WorldWideScience

Sample records for adolescents computer modelling

  1. Computable models

    CERN Document Server

    Turner, Raymond

    2009-01-01

    Computational models can be found everywhere in present day science and engineering. In providing a logical framework and foundation for the specification and design of specification languages, Raymond Turner uses this framework to introduce and study computable models. In doing so he presents the first systematic attempt to provide computational models with a logical foundation. Computable models have wide-ranging applications from programming language semantics and specification languages, through to knowledge representation languages and formalism for natural language semantics. They are al

  2. Adolescents' Chunking of Computer Programs.

    Science.gov (United States)

    Magliaro, Susan; Burton, John K.

    To investigate what children learn during computer programming instruction, students attending a summer computer camp were asked to recall either single lines or chunks of computer programs from either coherent or scrambled programs. The 16 subjects, ages 12 to 17, were divided into three instructional groups: (1) beginners, who were taught to…

  3. Multidetector computed tomography of jaw lesions in children and adolescents

    International Nuclear Information System (INIS)

    Full text: Jaw lesions in paediatric and adolescent population are uncommon and can arise in odontogenic or non-odontogenic tissues. With the advent of multidetector computed tomography (MDCT), algorithm for imaging jaw lesions has changed dramatically. This pictorial essay describes the imaging appearance of commonly encountered jaw lesions in children and adolescents with emphasis on MDCT findings

  4. Why Adolescents Use a Computer-Based Health Information System.

    Science.gov (United States)

    Hawkins, Robert P.; And Others

    The Body Awareness Resource Network (BARN) is a system of interactive computer programs designed to provide adolescents with confidential, nonjudgmental health information, behavior change strategies, and sources of referral. These programs cover five adolescent health areas: alcohol and other drugs, human sexuality, smoking prevention and…

  5. Excessive recreational computer use and food consumption behaviour among adolescents.

    NARCIS (Netherlands)

    L. Shi (Lu); Y. Mao (Yuping)

    2010-01-01

    textabstractINTRODUCTION: Using the 2005 California Health Interview Survey (CHIS) data, we explore the association between excessive recreational computer use and specific food consumption behavior among California's adolescents aged 12-17. METHOD: The adolescent component of CHIS 2005 measured the

  6. Excessive recreational computer use and food consumption behaviour among adolescents

    OpenAIRE

    Mao Yuping; Shi Lu

    2010-01-01

    Abstract Introduction Using the 2005 California Health Interview Survey (CHIS) data, we explore the association between excessive recreational computer use and specific food consumption behavior among California's adolescents aged 12-17. Method The adolescent component of CHIS 2005 measured the respondents' average number of hours spent on viewing TV on a weekday, the average number of hours spent on viewing TV on a weekend day, the average number of hours spent on playing with a computer on ...

  7. The Computational Development of Reinforcement Learning during Adolescence

    OpenAIRE

    Palminteri, S., Khamassi, M., Joffily, M., Coricelli, G.; Kilford, E. J.; Coricelli, G.; Blakemore, S J

    2016-01-01

    Adolescence is a period of life characterised by changes in learning and decision-making. Learning and decision-making do not rely on a unitary system, but instead require the coordination of different cognitive processes that can be mathematically formalised as dissociable computational modules. Here, we aimed to trace the developmental time-course of the computational modules responsible for learning from reward or punishment, and learning from counterfactual feedback. Adolescents and adult...

  8. The Computational Development of Reinforcement Learning during Adolescence.

    OpenAIRE

    Stefano Palminteri; Emma J. Kilford; Giorgio Coricelli; Sarah-Jayne Blakemore

    2016-01-01

    Adolescence is a period of life characterised by changes in learning and decision-making. Learning and decision-making do not rely on a unitary system, but instead require the coordination of different cognitive processes that can be mathematically formalised as dissociable computational modules. Here, we aimed to trace the developmental time-course of the computational modules responsible for learning from reward or punishment, and learning from counterfactual feedback. Adolescents and adult...

  9. Computational neurogenetic modeling

    CERN Document Server

    Benuskova, Lubica

    2010-01-01

    Computational Neurogenetic Modeling is a student text, introducing the scope and problems of a new scientific discipline - Computational Neurogenetic Modeling (CNGM). CNGM is concerned with the study and development of dynamic neuronal models for modeling brain functions with respect to genes and dynamic interactions between genes. These include neural network models and their integration with gene network models. This new area brings together knowledge from various scientific disciplines, such as computer and information science, neuroscience and cognitive science, genetics and molecular biol

  10. Pediatric Computational Models

    Science.gov (United States)

    Soni, Bharat K.; Kim, Jong-Eun; Ito, Yasushi; Wagner, Christina D.; Yang, King-Hay

    A computational model is a computer program that attempts to simulate a behavior of a complex system by solving mathematical equations associated with principles and laws of physics. Computational models can be used to predict the body's response to injury-producing conditions that cannot be simulated experimentally or measured in surrogate/animal experiments. Computational modeling also provides means by which valid experimental animal and cadaveric data can be extrapolated to a living person. Widely used computational models for injury biomechanics include multibody dynamics and finite element (FE) models. Both multibody and FE methods have been used extensively to study adult impact biomechanics in the past couple of decades.

  11. The Computational Development of Reinforcement Learning during Adolescence.

    Science.gov (United States)

    Palminteri, Stefano; Kilford, Emma J; Coricelli, Giorgio; Blakemore, Sarah-Jayne

    2016-06-01

    Adolescence is a period of life characterised by changes in learning and decision-making. Learning and decision-making do not rely on a unitary system, but instead require the coordination of different cognitive processes that can be mathematically formalised as dissociable computational modules. Here, we aimed to trace the developmental time-course of the computational modules responsible for learning from reward or punishment, and learning from counterfactual feedback. Adolescents and adults carried out a novel reinforcement learning paradigm in which participants learned the association between cues and probabilistic outcomes, where the outcomes differed in valence (reward versus punishment) and feedback was either partial or complete (either the outcome of the chosen option only, or the outcomes of both the chosen and unchosen option, were displayed). Computational strategies changed during development: whereas adolescents' behaviour was better explained by a basic reinforcement learning algorithm, adults' behaviour integrated increasingly complex computational features, namely a counterfactual learning module (enabling enhanced performance in the presence of complete feedback) and a value contextualisation module (enabling symmetrical reward and punishment learning). Unlike adults, adolescent performance did not benefit from counterfactual (complete) feedback. In addition, while adults learned symmetrically from both reward and punishment, adolescents learned from reward but were less likely to learn from punishment. This tendency to rely on rewards and not to consider alternative consequences of actions might contribute to our understanding of decision-making in adolescence. PMID:27322574

  12. The Computational Development of Reinforcement Learning during Adolescence.

    Directory of Open Access Journals (Sweden)

    Stefano Palminteri

    2016-06-01

    Full Text Available Adolescence is a period of life characterised by changes in learning and decision-making. Learning and decision-making do not rely on a unitary system, but instead require the coordination of different cognitive processes that can be mathematically formalised as dissociable computational modules. Here, we aimed to trace the developmental time-course of the computational modules responsible for learning from reward or punishment, and learning from counterfactual feedback. Adolescents and adults carried out a novel reinforcement learning paradigm in which participants learned the association between cues and probabilistic outcomes, where the outcomes differed in valence (reward versus punishment and feedback was either partial or complete (either the outcome of the chosen option only, or the outcomes of both the chosen and unchosen option, were displayed. Computational strategies changed during development: whereas adolescents' behaviour was better explained by a basic reinforcement learning algorithm, adults' behaviour integrated increasingly complex computational features, namely a counterfactual learning module (enabling enhanced performance in the presence of complete feedback and a value contextualisation module (enabling symmetrical reward and punishment learning. Unlike adults, adolescent performance did not benefit from counterfactual (complete feedback. In addition, while adults learned symmetrically from both reward and punishment, adolescents learned from reward but were less likely to learn from punishment. This tendency to rely on rewards and not to consider alternative consequences of actions might contribute to our understanding of decision-making in adolescence.

  13. Variables of excessive computer internet use in childhood and adolescence

    OpenAIRE

    Thalemann, Ralf

    2010-01-01

    The aim of this doctoral thesis is the characterization of excessive computer and video gaming in terms of a behavioral addiction. Therefore, the development of a diagnostic psychometric instrument was central to differentiate between normal and pathological computer gaming in adolescence. In study 1, 323 children were asked about their video game playing behavior to assess the prevalence of pathological computer gaming. Data suggest that excessive computer and video game players use thei...

  14. The CMS Computing Model

    International Nuclear Information System (INIS)

    The CMS experiment at LHC has developed a baseline Computing Model addressing the needs of a computing system capable to operate in the first years of LHC running. It is focused on a data model with heavy streaming at the raw data level based on trigger, and on the achievement of the maximum flexibility in the use of distributed computing resources. The CMS distributed Computing Model includes a Tier-0 centre at CERN, a CMS Analysis Facility at CERN, several Tier-1 centres located at large regional computing centres, and many Tier-2 centres worldwide. The workflows have been identified, along with a baseline architecture for the data management infrastructure. This model is also being tested in Grid Service Challenges of increasing complexity, coordinated with the Worldwide LHC Computing Grid community

  15. Modeling Trusted Computing

    Institute of Scientific and Technical Information of China (English)

    CHEN Shuyi; WEN Yingyou; ZHAO Hong

    2006-01-01

    In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.

  16. Adolescent Victims of Abuse: A Treatment Model.

    Science.gov (United States)

    Anderson-Merchant, Darlene

    This paper presents a theory and model for treating adolescent victims of physical and sexual abuse and neglect. The theory examines issues related to abuse or neglect and the effect that an abusive history has on adolescent development. Specific issues noted are depression, anger, low self-esteem, self-shame, lack of trust, a sense of…

  17. Computer Modeling and Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Pronskikh, V. S. [Fermilab

    2014-05-09

    Verification and validation of computer codes and models used in simulation are two aspects of the scientific practice of high importance and have recently been discussed by philosophers of science. While verification is predominantly associated with the correctness of the way a model is represented by a computer code or algorithm, validation more often refers to model’s relation to the real world and its intended use. It has been argued that because complex simulations are generally not transparent to a practitioner, the Duhem problem can arise for verification and validation due to their entanglement; such an entanglement makes it impossible to distinguish whether a coding error or model’s general inadequacy to its target should be blamed in the case of the model failure. I argue that in order to disentangle verification and validation, a clear distinction between computer modeling (construction of mathematical computer models of elementary processes) and simulation (construction of models of composite objects and processes by means of numerical experimenting with them) needs to be made. Holding on to that distinction, I propose to relate verification (based on theoretical strategies such as inferences) to modeling and validation, which shares the common epistemology with experimentation, to simulation. To explain reasons of their intermittent entanglement I propose a weberian ideal-typical model of modeling and simulation as roles in practice. I suggest an approach to alleviate the Duhem problem for verification and validation generally applicable in practice and based on differences in epistemic strategies and scopes

  18. Typologies of Computation and Computational Models

    OpenAIRE

    Burgin, Mark; Dodig-Crnkovic, Gordana

    2013-01-01

    We need much better understanding of information processing and computation as its primary form. Future progress of new computational devices capable of dealing with problems of big data, internet of things, semantic web, cognitive robotics and neuroinformatics depends on the adequate models of computation. In this article we first present the current state of the art through systematization of existing models and mechanisms, and outline basic structural framework of computation. We argue tha...

  19. Computational Intelligence, Cyber Security and Computational Models

    CERN Document Server

    Anitha, R; Lekshmi, R; Kumar, M; Bonato, Anthony; Graña, Manuel

    2014-01-01

    This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

  20. CMS computing model evolution

    International Nuclear Information System (INIS)

    The CMS Computing Model was developed and documented in 2004. Since then the model has evolved to be more flexible and to take advantage of new techniques, but many of the original concepts remain and are in active use. In this presentation we will discuss the changes planned for the restart of the LHC program in 2015. We will discuss the changes planning in the use and definition of the computing tiers that were defined with the MONARC project. We will present how we intend to use new services and infrastructure to provide more efficient and transparent access to the data. We will discuss the computing plans to make better use of the computing capacity by scheduling more of the processor nodes, making better use of the disk storage, and more intelligent use of the networking.

  1. CMS Computing Model Evolution

    CERN Document Server

    Grandi, Claudio; Colling, D; Fisk, I; Girone, M

    2014-01-01

    The CMS Computing Model was developed and documented in 2004. Since then the model has evolved to be more flexible and to take advantage of new techniques, but many of the original concepts remain and are in active use. In this presentation we will discuss the changes planned for the restart of the LHC program in 2015. We will discuss the changes planning in the use and definition of the computing tiers, that were defined with the MONARC project. We will present how we intend to use new services and infrastructure to provide more efficient and transparent access to the data. We will discuss the computing plans to make better use of the computing capacity by scheduling more of the processor nodes, making better use of the disk storage, and more intelligent use of the networking.

  2. Emerging Hybrid Computational Models

    Czech Academy of Sciences Publication Activity Database

    Neruda, Roman

    Berlin : Springer, 2006 - (Huang, D.; Li, K.; Irwin, G.), s. 379-389 ISBN 3-540-37274-1. - (Lecture Notes in Artificial Intelligence . 4114). [ICIC 2006. International Conference on Intelligent Computing. Kunming (CN), 16.08.2006-19.08.2006] R&D Projects: GA MŠk 1M0567 Grant ostatní: HPC-Europa(XE) RII3-CT-2003-506079 Institutional research plan: CEZ:AV0Z10300504 Keywords : computational intelligence * intelligent agents * hybrid models Subject RIV: IN - Informatics, Computer Science

  3. Computational models of planning.

    Science.gov (United States)

    Geffner, Hector

    2013-07-01

    The selection of the action to do next is one of the central problems faced by autonomous agents. Natural and artificial systems address this problem in various ways: action responses can be hardwired, they can be learned, or they can be computed from a model of the situation, the actions, and the goals. Planning is the model-based approach to action selection and a fundamental ingredient of intelligent behavior in both humans and machines. Planning, however, is computationally hard as the consideration of all possible courses of action is not computationally feasible. The problem has been addressed by research in Artificial Intelligence that in recent years has uncovered simple but powerful computational principles that make planning feasible. The principles take the form of domain-independent methods for computing heuristics or appraisals that enable the effective generation of goal-directed behavior even over huge spaces. In this paper, we look at several planning models, at methods that have been shown to scale up to large problems, and at what these methods may suggest about the human mind. WIREs Cogn Sci 2013, 4:341-356. doi: 10.1002/wcs.1233 The authors have declared no conflicts of interest for this article. For further resources related to this article, please visit the WIREs website. PMID:26304223

  4. Perceived problems with computer gaming and internet use among adolescents

    DEFF Research Database (Denmark)

    Holstein, Bjørn E; Pedersen, Trine Pagh; Bendtsen, Pernille;

    2014-01-01

    new measures of perceived problems related to computer and console gaming and internet use among adolescents are appropriate, reliable and valid for use in non-clinical surveys about young people's everyday life and behaviour. These new measures do not assess Internet Gaming Disorder as it is listed......BACKGROUND: Existing instruments for measuring problematic computer and console gaming and internet use are often lengthy and often based on a pathological perspective. The objective was to develop and present a new and short non-clinical measurement tool for perceived problems related to computer...... weekdays on computer- and console-gaming and internet use for communication and surfing. The outcome measures were three indexes on perceived problems related to computer and console gaming and internet use. RESULTS: The three new indexes showed high face validity and acceptable internal consistency. Most...

  5. Understanding Student Computational Thinking with Computational Modeling

    OpenAIRE

    Aiken, John M.; Caballero, Marcos D.; Douglas, Scott S.; Burk, John B.; Scanlon, Erin M.; Thoms, Brian D.; Schatz, Michael F.

    2012-01-01

    Recently, the National Research Council's framework for next generation science standards highlighted "computational thinking" as one of its "fundamental practices". 9th Grade students taking a physics course that employed the Modeling Instruction curriculum were taught to construct computational models of physical systems. Student computational thinking was assessed using a proctored programming assignment, written essay, and a series of think-aloud interviews, where the students produced an...

  6. Excessive recreational computer use and food consumption behaviour among adolescents

    Directory of Open Access Journals (Sweden)

    Mao Yuping

    2010-08-01

    Full Text Available Abstract Introduction Using the 2005 California Health Interview Survey (CHIS data, we explore the association between excessive recreational computer use and specific food consumption behavior among California's adolescents aged 12-17. Method The adolescent component of CHIS 2005 measured the respondents' average number of hours spent on viewing TV on a weekday, the average number of hours spent on viewing TV on a weekend day, the average number of hours spent on playing with a computer on a weekday, and the average number of hours spent on playing with computers on a weekend day. We recode these four continuous variables into four variables of "excessive media use," and define more than three hours of using a medium per day as "excessive." These four variables are then used in logistic regressions to predict different food consumption behaviors on the previous day: having fast food, eating sugary food more than once, drinking sugary drinks more than once, and eating more than five servings of fruits and vegetables. We use the following variables as covariates in the logistic regressions: age, gender, race/ethnicity, parental education, household poverty status, whether born in the U.S., and whether living with two parents. Results Having fast food on the previous day is associated with excessive weekday TV viewing (O.R. = 1.38, p Conclusion Excessive recreational computer use independently predicts undesirable eating behaviors that could lead to overweight and obesity. Preventive measures ranging from parental/youth counseling to content regulations might be addressing the potential undesirable influence from excessive computer use on eating behaviors among children and adolescents.

  7. Computable Geospatial Models

    OpenAIRE

    Kolar, Jan

    2013-01-01

    15 minutes talk on practical implementation of the Geospatial Manged Objects and the concepts described in the article "Bytecode Unification of Computable Geospatial Models". The time index of the presentation: 1m 43s Minimalistic GMO 4m 08s Functional GMO Definition 6m 07s Accessing GMOs from Shell using Scala scripts 9m 24s Viewing GMOs using Virtual Globe component 12m 03s GRIFIN implementation of GMO technology 12m 36s GMO software clients using GRIFIN ...

  8. Understanding Student Computational Thinking with Computational Modeling

    CERN Document Server

    Aiken, John M; Douglas, Scott S; Burk, John B; Scanlon, Erin M; Thoms, Brian D; Schatz, Michael F

    2012-01-01

    Recently, the National Research Council's framework for next generation science standards highlighted "computational thinking" as one of its "fundamental practices". Students taking a physics course that employed the Arizona State University's Modeling Instruction curriculum were taught to construct computational models of physical systems. Student computational thinking was assessed using a proctored programming assignment, written essay, and a series of think-aloud interviews, where the students produced and discussed a computational model of a baseball in motion via a high-level programming environment (VPython). Roughly a third of the students in the study were successful in completing the programming assignment. Student success on this assessment was tied to how students synthesized their knowledge of physics and computation. On the essay and interview assessments, students displayed unique views of the relationship between force and motion; those who spoke of this relationship in causal (rather than obs...

  9. Educational Computer Use in Leisure Contexts: A Phenomenological Study of Adolescents' Experiences at Internet Cafes

    Science.gov (United States)

    Cilesiz, Sebnem

    2009-01-01

    Computer use is a widespread leisure activity for adolescents. Leisure contexts, such as Internet cafes, constitute specific social environments for computer use and may hold significant educational potential. This article reports a phenomenological study of adolescents' experiences of educational computer use at Internet cafes in Turkey. The…

  10. The ATLAS Computing Model

    International Nuclear Information System (INIS)

    The ATLAS computing model was constructed to exploit the opportunities of the Grid in handling the large volumes of data from the Large Hadron Collider and to allow easy and relatively local access to data for all of its collaborators worldwide. Despite delays with collision data, the model has now been tested with beam-related and cosmic ray data, and much has been learned. The model has retained its overall design, but with adjustments for the actual functionality of the delivered Grid middleware and services, and for the realities of data access. While much has still to be learned, the model has worked effectively. This presentation will cover the roles of the various Tiers, the resources required and the expected workflows. (author)

  11. LHCb computing model

    CERN Document Server

    Frank, M; Pacheco, Andreu

    1998-01-01

    This document is a first attempt to describe the LHCb computing model. The CPU power needed to process data for the event filter and reconstruction is estimated to be 2.2 \\Theta 106 MIPS. This will be installed at the experiment and will be reused during non data-taking periods for reprocessing. The maximal I/O of these activities is estimated to be around 40 MB/s.We have studied three basic models concerning the placement of the CPU resources for the other computing activities, Monte Carlo-simulation (1:4 \\Theta 106 MIPS) and physics analysis (0:5 \\Theta 106 MIPS): CPU resources may either be located at the physicist's homelab, national computer centres (Regional Centres) or at CERN.The CPU resources foreseen for analysis are sufficient to allow 100 concurrent analyses. It is assumed that physicists will work in physics groups that produce analysis data at an average rate of 4.2 MB/s or 11 TB per month. However, producing these group analysis data requires reading capabilities of 660 MB/s. It is further assu...

  12. The Antares computing model

    Energy Technology Data Exchange (ETDEWEB)

    Kopper, Claudio, E-mail: claudio.kopper@nikhef.nl [NIKHEF, Science Park 105, 1098 XG Amsterdam (Netherlands)

    2013-10-11

    Completed in 2008, Antares is now the largest water Cherenkov neutrino telescope in the Northern Hemisphere. Its main goal is to detect neutrinos from galactic and extra-galactic sources. Due to the high background rate of atmospheric muons and the high level of bioluminescence, several on-line and off-line filtering algorithms have to be applied to the raw data taken by the instrument. To be able to handle this data stream, a dedicated computing infrastructure has been set up. The paper covers the main aspects of the current official Antares computing model. This includes an overview of on-line and off-line data handling and storage. In addition, the current usage of the “IceTray” software framework for Antares data processing is highlighted. Finally, an overview of the data storage formats used for high-level analysis is given.

  13. The Antares computing model

    International Nuclear Information System (INIS)

    Completed in 2008, Antares is now the largest water Cherenkov neutrino telescope in the Northern Hemisphere. Its main goal is to detect neutrinos from galactic and extra-galactic sources. Due to the high background rate of atmospheric muons and the high level of bioluminescence, several on-line and off-line filtering algorithms have to be applied to the raw data taken by the instrument. To be able to handle this data stream, a dedicated computing infrastructure has been set up. The paper covers the main aspects of the current official Antares computing model. This includes an overview of on-line and off-line data handling and storage. In addition, the current usage of the “IceTray” software framework for Antares data processing is highlighted. Finally, an overview of the data storage formats used for high-level analysis is given

  14. Adolescent girls' energy expenditure during dance simulation active computer gaming.

    Science.gov (United States)

    Fawkner, Samantha G; Niven, Alisa; Thin, Alasdair G; Macdonald, Mhairi J; Oakes, Jemma R

    2010-01-01

    The objective of this study was to determine the energy expended and intensity of physical activity achieved by adolescent girls while playing on a dance simulation game. Twenty adolescent girls were recruited from a local secondary school. Resting oxygen uptake (VO(2)) and heart rate were analysed while sitting quietly and subsequently during approximately 30 min of game play, with 10 min at each of three increasing levels of difficulty. Energy expenditure was predicted from VO(2) at rest and during game play at three levels of play, from which the metabolic equivalents (METS) of game playing were derived. Mean +/- standard deviation energy expenditure for levels 1, 2, and 3 was 3.63 +/- 0.58, 3.65 +/- 0.54, and 4.14 +/- 0.71 kcal . min(-1) respectively, while mean activity for each level of play was at least of moderate intensity (>3 METS). Dance simulation active computer games provide an opportunity for most adolescent girls to exercise at moderate intensity. Therefore, regular playing might contribute to daily physical activity recommendations for good health in this at-risk population. PMID:20013462

  15. Using a computational model to quantify the potential impact of changing the placement of healthy beverages in stores as an intervention to “Nudge” adolescent behavior choice

    OpenAIRE

    Wong, Michelle S.; Nau, Claudia; Kharmats, Anna Yevgenyevna; Vedovato, Gabriela Milhassi; Cheskin, Lawrence J.; Gittelsohn, Joel; Lee, Bruce Y.

    2015-01-01

    Background Product placement influences consumer choices in retail stores. While sugar sweetened beverage (SSB) manufacturers expend considerable effort and resources to determine how product placement may increase SSB purchases, the information is proprietary and not available to the public health and research community. This study aims to quantify the effect of non-SSB product placement in corner stores on adolescent beverage purchasing behavior. Corner stores are small privately owned reta...

  16. Two Models of Adolescent Self-Mutilation.

    Science.gov (United States)

    Ross, Shana; Heath, Nancy Lee

    2003-01-01

    Hostility and anxiety reduction models were simultaneously tested in order to determine whether self-mutilation (SM) in adolescence was characterized by greater feelings of anxiety and hostility. Students who SM reported significantly more anxiety and more intropunitive and extrapunitive hostility. Prior to SM feelings of both hostility and…

  17. Plasticity modeling & computation

    CERN Document Server

    Borja, Ronaldo I

    2013-01-01

    There have been many excellent books written on the subject of plastic deformation in solids, but rarely can one find a textbook on this subject. “Plasticity Modeling & Computation” is a textbook written specifically for students who want to learn the theoretical, mathematical, and computational aspects of inelastic deformation in solids. It adopts a simple narrative style that is not mathematically overbearing, and has been written to emulate a professor giving a lecture on this subject inside a classroom. Each section is written to provide a balance between the relevant equations and the explanations behind them. Where relevant, sections end with one or more exercises designed to reinforce the understanding of the “lecture.” Color figures enhance the presentation and make the book very pleasant to read. For professors planning to use this textbook for their classes, the contents are sufficient for Parts A and B that can be taught in sequence over a period of two semesters or quarters.

  18. Indentifying Latent Classes and Testing Their Determinants in Early Adolescents' Use of Computers and Internet for Learning

    Science.gov (United States)

    Heo, Gyun

    2013-01-01

    The purpose of the present study was to identify latent classes resting on early adolescents' change trajectory patterns in using computers and the Internet for learning and to test the effects of gender, self-control, self-esteem, and game use in South Korea. Latent growth mixture modeling (LGMM) was used to identify subpopulations in the Korea…

  19. COMPUTER MODELS/EPANET

    Science.gov (United States)

    Pipe network flow analysis was among the first civil engineering applications programmed for solution on the early commercial mainframe computers in the 1960s. Since that time, advancements in analytical techniques and computing power have enabled us to solve systems with tens o...

  20. Computational modeling of concrete flow

    DEFF Research Database (Denmark)

    Roussel, Nicolas; Geiker, Mette Rica; Dufour, Frederic; Thrane, Lars Nyholm; Szabo, Peter

    2007-01-01

    This paper provides a general overview of the present status regarding computational modeling of the flow of fresh concrete. The computational modeling techniques that can be found in the literature may be divided into three main families: single fluid simulations, numerical modeling of discrete...

  1. A Novel Forensic Computing Model

    Institute of Scientific and Technical Information of China (English)

    XU Yunfeng; LU Yansheng

    2006-01-01

    According to the requirement of computer forensic and network forensic, a novel forensic computing model is presented, which exploits XML/OEM/RM data model, Data fusion technology, forensic knowledgebase, inference mechanism of expert system and evidence mining engine. This model takes advantage of flexility and openness, so it can be widely used in mining evidence.

  2. Computational modeling in biomechanics

    CERN Document Server

    Mofrad, Mohammad

    2010-01-01

    This book provides a glimpse of the diverse and important roles that modern computational technology is playing in various areas of biomechanics. It includes unique chapters on ab initio quantum mechanical, molecular dynamic and scale coupling methods..

  3. A physicist's model of computation

    International Nuclear Information System (INIS)

    An attempt is presented to make a statement about what a computer is and how it works from the perspective of physics. The single observation that computation can be a reversible process allows for the same kind of insight into computing as was obtained by Carnot's discovery that heat engines could be modelled as reversible processes. It allows us to bring computation into the realm of physics, where the power of physics allows us to ask and answer questions that seemed intractable from the viewpoint of computer science. Strangely enough, this effort makes it clear why computers get cheaper every year. (author) 14 refs., 4 figs

  4. Computational Reasoning across Multiple Models

    OpenAIRE

    Tsafnat, Guy; Coiera, Enrico W.

    2009-01-01

    Computational support of clinical decisions frequently requires the integration of data in a variety of formats and from multiple sources and domains. Some impressive multiscale computational models of biological phenomena have been developed as part of the study of disease and healthcare systems. One can now contemplate harnessing these models arising from computational biology and using highly interconnected clinical data to support clinical decision-making. Indeed, understanding how to bui...

  5. Computer-Aided Modeling Framework

    DEFF Research Database (Denmark)

    Fedorova, Marina; Sin, Gürkan; Gani, Rafiqul

    Models are playing important roles in design and analysis of chemicals based products and the processes that manufacture them. Computer-aided methods and tools have the potential to reduce the number of experiments, which can be expensive and time consuming, and there is a benefit of working with...... development and application. The proposed work is a part of the project for development of methods and tools that will allow systematic generation, analysis and solution of models for various objectives. It will use the computer-aided modeling framework that is based on a modeling methodology, which combines...... contribution, the concept of template-based modeling is presented and application is highlighted for the specific case of catalytic membrane fixed bed models. The modeling template is integrated in a generic computer-aided modeling framework. Furthermore, modeling templates enable the idea of model reuse as...

  6. Dispersion modeling using personal computers

    Science.gov (United States)

    Schulze, Richard H.

    The widespread availability of personal computers and PC versions of models for these computers is changing the way dispersion modeling is performed. Research scientists, environmental engineers and meteorologists, whether associated with institutes, industry or regulatory agencies, can use screening models to determine the effect of proposed changes, and when more complicated studies are warranted. As model use becomes more egalitarian, better use of intellectual talent among modelers will occur. Scientists can focus on more difficult problems while industry and agency personnel can focus on more routine issues. Moreover, the presently available models enable nearly anyone with some scientific training to perform modeling and make reasonable estimates of air quality changes.

  7. A Study of the Correlation between Computer Games and Adolescent Behavioral Problems

    OpenAIRE

    Shokouhi-Moqhaddam, Solmaz; Khezri-Moghadam, Noshiravan; Javanmard, Zeinab; Sarmadi-Ansar, Hassan; Aminaee, Mehran; Shokouhi-Moqhaddam, Majid; Zivari-Rahman, Mahmoud

    2013-01-01

    Background Today, due to developing communicative technologies, computer games and other audio-visual media as social phenomena, are very attractive and have a great effect on children and adolescents. The increasing popularity of these games among children and adolescents results in the public uncertainties about plausible harmful effects of these games. This study aimed to investigate the correlation between computer games and behavioral problems on male guidance school students. Methods Th...

  8. Computer-Aided Modeling Framework

    DEFF Research Database (Denmark)

    Fedorova, Marina; Sin, Gürkan; Gani, Rafiqul

    them. As the required models may be complex and require multiple time and/or length scales, their development and application for product-process design is not trivial. Therefore, a systematic modeling framework can contribute by significantly reducing the time and resources needed for model...... development and application. The proposed work is a part of the project for development of methods and tools that will allow systematic generation, analysis and solution of models for various objectives. It will use the computer-aided modeling framework that is based on a modeling methodology, which combines...... contribution, the concept of template-based modeling is presented and application is highlighted for the specific case of catalytic membrane fixed bed models. The modeling template is integrated in a generic computer-aided modeling framework. Furthermore, modeling templates enable the idea of model reuse as...

  9. Computer Anxiety: A Comparison of Adolescents with and without a History of Specific Language Impairment (SLI)

    Science.gov (United States)

    Conti-Ramsden, Gina; Durkin, Kevin; Walker, Allan J.

    2010-01-01

    Individuals who are anxious about computers may be at a disadvantage in their learning. This investigation focused on the use of home computers for educational purposes. It compared computer anxiety in adolescents with and without a history of special needs related to language difficulties. Participants were 55 17-year-olds with specific language…

  10. Modeling Developmental Complexity in Adolescence: Hormones and Behavior in Context.

    Science.gov (United States)

    Susman, Elizabeth J.

    1997-01-01

    The links between endocrine physiological processes and adolescent psychological processes are the focus of this article. Presents a brief history of biopsychosocial research in adolescent development. Discusses four models for conceptualizing hormone-behavior research as illustrative of biopsychosocial models. Concludes with challenges and…

  11. Is an interest in computers or individual/team sports associated with adolescent psychiatric disorders?

    Science.gov (United States)

    Harju, Outi; Luukkonen, Anu-Helmi; Hakko, Helinä; Räsänen, Pirkko; Riala, Kaisa

    2011-01-01

    The Internet plays a major role in adolescents' free time activities and communication nowadays. The aim here was to investigate the possibility of an association of computers and video games or sports (team, individual) with psychiatric disorders among underage psychiatric inpatients. The series of adolescents (n = 508) had been diagnosed using semistructured interviews (K-SADS-PL). The results showed that an interest in computers and video games did not increase the risk of any specific psychiatric disorder among these adolescent inpatients, but the likelihood of a substance-related disorder was statistically significantly lower among the boys with computers as a hobby. Team sports were related to increased likelihood of conduct disorder among the boys, whereas the likelihood of an affective disorder was reduced. No such association was found in individual sports or among the girls. We conclude that social contacts and peers play an important role in preventing adolescent depression. PMID:21288072

  12. Cosmic Logic: a Computational Model

    OpenAIRE

    Vanchurin, Vitaly

    2015-01-01

    We initiate a formal study of logical inferences in context of the measure problem in cosmology or what we call cosmic logic. We describe a simple computational model of cosmic logic suitable for analysis of, for example, discretized cosmological systems. The construction is based on a particular model of computation, developed by Alan Turing, with cosmic observers (CO), cosmic measures (CM) and cosmic symmetries (CS) described by Turing machines. CO machines always start with a blank tape an...

  13. Patient-Specific Computational Modeling

    CERN Document Server

    Peña, Estefanía

    2012-01-01

    This book addresses patient-specific modeling. It integrates computational modeling, experimental procedures, imagine clinical segmentation and mesh generation with the finite element method (FEM) to solve problems in computational biomedicine and bioengineering. Specific areas of interest include cardiovascular problems, ocular and muscular systems and soft tissue modeling. Patient-specific modeling has been the subject of serious research over the last seven years and interest in the area is continually growing and this area is expected to further develop in the near future.

  14. Computational models of epileptiform activity.

    Science.gov (United States)

    Wendling, Fabrice; Benquet, Pascal; Bartolomei, Fabrice; Jirsa, Viktor

    2016-02-15

    We reviewed computer models that have been developed to reproduce and explain epileptiform activity. Unlike other already-published reviews on computer models of epilepsy, the proposed overview starts from the various types of epileptiform activity encountered during both interictal and ictal periods. Computational models proposed so far in the context of partial and generalized epilepsies are classified according to the following taxonomy: neural mass, neural field, detailed network and formal mathematical models. Insights gained about interictal epileptic spikes and high-frequency oscillations, about fast oscillations at seizure onset, about seizure initiation and propagation, about spike-wave discharges and about status epilepticus are described. This review shows the richness and complementarity of the various modeling approaches as well as the fruitful contribution of the computational neuroscience community in the field of epilepsy research. It shows that models have progressively gained acceptance and are now considered as an efficient way of integrating structural, functional and pathophysiological data about neural systems into "coherent and interpretable views". The advantages, limitations and future of modeling approaches are discussed. Perspectives in epilepsy research and clinical epileptology indicate that very promising directions are foreseen, like model-guided experiments or model-guided therapeutic strategy, among others. PMID:25843066

  15. Design and evaluation protocol of "FATaintPHAT", a computer-tailored intervention to prevent excessive weight gain in adolescents

    NARCIS (Netherlands)

    N.P.M. Ezendam (Nicole); A. Oenema (Anke); P.M. van de Looij-Jansen (Petra); J. Brug (Hans)

    2008-01-01

    textabstractComputer tailoring may be a promising technique for prevention of overweight in adolescents. However, very few well-developed, evidence-based computer-tailored interventions are available for this target group. We developed and evaluated a computer-tailored intervention for adolescents t

  16. Design and evaluation protocol of "FATaintPHAT", a computer-tailored intervention to prevent excessive weight gain in adolescents

    Directory of Open Access Journals (Sweden)

    van de Looij-Jansen Petra M

    2007-11-01

    Full Text Available Abstract Background Computer tailoring may be a promising technique for prevention of overweight in adolescents. However, very few well-developed, evidence-based computer-tailored interventions are available for this target group. We developed and evaluated a computer-tailored intervention for adolescents targeting energy balance-related behaviours: i.e. consumption of snacks, sugar-sweetened beverages, fruit, vegetables, and fibre, physical activity, and sedentary behaviours. This paper describes the planned development of a school-based computer-tailored intervention aimed at improving energy balance-related behaviours in order to prevent excessive weight gain in adolescents, and the protocol for evaluating this intervention. Methods/design Intervention development: Informed by the Precaution Adoption Process Model and the Theory of Planned Behaviour, the computer-tailored intervention provided feedback on personal behaviour and suggestions on how to modify it. The intervention (VETisnietVET translated as 'FATaintPHAT' has been developed for use in the first year of secondary school during eight lessons. Evaluation design: The intervention will be evaluated in a cluster-randomised trial including 20 schools with a 4-months and a 2-years follow-up. Outcome measures are BMI, waist circumference, energy balance-related behaviours, and potential determinants of these behaviours. Process measures are appreciation of and satisfaction with the program, exposure to the program's content, and implementation facilitators and barriers measured among students and teachers. Discussion This project resulted in a theory and evidence-based intervention that can be implemented in a school setting. A large-scale randomised controlled trial with a short and long-term follow-up will provide sound statements about the effectiveness of this computer-tailored intervention in adolescents. Trial Registration ISRCTN15743786

  17. Computer Modelling of Dynamic Processes

    Directory of Open Access Journals (Sweden)

    B. Rybakin

    2000-10-01

    Full Text Available Results of numerical modeling of dynamic problems are summed in the article up. These problems are characteristic for various areas of human activity, in particular for problem solving in ecology. The following problems are considered in the present work: computer modeling of dynamic effects on elastic-plastic bodies, calculation and determination of performances of gas streams in gas cleaning equipment, modeling of biogas formation processes.

  18. Computer-Mediated communication and the role of adolescence in language development

    OpenAIRE

    Collins, M.; Vinicius, L.

