous variables due to political shocks on model parameters or exogenous variables. Yet, build a mathematical model can be a difficult and time consuming task. Symbolic computations can be of great help in the development process. Then, the ability to simulate, under initial assumptions, is, assuredly, a priceless tool for policy makers to take decisions and to adapt them along the time. Robust and efficient solvers are required to allow for reliable and fast answers. This paper deals with an integrated computational approach to economic growth models, based on the exceptional ability of MATLAB's numerical computing and exploring its symbolic computing capabilities. Illustration is made with the Ramsey-Cass-Koopmans model, one of the macroeconomic workhorse models.
Computational Modeling of Cardiac Electromechanics
Krishnamoorthi, Shankarjee
2013-01-01
Cardiac arrhythmias are a leading cause of death worldwide. Notably, the electrophysiologiy and microstructural requirements for a fatal ventricular arrhythmia remain incompletely understood, thereby the treatment remains largely empirical. Standard antiarrhythmic drug therapy has failed to reduce, and in some instances has increased, the incidence of Sudden Cardiac Death (SCD). Hence, a more complete understanding of the mechanisms that foment a fatal arrhythmia is needed and computational m...
Creation of 'Ukrytie' objects computer model
A partial computer model of the 'Ukrytie' object was created with the use of geoinformation technologies. The computer model makes it possible to carry out information support of the works related to the 'Ukrytie' object stabilization and its conversion into ecologically safe system for analyzing, forecasting and controlling the processes occurring in the 'Ukrytie' object. Elements and structures of the 'Ukryttia' object were designed and input into the model
Uncertainty in biology: a computational modeling approach
2015-01-01
Computational modeling of biomedical processes is gaining more and more weight in the current research into the etiology of biomedical problems and potential treatment strategies. Computational modeling allows to reduce, refine and replace animal experimentation as well as to translate findings obtained in these experiments to the human background. However these biomedical problems are inherently complex with a myriad of influencing factors, which strongly complicates the model building...
Uncertainty in biology a computational modeling approach
Gomez-Cabrero, David
2016-01-01
Computational modeling of biomedical processes is gaining more and more weight in the current research into the etiology of biomedical problems and potential treatment strategies. Computational modeling allows to reduce, refine and replace animal experimentation as well as to translate findings obtained in these experiments to the human background. However these biomedical problems are inherently complex with a myriad of influencing factors, which strongly complicates the model building and validation process. This book wants to address four main issues related to the building and validation of computational models of biomedical processes: Modeling establishment under uncertainty Model selection and parameter fitting Sensitivity analysis and model adaptation Model predictions under uncertainty In each of the abovementioned areas, the book discusses a number of key-techniques by means of a general theoretical description followed by one or more practical examples. This book is intended for graduate stude...
Sensor field: a computational model
Álvarez Faura, M. del Carme; Duch Brown, Amalia; Gabarró Vallès, Joaquim; Serna Iglesias, María José
2009-01-01
In this work we introduce a formal model for studying networks of tiny artifacts, the static synchronous sensor field model (SSSF). The model consider that these devices communicate among them by means of a communication graph. A sensor field interacts with the environment with input/output data streams. We start analyzing the behavior of networks in which at every step each sensor takes a new input data item and outputs (with some possible latency) an output data item. Accordingly we intr...
MODEL IDENTIFICATION AND COMPUTER ALGEBRA
Bollen, Kenneth A.; Bauldry, Shawn
2010-01-01
Multiequation models that contain observed or latent variables are common in the social sciences. To determine whether unique parameter values exist for such models, one needs to assess model identification. In practice analysts rely on empirical checks that evaluate the singularity of the information matrix evaluated at sample estimates of parameters. The discrepancy between estimates and population values, the limitations of numerical assessments of ranks, and the difference between local a...
Introducing Seismic Tomography with Computational Modeling
Neves, R.; Neves, M. L.; Teodoro, V.
2011-12-01
Learning seismic tomography principles and techniques involves advanced physical and computational knowledge. In depth learning of such computational skills is a difficult cognitive process that requires a strong background in physics, mathematics and computer programming. The corresponding learning environments and pedagogic methodologies should then involve sets of computational modelling activities with computer software systems which allow students the possibility to improve their mathematical or programming knowledge and simultaneously focus on the learning of seismic wave propagation and inverse theory. To reduce the level of cognitive opacity associated with mathematical or programming knowledge, several computer modelling systems have already been developed (Neves & Teodoro, 2010). Among such systems, Modellus is particularly well suited to achieve this goal because it is a domain general environment for explorative and expressive modelling with the following main advantages: 1) an easy and intuitive creation of mathematical models using just standard mathematical notation; 2) the simultaneous exploration of images, tables, graphs and object animations; 3) the attribution of mathematical properties expressed in the models to animated objects; and finally 4) the computation and display of mathematical quantities obtained from the analysis of images and graphs. Here we describe virtual simulations and educational exercises which enable students an easy grasp of the fundamental of seismic tomography. The simulations make the lecture more interactive and allow students the possibility to overcome their lack of advanced mathematical or programming knowledge and focus on the learning of seismological concepts and processes taking advantage of basic scientific computation methods and tools.
Jorge Delva; Liyun Wu
2012-01-01
We used longitudinal data to investigate the relationship between computer use in internet cafés and smoking/drinking behavior among Chinese adolescents and young adults. Data are from two waves of the China Health and Nutrition Survey (2004 and 2006). Fixed effects models were used to examine if changes in internet café use were associated with changes in cigarette smoking and drinking of alcohol. Male café users spent on average 17.3 hours in front of the computer/week. This was associated ...
Adolescent Contraceptive Use: Models, Research, and Directions.
Whitley, Bernard E., Jr.; Schofield, Janet Ward
Both the career model and the decision model have been proposed to explain patterns of contraceptive use in teenagers. The career model views contraceptive use as a symbol of a woman's sexuality and implies a clear decision to be sexually active. The decision model is based on the subjective expected utility (SEU) theory which holds that people…
Notions of similarity for computational biology models
Waltemath, Dagmar
2016-03-21
Computational models used in biology are rapidly increasing in complexity, size, and numbers. To build such large models, researchers need to rely on software tools for model retrieval, model combination, and version control. These tools need to be able to quantify the differences and similarities between computational models. However, depending on the specific application, the notion of similarity may greatly vary. A general notion of model similarity, applicable to various types of models, is still missing. Here, we introduce a general notion of quantitative model similarities, survey the use of existing model comparison methods in model building and management, and discuss potential applications of model comparison. To frame model comparison as a general problem, we describe a theoretical approach to defining and computing similarities based on different model aspects. Potentially relevant aspects of a model comprise its references to biological entities, network structure, mathematical equations and parameters, and dynamic behaviour. Future similarity measures could combine these model aspects in flexible, problem-specific ways in order to mimic users\\' intuition about model similarity, and to support complex model searches in databases.
Computer-Aided Modelling Methods and Tools
Cameron, Ian; Gani, Rafiqul
2011-01-01
The development of models for a range of applications requires methods and tools. In many cases a reference model is required that allows the generation of application specific models that are fit for purpose. There are a range of computer aided modelling tools available that help to define the...... shows a taxonomy of aspects around conservation, constraints and constitutive relations. Aspects of the ICAS-MoT toolbox are given to illustrate the functionality of a computer aided modelling tool, which incorporates an interface to MS Excel....
Predictive Models and Computational Embryology
EPA’s ‘virtual embryo’ project is building an integrative systems biology framework for predictive models of developmental toxicity. One schema involves a knowledge-driven adverse outcome pathway (AOP) framework utilizing information from public databases, standardized ontologies...
Computer Model Locates Environmental Hazards
2008-01-01
Catherine Huybrechts Burton founded San Francisco-based Endpoint Environmental (2E) LLC in 2005 while she was a student intern and project manager at Ames Research Center with NASA's DEVELOP program. The 2E team created the Tire Identification from Reflectance model, which algorithmically processes satellite images using turnkey technology to retain only the darkest parts of an image. This model allows 2E to locate piles of rubber tires, which often are stockpiled illegally and cause hazardous environmental conditions and fires.
COSP - A computer model of cyclic oxidation
Lowell, Carl E.; Barrett, Charles A.; Palmer, Raymond W.; Auping, Judith V.; Probst, Hubert B.
1991-01-01
A computer model useful in predicting the cyclic oxidation behavior of alloys is presented. The model considers the oxygen uptake due to scale formation during the heating cycle and the loss of oxide due to spalling during the cooling cycle. The balance between scale formation and scale loss is modeled and used to predict weight change and metal loss kinetics. A simple uniform spalling model is compared to a more complex random spall site model. In nearly all cases, the simpler uniform spall model gave predictions as accurate as the more complex model. The model has been applied to several nickel-base alloys which, depending upon composition, form Al2O3 or Cr2O3 during oxidation. The model has been validated by several experimental approaches. Versions of the model that run on a personal computer are available.
Computational Models for Nonlinear Aeroelastic Systems Project
National Aeronautics and Space Administration — Clear Science Corp. and Duke University propose to develop and demonstrate a new and efficient computational method of modeling nonlinear aeroelastic systems. The...
A new epidemic model of computer viruses
Yang, Lu-Xing; Yang, Xiaofan
2014-06-01
This paper addresses the epidemiological modeling of computer viruses. By incorporating the effect of removable storage media, considering the possibility of connecting infected computers to the Internet, and removing the conservative restriction on the total number of computers connected to the Internet, a new epidemic model is proposed. Unlike most previous models, the proposed model has no virus-free equilibrium and has a unique endemic equilibrium. With the aid of the theory of asymptotically autonomous systems as well as the generalized Poincare-Bendixson theorem, the endemic equilibrium is shown to be globally asymptotically stable. By analyzing the influence of different system parameters on the steady number of infected computers, a collection of policies is recommended to prohibit the virus prevalence.
Sierra toolkit computational mesh conceptual model
The Sierra Toolkit computational mesh is a software library intended to support massively parallel multi-physics computations on dynamically changing unstructured meshes. This domain of intended use is inherently complex due to distributed memory parallelism, parallel scalability, heterogeneity of physics, heterogeneous discretization of an unstructured mesh, and runtime adaptation of the mesh. Management of this inherent complexity begins with a conceptual analysis and modeling of this domain of intended use; i.e., development of a domain model. The Sierra Toolkit computational mesh software library is designed and implemented based upon this domain model. Software developers using, maintaining, or extending the Sierra Toolkit computational mesh library must be familiar with the concepts/domain model presented in this report.
Computer simulations of the random barrier model
Schrøder, Thomas; Dyre, Jeppe
2002-01-01
A brief review of experimental facts regarding ac electronic and ionic conduction in disordered solids is given followed by a discussion of what is perhaps the simplest realistic model, the random barrier model (symmetric hopping model). Results from large scale computer simulations are presented...
Efficient sampling and meta-modeling in computational economic models
I. Salle; M. Yıldızoğlu
2014-01-01
Extensive exploration of simulation models comes at a high computational cost, all the more when the model involves a lot of parameters. Economists usually rely on random explorations, such as Monte Carlo simulations, and basic econometric modeling to approximate the properties of computational mode
Chen, Mei-Yen; Liou, Yiing-Mei; Wu, Jen-Yee
2008-03-01
Television and computers provide significant benefits for learning about the world. Some studies have linked excessive television (TV) watching or computer game playing to disadvantage of health status or some unhealthy behavior among adolescents. However, the relationships between watching TV/playing computer games and adolescents adopting health promoting behavior were limited. This study aimed to discover the relationship between time spent on watching TV and on leisure use of computers and adolescents' health promoting behavior, and associated factors. This paper used secondary data analysis from part of a health promotion project in Taoyuan County, Taiwan. A cross-sectional design was used and purposive sampling was conducted among adolescents in the original project. A total of 660 participants answered the questions appropriately for this work between January and June 2004. Findings showed the mean age of the respondents was 15.0 +/- 1.7 years. The mean numbers of TV watching hours were 2.28 and 4.07 on weekdays and weekends respectively. The mean hours of leisure (non-academic) computer use were 1.64 and 3.38 on weekdays and weekends respectively. Results indicated that adolescents spent significant time watching TV and using the computer, which was negatively associated with adopting health-promoting behaviors such as life appreciation, health responsibility, social support and exercise behavior. Moreover, being boys, being overweight, living in a rural area, and being middle-school students were significantly associated with spending long periods watching TV and using the computer. Therefore, primary health care providers should record the TV and non-academic computer time of youths when conducting health promotion programs, and educate parents on how to become good and healthy electronic media users. PMID:18348110
Quantum Computing and Dynamical Quantum Models
Aaronson, Scott
2002-01-01
A dynamical quantum model assigns an eigenstate to a specified observable even when no measurement is made, and gives a stochastic evolution rule for that eigenstate. Such a model yields a distribution over classical histories of a quantum state. We study what can be computed by sampling from that distribution, i.e., by examining an observer's entire history. We show that, relative to an oracle, one can solve problems in polynomial time that are intractable even for quantum computers; and can...
Lee, Choonsik; Kim, Kwang Pyo; Long, Daniel J.; Bolch, Wesley E. [Division of Cancer Epidemiology and Genetics, National Cancer Institute, National Institute of Health, Bethesda, Maryland 20852 (United States); Department of Nuclear Engineering, Kyung Hee University, Gyeonggi-do, 446906 (Korea, Republic of); J. Crayton Pruitt Family Department of Biomedical Engineering, University of Florida, Gainesville, Florida 32611 (United States)
2012-04-15
Purpose: To establish an organ dose database for pediatric and adolescent reference individuals undergoing computed tomography (CT) examinations by using Monte Carlo simulation. The data will permit rapid estimates of organ and effective doses for patients of different age, gender, examination type, and CT scanner model. Methods: The Monte Carlo simulation model of a Siemens Sensation 16 CT scanner previously published was employed as a base CT scanner model. A set of absorbed doses for 33 organs/tissues normalized to the product of 100 mAs and CTDI{sub vol} (mGy/100 mAs mGy) was established by coupling the CT scanner model with age-dependent reference pediatric hybrid phantoms. A series of single axial scans from the top of head to the feet of the phantoms was performed at a slice thickness of 10 mm, and at tube potentials of 80, 100, and 120 kVp. Using the established CTDI{sub vol}- and 100 mAs-normalized dose matrix, organ doses for different pediatric phantoms undergoing head, chest, abdomen-pelvis, and chest-abdomen-pelvis (CAP) scans with the Siemens Sensation 16 scanner were estimated and analyzed. The results were then compared with the values obtained from three independent published methods: CT-Expo software, organ dose for abdominal CT scan derived empirically from patient abdominal circumference, and effective dose per dose-length product (DLP). Results: Organ and effective doses were calculated and normalized to 100 mAs and CTDI{sub vol} for different CT examinations. At the same technical setting, dose to the organs, which were entirely included in the CT beam coverage, were higher by from 40 to 80% for newborn phantoms compared to those of 15-year phantoms. An increase of tube potential from 80 to 120 kVp resulted in 2.5-2.9-fold greater brain dose for head scans. The results from this study were compared with three different published studies and/or techniques. First, organ doses were compared to those given by CT-Expo which revealed dose
Computational aspects of premixing modelling
Fletcher, D.F. [Sydney Univ., NSW (Australia). Dept. of Chemical Engineering; Witt, P.J.
1998-01-01
In the steam explosion research field there is currently considerable effort being devoted to the modelling of premixing. Practically all models are based on the multiphase flow equations which treat the mixture as an interpenetrating continuum. Solution of these equations is non-trivial and a wide range of solution procedures are in use. This paper addresses some numerical aspects of this problem. In particular, we examine the effect of the differencing scheme for the convective terms and show that use of hybrid differencing can cause qualitatively wrong solutions in some situations. Calculations are performed for the Oxford tests, the BNL tests, a MAGICO test and to investigate various sensitivities of the solution. In addition, we show that use of a staggered grid can result in a significant error which leads to poor predictions of `melt` front motion. A correction is given which leads to excellent convergence to the analytic solution. Finally, we discuss the issues facing premixing model developers and highlight the fact that model validation is hampered more by the complexity of the process than by numerical issues. (author)
A Computational Framework for Realistic Retina Modeling.
Martínez-Cañada, Pablo; Morillas, Christian; Pino, Begoña; Ros, Eduardo; Pelayo, Francisco
2016-11-01
Computational simulations of the retina have led to valuable insights about the biophysics of its neuronal activity and processing principles. A great number of retina models have been proposed to reproduce the behavioral diversity of the different visual processing pathways. While many of these models share common computational stages, previous efforts have been more focused on fitting specific retina functions rather than generalizing them beyond a particular model. Here, we define a set of computational retinal microcircuits that can be used as basic building blocks for the modeling of different retina mechanisms. To validate the hypothesis that similar processing structures may be repeatedly found in different retina functions, we implemented a series of retina models simply by combining these computational retinal microcircuits. Accuracy of the retina models for capturing neural behavior was assessed by fitting published electrophysiological recordings that characterize some of the best-known phenomena observed in the retina: adaptation to the mean light intensity and temporal contrast, and differential motion sensitivity. The retinal microcircuits are part of a new software platform for efficient computational retina modeling from single-cell to large-scale levels. It includes an interface with spiking neural networks that allows simulation of the spiking response of ganglion cells and integration with models of higher visual areas. PMID:27354192
Computer Modeling of Direct Metal Laser Sintering
Cross, Matthew
2014-01-01
A computational approach to modeling direct metal laser sintering (DMLS) additive manufacturing process is presented. The primary application of the model is for determining the temperature history of parts fabricated using DMLS to evaluate residual stresses found in finished pieces and to assess manufacturing process strategies to reduce part slumping. The model utilizes MSC SINDA as a heat transfer solver with imbedded FORTRAN computer code to direct laser motion, apply laser heating as a boundary condition, and simulate the addition of metal powder layers during part fabrication. Model results are compared to available data collected during in situ DMLS part manufacture.
The IceCube Computing Infrastructure Model
In addition to the big LHC experiments, a number of mid-size experiments are coming online which need to define new computing models to meet the demands on processing and storage requirements of those experiments. We present the hybrid computing model of IceCube which leverages Grid models with a more flexible direct user model as an example of a possible solution. In IceCube a central data center at UW-Madison serves as a Tier-0 with a single Tier-1 at DESY Zeuthen.
Proceedings Fifth Workshop on Developments in Computational Models--Computational Models From Nature
Cooper, S Barry; 10.4204/EPTCS.9
2009-01-01
The special theme of DCM 2009, co-located with ICALP 2009, concerned Computational Models From Nature, with a particular emphasis on computational models derived from physics and biology. The intention was to bring together different approaches - in a community with a strong foundational background as proffered by the ICALP attendees - to create inspirational cross-boundary exchanges, and to lead to innovative further research. Specifically DCM 2009 sought contributions in quantum computation and information, probabilistic models, chemical, biological and bio-inspired ones, including spatial models, growth models and models of self-assembly. Contributions putting to the test logical or algorithmic aspects of computing (e.g., continuous computing with dynamical systems, or solid state computing models) were also very much welcomed.