    2009-01-01

    This study explores the relationship between human language and changes in language use during adolescence. After reviewing current theories for the origin and evolution of language, the article tests the hypothesis that sexual selection played a vital role in the development of language by examining sexual dimorphism in language in a sample of adolescents of known age and sex. The analyses relied on computer-mediated communication and data from online journals, which provide an insight into ...

  19. Computational models of complex systems

    CERN Document Server

    Dabbaghian, Vahid

    2014-01-01

    Computational and mathematical models provide us with the opportunities to investigate the complexities of real world problems. They allow us to apply our best analytical methods to define problems in a clearly mathematical manner and exhaustively test our solutions before committing expensive resources. This is made possible by assuming parameter(s) in a bounded environment, allowing for controllable experimentation, not always possible in live scenarios. For example, simulation of computational models allows the testing of theories in a manner that is both fundamentally deductive and experimental in nature. The main ingredients for such research ideas come from multiple disciplines and the importance of interdisciplinary research is well recognized by the scientific community. This book provides a window to the novel endeavours of the research communities to present their works by highlighting the value of computational modelling as a research tool when investigating complex systems. We hope that the reader...

  20. Computational Modeling of Multiphase Reactors.

    Science.gov (United States)

    Joshi, J B; Nandakumar, K

    2015-01-01

    Multiphase reactors are very common in chemical industry, and numerous review articles exist that are focused on types of reactors, such as bubble columns, trickle beds, fluid catalytic beds, etc. Currently, there is a high degree of empiricism in the design process of such reactors owing to the complexity of coupled flow and reaction mechanisms. Hence, we focus on synthesizing recent advances in computational and experimental techniques that will enable future designs of such reactors in a more rational manner by exploring a large design space with high-fidelity models (computational fluid dynamics and computational chemistry models) that are validated with high-fidelity measurements (tomography and other detailed spatial measurements) to provide a high degree of rigor. Understanding the spatial distributions of dispersed phases and their interaction during scale up are key challenges that were traditionally addressed through pilot scale experiments, but now can be addressed through advanced modeling. PMID:26134737

  1. Computational models of adult neurogenesis

    Science.gov (United States)

    Cecchi, Guillermo A.; Magnasco, Marcelo O.

    2005-10-01

    Experimental results in recent years have shown that adult neurogenesis is a significant phenomenon in the mammalian brain. Little is known, however, about the functional role played by the generation and destruction of neurons in the context of an adult brain. Here, we propose two models where new projection neurons are incorporated. We show that in both models, using incorporation and removal of neurons as a computational tool, it is possible to achieve a higher computational efficiency that in purely static, synapse-learning-driven networks. We also discuss the implication for understanding the role of adult neurogenesis in specific brain areas like the olfactory bulb and the dentate gyrus.

  2. Pervasive Computing and Prosopopoietic Modelling

    DEFF Research Database (Denmark)

    Michelsen, Anders Ib

    2011-01-01

    ’, on the horizon, ’calm’, it also points to a much more important and slightly different perspective: that of creative action upon novel forms of artifice. Most importantly for this article, ubiquity and pervasive computing is seen to point to the continuous existence throughout the computational heritage since...... the mid-20th century of a paradoxical distinction/complicity between the technical organisation of computed function and the human Being, in the sense of creative action upon such function. This paradoxical distinction/complicity promotes a chiastic (Merleau-Ponty) relationship of extension of one...... into the other. It also indicates a generative creation that itself points to important issues of ontology with methodological implications for the design of computing. In this article these implications will be conceptualised as prosopopoietic modeling on the basis of Bernward Joerges introduction...

  3. Subgraph Colouring Technique for Computer with Data Driven Computation Model

    OpenAIRE

    Liberios Vokorokos; Branislav Madoš; Norbert Ádám; Marek Čajkovský

    2013-01-01

    Paper deals with the data driven computation control paradigm, which is alternative to the mainstream control flow model of program execution control. In the second part of the paper we are introducing computer architecture that is proposed at the Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics, Technical University of Košice, according to the data driven computation control model with use of tile computing principles. In the final part of the paper,...

  4. DFI Computer Modeling Software (CMS)

    Energy Technology Data Exchange (ETDEWEB)

    Cazalet, E.G.; Deziel, L.B. Jr.; Haas, S.M.; Martin, T.W.; Nesbitt, D.M.; Phillips, R.L.

    1979-10-01

    The data base management system used to create, edit and store models data and solutions for the LEAP system is described. The software is entirely in FORTRAN-G for the IBM 370 series of computers and provides interface with a commercial data base system SYSTEM-2000.

  5. Computer Modelling of Channel Furnace

    Czech Academy of Sciences Publication Activity Database

    Musil, Ladislav; Matička, O.

    Poznan: Politechnika Poznanska, 2003 - (Nawrowski, R.; Warchlewska, D.), s. 391-394 ISBN 83-912306-4-3. [Konferencja Naukowo - Techniczna /8./. Poznan/Kiekrz (PL), 07.05.2003-09.05.2003] R&D Projects: GA ČR GA102/03/0047 Keywords : electromagnetic field * computer modelling Subject RIV: JA - Electronics ; Optoelectronics, Electrical Engineering

  6. A computational model of affects

    CERN Document Server

    Turkia, Mika

    2008-01-01

    This article provides a simple logical structure, in which affective concepts (i.e. concepts related to emotions and feelings) can be defined. The set of affects defined is similar to the set of emotions covered in the OCC model (Ortony A., Collins A., and Clore G. L.: The Cognitive Structure of Emotions. Cambridge University Press, 1988), but the model presented in this article is fully computationally defined.

  7. Getting computer models to communicate

    International Nuclear Information System (INIS)

    Today's computers have the processing power to deliver detailed and global simulations of complex industrial processes such as the operation of a nuclear reactor core. So should we be producing new, global numerical models to take full advantage of this new-found power? If so, it would be a long-term job. There is, however, another solution; to couple the existing validated numerical models together so that they work as one. (authors)

  8. The role of parents and related factors on adolescent computer use

    OpenAIRE

    Epstein, Jennifer A.

    2012-01-01

    Background. Research suggested the importance of parents on their adolescents’ computer activity. Spending too much time on the computer for recreational purposes in particular has been found to be related to areas of public health concern in children/adolescents, including obesity and substance use. Design and Methods. The goal of the research was to determine the association between recreational computer use and potentially linked factors (parental monitoring, social influences to use com...

  9. Use of television, videogames, and computer among children and adolescents in Italy

    OpenAIRE

    Marinelli Paolo; Albano Luciana; Di Giuseppe Gabriella; Patriarca Alessandro; Angelillo Italo F

    2009-01-01

    Abstract Background This survey determined the practices about television (video inclusive), videogames, and computer use in children and adolescents in Italy. Methods A self-administered anonymous questionnaire covered socio-demographics; behaviour about television, videogames, computer, and sports; parental control over television, videogames, and computer. Results Overall, 54.1% and 61% always ate lunch or dinner in front of the television, 89.5% had a television in the bedroom while 52.5%...

  10. Hydronic distribution system computer model

    Energy Technology Data Exchange (ETDEWEB)

    Andrews, J.W.; Strasser, J.J.

    1994-10-01

    A computer model of a hot-water boiler and its associated hydronic thermal distribution loop has been developed at Brookhaven National Laboratory (BNL). It is intended to be incorporated as a submodel in a comprehensive model of residential-scale thermal distribution systems developed at Lawrence Berkeley. This will give the combined model the capability of modeling forced-air and hydronic distribution systems in the same house using the same supporting software. This report describes the development of the BNL hydronics model, initial results and internal consistency checks, and its intended relationship to the LBL model. A method of interacting with the LBL model that does not require physical integration of the two codes is described. This will provide capability now, with reduced up-front cost, as long as the number of runs required is not large.

  11. Association between playing computer games and mental and social health among male adolescents in Iran in 2014

    OpenAIRE

    Mohammadi, Mehrnoosh; RezaeiDehaghani, Abdollah; Mehrabi, Tayebeh; RezaeiDehaghani, Ali

    2016-01-01

    Background: As adolescents spend much time on playing computer games, their mental and social effects should be considered. The present study aimed to investigate the association between playing computer games and the mental and social health among male adolescents in Iran in 2014. Materials and Methods: This is a cross-sectional study conducted on 210 adolescents selected by multi-stage random sampling. Data were collected by Goldberg and Hillier general health (28 items) and Kiez social hea...

  12. Intervention Strategies with Adolescents: The Newton Model.

    Science.gov (United States)

    Green, Matt

    The problem of adolescent drug/alcohol abuse seems to have once again intensified during the 1980s. When the school is the only constant in an adolescent's life and when those same teenagers bring drugs and alcohol-related problems to school, the school has an obligation to implement change. The first step is identification of the problem. Beyond…

  13. Parallel computing in enterprise modeling.

    Energy Technology Data Exchange (ETDEWEB)

    Goldsby, Michael E.; Armstrong, Robert C.; Shneider, Max S.; Vanderveen, Keith; Ray, Jaideep; Heath, Zach; Allan, Benjamin A.

    2008-08-01

    This report presents the results of our efforts to apply high-performance computing to entity-based simulations with a multi-use plugin for parallel computing. We use the term 'Entity-based simulation' to describe a class of simulation which includes both discrete event simulation and agent based simulation. What simulations of this class share, and what differs from more traditional models, is that the result sought is emergent from a large number of contributing entities. Logistic, economic and social simulations are members of this class where things or people are organized or self-organize to produce a solution. Entity-based problems never have an a priori ergodic principle that will greatly simplify calculations. Because the results of entity-based simulations can only be realized at scale, scalable computing is de rigueur for large problems. Having said that, the absence of a spatial organizing principal makes the decomposition of the problem onto processors problematic. In addition, practitioners in this domain commonly use the Java programming language which presents its own problems in a high-performance setting. The plugin we have developed, called the Parallel Particle Data Model, overcomes both of these obstacles and is now being used by two Sandia frameworks: the Decision Analysis Center, and the Seldon social simulation facility. While the ability to engage U.S.-sized problems is now available to the Decision Analysis Center, this plugin is central to the success of Seldon. Because Seldon relies on computationally intensive cognitive sub-models, this work is necessary to achieve the scale necessary for realistic results. With the recent upheavals in the financial markets, and the inscrutability of terrorist activity, this simulation domain will likely need a capability with ever greater fidelity. High-performance computing will play an important part in enabling that greater fidelity.

  14. Cosmic logic: a computational model

    Science.gov (United States)

    Vanchurin, Vitaly

    2016-02-01

    We initiate a formal study of logical inferences in context of the measure problem in cosmology or what we call cosmic logic. We describe a simple computational model of cosmic logic suitable for analysis of, for example, discretized cosmological systems. The construction is based on a particular model of computation, developed by Alan Turing, with cosmic observers (CO), cosmic measures (CM) and cosmic symmetries (CS) described by Turing machines. CO machines always start with a blank tape and CM machines take CO's Turing number (also known as description number or Gödel number) as input and output the corresponding probability. Similarly, CS machines take CO's Turing number as input, but output either one if the CO machines are in the same equivalence class or zero otherwise. We argue that CS machines are more fundamental than CM machines and, thus, should be used as building blocks in constructing CM machines. We prove the non-computability of a CS machine which discriminates between two classes of CO machines: mortal that halts in finite time and immortal that runs forever. In context of eternal inflation this result implies that it is impossible to construct CM machines to compute probabilities on the set of all CO machines using cut-off prescriptions. The cut-off measures can still be used if the set is reduced to include only machines which halt after a finite and predetermined number of steps.

  15. Minimal models of multidimensional computations.

    Directory of Open Access Journals (Sweden)

    Jeffrey D Fitzgerald

    2011-03-01

    Full Text Available The multidimensional computations performed by many biological systems are often characterized with limited information about the correlations between inputs and outputs. Given this limitation, our approach is to construct the maximum noise entropy response function of the system, leading to a closed-form and minimally biased model consistent with a given set of constraints on the input/output moments; the result is equivalent to conditional random field models from machine learning. For systems with binary outputs, such as neurons encoding sensory stimuli, the maximum noise entropy models are logistic functions whose arguments depend on the constraints. A constraint on the average output turns the binary maximum noise entropy models into minimum mutual information models, allowing for the calculation of the information content of the constraints and an information theoretic characterization of the system's computations. We use this approach to analyze the nonlinear input/output functions in macaque retina and thalamus; although these systems have been previously shown to be responsive to two input dimensions, the functional form of the response function in this reduced space had not been unambiguously identified. A second order model based on the logistic function is found to be both necessary and sufficient to accurately describe the neural responses to naturalistic stimuli, accounting for an average of 93% of the mutual information with a small number of parameters. Thus, despite the fact that the stimulus is highly non-Gaussian, the vast majority of the information in the neural responses is related to first and second order correlations. Our results suggest a principled and unbiased way to model multidimensional computations and determine the statistics of the inputs that are being encoded in the outputs.

  16. Skin friction blistering: computer model.

    OpenAIRE

    Xing, Malcolm; Pan, Ning; Zhong, Wen; Maibach, Howard

    2007-01-01

    BACKGROUND/PURPOSE: Friction blisters, a common injury in sports and military operations, can adversely effect or even halt performance. Given its frequency and hazardous nature, recent research efforts appear limited. Blistering can be treated as a delamination phenomenon; similar issues in materials science have been extensively investigated in theory and experiment. An obstacle in studying blistering is the difficulty of conducting experiment on humans and animals. Computer modeling thus b...

  17. A Cloud Computing Collaborative Architecture Model

    OpenAIRE

    Ali Bagherinia; Sohrab Hojjatkhah; Ali Jouharpoor; Akbar Bemana

    2012-01-01

    This research work present a model to execute long computational and other service in cloud computing that couldnt be executing in single computer system alone. While in all other existing cloud computing model users must pay cost for using cloud services this model is based on collaborative between each using system with other systems that they need to other services.

  18. Effects of Violent and Non-Violent Computer Game Content on Memory Performance in Adolescents

    Science.gov (United States)

    Maass, Asja; Kollhorster, Kirsten; Riediger, Annemarie; MacDonald, Vanessa; Lohaus, Arnold

    2011-01-01

    The present study focuses on the short-term effects of electronic entertainment media on memory and learning processes. It compares the effects of violent versus non-violent computer game content in a condition of playing and in another condition of watching the same game. The participants consisted of 83 female and 94 male adolescents with a mean…

  19. Playing Violent Video and Computer Games and Adolescent Self-Concept.

    Science.gov (United States)

    Funk, Jeanne B.; Buchman, Debra D.

    1996-01-01

    Documents current adolescent electronic game-playing habits, exploring associations among preference for violent games, frequency and location of play, and self-concept. Identifies marked gender differences in game-playing habits and in scores on a self-perception profile. Finds that for girls, more time playing video or computer games is…

  20. Cosmic Logic: a Computational Model

    CERN Document Server

    Vanchurin, Vitaly

    2015-01-01

    We describe a simple computational model of cosmic logic suitable for analysis of, for example, discretized cosmological systems. The construction is based on a particular model of computation, developed by Alan Turing, with cosmic observers (CO), cosmic measures (CM) and cosmic symmetries (CS) described by Turing machines. CO machines always start with a blank tape and CM machines take CO's Turing number (also known as description number or G{\\" o}del number) as input and output the corresponding probability. Similarly, CS machines take CO's Turing number as input, but output either one if the CO machines are in the same equivalence class or zero otherwise. We argue that CS machines are more fundamental than CM machines and, thus, should be used as building blocks in constructing CM machines. We prove the non-computability of a CS machine which discriminates between two classes of CO machines: mortal that halts in finite time and immortal that runs forever. In context of eternal inflation this result implies...

  1. The relationship between computer games and quality of life in adolescents

    OpenAIRE

    Dolatabadi, Nayereh Kasiri; Eslami, Ahmad Ali; Mostafavi, Firooze; Hassanzade, Akbar; Moradi, Azam

    2013-01-01

    Background: Term of doing computer games among teenagers is growing rapidly. This popular phenomenon can cause physical and psychosocial issues in them. Therefore, this study examined the relationship between computer games and quality of life domains in adolescents aging 12-15 years. Materials and Methods: In a cross-sectional study using the 2-stage stratified cluster sampling method, 444 male and female students in Borkhar were selected. The data collection tool consisted of 1) World Healt...

  2. Computational Modeling in Tissue Engineering

    CERN Document Server

    2013-01-01

    One of the major challenges in tissue engineering is the translation of biological knowledge on complex cell and tissue behavior into a predictive and robust engineering process. Mastering this complexity is an essential step towards clinical applications of tissue engineering. This volume discusses computational modeling tools that allow studying the biological complexity in a more quantitative way. More specifically, computational tools can help in:  (i) quantifying and optimizing the tissue engineering product, e.g. by adapting scaffold design to optimize micro-environmental signals or by adapting selection criteria to improve homogeneity of the selected cell population; (ii) quantifying and optimizing the tissue engineering process, e.g. by adapting bioreactor design to improve quality and quantity of the final product; and (iii) assessing the influence of the in vivo environment on the behavior of the tissue engineering product, e.g. by investigating vascular ingrowth. The book presents examples of each...

  3. MODEL IDENTIFICATION AND COMPUTER ALGEBRA.

    Science.gov (United States)

    Bollen, Kenneth A; Bauldry, Shawn

    2010-10-01

    Multiequation models that contain observed or latent variables are common in the social sciences. To determine whether unique parameter values exist for such models, one needs to assess model identification. In practice analysts rely on empirical checks that evaluate the singularity of the information matrix evaluated at sample estimates of parameters. The discrepancy between estimates and population values, the limitations of numerical assessments of ranks, and the difference between local and global identification make this practice less than perfect. In this paper we outline how to use computer algebra systems (CAS) to determine the local and global identification of multiequation models with or without latent variables. We demonstrate a symbolic CAS approach to local identification and develop a CAS approach to obtain explicit algebraic solutions for each of the model parameters. We illustrate the procedures with several examples, including a new proof of the identification of a model for handling missing data using auxiliary variables. We present an identification procedure for Structural Equation Models that makes use of CAS and that is a useful complement to current methods. PMID:21769158

  4. Impacts of Mothers’ Occupation Status and Parenting Styles on Levels of Self-Control, Addiction to Computer Games, and Educational Progress of Adolescents

    OpenAIRE

    Abedini, Yasamin; Zamani, Bibi Eshrat; Kheradmand, Ali; Rajabizadeh, Ghodratollah

    2012-01-01

    Background Addiction to computer (video) games in adolescents and its relationship with educational progress has recently attracted the attention of rearing and education experts as well as organizations and institutes involved in physical and mental health. The current research attempted to propose a structural model of the relationships between parenting styles, mothers’ occupation status, and addiction to computer games, self-control, and educational progress of secondary school students. ...

  5. A Conceptual Model for Pervasive Computing

    OpenAIRE

    Ciarletta, Laurent; Dima, Alden

    2000-01-01

    As an emerging field, pervasive computing has not had the opportunity to develop a conceptual model similar to the OSI Reference Model used to describe computer networks. Such a model would be useful in properly classifying design issues and providing needed context. Inspired by the layers of abstraction provided by the OSI Reference Model, we present our Layered Pervasive Computing (LPC) model to facilitate discussion and analysis of pervasive computing systems by providing a much needed con...

  6. Business model elements impacting cloud computing adoption

    DEFF Research Database (Denmark)

    Bogataj, Kristina; Pucihar, Andreja; Sudzina, Frantisek

    The paper presents a proposed research framework for identification of business model elements impacting Cloud Computing Adoption. We provide a definition of main Cloud Computing characteristics, discuss previous findings on factors impacting Cloud Computing Adoption, and investigate technology...... adoption theories, such as Diffusion of Innovations, Technology Acceptance Model, Unified Theory of Acceptance and Use of Technology. Further on, at research model for identification of Cloud Computing Adoption factors from a business model perspective is presented. The following business model building...

  7. Modeling Computer Virus and Its Dynamics

    OpenAIRE

    Tao Dong; Xing He; Mei Peng; Junjian Huang

    2013-01-01

    Based on that the computer will be infected by infected computer and exposed computer, and some of the computers which are in suscepitible status and exposed status can get immunity by antivirus ability, a novel coumputer virus model is established. The dynamic behaviors of this model are investigated. First, the basic reproduction number R0, which is a threshold of the computer virus spreading in internet, is determined. Second, this model has a virus-free equilibrium P0, which means that th...

  8. Possibilities of Economic Regulations Modelling Using Computers

    Directory of Open Access Journals (Sweden)

    Algirdas Jakutis

    2011-04-01

    Full Text Available This article presents possibilities of using computers for economic regulations modelling. The introduction gives a computer history and shows possibilities to use computers in many different ways. Research on the combination of economic regulations is carried out. Human and computer functions using economic regulations are presented. Research shows modelling possibilities of economic regulations with computer, text editors, text editing options. The article also presents economic regulations modelling algorithms and programs.

  9. International Conference on Computational Intelligence, Cyber Security, and Computational Models

    CERN Document Server

    Ramasamy, Vijayalakshmi; Sheen, Shina; Veeramani, C; Bonato, Anthony; Batten, Lynn

    2016-01-01

    This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17 – 19, 2015. This book enriches with innovations in broad areas of research like computational modeling, computational intelligence and cyber security. These emerging inter disciplinary research areas have helped to solve multifaceted problems and gained lot of attention in recent years. This encompasses theory and applications, to provide design, analysis and modeling of the aforementioned key areas.

  10. Social contagion and adolescent sexual behavior: a developmental EMOSA model.

    Science.gov (United States)

    Rodgers, J L; Rowe, D C

    1993-07-01

    Epidemic Models of the Onset of Social Activities (EMOSA models) describe the spread of adolescent transition behaviors (e.g., sexuality, smoking, and drinking) through an interacting adolescent network. A theory of social contagion is defined to explain how social influence affects sexual development. Contacts within a network can, with some transition rate or probability, result in an increase in level of sexual experience. Five stages of sexual development are posited. One submodel proposes a systematic progression through these stages; a competing submodel treats each as an independent process. These models are represented in sets of dynamically interacting recursive equations, which are fit to empirical prevalence data to estimate parameters. Model adjustments are substantively interpretable and can be used to test for and better understand social interaction processes that affect adolescent sexual behavior. PMID:8356187

  11. Towards the Epidemiological Modeling of Computer Viruses

    OpenAIRE

    Xiaofan Yang; Lu-Xing Yang

    2012-01-01

    Epidemic dynamics of computer viruses is an emerging discipline aiming to understand the way that computer viruses spread on networks. This paper is intended to establish a series of rational epidemic models of computer viruses. First, a close inspection of some common characteristics shared by all typical computer viruses clearly reveals the flaws of previous models. Then, a generic epidemic model of viruses, which is named as the SLBS model, is proposed. Finally, diverse generalizations of ...

  12. A twin study of computer anxiety in Turkish adolescents.

    Science.gov (United States)

    Deryakulu, Deniz; Calışkan, Erkan

    2012-04-01

    The present study investigated computer anxiety within a sample of Turkish twins aged 10-18. A total of 185 twin-pairs participated in the study. Of the twins, 64 pairs (34.6 percent) were monozygotic (MZ) and 121 pairs (65.4 percent) were dizygotic (DZ). Of the 121 DZ twins, 54 pairs (44.63 percent) were same-sex twins and 67 pairs (55.37 percent) were opposite-sex twins. Computer anxiety was assessed using Computer Anxiety Rating Scale-Turkish Version (CARS-TV), one of the three main scales of "Measuring Technophobia Instruments" developed by Rosen and Weil. The results of paired t test comparisons showed no significant differences in MZ and same-sex DZ twin-pairs' levels of computer anxiety. On the other hand, a significant difference was found in opposite-sex DZ twin-pairs' level of computer anxiety. Interesting enough, males appeared to be more computer anxious than their female co-twins. In the present study, using Falconer's formula, heritability estimate for computer anxiety was derived from correlations based on MZ and DZ twins' mean scores on CARS-TV. The results showed that 57 percent of the variance in computer anxiety was from genetics and 41.5 percent was from nonshared environmental factors. Shared environmental influence, on the other hand, was very small and negligible. Interpretations of results and potential directions for future research are presented. PMID:22394420

  13. The role of parents and related factors on adolescent computer use

    Directory of Open Access Journals (Sweden)

    Jennifer A. Epstein

    2012-02-01

    Full Text Available Background. Research suggested the importance of parents on their adolescents’ computer activity. Spending too much time on the computer for recreational purposes in particular has been found to be related to areas of public health concern in children/adolescents, including obesity and substance use. Design and Methods. The goal of the research was to determine the association between recreational computer use and potentially linked factors (parental monitoring, social influences to use computers including parents, age of first computer use, self-control, and particular internet activities. Participants (aged 13-17 years and residing in the United States were recruited via the Internet to complete an anonymous survey online using a survey tool. The target sample of 200 participants who completed the survey was achieved. The sample’s average age was 16 and was 63% girls. Results. A set of regressions with recreational computer use as dependent variables were run. Conclusions. Less parental monitoring, younger age at first computer use, listening or downloading music from the internet more frequently, using the internet for educational purposes less frequently, and parent’s use of the computer for pleasure was related to spending a greater percentage of time on non-school computer use. These findings suggest the importance of parental monitoring and parental computer use on their children’s own computer use, and the influence of some internet activities on adolescent computer use. Finally, programs aimed at parents to help them increase the age when their children start using computers and learn how to place limits on recreational computer use are needed.

  14. Ranked retrieval of Computational Biology models

    OpenAIRE

    Henkel Ron; Endler Lukas; Peters Andre; Le Novère Nicolas; Waltemath Dagmar

    2010-01-01

    Abstract Background The study of biological systems demands computational support. If targeting a biological problem, the reuse of existing computational models can save time and effort. Deciding for potentially suitable models, however, becomes more challenging with the increasing number of computational models available, and even more when considering the models' growing complexity. Firstly, among a set of potential model candidates it is difficult to decide for the model that best suits on...

  15. Computeen: A Randomized Trial of a Preventive Computer and Psychosocial Skills Curriculum for At-Risk Adolescents

    Science.gov (United States)

    Lang, Jason M.; Waterman, Jill; Baker, Bruce L.

    2009-01-01

    Computeen, a preventive technology and psychosocial skills development program for at-risk adolescents, was designed to improve computer skills, self-esteem, and school attitudes, and reduce behavior problems, by combining elements of community-based and empirically supported prevention programs. Fifty-five mostly Latino adolescents from 12 to 16…

  16. Prevalence of headache in adolescents and association with use of computer and videogames.

    Science.gov (United States)

    Xavier, Michelle Katherine Andrade; Pitangui, Ana Carolina Rodarti; Silva, Georgia Rodrigues Reis; Oliveira, Valéria Mayaly Alves de; Beltrão, Natália Barros; Araújo, Rodrigo Cappato de

    2015-11-01

    The aim of this study was to determine the prevalence of headache in adolescents and its association with excessive use of electronic devices and games. The sample comprised 954 adolescents of both sexes (14 to 19 years) who answered a questionnaire about use of computers and electronic games, presence of headache and physical activity. The binary and multinomial logistic regression, with significance level of 5% was used for inferential analysis. The prevalence of headache was 80.6%. The excessive use of electronics devices proved to be a risk factor (OR = 1.21) for headache. Subjects aged between 14 and 16 years were less likely to report headache (OR = 0.64). Regarding classification, 17.9% of adolescents had tension-type headache, 19.3% had migraine and 43.4% other types of headache. The adolescents aged form 14 to 16 years had lower chance (OR ≤ 0.68) to report the tension-type headache and other types of headache. The excessive use of digital equipment, electronic games and attending the third year of high school proved to be risk factors for migraine-type development (OR ≥ 1.84). There was a high prevalence of headache in adolescents and high-time use of electronic devices. We observed an association between excessive use of electronic devices and the presence of headache, and this habit is considered a risk factor, especially for the development of migraine-type. PMID:26602725

  17. A Computationally Efficient Bedrock Model

    Science.gov (United States)

    Fastook, J. L.

    2002-05-01

    Full treatments of the Earth's crust, mantle, and core for ice sheet modeling are often computationally overwhelming, in that the requirements to calculate a full self-gravitating spherical Earth model for the time-varying load history of an ice sheet are considerably greater than the computational requirements for the ice dynamics and thermodynamics combined. For this reason, we adopt a ``reasonable'' approximation for the behavior of the deforming bedrock beneath the ice sheet. This simpler model of the Earth treats the crust as an elastic plate supported from below by a hydrostatic fluid. Conservation of linear and angular momentum for an elastic plate leads to the classical Poisson-Kirchhoff fourth order differential equation in the crustal displacement. By adding a time-dependent term this treatment allows for an exponentially-decaying response of the bed to loading and unloading events. This component of the ice sheet model (along with the ice dynamics and thermodynamics) is solved using the Finite Element Method (FEM). C1 FEMs are difficult to implement in more than one dimension, and as such the engineering community has turned away from classical Poisson-Kirchhoff plate theory to treatments such as Reissner-Mindlin plate theory, which are able to accommodate transverse shear and hence require only C0 continuity of basis functions (only the function, and not the derivative, is required to be continuous at the element boundary) (Hughes 1987). This method reduces the complexity of the C1 formulation by adding additional degrees of freedom (the transverse shear in x and y) at each node. This ``reasonable'' solution is compared with two self-gravitating spherical Earth models (1. Ivins et al. (1997) and James and Ivins (1998) } and 2. Tushingham and Peltier 1991 ICE3G run by Jim Davis and Glenn Milne), as well as with preliminary results of residual rebound rates measured with GPS by the BIFROST project. Modeled responses of a simulated ice sheet experiencing a

  18. Computer model of running crown forest fire

    OpenAIRE

    Barovik, D. V.; Taranchuk, V. B.

    2010-01-01

    Adapted mathematical model of running crown forest fire propagation is considered. The results of computer modelling and the peculiarities of forest fire behavior in heterogeneous forests are discussed.

  19. Adolescent computer use and alcohol use: what are the role of quantity and content of computer use?

    Science.gov (United States)

    Epstein, Jennifer A

    2011-05-01

    The purpose of this study was to examine the relationship between computer use and alcohol use among adolescents. In particular, the goal of the research was to determine the role of lifetime drinking and past month drinking on quantity as measured by amount of time on the computer (for school work and excluding school work) and on content as measured by the frequency of a variety of activities on the internet (e.g., e-mail, searching for information, social networking, listen to/download music). Participants (aged 13-17 years and residing in the United States) were recruited via the internet to complete an anonymous survey online using a popular survey tool (N=270). Their average age was 16 and the sample was predominantly female (63% girls). A series of analyses was conducted with the computer use measures as dependent variables (hours on the computer per week for school work and excluding school work; various internet activities including e-mail, searching for information, social networking, listen to/download music) controlling for gender, age, academic performance and age of first computer use. Based on the results, past month drinkers used the computer more hours per week excluding school work than those who did not. As expected, there were no differences in hours based on alcohol use for computer use for school work. Drinking also had relationships with more frequent social networking and listening to/downloading music. These findings suggest that both quantity and content of computer use were related to adolescent drinking. PMID:21295917

  20. Computational modeling of radionuclide resuspension

    International Nuclear Information System (INIS)

    Freshly fallen radionuclide materials after an energetic release from a Radiological Dispersal Device (RDD) or by a nuclear accident similar to Chernobyl can be re-suspended back into air by wind or human activities. Re-suspended microscopic radionuclides can be a threat to humans who are in the immediate vicinity of the fallout. Wind tunnel experiments were conducted at the Wehrwissenschaftliches Institut fuer Schutztechnologien (WIS) facility in Germany and Computational Fluid Dynamics (CFD) analysis using FLUENT software was conducted at the University of Ontario Institute of Technology (UOIT) in Canada to determine the re-suspension factors of radioactive lanthanum oxide (140La2O3) powder which was used as a surrogate for RDD fallout. Both experimental and computational results show a linear increase in re-suspension factor from 0.25 μm to 1 μm particle sizes and exponentially decrease in re-suspension factor from 1 μm to 6 μm particle sizes. Results found using FLUENT software over-predicted the re-suspension factors for particle sizes between 1 μm and 3 μm. The over-prediction was attributed to surface roughness effects, and suggests the need to include natural surface profile with microscopic surface roughness elements into full CFD model to simulate physical behavior of the particles trapped in between roughness elements. (authors)

  1. A Computational Model of Music Composition

    OpenAIRE

    Oberholtzer, Josiah W.

    2015-01-01

    This thesis documents my research into formalized score control, in order to demonstrate a computational model of music composition. When working computationally, models provide an explicit formal description of what objects exist within a given domain, how they behave, and what transformations they afford. The clearer the model becomes, the easier it is to extend and to construct increasingly higher-order abstractions around that model. In other words, a clear computational model of music no...

  2. Adolescents Family Models : A Cross-Cultural Study

    OpenAIRE

    Mayer, Boris

    2009-01-01

    This study explores and compares the family models of adolescents across ten cultures using a typological and multilevel approach. Thereby, it aims to empirically contribute to Kagitcibasi s (2007) theory of family change. This theory postulates the existence of three ideal-typical family models across cultures: a family model of independence prevailing in Western societies, a family model of (total) interdependence prevailing in non-industrialized agrarian cultures, and as a synthesis of the...

  3. Cupola Furnace Computer Process Model

    Energy Technology Data Exchange (ETDEWEB)

    Seymour Katz

    2004-12-31

    The cupola furnace generates more than 50% of the liquid iron used to produce the 9+ million tons of castings annually. The cupola converts iron and steel into cast iron. The main advantages of the cupola furnace are lower energy costs than those of competing furnaces (electric) and the ability to melt less expensive metallic scrap than the competing furnaces. However the chemical and physical processes that take place in the cupola furnace are highly complex making it difficult to operate the furnace in optimal fashion. The results are low energy efficiency and poor recovery of important and expensive alloy elements due to oxidation. Between 1990 and 2004 under the auspices of the Department of Energy, the American Foundry Society and General Motors Corp. a computer simulation of the cupola furnace was developed that accurately describes the complex behavior of the furnace. When provided with the furnace input conditions the model provides accurate values of the output conditions in a matter of seconds. It also provides key diagnostics. Using clues from the diagnostics a trained specialist can infer changes in the operation that will move the system toward higher efficiency. Repeating the process in an iterative fashion leads to near optimum operating conditions with just a few iterations. More advanced uses of the program have been examined. The program is currently being combined with an ''Expert System'' to permit optimization in real time. The program has been combined with ''neural network'' programs to affect very easy scanning of a wide range of furnace operation. Rudimentary efforts were successfully made to operate the furnace using a computer. References to these more advanced systems will be found in the ''Cupola Handbook''. Chapter 27, American Foundry Society, Des Plaines, IL (1999).

  4. Linguistics Computation, Automatic Model Generation, and Intensions

    OpenAIRE

    Nourani, Cyrus F.

    1994-01-01

    Techniques are presented for defining models of computational linguistics theories. The methods of generalized diagrams that were developed by this author for modeling artificial intelligence planning and reasoning are shown to be applicable to models of computation of linguistics theories. It is shown that for extensional and intensional interpretations, models can be generated automatically which assign meaning to computations of linguistics theories for natural languages. Keywords: Computa...

  5. Computational biomechanics for medicine imaging, modeling and computing

    CERN Document Server

    Doyle, Barry; Wittek, Adam; Nielsen, Poul; Miller, Karol

    2016-01-01

    The Computational Biomechanics for Medicine titles provide an opportunity for specialists in computational biomechanics to present their latest methodologies and advancements. This volume comprises eighteen of the newest approaches and applications of computational biomechanics, from researchers in Australia, New Zealand, USA, UK, Switzerland, Scotland, France and Russia. Some of the interesting topics discussed are: tailored computational models; traumatic brain injury; soft-tissue mechanics; medical image analysis; and clinically-relevant simulations. One of the greatest challenges facing the computational engineering community is to extend the success of computational mechanics to fields outside traditional engineering, in particular to biology, the biomedical sciences, and medicine. We hope the research presented within this book series will contribute to overcoming this grand challenge.

  6. Violence in Young Adolescents' Relationships: A Path Model

    Science.gov (United States)

    Josephson, Wendy L.; Proulx, Jocelyn B.

    2008-01-01

    A structural equation model based on social cognitive theory was used to predict relationship violence from young adolescents' knowledge, self-efficacy, attitudes, and alternative conflict strategies (n = 143 male and 147 female grade 7-9 students). A direct causal effect was supported for violence-tolerant attitudes and psychologically aggressive…

  7. Adolescent Personality: A Five-Factor Model Construct Validation

    Science.gov (United States)

    Baker, Spencer T.; Victor, James B.; Chambers, Anthony L.; Halverson, Jr., Charles F.

    2004-01-01

    The purpose of this study was to investigate convergent and discriminant validity of the five-factor model of adolescent personality in a school setting using three different raters (methods): self-ratings, peer ratings, and teacher ratings. The authors investigated validity through a multitrait-multimethod matrix and a confirmatory factor…

  8. Developmental Trajectories of Adolescent Popularity: A Growth Curve Modelling Analysis

    Science.gov (United States)

    Cillessen, Antonius H. N.; Borch, Casey

    2006-01-01

    Growth curve modelling was used to examine developmental trajectories of sociometric and perceived popularity across eight years in adolescence, and the effects of gender, overt aggression, and relational aggression on these trajectories. Participants were 303 initially popular students (167 girls, 136 boys) for whom sociometric data were…

  9. Regional brain activation associated with addiction of computer games in adolescents

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Y. H.; Shin, O. J.; Ko, Y. W.; Kim, H. J.; Yun, M. J.; Lee, J. D. [College of Medicine, Yonsei Univ., Seoul (Korea, Republic of)

    2001-07-01

    Excessive computer game (CG) playing may cause not only behavioral addiction, but also potential negative effects on developing brain. It is necessary to reveal how brain is affected by excessive use of CG playing and behavioral addiction of it. By using PET, we address the issue seeking to identifying patterns of regional brain activation associated with behavioral addiction and excessive use of CG playing by adolescents. 6 normal control and 8 adolescents who were met by the criteria of behavioral addiction on the survey as addiction groups with an addiction of CG playing were participated. Initial screening survey which is the adapted version of DSM-IV for pathologic gambling was done. PET were performed twice in each participants both during resting state and after 20 min playing of CG. Psychological test including Youth Self Report (YSR), memory and attention test and vocabulary item from KWAIS were performed. Scores of the vocabulary item from KWAIS and social competence from YSR were significantly lower in the addiction group. On PET, addiction group showed higher resting metabolism on inferior frontal, premotor, prefrontal and superior temporal area. Adolescents with addiction of CG revealed different patterns of regional brain activation comparing to control groups. These suggest behavioral addiction and excessive use of CG may result in functional alteration of developing brain in adolescents.