Sitnick, Stephanie; Shaw, Daniel S.; Hyde, Luke
2013-01-01
This study examined developmentally-salient risk and protective factors of adolescent substance use assessed during early childhood and early adolescence using a sample of 310 low-income boys. Child problem behavior and proximal family risk and protective factors (i.e., parenting, maternal depression) during early childhood, as well as child and family factors and peer deviant behavior during adolescence were explored as potential precursors to later substance use during adolescence using str...
Computing a Comprehensible Model for Spam Filtering
Ruiz-Sepúlveda, Amparo; Triviño-Rodriguez, José L.; Morales-Bueno, Rafael
In this paper, we describe the application of the Desicion Tree Boosting (DTB) learning model to spam email filtering.This classification task implies the learning in a high dimensional feature space. So, it is an example of how the DTB algorithm performs in such feature space problems. In [1], it has been shown that hypotheses computed by the DTB model are more comprehensible that the ones computed by another ensemble methods. Hence, this paper tries to show that the DTB algorithm maintains the same comprehensibility of hypothesis in high dimensional feature space problems while achieving the performance of other ensemble methods. Four traditional evaluation measures (precision, recall, F1 and accuracy) have been considered for performance comparison between DTB and others models usually applied to spam email filtering. The size of the hypothesis computed by a DTB is smaller and more comprehensible than the hypothesis computed by Adaboost and Naïve Bayes.
McCormick, Cheryl M; Travis E. Hodges; Jonathan J. Simone
2015-01-01
Studies in animal models generate and test hypotheses regarding developmental stage-specific vulnerability that might inform research questions about human development. In both rats and humans, peer relationships are qualitatively different in adolescence than at other stages of development, and social experiences in adolescence are considered important determinants of adult social function. This review describes our adolescent rat social instability stress model and the long-lasting effects ...
CLOUD COMPUTING SECURITY THROUGH SYMMETRIC CIPHER MODEL
Subramanian Anbazhagan
2014-10-01
Full Text Available Cloud computing can be defined as an application and services which runs on distributed network using virtualized and it is accessed through internet protocols and networking. Cloud computing resources and virtual and limitless and information’s of the physical systems on which software running are abstracted from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the users the concept is to incorporate technologies which have the common theme of reliance on the internet Software and data are stored on the servers whereas cloud computing services are provided through applications online which can be accessed from web browsers. Lack of security and access control is the major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple virtual machine in cloud can access insecure information flows as service provider; therefore to implement the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud computing security through symmetric cipher model. This article proposes symmetric cipher model in order to implement cloud computing security so that data can accessed and stored securely.
Clark, Stephen Allan
The impact of technology (including computers and probes, low friction carts, video camera, VCR's and electronic balances) on the motivation of adolescent science students was investigated using a naturalistic case study of college preparatory ninth grade physics classes at a comprehensive high school in the southeastern United States. The students were positively affected by the use of computer technology as compared to other "low tech" labs. The non-computer technologies had little motivational effect on the students. The most important motivational effect was the belief among the students that they could successfully operate the equipment and gather meaningful results. At times, the students spent more cognitive energy on performing the experiment than on learning the physics. This was especially true when microcomputer-based labs were used. When the technology led to results that were clear to the students and displayed in a manner that could be easily interpreted, they were generally receptive and motivated to persist at the task. Many students reported being especially motivated when a computer was used to gather the data because they "just liked computers." Furthermore, qualitative evidence suggested that they had learned the physics concept they were working on. This is in close agreement with the conceptual change model of learning in that students are most likely to change their prior conceptions when the new idea is plausible (the technology makes it so), intelligible (real time graphing, actual light rays), and fruitful (the new idea explains what they actually see). However, many of the microcomputer-based laboratory (MBL) activities and "high tech" labs were too unstructured, leaving students bewildered, confused and unmotivated. To achieve maximum motivational effects from the technology, it was necessary to reduce the cognitive demand on the students so they could concentrate on the data gathered rather than the operation of the equipment.
Modelling the effects of sexting on the transmission dynamics of HSV-2 amongst adolescents
A. Mhlanga
2015-12-01
Full Text Available Prior studies have indicated that adolescents who are into sexting are likely to engage in risky sexual behaviours. In this paper, a mathematical model to assess the impact of sexting and peer influence on the spread of HSV-2 amongst adolescents is developed. The threshold parameters of the model are determined and stabilities are analysed. The impact of filtering and awareness campaigns is explored. Results from the study suggest that HSV-2 prevalence is high amongst adolescents who are into sexting as compared to those who do not. Further, we applied optimal control theory to the proposed model. The controls represent filtering and awareness campaigns. The objective is based on minimising the susceptible sexting adolescents, infected non-sexting adolescents and the infected sexting adolescents. The optimal control is characterised and numerically solved. Overall, the application of optimal control theory suggests that more effort should be devoted to both controls, filtering and awareness campaigns.
Mechanistic models in computational social science
Holme, Petter; Liljeros, Fredrik
2015-09-01
Quantitative social science is not only about regression analysis or, in general, data inference. Computer simulations of social mechanisms have an over 60 years long history. They have been used for many different purposes—to test scenarios, to test the consistency of descriptive theories (proof-of-concept models), to explore emergent phenomena, for forecasting, etc. In this essay, we sketch these historical developments, the role of mechanistic models in the social sciences and the influences from the natural and formal sciences. We argue that mechanistic computational models form a natural common ground for social and natural sciences, and look forward to possible future information flow across the social-natural divide.
Modeling User Behavior in Computer Learning Tasks.
Mantei, Marilyn M.
Model building techniques from Artifical Intelligence and Information-Processing Psychology are applied to human-computer interface tasks to evaluate existing interfaces and suggest new and better ones. The model is in the form of an augmented transition network (ATN) grammar which is built by applying grammar induction heuristics on a sequential…
Teaching Forest Planning with Computer Models
Howard, Richard A.; Magid, David
1977-01-01
This paper describes a series of FORTRAN IV computer models which are the content-oriented subject matter for a college course in forest planning. The course objectives, the planning problem, and the ten planning aid models are listed. Student comments and evaluation of the program are included. (BT)
Human systems dynamics: Toward a computational model
Eoyang, Glenda H.
2012-09-01
A robust and reliable computational model of complex human systems dynamics could support advancements in theory and practice for social systems at all levels, from intrapersonal experience to global politics and economics. Models of human interactions have evolved from traditional, Newtonian systems assumptions, which served a variety of practical and theoretical needs of the past. Another class of models has been inspired and informed by models and methods from nonlinear dynamics, chaos, and complexity science. None of the existing models, however, is able to represent the open, high dimension, and nonlinear self-organizing dynamics of social systems. An effective model will represent interactions at multiple levels to generate emergent patterns of social and political life of individuals and groups. Existing models and modeling methods are considered and assessed against characteristic pattern-forming processes in observed and experienced phenomena of human systems. A conceptual model, CDE Model, based on the conditions for self-organizing in human systems, is explored as an alternative to existing models and methods. While the new model overcomes the limitations of previous models, it also provides an explanatory base and foundation for prospective analysis to inform real-time meaning making and action taking in response to complex conditions in the real world. An invitation is extended to readers to engage in developing a computational model that incorporates the assumptions, meta-variables, and relationships of this open, high dimension, and nonlinear conceptual model of the complex dynamics of human systems.
Ewe: a computer model for ultrasonic inspection
The computer program EWE simulates the propagation of elastic waves in solids and liquids. It has been applied to ultrasonic testing to study the echoes generated by cracks and other types of defects. A discussion of the elastic wave equations is given, including the first-order formulation, shear and compression waves, surface waves and boundaries, numerical method of solution, models for cracks and slot defects, input wave generation, returning echo construction, and general computer issues
Parallel Computing Applications and Financial Modelling
Liddell, Heather M.; Parkinson, D.; Hodgson, G S; Dzwig, P.
2004-01-01
At Queen Mary, University of London, we have over twenty years of experience in Parallel Computing Applications, mostly on "massively parallel systems", such as the Distributed Array Processors (DAPs). The applications in which we were involved included design of numerical subroutine libraries, Finite Element software, graphics tools, the physics of organic materials, medical imaging, computer vision and more recently, Financial modelling. Two of the projects related to the latter are describ...
Computer modelling of tornado effects on buildings
An attempt is made to model the tornado-structure interaction. The tornado is represented as a Rankine-Combined vortex. The computations are done on a rectangular grid system. The governing equations are approximated using control volume procedure. The pressure equations are solved by an efficient preconditioned conjugate gradient procedure. The computed tornado forces are compared with straight boundary layer (SBL) wind. The tornado forces on the roof of the building is more than five times the SBL flow
On the completeness of quantum computation models
Arrighi, Pablo; Dowek, Gilles
2010-01-01
The notion of computability is stable (i.e. independent of the choice of an indexing) over infinite-dimensional vector spaces provided they have a finite "tensorial dimension". Such vector spaces with a finite tensorial dimension permit to define an absolute notion of completeness for quantum computation models and give a precise meaning to the Church-Turing thesis in the framework of quantum theory. (Extra keywords: quantum programming languages, denotational semantics, universality.)
Parallel Computing of Ocean General Circulation Model
无
2001-01-01
This paper discusses the parallel computing of the thirdgeneration Ocea n General Circulation Model (OGCM) from the State Key Laboratory of Numerical Mo deling for Atmospheric Science and Geophysical Fluid Dynamics(LASG),Institute of Atmosphere Physics(IAP). Meanwhile, several optimization strategies for paralle l computing of OGCM (POGCM) on Scalable Shared Memory Multiprocessor (S2MP) are presented. Using Message Passing Interface (MPI), we obtain super linear speedup on SGI Origin 2000 for parallel OGCM(POGCM) after optimization.
A Classical Probabilistic Computer Model of Consciousness
Blaha, Stephen
2002-01-01
We show that human consciousness can be modeled as a classical (not quantum) probabilistic computer. A quantum computer representation does not appear to be indicated because no known feature of consciousness depends on Planck's constant h, the telltale sign of quantum phenomena. It is argued that the facets of consciousness are describable by an object-oriented design with dynamically defined classes and objects. A comparison to economic theory is also made. We argue consciousness may also h...
Finite difference computing with exponential decay models
Langtangen, Hans Petter
2016-01-01
This text provides a very simple, initial introduction to the complete scientific computing pipeline: models, discretization, algorithms, programming, verification, and visualization. The pedagogical strategy is to use one case study – an ordinary differential equation describing exponential decay processes – to illustrate fundamental concepts in mathematics and computer science. The book is easy to read and only requires a command of one-variable calculus and some very basic knowledge about computer programming. Contrary to similar texts on numerical methods and programming, this text has a much stronger focus on implementation and teaches testing and software engineering in particular. .
Multi-scale modelling in computational biomedicine
Sloot P.M.; Hoekstra A.G.
2010-01-01
The inherent complexity of biomedical systems is well recognized; they are multi-scale, multi-science systems, bridging a wide range of temporal and spatial scales. This article reviews the currently emerging field of multi-scale modelling in computational biomedicine. Many exciting multi-scale models exist or are under development. However, an underpinning multi-scale modelling methodology seems to be missing. We propose a direction that complements the classic dynamical systems approach and...
Computational disease modeling – fact or fiction?
Stephan Klaas
2009-06-01
Full Text Available Abstract Background Biomedical research is changing due to the rapid accumulation of experimental data at an unprecedented scale, revealing increasing degrees of complexity of biological processes. Life Sciences are facing a transition from a descriptive to a mechanistic approach that reveals principles of cells, cellular networks, organs, and their interactions across several spatial and temporal scales. There are two conceptual traditions in biological computational-modeling. The bottom-up approach emphasizes complex intracellular molecular models and is well represented within the systems biology community. On the other hand, the physics-inspired top-down modeling strategy identifies and selects features of (presumably essential relevance to the phenomena of interest and combines available data in models of modest complexity. Results The workshop, "ESF Exploratory Workshop on Computational disease Modeling", examined the challenges that computational modeling faces in contributing to the understanding and treatment of complex multi-factorial diseases. Participants at the meeting agreed on two general conclusions. First, we identified the critical importance of developing analytical tools for dealing with model and parameter uncertainty. Second, the development of predictive hierarchical models spanning several scales beyond intracellular molecular networks was identified as a major objective. This contrasts with the current focus within the systems biology community on complex molecular modeling. Conclusion During the workshop it became obvious that diverse scientific modeling cultures (from computational neuroscience, theory, data-driven machine-learning approaches, agent-based modeling, network modeling and stochastic-molecular simulations would benefit from intense cross-talk on shared theoretical issues in order to make progress on clinically relevant problems.
Economic growth models: symbolic and numerical computations
Vasconcelos, P. B.
2013-01-01
Growth economic models play a crucial role in understanding countries development, inter-country macroeconomic relationship and, ultimately, to anticipate the effects on endogenous variables due to political shocks on model parameters or exogenous variables. Yet, build a mathematical model can be a difficult and time consuming task. Symbolic computations can be of great help in the development process. Then, the ability to simulate, under initial assumptions, is, assuredly, a priceless tool f...
Computer-Aided Business Model Design
Fritscher B.
2014-01-01
There is a lack of dedicated tools for business model design at a strategic level. However, in today's economic world the need to be able to quickly reinvent a company's business model is essential to stay competitive. This research focused on identifying the functionalities that are necessary in a computer-aided design (CAD) tool for the design of business models in a strategic context. Using design science research methodology a series of techniques and prototypes have been designed and eva...
original: Operational spatial computable general equilibrium modeling
Johannes BrÃcker
1998-01-01
A prototype spatial computable general equilibrium model is developed and illustrated by a numerical example. The theoretical basis is a complete Arrow-Debreu equilibrium under perfect competition. The leading principle of model design is parsimony: The specification restricts the number of parameters in a way allowing for a model calibration relying on a limited data base, which is readily available in a country with a well developed statistical service. No "data generating" first stage, usi...
A Categorisation of Cloud Computing Business Models
Chang, Victor; Bacigalupo, David; Wills, Gary; De Roure, David
2010-01-01
This paper reviews current cloud computing business models and presents proposals on how organisations can achieve sustainability by adopting appropriate models. We classify cloudcomputing business models into eight types: (1) Service Provider and Service Orientation; (2) Support and Services Contracts; (3) In-House Private Clouds; (4) All-In-One Enterprise Cloud; (5) One-Stop Resources and Services; (6) Government Funding; (7) Venture Capitals; and (8) Entertainment and Social Networking. Us...
Generating computational models for serious gaming
Westera, Wim
2013-01-01
Many serious games include computational models that simulate dynamic systems. These models promote enhanced interaction and responsiveness. Under the social web paradigm more and more usable game authoring tools become available that enable prosumers to create their own games, but the inclusion of dynamic simulations remains a specialist’s job involving knowledge of mathematics, numerical modeling and programming. This paper describes a methodology for specifying and running a specific subse...
Garmy, Pernilla; Clausson, Eva K.; Nyberg, Per; Jakobsson, Ulf
2013-01-01
The aim of this cross-sectional study was to investigate the prevalence of overweight and obesity in children and adolescents (6–16 years), and relationships between being overweight and sleep, experiencing of fatigue, enjoyment of school, and time spent in watching television and in sitting at the computer. Trained school nurses measured the weight and height of 2891 children aged 6, 7, 10, 14, and 16, and distributed a questionnaire to them regarding television and computer habits, sleep, a...
Loneliness and solitude in adolescence: A confirmatory factor analysis of alternative models
Goossens, Luc; Lasgaard, Mathias; Luyckx, Koen;
2009-01-01
completed by a sample of mid-adolescents (N = 534) from Grades 10 through 12 (aged 15-18 years) in the Dutch-speaking part of Belgium. As expected, the four-factor solution provided a better fit to the data than did alternative models that comprised just a single factor, or two and three factors. Use of the...... Loneliness and Aloneness Scale for Children and Adolescents (LACA) is recommended, because the instrument measures all four aspects of the model. Implications for current theories on adolescent loneliness and associated phenomena, such as adolescents' attitude toward being on their own, are briefly discussed....
Social Contagion, Adolescent Sexual Behavior, and Pregnancy: A Nonlinear Dynamic EMOSA Model.
Rodgers, Joseph Lee; Rowe, David C.; Buster, Maury
1998-01-01
Expands an existing nonlinear dynamic epidemic model of onset of social activities (EMOSA), motivated by social contagion theory, to quantify the likelihood of pregnancy for adolescent girls of different sexuality statuses. Compares five sexuality/pregnancy models to explain variance in national prevalence curves. Finds that adolescent girls have…
Middle Grades' School Models and Their Impact on Early Adolescent Self-Esteem
Booth, Margaret Zoller; Sheehan, Heather Chase; Earley, Mark A.
2007-01-01
Throughout the world, school grade structures are most variable during the early adolescent years when students can find themselves in a variety of school models. This paper investigates the impact of two popular school models in the United States (middle school and K-8) on the self-esteem and self-concept of early adolescents. Based on mixed…
Testing a Gender Additive Model: The Role of Body Image in Adolescent Depression
Bearman, Sarah Kate; Stice, Eric
2008-01-01
Despite consistent evidence that adolescent girls are at greater risk of developing depression than adolescent boys, risk factor models that account for this difference have been elusive. The objective of this research was to examine risk factors proposed by the "gender additive" model of depression that attempts to partially explain the increased…
Relativistic Computing Model Applied in Corporate Networks
Chau Sen Shia*1,
2014-05-01
Full Text Available Environmental computing information technology (it is one of the subjects of interest for organizations when the subject covers financial economics and return on investment for companies. This work aims to present as a contribution proposing a relativistic model of computation using the relativistic physics concepts and foundations of quantum mechanics to propose a new vision in the use of virtualization environment in corporate networks. The model was based on simulation and testing of connection with providers in virtualization environments with Datacenters and implementing the basics of relativity and quantum mechanics in communication with networks of companies, to establish alliances and resource sharing between organizations. The data were collected and then were performed calculations that demonstrate and identify connections and integrations that establish relations of cloud computing with the relativistic vision, in such a way that complement the approaches of physics and computing with the theories of the magnetic field and the propagation of light. The research is characterized as exploratory, because searches check physical connections with cloud computing, the network of companies and the adhesion of the proposed model. Were presented the relationship between the proposal and the practical application that makes it possible to describe the results of the main features, demonstrating the relativistic model integration with new technologies of virtualization of Datacenters, and optimize the resource with the propagation of light, electromagnetic waves, simultaneity, length contraction and time dilation
Solving stochastic epidemiological models using computer algebra
Hincapie, Doracelly; Ospina, Juan
2011-06-01
Mathematical modeling in Epidemiology is an important tool to understand the ways under which the diseases are transmitted and controlled. The mathematical modeling can be implemented via deterministic or stochastic models. Deterministic models are based on short systems of non-linear ordinary differential equations and the stochastic models are based on very large systems of linear differential equations. Deterministic models admit complete, rigorous and automatic analysis of stability both local and global from which is possible to derive the algebraic expressions for the basic reproductive number and the corresponding epidemic thresholds using computer algebra software. Stochastic models are more difficult to treat and the analysis of their properties requires complicated considerations in statistical mathematics. In this work we propose to use computer algebra software with the aim to solve epidemic stochastic models such as the SIR model and the carrier-borne model. Specifically we use Maple to solve these stochastic models in the case of small groups and we obtain results that do not appear in standard textbooks or in the books updated on stochastic models in epidemiology. From our results we derive expressions which coincide with those obtained in the classical texts using advanced procedures in mathematical statistics. Our algorithms can be extended for other stochastic models in epidemiology and this shows the power of computer algebra software not only for analysis of deterministic models but also for the analysis of stochastic models. We also perform numerical simulations with our algebraic results and we made estimations for the basic parameters as the basic reproductive rate and the stochastic threshold theorem. We claim that our algorithms and results are important tools to control the diseases in a globalized world.