  10. Regional brain activation associated with addiction of computer games in adolescents

    International Nuclear Information System (INIS)

    Excessive computer game (CG) playing may cause not only behavioral addiction, but also potential negative effects on developing brain. It is necessary to reveal how brain is affected by excessive use of CG playing and behavioral addiction of it. By using PET, we address the issue seeking to identifying patterns of regional brain activation associated with behavioral addiction and excessive use of CG playing by adolescents. 6 normal control and 8 adolescents who were met by the criteria of behavioral addiction on the survey as addiction groups with an addiction of CG playing were participated. Initial screening survey which is the adapted version of DSM-IV for pathologic gambling was done. PET were performed twice in each participants both during resting state and after 20 min playing of CG. Psychological test including Youth Self Report (YSR), memory and attention test and vocabulary item from KWAIS were performed. Scores of the vocabulary item from KWAIS and social competence from YSR were significantly lower in the addiction group. On PET, addiction group showed higher resting metabolism on inferior frontal, premotor, prefrontal and superior temporal area. Adolescents with addiction of CG revealed different patterns of regional brain activation comparing to control groups. These suggest behavioral addiction and excessive use of CG may result in functional alteration of developing brain in adolescents

  11. Suicidal ideation in adolescents: an explanatory model using LISREL.

    Science.gov (United States)

    Park, Young-Joo; Ryu, Hosihn; Han, Kuemsun; Kwon, Jung Hye; Kim, Han Kyeom; Kang, Hyun Cheol; Yoon, Ji-Won; Cheon, Suk-Hee; Shin, Hyunjeong

    2010-03-01

    Suicidal ideation has been reported to be a major factor in attempted and completed suicides. The purpose of this study is to test a structural model to explain adolescent suicidal ideation. Specifically tested is the relationship between the predictor variables of trait anger, anger suppression, entrapment, psychosomatic symptoms, depression, and resilience and the dependent variable of suicidal ideation. Data are collected from a convenience sample of 11,393 students from 36 middle schools and 23 high schools in Korea. Trait anger, entrapment, psychosomatic symptoms, depression, and resilience have a direct effect on suicidal ideation whereas anger suppression shows a significant indirect effect on adolescent suicidal ideation. The predictor variables account for 39% of the variance in suicidal ideation. The study findings suggest that future programs for prevention or alleviation of adolescents' suicidal ideation need to use interventions that facilitate their resilience and reduce their anger, entrapment feeling, psychosomatic symptoms, and depression. PMID:20040734

  12. The Fermilab Central Computing Facility architectural model

    International Nuclear Information System (INIS)

    The goal of the current Central Computing Upgrade at Fermilab is to create a computing environment that maximizes total productivity, particularly for high energy physics analysis. The Computing Department and the Next Computer Acquisition Committee decided upon a model which includes five components: an interactive front end, a Large-Scale Scientific Computer (LSSC, a mainframe computing engine), a microprocessor farm system, a file server, and workstations. With the exception of the file server, all segments of this model are currently in production: a VAX/VMS Cluster interactive front end, an Amdahl VM computing engine, ACP farms, and (primarily) VMS workstations. This presentation will discuss the implementation of the Fermilab Central Computing Facility Architectural Model. Implications for Code Management in such a heterogeneous environment, including issues such as modularity and centrality, will be considered. Special emphasis will be placed on connectivity and communications between the front-end, LSSC, and workstations, as practiced at Fermilab. 2 figs

  13. Financial aspects of cloud computing business models

    OpenAIRE

    Jäätmaa, Jaakko

    2010-01-01

    The purpose of the study was to explore financial aspects of cloud computing business models from information technology (IT) services provider’s perspective. The financial aspects were divided into revenue model and related pricing mechanisms and cost structure and related cost accounting mechanisms according to business model ontology. Cloud computing is a new computing paradigm and the latest megatrend in IT industry developed as a result of the convergence of numerous new and existing...

  14. [Conceptual model of teasing and bullying in adolescents].

    Science.gov (United States)

    Lien, Angela Shin-Yu; Dai, Yu-Tzu; Lee, Ya-Ling

    2013-08-01

    Teasing and bullying incident levels have increased markedly in recent years according to international news reports. School and community-level action to stop and prevent bullying is a key focus of government education policy worldwide. Teasing is a usual facet of social interaction among youth and is related to bullying behavior. Although teasing and bullying are significant concerns, references for relevant concept analysis are lacking in the nursing field. To facilitate early screening to identify high-risk bullies and help victims effectively stop bullying events, concept analysis is needed to clarify and distinguish between the two concepts of teasing and bullying. The aim of this study is to integrate relevant published literature to determine the reasons for and relationships between teasing and bullying. We chose obesity as an example to construct a teasing and bullying conceptual model for adolescents and used this model to explore the related factors and health impacts of obesity. We found that both teaser intent and recipient perceptions correlated with bullying behavior. Duration and severity may induce teasing to become bullying. Because weight-based teasing is common among adolescents, we chose obesity as an example issue to demonstrate our adolescents teasing and bullying concept model. We then integrated the antecedent and consequential factors of teasing and bullying for obese adolescents. Weight-control strategies can stop school bullying if early interventions are performed in high-risk populations. PMID:23922094

  15. Computational Models for Nonlinear Aeroelastic Systems Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Clear Science Corp. and Duke University propose to develop and demonstrate new and efficient computational methods of modeling nonlinear aeroelastic systems. The...

  16. Computational nanophotonics modeling and applications

    CERN Document Server

    Musa, Sarhan M

    2013-01-01

    This reference offers tools for engineers, scientists, biologists, and others working with the computational techniques of nanophotonics. It introduces the key concepts of computational methods in a manner that is easily digestible for newcomers to the field. The book also examines future applications of nanophotonics in the technical industry and covers new developments and interdisciplinary research in engineering, science, and medicine. It provides an overview of the key computational nanophotonics and describes the technologies with an emphasis on how they work and their key benefits.

  17. Computer Modeling of a Fusion Plasma

    Energy Technology Data Exchange (ETDEWEB)

    Cohen, B I

    2000-12-15

    Progress in the study of plasma physics and controlled fusion has been profoundly influenced by dramatic increases in computing capability. Computational plasma physics has become an equal partner with experiment and traditional theory. This presentation illustrates some of the progress in computer modeling of plasma physics and controlled fusion.

  18. A computational model for feature binding

    Institute of Scientific and Technical Information of China (English)

    SHI ZhiWei; SHI ZhongZhi; LIU Xi; SHI ZhiPing

    2008-01-01

    The "Binding Problem" is an important problem across many disciplines, including psychology, neuroscience, computational modeling, and even philosophy. In this work, we proposed a novel computational model, Bayesian Linking Field Model, for feature binding in visual perception, by combining the idea of noisy neuron model, Bayesian method, Linking Field Network and competitive mechanism.Simulation Experiments demonstrated that our model perfectly fulfilled the task of feature binding in visual perception and provided us some enlightening idea for future research.

  19. Computational cognitive models of summarization assessment skills

    OpenAIRE

    Lemaire, Benoît; Mandin, Sonia; Dessus, Philippe; Denhière, Guy

    2005-01-01

    This paper presents a general computational cognitive model of the way a summary is assessed by teachers. It is based on models of two subprocesses: determining the importance of sentences and guessing the cognitive rules that the student may have used. All models are based on Latent Semantic Analysis, a computational model of the representation of the meaning of words and sentences. Models' performances are compared with data from an experiment conducted with 278 middle school students. The ...

  20. A computational model for feature binding

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The "Binding Problem" is an important problem across many disciplines, including psychology, neuroscience, computational modeling, and even philosophy. In this work, we proposed a novel computational model, Bayesian Linking Field Model, for feature binding in visual perception, by combining the idea of noisy neuron model, Bayesian method, Linking Field Network and competitive mechanism. Simulation Experiments demonstrated that our model perfectly fulfilled the task of feature binding in visual perception and provided us some enlightening idea for future research.

  1. COLD-SAT Dynamic Model Computer Code

    Science.gov (United States)

    Bollenbacher, G.; Adams, N. S.

    1995-01-01

    COLD-SAT Dynamic Model (CSDM) computer code implements six-degree-of-freedom, rigid-body mathematical model for simulation of spacecraft in orbit around Earth. Investigates flow dynamics and thermodynamics of subcritical cryogenic fluids in microgravity. Consists of three parts: translation model, rotation model, and slosh model. Written in FORTRAN 77.

  2. Computer Aided Continuous Time Stochastic Process Modelling

    DEFF Research Database (Denmark)

    Kristensen, N.R.; Madsen, Henrik; Jørgensen, Sten Bay

    2001-01-01

    A grey-box approach to process modelling that combines deterministic and stochastic modelling is advocated for identification of models for model-based control of batch and semi-batch processes. A computer-aided tool designed for supporting decision-making within the corresponding modelling cycle...

  3. Computational Emotion Model for Virtual Characters

    OpenAIRE

    Liu, Zhen

    2008-01-01

    Emotion is related to stimulus and cognitive appraisal. Emotion is very important for modern computer game. Emotion model of virtual characters is a challenging branch of computer science. A believable character should be provided with emotion and perception. In general, a virtual character is regarded as an autonomous agent with sense, perception, emotion behavior and action. A computational emotion model of virtual characters is presented in this chapter. The method is to construct virtual ...

  4. Large Scale Computations in Air Pollution Modelling

    DEFF Research Database (Denmark)

    Zlatev, Z.; Brandt, J.; Builtjes, P. J. H.;

    Proceedings of the NATO Advanced Research Workshop on Large Scale Computations in Air Pollution Modelling, Sofia, Bulgaria, 6-10 July 1998......Proceedings of the NATO Advanced Research Workshop on Large Scale Computations in Air Pollution Modelling, Sofia, Bulgaria, 6-10 July 1998...

  5. The Self-Esteem, Perceived Social Support and Hopelessness in Adolescents: The Structural Equation Modeling

    Science.gov (United States)

    Savi Cakar, Firdevs; Karatas, Zeynep

    2012-01-01

    In this study, a developed model to explain a causal relationship between adolescent's self-esteem, perceived social support and hopelessness is tested. The purpose of the study is to explore the relationship between self-esteem, perceived social support and hopelessness in adolescents. A total of 257 adolescents, including 143 female and 114…

  6. Focus on Methodology: Beyond paper and pencil: Conducting computer-assisted data collection with adolescents in group settings.

    Science.gov (United States)

    Raffaelli, Marcela; Armstrong, Jessica; Tran, Steve P; Griffith, Aisha N; Walker, Kathrin; Gutierrez, Vanessa

    2016-06-01

    Computer-assisted data collection offers advantages over traditional paper and pencil measures; however, little guidance is available regarding the logistics of conducting computer-assisted data collection with adolescents in group settings. To address this gap, we draw on our experiences conducting a multi-site longitudinal study of adolescent development. Structured questionnaires programmed on laptop computers using Audio Computer Assisted Self-Interviewing (ACASI) were administered to groups of adolescents in community-based and afterschool programs. Although implementing ACASI required additional work before entering the field, we benefited from reduced data processing time, high data quality, and high levels of youth motivation. Preliminary findings from an ethnically diverse sample of 265 youth indicate favorable perceptions of using ACASI. Using our experiences as a case study, we provide recommendations on selecting an appropriate data collection device (including hardware and software), preparing and testing the ACASI, conducting data collection in the field, and managing data. PMID:26950018

  7. Model Railroading and Computer Fundamentals

    Science.gov (United States)

    McCormick, John W.

    2007-01-01

    Less than one half of one percent of all processors manufactured today end up in computers. The rest are embedded in other devices such as automobiles, airplanes, trains, satellites, and nearly every modern electronic device. Developing software for embedded systems requires a greater knowledge of hardware than developing for a typical desktop…

  8. The Generic Model of Computation

    OpenAIRE

    Nachum Dershowitz

    2012-01-01

    Over the past two decades, Yuri Gurevich and his colleagues have formulated axiomatic foundations for the notion of algorithm, be it classical, interactive, or parallel, and formalized them in the new generic framework of abstract state machines. This approach has recently been extended to suggest a formalization of the notion of effective computation over arbitrary countable domains. The central notions are summarized herein.

  9. Deformation of the Self-consciousness of Adolescents as a Consequence of Psychological Addiction to Computer Games

    OpenAIRE

    Inna V. Petrova; Galina I. Efremova; Elena V. BELOVOL; Angelina A. Shagurova

    2015-01-01

    This paper is devoted to the problem of psychological addiction to video games. Features of influence of video games on the self-consciousness of adolescents are indicated. Distinctions between dependent behavior and a condition of preoccupation with video games are specified. Results of work which was carried out in Russia are designated. The purpose of the study was to investigate the influence of computer games on the “self-image” teenagers. 233 adolescents aged 13-15 years acted in qualit...

  10. The promise and limits of computer modeling

    CERN Document Server

    Blilie, Charles

    2007-01-01

    Many books deal with the techniques of designing, building and testing computer models and simulations, but few have seriously examined what models are based on, their inherent limitations, and their essential role in extending human knowledge. This book fills this need.It focuses on computer models throughout, yet its exposition of the nature and limits of modeling is entirely general. A chapter on the development of celestial mechanics models illustrates how models progress and are essential to natural science. Chapters on models of global climate, population, economics and warfare, illustra

  11. Etiological model of disordered eating behaviors in Brazilian adolescent girls.

    Science.gov (United States)

    Fortes, Leonardo de Sousa; Filgueiras, Juliana Fernandes; Oliveira, Fernanda da Costa; Almeida, Sebastião Sousa; Ferreira, Maria Elisa Caputo

    2016-01-01

    The objective was to construct an etiological model of disordered eating behaviors in Brazilian adolescent girls. A total of 1,358 adolescent girls from four cities participated. The study used psychometric scales to assess disordered eating behaviors, body dissatisfaction, media pressure, self-esteem, mood, depressive symptoms, and perfectionism. Weight, height, and skinfolds were measured to calculate body mass index (BMI) and percent body fat (%F). Structural equation modeling explained 76% of variance in disordered eating behaviors (F(9, 1,351) = 74.50; p = 0.001). The findings indicate that body dissatisfaction mediated the relationship between media pressures, self-esteem, mood, BMI, %F, and disordered eating behaviors (F(9, 1,351) = 59.89; p = 0.001). Although depressive symptoms were not related to body dissatisfaction, the model indicated a direct relationship with disordered eating behaviors (F(2, 1,356) = 23.98; p = 0.001). In conclusion, only perfectionism failed to fit the etiological model of disordered eating behaviors in Brazilian adolescent girls. PMID:27167040

  12. Computational Modeling of Adult Neurogenesis.

    Science.gov (United States)

    Aimone, James B

    2016-01-01

    The restriction of adult neurogenesis to only a handful of regions of the brain is suggestive of some shared requirement for this dramatic form of structural plasticity. However, a common driver across neurogenic regions has not yet been identified. Computational studies have been invaluable in providing insight into the functional role of new neurons; however, researchers have typically focused on specific scales ranging from abstract neural networks to specific neural systems, most commonly the dentate gyrus area of the hippocampus. These studies have yielded a number of diverse potential functions for new neurons, ranging from an impact on pattern separation to the incorporation of time into episodic memories to enabling the forgetting of old information. This review will summarize these past computational efforts and discuss whether these proposed theoretical functions can be unified into a common rationale for why neurogenesis is required in these unique neural circuits. PMID:26933191

  13. Economic growth models: symbolic and numerical computations

    Directory of Open Access Journals (Sweden)

    P. B. Vasconcelos

    2013-11-01

    Full Text Available Growth economic models play a crucial role in understanding countries development, inter-country macroeconomic relationship and, ultimately, to anticipate the effects on endogenous variables due to political shocks on model parameters or exogenous variables. Yet, build a mathematical model can be a difficult and time consuming task. Symbolic computations can be of great help in the development process. Then, the ability to simulate, under initial assumptions, is, assuredly, a priceless tool for policy makers to take decisions and to adapt them along the time. Robust and efficient solvers are required to allow for reliable and fast answers. This paper deals with an integrated computational approach to economic growth models, based on the exceptional ability of MATLAB's numerical computing and exploring its symbolic computing capabilities. Illustration is made with the Ramsey-Cass-Koopmans model, one of the macroeconomic workhorse models.

  14. Computational Modeling of Cardiac Electromechanics

    OpenAIRE

    Krishnamoorthi, Shankarjee

    2013-01-01

    Cardiac arrhythmias are a leading cause of death worldwide. Notably, the electrophysiologiy and microstructural requirements for a fatal ventricular arrhythmia remain incompletely understood, thereby the treatment remains largely empirical. Standard antiarrhythmic drug therapy has failed to reduce, and in some instances has increased, the incidence of Sudden Cardiac Death (SCD). Hence, a more complete understanding of the mechanisms that foment a fatal arrhythmia is needed and computational m...

  15. Creation of 'Ukrytie' objects computer model

    International Nuclear Information System (INIS)

    A partial computer model of the 'Ukrytie' object was created with the use of geoinformation technologies. The computer model makes it possible to carry out information support of the works related to the 'Ukrytie' object stabilization and its conversion into ecologically safe system for analyzing, forecasting and controlling the processes occurring in the 'Ukrytie' object. Elements and structures of the 'Ukryttia' object were designed and input into the model

  16. Uncertainty in biology: a computational modeling approach

    OpenAIRE

    2015-01-01

    Computational modeling of biomedical processes is gaining more and more weight in the current research into the etiology of biomedical problems and potential treatment strategies. Computational modeling allows to reduce, refine and replace animal experimentation as well as to translate findings obtained in these experiments to the human background. However these biomedical problems are inherently complex with a myriad of influencing factors, which strongly complicates the model building...

  17. Uncertainty in biology a computational modeling approach

    CERN Document Server

    Gomez-Cabrero, David

    2016-01-01

    Computational modeling of biomedical processes is gaining more and more weight in the current research into the etiology of biomedical problems and potential treatment strategies.  Computational modeling allows to reduce, refine and replace animal experimentation as well as to translate findings obtained in these experiments to the human background. However these biomedical problems are inherently complex with a myriad of influencing factors, which strongly complicates the model building and validation process.  This book wants to address four main issues related to the building and validation of computational models of biomedical processes: Modeling establishment under uncertainty Model selection and parameter fitting Sensitivity analysis and model adaptation Model predictions under uncertainty In each of the abovementioned areas, the book discusses a number of key-techniques by means of a general theoretical description followed by one or more practical examples.  This book is intended for graduate stude...

  18. Sensor field: a computational model

    OpenAIRE

    Álvarez Faura, M. del Carme; Duch Brown, Amalia; Gabarró Vallès, Joaquim; Serna Iglesias, María José

    2009-01-01

    In this work we introduce a formal model for studying networks of tiny artifacts, the static synchronous sensor field model (SSSF). The model consider that these devices communicate among them by means of a communication graph. A sensor field interacts with the environment with input/output data streams. We start analyzing the behavior of networks in which at every step each sensor takes a new input data item and outputs (with some possible latency) an output data item. Accordingly we intr...

  19. MODEL IDENTIFICATION AND COMPUTER ALGEBRA

    OpenAIRE

    Bollen, Kenneth A.; Bauldry, Shawn

    2010-01-01

    Multiequation models that contain observed or latent variables are common in the social sciences. To determine whether unique parameter values exist for such models, one needs to assess model identification. In practice analysts rely on empirical checks that evaluate the singularity of the information matrix evaluated at sample estimates of parameters. The discrepancy between estimates and population values, the limitations of numerical assessments of ranks, and the difference between local a...

  20. Introducing Seismic Tomography with Computational Modeling

    Science.gov (United States)

    Neves, R.; Neves, M. L.; Teodoro, V.

    2011-12-01

    Learning seismic tomography principles and techniques involves advanced physical and computational knowledge. In depth learning of such computational skills is a difficult cognitive process that requires a strong background in physics, mathematics and computer programming. The corresponding learning environments and pedagogic methodologies should then involve sets of computational modelling activities with computer software systems which allow students the possibility to improve their mathematical or programming knowledge and simultaneously focus on the learning of seismic wave propagation and inverse theory. To reduce the level of cognitive opacity associated with mathematical or programming knowledge, several computer modelling systems have already been developed (Neves & Teodoro, 2010). Among such systems, Modellus is particularly well suited to achieve this goal because it is a domain general environment for explorative and expressive modelling with the following main advantages: 1) an easy and intuitive creation of mathematical models using just standard mathematical notation; 2) the simultaneous exploration of images, tables, graphs and object animations; 3) the attribution of mathematical properties expressed in the models to animated objects; and finally 4) the computation and display of mathematical quantities obtained from the analysis of images and graphs. Here we describe virtual simulations and educational exercises which enable students an easy grasp of the fundamental of seismic tomography. The simulations make the lecture more interactive and allow students the possibility to overcome their lack of advanced mathematical or programming knowledge and focus on the learning of seismological concepts and processes taking advantage of basic scientific computation methods and tools.

  1. The Effect of Computer Usage in Internet Café on Cigarette Smoking and Alcohol Use among Chinese Adolescents and Youth: A Longitudinal Study

    OpenAIRE

    Jorge Delva; Liyun Wu

    2012-01-01

    We used longitudinal data to investigate the relationship between computer use in internet cafés and smoking/drinking behavior among Chinese adolescents and young adults. Data are from two waves of the China Health and Nutrition Survey (2004 and 2006). Fixed effects models were used to examine if changes in internet café use were associated with changes in cigarette smoking and drinking of alcohol. Male café users spent on average 17.3 hours in front of the computer/week. This was associated ...

  2. Adolescent Contraceptive Use: Models, Research, and Directions.

    Science.gov (United States)

    Whitley, Bernard E., Jr.; Schofield, Janet Ward

    Both the career model and the decision model have been proposed to explain patterns of contraceptive use in teenagers. The career model views contraceptive use as a symbol of a woman's sexuality and implies a clear decision to be sexually active. The decision model is based on the subjective expected utility (SEU) theory which holds that people…

  3. Notions of similarity for computational biology models

    KAUST Repository

    Waltemath, Dagmar

    2016-03-21

    Computational models used in biology are rapidly increasing in complexity, size, and numbers. To build such large models, researchers need to rely on software tools for model retrieval, model combination, and version control. These tools need to be able to quantify the differences and similarities between computational models. However, depending on the specific application, the notion of similarity may greatly vary. A general notion of model similarity, applicable to various types of models, is still missing. Here, we introduce a general notion of quantitative model similarities, survey the use of existing model comparison methods in model building and management, and discuss potential applications of model comparison. To frame model comparison as a general problem, we describe a theoretical approach to defining and computing similarities based on different model aspects. Potentially relevant aspects of a model comprise its references to biological entities, network structure, mathematical equations and parameters, and dynamic behaviour. Future similarity measures could combine these model aspects in flexible, problem-specific ways in order to mimic users\\' intuition about model similarity, and to support complex model searches in databases.

  4. Computer-Aided Modelling Methods and Tools

    DEFF Research Database (Denmark)

    Cameron, Ian; Gani, Rafiqul

    2011-01-01

    The development of models for a range of applications requires methods and tools. In many cases a reference model is required that allows the generation of application specific models that are fit for purpose. There are a range of computer aided modelling tools available that help to define the...... shows a taxonomy of aspects around conservation, constraints and constitutive relations. Aspects of the ICAS-MoT toolbox are given to illustrate the functionality of a computer aided modelling tool, which incorporates an interface to MS Excel....

  5. Predictive Models and Computational Embryology

    Science.gov (United States)

    EPA’s ‘virtual embryo’ project is building an integrative systems biology framework for predictive models of developmental toxicity. One schema involves a knowledge-driven adverse outcome pathway (AOP) framework utilizing information from public databases, standardized ontologies...

  6. Computer Model Locates Environmental Hazards

    Science.gov (United States)

    2008-01-01

    Catherine Huybrechts Burton founded San Francisco-based Endpoint Environmental (2E) LLC in 2005 while she was a student intern and project manager at Ames Research Center with NASA's DEVELOP program. The 2E team created the Tire Identification from Reflectance model, which algorithmically processes satellite images using turnkey technology to retain only the darkest parts of an image. This model allows 2E to locate piles of rubber tires, which often are stockpiled illegally and cause hazardous environmental conditions and fires.

  7. COSP - A computer model of cyclic oxidation

    Science.gov (United States)

    Lowell, Carl E.; Barrett, Charles A.; Palmer, Raymond W.; Auping, Judith V.; Probst, Hubert B.

    1991-01-01

    A computer model useful in predicting the cyclic oxidation behavior of alloys is presented. The model considers the oxygen uptake due to scale formation during the heating cycle and the loss of oxide due to spalling during the cooling cycle. The balance between scale formation and scale loss is modeled and used to predict weight change and metal loss kinetics. A simple uniform spalling model is compared to a more complex random spall site model. In nearly all cases, the simpler uniform spall model gave predictions as accurate as the more complex model. The model has been applied to several nickel-base alloys which, depending upon composition, form Al2O3 or Cr2O3 during oxidation. The model has been validated by several experimental approaches. Versions of the model that run on a personal computer are available.

  8. Computational Models for Nonlinear Aeroelastic Systems Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Clear Science Corp. and Duke University propose to develop and demonstrate a new and efficient computational method of modeling nonlinear aeroelastic systems. The...

  9. A new epidemic model of computer viruses

    Science.gov (United States)

    Yang, Lu-Xing; Yang, Xiaofan

    2014-06-01

    This paper addresses the epidemiological modeling of computer viruses. By incorporating the effect of removable storage media, considering the possibility of connecting infected computers to the Internet, and removing the conservative restriction on the total number of computers connected to the Internet, a new epidemic model is proposed. Unlike most previous models, the proposed model has no virus-free equilibrium and has a unique endemic equilibrium. With the aid of the theory of asymptotically autonomous systems as well as the generalized Poincare-Bendixson theorem, the endemic equilibrium is shown to be globally asymptotically stable. By analyzing the influence of different system parameters on the steady number of infected computers, a collection of policies is recommended to prohibit the virus prevalence.

  10. Sierra toolkit computational mesh conceptual model

    International Nuclear Information System (INIS)

    The Sierra Toolkit computational mesh is a software library intended to support massively parallel multi-physics computations on dynamically changing unstructured meshes. This domain of intended use is inherently complex due to distributed memory parallelism, parallel scalability, heterogeneity of physics, heterogeneous discretization of an unstructured mesh, and runtime adaptation of the mesh. Management of this inherent complexity begins with a conceptual analysis and modeling of this domain of intended use; i.e., development of a domain model. The Sierra Toolkit computational mesh software library is designed and implemented based upon this domain model. Software developers using, maintaining, or extending the Sierra Toolkit computational mesh library must be familiar with the concepts/domain model presented in this report.

  11. Computer simulations of the random barrier model

    DEFF Research Database (Denmark)

    Schrøder, Thomas; Dyre, Jeppe

    2002-01-01

    A brief review of experimental facts regarding ac electronic and ionic conduction in disordered solids is given followed by a discussion of what is perhaps the simplest realistic model, the random barrier model (symmetric hopping model). Results from large scale computer simulations are presented...

  12. Efficient sampling and meta-modeling in computational economic models

    NARCIS (Netherlands)

    I. Salle; M. Yıldızoğlu

    2014-01-01

    Extensive exploration of simulation models comes at a high computational cost, all the more when the model involves a lot of parameters. Economists usually rely on random explorations, such as Monte Carlo simulations, and basic econometric modeling to approximate the properties of computational mode

  13. The relationship between TV/computer time and adolescents' health-promoting behavior: a secondary data analysis.

    Science.gov (United States)

    Chen, Mei-Yen; Liou, Yiing-Mei; Wu, Jen-Yee

    2008-03-01

    Television and computers provide significant benefits for learning about the world. Some studies have linked excessive television (TV) watching or computer game playing to disadvantage of health status or some unhealthy behavior among adolescents. However, the relationships between watching TV/playing computer games and adolescents adopting health promoting behavior were limited. This study aimed to discover the relationship between time spent on watching TV and on leisure use of computers and adolescents' health promoting behavior, and associated factors. This paper used secondary data analysis from part of a health promotion project in Taoyuan County, Taiwan. A cross-sectional design was used and purposive sampling was conducted among adolescents in the original project. A total of 660 participants answered the questions appropriately for this work between January and June 2004. Findings showed the mean age of the respondents was 15.0 +/- 1.7 years. The mean numbers of TV watching hours were 2.28 and 4.07 on weekdays and weekends respectively. The mean hours of leisure (non-academic) computer use were 1.64 and 3.38 on weekdays and weekends respectively. Results indicated that adolescents spent significant time watching TV and using the computer, which was negatively associated with adopting health-promoting behaviors such as life appreciation, health responsibility, social support and exercise behavior. Moreover, being boys, being overweight, living in a rural area, and being middle-school students were significantly associated with spending long periods watching TV and using the computer. Therefore, primary health care providers should record the TV and non-academic computer time of youths when conducting health promotion programs, and educate parents on how to become good and healthy electronic media users. PMID:18348110

  14. Quantum Computing and Dynamical Quantum Models

    OpenAIRE

    Aaronson, Scott

    2002-01-01

    A dynamical quantum model assigns an eigenstate to a specified observable even when no measurement is made, and gives a stochastic evolution rule for that eigenstate. Such a model yields a distribution over classical histories of a quantum state. We study what can be computed by sampling from that distribution, i.e., by examining an observer's entire history. We show that, relative to an oracle, one can solve problems in polynomial time that are intractable even for quantum computers; and can...

  15. Organ doses for reference pediatric and adolescent patients undergoing computed tomography estimated by Monte Carlo simulation

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Choonsik; Kim, Kwang Pyo; Long, Daniel J.; Bolch, Wesley E. [Division of Cancer Epidemiology and Genetics, National Cancer Institute, National Institute of Health, Bethesda, Maryland 20852 (United States); Department of Nuclear Engineering, Kyung Hee University, Gyeonggi-do, 446906 (Korea, Republic of); J. Crayton Pruitt Family Department of Biomedical Engineering, University of Florida, Gainesville, Florida 32611 (United States)

    2012-04-15

    Purpose: To establish an organ dose database for pediatric and adolescent reference individuals undergoing computed tomography (CT) examinations by using Monte Carlo simulation. The data will permit rapid estimates of organ and effective doses for patients of different age, gender, examination type, and CT scanner model. Methods: The Monte Carlo simulation model of a Siemens Sensation 16 CT scanner previously published was employed as a base CT scanner model. A set of absorbed doses for 33 organs/tissues normalized to the product of 100 mAs and CTDI{sub vol} (mGy/100 mAs mGy) was established by coupling the CT scanner model with age-dependent reference pediatric hybrid phantoms. A series of single axial scans from the top of head to the feet of the phantoms was performed at a slice thickness of 10 mm, and at tube potentials of 80, 100, and 120 kVp. Using the established CTDI{sub vol}- and 100 mAs-normalized dose matrix, organ doses for different pediatric phantoms undergoing head, chest, abdomen-pelvis, and chest-abdomen-pelvis (CAP) scans with the Siemens Sensation 16 scanner were estimated and analyzed. The results were then compared with the values obtained from three independent published methods: CT-Expo software, organ dose for abdominal CT scan derived empirically from patient abdominal circumference, and effective dose per dose-length product (DLP). Results: Organ and effective doses were calculated and normalized to 100 mAs and CTDI{sub vol} for different CT examinations. At the same technical setting, dose to the organs, which were entirely included in the CT beam coverage, were higher by from 40 to 80% for newborn phantoms compared to those of 15-year phantoms. An increase of tube potential from 80 to 120 kVp resulted in 2.5-2.9-fold greater brain dose for head scans. The results from this study were compared with three different published studies and/or techniques. First, organ doses were compared to those given by CT-Expo which revealed dose

  16. Computational aspects of premixing modelling

    Energy Technology Data Exchange (ETDEWEB)

    Fletcher, D.F. [Sydney Univ., NSW (Australia). Dept. of Chemical Engineering; Witt, P.J.

    1998-01-01

    In the steam explosion research field there is currently considerable effort being devoted to the modelling of premixing. Practically all models are based on the multiphase flow equations which treat the mixture as an interpenetrating continuum. Solution of these equations is non-trivial and a wide range of solution procedures are in use. This paper addresses some numerical aspects of this problem. In particular, we examine the effect of the differencing scheme for the convective terms and show that use of hybrid differencing can cause qualitatively wrong solutions in some situations. Calculations are performed for the Oxford tests, the BNL tests, a MAGICO test and to investigate various sensitivities of the solution. In addition, we show that use of a staggered grid can result in a significant error which leads to poor predictions of `melt` front motion. A correction is given which leads to excellent convergence to the analytic solution. Finally, we discuss the issues facing premixing model developers and highlight the fact that model validation is hampered more by the complexity of the process than by numerical issues. (author)

  17. A Computational Framework for Realistic Retina Modeling.

    Science.gov (United States)

    Martínez-Cañada, Pablo; Morillas, Christian; Pino, Begoña; Ros, Eduardo; Pelayo, Francisco

    2016-11-01

    Computational simulations of the retina have led to valuable insights about the biophysics of its neuronal activity and processing principles. A great number of retina models have been proposed to reproduce the behavioral diversity of the different visual processing pathways. While many of these models share common computational stages, previous efforts have been more focused on fitting specific retina functions rather than generalizing them beyond a particular model. Here, we define a set of computational retinal microcircuits that can be used as basic building blocks for the modeling of different retina mechanisms. To validate the hypothesis that similar processing structures may be repeatedly found in different retina functions, we implemented a series of retina models simply by combining these computational retinal microcircuits. Accuracy of the retina models for capturing neural behavior was assessed by fitting published electrophysiological recordings that characterize some of the best-known phenomena observed in the retina: adaptation to the mean light intensity and temporal contrast, and differential motion sensitivity. The retinal microcircuits are part of a new software platform for efficient computational retina modeling from single-cell to large-scale levels. It includes an interface with spiking neural networks that allows simulation of the spiking response of ganglion cells and integration with models of higher visual areas. PMID:27354192

  18. Computer Modeling of Direct Metal Laser Sintering

    Science.gov (United States)

    Cross, Matthew

    2014-01-01

    A computational approach to modeling direct metal laser sintering (DMLS) additive manufacturing process is presented. The primary application of the model is for determining the temperature history of parts fabricated using DMLS to evaluate residual stresses found in finished pieces and to assess manufacturing process strategies to reduce part slumping. The model utilizes MSC SINDA as a heat transfer solver with imbedded FORTRAN computer code to direct laser motion, apply laser heating as a boundary condition, and simulate the addition of metal powder layers during part fabrication. Model results are compared to available data collected during in situ DMLS part manufacture.

  19. The IceCube Computing Infrastructure Model

    International Nuclear Information System (INIS)

    In addition to the big LHC experiments, a number of mid-size experiments are coming online which need to define new computing models to meet the demands on processing and storage requirements of those experiments. We present the hybrid computing model of IceCube which leverages Grid models with a more flexible direct user model as an example of a possible solution. In IceCube a central data center at UW-Madison serves as a Tier-0 with a single Tier-1 at DESY Zeuthen.

  20. Proceedings Fifth Workshop on Developments in Computational Models--Computational Models From Nature

    CERN Document Server

    Cooper, S Barry; 10.4204/EPTCS.9

    2009-01-01

    The special theme of DCM 2009, co-located with ICALP 2009, concerned Computational Models From Nature, with a particular emphasis on computational models derived from physics and biology. The intention was to bring together different approaches - in a community with a strong foundational background as proffered by the ICALP attendees - to create inspirational cross-boundary exchanges, and to lead to innovative further research. Specifically DCM 2009 sought contributions in quantum computation and information, probabilistic models, chemical, biological and bio-inspired ones, including spatial models, growth models and models of self-assembly. Contributions putting to the test logical or algorithmic aspects of computing (e.g., continuous computing with dynamical systems, or solid state computing models) were also very much welcomed.

  1. Precursors of Adolescent Substance Use from Early Childhood and Early Adolescence: Testing a Developmental Cascade Model

    OpenAIRE

    Sitnick, Stephanie; Shaw, Daniel S.; Hyde, Luke

    2013-01-01

    This study examined developmentally-salient risk and protective factors of adolescent substance use assessed during early childhood and early adolescence using a sample of 310 low-income boys. Child problem behavior and proximal family risk and protective factors (i.e., parenting, maternal depression) during early childhood, as well as child and family factors and peer deviant behavior during adolescence were explored as potential precursors to later substance use during adolescence using str...

  2. Computing a Comprehensible Model for Spam Filtering

    Science.gov (United States)

    Ruiz-Sepúlveda, Amparo; Triviño-Rodriguez, José L.; Morales-Bueno, Rafael

    In this paper, we describe the application of the Desicion Tree Boosting (DTB) learning model to spam email filtering.This classification task implies the learning in a high dimensional feature space. So, it is an example of how the DTB algorithm performs in such feature space problems. In [1], it has been shown that hypotheses computed by the DTB model are more comprehensible that the ones computed by another ensemble methods. Hence, this paper tries to show that the DTB algorithm maintains the same comprehensibility of hypothesis in high dimensional feature space problems while achieving the performance of other ensemble methods. Four traditional evaluation measures (precision, recall, F1 and accuracy) have been considered for performance comparison between DTB and others models usually applied to spam email filtering. The size of the hypothesis computed by a DTB is smaller and more comprehensible than the hypothesis computed by Adaboost and Naïve Bayes.

  3. Peer pressures: Social instability stress in adolescence and social deficits in adulthood in a rodent model

    OpenAIRE

    McCormick, Cheryl M; Travis E. Hodges; Jonathan J. Simone

    2015-01-01

    Studies in animal models generate and test hypotheses regarding developmental stage-specific vulnerability that might inform research questions about human development. In both rats and humans, peer relationships are qualitatively different in adolescence than at other stages of development, and social experiences in adolescence are considered important determinants of adult social function. This review describes our adolescent rat social instability stress model and the long-lasting effects ...