Time series modeling, computation, and inference
Prado, Raquel
2010-01-01
The authors systematically develop a state-of-the-art analysis and modeling of time series. … this book is well organized and well written. The authors present various statistical models for engineers to solve problems in time series analysis. Readers no doubt will learn state-of-the-art techniques from this book.-Hsun-Hsien Chang, Computing Reviews, March 2012My favorite chapters were on dynamic linear models and vector AR and vector ARMA models.-William Seaver, Technometrics, August 2011… a very modern entry to the field of time-series modelling, with a rich reference list of the current lit
Computational modeling of laser-tissue interaction
London, R.A.; Amendt, P.; Bailey, D.S.; Eder, D.C.; Maitland, D.J.; Glinsky, M.E.; Strauss, M.; Zimmerman, G.B.
1996-05-01
Computational modeling can play an important role both in designing laser-tissue interaction experiments and in understanding the underlying mechanisms. This can lead to more rapid and less expensive development if new procedures and instruments, and a better understanding of their operation. We have recently directed computer programs and associated expertise developed over many years to model high intensity laser-matter interactions for fusion research towards laser-tissue interaction problem. A program called LATIS is being developed to specifically treat laser-tissue interaction phenomena, such as highly scattering light transport, thermal coagulation, and hydrodynamic motion.
Biomedical Imaging and Computational Modeling in Biomechanics
Iacoviello, Daniela
2013-01-01
This book collects the state-of-art and new trends in image analysis and biomechanics. It covers a wide field of scientific and cultural topics, ranging from remodeling of bone tissue under the mechanical stimulus up to optimizing the performance of sports equipment, through the patient-specific modeling in orthopedics, microtomography and its application in oral and implant research, computational modeling in the field of hip prostheses, image based model development and analysis of the human knee joint, kinematics of the hip joint, micro-scale analysis of compositional and mechanical properties of dentin, automated techniques for cervical cell image analysis, and iomedical imaging and computational modeling in cardiovascular disease. The book will be of interest to researchers, Ph.D students, and graduate students with multidisciplinary interests related to image analysis and understanding, medical imaging, biomechanics, simulation and modeling, experimental analysis.
Computer modeling of commercial refrigerated warehouse facilities
The use of computer models to simulate the energy performance of large commercial refrigeration systems typically found in food processing facilities is an area of engineering practice that has seen little development to date. Current techniques employed in predicting energy consumption by such systems have focused on temperature bin methods of analysis. Existing simulation tools such as DOE2 are designed to model commercial buildings and grocery store refrigeration systems. The HVAC and Refrigeration system performance models in these simulations tools model equipment common to commercial buildings and groceries, and respond to energy-efficiency measures likely to be applied to these building types. The applicability of traditional building energy simulation tools to model refrigerated warehouse performance and analyze energy-saving options is limited. The paper will present the results of modeling work undertaken to evaluate energy savings resulting from incentives offered by a California utility to its Refrigerated Warehouse Program participants. The TRNSYS general-purpose transient simulation model was used to predict facility performance and estimate program savings. Custom TRNSYS components were developed to address modeling issues specific to refrigerated warehouse systems, including warehouse loading door infiltration calculations, an evaporator model, single-state and multi-stage compressor models, evaporative condenser models, and defrost energy requirements. The main focus of the paper will be on the modeling approach. The results from the computer simulations, along with overall program impact evaluation results, will also be presented
Mohamadian, Hashem; Ghannaee Arani, Mohammad
2014-01-01
Objectives Physical activity behavior begins to decline during adolescence and continues to decrease throughout young adulthood. This study aims to explain factors that influence physical activity behavior in a sample of female adolescents using a health promotion model framework. Methods This cross-sectional survey was used to explore physical activity behavior among a sample of female adolescents. Participants completed measures of physical activity, perceived self-efficacy, self-esteem, so...
Russell, Sushila; Subramanian, Balakrishnan; Russell, Paul Swamidhas Sudhakar
2008-01-01
Background In developing countries, primary health care facilities, such as adolescent health clinics, are frequently the first contact for an adolescent with a health professional for a myriad of health problems including mental health issues. Psychopathology is prevalent among adolescents, and causes significant educational, occupational and social impairment. The presence of psychopathology with impairment requires the development of treatment models to address both of these components. We...
Williams, John Kino Yamaguchi; Else, 'Iwalani R. N.; Goebert, Deborah A; Nishimura, Stephanie T.; Hishinuma, Earl S.; Andrade, Naleen N.
2013-01-01
Few studies have examined the effect of ethnicity and cultural identity on substance use among Asian and Pacific Islander adolescents. A cross-sequential study conducted in Hawai'i with 144 Japanese American and part-Japanese American adolescents assessed a model integrating Japanese ethnicity, cultural identity, substance use, major life events, and social support. Japanese American adolescents scored higher on the Japanese Culture Scale and on the Peers’ Social Support than the part-Japanes...
Ketola Ritva L
2010-01-01
Full Text Available Abstract Background The use of computers has increased among adolescents, as have musculoskeletal symptoms. There is evidence that these symptoms can be reduced through an ergonomics approach and through education. The purpose of this study was to examine where adolescents had received ergonomic instructions related to computer use, and whether receiving these instructions was associated with a reduced prevalence of computer-associated health complaints. Methods Mailed survey with nationally representative sample of 12 to 18-year-old Finns in 2001 (n = 7292, response rate 70%. In total, 6961 youths reported using a computer. We tested the associations of computer use time and received ergonomic instructions (predictor variables with computer-associated health complaints (outcome variables using logistic regression analysis. Results To prevent computer-associated complaints, 61.2% reported having been instructed to arrange their desk/chair/screen in the right position, 71.5% to take rest breaks. The older age group (16-18 years reported receiving instructions or being self-instructed more often than the 12- to 14-year-olds (p Conclusions This report shows that ergonomic instructions on how to prevent computer-related musculoskeletal problems fail to reach a substantial number of children. Furthermore, the reported sources of instructions vary greatly in terms of reliability.
Gema Mesquita; Rubens Reimão
2007-01-01
OBJECTIVE: To analyze the influence of nocturnal use of computer and their effect on sleep quality, in a group of adolescents. METHOD: Two middle schools were chosen for the research. The sample consisted of adolescents n=160 (55M; 105F), with ages ranging from 15 to 18 years. Questionnaire about computer use with the objective of obtaining information regarding the time and number of hours of nocturnal computer use, were applied for collection of data. They included the Pittsburgh Sleep Qual...
Prins Richard G; van Empelen Pepijn; Beenackers Marielle A; Brug Johannes; Oenema Anke
2010-01-01
Abstract Background Increasing physical activity (PA) among adolescents is an important health promotion goal. PA has numerous positive health effects, but the majority of Dutch adolescents do not meet PA requirements. The present paper describes the systematic development of a theory-based computer-tailored intervention, YouRAction, which targets individual and environmental factors determining PA among adolescents. Design The intervention development was guided by the Intervention Mapping p...
Computer-aided modeling framework – a generic modeling template
Fedorova, Marina; Sin, Gürkan; Gani, Rafiqul
This work focuses on the development of a computer-aided modeling framework. The framework is a knowledge-based system that is built on a generic modeling language and structured on workflows for different modeling tasks. The overall objective is to support model developers and users to generate ....... The application of the modeling template is highlighted with a case study related to the modeling of a catalytic membrane reactor coupling dehydrogenation of ethylbenzene with hydrogenation of nitrobenzene...
Analyzing Cultural Models in Adolescent Accounts of Romantic Relationships
Milbrath, Constance; Ohlson, Brightstar; Eyre, Stephen L.
2009-01-01
Research on academic achievement has led the way in demonstrating how culturally constructed meanings shape adolescent scholastic behavior. The aim of this research is to move this standpoint of analysis more centrally into the area of adolescent dating and sexuality by focusing on the cultural components of adolescent romantic relationships. This…
High performance computing and numerical modelling
,
2014-01-01
Numerical methods play an ever more important role in astrophysics. This is especially true in theoretical works, but of course, even in purely observational projects, data analysis without massive use of computational methods has become unthinkable. The key utility of computer simulations comes from their ability to solve complex systems of equations that are either intractable with analytic techniques or only amenable to highly approximative treatments. Simulations are best viewed as a powerful complement to analytic reasoning, and as the method of choice to model systems that feature enormous physical complexity such as star formation in evolving galaxies, the topic of this 43rd Saas Fee Advanced Course. The organizers asked me to lecture about high performance computing and numerical modelling in this winter school, and to specifically cover the basics of numerically treating gravity and hydrodynamics in the context of galaxy evolution. This is still a vast field, and I necessarily had to select a subset ...