  4. CLOUD COMPUTING SECURITY THROUGH SYMMETRIC CIPHER MODEL

    Directory of Open Access Journals (Sweden)

    Subramanian Anbazhagan

    2014-10-01

    Full Text Available Cloud computing can be defined as an application and services which runs on distributed network using virtualized and it is accessed through internet protocols and networking. Cloud computing resources and virtual and limitless and information’s of the physical systems on which software running are abstracted from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the users the concept is to incorporate technologies which have the common theme of reliance on the internet Software and data are stored on the servers whereas cloud computing services are provided through applications online which can be accessed from web browsers. Lack of security and access control is the major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple virtual machine in cloud can access insecure information flows as service provider; therefore to implement the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud computing security through symmetric cipher model. This article proposes symmetric cipher model in order to implement cloud computing security so that data can accessed and stored securely.

  5. Student motivation in a high school science laboratory: The impact of computers and other technologies on young adolescent physics students

    Science.gov (United States)

    Clark, Stephen Allan

    The impact of technology (including computers and probes, low friction carts, video camera, VCR's and electronic balances) on the motivation of adolescent science students was investigated using a naturalistic case study of college preparatory ninth grade physics classes at a comprehensive high school in the southeastern United States. The students were positively affected by the use of computer technology as compared to other "low tech" labs. The non-computer technologies had little motivational effect on the students. The most important motivational effect was the belief among the students that they could successfully operate the equipment and gather meaningful results. At times, the students spent more cognitive energy on performing the experiment than on learning the physics. This was especially true when microcomputer-based labs were used. When the technology led to results that were clear to the students and displayed in a manner that could be easily interpreted, they were generally receptive and motivated to persist at the task. Many students reported being especially motivated when a computer was used to gather the data because they "just liked computers." Furthermore, qualitative evidence suggested that they had learned the physics concept they were working on. This is in close agreement with the conceptual change model of learning in that students are most likely to change their prior conceptions when the new idea is plausible (the technology makes it so), intelligible (real time graphing, actual light rays), and fruitful (the new idea explains what they actually see). However, many of the microcomputer-based laboratory (MBL) activities and "high tech" labs were too unstructured, leaving students bewildered, confused and unmotivated. To achieve maximum motivational effects from the technology, it was necessary to reduce the cognitive demand on the students so they could concentrate on the data gathered rather than the operation of the equipment.

  6. Modelling the effects of sexting on the transmission dynamics of HSV-2 amongst adolescents

    Directory of Open Access Journals (Sweden)

    A. Mhlanga

    2015-12-01

    Full Text Available Prior studies have indicated that adolescents who are into sexting are likely to engage in risky sexual behaviours. In this paper, a mathematical model to assess the impact of sexting and peer influence on the spread of HSV-2 amongst adolescents is developed. The threshold parameters of the model are determined and stabilities are analysed. The impact of filtering and awareness campaigns is explored. Results from the study suggest that HSV-2 prevalence is high amongst adolescents who are into sexting as compared to those who do not. Further, we applied optimal control theory to the proposed model. The controls represent filtering and awareness campaigns. The objective is based on minimising the susceptible sexting adolescents, infected non-sexting adolescents and the infected sexting adolescents. The optimal control is characterised and numerically solved. Overall, the application of optimal control theory suggests that more effort should be devoted to both controls, filtering and awareness campaigns.

  7. Mechanistic models in computational social science

    Science.gov (United States)

    Holme, Petter; Liljeros, Fredrik

    2015-09-01

    Quantitative social science is not only about regression analysis or, in general, data inference. Computer simulations of social mechanisms have an over 60 years long history. They have been used for many different purposes—to test scenarios, to test the consistency of descriptive theories (proof-of-concept models), to explore emergent phenomena, for forecasting, etc. In this essay, we sketch these historical developments, the role of mechanistic models in the social sciences and the influences from the natural and formal sciences. We argue that mechanistic computational models form a natural common ground for social and natural sciences, and look forward to possible future information flow across the social-natural divide.

  8. Modeling User Behavior in Computer Learning Tasks.

    Science.gov (United States)

    Mantei, Marilyn M.

    Model building techniques from Artifical Intelligence and Information-Processing Psychology are applied to human-computer interface tasks to evaluate existing interfaces and suggest new and better ones. The model is in the form of an augmented transition network (ATN) grammar which is built by applying grammar induction heuristics on a sequential…

  9. Teaching Forest Planning with Computer Models

    Science.gov (United States)

    Howard, Richard A.; Magid, David

    1977-01-01

    This paper describes a series of FORTRAN IV computer models which are the content-oriented subject matter for a college course in forest planning. The course objectives, the planning problem, and the ten planning aid models are listed. Student comments and evaluation of the program are included. (BT)

  10. Human systems dynamics: Toward a computational model

    Science.gov (United States)

    Eoyang, Glenda H.

    2012-09-01

    A robust and reliable computational model of complex human systems dynamics could support advancements in theory and practice for social systems at all levels, from intrapersonal experience to global politics and economics. Models of human interactions have evolved from traditional, Newtonian systems assumptions, which served a variety of practical and theoretical needs of the past. Another class of models has been inspired and informed by models and methods from nonlinear dynamics, chaos, and complexity science. None of the existing models, however, is able to represent the open, high dimension, and nonlinear self-organizing dynamics of social systems. An effective model will represent interactions at multiple levels to generate emergent patterns of social and political life of individuals and groups. Existing models and modeling methods are considered and assessed against characteristic pattern-forming processes in observed and experienced phenomena of human systems. A conceptual model, CDE Model, based on the conditions for self-organizing in human systems, is explored as an alternative to existing models and methods. While the new model overcomes the limitations of previous models, it also provides an explanatory base and foundation for prospective analysis to inform real-time meaning making and action taking in response to complex conditions in the real world. An invitation is extended to readers to engage in developing a computational model that incorporates the assumptions, meta-variables, and relationships of this open, high dimension, and nonlinear conceptual model of the complex dynamics of human systems.

  11. Ewe: a computer model for ultrasonic inspection

    International Nuclear Information System (INIS)

    The computer program EWE simulates the propagation of elastic waves in solids and liquids. It has been applied to ultrasonic testing to study the echoes generated by cracks and other types of defects. A discussion of the elastic wave equations is given, including the first-order formulation, shear and compression waves, surface waves and boundaries, numerical method of solution, models for cracks and slot defects, input wave generation, returning echo construction, and general computer issues

  12. Parallel Computing Applications and Financial Modelling

    OpenAIRE

    Liddell, Heather M.; Parkinson, D.; Hodgson, G S; Dzwig, P.

    2004-01-01

    At Queen Mary, University of London, we have over twenty years of experience in Parallel Computing Applications, mostly on "massively parallel systems", such as the Distributed Array Processors (DAPs). The applications in which we were involved included design of numerical subroutine libraries, Finite Element software, graphics tools, the physics of organic materials, medical imaging, computer vision and more recently, Financial modelling. Two of the projects related to the latter are describ...

  13. Computer modelling of tornado effects on buildings

    International Nuclear Information System (INIS)

    An attempt is made to model the tornado-structure interaction. The tornado is represented as a Rankine-Combined vortex. The computations are done on a rectangular grid system. The governing equations are approximated using control volume procedure. The pressure equations are solved by an efficient preconditioned conjugate gradient procedure. The computed tornado forces are compared with straight boundary layer (SBL) wind. The tornado forces on the roof of the building is more than five times the SBL flow

  14. On the completeness of quantum computation models

    OpenAIRE

    Arrighi, Pablo; Dowek, Gilles

    2010-01-01

    The notion of computability is stable (i.e. independent of the choice of an indexing) over infinite-dimensional vector spaces provided they have a finite "tensorial dimension". Such vector spaces with a finite tensorial dimension permit to define an absolute notion of completeness for quantum computation models and give a precise meaning to the Church-Turing thesis in the framework of quantum theory. (Extra keywords: quantum programming languages, denotational semantics, universality.)

  15. Parallel Computing of Ocean General Circulation Model

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper discusses the parallel computing of the thirdgeneration Ocea n General Circulation Model (OGCM) from the State Key Laboratory of Numerical Mo deling for Atmospheric Science and Geophysical Fluid Dynamics(LASG),Institute of Atmosphere Physics(IAP). Meanwhile, several optimization strategies for paralle l computing of OGCM (POGCM) on Scalable Shared Memory Multiprocessor (S2MP) are presented. Using Message Passing Interface (MPI), we obtain super linear speedup on SGI Origin 2000 for parallel OGCM(POGCM) after optimization.

  16. A Classical Probabilistic Computer Model of Consciousness

    OpenAIRE

    Blaha, Stephen

    2002-01-01

    We show that human consciousness can be modeled as a classical (not quantum) probabilistic computer. A quantum computer representation does not appear to be indicated because no known feature of consciousness depends on Planck's constant h, the telltale sign of quantum phenomena. It is argued that the facets of consciousness are describable by an object-oriented design with dynamically defined classes and objects. A comparison to economic theory is also made. We argue consciousness may also h...

  17. Finite difference computing with exponential decay models

    CERN Document Server

    Langtangen, Hans Petter

    2016-01-01

    This text provides a very simple, initial introduction to the complete scientific computing pipeline: models, discretization, algorithms, programming, verification, and visualization. The pedagogical strategy is to use one case study – an ordinary differential equation describing exponential decay processes – to illustrate fundamental concepts in mathematics and computer science. The book is easy to read and only requires a command of one-variable calculus and some very basic knowledge about computer programming. Contrary to similar texts on numerical methods and programming, this text has a much stronger focus on implementation and teaches testing and software engineering in particular. .

  18. Multi-scale modelling in computational biomedicine

    OpenAIRE

    Sloot P.M.; Hoekstra A.G.

    2010-01-01

    The inherent complexity of biomedical systems is well recognized; they are multi-scale, multi-science systems, bridging a wide range of temporal and spatial scales. This article reviews the currently emerging field of multi-scale modelling in computational biomedicine. Many exciting multi-scale models exist or are under development. However, an underpinning multi-scale modelling methodology seems to be missing. We propose a direction that complements the classic dynamical systems approach and...

  19. Computational disease modeling – fact or fiction?

    Directory of Open Access Journals (Sweden)

    Stephan Klaas

    2009-06-01

    Full Text Available Abstract Background Biomedical research is changing due to the rapid accumulation of experimental data at an unprecedented scale, revealing increasing degrees of complexity of biological processes. Life Sciences are facing a transition from a descriptive to a mechanistic approach that reveals principles of cells, cellular networks, organs, and their interactions across several spatial and temporal scales. There are two conceptual traditions in biological computational-modeling. The bottom-up approach emphasizes complex intracellular molecular models and is well represented within the systems biology community. On the other hand, the physics-inspired top-down modeling strategy identifies and selects features of (presumably essential relevance to the phenomena of interest and combines available data in models of modest complexity. Results The workshop, "ESF Exploratory Workshop on Computational disease Modeling", examined the challenges that computational modeling faces in contributing to the understanding and treatment of complex multi-factorial diseases. Participants at the meeting agreed on two general conclusions. First, we identified the critical importance of developing analytical tools for dealing with model and parameter uncertainty. Second, the development of predictive hierarchical models spanning several scales beyond intracellular molecular networks was identified as a major objective. This contrasts with the current focus within the systems biology community on complex molecular modeling. Conclusion During the workshop it became obvious that diverse scientific modeling cultures (from computational neuroscience, theory, data-driven machine-learning approaches, agent-based modeling, network modeling and stochastic-molecular simulations would benefit from intense cross-talk on shared theoretical issues in order to make progress on clinically relevant problems.

  20. Economic growth models: symbolic and numerical computations

    OpenAIRE

    Vasconcelos, P. B.

    2013-01-01

    Growth economic models play a crucial role in understanding countries development, inter-country macroeconomic relationship and, ultimately, to anticipate the effects on endogenous variables due to political shocks on model parameters or exogenous variables. Yet, build a mathematical model can be a difficult and time consuming task. Symbolic computations can be of great help in the development process. Then, the ability to simulate, under initial assumptions, is, assuredly, a priceless tool f...

  1. Computer-Aided Business Model Design

    OpenAIRE

    Fritscher B.

    2014-01-01

    There is a lack of dedicated tools for business model design at a strategic level. However, in today's economic world the need to be able to quickly reinvent a company's business model is essential to stay competitive. This research focused on identifying the functionalities that are necessary in a computer-aided design (CAD) tool for the design of business models in a strategic context. Using design science research methodology a series of techniques and prototypes have been designed and eva...

  2. original: Operational spatial computable general equilibrium modeling

    OpenAIRE

    Johannes BrÃcker

    1998-01-01

    A prototype spatial computable general equilibrium model is developed and illustrated by a numerical example. The theoretical basis is a complete Arrow-Debreu equilibrium under perfect competition. The leading principle of model design is parsimony: The specification restricts the number of parameters in a way allowing for a model calibration relying on a limited data base, which is readily available in a country with a well developed statistical service. No "data generating" first stage, usi...

  3. A Categorisation of Cloud Computing Business Models

    OpenAIRE

    Chang, Victor; Bacigalupo, David; Wills, Gary; De Roure, David

    2010-01-01

    This paper reviews current cloud computing business models and presents proposals on how organisations can achieve sustainability by adopting appropriate models. We classify cloudcomputing business models into eight types: (1) Service Provider and Service Orientation; (2) Support and Services Contracts; (3) In-House Private Clouds; (4) All-In-One Enterprise Cloud; (5) One-Stop Resources and Services; (6) Government Funding; (7) Venture Capitals; and (8) Entertainment and Social Networking. Us...

  4. Generating computational models for serious gaming

    OpenAIRE

    Westera, Wim

    2013-01-01

    Many serious games include computational models that simulate dynamic systems. These models promote enhanced interaction and responsiveness. Under the social web paradigm more and more usable game authoring tools become available that enable prosumers to create their own games, but the inclusion of dynamic simulations remains a specialist’s job involving knowledge of mathematics, numerical modeling and programming. This paper describes a methodology for specifying and running a specific subse...

  5. Overweight and television and computer habits in Swedish school-age children and adolescents: A cross-sectional study

    OpenAIRE

    Garmy, Pernilla; Clausson, Eva K.; Nyberg, Per; Jakobsson, Ulf

    2013-01-01

    The aim of this cross-sectional study was to investigate the prevalence of overweight and obesity in children and adolescents (6–16 years), and relationships between being overweight and sleep, experiencing of fatigue, enjoyment of school, and time spent in watching television and in sitting at the computer. Trained school nurses measured the weight and height of 2891 children aged 6, 7, 10, 14, and 16, and distributed a questionnaire to them regarding television and computer habits, sleep, a...

  6. Loneliness and solitude in adolescence: A confirmatory factor analysis of alternative models

    DEFF Research Database (Denmark)

    Goossens, Luc; Lasgaard, Mathias; Luyckx, Koen;

    2009-01-01

    completed by a sample of mid-adolescents (N = 534) from Grades 10 through 12 (aged 15-18 years) in the Dutch-speaking part of Belgium. As expected, the four-factor solution provided a better fit to the data than did alternative models that comprised just a single factor, or two and three factors. Use of the...... Loneliness and Aloneness Scale for Children and Adolescents (LACA) is recommended, because the instrument measures all four aspects of the model. Implications for current theories on adolescent loneliness and associated phenomena, such as adolescents' attitude toward being on their own, are briefly discussed....

  7. Social Contagion, Adolescent Sexual Behavior, and Pregnancy: A Nonlinear Dynamic EMOSA Model.

    Science.gov (United States)

    Rodgers, Joseph Lee; Rowe, David C.; Buster, Maury

    1998-01-01

    Expands an existing nonlinear dynamic epidemic model of onset of social activities (EMOSA), motivated by social contagion theory, to quantify the likelihood of pregnancy for adolescent girls of different sexuality statuses. Compares five sexuality/pregnancy models to explain variance in national prevalence curves. Finds that adolescent girls have…

  8. Middle Grades' School Models and Their Impact on Early Adolescent Self-Esteem

    Science.gov (United States)

    Booth, Margaret Zoller; Sheehan, Heather Chase; Earley, Mark A.

    2007-01-01

    Throughout the world, school grade structures are most variable during the early adolescent years when students can find themselves in a variety of school models. This paper investigates the impact of two popular school models in the United States (middle school and K-8) on the self-esteem and self-concept of early adolescents. Based on mixed…

  9. Testing a Gender Additive Model: The Role of Body Image in Adolescent Depression

    Science.gov (United States)

    Bearman, Sarah Kate; Stice, Eric

    2008-01-01

    Despite consistent evidence that adolescent girls are at greater risk of developing depression than adolescent boys, risk factor models that account for this difference have been elusive. The objective of this research was to examine risk factors proposed by the "gender additive" model of depression that attempts to partially explain the increased…

  10. Relativistic Computing Model Applied in Corporate Networks

    Directory of Open Access Journals (Sweden)

    Chau Sen Shia*1,

    2014-05-01

    Full Text Available Environmental computing information technology (it is one of the subjects of interest for organizations when the subject covers financial economics and return on investment for companies. This work aims to present as a contribution proposing a relativistic model of computation using the relativistic physics concepts and foundations of quantum mechanics to propose a new vision in the use of virtualization environment in corporate networks. The model was based on simulation and testing of connection with providers in virtualization environments with Datacenters and implementing the basics of relativity and quantum mechanics in communication with networks of companies, to establish alliances and resource sharing between organizations. The data were collected and then were performed calculations that demonstrate and identify connections and integrations that establish relations of cloud computing with the relativistic vision, in such a way that complement the approaches of physics and computing with the theories of the magnetic field and the propagation of light. The research is characterized as exploratory, because searches check physical connections with cloud computing, the network of companies and the adhesion of the proposed model. Were presented the relationship between the proposal and the practical application that makes it possible to describe the results of the main features, demonstrating the relativistic model integration with new technologies of virtualization of Datacenters, and optimize the resource with the propagation of light, electromagnetic waves, simultaneity, length contraction and time dilation

  11. Solving stochastic epidemiological models using computer algebra

    Science.gov (United States)

    Hincapie, Doracelly; Ospina, Juan

    2011-06-01

    Mathematical modeling in Epidemiology is an important tool to understand the ways under which the diseases are transmitted and controlled. The mathematical modeling can be implemented via deterministic or stochastic models. Deterministic models are based on short systems of non-linear ordinary differential equations and the stochastic models are based on very large systems of linear differential equations. Deterministic models admit complete, rigorous and automatic analysis of stability both local and global from which is possible to derive the algebraic expressions for the basic reproductive number and the corresponding epidemic thresholds using computer algebra software. Stochastic models are more difficult to treat and the analysis of their properties requires complicated considerations in statistical mathematics. In this work we propose to use computer algebra software with the aim to solve epidemic stochastic models such as the SIR model and the carrier-borne model. Specifically we use Maple to solve these stochastic models in the case of small groups and we obtain results that do not appear in standard textbooks or in the books updated on stochastic models in epidemiology. From our results we derive expressions which coincide with those obtained in the classical texts using advanced procedures in mathematical statistics. Our algorithms can be extended for other stochastic models in epidemiology and this shows the power of computer algebra software not only for analysis of deterministic models but also for the analysis of stochastic models. We also perform numerical simulations with our algebraic results and we made estimations for the basic parameters as the basic reproductive rate and the stochastic threshold theorem. We claim that our algorithms and results are important tools to control the diseases in a globalized world.

  12. Time series modeling, computation, and inference

    CERN Document Server

    Prado, Raquel

    2010-01-01

    The authors systematically develop a state-of-the-art analysis and modeling of time series. … this book is well organized and well written. The authors present various statistical models for engineers to solve problems in time series analysis. Readers no doubt will learn state-of-the-art techniques from this book.-Hsun-Hsien Chang, Computing Reviews, March 2012My favorite chapters were on dynamic linear models and vector AR and vector ARMA models.-William Seaver, Technometrics, August 2011… a very modern entry to the field of time-series modelling, with a rich reference list of the current lit

  13. Computational modeling of laser-tissue interaction

    Energy Technology Data Exchange (ETDEWEB)

    London, R.A.; Amendt, P.; Bailey, D.S.; Eder, D.C.; Maitland, D.J.; Glinsky, M.E.; Strauss, M.; Zimmerman, G.B.

    1996-05-01

    Computational modeling can play an important role both in designing laser-tissue interaction experiments and in understanding the underlying mechanisms. This can lead to more rapid and less expensive development if new procedures and instruments, and a better understanding of their operation. We have recently directed computer programs and associated expertise developed over many years to model high intensity laser-matter interactions for fusion research towards laser-tissue interaction problem. A program called LATIS is being developed to specifically treat laser-tissue interaction phenomena, such as highly scattering light transport, thermal coagulation, and hydrodynamic motion.

  14. Biomedical Imaging and Computational Modeling in Biomechanics

    CERN Document Server

    Iacoviello, Daniela

    2013-01-01

    This book collects the state-of-art and new trends in image analysis and biomechanics. It covers a wide field of scientific and cultural topics, ranging from remodeling of bone tissue under the mechanical stimulus up to optimizing the performance of sports equipment, through the patient-specific modeling in orthopedics, microtomography and its application in oral and implant research, computational modeling in the field of hip prostheses, image based model development and analysis of the human knee joint, kinematics of the hip joint, micro-scale analysis of compositional and mechanical properties of dentin, automated techniques for cervical cell image analysis, and iomedical imaging and computational modeling in cardiovascular disease.   The book will be of interest to researchers, Ph.D students, and graduate students with multidisciplinary interests related to image analysis and understanding, medical imaging, biomechanics, simulation and modeling, experimental analysis.

  15. Computer modeling of commercial refrigerated warehouse facilities

    International Nuclear Information System (INIS)

    The use of computer models to simulate the energy performance of large commercial refrigeration systems typically found in food processing facilities is an area of engineering practice that has seen little development to date. Current techniques employed in predicting energy consumption by such systems have focused on temperature bin methods of analysis. Existing simulation tools such as DOE2 are designed to model commercial buildings and grocery store refrigeration systems. The HVAC and Refrigeration system performance models in these simulations tools model equipment common to commercial buildings and groceries, and respond to energy-efficiency measures likely to be applied to these building types. The applicability of traditional building energy simulation tools to model refrigerated warehouse performance and analyze energy-saving options is limited. The paper will present the results of modeling work undertaken to evaluate energy savings resulting from incentives offered by a California utility to its Refrigerated Warehouse Program participants. The TRNSYS general-purpose transient simulation model was used to predict facility performance and estimate program savings. Custom TRNSYS components were developed to address modeling issues specific to refrigerated warehouse systems, including warehouse loading door infiltration calculations, an evaporator model, single-state and multi-stage compressor models, evaporative condenser models, and defrost energy requirements. The main focus of the paper will be on the modeling approach. The results from the computer simulations, along with overall program impact evaluation results, will also be presented

  16. Factors Predicting the Physical Activity Behavior of Female Adolescents: A Test of the Health Promotion Model

    OpenAIRE

    Mohamadian, Hashem; Ghannaee Arani, Mohammad

    2014-01-01

    Objectives Physical activity behavior begins to decline during adolescence and continues to decrease throughout young adulthood. This study aims to explain factors that influence physical activity behavior in a sample of female adolescents using a health promotion model framework. Methods This cross-sectional survey was used to explore physical activity behavior among a sample of female adolescents. Participants completed measures of physical activity, perceived self-efficacy, self-esteem, so...

  17. Psychopathology and functional impairment among patients attending an adolescent health clinic: Implications for healthcare model reform

    OpenAIRE

    Russell, Sushila; Subramanian, Balakrishnan; Russell, Paul Swamidhas Sudhakar

    2008-01-01

    Background In developing countries, primary health care facilities, such as adolescent health clinics, are frequently the first contact for an adolescent with a health professional for a myriad of health problems including mental health issues. Psychopathology is prevalent among adolescents, and causes significant educational, occupational and social impairment. The presence of psychopathology with impairment requires the development of treatment models to address both of these components. We...

  18. A Confirmatory Model for Substance Use Among Japanese American and Part-Japanese American Adolescents

    OpenAIRE

    Williams, John Kino Yamaguchi; Else, 'Iwalani R. N.; Goebert, Deborah A; Nishimura, Stephanie T.; Hishinuma, Earl S.; Andrade, Naleen N.

    2013-01-01

    Few studies have examined the effect of ethnicity and cultural identity on substance use among Asian and Pacific Islander adolescents. A cross-sequential study conducted in Hawai'i with 144 Japanese American and part-Japanese American adolescents assessed a model integrating Japanese ethnicity, cultural identity, substance use, major life events, and social support. Japanese American adolescents scored higher on the Japanese Culture Scale and on the Peers’ Social Support than the part-Japanes...

  19. Computer-associated health complaints and sources of ergonomic instructions in computer-related issues among Finnish adolescents: A cross-sectional study

    Directory of Open Access Journals (Sweden)

    Ketola Ritva L

    2010-01-01

    Full Text Available Abstract Background The use of computers has increased among adolescents, as have musculoskeletal symptoms. There is evidence that these symptoms can be reduced through an ergonomics approach and through education. The purpose of this study was to examine where adolescents had received ergonomic instructions related to computer use, and whether receiving these instructions was associated with a reduced prevalence of computer-associated health complaints. Methods Mailed survey with nationally representative sample of 12 to 18-year-old Finns in 2001 (n = 7292, response rate 70%. In total, 6961 youths reported using a computer. We tested the associations of computer use time and received ergonomic instructions (predictor variables with computer-associated health complaints (outcome variables using logistic regression analysis. Results To prevent computer-associated complaints, 61.2% reported having been instructed to arrange their desk/chair/screen in the right position, 71.5% to take rest breaks. The older age group (16-18 years reported receiving instructions or being self-instructed more often than the 12- to 14-year-olds (p Conclusions This report shows that ergonomic instructions on how to prevent computer-related musculoskeletal problems fail to reach a substantial number of children. Furthermore, the reported sources of instructions vary greatly in terms of reliability.

  20. Nightly use of computer by adolescents: its effect on quality of sleep Uso noturno de computador por adolescentes: seu efeito na qualidade de sono

    OpenAIRE

    Gema Mesquita; Rubens Reimão

    2007-01-01

    OBJECTIVE: To analyze the influence of nocturnal use of computer and their effect on sleep quality, in a group of adolescents. METHOD: Two middle schools were chosen for the research. The sample consisted of adolescents n=160 (55M; 105F), with ages ranging from 15 to 18 years. Questionnaire about computer use with the objective of obtaining information regarding the time and number of hours of nocturnal computer use, were applied for collection of data. They included the Pittsburgh Sleep Qual...

  1. Systematic Development of the YouRAction program, a computer-tailored Physical Activity promotion intervention for Dutch adolescents, targeting personal motivations and environmental opportunities

    OpenAIRE

    Prins Richard G; van Empelen Pepijn; Beenackers Marielle A; Brug Johannes; Oenema Anke

    2010-01-01

    Abstract Background Increasing physical activity (PA) among adolescents is an important health promotion goal. PA has numerous positive health effects, but the majority of Dutch adolescents do not meet PA requirements. The present paper describes the systematic development of a theory-based computer-tailored intervention, YouRAction, which targets individual and environmental factors determining PA among adolescents. Design The intervention development was guided by the Intervention Mapping p...

  2. Computer-aided modeling framework – a generic modeling template

    DEFF Research Database (Denmark)

    Fedorova, Marina; Sin, Gürkan; Gani, Rafiqul

    This work focuses on the development of a computer-aided modeling framework. The framework is a knowledge-based system that is built on a generic modeling language and structured on workflows for different modeling tasks. The overall objective is to support model developers and users to generate ....... The application of the modeling template is highlighted with a case study related to the modeling of a catalytic membrane reactor coupling dehydrogenation of ethylbenzene with hydrogenation of nitrobenzene...

  3. Analyzing Cultural Models in Adolescent Accounts of Romantic Relationships

    Science.gov (United States)

    Milbrath, Constance; Ohlson, Brightstar; Eyre, Stephen L.

    2009-01-01

    Research on academic achievement has led the way in demonstrating how culturally constructed meanings shape adolescent scholastic behavior. The aim of this research is to move this standpoint of analysis more centrally into the area of adolescent dating and sexuality by focusing on the cultural components of adolescent romantic relationships. This…

  4. High performance computing and numerical modelling

    CERN Document Server

    ,

    2014-01-01

    Numerical methods play an ever more important role in astrophysics. This is especially true in theoretical works, but of course, even in purely observational projects, data analysis without massive use of computational methods has become unthinkable. The key utility of computer simulations comes from their ability to solve complex systems of equations that are either intractable with analytic techniques or only amenable to highly approximative treatments. Simulations are best viewed as a powerful complement to analytic reasoning, and as the method of choice to model systems that feature enormous physical complexity such as star formation in evolving galaxies, the topic of this 43rd Saas Fee Advanced Course. The organizers asked me to lecture about high performance computing and numerical modelling in this winter school, and to specifically cover the basics of numerically treating gravity and hydrodynamics in the context of galaxy evolution. This is still a vast field, and I necessarily had to select a subset ...

  5. A Knowledge Driven Computational Visual Attention Model

    Directory of Open Access Journals (Sweden)

    Joseph Amudha

    2011-05-01

    Full Text Available Computational Visual System face complex processing problems as there is a large amount of information to be processed and it is difficult to achieve higher efficiency in par with human system. In order to reduce the complexity involved in determining the saliency region, decomposition of image into several parts based on specific location is done and decomposed part is passed for higher level computations in determining the saliency region with assigning priority to the specific color in RGB model depending on application. These properties are interpreted from the user using the Natural Language Processing and then interfaced with vision using Language Perceptional Translator (LPT. The model is designed for a robot to search a specific object in a real time environment without compromising the computational speed in determining the Most Salient Region.

  6. Applied Mathematics, Modelling and Computational Science

    CERN Document Server

    Kotsireas, Ilias; Makarov, Roman; Melnik, Roderick; Shodiev, Hasan

    2015-01-01

    The Applied Mathematics, Modelling, and Computational Science (AMMCS) conference aims to promote interdisciplinary research and collaboration. The contributions in this volume cover the latest research in mathematical and computational sciences, modeling, and simulation as well as their applications in natural and social sciences, engineering and technology, industry, and finance. The 2013 conference, the second in a series of AMMCS meetings, was held August 26–30 and organized in cooperation with AIMS and SIAM, with support from the Fields Institute in Toronto, and Wilfrid Laurier University. There were many young scientists at AMMCS-2013, both as presenters and as organizers. This proceedings contains refereed papers contributed by the participants of the AMMCS-2013 after the conference. This volume is suitable for researchers and graduate students, mathematicians and engineers, industrialists, and anyone who would like to delve into the interdisciplinary research of applied and computational mathematics ...

  7. Computer Aided Modelling – Opportunities and Challenges

    DEFF Research Database (Denmark)

    Cameron, Ian; Gani, Rafiqul

    2011-01-01

    easily generate new models from underlying phenomena continues to be a challenge, especially in the face of time and cost constraints.Integrated frameworks that allow flexibility of model development and access to a range of embedded tools are central to future model developments. The challenges and......This chapter considers the opportunities that are present in developing, extending and applying aspects of computer-aided modelling principles and practice. What are the best tasks to be done by modellers and what needs the application of CAPE tools? How do we efficiently develop model......-based solutions to significant problems? The important issues of workflow and data flow are discussed together with fit-for-purpose model development. As well, the lack of tools around multiscale modelling provides opportunities for the development of efficient tools to address such challenges. The ability to...

  8. Modeling inputs to computer models used in risk assessment

    International Nuclear Information System (INIS)

    Computer models for various risk assessment applications are closely scrutinized both from the standpoint of questioning the correctness of the underlying mathematical model with respect to the process it is attempting to model and from the standpoint of verifying that the computer model correctly implements the underlying mathematical model. A process that receives less scrutiny, but is nonetheless of equal importance, concerns the individual and joint modeling of the inputs. This modeling effort clearly has a great impact on the credibility of results. Model characteristics are reviewed in this paper that have a direct bearing on the model input process and reasons are given for using probabilities-based modeling with the inputs. The authors also present ways to model distributions for individual inputs and multivariate input structures when dependence and other constraints may be present

  9. Modeling Computations in a Semantic Network

    CERN Document Server

    Rodriguez, Marko A

    2007-01-01

    Semantic network research has seen a resurgence from its early history in the cognitive sciences with the inception of the Semantic Web initiative. The Semantic Web effort has brought forth an array of technologies that support the encoding, storage, and querying of the semantic network data structure at the world stage. Currently, the popular conception of the Semantic Web is that of a data modeling medium where real and conceptual entities are related in semantically meaningful ways. However, new models have emerged that explicitly encode procedural information within the semantic network substrate. With these new technologies, the Semantic Web has evolved from a data modeling medium to a computational medium. This article provides a classification of existing computational modeling efforts and the requirements of supporting technologies that will aid in the further growth of this burgeoning domain.

  10. STEW: A Nonlinear Data Modeling Computer Program

    International Nuclear Information System (INIS)

    A nonlinear data modeling computer program, STEW, employing the Levenberg-Marquardt algorithm, has been developed to model the experimental 239Pu(n,f) and 235U(n,f) cross sections. This report presents results of the modeling of the 239Pu(n,f) and 235U(n,f) cross-section data. The calculation of the fission transmission coefficient is based on the double-humped-fission-barrier model of Bjornholm and Lynn. Incident neutron energies of up to 5 MeV are considered

  11. Logic modelling in computer-aided design

    OpenAIRE

    Bijl, A.

    1986-01-01

    Research into a generalized logic modelling system linked to machine interpretation of drawings and text is described. This work is related to a view of design and builds on experience of working integrated design systems. Questions are posed for future computer-aided design systems.

  12. Images as a basis for computer modelling

    Science.gov (United States)

    Beaufils, D.; LeTouzé, J.-C.; Blondel, F.-M.

    1994-03-01

    New computer technologies such as the graphics data tablet, video digitization and numerical methods, can be used for measurement and mathematical modelling in physics. Two programs dealing with newtonian mechanics and some of related scientific activities for A-level students are described.

  13. Integer Programming Models for Computational Biology Problems

    Institute of Scientific and Technical Information of China (English)

    Giuseppe Lancia

    2004-01-01

    The recent years have seen an impressive increase in the use of Integer Programming models for the solution of optimization problems originating in Molecular Biology. In this survey, some of the most successful Integer Programming approaches are described, while a broad overview of application areas being is given in modern Computational Molecular Biology.

  14. An Impulse Model for Computer Viruses

    OpenAIRE

    Chunming Zhang; Yun Zhao; Yingjiang Wu

    2012-01-01

    Computer virus spread model concerning impulsive control strategy is proposed and analyzed. We prove that there exists a globally attractive infection-free periodic solution when the vaccination rate is larger than θ0. Moreover, we show that the system is uniformly persistent if the vaccination rate is less than θ1. Some numerical simulations are finally given to illustrate the main results.

  15. A Stochastic Dynamic Model of Computer Viruses

    OpenAIRE

    Chunming Zhang; Yun Zhao; Yingjiang Wu; Shuwen Deng

    2012-01-01

    A stochastic computer virus spread model is proposed and its dynamic behavior is fully investigated. Specifically, we prove the existence and uniqueness of positive solutions, and the stability of the virus-free equilibrium and viral equilibrium by constructing Lyapunov functions and applying Ito's formula. Some numerical simulations are finally given to illustrate our main results.

  16. A Framework for Hybrid Computational Models

    Czech Academy of Sciences Publication Activity Database

    Neruda, Roman

    2003-01-01

    Roč. 2, č. 4 (2003), s. 868-873. ISSN 1109-2750 R&D Projects: GA ČR(CZ) GA526/03/Z042; GA ČR(CZ) GA201/01/1192 Institutional research plan: CEZ:AV0Z1030915 Keywords : multi - agent system s * hybrid computational models Subject RIV: BA - General Mathematics

  17. Applied modelling and computing in social science

    CERN Document Server

    Povh, Janez

    2015-01-01

    In social science outstanding results are yielded by advanced simulation methods, based on state of the art software technologies and an appropriate combination of qualitative and quantitative methods. This book presents examples of successful applications of modelling and computing in social science: business and logistic process simulation and optimization, deeper knowledge extractions from big data, better understanding and predicting of social behaviour and modelling health and environment changes.

  18. A Multilayer Model of Computer Networks

    OpenAIRE

    Shchurov, Andrey A.

    2015-01-01

    The fundamental concept of applying the system methodology to network analysis declares that network architecture should take into account services and applications which this network provides and supports. This work introduces a formal model of computer networks on the basis of the hierarchical multilayer networks. In turn, individual layers are represented as multiplex networks. The concept of layered networks provides conditions of top-down consistency of the model. Next, we determined the...

  19. Security Protocol Verification: Symbolic and Computational Models

    OpenAIRE

    Blanchet, Bruno

    2012-01-01

    Security protocol verification has been a very active research area since the 1990s. This paper surveys various approaches in this area, considering the verification in the symbolic model, as well as the more recent approaches that rely on the computational model or that verify protocol implementations rather than specifications. Additionally, we briefly describe our symbolic security protocol verifier ProVerif and situate it among these approaches.

  20. Automating sensitivity analysis of computer models using computer calculus

    International Nuclear Information System (INIS)

    An automated procedure for performing sensitivity analysis has been developed. The procedure uses a new FORTRAN compiler with computer calculus capabilities to generate the derivatives needed to set up sensitivity equations. The new compiler is called GRESS - Gradient Enhanced Software System. Application of the automated procedure with direct and adjoint sensitivity theory for the analysis of non-linear, iterative systems of equations is discussed. Calculational efficiency consideration and techniques for adjoint sensitivity analysis are emphasized. The new approach is found to preserve the traditional advantages of adjoint theory while removing the tedious human effort previously needed to apply this theoretical methodology. Conclusions are drawn about the applicability of the automated procedure in numerical analysis and large-scale modelling sensitivity studies

  1. Automating sensitivity analysis of computer models using computer calculus

    International Nuclear Information System (INIS)

    An automated procedure for performing sensitivity analyses has been developed. The procedure uses a new FORTRAN compiler with computer calculus capabilities to generate the derivatives needed to set up sensitivity equations. The new compiler is called GRESS - Gradient Enhanced Software System. Application of the automated procedure with ''direct'' and ''adjoint'' sensitivity theory for the analysis of non-linear, iterative systems of equations is discussed. Calculational efficiency consideration and techniques for adjoint sensitivity analysis are emphasized. The new approach is found to preserve the traditional advantages of adjoint theory while removing the tedious human effort previously needed to apply this theoretical methodology. Conclusions are drawn about the applicability of the automated procedure in numerical analysis and large-scale modelling sensitivity studies. 24 refs., 2 figs

  2. The Effect of Physical Attractiveness of Models on Advertising Effectiveness for Male and Female Adolescents

    Science.gov (United States)

    Tsai, Chia-Ching; Chang, Chih-Hsiang

    2007-01-01

    This study investigates the effect of advertising with physically attractive models on male and female adolescents. The findings suggest that highly attractive models are less effective than those who are normally attractive. Implications of social comparison are discussed.

  3. Parallel Computing Applications and Financial Modelling

    Directory of Open Access Journals (Sweden)

    Heather M. Liddell

    2004-01-01

    Full Text Available At Queen Mary, University of London, we have over twenty years of experience in Parallel Computing Applications, mostly on "massively parallel systems", such as the Distributed Array Processors (DAPs. The applications in which we were involved included design of numerical subroutine libraries, Finite Element software, graphics tools, the physics of organic materials, medical imaging, computer vision and more recently, Financial modelling. Two of the projects related to the latter are described in this paper, namely Portfolio Optimisation and Financial Risk Assessment.

  4. Computer Model Of Fragmentation Of Atomic Nuclei

    Science.gov (United States)

    Wilson, John W.; Townsend, Lawrence W.; Tripathi, Ram K.; Norbury, John W.; KHAN FERDOUS; Badavi, Francis F.

    1995-01-01

    High Charge and Energy Semiempirical Nuclear Fragmentation Model (HZEFRG1) computer program developed to be computationally efficient, user-friendly, physics-based program for generating data bases on fragmentation of atomic nuclei. Data bases generated used in calculations pertaining to such radiation-transport applications as shielding against radiation in outer space, radiation dosimetry in outer space, cancer therapy in laboratories with beams of heavy ions, and simulation studies for designing detectors for experiments in nuclear physics. Provides cross sections for production of individual elements and isotopes in breakups of high-energy heavy ions by combined nuclear and Coulomb fields of interacting nuclei. Written in ANSI FORTRAN 77.

  5. Hidden Markov models applications in computer vision

    CERN Document Server

    Bunke, H

    2001-01-01

    Hidden Markov models (HMMs) originally emerged in the domain of speech recognition. In recent years, they have attracted growing interest in the area of computer vision as well. This book is a collection of articles on new developments in the theory of HMMs and their application in computer vision. It addresses topics such as handwriting recognition, shape recognition, face and gesture recognition, tracking, and image database retrieval.This book is also published as a special issue of the International Journal of Pattern Recognition and Artificial Intelligence (February 2001).

  6. Modeling problem behaviors in a nationally representative sample of adolescents.

    Science.gov (United States)

    O'Connor, Kate L; Dolphin, Louise; Fitzgerald, Amanda; Dooley, Barbara

    2016-07-01

    Research on multiple problem behaviors has focused on the concept of Problem Behavior Syndrome (PBS). Problem Behavior Theory (PBT) is a complex and comprehensive social-psychological framework designed to explain the development of a range of problem behaviors. This study examines the structure of PBS and the applicability of PBT in adolescents. Participants were 6062 adolescents; aged 12-19 (51.3% female) who took part in the My World Survey-Second Level (MWS-SL). Regarding PBS, Confirmatory Factor Analysis established that problem behaviors, such as alcohol and drug use loaded significantly onto a single, latent construct for males and females. Using Structural Equation Modeling, the PBT framework was found to be a good fit for males and females. Socio-demographic, perceived environment system and personality accounted for over 40% of the variance in problem behaviors for males and females. Our findings have important implications for understanding how differences in engaging in problem behaviors vary by gender. PMID:27161989

  7. Alcohol Consumption Among Scholarized Adolescents: A Socio-Communitarian Model

    Directory of Open Access Journals (Sweden)

    María Elena Villarreal-González

    2010-12-01

    Full Text Available The aim of this study is to analyze the relationships that the individual, family, social and school variables have with the risk of alcohol consumption among adolescents. This is an explanatory causal study. The sample consisted of 1,245 adolescents of both sexes drawn from two secondary level and two pre-university level educational institutions, and were all aged between 12 and 17 years old. Stratified probability sampling was used, taking into account the proportion of students in each grade, level, group and timetable. To analyze the data, a structural equation model was calculated that explained 66% of the variance. The results showed that community social support and family functioning were indirectly related to alcohol consumption. The former was positively and significantly related, through friends’ support and also alcohol use by family and friends, while the latter was related through two paths: firstly, a positive and significant relationship, with family support and alcohol use by family and friends and, secondly, positively through school adjustment and school self-esteem which was negatively related with alcohol consumption. A significant and positive relationship was also observed between family functioning and social support. The results are discussed in terms of the most relevant studies on the subject of this research and the methodological limitations of this study are also considered.

  8. Computational modelling of evolution: ecosystems and language

    CERN Document Server

    Lipowski, Adam

    2008-01-01

    Recently, computational modelling became a very important research tool that enables us to study problems that for decades evaded scientific analysis. Evolutionary systems are certainly examples of such problems: they are composed of many units that might reproduce, diffuse, mutate, die, or in some cases for example communicate. These processes might be of some adaptive value, they influence each other and occur on various time scales. That is why such systems are so difficult to study. In this paper we briefly review some computational approaches, as well as our contributions, to the evolution of ecosystems and language. We start from Lotka-Volterra equations and the modelling of simple two-species prey-predator systems. Such systems are canonical example for studying oscillatory behaviour in competitive populations. Then we describe various approaches to study long-term evolution of multi-species ecosystems. We emphasize the need to use models that take into account both ecological and evolutionary processe...

  9. Computer Aided Design Modeling for Heterogeneous Objects

    Directory of Open Access Journals (Sweden)

    Vikas Gupta

    2010-03-01

    Full Text Available Heterogeneous object design is an active research area in recent years. The conventional CAD modeling approaches only provide geometry and topology of the object, but do not contain any information with regard to the materials of the object and so can not be used for the fabrication of heterogeneous objects (HO through rapid prototyping. Current research focuses on computer-aided design issues in heterogeneous object design. A new CAD modeling approach is proposed to integrate the material information into geometric regions thus model the material distributions in the heterogeneous object. The gradient references are used to represent the complex geometry heterogeneous objects which have simultaneous geometry intricacies and accurate material distributions. The gradient references helps in flexible manipulability and control to heterogeneous objects, which guarantees the local control over gradient regions of developed heterogeneous objects. A systematic approach on data flow, processing, computer visualization, and slicing of heterogeneous objects for rapid prototyping is also presented.

  10. Computer Aided Design Modeling for Heterogeneous Objects

    CERN Document Server

    Gupta, Vikas; Tandon, Puneet

    2010-01-01

    Heterogeneous object design is an active research area in recent years. The conventional CAD modeling approaches only provide geometry and topology of the object, but do not contain any information with regard to the materials of the object and so can not be used for the fabrication of heterogeneous objects (HO) through rapid prototyping. Current research focuses on computer-aided design issues in heterogeneous object design. A new CAD modeling approach is proposed to integrate the material information into geometric regions thus model the material distributions in the heterogeneous object. The gradient references are used to represent the complex geometry heterogeneous objects which have simultaneous geometry intricacies and accurate material distributions. The gradient references helps in flexible manipulability and control to heterogeneous objects, which guarantees the local control over gradient regions of developed heterogeneous objects. A systematic approach on data flow, processing, computer visualizat...

  11. Queuing theory models for computer networks

    Science.gov (United States)

    Galant, David C.

    1989-01-01

    A set of simple queuing theory models which can model the average response of a network of computers to a given traffic load has been implemented using a spreadsheet. The impact of variations in traffic patterns and intensities, channel capacities, and message protocols can be assessed using them because of the lack of fine detail in the network traffic rates, traffic patterns, and the hardware used to implement the networks. A sample use of the models applied to a realistic problem is included in appendix A. Appendix B provides a glossary of terms used in this paper. This Ames Research Center computer communication network is an evolving network of local area networks (LANs) connected via gateways and high-speed backbone communication channels. Intelligent planning of expansion and improvement requires understanding the behavior of the individual LANs as well as the collection of networks as a whole.

  12. Stress in adolescents with a chronically ill parent: inspiration from Rolland's Family Systems-Illness model

    NARCIS (Netherlands)

    D.S. Sieh; A.L.C. Dikkers; J.M.A. Visser-Meily; A.M. Meijer

    2012-01-01

    This article was inspired by Rolland’s Family Systems-Illness (FSI) model, aiming to predict adolescent stress as a function of parental illness type. Ninety-nine parents with a chronic medical condition, 82 partners, and 158 adolescent children (51 % girls; mean age = 15.1 years) participated in th

  13. An Adolescent Nutrition Learning Model to Facilitate Behavior Change in Overweight Teens

    Science.gov (United States)

    Young, Kimberly J.; Ramsay, Samantha A.; Holyoke, Laura B.

    2016-01-01

    Understanding the process by which adolescents learn about nutrition is necessary for developing tailored education that leads to sustainable behavior change. Teens aged 15-17 participating in an obesity prevention program were interviewed. From the data, three themes emerged and informed development of an adolescent nutrition learning model. The…

  14. Longitudinal Prediction of Adolescent Nonsuicidal Self-Injury: Examination of a Cognitive Vulnerability-Stress Model

    Science.gov (United States)

    Guerry, John D.; Prinstein, Mitchell J.

    2010-01-01

    Virtually no longitudinal research has examined psychological characteristics or events that may lead to adolescent nonsuicidal self-injury (NSSI). This study tested a cognitive vulnerability-stress model as a predictor of NSSI trajectories. Clinically-referred adolescents (n = 143; 72% girls) completed measures of NSSI, depression, attributional…

  15. Self-Esteem and Delinquency in South Korean Adolescents: Latent Growth Modeling

    Science.gov (United States)

    Lee, Kyungeun; Lee, Julie

    2012-01-01

    This study examined the inter-related development of self-esteem and delinquency across three years. Participants were 3449 Korean high school adolescents (age M = 15.8, SD = 0.42, 1725 boys, 1724 girls) from Korea Youth Panel Study (KYPS), in 2005-2007, nationally representative of Korean adolescents. Latent growth modeling was employed for…

  16. Parent and Adolescent Responses to Poverty Related Stress: Tests of Mediated and Moderated Coping Models

    Science.gov (United States)

    Wadsworth, Martha E.; Raviv, Tali; Compas, Bruce E.; Connor-Smith, Jennifer K.

    2005-01-01

    We tested several models of the associations among economic strain, life stress, coping, involuntary stress responses, and psychological symptoms in a sample of 57 parent-adolescent dyads from rural, lower-income families. Economic strain and life stress predicted symptoms for both parents and adolescents. Stressor-symptom specificity was found…

  17. The biopsychosocial model of stress in adolescence: self-awareness of performance versus stress reactivity

    OpenAIRE

    Rith-Najarian, Leslie R.; McLaughlin, Katie A.; Sheridan, Margaret A.; Nock, Matthew K.

    2014-01-01

    Extensive research among adults supports the biopsychosocial (BPS) model of challenge and threat, which describes relationships among stress appraisals, physiological stress reactivity, and performance; however, no previous studies have examined these relationships in adolescents. Perceptions of stressors as well as physiological reactivity to stress increase during adolescence, highlighting the importance of understanding the relationships among stress appraisals, physiological reactivity, a...

  18. A Qualitative Study of Parental Modeling and Social Support for Physical Activity in Underserved Adolescents

    Science.gov (United States)

    Wright, Marcie S.; Wilson, Dawn K.; Griffin, Sarah; Evans, Alexandra

    2010-01-01

    This study obtained qualitative data to assess how parental role modeling and parental social support influence physical activity in underserved (minority, low-income) adolescents. Fifty-two adolescents (22 males, 30 females; ages 10-14 years, 85% African-American) participated in a focus group (6-10 per group, same gender). Focus groups were…

  19. Using the Integrative Model to Explain How Exposure to Sexual Media Content Influences Adolescent Sexual Behavior

    Science.gov (United States)

    Bleakley, Amy; Hennessy, Michael; Fishbein, Martin; Jordan, Amy

    2011-01-01

    Published research demonstrates an association between exposure to media sexual content and a variety of sex-related outcomes for adolescents. What is not known is the mechanism through which sexual content produces this "media effect" on adolescent beliefs, attitudes, and behavior. Using the Integrative Model of Behavioral Prediction, this…

  20. Multivariate Models of Parent-Late Adolescent Gender Dyads: The Importance of Parenting Processes in Predicting Adjustment

    Science.gov (United States)

    McKinney, Cliff; Renk, Kimberly

    2008-01-01

    Although parent-adolescent interactions have been examined, relevant variables have not been integrated into a multivariate model. As a result, this study examined a multivariate model of parent-late adolescent gender dyads in an attempt to capture important predictors in late adolescents' important and unique transition to adulthood. The sample…

  1. Computer Modelling of 3D Geological Surface

    Directory of Open Access Journals (Sweden)

    Kodge B. G.

    2011-02-01

    Full Text Available The geological surveying presently uses methods and tools for the computer modeling of 3D-structures of the geographical subsurface and geotechnical characterization as well as the application of geoinformation systems for management and analysis of spatial data, and their cartographic presentation. The objectives of this paper are to present a 3D geological surface model of Latur district in Maharashtra state of India. This study is undertaken through the several processes which are discussed in this paper to generate and visualize the automated 3D geological surface model of a projected area.

  2. Computer Modelling of 3D Geological Surface

    CERN Document Server

    Kodge, B G

    2011-01-01

    The geological surveying presently uses methods and tools for the computer modeling of 3D-structures of the geographical subsurface and geotechnical characterization as well as the application of geoinformation systems for management and analysis of spatial data, and their cartographic presentation. The objectives of this paper are to present a 3D geological surface model of Latur district in Maharashtra state of India. This study is undertaken through the several processes which are discussed in this paper to generate and visualize the automated 3D geological surface model of a projected area.

  3. Computational Modeling of Pollution Transmission in Rivers

    Science.gov (United States)

    Parsaie, Abbas; Haghiabi, Amir Hamzeh

    2015-08-01

    Modeling of river pollution contributes to better management of water quality and this will lead to the improvement of human health. The advection dispersion equation (ADE) is the government equation on pollutant transmission in the river. Modeling the pollution transmission includes numerical solution of the ADE and estimating the longitudinal dispersion coefficient (LDC). In this paper, a novel approach is proposed for numerical modeling of the pollution transmission in rivers. It is related to use both finite volume method as numerical method and artificial neural network (ANN) as soft computing technique together in simulation. In this approach, the result of the ANN for predicting the LDC was considered as input parameter for the numerical solution of the ADE. To validate the model performance in real engineering problems, the pollutant transmission in Severn River has been simulated. Comparison of the final model results with measured data of the Severn River showed that the model has good performance. Predicting the LDC by ANN model significantly improved the accuracy of computer simulation of the pollution transmission in river.

  4. The Effect of Computer Usage in Internet Café on Cigarette Smoking and Alcohol Use among Chinese Adolescents and Youth: A Longitudinal Study

    Directory of Open Access Journals (Sweden)

    Jorge Delva

    2012-02-01

    Full Text Available We used longitudinal data to investigate the relationship between computer use in internet cafés and smoking/drinking behavior among Chinese adolescents and young adults. Data are from two waves of the China Health and Nutrition Survey (2004 and 2006. Fixed effects models were used to examine if changes in internet café use were associated with changes in cigarette smoking and drinking of alcohol. Male café users spent on average 17.3 hours in front of the computer/week. This was associated with an increase in the probability of being a current smoker by 13.3% and with smoking 1.7 more cigarettes. Female café users spent on average 11 hours on the computer/week. This was associated with an increase in the probability of drinking wine and/or liquor by 14.74% and was not associated with smoking. Internet cafés are an important venue by which adolescent and young adults in China are exposed to smoking and drinking. Multi-component interventions are needed ranging from policies regulating cigarette and alcohol availability in these venues to anti-tobacco campaigns aimed at the general population but also at individuals who frequent these establishments.

  5. Analysis of a Model for Computer Virus Transmission

    OpenAIRE

    Peng Qin

    2015-01-01

    Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our t...

  6. Computational Models for Analysis of Illicit Activities

    DEFF Research Database (Denmark)

    Nizamani, Sarwat

    devise policies to minimize them. These activities include cybercrimes, terrorist attacks or violent actions in response to certain world issues. Beside such activities, there are several other related activities worth analyzing, for which computational models have been presented in this thesis....... These models include a model for analyzing evolution of terrorist networks; a text classification model for detecting suspicious text and identification of suspected authors of anonymous emails; and a semantic analysis model for news reports, which may help analyze the illicit activities in certain area...... with location and temporal information. For the network evolution, the hierarchical agglomerative clustering approach has been applied to terrorist networks as case studies. The networks' evolutions show that how individual actors who are initially isolated from each other are converted in small groups, which...

  7. Computational hemodynamics theory, modelling and applications

    CERN Document Server

    Tu, Jiyuan; Wong, Kelvin Kian Loong

    2015-01-01

    This book discusses geometric and mathematical models that can be used to study fluid and structural mechanics in the cardiovascular system.  Where traditional research methodologies in the human cardiovascular system are challenging due to its invasive nature, several recent advances in medical imaging and computational fluid and solid mechanics modelling now provide new and exciting research opportunities. This emerging field of study is multi-disciplinary, involving numerical methods, computational science, fluid and structural mechanics, and biomedical engineering. Certainly any new student or researcher in this field may feel overwhelmed by the wide range of disciplines that need to be understood. This unique book is one of the first to bring together knowledge from multiple disciplines, providing a starting point to each of the individual disciplines involved, attempting to ease the steep learning curve. This book presents elementary knowledge on the physiology of the cardiovascular system; basic knowl...

  8. Computer modeling of a compact isochronous cyclotron

    Science.gov (United States)

    Smirnov, V. L.

    2015-11-01

    The computer modeling methods of a compact isochronous cyclotron are described. The main stages of analysis of accelerator facilities systems are considered. The described methods are based on theoretical fundamentals of cyclotron physics and mention highlights of creation of the physical project of a compact cyclotron. The main attention is paid to the analysis of the beam dynamics, formation of a magnetic field, stability of the movement, and a realistic assessment of intensity of the generated bunch of particles. In the article, the stages of development of the accelerator computer model, analytical ways of assessment of the accelerator parameters, and the basic technique of the numerical analysis of dynamics of the particles are described.

  9. Computer modeling of flocculated multicomponent systems

    Energy Technology Data Exchange (ETDEWEB)

    Dabros, T. [Natural Resources Canada, CANMET Advanced Separation Technologies Laboratory, Devon, AB (Canada)

    2004-07-01

    The phenomenological models of settling and sediment consolidation were presented along with efficient and accurate numerical methods of solving conservation laws. This presentation provides project results and conclusions and future work in sand consolidation. It contains information on the hindered settling of multicomponent systems; hindered settling and consolidation including numerical results; and modeling multiphase flow using computational dynamics (CFD), a computer-based tool for simulating the behavior of systems involving fluid flow, heat transfer and other related physical processes. Efficient and accurate algorithms were recently developed to handle a wide class of conservation laws problems. It was concluded that solid effective stress can be accounted for in the continuity equation and excess pore pressure can be calculated from the solids concentration profile. tabs., figs.

  10. Computational fluid dynamics modelling in cardiovascular medicine.

    Science.gov (United States)

    Morris, Paul D; Narracott, Andrew; von Tengg-Kobligk, Hendrik; Silva Soto, Daniel Alejandro; Hsiao, Sarah; Lungu, Angela; Evans, Paul; Bressloff, Neil W; Lawford, Patricia V; Hose, D Rodney; Gunn, Julian P

    2016-01-01

    This paper reviews the methods, benefits and challenges associated with the adoption and translation of computational fluid dynamics (CFD) modelling within cardiovascular medicine. CFD, a specialist area of mathematics and a branch of fluid mechanics, is used routinely in a diverse range of safety-critical engineering systems, which increasingly is being applied to the cardiovascular system. By facilitating rapid, economical, low-risk prototyping, CFD modelling has already revolutionised research and development of devices such as stents, valve prostheses, and ventricular assist devices. Combined with cardiovascular imaging, CFD simulation enables detailed characterisation of complex physiological pressure and flow fields and the computation of metrics which cannot be directly measured, for example, wall shear stress. CFD models are now being translated into clinical tools for physicians to use across the spectrum of coronary, valvular, congenital, myocardial and peripheral vascular diseases. CFD modelling is apposite for minimally-invasive patient assessment. Patient-specific (incorporating data unique to the individual) and multi-scale (combining models of different length- and time-scales) modelling enables individualised risk prediction and virtual treatment planning. This represents a significant departure from traditional dependence upon registry-based, population-averaged data. Model integration is progressively moving towards 'digital patient' or 'virtual physiological human' representations. When combined with population-scale numerical models, these models have the potential to reduce the cost, time and risk associated with clinical trials. The adoption of CFD modelling signals a new era in cardiovascular medicine. While potentially highly beneficial, a number of academic and commercial groups are addressing the associated methodological, regulatory, education- and service-related challenges. PMID:26512019

  11. Factor Markets in General Computable Equilibrium Models

    OpenAIRE

    Banse, Martin; Shutes, Lindsay; Dixon, Peter; van Meijl, Hans; Rimmer, Maureen; Tabeau, Andrzej; Geert WOLTJER; Rothe, Andrea

    2013-01-01

    One objective of Computable general equilibrium (CGE) models is the analysis of economy-wide effects of policy measures. The focus of the Factor Markets project is to analyse the functioning of factor markets for agriculture in the EU-27, including the Candidate Countries. While agricultural and food markets are fully integrated in a European single market, subject to an EU-wide common policy, the Common Agricultural Policy (CAP), this is not the case for the agricultural factor markets capit...

  12. Computer modelling of superconductive fault current limiters

    Energy Technology Data Exchange (ETDEWEB)

    Weller, R.A.; Campbell, A.M.; Coombs, T.A.; Cardwell, D.A.; Storey, R.J. [Cambridge Univ. (United Kingdom). Interdisciplinary Research Centre in Superconductivity (IRC); Hancox, J. [Rolls Royce, Applied Science Division, Derby (United Kingdom)

    1998-05-01

    Investigations are being carried out on the use of superconductors for fault current limiting applications. A number of computer programs are being developed to predict the behavior of different `resistive` fault current limiter designs under a variety of fault conditions. The programs achieve solution by iterative methods based around real measured data rather than theoretical models in order to achieve accuracy at high current densities. (orig.) 5 refs.

  13. Method of generating a computer readable model

    DEFF Research Database (Denmark)

    2008-01-01

    A method of generating a computer readable model of a geometrical object constructed from a plurality of interconnectable construction elements, wherein each construction element has a number of connection elements for connecting the construction element with another construction element. The...... method comprises encoding a first and a second one of the construction elements as corresponding data structures, each representing the connection elements of the corresponding construction element, and each of the connection elements having associated with it a predetermined connection type. The method...

  14. Computational modelling of evolution: ecosystems and language

    OpenAIRE

    Lipowski, Adam; Lipowska, Dorota

    2008-01-01

    Recently, computational modelling became a very important research tool that enables us to study problems that for decades evaded scientific analysis. Evolutionary systems are certainly examples of such problems: they are composed of many units that might reproduce, diffuse, mutate, die, or in some cases for example communicate. These processes might be of some adaptive value, they influence each other and occur on various time scales. That is why such systems are so difficult to study. In th...

  15. A trust model for cloud computing environment

    OpenAIRE

    Branco, T. T.; Santos, Henrique

    2015-01-01

    This paper presents a proposal for a management model based on reliability requirements concerning Cloud Computing (CC). The proposal was based on a literature review focused on the problems, challenges and underway studies related to the safety and reliability of Information Systems (IS) in this technological environment. This literature review examined the existing obstacles and challenges from the point of view of respected authors on the subject. The main issues are addressed and structur...

  16. Computational modeling of appraisal theory of emotion

    OpenAIRE

    Meuleman, Ben

    2015-01-01

    Appraisal theories of emotion have proposed detailed—and causal—hypotheses about the connection between situations and emotional responding, and between the components that constitute emotional responding. Many of these hypotheses present computational challenges to scientific research, in that they require the analysis of numerous mental and bodily changes simultaneously over time. In this thesis, I applied statistical models of machine learning to address these challenges, and to investigat...

  17. COMPUTATIONAL MODELING OF CIRCULATING FLUIDIZED BED REACTORS

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, Essam A

    2013-01-09

    Details of numerical simulations of two-phase gas-solid turbulent flow in the riser section of Circulating Fluidized Bed Reactor (CFBR) using Computational Fluid Dynamics (CFD) technique are reported. Two CFBR riser configurations are considered and modeled. Each of these two riser models consist of inlet, exit, connecting elbows and a main pipe. Both riser configurations are cylindrical and have the same diameter but differ in their inlet lengths and main pipe height to enable investigation of riser geometrical scaling effects. In addition, two types of solid particles are exploited in the solid phase of the two-phase gas-solid riser flow simulations to study the influence of solid loading ratio on flow patterns. The gaseous phase in the two-phase flow is represented by standard atmospheric air. The CFD-based FLUENT software is employed to obtain steady state and transient solutions for flow modulations in the riser. The physical dimensions, types and numbers of computation meshes, and solution methodology utilized in the present work are stated. Flow parameters, such as static and dynamic pressure, species velocity, and volume fractions are monitored and analyzed. The differences in the computational results between the two models, under steady and transient conditions, are compared, contrasted, and discussed.

  18. Analytical performance modeling for computer systems

    CERN Document Server

    Tay, Y C

    2013-01-01

    This book is an introduction to analytical performance modeling for computer systems, i.e., writing equations to describe their performance behavior. It is accessible to readers who have taken college-level courses in calculus and probability, networking and operating systems. This is not a training manual for becoming an expert performance analyst. Rather, the objective is to help the reader construct simple models for analyzing and understanding the systems that they are interested in.Describing a complicated system abstractly with mathematical equations requires a careful choice of assumpti

  19. Computer modelling for LOCA analysis in PHWRs

    International Nuclear Information System (INIS)

    A computer code THYNAC developed for analysis of thermal hydraulic transient phenomena during LOCA in the PHWR type reactor and primary coolant system is described. The code predicts coolant voiding rate in the core, coolant discharge rate from the break, primary system depressurization history and temperature history of both fuel and fuel clad. Reactor system is modelled as a set of connected fluid segments which represent piping, feeders, coolant channels, etc. Method of finite difference is used in the code. Modelling of various specific phenomena e.g. two-phase pressure drop, slip flow, pumps etc. in the code is described. (M.G.B.)

  20. Cloud Computing, Tieto Cloud Server Model

    OpenAIRE

    Suikkanen, Saara

    2013-01-01

    The purpose of this study is to find out what is cloud computing. To be able to make wise decisions when moving to cloud or considering it, companies need to understand what cloud is consists of. Which model suits best to they company, what should be taken into account before moving to cloud, what is the cloud broker role and also SWOT analysis of cloud? To be able to answer customer requirements and business demands, IT companies should develop and produce new service models. IT house T...

  1. ADGEN: ADjoint GENerator for computer models

    International Nuclear Information System (INIS)

    This paper presents the development of a FORTRAN compiler and an associated supporting software library called ADGEN. ADGEN reads FORTRAN models as input and produces and enhanced version of the input model. The enhanced version reproduces the original model calculations but also has the capability to calculate derivatives of model results of interest with respect to any and all of the model data and input parameters. The method for calculating the derivatives and sensitivities is the adjoint method. Partial derivatives are calculated analytically using computer calculus and saved as elements of an adjoint matrix on direct assess storage. The total derivatives are calculated by solving an appropriate adjoint equation. ADGEN is applied to a major computer model of interest to the Low-Level Waste Community, the PRESTO-II model. PRESTO-II sample problem results reveal that ADGEN correctly calculates derivatives of response of interest with respect to 300 parameters. The execution time to create the adjoint matrix is a factor of 45 times the execution time of the reference sample problem. Once this matrix is determined, the derivatives with respect to 3000 parameters are calculated in a factor of 6.8 that of the reference model for each response of interest. For a single 3000 for determining these derivatives by parameter perturbations. The automation of the implementation of the adjoint technique for calculating derivatives and sensitivities eliminates the costly and manpower-intensive task of direct hand-implementation by reprogramming and thus makes the powerful adjoint technique more amenable for use in sensitivity analysis of existing models. 20 refs., 1 fig., 5 tabs

  2. Computational acoustic modeling of cetacean vocalizations

    Science.gov (United States)

    Gurevich, Michael Dixon

    A framework for computational acoustic modeling of hypothetical vocal production mechanisms in cetaceans is presented. As a specific example, a model of a proposed source in the larynx of odontocetes is developed. Whales and dolphins generate a broad range of vocal sounds, but the exact mechanisms they use are not conclusively understood. In the fifty years since it has become widely accepted that whales can and do make sound, how they do so has remained particularly confounding. Cetaceans' highly divergent respiratory anatomy, along with the difficulty of internal observation during vocalization have contributed to this uncertainty. A variety of acoustical, morphological, ethological and physiological evidence has led to conflicting and often disputed theories of the locations and mechanisms of cetaceans' sound sources. Computational acoustic modeling has been used to create real-time parametric models of musical instruments and the human voice. These techniques can be applied to cetacean vocalizations to help better understand the nature and function of these sounds. Extensive studies of odontocete laryngeal morphology have revealed vocal folds that are consistently similar to a known but poorly understood acoustic source, the ribbon reed. A parametric computational model of the ribbon reed is developed, based on simplified geometrical, mechanical and fluid models drawn from the human voice literature. The physical parameters of the ribbon reed model are then adapted to those of the odontocete larynx. With reasonable estimates of real physical parameters, both the ribbon reed and odontocete larynx models produce sounds that are perceptually similar to their real-world counterparts, and both respond realistically under varying control conditions. Comparisons of acoustic features of the real-world and synthetic systems show a number of consistencies. While this does not on its own prove that either model is conclusively an accurate description of the source, it

  3. Computer Modeling of Human Delta Opioid Receptor

    Directory of Open Access Journals (Sweden)

    Tatyana Dzimbova

    2013-04-01

    Full Text Available The development of selective agonists of δ-opioid receptor as well as the model of interaction of ligands with this receptor is the subjects of increased interest. In the absence of crystal structures of opioid receptors, 3D homology models with different templates have been reported in the literature. The problem is that these models are not available for widespread use. The aims of our study are: (1 to choose within recently published crystallographic structures templates for homology modeling of the human δ-opioid receptor (DOR; (2 to evaluate the models with different computational tools; and (3 to precise the most reliable model basing on correlation between docking data and in vitro bioassay results. The enkephalin analogues, as ligands used in this study, were previously synthesized by our group and their biological activity was evaluated. Several models of DOR were generated using different templates. All these models were evaluated by PROCHECK and MolProbity and relationship between docking data and in vitro results was determined. The best correlations received for the tested models of DOR were found between efficacy (erel of the compounds, calculated from in vitro experiments and Fitness scoring function from docking studies. New model of DOR was generated and evaluated by different approaches. This model has good GA341 value (0.99 from MODELLER, good values from PROCHECK (92.6% of most favored regions and MolProbity (99.5% of favored regions. Scoring function correlates (Pearson r = -0.7368, p-value = 0.0097 with erel of a series of enkephalin analogues, calculated from in vitro experiments. So, this investigation allows suggesting a reliable model of DOR. Newly generated model of DOR receptor could be used further for in silico experiments and it will give possibility for faster and more correct design of selective and effective ligands for δ-opioid receptor.

  4. Ferrofluids: Modeling, numerical analysis, and scientific computation

    Science.gov (United States)

    Tomas, Ignacio

    This dissertation presents some developments in the Numerical Analysis of Partial Differential Equations (PDEs) describing the behavior of ferrofluids. The most widely accepted PDE model for ferrofluids is the Micropolar model proposed by R.E. Rosensweig. The Micropolar Navier-Stokes Equations (MNSE) is a subsystem of PDEs within the Rosensweig model. Being a simplified version of the much bigger system of PDEs proposed by Rosensweig, the MNSE are a natural starting point of this thesis. The MNSE couple linear velocity u, angular velocity w, and pressure p. We propose and analyze a first-order semi-implicit fully-discrete scheme for the MNSE, which decouples the computation of the linear and angular velocities, is unconditionally stable and delivers optimal convergence rates under assumptions analogous to those used for the Navier-Stokes equations. Moving onto the much more complex Rosensweig's model, we provide a definition (approximation) for the effective magnetizing field h, and explain the assumptions behind this definition. Unlike previous definitions available in the literature, this new definition is able to accommodate the effect of external magnetic fields. Using this definition we setup the system of PDEs coupling linear velocity u, pressure p, angular velocity w, magnetization m, and magnetic potential ϕ We show that this system is energy-stable and devise a numerical scheme that mimics the same stability property. We prove that solutions of the numerical scheme always exist and, under certain simplifying assumptions, that the discrete solutions converge. A notable outcome of the analysis of the numerical scheme for the Rosensweig's model is the choice of finite element spaces that allow the construction of an energy-stable scheme. Finally, with the lessons learned from Rosensweig's model, we develop a diffuse-interface model describing the behavior of two-phase ferrofluid flows and present an energy-stable numerical scheme for this model. For a

  5. HSV-2 and Substance Abuse amongst Adolescents: Insights through Mathematical Modelling

    Directory of Open Access Journals (Sweden)

    A. Mhlanga

    2014-01-01

    Full Text Available Herpes simplex virus infection is mostly spread and occurs more commonly among substance abusing adolescents as compared to the nonsubstance abusing. In this paper, a mathematical model for the spread of HSV-2 within a community with substance abusing adolescents is developed and analysed. The impacts of condom use and educational campaigns are examined. The study suggests that condom use is highly effective among adolescents, when we have more of them quitting than becoming substance abusers. Measures such as educational campaigns can be put in place to try and reduce adolescents from becoming substance abusers. Further, we applied optimal control theory to the proposed model. The controls represent condom use and educational campaigns. The objective is based on maximising the susceptible nonsubstance abusing adolescents, while minimising the susceptible substance abusing adolescents, the infectious nonsubstance abusing adolescents, and the infectious substance abusing adolescents. We used Pontrygin’s maximum principle to characterise the optimal levels of the two controls. The resulting optimality system is solved numerically. Overall, the application of the optimal control theory suggests that more effort should be devoted to condom use as compared to educational campaigns.

  6. Computational Modeling of Large Wildfires: A Roadmap

    KAUST Repository

    Coen, Janice L.

    2010-08-01

    Wildland fire behavior, particularly that of large, uncontrolled wildfires, has not been well understood or predicted. Our methodology to simulate this phenomenon uses high-resolution dynamic models made of numerical weather prediction (NWP) models coupled to fire behavior models to simulate fire behavior. NWP models are capable of modeling very high resolution (< 100 m) atmospheric flows. The wildland fire component is based upon semi-empirical formulas for fireline rate of spread, post-frontal heat release, and a canopy fire. The fire behavior is coupled to the atmospheric model such that low level winds drive the spread of the surface fire, which in turn releases sensible heat, latent heat, and smoke fluxes into the lower atmosphere, feeding back to affect the winds directing the fire. These coupled dynamic models capture the rapid spread downwind, flank runs up canyons, bifurcations of the fire into two heads, and rough agreement in area, shape, and direction of spread at periods for which fire location data is available. Yet, intriguing computational science questions arise in applying such models in a predictive manner, including physical processes that span a vast range of scales, processes such as spotting that cannot be modeled deterministically, estimating the consequences of uncertainty, the efforts to steer simulations with field data ("data assimilation"), lingering issues with short term forecasting of weather that may show skill only on the order of a few hours, and the difficulty of gathering pertinent data for verification and initialization in a dangerous environment. © 2010 IEEE.

  7. Computer models for optimizing radiation therapy

    International Nuclear Information System (INIS)

    The aim of this contribution is to outline how methods of system analysis, control therapy and modelling can be applied to simulate normal and malignant cell growth and to optimize cancer treatment as for instance radiation therapy. Based on biological observations and cell kinetic data, several types of models have been developed describing the growth of tumor spheroids and the cell renewal of normal tissue. The irradiation model is represented by the so-called linear-quadratic model describing the survival fraction as a function of the dose. Based thereon, numerous simulation runs for different treatment schemes can be performed. Thus, it is possible to study the radiation effect on tumor and normal tissue separately. Finally, this method enables a computer-assisted recommendation for an optimal patient-specific treatment schedule prior to clinical therapy. (orig.)

  8. Interlanguages and synchronic models of computation

    CERN Document Server

    Berka, Alexander Victor

    2010-01-01

    A novel language system has given rise to promising alternatives to standard formal and processor network models of computation. An interstring linked with a abstract machine environment, shares sub-expressions, transfers data, and spatially allocates resources for the parallel evaluation of dataflow. Formal models called the a-Ram family are introduced, designed to support interstring programming languages (interlanguages). Distinct from dataflow, graph rewriting, and FPGA models, a-Ram instructions are bit level and execute in situ. They support sequential and parallel languages without the space/time overheads associated with the Turing Machine and l-calculus, enabling massive programs to be simulated. The devices of one a-Ram model, called the Synchronic A-Ram, are fully connected and simpler than FPGA LUT's. A compiler for an interlanguage called Space, has been developed for the Synchronic A-Ram. Space is MIMD. strictly typed, and deterministic. Barring memory allocation and compilation, modules are ref...

  9. Computational Design Modelling : Proceedings of the Design Modelling Symposium

    CERN Document Server

    Kilian, Axel; Palz, Norbert; Scheurer, Fabian

    2012-01-01

    This book publishes the peer-reviewed proceeding of the third Design Modeling Symposium Berlin . The conference constitutes a platform for dialogue on experimental practice and research within the field of computationally informed architectural design. More than 60 leading experts the computational processes within the field of computationally informed architectural design to develop a broader and less exotic building practice that bears more subtle but powerful traces of the complex tool set and approaches we have developed and studied over recent years. The outcome are new strategies for a reasonable and innovative implementation of digital potential in truly innovative and radical design guided by both responsibility towards processes and the consequences they initiate.