A Knowledge Driven Computational Visual Attention Model
Joseph Amudha
2011-05-01
Full Text Available Computational Visual System face complex processing problems as there is a large amount of information to be processed and it is difficult to achieve higher efficiency in par with human system. In order to reduce the complexity involved in determining the saliency region, decomposition of image into several parts based on specific location is done and decomposed part is passed for higher level computations in determining the saliency region with assigning priority to the specific color in RGB model depending on application. These properties are interpreted from the user using the Natural Language Processing and then interfaced with vision using Language Perceptional Translator (LPT. The model is designed for a robot to search a specific object in a real time environment without compromising the computational speed in determining the Most Salient Region.
Applied Mathematics, Modelling and Computational Science
Kotsireas, Ilias; Makarov, Roman; Melnik, Roderick; Shodiev, Hasan
2015-01-01
The Applied Mathematics, Modelling, and Computational Science (AMMCS) conference aims to promote interdisciplinary research and collaboration. The contributions in this volume cover the latest research in mathematical and computational sciences, modeling, and simulation as well as their applications in natural and social sciences, engineering and technology, industry, and finance. The 2013 conference, the second in a series of AMMCS meetings, was held August 26–30 and organized in cooperation with AIMS and SIAM, with support from the Fields Institute in Toronto, and Wilfrid Laurier University. There were many young scientists at AMMCS-2013, both as presenters and as organizers. This proceedings contains refereed papers contributed by the participants of the AMMCS-2013 after the conference. This volume is suitable for researchers and graduate students, mathematicians and engineers, industrialists, and anyone who would like to delve into the interdisciplinary research of applied and computational mathematics ...
Computer Aided Modelling – Opportunities and Challenges
Cameron, Ian; Gani, Rafiqul
2011-01-01
easily generate new models from underlying phenomena continues to be a challenge, especially in the face of time and cost constraints.Integrated frameworks that allow flexibility of model development and access to a range of embedded tools are central to future model developments. The challenges and......This chapter considers the opportunities that are present in developing, extending and applying aspects of computer-aided modelling principles and practice. What are the best tasks to be done by modellers and what needs the application of CAPE tools? How do we efficiently develop model......-based solutions to significant problems? The important issues of workflow and data flow are discussed together with fit-for-purpose model development. As well, the lack of tools around multiscale modelling provides opportunities for the development of efficient tools to address such challenges. The ability to...
Modeling inputs to computer models used in risk assessment
Computer models for various risk assessment applications are closely scrutinized both from the standpoint of questioning the correctness of the underlying mathematical model with respect to the process it is attempting to model and from the standpoint of verifying that the computer model correctly implements the underlying mathematical model. A process that receives less scrutiny, but is nonetheless of equal importance, concerns the individual and joint modeling of the inputs. This modeling effort clearly has a great impact on the credibility of results. Model characteristics are reviewed in this paper that have a direct bearing on the model input process and reasons are given for using probabilities-based modeling with the inputs. The authors also present ways to model distributions for individual inputs and multivariate input structures when dependence and other constraints may be present
Modeling Computations in a Semantic Network
Rodriguez, Marko A
2007-01-01
Semantic network research has seen a resurgence from its early history in the cognitive sciences with the inception of the Semantic Web initiative. The Semantic Web effort has brought forth an array of technologies that support the encoding, storage, and querying of the semantic network data structure at the world stage. Currently, the popular conception of the Semantic Web is that of a data modeling medium where real and conceptual entities are related in semantically meaningful ways. However, new models have emerged that explicitly encode procedural information within the semantic network substrate. With these new technologies, the Semantic Web has evolved from a data modeling medium to a computational medium. This article provides a classification of existing computational modeling efforts and the requirements of supporting technologies that will aid in the further growth of this burgeoning domain.
STEW: A Nonlinear Data Modeling Computer Program
A nonlinear data modeling computer program, STEW, employing the Levenberg-Marquardt algorithm, has been developed to model the experimental 239Pu(n,f) and 235U(n,f) cross sections. This report presents results of the modeling of the 239Pu(n,f) and 235U(n,f) cross-section data. The calculation of the fission transmission coefficient is based on the double-humped-fission-barrier model of Bjornholm and Lynn. Incident neutron energies of up to 5 MeV are considered
Logic modelling in computer-aided design
Bijl, A.
1986-01-01
Research into a generalized logic modelling system linked to machine interpretation of drawings and text is described. This work is related to a view of design and builds on experience of working integrated design systems. Questions are posed for future computer-aided design systems.
Images as a basis for computer modelling
Beaufils, D.; LeTouzé, J.-C.; Blondel, F.-M.
1994-03-01
New computer technologies such as the graphics data tablet, video digitization and numerical methods, can be used for measurement and mathematical modelling in physics. Two programs dealing with newtonian mechanics and some of related scientific activities for A-level students are described.
Integer Programming Models for Computational Biology Problems
Giuseppe Lancia
2004-01-01
The recent years have seen an impressive increase in the use of Integer Programming models for the solution of optimization problems originating in Molecular Biology. In this survey, some of the most successful Integer Programming approaches are described, while a broad overview of application areas being is given in modern Computational Molecular Biology.
An Impulse Model for Computer Viruses
Chunming Zhang; Yun Zhao; Yingjiang Wu
2012-01-01
Computer virus spread model concerning impulsive control strategy is proposed and analyzed. We prove that there exists a globally attractive infection-free periodic solution when the vaccination rate is larger than θ0. Moreover, we show that the system is uniformly persistent if the vaccination rate is less than θ1. Some numerical simulations are finally given to illustrate the main results.
A Stochastic Dynamic Model of Computer Viruses
Chunming Zhang; Yun Zhao; Yingjiang Wu; Shuwen Deng
2012-01-01
A stochastic computer virus spread model is proposed and its dynamic behavior is fully investigated. Specifically, we prove the existence and uniqueness of positive solutions, and the stability of the virus-free equilibrium and viral equilibrium by constructing Lyapunov functions and applying Ito's formula. Some numerical simulations are finally given to illustrate our main results.
A Framework for Hybrid Computational Models
Neruda, Roman
2003-01-01
Roč. 2, č. 4 (2003), s. 868-873. ISSN 1109-2750 R&D Projects: GA ČR(CZ) GA526/03/Z042; GA ČR(CZ) GA201/01/1192 Institutional research plan: CEZ:AV0Z1030915 Keywords : multi - agent system s * hybrid computational models Subject RIV: BA - General Mathematics
Applied modelling and computing in social science
Povh, Janez
2015-01-01
In social science outstanding results are yielded by advanced simulation methods, based on state of the art software technologies and an appropriate combination of qualitative and quantitative methods. This book presents examples of successful applications of modelling and computing in social science: business and logistic process simulation and optimization, deeper knowledge extractions from big data, better understanding and predicting of social behaviour and modelling health and environment changes.
A Multilayer Model of Computer Networks
Shchurov, Andrey A.
2015-01-01
The fundamental concept of applying the system methodology to network analysis declares that network architecture should take into account services and applications which this network provides and supports. This work introduces a formal model of computer networks on the basis of the hierarchical multilayer networks. In turn, individual layers are represented as multiplex networks. The concept of layered networks provides conditions of top-down consistency of the model. Next, we determined the...
Security Protocol Verification: Symbolic and Computational Models
Blanchet, Bruno
2012-01-01
Security protocol verification has been a very active research area since the 1990s. This paper surveys various approaches in this area, considering the verification in the symbolic model, as well as the more recent approaches that rely on the computational model or that verify protocol implementations rather than specifications. Additionally, we briefly describe our symbolic security protocol verifier ProVerif and situate it among these approaches.
Automating sensitivity analysis of computer models using computer calculus
An automated procedure for performing sensitivity analysis has been developed. The procedure uses a new FORTRAN compiler with computer calculus capabilities to generate the derivatives needed to set up sensitivity equations. The new compiler is called GRESS - Gradient Enhanced Software System. Application of the automated procedure with direct and adjoint sensitivity theory for the analysis of non-linear, iterative systems of equations is discussed. Calculational efficiency consideration and techniques for adjoint sensitivity analysis are emphasized. The new approach is found to preserve the traditional advantages of adjoint theory while removing the tedious human effort previously needed to apply this theoretical methodology. Conclusions are drawn about the applicability of the automated procedure in numerical analysis and large-scale modelling sensitivity studies
Automating sensitivity analysis of computer models using computer calculus
An automated procedure for performing sensitivity analyses has been developed. The procedure uses a new FORTRAN compiler with computer calculus capabilities to generate the derivatives needed to set up sensitivity equations. The new compiler is called GRESS - Gradient Enhanced Software System. Application of the automated procedure with ''direct'' and ''adjoint'' sensitivity theory for the analysis of non-linear, iterative systems of equations is discussed. Calculational efficiency consideration and techniques for adjoint sensitivity analysis are emphasized. The new approach is found to preserve the traditional advantages of adjoint theory while removing the tedious human effort previously needed to apply this theoretical methodology. Conclusions are drawn about the applicability of the automated procedure in numerical analysis and large-scale modelling sensitivity studies. 24 refs., 2 figs
Tsai, Chia-Ching; Chang, Chih-Hsiang
2007-01-01
This study investigates the effect of advertising with physically attractive models on male and female adolescents. The findings suggest that highly attractive models are less effective than those who are normally attractive. Implications of social comparison are discussed.
Parallel Computing Applications and Financial Modelling
Heather M. Liddell
2004-01-01
Full Text Available At Queen Mary, University of London, we have over twenty years of experience in Parallel Computing Applications, mostly on "massively parallel systems", such as the Distributed Array Processors (DAPs. The applications in which we were involved included design of numerical subroutine libraries, Finite Element software, graphics tools, the physics of organic materials, medical imaging, computer vision and more recently, Financial modelling. Two of the projects related to the latter are described in this paper, namely Portfolio Optimisation and Financial Risk Assessment.
Computer Model Of Fragmentation Of Atomic Nuclei
Wilson, John W.; Townsend, Lawrence W.; Tripathi, Ram K.; Norbury, John W.; KHAN FERDOUS; Badavi, Francis F.
1995-01-01
High Charge and Energy Semiempirical Nuclear Fragmentation Model (HZEFRG1) computer program developed to be computationally efficient, user-friendly, physics-based program for generating data bases on fragmentation of atomic nuclei. Data bases generated used in calculations pertaining to such radiation-transport applications as shielding against radiation in outer space, radiation dosimetry in outer space, cancer therapy in laboratories with beams of heavy ions, and simulation studies for designing detectors for experiments in nuclear physics. Provides cross sections for production of individual elements and isotopes in breakups of high-energy heavy ions by combined nuclear and Coulomb fields of interacting nuclei. Written in ANSI FORTRAN 77.
Hidden Markov models applications in computer vision
Bunke, H
2001-01-01
Hidden Markov models (HMMs) originally emerged in the domain of speech recognition. In recent years, they have attracted growing interest in the area of computer vision as well. This book is a collection of articles on new developments in the theory of HMMs and their application in computer vision. It addresses topics such as handwriting recognition, shape recognition, face and gesture recognition, tracking, and image database retrieval.This book is also published as a special issue of the International Journal of Pattern Recognition and Artificial Intelligence (February 2001).
Modeling problem behaviors in a nationally representative sample of adolescents.
O'Connor, Kate L; Dolphin, Louise; Fitzgerald, Amanda; Dooley, Barbara
2016-07-01
Research on multiple problem behaviors has focused on the concept of Problem Behavior Syndrome (PBS). Problem Behavior Theory (PBT) is a complex and comprehensive social-psychological framework designed to explain the development of a range of problem behaviors. This study examines the structure of PBS and the applicability of PBT in adolescents. Participants were 6062 adolescents; aged 12-19 (51.3% female) who took part in the My World Survey-Second Level (MWS-SL). Regarding PBS, Confirmatory Factor Analysis established that problem behaviors, such as alcohol and drug use loaded significantly onto a single, latent construct for males and females. Using Structural Equation Modeling, the PBT framework was found to be a good fit for males and females. Socio-demographic, perceived environment system and personality accounted for over 40% of the variance in problem behaviors for males and females. Our findings have important implications for understanding how differences in engaging in problem behaviors vary by gender. PMID:27161989
Alcohol Consumption Among Scholarized Adolescents: A Socio-Communitarian Model
María Elena Villarreal-González
2010-12-01
Full Text Available The aim of this study is to analyze the relationships that the individual, family, social and school variables have with the risk of alcohol consumption among adolescents. This is an explanatory causal study. The sample consisted of 1,245 adolescents of both sexes drawn from two secondary level and two pre-university level educational institutions, and were all aged between 12 and 17 years old. Stratified probability sampling was used, taking into account the proportion of students in each grade, level, group and timetable. To analyze the data, a structural equation model was calculated that explained 66% of the variance. The results showed that community social support and family functioning were indirectly related to alcohol consumption. The former was positively and significantly related, through friends’ support and also alcohol use by family and friends, while the latter was related through two paths: firstly, a positive and significant relationship, with family support and alcohol use by family and friends and, secondly, positively through school adjustment and school self-esteem which was negatively related with alcohol consumption. A significant and positive relationship was also observed between family functioning and social support. The results are discussed in terms of the most relevant studies on the subject of this research and the methodological limitations of this study are also considered.
Computational modelling of evolution: ecosystems and language
Lipowski, Adam
2008-01-01
Recently, computational modelling became a very important research tool that enables us to study problems that for decades evaded scientific analysis. Evolutionary systems are certainly examples of such problems: they are composed of many units that might reproduce, diffuse, mutate, die, or in some cases for example communicate. These processes might be of some adaptive value, they influence each other and occur on various time scales. That is why such systems are so difficult to study. In this paper we briefly review some computational approaches, as well as our contributions, to the evolution of ecosystems and language. We start from Lotka-Volterra equations and the modelling of simple two-species prey-predator systems. Such systems are canonical example for studying oscillatory behaviour in competitive populations. Then we describe various approaches to study long-term evolution of multi-species ecosystems. We emphasize the need to use models that take into account both ecological and evolutionary processe...
Computer Aided Design Modeling for Heterogeneous Objects
Vikas Gupta
2010-03-01
Full Text Available Heterogeneous object design is an active research area in recent years. The conventional CAD modeling approaches only provide geometry and topology of the object, but do not contain any information with regard to the materials of the object and so can not be used for the fabrication of heterogeneous objects (HO through rapid prototyping. Current research focuses on computer-aided design issues in heterogeneous object design. A new CAD modeling approach is proposed to integrate the material information into geometric regions thus model the material distributions in the heterogeneous object. The gradient references are used to represent the complex geometry heterogeneous objects which have simultaneous geometry intricacies and accurate material distributions. The gradient references helps in flexible manipulability and control to heterogeneous objects, which guarantees the local control over gradient regions of developed heterogeneous objects. A systematic approach on data flow, processing, computer visualization, and slicing of heterogeneous objects for rapid prototyping is also presented.
Computer Aided Design Modeling for Heterogeneous Objects
Gupta, Vikas; Tandon, Puneet
2010-01-01
Heterogeneous object design is an active research area in recent years. The conventional CAD modeling approaches only provide geometry and topology of the object, but do not contain any information with regard to the materials of the object and so can not be used for the fabrication of heterogeneous objects (HO) through rapid prototyping. Current research focuses on computer-aided design issues in heterogeneous object design. A new CAD modeling approach is proposed to integrate the material information into geometric regions thus model the material distributions in the heterogeneous object. The gradient references are used to represent the complex geometry heterogeneous objects which have simultaneous geometry intricacies and accurate material distributions. The gradient references helps in flexible manipulability and control to heterogeneous objects, which guarantees the local control over gradient regions of developed heterogeneous objects. A systematic approach on data flow, processing, computer visualizat...
Queuing theory models for computer networks
Galant, David C.
1989-01-01
A set of simple queuing theory models which can model the average response of a network of computers to a given traffic load has been implemented using a spreadsheet. The impact of variations in traffic patterns and intensities, channel capacities, and message protocols can be assessed using them because of the lack of fine detail in the network traffic rates, traffic patterns, and the hardware used to implement the networks. A sample use of the models applied to a realistic problem is included in appendix A. Appendix B provides a glossary of terms used in this paper. This Ames Research Center computer communication network is an evolving network of local area networks (LANs) connected via gateways and high-speed backbone communication channels. Intelligent planning of expansion and improvement requires understanding the behavior of the individual LANs as well as the collection of networks as a whole.
D.S. Sieh; A.L.C. Dikkers; J.M.A. Visser-Meily; A.M. Meijer
2012-01-01
This article was inspired by Rolland’s Family Systems-Illness (FSI) model, aiming to predict adolescent stress as a function of parental illness type. Ninety-nine parents with a chronic medical condition, 82 partners, and 158 adolescent children (51 % girls; mean age = 15.1 years) participated in th
An Adolescent Nutrition Learning Model to Facilitate Behavior Change in Overweight Teens
Young, Kimberly J.; Ramsay, Samantha A.; Holyoke, Laura B.
2016-01-01
Understanding the process by which adolescents learn about nutrition is necessary for developing tailored education that leads to sustainable behavior change. Teens aged 15-17 participating in an obesity prevention program were interviewed. From the data, three themes emerged and informed development of an adolescent nutrition learning model. The…
Guerry, John D.; Prinstein, Mitchell J.
2010-01-01
Virtually no longitudinal research has examined psychological characteristics or events that may lead to adolescent nonsuicidal self-injury (NSSI). This study tested a cognitive vulnerability-stress model as a predictor of NSSI trajectories. Clinically-referred adolescents (n = 143; 72% girls) completed measures of NSSI, depression, attributional…
Self-Esteem and Delinquency in South Korean Adolescents: Latent Growth Modeling
Lee, Kyungeun; Lee, Julie
2012-01-01
This study examined the inter-related development of self-esteem and delinquency across three years. Participants were 3449 Korean high school adolescents (age M = 15.8, SD = 0.42, 1725 boys, 1724 girls) from Korea Youth Panel Study (KYPS), in 2005-2007, nationally representative of Korean adolescents. Latent growth modeling was employed for…
Wadsworth, Martha E.; Raviv, Tali; Compas, Bruce E.; Connor-Smith, Jennifer K.