  10. DYNAMIC TASK PARTITIONING MODEL IN PARALLEL COMPUTING

    Directory of Open Access Journals (Sweden)

    Javed Ali

    2012-04-01

    Full Text Available Parallel computing systems compose task partitioning strategies in a true multiprocessing manner. Such systems share the algorithm and processing unit as computing resources which leads to highly inter process communications capabilities. The main part of the proposed algorithm is resource management unit which performs task partitioning and co-scheduling .In this paper, we present a technique for integrated task partitioning and co-scheduling on the privately owned network. We focus on real-time and non preemptive systems. A large variety of experiments have been conducted on the proposed algorithm using synthetic and real tasks. Goal of computation model is to provide a realistic representation of the costs of programming The results show the benefit of the task partitioning. The main characteristics of our method are optimal scheduling and strong link between partitioning, scheduling and communication. Some important models for task partitioning are also discussed in the paper. We target the algorithm for task partitioning which improve the inter process communication between the tasks and use the recourses of the system in the efficient manner. The proposed algorithm contributes the inter-process communication cost minimization amongst the executing processes.

  11. Association between playing computer games and mental and social health among male adolescents in Iran in 2014

    Science.gov (United States)

    Mohammadi, Mehrnoosh; RezaeiDehaghani, Abdollah; Mehrabi, Tayebeh; RezaeiDehaghani, Ali

    2016-01-01

    Background: As adolescents spend much time on playing computer games, their mental and social effects should be considered. The present study aimed to investigate the association between playing computer games and the mental and social health among male adolescents in Iran in 2014. Materials and Methods: This is a cross-sectional study conducted on 210 adolescents selected by multi-stage random sampling. Data were collected by Goldberg and Hillier general health (28 items) and Kiez social health questionnaires. The association was tested by Pearson and Spearman correlation coefficients, one-way analysis of variance (ANOVA), and independent t-test. Computer games related factors such as the location, type, length, the adopted device, and mode of playing games were investigated. Results: Results showed that 58.9% of the subjects played games on a computer alone for 1 h at home. Results also revealed that the subjects had appropriate mental health and 83.2% had moderate social health. Results showed a poor significant association between the length of games and social health (r = −0.15, P = 0.03), the type of games and mental health (r = −0.16, P = 0.01), and the device used in playing games and social health (F = 0.95, P = 0.03). Conclusions: The findings showed that adolescents’ mental and social health is negatively associated with their playing computer games. Therefore, to promote their health, educating them about the correct way of playing computer games is essential and their parents and school authorities, including nurses working at schools, should determine its relevant factors such as the type, length, and device used in playing such games. PMID:27095988

  12. Computer modeling for optimal placement of gloveboxes

    International Nuclear Information System (INIS)

    Reduction of the nuclear weapons stockpile and the general downsizing of the nuclear weapons complex has presented challenges for Los Alamos. One is to design an optimized fabrication facility to manufacture nuclear weapon primary components (pits) in an environment of intense regulation and shrinking budgets. Historically, the location of gloveboxes in a processing area has been determined without benefit of industrial engineering studies to ascertain the optimal arrangement. The opportunity exists for substantial cost savings and increased process efficiency through careful study and optimization of the proposed layout by constructing a computer model of the fabrication process. This paper presents an integrative two- stage approach to modeling the casting operation for pit fabrication. The first stage uses a mathematical technique for the formulation of the facility layout problem; the solution procedure uses an evolutionary heuristic technique. The best solutions to the layout problem are used as input to the second stage - a computer simulation model that assesses the impact of competing layouts on operational performance. The focus of the simulation model is to determine the layout that minimizes personnel radiation exposures and nuclear material movement, and maximizes the utilization of capacity for finished units

  13. Computer modeling for optimal placement of gloveboxes

    Energy Technology Data Exchange (ETDEWEB)

    Hench, K.W.; Olivas, J.D. [Los Alamos National Lab., NM (United States); Finch, P.R. [New Mexico State Univ., Las Cruces, NM (United States)

    1997-08-01

    Reduction of the nuclear weapons stockpile and the general downsizing of the nuclear weapons complex has presented challenges for Los Alamos. One is to design an optimized fabrication facility to manufacture nuclear weapon primary components (pits) in an environment of intense regulation and shrinking budgets. Historically, the location of gloveboxes in a processing area has been determined without benefit of industrial engineering studies to ascertain the optimal arrangement. The opportunity exists for substantial cost savings and increased process efficiency through careful study and optimization of the proposed layout by constructing a computer model of the fabrication process. This paper presents an integrative two- stage approach to modeling the casting operation for pit fabrication. The first stage uses a mathematical technique for the formulation of the facility layout problem; the solution procedure uses an evolutionary heuristic technique. The best solutions to the layout problem are used as input to the second stage - a computer simulation model that assesses the impact of competing layouts on operational performance. The focus of the simulation model is to determine the layout that minimizes personnel radiation exposures and nuclear material movement, and maximizes the utilization of capacity for finished units.

  14. Heterogeneity and Change in the Patterning of Adolescents' Perceptions of the Legitimacy of Parental Authority: A Latent Transition Model

    Science.gov (United States)

    Cumsille, Patricio; Darling, Nancy; Flaherty, Brian; Martinez, Maria Loreto

    2009-01-01

    Changes in the patterning of adolescents' beliefs about the legitimate domains of parental authority were modeled in 2,611 Chilean adolescents, 11-16 years old. Transitions in adolescents' belief patterns were studied over 3 years. Latent transition analysis (LTA) revealed 3 distinct patterns of beliefs--"parent control," "shared control," and…

  15. Model versus Military Pilot: A Mixed-Methods Study of Adolescents' Attitudes toward Women in Varied Occupations

    Science.gov (United States)

    Daniels, Elizabeth A.; Sherman, Aurora M.

    2016-01-01

    Using an experimental methodology, the present study investigated adolescents' attitudes toward media images of women in non-appearance-focused (CEO and military pilot) and appearance-focused occupations (model and actor). One hundred adolescent girls and 76 adolescent boys provided ratings of likability, competence, and similarity to self after…

  16. Cyberbullying behavior and adolescents' use of media with antisocial content: a cyclic process model.

    Science.gov (United States)

    den Hamer, Anouk; Konijn, Elly A; Keijer, Micha G

    2014-02-01

    The present study examined the role of media use in adolescents' cyberbullying behavior. Following previous research, we propose a Cyclic Process Model of face-to-face victimization and cyberbullying through two mediating processes of anger/frustration and antisocial media content. This model was tested utilizing a cross-sectional design with adolescent participants (N=892). Exposure to antisocial media content was measured with a newly developed content-based scale (i.e., the C-ME), showing good psychometric qualities. Results of structural equation modeling showed that adolescents' exposure to antisocial media content was significantly associated with cyberbullying behavior, especially in adolescents who experienced anger and frustration due to face-to-face victimization. Goodness of fit indices demonstrated a good fit of the theoretical model to the data and indicated that exposure to antisocial media content acts as an amplifier in a cyclic process of victimization-related anger and cyberbullying behavior. PMID:24015985

  17. Adolescents and Cyber Bullying: The Precaution Adoption Process Model

    Science.gov (United States)

    Chapin, John

    2016-01-01

    A survey of adolescents (N = 1,488) documented Facebook use and experience with cyber bullying. The study found that 84% of adolescents (middle school through college undergraduates) use Facebook, and that most users log on daily. While 30% of the sample reported being cyber bullied, only 12.5% quit using the site, and only 18% told a parent or…

  18. How Can Peer Group Influence the Behavior of Adolescents: Explanatory Model

    OpenAIRE

    Tomé, Gina; Matos, Margarida Gaspar de; Simões, Celeste; Camacho, Inês; AlvesDiniz, José

    2012-01-01

    The current work aims to study both the peer group and family influence on adolescent behaviour. In order to achieve the aforementioned objective, an explanatory model based on the Structural Equations Modelling (SEM)was proposed. The sample used was the group of adolescents that participated in the Portuguese survey of the European study Health Behaviour in School-aged Children (HBSC). The Portuguese survey included students from grades 6, 8 and 10 within the public education system, with an...

  19. Executive functions, impulsivity, and inhibitory control in adolescents: A structural equation model

    OpenAIRE

    Fino, Emanuele; Melogno, Sergio; Iliceto, Paolo; D’Aliesio, Sara; Pinto, Maria Antonietta; Candilera, Gabriella; Sabatello, Ugo

    2014-01-01

    Background. Adolescence represents a critical period for brain development, addressed by neurodevelopmental models to frontal, subcortical-limbic, and striatal activation, a pattern associated with rise of impulsivity and deficits in inhibitory control. The present study aimed at studying the association between self-report measures of impulsivity and inhibitory control with executive function in adolescents, employing structural equation modeling. Method. Tests were administered to 434 high ...

  20. Structure, function, and behaviour of computational models in systems biology

    OpenAIRE

    Knüpfer, Christian; Beckstein, Clemens; Dittrich, Peter; Novère, Nicolas Le

    2013-01-01

    Background Systems Biology develops computational models in order to understand biological phenomena. The increasing number and complexity of such “bio-models” necessitate computer support for the overall modelling task. Computer-aided modelling has to be based on a formal semantic description of bio-models. But, even if computational bio-models themselves are represented precisely in terms of mathematical expressions their full meaning is not yet formally specified and only described in natu...

  1. Modeling Reality - How Computers Mirror Life

    Science.gov (United States)

    Bialynicki-Birula, Iwo; Bialynicka-Birula, Iwona

    2005-01-01

    The bookModeling Reality covers a wide range of fascinating subjects, accessible to anyone who wants to learn about the use of computer modeling to solve a diverse range of problems, but who does not possess a specialized training in mathematics or computer science. The material presented is pitched at the level of high-school graduates, even though it covers some advanced topics (cellular automata, Shannon's measure of information, deterministic chaos, fractals, game theory, neural networks, genetic algorithms, and Turing machines). These advanced topics are explained in terms of well known simple concepts: Cellular automata - Game of Life, Shannon's formula - Game of twenty questions, Game theory - Television quiz, etc. The book is unique in explaining in a straightforward, yet complete, fashion many important ideas, related to various models of reality and their applications. Twenty-five programs, written especially for this book, are provided on an accompanying CD. They greatly enhance its pedagogical value and make learning of even the more complex topics an enjoyable pleasure.

  2. Local and global models of physics and computation

    OpenAIRE

    Stepney, Susan

    2014-01-01

    Classical computation is essentially local in time, yet some formulations of physics are global in time. Here I examine these differences, and suggest that certain forms of unconventional computation are needed to model physical processes and complex systems. These include certain forms of analogue computing, massively parallel field computing, and self-modifying computations.

  3. Optimization and mathematical modeling in computer architecture

    CERN Document Server

    Sankaralingam, Karu; Nowatzki, Tony

    2013-01-01

    In this book we give an overview of modeling techniques used to describe computer systems to mathematical optimization tools. We give a brief introduction to various classes of mathematical optimization frameworks with special focus on mixed integer linear programming which provides a good balance between solver time and expressiveness. We present four detailed case studies -- instruction set customization, data center resource management, spatial architecture scheduling, and resource allocation in tiled architectures -- showing how MILP can be used and quantifying by how much it outperforms t

  4. Some queuing network models of computer systems

    Science.gov (United States)

    Herndon, E. S.

    1980-01-01

    Queuing network models of a computer system operating with a single workload type are presented. Program algorithms are adapted for use on the Texas Instruments SR-52 programmable calculator. By slightly altering the algorithm to process the G and H matrices row by row instead of column by column, six devices and an unlimited job/terminal population could be handled on the SR-52. Techniques are also introduced for handling a simple load dependent server and for studying interactive systems with fixed multiprogramming limits.

  5. Computational social dynamic modeling of group recruitment.

    Energy Technology Data Exchange (ETDEWEB)

    Berry, Nina M.; Lee, Marinna; Pickett, Marc; Turnley, Jessica Glicken (Sandia National Laboratories, Albuquerque, NM); Smrcka, Julianne D. (Sandia National Laboratories, Albuquerque, NM); Ko, Teresa H.; Moy, Timothy David (Sandia National Laboratories, Albuquerque, NM); Wu, Benjamin C.

    2004-01-01

    The Seldon software toolkit combines concepts from agent-based modeling and social science to create a computationally social dynamic model for group recruitment. The underlying recruitment model is based on a unique three-level hybrid agent-based architecture that contains simple agents (level one), abstract agents (level two), and cognitive agents (level three). This uniqueness of this architecture begins with abstract agents that permit the model to include social concepts (gang) or institutional concepts (school) into a typical software simulation environment. The future addition of cognitive agents to the recruitment model will provide a unique entity that does not exist in any agent-based modeling toolkits to date. We use social networks to provide an integrated mesh within and between the different levels. This Java based toolkit is used to analyze different social concepts based on initialization input from the user. The input alters a set of parameters used to influence the values associated with the simple agents, abstract agents, and the interactions (simple agent-simple agent or simple agent-abstract agent) between these entities. The results of phase-1 Seldon toolkit provide insight into how certain social concepts apply to different scenario development for inner city gang recruitment.

  6. A computational model of amoeboid cell migration.

    Science.gov (United States)

    Lim, Fong Yin; Koon, Yen Ling; Chiam, Keng-Hwee

    2013-10-01

    We present a two-dimensional computational model of amoeboid cell migration characterised by cell shape changes due to the formation and extension of protrusions known as blebs. Using this model, we numerically study the deformation of the cell membrane during blebbing, as well as the effects of obstacles, such as protein fibres in the extracellular matrix, on the motion of the blebbing cell. The model is established in the framework of Stokes flow. Cell membrane deformation is coupled to membrane tension, membrane bending, membrane-cortex adhesion and cortical activities via the intracellular and extracellular fluid field described by the Stokes equation. By assuming that actin monomers move at constant speed towards the membrane and polymerise when they approach the membrane, our model shows that the cell movement in unconfined space can be sustained. We also study how a migrating cell interacts with obstacles hydrodynamically, allowing us to model cell migration in confined environments and to investigate the effects of confinement on the cell migration speed. Our model can be used to further study how tumour cells move through the extracellular matrix during cancer metastasis. PMID:23342988

  7. Dynamical Models for Computer Viruses Propagation

    Directory of Open Access Journals (Sweden)

    José R. C. Piqueira

    2008-01-01

    Full Text Available Nowadays, digital computer systems and networks are the main engineering tools, being used in planning, design, operation, and control of all sizes of building, transportation, machinery, business, and life maintaining devices. Consequently, computer viruses became one of the most important sources of uncertainty, contributing to decrease the reliability of vital activities. A lot of antivirus programs have been developed, but they are limited to detecting and removing infections, based on previous knowledge of the virus code. In spite of having good adaptation capability, these programs work just as vaccines against diseases and are not able to prevent new infections based on the network state. Here, a trial on modeling computer viruses propagation dynamics relates it to other notable events occurring in the network permitting to establish preventive policies in the network management. Data from three different viruses are collected in the Internet and two different identification techniques, autoregressive and Fourier analyses, are applied showing that it is possible to forecast the dynamics of a new virus propagation by using the data collected from other viruses that formerly infected the network.

  8. An Integrated Model of Suicidal Ideation in Transcultural Populations of Chinese Adolescents.

    Science.gov (United States)

    Leung, Cyrus L K; Kwok, Sylvia Y C L; Ling, Chloe C Y

    2016-07-01

    This study tested the model of suicidal ideation, incorporating family and personal factors to predict suicidal ideation with hopelessness as a mediating factor in the Hong Kong sample, to a sample in Shanghai. Using MGSEM, the study aims to investigate the personal correlates and the family correlates of suicidal ideation in Hong Kong and Shanghai adolescents. We integrated the family ecological and diathesis-stress-hopelessness models of suicidal ideation in connecting the correlates. A cross-sectional design was used. The full model achieved metric invariance and partial path-loading invariance. Family functioning and social problem solving negatively predicted hopelessness or suicidal ideation in both the Hong Kong and Shanghai adolescents. The results supported an integrative approach in facilitating parent-adolescent communication and strengthening family functioning, and reducing the use of negative social problem-solving styles in adolescent suicide prevention. PMID:26308835

  9. Computational modeling approaches in gonadotropin signaling.

    Science.gov (United States)

    Ayoub, Mohammed Akli; Yvinec, Romain; Crépieux, Pascale; Poupon, Anne

    2016-07-01

    Follicle-stimulating hormone and LH play essential roles in animal reproduction. They exert their function through binding to their cognate receptors, which belong to the large family of G protein-coupled receptors. This recognition at the plasma membrane triggers a plethora of cellular events, whose processing and integration ultimately lead to an adapted biological response. Understanding the nature and the kinetics of these events is essential for innovative approaches in drug discovery. The study and manipulation of such complex systems requires the use of computational modeling approaches combined with robust in vitro functional assays for calibration and validation. Modeling brings a detailed understanding of the system and can also be used to understand why existing drugs do not work as well as expected, and how to design more efficient ones. PMID:27165991

  10. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  11. Direct modeling for computational fluid dynamics

    Science.gov (United States)

    Xu, Kun

    2015-06-01

    All fluid dynamic equations are valid under their modeling scales, such as the particle mean free path and mean collision time scale of the Boltzmann equation and the hydrodynamic scale of the Navier-Stokes (NS) equations. The current computational fluid dynamics (CFD) focuses on the numerical solution of partial differential equations (PDEs), and its aim is to get the accurate solution of these governing equations. Under such a CFD practice, it is hard to develop a unified scheme that covers flow physics from kinetic to hydrodynamic scales continuously because there is no such governing equation which could make a smooth transition from the Boltzmann to the NS modeling. The study of fluid dynamics needs to go beyond the traditional numerical partial differential equations. The emerging engineering applications, such as air-vehicle design for near-space flight and flow and heat transfer in micro-devices, do require further expansion of the concept of gas dynamics to a larger domain of physical reality, rather than the traditional distinguishable governing equations. At the current stage, the non-equilibrium flow physics has not yet been well explored or clearly understood due to the lack of appropriate tools. Unfortunately, under the current numerical PDE approach, it is hard to develop such a meaningful tool due to the absence of valid PDEs. In order to construct multiscale and multiphysics simulation methods similar to the modeling process of constructing the Boltzmann or the NS governing equations, the development of a numerical algorithm should be based on the first principle of physical modeling. In this paper, instead of following the traditional numerical PDE path, we introduce direct modeling as a principle for CFD algorithm development. Since all computations are conducted in a discretized space with limited cell resolution, the flow physics to be modeled has to be done in the mesh size and time step scales. Here, the CFD is more or less a direct

  12. Computer model challenges breast cancer treatment strategy.

    Science.gov (United States)

    Retsky, M W; Swartzendruber, D E; Bame, P D; Wardwell, R H

    1994-01-01

    The breast cancer treatment failure rate remains unacceptably high. The current breast cancer treatment paradigm, based primarily on Gompertzian kinetics and animal models, advocates short-course, intensive chemotherapy subsequent to tumor debulking, citing drug resistance and host toxicity as the primary reasons for treatment failure. To better understand treatment failure, we have studied breast cancer from the perspective of computer modeling. Our results demonstrate breast cancers grow in an irregular fashion; this differs from the Gompertzian mode of animal models and thus challenges the validity of the current paradigm. Clinical and laboratory data support the concept of irregular growth rather than the common claim that human tumors grow in a Gompertzian fashion. Treatment failure mechanisms for breast cancer appear to differ from those for animal models, and thus treatments optimize on animal models may not be optimal for breast cancer. A failure mechanism consistent with our results involves temporarily dormant tumor cells in anatomical or pharmacological sanctuary, which eventually result in aggressive metastatic disease. PMID:7994590

  13. Stochastic linear programming models, theory, and computation

    CERN Document Server

    Kall, Peter

    2011-01-01

    This new edition of Stochastic Linear Programming: Models, Theory and Computation has been brought completely up to date, either dealing with or at least referring to new material on models and methods, including DEA with stochastic outputs modeled via constraints on special risk functions (generalizing chance constraints, ICC’s and CVaR constraints), material on Sharpe-ratio, and Asset Liability Management models involving CVaR in a multi-stage setup. To facilitate use as a text, exercises are included throughout the book, and web access is provided to a student version of the authors’ SLP-IOR software. Additionally, the authors have updated the Guide to Available Software, and they have included newer algorithms and modeling systems for SLP. The book is thus suitable as a text for advanced courses in stochastic optimization, and as a reference to the field. From Reviews of the First Edition: "The book presents a comprehensive study of stochastic linear optimization problems and their applications. … T...

  14. Modeling Reality: How Computers Mirror Life

    International Nuclear Information System (INIS)

    Modeling Reality: How Computers Mirror Life covers a wide range of modern subjects in complex systems, suitable not only for undergraduate students who want to learn about modelling 'reality' by using computer simulations, but also for researchers who want to learn something about subjects outside of their majors and need a simple guide. Readers are not required to have specialized training before they start the book. Each chapter is organized so as to train the reader to grasp the essential idea of simulating phenomena and guide him/her towards more advanced areas. The topics presented in this textbook fall into two categories. The first is at graduate level, namely probability, statistics, information theory, graph theory, and the Turing machine, which are standard topics in the course of information science and information engineering departments. The second addresses more advanced topics, namely cellular automata, deterministic chaos, fractals, game theory, neural networks, and genetic algorithms. Several topics included here (neural networks, game theory, information processing, etc) are now some of the main subjects of statistical mechanics, and many papers related to these interdisciplinary fields are published in Journal of Physics A: Mathematical and General, so readers of this journal will be familiar with the subject areas of this book. However, each area is restricted to an elementary level and if readers wish to know more about the topics they are interested in, they will need more advanced books. For example, on neural networks, the text deals with the back-propagation algorithm for perceptron learning. Nowadays, however, this is a rather old topic, so the reader might well choose, for example, Introduction to the Theory of Neural Computation by J Hertz et al (Perseus books, 1991) or Statistical Physics of Spin Glasses and Information Processing by H Nishimori (Oxford University Press, 2001) for further reading. Nevertheless, this book is worthwhile

  15. A multidimensional model of mothers' perceptions of parent alcohol socialization and adolescent alcohol misuse.

    Science.gov (United States)

    Ennett, Susan T; Jackson, Christine; Cole, Veronica T; Haws, Susan; Foshee, Vangie A; Reyes, Heathe Luz McNaughton; Burns, Alison Reimuller; Cox, Melissa J; Cai, Li

    2016-02-01

    We assessed a multidimensional model of parent alcohol socialization in which key socialization factors were considered simultaneously to identify combinations of factors that increase or decrease risk for development of adolescent alcohol misuse. Of interest was the interplay between putative risk and protective factors, such as whether the typically detrimental effects on youth drinking of parenting practices tolerant of some adolescent alcohol use are mitigated by an effective overall approach to parenting and parental modeling of modest alcohol use. The sample included 1,530 adolescents and their mothers; adolescents' mean age was 13.0 (SD = .99) at the initial assessment. Latent profile analysis was conducted of mothers' reports of their attitude toward teen drinking, alcohol-specific parenting practices, parental alcohol use and problem use, and overall approach to parenting. The profiles were used to predict trajectories of adolescent alcohol misuse from early to middle adolescence. Four profiles were identified: 2 profiles reflected conservative alcohol-specific parenting practices and 2 reflected alcohol-tolerant practices, all in the context of other attributes. Alcohol misuse accelerated more rapidly from Grade 6 through 10 in the 2 alcohol-tolerant compared with conservative profiles. Results suggest that maternal tolerance of some youth alcohol use, even in the presence of dimensions of an effective parenting style and low parental alcohol use and problem use, is not an effective strategy for reducing risky adolescent alcohol use. (PsycINFO Database Record PMID:26415053

  16. Peer pressures: Social instability stress in adolescence and social deficits in adulthood in a rodent model

    Directory of Open Access Journals (Sweden)

    Cheryl M. McCormick

    2015-02-01

    Full Text Available Studies in animal models generate and test hypotheses regarding developmental stage-specific vulnerability that might inform research questions about human development. In both rats and humans, peer relationships are qualitatively different in adolescence than at other stages of development, and social experiences in adolescence are considered important determinants of adult social function. This review describes our adolescent rat social instability stress model and the long-lasting effects social instability has on social behaviour in adulthood as well as the possible neural underpinnings. Effects of other adolescent social stress experiences in rats on social behaviours in adulthood also are reviewed. We discuss the role of hypothalamic–pituitary–adrenal (HPA function and glucocorticoid release in conferring differential susceptibility to social experiences in adolescents compared to adults. We propose that although differential perception of social experiences rather than immature HPA function may underlie the heightened vulnerability of adolescents to social instability, the changes in the trajectory of brain development and resultant social deficits likely are mediated by the heightened glucocorticoid release in response to repeated social stressors in adolescence compared to in adulthood.

  17. Multiscale computational modelling of the heart

    Science.gov (United States)

    Smith, N. P.; Nickerson, D. P.; Crampin, E. J.; Hunter, P. J.

    A computational framework is presented for integrating the electrical, mechanical and biochemical functions of the heart. Finite element techniques are used to solve the large-deformation soft tissue mechanics using orthotropic constitutive laws based in the measured fibre-sheet structure of myocardial (heart muscle) tissue. The reaction-diffusion equations governing electrical current flow in the heart are solved on a grid of deforming material points which access systems of ODEs representing the cellular processes underlying the cardiac action potential. Navier-Stokes equations are solved for coronary blood flow in a system of branching blood vessels embedded in the deforming myocardium and the delivery of oxygen and metabolites is coupled to the energy-dependent cellular processes. The framework presented here for modelling coupled physical conservation laws at the tissue and organ levels is also appropriate for other organ systems in the body and we briefly discuss applications to the lungs and the musculo-skeletal system. The computational framework is also designed to reach down to subcellular processes, including signal transduction cascades and metabolic pathways as well as ion channel electrophysiology, and we discuss the development of ontologies and markup language standards that will help link the tissue and organ level models to the vast array of gene and protein data that are now available in web-accessible databases.

  18. Neuropsychological development in adolescents: cognitive and emotional model for considering risk factors for adolescents with cleft.

    Science.gov (United States)

    Richman, L C

    1995-03-01

    This article reviews neurologic, endocrinologic, and neuropsychological developments that affect our understanding of the adolescent patient. Neuroimaging and neuroradiologic techniques have assisted in identifying brain-behavior relationships and how different neuropsychological patterns result in different ways of thinking. Psychoneuroendocrinologic studies have shown that sex differences in maturation and hormonal effects on behavior need taking into account. At adolescence, the individual with a cleft or craniofacial condition may be at risk for adjustment problems due to earlier developmental events, which may affect language, behavior, and self-esteem. PMID:7748881

  19. On the importance of nonlinear modeling in computer performance prediction

    OpenAIRE

    Garland, Joshua; Bradley, Elizabeth

    2013-01-01

    Computers are nonlinear dynamical systems that exhibit complex and sometimes even chaotic behavior. The models used in the computer systems community, however, are linear. This paper is an exploration of that disconnect: when linear models are adequate for predicting computer performance and when they are not. Specifically, we build linear and nonlinear models of the processor load of an Intel i7-based computer as it executes a range of different programs. We then use those models to predict ...

  20. Computer and Therapist Based Brief Interventions among Cannabis-using Adolescents presenting to Primary Care: One Year Outcomes*

    Science.gov (United States)

    Walton, Maureen A.; Bohnert, Kipling; Resko, Stella; Barry, Kristen T.; Chermack, Stephen T.; Zucker, Robert A.; Zimmerman, Marc A.; Booth, Brenda M.; Blow, Frederic C.

    2013-01-01

    Aims This paper describes outcomes from a randomized controlled trial examining the efficacy of brief interventions delivered by a computer (CBI) or therapist (TBI) among adolescents in urban primary care clinics. Methods Patients (ages 12–18) self-administered a computer survey. Adolescents reporting past year cannabis use completed a baseline survey and were randomized to control, CBI or TBI, with primary (cannabis use, cannabis related consequences-CC) and secondary outcomes [alcohol use, other drug use (illicit and non-medical prescription drugs), and driving under the influence of cannabis (DUI)] assessed at 3, 6, and 12 months. Results 1416 adolescents were surveyed; 328 reported past year cannabis use and were randomized. Comparisons of the CBI relative to control showed that at 3 months the group by time interaction (GxT) was significant for other drug use and CC, but not for cannabis use, alcohol use, or DUI; at 6 months, the GxT interaction was significant for other drug use but not for cannabis use, alcohol use, or CC. For analyses comparing the TBI to control, at 3 months the GxT interaction was significant for DUI, but not significant for cannabis use, alcohol use, or CC; at 6 months, the GxT interaction was not significant for any variable. No significant intervention effects were observed at 12 months. Conclusion Among adolescent cannabis users presenting to primary care, a CBI decreased cannabis related problems and other drug use and a TBI decreased cannabis DUI in the short-term. Additional boosters may be necessary to enhance these reductions over time. PMID:23711998

  1. Computational Models to Synthesize Human Walking

    Institute of Scientific and Technical Information of China (English)

    Lei Ren; David Howard; Laurence Kenney

    2006-01-01

    The synthesis of human walking is of great interest in biomechanics and biomimetic engineering due to its predictive capabilities and potential applications in clinical biomechanics, rehabilitation engineering and biomimetic robotics. In this paper,the various methods that have been used to synthesize humanwalking are reviewed from an engineering viewpoint. This involves a wide spectrum of approaches, from simple passive walking theories to large-scale computational models integrating the nervous, muscular and skeletal systems. These methods are roughly categorized under four headings: models inspired by the concept of a CPG (Central Pattern Generator), methods based on the principles of control engineering, predictive gait simulation using optimisation, and models inspired by passive walking theory. The shortcomings and advantages of these methods are examined, and future directions are discussed in the context of providing insights into the neural control objectives driving gait and improving the stability of the predicted gaits. Future advancements are likely to be motivated by improved understanding of neural control strategies and the subtle complexities of the musculoskeletal system during human locomotion. It is only a matter of time before predictive gait models become a practical and valuable tool in clinical diagnosis, rehabilitation engineering and robotics.

  2. Computational modeling of intraocular gas dynamics

    Science.gov (United States)

    Noohi, P.; Abdekhodaie, M. J.; Cheng, Y. L.

    2015-12-01

    The purpose of this study was to develop a computational model to simulate the dynamics of intraocular gas behavior in pneumatic retinopexy (PR) procedure. The presented model predicted intraocular gas volume at any time and determined the tolerance angle within which a patient can maneuver and still gas completely covers the tear(s). Computational fluid dynamics calculations were conducted to describe PR procedure. The geometrical model was constructed based on the rabbit and human eye dimensions. SF6 in the form of pure and diluted with air was considered as the injected gas. The presented results indicated that the composition of the injected gas affected the gas absorption rate and gas volume. After injection of pure SF6, the bubble expanded to 2.3 times of its initial volume during the first 23 h, but when diluted SF6 was used, no significant expansion was observed. Also, head positioning for the treatment of retinal tear influenced the rate of gas absorption. Moreover, the determined tolerance angle depended on the bubble and tear size. More bubble expansion and smaller retinal tear caused greater tolerance angle. For example, after 23 h, for the tear size of 2 mm the tolerance angle of using pure SF6 is 1.4 times more than that of using diluted SF6 with 80% air. Composition of the injected gas and conditions of the tear in PR may dramatically affect the gas absorption rate and gas volume. Quantifying these effects helps to predict the tolerance angle and improve treatment efficiency.

  3. Horticulture for Secondary Level Handicapped Adolescents: The Cherokee County Model.

    Science.gov (United States)

    Frith, Greg H.; And Others

    1981-01-01

    The Cherokee County (Alabama) horticulture training program provides 40 mildly mentally retarded adolescents with vocational training in a marketable skills. The broad spectrum of vocational skills makes horticulture ideal for the handicapped. (DB)

  4. Preliminary Phase Field Computational Model Development

    Energy Technology Data Exchange (ETDEWEB)

    Li, Yulan [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hu, Shenyang Y. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Xu, Ke [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Suter, Jonathan D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McCloy, John S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Johnson, Bradley R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ramuhalli, Pradeep [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-12-15

    This interim report presents progress towards the development of meso-scale models of magnetic behavior that incorporate microstructural information. Modeling magnetic signatures in irradiated materials with complex microstructures (such as structural steels) is a significant challenge. The complexity is addressed incrementally, using the monocrystalline Fe (i.e., ferrite) film as model systems to develop and validate initial models, followed by polycrystalline Fe films, and by more complicated and representative alloys. In addition, the modeling incrementally addresses inclusion of other major phases (e.g., martensite, austenite), minor magnetic phases (e.g., carbides, FeCr precipitates), and minor nonmagnetic phases (e.g., Cu precipitates, voids). The focus of the magnetic modeling is on phase-field models. The models are based on the numerical solution to the Landau-Lifshitz-Gilbert equation. From the computational standpoint, phase-field modeling allows the simulation of large enough systems that relevant defect structures and their effects on functional properties like magnetism can be simulated. To date, two phase-field models have been generated in support of this work. First, a bulk iron model with periodic boundary conditions was generated as a proof-of-concept to investigate major loop effects of single versus polycrystalline bulk iron and effects of single non-magnetic defects. More recently, to support the experimental program herein using iron thin films, a new model was generated that uses finite boundary conditions representing surfaces and edges. This model has provided key insights into the domain structures observed in magnetic force microscopy (MFM) measurements. Simulation results for single crystal thin-film iron indicate the feasibility of the model for determining magnetic domain wall thickness and mobility in an externally applied field. Because the phase-field model dimensions are limited relative to the size of most specimens used in

  5. Performance of Air Pollution Models on Massively Parallel Computers

    DEFF Research Database (Denmark)

    Brown, John; Hansen, Per Christian; Wasniewski, Jerzy;

    1996-01-01

    To compare the performance and use of three massively parallel SIMD computers, we implemented a large air pollution model on the computers. Using a realistic large-scale model, we gain detailed insight about the performance of the three computers when used to solve large-scale scientific problems...... that involve several types of numerical computations. The computers considered in our study are the Connection Machines CM-200 and CM-5, and the MasPar MP-2216...

  6. Parallel Computing for Terrestrial Ecosystem Carbon Modeling

    International Nuclear Information System (INIS)

    Terrestrial ecosystems are a primary component of research on global environmental change. Observational and modeling research on terrestrial ecosystems at the global scale, however, has lagged behind their counterparts for oceanic and atmospheric systems, largely because the unique challenges associated with the tremendous diversity and complexity of terrestrial ecosystems. There are 8 major types of terrestrial ecosystem: tropical rain forest, savannas, deserts, temperate grassland, deciduous forest, coniferous forest, tundra, and chaparral. The carbon cycle is an important mechanism in the coupling of terrestrial ecosystems with climate through biological fluxes of CO2. The influence of terrestrial ecosystems on atmospheric CO2 can be modeled via several means at different timescales. Important processes include plant dynamics, change in land use, as well as ecosystem biogeography. Over the past several decades, many terrestrial ecosystem models (see the 'Model developments' section) have been developed to understand the interactions between terrestrial carbon storage and CO2 concentration in the atmosphere, as well as the consequences of these interactions. Early TECMs generally adapted simple box-flow exchange models, in which photosynthetic CO2 uptake and respiratory CO2 release are simulated in an empirical manner with a small number of vegetation and soil carbon pools. Demands on kinds and amount of information required from global TECMs have grown. Recently, along with the rapid development of parallel computing, spatially explicit TECMs with detailed process based representations of carbon dynamics become attractive, because those models can readily incorporate a variety of additional ecosystem processes (such as dispersal, establishment, growth, mortality etc.) and environmental factors (such as landscape position, pest populations, disturbances, resource manipulations, etc.), and provide information to frame policy options for climate change impact

  7. Modeling the growth of fingerprints improves matching for adolescents

    CERN Document Server

    Gottschlich, Carsten; Lorenz, Robert; Bernhardt, Stefanie; Hantschel, Michael; Munk, Axel

    2010-01-01

    We study the effect of growth on the fingerprints of adolescents, based on which we suggest a simple method to adjust for growth when trying to recover a juvenile's fingerprint in a database years later. Based on longitudinal data sets in juveniles' criminal records, we show that growth essentially leads to an isotropic rescaling, so that we can use the strong correlation between growth in stature and limbs to model the growth of fingerprints proportional to stature growth as documented in growth charts. The proposed rescaling leads to a 72% reduction of the distances between corresponding minutiae for the data set analyzed. These findings were corroborated by several verification tests. In an identification test on a database containing 3.25 million right index fingers at the Federal Criminal Police Office of Germany, the identification error rate of 20.8% was reduced to 2.1% by rescaling. The presented method is of striking simplicity and can easily be integrated into existing automated fingerprint identifi...

  8. Longitudinal Prediction of Adolescent Nonsuicidal Self-Injury: Examination of a Cognitive Vulnerability-Stress Model

    OpenAIRE

    2010-01-01

    Virtually no longitudinal research has examined psychological characteristics or events that may lead to adolescent nonsuicidal self-injury (NSSI). This study tested a cognitive vulnerability-stress model as a predictor of NSSI trajectories. Clinically-referred adolescents (n =143; 72% girls) completed measures of NSSI, depression, attributional style, and interpersonal stressors during baseline hospitalization. Levels of NSSI were reassessed 3, 6, 9, 15, and 18 months later. Latent growth cu...

  9. Understanding suicide among indigenous adolescents: a review using the PRECEDE model.

    OpenAIRE

    Clarke, V. A.; Frankish, C. J.; Green, L W

    1997-01-01

    AIM: To use the available literature to identify the causes of suicide among indigenous adolescents. METHOD: The PRECEDE model provided a framework to organize the material and identify the areas where relatively little research had been reported. RESULTS: The epidemiological diagnosis showed that suicide was greater in indigenous than non-indigenous populations and particularly high among adolescent males. Environments of native persons are characterized by remoteness, poverty, cultural disp...

  10. Early Child Maltreatment, Runaway Youths, and Risk of Delinquency and Victimization in Adolescence: A Mediational Model

    OpenAIRE

    Kim, Min Jung; Tajima, Emiko A.; Herrenkohl, Todd I.; Huang, Bu

    2009-01-01

    This article examines whether running away from home mediates the link between child maltreatment and later delinquency and victimization in adolescence. Specifically, the authors tested the hypothesis that childhood physical and psychological abuse increase the risk of a child's running away from home by the time of adolescence. Running away from home is, in turn, hypothesized to increase the risk of delinquency and victimization. Childhood sexual abuse, modeled independently of physical and...