2005-01-01
We tested several models of the associations among economic strain, life stress, coping, involuntary stress responses, and psychological symptoms in a sample of 57 parent-adolescent dyads from rural, lower-income families. Economic strain and life stress predicted symptoms for both parents and adolescents. Stressor-symptom specificity was found…
Rith-Najarian, Leslie R.; McLaughlin, Katie A.; Sheridan, Margaret A.; Nock, Matthew K.
2014-01-01
Extensive research among adults supports the biopsychosocial (BPS) model of challenge and threat, which describes relationships among stress appraisals, physiological stress reactivity, and performance; however, no previous studies have examined these relationships in adolescents. Perceptions of stressors as well as physiological reactivity to stress increase during adolescence, highlighting the importance of understanding the relationships among stress appraisals, physiological reactivity, a...
Wright, Marcie S.; Wilson, Dawn K.; Griffin, Sarah; Evans, Alexandra
2010-01-01
This study obtained qualitative data to assess how parental role modeling and parental social support influence physical activity in underserved (minority, low-income) adolescents. Fifty-two adolescents (22 males, 30 females; ages 10-14 years, 85% African-American) participated in a focus group (6-10 per group, same gender). Focus groups were…
Bleakley, Amy; Hennessy, Michael; Fishbein, Martin; Jordan, Amy
2011-01-01
Published research demonstrates an association between exposure to media sexual content and a variety of sex-related outcomes for adolescents. What is not known is the mechanism through which sexual content produces this "media effect" on adolescent beliefs, attitudes, and behavior. Using the Integrative Model of Behavioral Prediction, this…
McKinney, Cliff; Renk, Kimberly
2008-01-01
Although parent-adolescent interactions have been examined, relevant variables have not been integrated into a multivariate model. As a result, this study examined a multivariate model of parent-late adolescent gender dyads in an attempt to capture important predictors in late adolescents' important and unique transition to adulthood. The sample…
Computer Modelling of 3D Geological Surface
Kodge B. G.
2011-02-01
Full Text Available The geological surveying presently uses methods and tools for the computer modeling of 3D-structures of the geographical subsurface and geotechnical characterization as well as the application of geoinformation systems for management and analysis of spatial data, and their cartographic presentation. The objectives of this paper are to present a 3D geological surface model of Latur district in Maharashtra state of India. This study is undertaken through the several processes which are discussed in this paper to generate and visualize the automated 3D geological surface model of a projected area.
Computer Modelling of 3D Geological Surface
Kodge, B G
2011-01-01
The geological surveying presently uses methods and tools for the computer modeling of 3D-structures of the geographical subsurface and geotechnical characterization as well as the application of geoinformation systems for management and analysis of spatial data, and their cartographic presentation. The objectives of this paper are to present a 3D geological surface model of Latur district in Maharashtra state of India. This study is undertaken through the several processes which are discussed in this paper to generate and visualize the automated 3D geological surface model of a projected area.
Computational Modeling of Pollution Transmission in Rivers
Parsaie, Abbas; Haghiabi, Amir Hamzeh
2015-08-01
Modeling of river pollution contributes to better management of water quality and this will lead to the improvement of human health. The advection dispersion equation (ADE) is the government equation on pollutant transmission in the river. Modeling the pollution transmission includes numerical solution of the ADE and estimating the longitudinal dispersion coefficient (LDC). In this paper, a novel approach is proposed for numerical modeling of the pollution transmission in rivers. It is related to use both finite volume method as numerical method and artificial neural network (ANN) as soft computing technique together in simulation. In this approach, the result of the ANN for predicting the LDC was considered as input parameter for the numerical solution of the ADE. To validate the model performance in real engineering problems, the pollutant transmission in Severn River has been simulated. Comparison of the final model results with measured data of the Severn River showed that the model has good performance. Predicting the LDC by ANN model significantly improved the accuracy of computer simulation of the pollution transmission in river.
Jorge Delva
2012-02-01
Full Text Available We used longitudinal data to investigate the relationship between computer use in internet cafés and smoking/drinking behavior among Chinese adolescents and young adults. Data are from two waves of the China Health and Nutrition Survey (2004 and 2006. Fixed effects models were used to examine if changes in internet café use were associated with changes in cigarette smoking and drinking of alcohol. Male café users spent on average 17.3 hours in front of the computer/week. This was associated with an increase in the probability of being a current smoker by 13.3% and with smoking 1.7 more cigarettes. Female café users spent on average 11 hours on the computer/week. This was associated with an increase in the probability of drinking wine and/or liquor by 14.74% and was not associated with smoking. Internet cafés are an important venue by which adolescent and young adults in China are exposed to smoking and drinking. Multi-component interventions are needed ranging from policies regulating cigarette and alcohol availability in these venues to anti-tobacco campaigns aimed at the general population but also at individuals who frequent these establishments.
Analysis of a Model for Computer Virus Transmission
Peng Qin
2015-01-01
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our t...
Computational Models for Analysis of Illicit Activities
Nizamani, Sarwat
devise policies to minimize them. These activities include cybercrimes, terrorist attacks or violent actions in response to certain world issues. Beside such activities, there are several other related activities worth analyzing, for which computational models have been presented in this thesis....... These models include a model for analyzing evolution of terrorist networks; a text classification model for detecting suspicious text and identification of suspected authors of anonymous emails; and a semantic analysis model for news reports, which may help analyze the illicit activities in certain area...... with location and temporal information. For the network evolution, the hierarchical agglomerative clustering approach has been applied to terrorist networks as case studies. The networks' evolutions show that how individual actors who are initially isolated from each other are converted in small groups, which...
Computational hemodynamics theory, modelling and applications
Tu, Jiyuan; Wong, Kelvin Kian Loong
2015-01-01
This book discusses geometric and mathematical models that can be used to study fluid and structural mechanics in the cardiovascular system. Where traditional research methodologies in the human cardiovascular system are challenging due to its invasive nature, several recent advances in medical imaging and computational fluid and solid mechanics modelling now provide new and exciting research opportunities. This emerging field of study is multi-disciplinary, involving numerical methods, computational science, fluid and structural mechanics, and biomedical engineering. Certainly any new student or researcher in this field may feel overwhelmed by the wide range of disciplines that need to be understood. This unique book is one of the first to bring together knowledge from multiple disciplines, providing a starting point to each of the individual disciplines involved, attempting to ease the steep learning curve. This book presents elementary knowledge on the physiology of the cardiovascular system; basic knowl...
Computer modeling of a compact isochronous cyclotron
Smirnov, V. L.
2015-11-01
The computer modeling methods of a compact isochronous cyclotron are described. The main stages of analysis of accelerator facilities systems are considered. The described methods are based on theoretical fundamentals of cyclotron physics and mention highlights of creation of the physical project of a compact cyclotron. The main attention is paid to the analysis of the beam dynamics, formation of a magnetic field, stability of the movement, and a realistic assessment of intensity of the generated bunch of particles. In the article, the stages of development of the accelerator computer model, analytical ways of assessment of the accelerator parameters, and the basic technique of the numerical analysis of dynamics of the particles are described.
Computer modeling of flocculated multicomponent systems
Dabros, T. [Natural Resources Canada, CANMET Advanced Separation Technologies Laboratory, Devon, AB (Canada)
2004-07-01
The phenomenological models of settling and sediment consolidation were presented along with efficient and accurate numerical methods of solving conservation laws. This presentation provides project results and conclusions and future work in sand consolidation. It contains information on the hindered settling of multicomponent systems; hindered settling and consolidation including numerical results; and modeling multiphase flow using computational dynamics (CFD), a computer-based tool for simulating the behavior of systems involving fluid flow, heat transfer and other related physical processes. Efficient and accurate algorithms were recently developed to handle a wide class of conservation laws problems. It was concluded that solid effective stress can be accounted for in the continuity equation and excess pore pressure can be calculated from the solids concentration profile. tabs., figs.
Computational fluid dynamics modelling in cardiovascular medicine.
Morris, Paul D; Narracott, Andrew; von Tengg-Kobligk, Hendrik; Silva Soto, Daniel Alejandro; Hsiao, Sarah; Lungu, Angela; Evans, Paul; Bressloff, Neil W; Lawford, Patricia V; Hose, D Rodney; Gunn, Julian P
2016-01-01
This paper reviews the methods, benefits and challenges associated with the adoption and translation of computational fluid dynamics (CFD) modelling within cardiovascular medicine. CFD, a specialist area of mathematics and a branch of fluid mechanics, is used routinely in a diverse range of safety-critical engineering systems, which increasingly is being applied to the cardiovascular system. By facilitating rapid, economical, low-risk prototyping, CFD modelling has already revolutionised research and development of devices such as stents, valve prostheses, and ventricular assist devices. Combined with cardiovascular imaging, CFD simulation enables detailed characterisation of complex physiological pressure and flow fields and the computation of metrics which cannot be directly measured, for example, wall shear stress. CFD models are now being translated into clinical tools for physicians to use across the spectrum of coronary, valvular, congenital, myocardial and peripheral vascular diseases. CFD modelling is apposite for minimally-invasive patient assessment. Patient-specific (incorporating data unique to the individual) and multi-scale (combining models of different length- and time-scales) modelling enables individualised risk prediction and virtual treatment planning. This represents a significant departure from traditional dependence upon registry-based, population-averaged data. Model integration is progressively moving towards 'digital patient' or 'virtual physiological human' representations. When combined with population-scale numerical models, these models have the potential to reduce the cost, time and risk associated with clinical trials. The adoption of CFD modelling signals a new era in cardiovascular medicine. While potentially highly beneficial, a number of academic and commercial groups are addressing the associated methodological, regulatory, education- and service-related challenges. PMID:26512019