  11. A Multidimensional Model of Mothers’ Perceptions of Parent Alcohol Socialization and Adolescent Alcohol Misuse

    OpenAIRE

    Ennett, Susan T.; Jackson, Christine; Cole, Veronica T.; Haws, Susan; Foshee, Vangie A.; Reyes, Heathe Luz McNaughton; Burns, Alison Reimuller; Cox, Melissa J.; Cai, Li

    2015-01-01

    We assessed a multidimensional model of parent alcohol socialization in which key socialization factors were considered simultaneously to identify combinations of factors that increase or decrease risk for development of adolescent alcohol misuse. Of interest was the interplay between putative risk and protective factors, such as whether the typically detrimental effects on youth drinking of parenting practices tolerant of some adolescent alcohol use are mitigated by an effective overall appr...

  12. Methodical Approaches to Teaching of Computer Modeling in Computer Science Course

    Science.gov (United States)

    Rakhimzhanova, B. Lyazzat; Issabayeva, N. Darazha; Khakimova, Tiyshtik; Bolyskhanova, J. Madina

    2015-01-01

    The purpose of this study was to justify of the formation technique of representation of modeling methodology at computer science lessons. The necessity of studying computer modeling is that the current trends of strengthening of general education and worldview functions of computer science define the necessity of additional research of the…

  13. Modeling groundwater flow on massively parallel computers

    Energy Technology Data Exchange (ETDEWEB)

    Ashby, S.F.; Falgout, R.D.; Fogwell, T.W.; Tompson, A.F.B.

    1994-12-31

    The authors will explore the numerical simulation of groundwater flow in three-dimensional heterogeneous porous media. An interdisciplinary team of mathematicians, computer scientists, hydrologists, and environmental engineers is developing a sophisticated simulation code for use on workstation clusters and MPPs. To date, they have concentrated on modeling flow in the saturated zone (single phase), which requires the solution of a large linear system. they will discuss their implementation of preconditioned conjugate gradient solvers. The preconditioners under consideration include simple diagonal scaling, s-step Jacobi, adaptive Chebyshev polynomial preconditioning, and multigrid. They will present some preliminary numerical results, including simulations of groundwater flow at the LLNL site. They also will demonstrate the code`s scalability.

  14. Computer modelling of eddy current probes

    International Nuclear Information System (INIS)

    Computer programs have been developed for modelling impedance and transmit-receive eddy current probes in two-dimensional axis-symmetric configurations. These programs, which are based on analytic equations, simulate bobbin probes in infinitely long tubes and surface probes on plates. They calculate probe signal due to uniform variations in conductor thickness, resistivity and permeability. These signals depend on probe design and frequency. A finite element numerical program has been procured to calculate magnetic permeability in non-linear ferromagnetic materials. Permeability values from these calculations can be incorporated into the above analytic programs to predict signals from eddy current probes with permanent magnets in ferromagnetic tubes. These programs were used to test various probe designs for new testing applications. Measurements of magnetic permeability in magnetically biased ferromagnetic materials have been performed by superimposing experimental signals, from special laboratory ET probes, on impedance plane diagrams calculated using these programs. (author). 3 refs., 2 figs

  15. Computational Process Modeling for Additive Manufacturing (OSU)

    Science.gov (United States)

    Bagg, Stacey; Zhang, Wei

    2015-01-01

    Powder-Bed Additive Manufacturing (AM) through Direct Metal Laser Sintering (DMLS) or Selective Laser Melting (SLM) is being used by NASA and the Aerospace industry to "print" parts that traditionally are very complex, high cost, or long schedule lead items. The process spreads a thin layer of metal powder over a build platform, then melts the powder in a series of welds in a desired shape. The next layer of powder is applied, and the process is repeated until layer-by-layer, a very complex part can be built. This reduces cost and schedule by eliminating very complex tooling and processes traditionally used in aerospace component manufacturing. To use the process to print end-use items, NASA seeks to understand SLM material well enough to develop a method of qualifying parts for space flight operation. Traditionally, a new material process takes many years and high investment to generate statistical databases and experiential knowledge, but computational modeling can truncate the schedule and cost -many experiments can be run quickly in a model, which would take years and a high material cost to run empirically. This project seeks to optimize material build parameters with reduced time and cost through modeling.

  16. Computational model of heterogeneous heating in melanin

    Science.gov (United States)

    Kellicker, Jason; DiMarzio, Charles A.; Kowalski, Gregory J.

    2015-03-01

    Melanin particles often present as an aggregate of smaller melanin pigment granules and have a heterogeneous surface morphology. When irradiated with light within the absorption spectrum of melanin, these heterogeneities produce measurable concentrations of the electric field that result in temperature gradients from thermal effects that are not seen with spherical or ellipsoidal modeling of melanin. Modeling melanin without taking into consideration the heterogeneous surface morphology yields results that underestimate the strongest signals or over{estimate their spatial extent. We present a new technique to image phase changes induced by heating using a computational model of melanin that exhibits these surface heterogeneities. From this analysis, we demonstrate the heterogeneous energy absorption and resulting heating that occurs at the surface of the melanin granule that is consistent with three{photon absorption. Using the three{photon dluorescence as a beacon, we propose a method for detecting the extents of the melanin granule using photothermal microscopy to measure the phase changes resulting from the heating of the melanin.

  17. Computational model for protein unfolding simulation

    Science.gov (United States)

    Tian, Xu-Hong; Zheng, Ye-Han; Jiao, Xiong; Liu, Cai-Xing; Chang, Shan

    2011-06-01

    The protein folding problem is one of the fundamental and important questions in molecular biology. However, the all-atom molecular dynamics studies of protein folding and unfolding are still computationally expensive and severely limited by the time scale of simulation. In this paper, a simple and fast protein unfolding method is proposed based on the conformational stability analyses and structure modeling. In this method, two structure-based conditions are considered to identify the unstable regions of proteins during the unfolding processes. The protein unfolding trajectories are mimicked through iterative structure modeling according to conformational stability analyses. Two proteins, chymotrypsin inhibitor 2 (CI2) and α -spectrin SH3 domain (SH3) were simulated by this method. Their unfolding pathways are consistent with the previous molecular dynamics simulations. Furthermore, the transition states of the two proteins were identified in unfolding processes and the theoretical Φ values of these transition states showed significant correlations with the experimental data (the correlation coefficients are >0.8). The results indicate that this method is effective in studying protein unfolding. Moreover, we analyzed and discussed the influence of parameters on the unfolding simulation. This simple coarse-grained model may provide a general and fast approach for the mechanism studies of protein folding.

  18. Gravothermal Star Clusters - Theory and Computer Modelling

    Science.gov (United States)

    Spurzem, Rainer

    2010-11-01

    In the George Darwin lecture, delivered to the British Royal Astronomical Society in 1960 by Viktor A. Ambartsumian he wrote on the evolution of stellar systems that it can be described by the "dynamic evolution of a gravitating gas" complemented by "a statistical description of the changes in the physical states of stars". This talk will show how this physical concept has inspired theoretical modeling of star clusters in the following decades up to the present day. The application of principles of thermodynamics shows, as Ambartsumian argued in his 1960 lecture, that there is no stable state of equilibrium of a gravitating star cluster. The trend to local thermodynamic equilibrium is always disturbed by escaping stars (Ambartsumian), as well as by gravothermal and gravogyro instabilities, as it was detected later. Here the state-of-the-art of modeling the evolution of dense stellar systems based on principles of thermodynamics and statistical mechanics (Fokker-Planck approximation) will be reviewed. Recent progress including rotation and internal correlations (primordial binaries) is presented. The models have also very successfully been used to study dense star clusters around massive black holes in galactic nuclei and even (in a few cases) relativistic supermassive dense objects in centres of galaxies (here again briefly touching one of the many research fields of V.A. Ambartsumian). For the modern present time of high-speed supercomputing, where we are tackling direct N-body simulations of star clusters, we will show that such direct modeling supports and proves the concept of the statistical models based on the Fokker-Planck theory, and that both theoretical concepts and direct computer simulations are necessary to support each other and make scientific progress in the study of star cluster evolution.

  19. Examining a social reaction model in the prediction of adolescent alcohol use.

    Science.gov (United States)

    Litt, Dana M; Lewis, Melissa A

    2016-09-01

    The prototype willingness model (PWM; Gerrard et al., 2008) is a modified dual-processing model designed to improve the predictive value of existing health risk behavior by suggesting that there are two pathways to health risk behaviors: a reasoned path that is mediated by behavioral intention and a social reaction path that is mediated by behavioral willingness. Although there is evidence supporting the social reaction path to risk behavior among adolescents, most of this work has focused on specific components of the pathway such as prototypes or willingness rather than looking at the entire social reaction pathway as a whole. As such, the primary goal of the present study was to determine whether the social reaction pathway has acceptable fit for a sample of adolescents using a longitudinal design. Results from 835 adolescents support the social reaction pathway of the PWM model when applied to adolescent alcohol use. Specifically, prototypes, perceived vulnerability, and norms predicted willingness to drink, which in turn predicted drinking behavior (drinks per week and peak number of drinks) over a period of 12months. As such, these findings suggest that the social reaction pathway of the PWM is applicable to adolescent drinkers, meaning that adolescent drinking behavior is based on a less planned and socially based decision process. PMID:27155242

  20. Model Minority Stereotyping, Perceived Discrimination, and Adjustment Among Adolescents from Asian American Backgrounds.

    Science.gov (United States)

    Kiang, Lisa; Witkow, Melissa R; Thompson, Taylor L

    2016-07-01

    The model minority image is a common and pervasive stereotype that Asian American adolescents must navigate. Using multiwave data from 159 adolescents from Asian American backgrounds (mean age at initial recruitment = 15.03, SD = .92; 60 % female; 74 % US-born), the current study targeted unexplored aspects of the model minority experience in conjunction with more traditionally measured experiences of negative discrimination. When examining normative changes, perceptions of model minority stereotyping increased over the high school years while perceptions of discrimination decreased. Both experiences were not associated with each other, suggesting independent forms of social interactions. Model minority stereotyping generally promoted academic and socioemotional adjustment, whereas discrimination hindered outcomes. Moreover, in terms of academic adjustment, the model minority stereotype appears to protect against the detrimental effect of discrimination. Implications of the complex duality of adolescents' social interactions are discussed. PMID:26251100

  1. Blackboard architecture and qualitative model in a computer aided assistant designed to define computers for HEP computing

    International Nuclear Information System (INIS)

    Using BLACKBOARD architecture and qualitative model, an expert systm was developed to assist the use in defining the computers method for High Energy Physics computing. The COMEX system requires an IBM AT personal computer or compatible with than 640 Kb RAM and hard disk. 5 refs.; 9 figs

  2. Role models and occupational ambitions of in-school male adolescents

    Directory of Open Access Journals (Sweden)

    Suhail Ahmad Azmi

    2014-01-01

    Full Text Available Background: A role model is perceived as worthy of imitation, their selection can indicate significant elements of psychosocial health and self-projection in adolescents. Patterns of behavior and lifestyle choices established during adolescence can have immediate and lasting effects on health. Materials and Methods: Cross-sectional study was undertaken in the schools of Aligarh, Uttar Pradesh, India. The sample frame was 2347, out of which a sample of 390 students was studied. Data collected were entered and analyzed by SPSS for Windows version 10%. Results: Majority (62.7% of adolescents revealed that their role models were Film Star (34.8% and their Teachers (27.9%, Parents (14.3%, Sportsman (12.0%. Politicians as the role models were opted by least proportion (1.2%. Desire of future occupation was Businessmen (27.9%, Doctor (18.6, and Engineer (14.4%. Conclusion: Nearly all adolescents had a role model. There is greater impact of cinema on the minds of adolescents, which resulted in choosing film actors as their role model. Aspiration of future occupation was not related to the characteristics of the role model.

  3. Direct and Indirect Effects of Parental Influence upon Adolescent Alcohol Use: A Structural Equation Modeling Analysis

    Science.gov (United States)

    Kim, Young-Mi; Neff, James Alan

    2010-01-01

    A model incorporating the direct and indirect effects of parental monitoring on adolescent alcohol use was evaluated by applying structural equation modeling (SEM) techniques to data on 4,765 tenth-graders in the 2001 Monitoring the Future Study. Analyses indicated good fit of hypothesized measurement and structural models. Analyses supported both…

  4. The gamesmanship of sex: a model based on African American adolescent accounts.

    Science.gov (United States)

    Eyre, S L; Hoffman, V; Millstein, S G

    1998-12-01

    This article examines adolescent understanding of the social context of sexual behavior. Using grounded theory to interpret interviews with 39 African American male and female adolescents, the article builds a model of sex-related behavior as a set of interrelated games. A courtship game involves communication of sexual or romantic interest and, over time, formation of a romantic relationship. A duplicity game draws on conventions of a courtship game to trick a partner into having sex. A disclosure game spreads stories about one's own and other's sex-related activities to peers in a gossip network. Finally, a prestige game builds social reputation in the eyes of peers, typically based on gender-specific standards. The article concludes by examining the meanings that sex-related behavior may have for adolescents and the potential use of social knowledge for facilitating adolescent health. PMID:9884994

  5. Computational modeling of acute myocardial infarction.

    Science.gov (United States)

    Sáez, P; Kuhl, E

    2016-01-01

    Myocardial infarction, commonly known as heart attack, is caused by reduced blood supply and damages the heart muscle because of a lack of oxygen. Myocardial infarction initiates a cascade of biochemical and mechanical events. In the early stages, cardiomyocytes death, wall thinning, collagen degradation, and ventricular dilation are the immediate consequences of myocardial infarction. In the later stages, collagenous scar formation in the infarcted zone and hypertrophy of the non-infarcted zone are auto-regulatory mechanisms to partly correct for these events. Here we propose a computational model for the short-term adaptation after myocardial infarction using the continuum theory of multiplicative growth. Our model captures the effects of cell death initiating wall thinning, and collagen degradation initiating ventricular dilation. Our simulations agree well with clinical observations in early myocardial infarction. They represent a first step toward simulating the progression of myocardial infarction with the ultimate goal to predict the propensity toward heart failure as a function of infarct intensity, location, and size. PMID:26583449

  6. A Multidimensional Model of Mothers’ Perceptions of Parent Alcohol Socialization and Adolescent Alcohol Misuse

    Science.gov (United States)

    Ennett, Susan T.; Jackson, Christine; Cole, Veronica T.; Haws, Susan; Foshee, Vangie A.; Reyes, Heathe Luz McNaughton; Burns, Alison Reimuller; Cox, Melissa J.; Cai, Li

    2015-01-01

    We assessed a multidimensional model of parent alcohol socialization in which key socialization factors were considered simultaneously to identify combinations of factors that increase or decrease risk for development of adolescent alcohol misuse. Of interest was the interplay between putative risk and protective factors, such as whether the typically detrimental effects on youth drinking of parenting practices tolerant of some adolescent alcohol use are mitigated by an effective overall approach to parenting and parental modeling of modest alcohol use. The sample included 1,530 adolescents and their mothers; adolescents’ mean age was 13.0 (SD = .99) at the initial assessment. Latent profile analysis was conducted of mothers’ reports of their attitude toward teen drinking, alcohol-specific parenting practices, parental alcohol use and problem use, and overall approach to parenting. The profiles were used to predict trajectories of adolescent alcohol misuse from early to middle adolescence. Four profiles were identified: two profiles reflected conservative alcohol-specific parenting practices and two reflected alcohol-tolerant practices, all in the context of other attributes. Alcohol misuse accelerated more rapidly from grade 6 through 10 in the two alcohol-tolerant compared with conservative profiles. Results suggest that maternal tolerance of some youth alcohol use, even in the presence of dimensions of an effective parenting style and low parental alcohol use and problem use, is not an effective strategy for reducing risky adolescent alcohol use. PMID:26415053

  7. Emotional closeness to parents and grandparents: A moderated mediation model predicting adolescent adjustment.

    Science.gov (United States)

    Attar-Schwartz, Shalhevet

    2015-09-01

    Warm and emotionally close relationships with parents and grandparents have been found in previous studies to be linked with better adolescent adjustment. The present study, informed by Family Systems Theory and Intergenerational Solidarity Theory, uses a moderated mediation model analyzing the contribution of the dynamics of these intergenerational relationships to adolescent adjustment. Specifically, it examines the mediating role of emotional closeness to the closest grandparent in the relationship between emotional closeness to a parent (the offspring of the closest grandparent) and adolescent adjustment difficulties. The model also examines the moderating role of emotional closeness to parents in the relationship between emotional closeness to grandparents and adjustment difficulties. The study was based on a sample of 1,405 Jewish Israeli secondary school students (ages 12-18) who completed a structured questionnaire. It was found that emotional closeness to the closest grandparent was more strongly associated with reduced adjustment difficulties among adolescents with higher levels of emotional closeness to their parents. In addition, adolescent adjustment and emotional closeness to parents was partially mediated by emotional closeness to grandparents. Examining the family conditions under which adolescents' relationships with grandparents is stronger and more beneficial for them can help elucidate variations in grandparent-grandchild ties and expand our understanding of the mechanisms that shape child outcomes. PMID:26237053

  8. Computational Modeling of Biological Systems From Molecules to Pathways

    CERN Document Server

    2012-01-01

    Computational modeling is emerging as a powerful new approach for studying and manipulating biological systems. Many diverse methods have been developed to model, visualize, and rationally alter these systems at various length scales, from atomic resolution to the level of cellular pathways. Processes taking place at larger time and length scales, such as molecular evolution, have also greatly benefited from new breeds of computational approaches. Computational Modeling of Biological Systems: From Molecules to Pathways provides an overview of established computational methods for the modeling of biologically and medically relevant systems. It is suitable for researchers and professionals working in the fields of biophysics, computational biology, systems biology, and molecular medicine.

  9. AIR INGRESS ANALYSIS: COMPUTATIONAL FLUID DYNAMIC MODELS

    International Nuclear Information System (INIS)

    The Idaho National Laboratory (INL), under the auspices of the U.S. Department of Energy, is performing research and development that focuses on key phenomena important during potential scenarios that may occur in very high temperature reactors (VHTRs). Phenomena Identification and Ranking Studies to date have ranked an air ingress event, following on the heels of a VHTR depressurization, as important with regard to core safety. Consequently, the development of advanced air ingress-related models and verification and validation data are a very high priority. Following a loss of coolant and system depressurization incident, air will enter the core of the High Temperature Gas Cooled Reactor through the break, possibly causing oxidation of the in-the core and reflector graphite structure. Simple core and plant models indicate that, under certain circumstances, the oxidation may proceed at an elevated rate with additional heat generated from the oxidation reaction itself. Under postulated conditions of fluid flow and temperature, excessive degradation of the lower plenum graphite can lead to a loss of structural support. Excessive oxidation of core graphite can also lead to the release of fission products into the confinement, which could be detrimental to a reactor safety. Computational fluid dynamic model developed in this study will improve our understanding of this phenomenon. This paper presents two-dimensional and three-dimensional CFD results for the quantitative assessment of the air ingress phenomena. A portion of results of the density-driven stratified flow in the inlet pipe will be compared with results of the experimental results.

  10. AIR INGRESS ANALYSIS: COMPUTATIONAL FLUID DYNAMIC MODELS

    Energy Technology Data Exchange (ETDEWEB)

    Chang H. Oh; Eung S. Kim; Richard Schultz; Hans Gougar; David Petti; Hyung S. Kang

    2010-08-01

    The Idaho National Laboratory (INL), under the auspices of the U.S. Department of Energy, is performing research and development that focuses on key phenomena important during potential scenarios that may occur in very high temperature reactors (VHTRs). Phenomena Identification and Ranking Studies to date have ranked an air ingress event, following on the heels of a VHTR depressurization, as important with regard to core safety. Consequently, the development of advanced air ingress-related models and verification and validation data are a very high priority. Following a loss of coolant and system depressurization incident, air will enter the core of the High Temperature Gas Cooled Reactor through the break, possibly causing oxidation of the in-the core and reflector graphite structure. Simple core and plant models indicate that, under certain circumstances, the oxidation may proceed at an elevated rate with additional heat generated from the oxidation reaction itself. Under postulated conditions of fluid flow and temperature, excessive degradation of the lower plenum graphite can lead to a loss of structural support. Excessive oxidation of core graphite can also lead to the release of fission products into the confinement, which could be detrimental to a reactor safety. Computational fluid dynamic model developed in this study will improve our understanding of this phenomenon. This paper presents two-dimensional and three-dimensional CFD results for the quantitative assessment of the air ingress phenomena. A portion of results of the density-driven stratified flow in the inlet pipe will be compared with results of the experimental results.

  11. Entropy generation in a model of reversible computation

    OpenAIRE

    D. De Falco; Tamascelli, D.

    2006-01-01

    We present a model in which, due to the quantum nature of the signals controlling the implementation time of successive unitary computational steps, \\emph{physical} irreversibility appears in the execution of a \\emph{logically} reversible computation.

  12. Penjadwalan Resource Pada Cloud Computing Menggunakan Model Integer Programming

    OpenAIRE

    Arlita, Nazly

    2015-01-01

    Cloud computing isn’t popular yet, but its development is increadibly. Cloud computing is being used because of the resource limitations as a contraints that blocks computation activities. This research purpose to obtain minimum cost in cloud computing service by using binary integer programming models. The service applying infrastructure as a service (IaaS) where virtualization machine being to user to use cloud computing . Optimization of this research showing which server deserves selecte...

  13. Propagation of Computer Virus under Human Intervention: A Dynamical Model

    OpenAIRE

    Gan, Chenquan; Yang, Xiaofan; Liu, Wanping; Zhu, Qingyi; Zhang, Xulong

    2012-01-01

    This paper examines the propagation behavior of computer virus under human intervention. A dynamical model describing the spread of computer virus, under which a susceptible computer can become recovered directly and an infected computer can become susceptible directly, is proposed. Through a qualitative analysis of this model, it is found that the virus-free equilibrium is globally asymptotically stable when the basic reproduction number R0≤1, whereas the viral equilibrium is globally asympt...

  14. Computer algorithms and applications used to assist the evaluation and treatment of adolescent idiopathic scoliosis: a review of published articles 2000–2009

    OpenAIRE

    Phan, Philippe; Mezghani, Neila; Aubin, Carl-Éric; de Guise, Jacques A.; Labelle, Hubert

    2011-01-01

    Adolescent idiopathic scoliosis (AIS) is a complex spinal deformity whose assessment and treatment present many challenges. Computer applications have been developed to assist clinicians. A literature review on computer applications used in AIS evaluation and treatment has been undertaken. The algorithms used, their accuracy and clinical usability were analyzed. Computer applications have been used to create new classifications for AIS based on 2D and 3D features, assess scoliosis severity or...

  15. Lindenmayer systems as a model of computations

    CERN Document Server

    Ozhigov, Y I

    1998-01-01

    LS is a particular type of computational processes simulating living tissue. They use an unlimited branching process arising from the simultaneous substitutions of some words instead of letters in some initial word. This combines the properties of cellular automata and grammars. It is proved that 1) The set of languages, computed in a polynomial time on such LS that all replacing words are not empty, is exactly NP- languages. 2) The set of languages, computed in a polynomial time on arbitrary LS, contains the polynomial hierarchy. 3) The set of languages, computed in a polynomial time on a nondeterministic version of LS, strictly contains the set of languages, computed in a polynomial time on Turing Machines with a space complexity $n^a$, where $a$ is positive integer. In particular, the last two results mean that Lindenmayer systems may be even more powerful tool of computations than nondeterministic Turing Machine.

  16. Elements of matrix modeling and computing with Matlab

    CERN Document Server

    White, Robert E

    2006-01-01

    As discrete models and computing have become more common, there is a need to study matrix computation and numerical linear algebra. Encompassing a diverse mathematical core, Elements of Matrix Modeling and Computing with MATLAB examines a variety of applications and their modeling processes, showing you how to develop matrix models and solve algebraic systems. Emphasizing practical skills, it creates a bridge from problems with two and three variables to more realistic problems that have additional variables. Elements of Matrix Modeling and Computing with MATLAB focuses on seven basic applicat

  17. Predictive Capability Maturity Model for computational modeling and simulation.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy; Pilch, Martin M.

    2007-10-01

    The Predictive Capability Maturity Model (PCMM) is a new model that can be used to assess the level of maturity of computational modeling and simulation (M&S) efforts. The development of the model is based on both the authors experience and their analysis of similar investigations in the past. The perspective taken in this report is one of judging the usefulness of a predictive capability that relies on the numerical solution to partial differential equations to better inform and improve decision making. The review of past investigations, such as the Software Engineering Institute's Capability Maturity Model Integration and the National Aeronautics and Space Administration and Department of Defense Technology Readiness Levels, indicates that a more restricted, more interpretable method is needed to assess the maturity of an M&S effort. The PCMM addresses six contributing elements to M&S: (1) representation and geometric fidelity, (2) physics and material model fidelity, (3) code verification, (4) solution verification, (5) model validation, and (6) uncertainty quantification and sensitivity analysis. For each of these elements, attributes are identified that characterize four increasing levels of maturity. Importantly, the PCMM is a structured method for assessing the maturity of an M&S effort that is directed toward an engineering application of interest. The PCMM does not assess whether the M&S effort, the accuracy of the predictions, or the performance of the engineering system satisfies or does not satisfy specified application requirements.

  18. International Nuclear Model personal computer (PCINM): Model documentation

    International Nuclear Information System (INIS)

    The International Nuclear Model (INM) was developed to assist the Energy Information Administration (EIA), U.S. Department of Energy (DOE) in producing worldwide projections of electricity generation, fuel cycle requirements, capacities, and spent fuel discharges from commercial nuclear reactors. The original INM was developed, maintained, and operated on a mainframe computer system. In spring 1992, a streamlined version of INM was created for use on a microcomputer utilizing CLIPPER and PCSAS software. This new version is known as PCINM. This documentation is based on the new PCINM version. This document is designed to satisfy the requirements of several categories of users of the PCINM system including technical analysts, theoretical modelers, and industry observers. This document assumes the reader is familiar with the nuclear fuel cycle and each of its components. This model documentation contains four chapters and seven appendices. Chapter Two presents the model overview containing the PCINM structure and process flow, the areas for which projections are made, and input data and output reports. Chapter Three presents the model technical specifications showing all model equations, algorithms, and units of measure. Chapter Four presents an overview of all parameters, variables, and assumptions used in PCINM. The appendices present the following detailed information: variable and parameter listings, variable and equation cross reference tables, source code listings, file layouts, sample report outputs, and model run procedures. 2 figs

  19. Structural computational modeling of RNA aptamers.

    Science.gov (United States)

    Xu, Xiaojun; Dickey, David D; Chen, Shi-Jie; Giangrande, Paloma H

    2016-07-01

    RNA aptamers represent an emerging class of biologics that can be easily adapted for personalized and precision medicine. Several therapeutic aptamers with desirable binding and functional properties have been developed and evaluated in preclinical studies over the past 25years. However, for the majority of these aptamers, their clinical potential has yet to be realized. A significant hurdle to the clinical adoption of this novel class of biologicals is the limited information on their secondary and tertiary structure. Knowledge of the RNA's structure would greatly facilitate and expedite the post-selection optimization steps required for translation, including truncation (to reduce costs of manufacturing), chemical modification (to enhance stability and improve safety) and chemical conjugation (to improve drug properties for combinatorial therapy). Here we describe a structural computational modeling methodology that when coupled to a standard functional assay, can be used to determine key sequence and structural motifs of an RNA aptamer. We applied this methodology to enable the truncation of an aptamer to prostate specific membrane antigen (PSMA) with great potential for targeted therapy that had failed previous truncation attempts. This methodology can be easily applied to optimize other aptamers with therapeutic potential. PMID:26972787

  20. Geometric modeling for computer aided design

    Science.gov (United States)

    Schwing, James L.; Olariu, Stephen

    1995-01-01

    The primary goal of this grant has been the design and implementation of software to be used in the conceptual design of aerospace vehicles particularly focused on the elements of geometric design, graphical user interfaces, and the interaction of the multitude of software typically used in this engineering environment. This has resulted in the development of several analysis packages and design studies. These include two major software systems currently used in the conceptual level design of aerospace vehicles. These tools are SMART, the Solid Modeling Aerospace Research Tool, and EASIE, the Environment for Software Integration and Execution. Additional software tools were designed and implemented to address the needs of the engineer working in the conceptual design environment. SMART provides conceptual designers with a rapid prototyping capability and several engineering analysis capabilities. In addition, SMART has a carefully engineered user interface that makes it easy to learn and use. Finally, a number of specialty characteristics have been built into SMART which allow it to be used efficiently as a front end geometry processor for other analysis packages. EASIE provides a set of interactive utilities that simplify the task of building and executing computer aided design systems consisting of diverse, stand-alone, analysis codes. Resulting in a streamlining of the exchange of data between programs reducing errors and improving the efficiency. EASIE provides both a methodology and a collection of software tools to ease the task of coordinating engineering design and analysis codes.

  1. Computational modeling of epidural cortical stimulation

    Science.gov (United States)

    Wongsarnpigoon, Amorn; Grill, Warren M.

    2008-12-01

    Epidural cortical stimulation (ECS) is a developing therapy to treat neurological disorders. However, it is not clear how the cortical anatomy or the polarity and position of the electrode affects current flow and neural activation in the cortex. We developed a 3D computational model simulating ECS over the precentral gyrus. With the electrode placed directly above the gyrus, about half of the stimulus current flowed through the crown of the gyrus while current density was low along the banks deep in the sulci. Beneath the electrode, neurons oriented perpendicular to the cortical surface were depolarized by anodic stimulation, and neurons oriented parallel to the boundary were depolarized by cathodic stimulation. Activation was localized to the crown of the gyrus, and neurons on the banks deep in the sulci were not polarized. During regulated voltage stimulation, the magnitude of the activating function was inversely proportional to the thickness of the CSF and dura. During regulated current stimulation, the activating function was not sensitive to the thickness of the dura but was slightly more sensitive than during regulated voltage stimulation to the thickness of the CSF. Varying the width of the gyrus and the position of the electrode altered the distribution of the activating function due to changes in the orientation of the neurons beneath the electrode. Bipolar stimulation, although often used in clinical practice, reduced spatial selectivity as well as selectivity for neuron orientation.

  2. Lindenmayer systems as a model of computations

    OpenAIRE

    Ozhigov, Yuri

    1998-01-01

    LS is a particular type of computational processes simulating living tissue. They use an unlimited branching process arising from the simultaneous substitutions of some words instead of letters in some initial word. This combines the properties of cellular automata and grammars. It is proved that 1) The set of languages, computed in a polynomial time on such LS that all replacing words are not empty, is exactly NP- languages. 2) The set of languages, computed in a polynomial time on arbitrary...

  3. Review of computational thermal-hydraulic modeling

    International Nuclear Information System (INIS)

    Corrosion of heat transfer tubing in nuclear steam generators has been a persistent problem in the power generation industry, assuming many different forms over the years depending on chemistry and operating conditions. Whatever the corrosion mechanism, a fundamental understanding of the process is essential to establish effective management strategies. To gain this fundamental understanding requires an integrated investigative approach that merges technology from many diverse scientific disciplines. An important aspect of an integrated approach is characterization of the corrosive environment at high temperature. This begins with a thorough understanding of local thermal-hydraulic conditions, since they affect deposit formation, chemical concentration, and ultimately corrosion. Computational Fluid Dynamics (CFD) can and should play an important role in characterizing the thermal-hydraulic environment and in predicting the consequences of that environment,. The evolution of CFD technology now allows accurate calculation of steam generator thermal-hydraulic conditions and the resulting sludge deposit profiles. Similar calculations are also possible for model boilers, so that tests can be designed to be prototypic of the heat exchanger environment they are supposed to simulate. This paper illustrates the utility of CFD technology by way of examples in each of these two areas. This technology can be further extended to produce more detailed local calculations of the chemical environment in support plate crevices, beneath thick deposits on tubes, and deep in tubesheet sludge piles. Knowledge of this local chemical environment will provide the foundation for development of mechanistic corrosion models, which can be used to optimize inspection and cleaning schedules and focus the search for a viable fix

  4. Improving the Dietary Patterns of Adolescents Using a Computer-Based Approach

    Science.gov (United States)

    Casazza, Krista; Ciccazzo, Michele

    2006-01-01

    The Centers for Disease Control and Prevention (CDC) recently reported that 16-33% of children and adolescents in the United States are overweight or obese, making this the number one nutritional disease of this group. The prevalence appears to be increasing annually, as are the associated consequences. Moreover, the CDC estimates that less than…

  5. Attachment-based family therapy for depressed and suicidal adolescents: theory, clinical model and empirical support.

    Science.gov (United States)

    Ewing, E Stephanie Krauthamer; Diamond, Guy; Levy, Suzanne

    2015-01-01

    Attachment-Based Family Therapy (ABFT) is a manualized family-based intervention designed for working with depressed adolescents, including those at risk for suicide, and their families. It is an empirically informed and supported treatment. ABFT has its theoretical underpinnings in attachment theory and clinical roots in structural family therapy and emotion focused therapies. ABFT relies on a transactional model that aims to transform the quality of adolescent-parent attachment, as a means of providing the adolescent with a more secure relationship that can support them during challenging times generally, and the crises related to suicidal thinking and behavior, specifically. This article reviews: (1) the theoretical foundations of ABFT (attachment theory, models of emotional development); (2) the ABFT clinical model, including training and supervision factors; and (3) empirical support. PMID:25778674

  6. Toward an integrative model of doping use: an empirical study with adolescent athletes.

    Science.gov (United States)

    Lazuras, Lambros; Barkoukis, Vassileios; Tsorbatzoudis, Haralambos

    2015-02-01

    The present study assessed adolescent athletes' intentions toward doping by using an integrative theoretical model. Overall, 650 adolescent athletes from team and individual sports completed an anonymous structured questionnaire including demographic information, social desirability, achievement goals, motivational regulations, sportspersonship orientations, social cognitive variables, and anticipated regret. Hierarchical regression analysis showed that the integrative model predicted 57.2% of the variance in doping intentions. Social cognitive variables and anticipated regret directly predicted doping intentions. Anticipated regret added 3% incremental variance on top of other predictors. Multiple mediation analyses showed that the effects of achievement goals on intentions were mediated by self-efficacy beliefs, whereas the effects of sportspersonship were mediated by attitudes and anticipated regret. The present study confirmed the dual structure of an integrative model of doping intentions and further highlighted the role of anticipated regret in the study of adolescent doping use. PMID:25730890

  7. A Psychoecological Model of Academic Performance among Hispanic Adolescents

    Science.gov (United States)

    Chun, Heejung; Dickson, Ginger

    2011-01-01

    Although the number of students who complete high school continues to rise, dramatic differences in school success remain across racial/ethnic groups. The current study addressed Hispanic adolescents' academic performance by investigating the relationships of parental involvement, culturally responsive teaching, sense of school belonging, and…

  8. Onset to First Alcohol Use in Early Adolescence: A Network Diffusion Model

    OpenAIRE

    Light, John M.; Greenan, Charlotte C.; Rusby, Julie C.; Nies, Kimberley M.; Snijders, Tom A.B.

    2013-01-01

    A novel version of Snijders’s stochastic actor-based modeling (SABM) framework is applied to model the diffusion of first alcohol use through middle school-wide longitudinal networks of early adolescents, aged approximately 11–14 years. Models couple a standard SABM for friendship network evolution with a proportional hazard model for first alcohol use. Meta-analysis of individual models for 12 schools found significant effects for friendship selection based on the same alco...

  9. Longitudinal and Integrative Tests of Family Stress Model Effects on Mexican Origin Adolescents

    Science.gov (United States)

    White, Rebecca M. B.; Liu, Yu; Nair, Rajni L.; Tein, Jenn-Yun

    2015-01-01

    The family stress model represents a common framework through which to examine the effects of environmental stressors on adolescent adjustment. The model suggests that economic and neighborhood stressors influence youth adjustment via disruptions to parenting. Incorporating integrative developmental theory, we examined the degree to which parents'…

  10. A Prospective Test of Cognitive Vulnerability Models of Depression with Adolescent Girls

    Science.gov (United States)

    Bohon, Cara; Stice, Eric; Burton, Emily; Fudell, Molly; Nolen-Hoeksema, Susan

    2008-01-01

    This study sought to provide a more rigorous prospective test of two cognitive vulnerability models of depression with longitudinal data from 496 adolescent girls. Results supported the cognitive vulnerability model in that stressors predicted future increases in depressive symptoms and onset of clinically significant major depression for…

  11. Stressful Life Events and the Tripartite Model: Relations to Anxiety and Depression in Adolescent Females

    Science.gov (United States)

    Fox, Jeremy K.; Halpern, Leslie F.; Ryan, Julie L.; Lowe, Kelly A.

    2010-01-01

    Although the tripartite model reliably distinguishes anxiety and depression in adolescents, it remains unclear how negative affectivity (NA) and positive affectivity (PA) influence developmental pathways to internalizing problems. Based on models which propose that affectivity shapes how youth react to stress, the present study attempted to…

  12. A Moderated Mediation Model: Racial Discrimination, Coping Strategies, and Racial Identity among Black Adolescents

    Science.gov (United States)

    Seaton, Eleanor K.; Upton, Rachel; Gilbert, Adrianne; Volpe, Vanessa

    2014-01-01

    This study examined a moderated mediation model among 314 Black adolescents aged 13-18. The model included general coping strategies (e.g., active, distracting, avoidant, and support-seeking strategies) as mediators and racial identity dimensions (racial centrality, private regard, public regard, minority, assimilationist, and humanist ideologies)…

  13. Adolescents and Music Media: Toward an Involvement-Mediational Model of Consumption and Self-Concept

    Science.gov (United States)

    Kistler, Michelle; Rodgers, Kathleen Boyce; Power, Thomas; Austin, Erica Weintraub; Hill, Laura Griner

    2010-01-01

    Using social cognitive theory and structural regression modeling, we examined pathways between early adolescents' music media consumption, involvement with music media, and 3 domains of self-concept (physical appearance, romantic appeal, and global self-worth; N=124). A mediational model was supported for 2 domains of self-concept. Music media…

  14. A Biopsychosocial Model of the Development of Chronic Conduct Problems in Adolescence.

    Science.gov (United States)

    Dodge, Kenneth A.; Pettit, Gregory S.

    2003-01-01

    A biopsychosocial model of the development of adolescent chronic conduct problems is presented and supported through a review of empirical findings. The model posits that biological dispositions and sociocultural contexts place certain children at risk in early life but that life experiences with parents, peers, and social institutions increment…

  15. A State-Trait Model of Negative Life Event Occurrence in Adolescence: Predictors of Stability in the Occurrence of Stressors

    Science.gov (United States)

    King, Kevin M.; Molina, Brooke S. G.; Chassin, Laurie

    2008-01-01

    Stressful life events are an important risk factor for psychopathology among children and adolescents. However, variation in life stress may be both stable and time-varying with associated differences in the antecedents. We tested, using latent variable modeling, a state-trait model of stressful life events in adolescence, and predictors of…

  16. Body Dissatisfaction and Eating Disturbances in Early Adolescence: A Structural Modeling Investigation Examining Negative Affect and Peer Factors

    Science.gov (United States)

    Hutchinson, Delyse M.; Rapee, Ronald M.; Taylor, Alan

    2010-01-01

    This study tested five proposed models of the relationship of negative affect and peer factors in early adolescent body dissatisfaction, dieting, and bulimic behaviors. A large community sample of girls in early adolescence was assessed via questionnaire (X[overbar] age = 12.3 years). Structural equation modeling (SEM) indicated that negative…

  17. The influence of sensation-seeking and parental and peer influences in early adolescence on risk involvement through middle adolescence: A structural equation modeling analysis

    OpenAIRE

    Wang, Bo; Deveaux, Lynette; Lunn, Sonja; Dinaj-Koci, Veronica; Li, Xiaoming; Stanton, Bonita

    2013-01-01

    This study examined the relationships between youth and parental sensation-seeking, peer influence, parental monitoring and youth risk involvement in adolescence using structural equation modeling. Beginning in grade-six, longitudinal data were collected from 543 students over three years. Youth sensation-seeking in grade six contributed to risk involvement in early adolescence (grades six and seven) indirectly through increased peer risk influence and decreased parental monitoring but did no...

  18. COMPUTER MODEL FOR ORGANIC FERTILIZER EVALUATION

    Directory of Open Access Journals (Sweden)

    Zdenko Lončarić

    2009-12-01

    seedlings with highest mass and leaf area are produced using growing media with pH close to 6 and with EC lower than 2 dSm-1. It could be concluded that conductivity approx. 3 dSm-1 has inhibitory effect on lettuce if pH is about 7 or higher. The computer model shows that raising pH and EC resulted in decreasing growth which could be expressed as increasing stress index. The lettuce height as a function of pH and EC is incorporated into the model as stress function showing increase of lettuce height by lowering EC from 4 to 1 dSm-1or pH from 7.4 to 6. The highest growing media index (8.1 was determined for mixture of composted pig manure and peat (1:1, and lowest (2.3 for composted horse manure and peat (1:2..

  19. Computational Intelligence Agent-Oriented Modelling

    Czech Academy of Sciences Publication Activity Database

    Neruda, Roman

    2006-01-01

    Roč. 5, č. 2 (2006), s. 430-433. ISSN 1109-2777 R&D Projects: GA MŠk 1M0567 Institutional research plan: CEZ:AV0Z10300504 Keywords : multi - agent system s * adaptive agent s * computational intelligence Subject RIV: IN - Informatics, Computer Science

  20. Integrating Numerical Computation into the Modeling Instruction Curriculum

    OpenAIRE

    Caballero, Marcos D.; Burk, John B.; Aiken, John M.; Douglas, Scott S.; Scanlon, Erin M.; Thoms, Brian; Schatz, Michael F.

    2012-01-01

    We describe a way to introduce physics high school students with no background in programming to computational problem-solving experiences. Our approach builds on the great strides made by the Modeling Instruction reform curriculum. This approach emphasizes the practices of "Developing and using models" and "Computational thinking" highlighted by the NRC K-12 science standards framework. We taught 9th-grade students in a Modeling-Instruction-based physics course to construct computational mod...

  1. Epidemiological Models Applied to Viruses in Computer Networks

    OpenAIRE

    José R.S. Piqueira; Betyna F. Navarro; Luiz H. A. Monteiro

    2005-01-01

    To investigate the use of classical epidemiological models for studying computer virus propagation we described analogies between computer and population disease propagation using SIR (Susceptible-Infected-Removed) epidemiological models. By modifying these models with the introduction of anti-viral individuals we analyzed the stability of the disease free equilibrium points. Consequently, the basal virus reproduction rate gives some theoretical hints about how to avoid infections in a comput...

  2. The complete guide to blender graphics computer modeling and animation

    CERN Document Server

    Blain, John M

    2014-01-01

    Smoothly Leads Users into the Subject of Computer Graphics through the Blender GUIBlender, the free and open source 3D computer modeling and animation program, allows users to create and animate models and figures in scenes, compile feature movies, and interact with the models and create video games. Reflecting the latest version of Blender, The Complete Guide to Blender Graphics: Computer Modeling & Animation, 2nd Edition helps beginners learn the basics of computer animation using this versatile graphics program. This edition incorporates many new features of Blender, including developments

  3. Idealized computational models for auditory receptive fields.

    Directory of Open Access Journals (Sweden)

    Tony Lindeberg

    Full Text Available We present a theory by which idealized models of auditory receptive fields can be derived in a principled axiomatic manner, from a set of structural properties to (i enable invariance of receptive field responses under natural sound transformations and (ii ensure internal consistency between spectro-temporal receptive fields at different temporal and spectral scales. For defining a time-frequency transformation of a purely temporal sound signal, it is shown that the framework allows for a new way of deriving the Gabor and Gammatone filters as well as a novel family of generalized Gammatone filters, with additional degrees of freedom to obtain different trade-offs between the spectral selectivity and the temporal delay of time-causal temporal window functions. When applied to the definition of a second-layer of receptive fields from a spectrogram, it is shown that the framework leads to two canonical families of spectro-temporal receptive fields, in terms of spectro-temporal derivatives of either spectro-temporal Gaussian kernels for non-causal time or a cascade of time-causal first-order integrators over the temporal domain and a Gaussian filter over the logspectral domain. For each filter family, the spectro-temporal receptive fields can be either separable over the time-frequency domain or be adapted to local glissando transformations that represent variations in logarithmic frequencies over time. Within each domain of either non-causal or time-causal time, these receptive field families are derived by uniqueness from the assumptions. It is demonstrated how the presented framework allows for computation of basic auditory features for audio processing and that it leads to predictions about auditory receptive fields with good qualitative similarity to biological receptive fields measured in the inferior colliculus (ICC and primary auditory cortex (A1 of mammals.

  4. An Emotional Agent Model Based on Granular Computing

    Directory of Open Access Journals (Sweden)

    Jun Hu

    2012-01-01

    Full Text Available Affective computing has a very important significance for fulfilling intelligent information processing and harmonious communication between human being and computers. A new model for emotional agent is proposed in this paper to make agent have the ability of handling emotions, based on the granular computing theory and the traditional BDI agent model. Firstly, a new emotion knowledge base based on granular computing for emotion expression is presented in the model. Secondly, a new emotional reasoning algorithm based on granular computing is proposed. Thirdly, a new emotional agent model based on granular computing is presented. Finally, based on the model, an emotional agent for patient assistant in hospital is realized, experiment results show that it is efficient to handle simple emotions.

  5. Computer modeling the thermal stable layered system

    International Nuclear Information System (INIS)

    The theoretical interpretation of results of works on creation thermal of stable layered system Fe-Be on which surface is offered FeBe2 (67 at. of % Be), and in volume - sated solution α-Fe (Be) contains is supported. In a case, when the average concentration of beryllium was above than limit of beryllium solubility in iron, at a surface of a sample on the part of a covering the thermal stable phase FeBe2 is formed, and on other surface - solid solution α-Fe (Be). The site between single-phase areas represents a bi-phase mix. The necessity of the account of features of diffusion processes in bi-phase area has appeared. It is connected that at formation of bi-phase area diffusion of components is slowed down and can stop absolutely. The purpose of the given work is the development of physical model and computer programs for accounts of component distribution of an alloy in view of spatial dependence of diffusion coefficients in bi-phase area. The system of the equations with diffusion coefficients with initial and boundary conditions is solved numerically with use of the standard software package IVPAG/DIVPAG from library DIGITAL. The initial condition was chosen as step, appropriate thickness of a deposit cover. Absence of flows on borders of a sample corresponds to the boundary conditions there.The structure of concentration beryllium was calculated at temperature 720 deg. C, the thickness of a cover was equal d0= 1.1, 2.2μm, thickness of a sample together with a cover d = 122 μm, λ= 0.15 and 0.3 μm. On the given concentration structure in each moment of time the coordinates x2 and xl, appropriate to an interval 0.13-0.67 of existence of bi-phase area FeBe2 + α-Fe(Be) were determined. In the given work the physical model allowing to explain the fact of thermal stabilization of intermetallide connections on a surface of modified metal samples by ion precipitation is developed

  6. Security Issues Model on Cloud Computing: A Case of Malaysia

    OpenAIRE

    Komeil Raisian; Jamaiah Yahaya

    2015-01-01

    By developing the cloud computing, viewpoint of many people regarding the infrastructure architectures, software distribution and improvement model changed significantly. Cloud computing associates with the pioneering deployment architecture, which could be done through grid calculating, effectiveness calculating and autonomic calculating. The fast transition towards that, has increased the worries regarding a critical issue for the effective transition of cloud computing. From the security v...

  7. A computationally tractable version of the collective model

    OpenAIRE

    Rowe, D J

    2003-01-01

    A computationally tractable version of the Bohr-Mottelson collective model is presented which makes it possible to diagonalize realistic collective models and obtain convergent results in relatively small appropriately chosen subspaces of the collective model Hilbert space. Special features of the proposed model is that it makes use of the beta wave functions given analytically by the softened-beta version of the Wilets-Jean model, proposed by Elliott et al., and a simple algorithm for comput...

  8. Development and validation of computational models of cellular interaction

    OpenAIRE

    Smallwood, R H; Holcombe, W.M.L.; Walker, D C

    2004-01-01

    In this paper we take the view that computational models of biological systems should satisfy two conditions – they should be able to predict function at a systems biology level, and robust techniques of validation against biological models must be available. A modelling paradigm for developing a predictive computational model of cellular interaction is described, and methods of providing robust validation against biological models are explored, followed by a consideration of soft...

  9. Counterconformity: an attribution model of adolescents' uniqueness-seeking behaviors in dressing.

    Science.gov (United States)

    Ling, I-Ling

    2008-01-01

    This article explores how an attribution model will illustrate uniqueness-seeking behavior in dressing in the Taiwanese adolescent subculture. The study employed 443 senior high school students. Results show that the tendency of uniqueness-seeking behavior in dressing is moderate. However, using cluster analysis to segment the counterconformity behavior of the subjects, the study demonstrates that there are two conspicuous types of segmentation "markets": rubber stamp and self-determined. The attribution models investigate the susceptibilities to informational and normative influence which have different direction impacts and weights on the adolescents' counterconformity behavior. More interestingly, path analyses indicate that consumer self-confidence mediates the relationship between informational influence and counterconformity behavior only on the rubber stamp type. This study then discusses how the adolescent consumers' need for uniqueness could be used in better understanding consumer behavior and the role consumption plays in their expression of identity. PMID:19149151

  10. Resilient Quantum Computation Error Models and Thresholds

    CERN Document Server

    Knill, E H; Zurek, W H; Knill, Emanuel; Laflamme, Raymond; Zurek, Wojciech H.

    1997-01-01

    Recent research has demonstrated that quantum computers can solve certain types of problems substantially faster than the known classical algorithms. These problems include factoring integers and certain physics simulations. Practical quantum computation requires overcoming the problems of environmental noise and operational errors, problems which appear to be much more severe than in classical computation due to the inherent fragility of quantum superpositions involving many degrees of freedom. Here we show that arbitrarily accurate quantum computations are possible provided that the error per operation is below a threshold value. The result is obtained by combining quantum error-correction, fault tolerant state recovery, fault tolerant encoding of operations and concatenation. It holds under physically realistic assumptions on the errors.

  11. Behavior computing modeling, analysis, mining and decision

    CERN Document Server

    2012-01-01

    Includes six case studies on behavior applications Presents new techniques for capturing behavior characteristics in social media First dedicated source of references for the theory and applications of behavior informatics and behavior computing

  12. Sticker DNA computer model--Part Ⅰ:Theory

    Institute of Scientific and Technical Information of China (English)

    XU Jin; DONG Yafei; WEI Xiaopeng

    2004-01-01

    Sticker model is one of the basic models in the DNA computer models. This model is coded with single-double stranded DNA molecules. It has the following advantages that the operations require no strands extension and use no enzymes; What's more, the materials are reusable. Therefore it arouses attention and interest of scientists in many fields. In this paper, we will systematically analyze the theories and applications of the model, summarize other scientists' contributions in this field, and propose our research results. This paper is the theoretical portion of the sticker model on DNA computer, which includes the introduction of the basic model of sticker computing. Firstly, we systematically introduce the basic theories of classic models about sticker computing; Secondly, we discuss the sticker system which is an abstract computing model based on the sticker model and formal languages; Finally, extend and perfect the model, and present two types of models that are more extensive in the applications and more perfect in the theory than the past models: one is the so-called k-bit sticker model, the other is full-message sticker DNA computing model.

  13. Soft Computing Models in Industrial and Environmental Applications

    CERN Document Server

    Abraham, Ajith; Corchado, Emilio; 7th International Conference, SOCO’12

    2013-01-01

    This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at SOCO 2012, held in the beautiful and historic city of Ostrava (Czech Republic), in September 2012.   Soft computing represents a collection or set of computational techniques in machine learning, computer science and some engineering disciplines, which investigate, simulate, and analyze very complex issues and phenomena.   After a through peer-review process, the SOCO 2012 International Program Committee selected 75 papers which are published in these conference proceedings, and represents an acceptance rate of 38%. In this relevant edition a special emphasis was put on the organization of special sessions. Three special sessions were organized related to relevant topics as: Soft computing models for Control Theory & Applications in Electrical Engineering, Soft computing models for biomedical signals and data processing and Advanced Soft Computing Methods in Computer Vision and Data Processing.   The selecti...

  14. Social and economic antecedents and consequences of adolescent aggressive personality: Predictions from the interactionist model.

    Science.gov (United States)

    Conger, Rand D; Martin, Monica J; Masarik, April S; Widaman, Keith F; Donnellan, M Brent

    2015-11-01

    The present study examined the development of a cohort of 279 early adolescents (52% female) from 1990 to 2005. Guided by the interactionist model of socioeconomic status and human development, we proposed that parent aggressive personality, economic circumstances, interparental conflict, and parenting characteristics would affect the development of adolescent aggressive personality traits. In turn, we hypothesized that adolescent aggressiveness would have a negative influence on adolescent functioning as an adult in terms of economic success, personality development, and close relationships 11 years later. Findings were generally supportive of the interactionist model proposition that social and economic difficulties in the family of origin intensify risk for adolescent aggressive personality (the social causation hypothesis) and that this personality trait impairs successful transition to adult roles (the social selection hypothesis) in a transactional process over time and generations. These results underscore how early development leads to child influences that appear to directly hamper the successful transition to adult roles (statistical main effects) and also amplify the negative impact of dysfunctional family systems on the transition to adulthood (statistical interaction effects). The findings suggest several possible points of intervention that might help to disrupt this negative developmental sequence of events. PMID:26439065

  15. Dynamical Models for Computer Viruses Propagation

    OpenAIRE

    2008-01-01

    Nowadays, digital computer systems and networks are the main engineering tools, being used in planning, design, operation, and control of all sizes of building, transportation, machinery, business, and life maintaining devices. Consequently, computer viruses became one of the most important sources of uncertainty, contributing to decrease the reliability of vital activities. A lot of antivirus programs have been developed, but they are limited to detecting and removing infections, based on pr...

  16. Reduced order methods for modeling and computational reduction

    CERN Document Server

    Rozza, Gianluigi

    2014-01-01

    This monograph addresses the state of the art of reduced order methods for modeling and computational reduction of complex parametrized systems, governed by ordinary and/or partial differential equations, with a special emphasis on real time computing techniques and applications in computational mechanics, bioengineering and computer graphics.  Several topics are covered, including: design, optimization, and control theory in real-time with applications in engineering; data assimilation, geometry registration, and parameter estimation with special attention to real-time computing in biomedical engineering and computational physics; real-time visualization of physics-based simulations in computer science; the treatment of high-dimensional problems in state space, physical space, or parameter space; the interactions between different model reduction and dimensionality reduction approaches; the development of general error estimation frameworks which take into account both model and discretization effects. This...

  17. User Behavior Trust Based Cloud Computing Access Control Model

    OpenAIRE

    Jiangcheng, Qin

    2016-01-01

    Context. With the development of computer software, hardware, and communication technologies, a new type of human-centered computing model, called Cloud Computing (CC) has been established as a commercial computer network service. However, the openness of CC brings huge security challenge to the identity-based access control system, as it not able to effectively prevent malicious users accessing; information security problems, system stability problems, and also the trust issues between cloud...

  18. Validation of a multifactorial risk factor model used for predicting future caries risk with nevada adolescents

    Directory of Open Access Journals (Sweden)

    Mobley Connie

    2011-05-01

    Full Text Available Abstract Background The objective of this study was to measure the validity and reliability of a multifactorial Risk Factor Model developed for use in predicting future caries risk in Nevada adolescents in a public health setting. Methods This study examined retrospective data from an oral health surveillance initiative that screened over 51,000 students 13-18 years of age, attending public/private schools in Nevada across six academic years (2002/2003-2007/2008. The Risk Factor Model included ten demographic variables: exposure to fluoridation in the municipal water supply, environmental smoke exposure, race, age, locale (metropolitan vs. rural, tobacco use, Body Mass Index, insurance status, sex, and sealant application. Multiple regression was used in a previous study to establish which significantly contributed to caries risk. Follow-up logistic regression ascertained the weight of contribution and odds ratios of the ten variables. Researchers in this study computed sensitivity, specificity, positive predictive value (PVP, negative predictive value (PVN, and prevalence across all six years of screening to assess the validity of the Risk Factor Model. Results Subjects' overall mean caries prevalence across all six years was 66%. Average sensitivity across all six years was 79%; average specificity was 81%; average PVP was 89% and average PVN was 67%. Conclusions Overall, the Risk Factor Model provided a relatively constant, valid measure of caries that could be used in conjunction with a comprehensive risk assessment in population-based screenings by school nurses/nurse practitioners, health educators, and physicians to guide them in assessing potential future caries risk for use in prevention and referral practices.

  19. Global Stability of an Epidemic Model of Computer Virus

    OpenAIRE

    Xiaofan Yang; Bei Liu; Chenquan Gan

    2014-01-01

    With the rapid popularization of the Internet, computers can enter or leave the Internet increasingly frequently. In fact, no antivirus software can detect and remove all sorts of computer viruses. This implies that viruses would persist on the Internet. To better understand the spread of computer viruses in these situations, a new propagation model is established and analyzed. The unique equilibrium of the model is globally asymptotically stable, in accordance with the reality. A parameter a...

  20. A qualitative model for computer-assisted instruction in cardiology.

    OpenAIRE

    Julen, N.; Siregar, P.; Sinteff, J. P.; Le Beux, P.

    1998-01-01

    CARDIOLAB is an interactive computational framework dedicated to teaching and computer-aided diagnosis in cardiology. The framework embodies models that simulate the heart's electrical activity. They constitute the core of a Computer-Assisted Instruction (CAI) program intended to teach, in a multimedia environment, the concepts underlying rhythmic disorders and cardiac diseases. The framework includes a qualitative model (QM) which is described in this paper. During simulation using QM, dynam...

  1. [Model of Engagement and Dropout for Adolescents with Borderline Personality Disorder].

    Science.gov (United States)

    Desrosiers, Lyne; Saint-Jean, Micheline; Laporte, Lise

    2016-01-01

    treatment were formalized in the Model of engagement and treatment dropout for adolescent with BPD. This theoretical model highlights two key milestones that may lead to treatment completion or to dropout during care. It illustrates that distinct processes characterize the premature and late dropouts of adolescents with BPD. The early terminations result from the failure of the care-setting to take advantage of the impetus for help seeking to engage the adolescent and the parent at that first critical moment in the care trajectory. On the other hand, the late dropouts translate failures of the care-setting to adopt corrective measures to maintain the patient in treatment at a second critical moment indicated by their disengagement.Conclusion The termination rate of those adolescent treatments could be diminished by a system of care-setting that recognizes the inherent difficulties related to the treatment of those specific patients, is proactive to solve problems of disengagement, integrates support systems for clinicians and promotes a reflexive practice. PMID:27570961

  2. Airfoil Computations using the γ - Reθ Model

    DEFF Research Database (Denmark)

    Sørensen, Niels N.

    computations. Based on this, an estimate of the error in the computations is determined to be approximately one percent in the attached region. Following the verification of the implemented model, the model is applied to four airfoils, NACA64- 018, NACA64-218, NACA64-418 and NACA64-618 and the results are...

  3. Python for Scientific Computing Education: Modeling of Queueing Systems

    Directory of Open Access Journals (Sweden)

    Vladimiras Dolgopolovas

    2014-01-01

    Full Text Available In this paper, we present the methodology for the introduction to scientific computing based on model-centered learning. We propose multiphase queueing systems as a basis for learning objects. We use Python and parallel programming for implementing the models and present the computer code and results of stochastic simulations.

  4. Python for Scientific Computing Education: Modeling of Queueing Systems

    OpenAIRE

    Vladimiras Dolgopolovas; Valentina Dagienė; Saulius Minkevičius; Leonidas Sakalauskas

    2014-01-01

    In this paper, we present the methodology for the introduction to scientific computing based on model-centered learning. We propose multiphase queueing systems as a basis for learning objects. We use Python and parallel programming for implementing the models and present the computer code and results of stochastic simulations.

  5. Computer Simulation Models of Economic Systems in Higher Education.

    Science.gov (United States)

    Smith, Lester Sanford

    The increasing complexity of educational operations make analytical tools, such as computer simulation models, especially desirable for educational administrators. This MA thesis examined the feasibility of developing computer simulation models of economic systems in higher education to assist decision makers in allocating resources. The report…

  6. Overview of ASC Capability Computing System Governance Model

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott W. [Los Alamos National Laboratory

    2012-07-11

    This document contains a description of the Advanced Simulation and Computing Program's Capability Computing System Governance Model. Objectives of the Governance Model are to ensure that the capability system resources are allocated on a priority-driven basis according to the Program requirements; and to utilize ASC Capability Systems for the large capability jobs for which they were designed and procured.

  7. Computational intelligence applications in modeling and control

    CERN Document Server

    Vaidyanathan, Sundarapandian

    2015-01-01

    The development of computational intelligence (CI) systems was inspired by observable and imitable aspects of intelligent activity of human being and nature. The essence of the systems based on computational intelligence is to process and interpret data of various nature so that that CI is strictly connected with the increase of available data as well as capabilities of their processing, mutually supportive factors. Developed theories of computational intelligence were quickly applied in many fields of engineering, data analysis, forecasting, biomedicine and others. They are used in images and sounds processing and identifying, signals processing, multidimensional data visualization, steering of objects, analysis of lexicographic data, requesting systems in banking, diagnostic systems, expert systems and many other practical implementations. This book consists of 16 contributed chapters by subject experts who are specialized in the various topics addressed in this book. The special chapters have been brought ...

  8. A DNA based model for addition computation

    Institute of Scientific and Technical Information of China (English)

    GAO Lin; YANG Xiao; LIU Wenbin; XU Jin

    2004-01-01

    Much effort has been made to solve computing problems by using DNA-an organic simulating method, which in some cases is preferable to the current electronic computer. However, No one at present has proposed an effective and applicable method to solve addition problem with molecular algorithm due to the difficulty in solving the carry problem which can be easily solved by hardware of an electronic computer. In this article, we solved this problem by employing two kinds of DNA strings, one is called result and operation string while the other is named carrier. The result and operation string contains some carry information by its own and denotes the ultimate result while the carrier is just for carrying use. The significance of this algorithm is the original code, the fairly easy steps to follow and the feasibility under current molecular biological technology.

  9. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    classical communication systems were not designed for the ubiquitous environment, hence their security has to be proven again, leading to the definition of new protocols designed specifically to address new vulnerabilities introduced by the ubiquitous nature of the system. Throughout the network security......, localisation services and many others. These technologies can be classified under the name of ubiquitous systems. The term Ubiquitous System dates back to 1991 when Mark Weiser at Xerox PARC Lab first referred to it in writing. He envisioned a future where computing technologies would have been melted in with...... our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...

  10. Computational Model for Microbubble Enhanced Performance of Airlift Bioreactor (ALB)

    OpenAIRE

    Ng, W C; Brittle, S.; Howell, R; W. B. Zimmerman

    2014-01-01

    This paper presents a computational model for microbubble enhanced performance of an airlift bioreactor (ALB). Five different bubble diameters were defined in the model under the same conditions (440 µm to 1 mm bubble diameter). The computational model parameters and the size of the ALB were defined by referring to experimental work done previously. The main objective of the model is to study the effect of bubble size on the rising velocity and the liquid flow velocity in the airlift reactor...

  11. Computational Modeling, Formal Analysis, and Tools for Systems Biology

    OpenAIRE

    Bartocci, Ezio; Lió, Pietro

    2016-01-01

    As the amount of biological data in the public domain grows, so does the range of modeling and analysis techniques employed in systems biology. In recent years, a number of theoretical computer science developments have enabled modeling methodology to keep pace. The growing interest in systems biology in executable models and their analysis has necessitated the borrowing of terms and methods from computer science, such as formal analysis, model checking, static analysis, and runtime verificat...

  12. Pervasive Computing Location-aware Model Based on Ontology

    Institute of Scientific and Technical Information of China (English)

    PU Fang; CAI Hai-bin; CAO Qi-ying; SUN Dao-qing; LI Tong

    2008-01-01

    In order to integrate heterogeneous location-aware systems into pervasive computing environment, a novel pervasive computing location-aware model based on ontology is presented. A location-aware model ontology (LMO) is constructed. The location-aware model has the capabilities of sharing knowledge, reasoning and adjusting the usage policies of services dynamically through a unified semantic location manner. At last, the work process of our proposed location-aware model is explained by an application scenario.

  13. A computational model of the human hand 93-ERI-053

    Energy Technology Data Exchange (ETDEWEB)

    Hollerbach, K.; Axelrod, T.

    1996-03-01

    The objectives of the Computational Hand Modeling project were to prove the feasibility of the Laboratory`s NIKE3D finite element code to orthopaedic problems. Because of the great complexity of anatomical structures and the nonlinearity of their behavior, we have focused on a subset of joints of the hand and lower extremity and have developed algorithms to model their behavior. The algorithms developed here solve fundamental problems in computational biomechanics and can be expanded to describe any other joints of the human body. This kind of computational modeling has never successfully been attempted before, due in part to a lack of biomaterials data and a lack of computational resources. With the computational resources available at the National Laboratories and the collaborative relationships we have established with experimental and other modeling laboratories, we have been in a position to pursue our innovative approach to biomechanical and orthopedic modeling.

  14. Unhealthy weight control behaviours in adolescent girls: a process model based on self-determination theory

    OpenAIRE

    Thøgersen-Ntoumani, Cecilie; Ntoumanis, Nikos

    2010-01-01

    This study used self-determination theory (Deci, E.L., & Ryan, R.M. (2000). The 'what' and 'why' of goal pursuits: Human needs and the self-determination of behavior. Psychological Inquiry, 11, 227-268.) to examine predictors of body image concerns and unhealthy weight control behaviours in a sample of 350 Greek adolescent girls. A process model was tested which proposed that perceptions of parental autonomy support and two life goals (health and image) would predict adolescents' degree of sa...

  15. Modeling of Longitudinal Changes in Left Ventricular Dimensions among Female Adolescent Runners

    OpenAIRE

    Norimitsu Kinoshita; Fuminori Katsukawa; Hajime Yamazaki

    2015-01-01

    Purpose Left ventricular (LV) enlargement has been linked to sudden cardiac death among young athletes. This study aimed to model the effect of long-term incessant endurance training on LV dimensions in female adolescent runners. Methods Japanese female adolescent competitive distance runners (n = 36, age: 15 years, height: 158.1 ± 4.6 cm, weight: 44.7 ± 6.1 kg, percent body fat: 17.0 ± 5.2%) underwent echocardiography and underwater weighing every 6 months for 3 years. Since the measurement ...

  16. Towards a Model of Suicidal Ideation for Hong Kong Chinese Adolescents

    Science.gov (United States)

    Sun, Rachel C. F.; Hui, Eadaoin K. P.; Watkins, David

    2006-01-01

    This study tested a model of suicidal ideation with family cohesion, expressiveness, conflicts, teacher support, teacher-student relationships and peer support as antecedents, and self-esteem and depression as mediators. Data was collected from survey questionnaires with 433 Hong Kong Chinese adolescents. The results showed that only family…

  17. Application of a Social Cognitive Model in Explaining Physical Activity in Iranian Female Adolescents

    Science.gov (United States)

    Taymoori, P.; Rhodes, R. E.; Berry, T. R.

    2010-01-01

    Adolescent Iranian girls are at high risk for physical inactivity due to cultural barriers such as restrictions regarding exercising in public and research is needed to explore ethnic and gender-related factors associated with physical activity (PA) participation. Using social cognitive theory as the guiding model, the purpose of this study was to…

  18. Family Economic Pressure and Adolescent Suicidal Ideation: Application of the Family Stress Model

    Science.gov (United States)

    Yoder, Kevin A.; Hoyt, Dan R.

    2005-01-01

    This study used a sample of 501 families from the Mississippi Delta region to examine the feasibility of the Family Stress Model for understanding adolescent suicidal ideation. The results indicated that family economic pressure was related to parental depressive symptoms, which, in turn, was related to parental hostile behavior and physical…

  19. Risk Models of Dating Aggression across Different Adolescent Relationships: A Developmental Psychopathology Approach

    Science.gov (United States)

    Williams, Tricia S.; Connolly, Jennifer; Pepler, Debra; Craig, Wendy; Laporte, Lise

    2008-01-01

    The present study examined physical dating aggression in different adolescent relationships and assessed linear, threshold, and moderator risk models for recurrent aggressive relationships. The 621 participants (59% girls, 41% boys) were drawn from a 1-year longitudinal survey of Canadian high school youths ranging from Grade 9 through Grade 12.…

  20. Conceptualizing a Theoretical Model for School-Centered Adolescent Physical Activity Intervention Research

    Science.gov (United States)

    Chen, Ang; Hancock, Gregory R.

    2006-01-01

    Adolescent physical inactivity has risen to an alarming rate. Several theoretical frameworks (models) have been proposed and tested in school-based interventions. The results are mixed, indicating a similar weakness as that observed in community-based physical activity interventions (Baranowski, Lin, Wetter, Resnicow, & Hearn, 1997). The…

  1. Mental Health, School Problems, and Social Networks: Modeling Urban Adolescent Substance Use

    Science.gov (United States)

    Mason, Michael J.

    2010-01-01

    This study tested a mediation model of the relationship with school problems, social network quality, and substance use with a primary care sample of 301 urban adolescents. It was theorized that social network quality (level of risk or protection in network) would mediate the effects of school problems, accounting for internalizing problems and…

  2. Adolescent Risk-Taking and the Five-Factor Model of Personality.

    Science.gov (United States)

    Gullone, Eleonora; Moore, Susan

    2000-01-01

    Investigates the links between adolescent risk-taking and personality, as conceptualized using the Five-factor Model of personality (N=459). Results reveal that risk judgments, personality factors, age and sex were significant predictors of risk behaviors; however, the personality factor of significance was found to differ depending upon the risk…

  3. Facebook and the Cognitive Model: A Tool for Promoting Adolescent Self-Awareness

    Science.gov (United States)

    Lewis, Lucy; Wahesh, Edward

    2012-01-01

    A homework activity incorporating the social networking site Facebook is presented as a tool for teaching adolescent clients about the cognitive model and increasing their ability to identify and modify problematic thinking. The authors describe how a worksheet developed to help clients examine information presented on their Facebook profile can…

  4. Testing an Idealized Dynamic Cascade Model of the Development of Serious Violence in Adolescence

    Science.gov (United States)

    Dodge, Kenneth A.; Greenberg, Mark T.; Malone, Patrick S.

    2008-01-01

    A dynamic cascade model of development of serious adolescent violence was proposed and tested through prospective inquiry with 754 children (50% male; 43% African American) from 27 schools at 4 geographic sites followed annually from kindergarten through Grade 11 (ages 5-18). Self, parent, teacher, peer, observer, and administrative reports…

  5. Depression amongst Chinese Adolescents in Hong Kong: An Evaluation of a Stress Moderation Model

    Science.gov (United States)

    Ng, Catalina S. M.; Hurry, Jane

    2011-01-01

    Stress has an established association with depression. However, not all adolescents experiencing stressors become depressed and it is helpful to identify potential resilience factors. The current study tests a theoretical extension of a stress-diathesis model of depression in a Chinese context, with stress, coping, family relationships, and…

  6. Testing a Model of Resistance to Peer Pressure among Mexican-Origin Adolescents

    Science.gov (United States)

    Bamaca, Mayra Y.; Umana-Taylor, Adriana J.

    2006-01-01

    This study examined the factors associated with resistance to peer pressure toward antisocial behaviors among a sample of Mexican-origin adolescents (n=564) living in a large Southwestern city in the U.S. A model examining the influence of generational status, emotional autonomy from parents, and self-esteem on resistance to peer pressure was…

  7. Online communication among adolescents: An integrated model on its attraction, opportunities, and risks.

    NARCIS (Netherlands)

    P.M. Valkenburg; J. Peter

    2011-01-01

    Adolescents far outnumber adults in their use of e-communication technologies, such as instant messaging and social network sites. In this article, we present an integrative model that helps us to understand both the appeal of these technologies and their risks and opportunities for the psychosocial

  8. Development of an Adolescent Alcohol Misuse Intervention Based on the Prototype Willingness Model: A Delphi Study

    Science.gov (United States)

    Davies, Emma; Martin, Jilly; Foxcroft, David

    2016-01-01

    Purpose: The purpose of this paper is to report on the use of the Delphi method to gain expert feedback on the identification of behaviour change techniques (BCTs) and development of a novel intervention to reduce adolescent alcohol misuse, based on the Prototype Willingness Model (PWM) of health risk behaviour. Design/methodology/approach: Four…

  9. The Metacognitive Model of Generalized Anxiety Disorder in Children and Adolescents

    Science.gov (United States)

    Ellis, Danielle M.; Hudson, Jennifer L.

    2010-01-01

    Worry is a common phenomenon in children and adolescents, with some experiencing excessive worries that cause significant distress and interference. The metacognitive model of generalized anxiety disorder (Wells 1995, 2009) was developed to explain cognitive processes associated with pathological worry in adults, particularly the role of positive…

  10. Sex-related online behaviors, perceived peer norms and adolescents' experience with sexual behavior : Testing an integrative model

    NARCIS (Netherlands)

    Doornwaard, Suzan M.; Ter Bogt, Tom F M; Reitz, Ellen; Van Den Eijnden, Regina J J M

    2015-01-01

    Research on the role of sex-related Internet use in adolescents' sexual development has often isolated the Internet and online behaviors from other, offline influencing factors in adolescents' lives, such as processes in the peer domain. The aim of this study was to test an integrative model explain

  11. A Model to Explain At-Risk/Problem Gambling among Male and Female Adolescents: Gender Similarities and Differences

    Science.gov (United States)

    Donati, Maria Anna; Chiesi, Francesca; Primi, Caterina

    2013-01-01

    This study aimed at testing a model in which cognitive, dispositional, and social factors were integrated into a single perspective as predictors of gambling behavior. We also aimed at providing further evidence of gender differences related to adolescent gambling. Participants were 994 Italian adolescents (64% Males; Mean age = 16.57).…

  12. A Prospective Test of Cognitive Vulnerability Models of Depression With Adolescent Girls

    OpenAIRE

    Bohon, Cara; Stice, Eric; Burton, Emily; Fudell, Molly; Nolen-Hoeksema, Susan

    2007-01-01

    This study sought to provide a more rigorous prospective test of two cognitive vulnerability models of depression with longitudinal data from 496 adolescent girls. Results supported the cognitive vulnerability model in that stressors predicted future increases in depressive symptoms and onset of clinically significant major depression for individuals with a negative attributional style, but not for those with a positive attributional style, although these effects were small. This model appear...

  13. Mathematical modeling and computational intelligence in engineering applications

    CERN Document Server

    Silva Neto, Antônio José da; Silva, Geraldo Nunes

    2016-01-01

    This book brings together a rich selection of studies in mathematical modeling and computational intelligence, with application in several fields of engineering, like automation, biomedical, chemical, civil, electrical, electronic, geophysical and mechanical engineering, on a multidisciplinary approach. Authors from five countries and 16 different research centers contribute with their expertise in both the fundamentals and real problems applications based upon their strong background on modeling and computational intelligence. The reader will find a wide variety of applications, mathematical and computational tools and original results, all presented with rigorous mathematical procedures. This work is intended for use in graduate courses of engineering, applied mathematics and applied computation where tools as mathematical and computational modeling, numerical methods and computational intelligence are applied to the solution of real problems.

  14. A Swarm Intelligence Based Model for Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ahmed S. Salama

    2015-01-01

    Full Text Available Mobile Computing (MC provides multi services and a lot of advantages for millions of users across the world over the internet. Millions of business customers have leveraged cloud computing services through mobile devices to get what is called Mobile Cloud Computing (MCC. MCC aims at using cloud computing techniques for storage and processing of data on mobile devices, thereby reducing their limitations. This paper proposes architecture for a Swarm Intelligence Based Mobile Cloud Computing Model (SIBMCCM. A model that uses a proposed Parallel Particle Swarm Optimization (PPSO algorithm to enhance the access time for the mobile cloud computing services which support different E Commerce models and to better secure the communication through the mobile cloud and the mobile commerce transactions.

  15. SmartShadow models and methods for pervasive computing

    CERN Document Server

    Wu, Zhaohui

    2013-01-01

    SmartShadow: Models and Methods for Pervasive Computing offers a new perspective on pervasive computing with SmartShadow, which is designed to model a user as a personality ""shadow"" and to model pervasive computing environments as user-centric dynamic virtual personal spaces. Just like human beings' shadows in the physical world, it follows people wherever they go, providing them with pervasive services. The model, methods, and software infrastructure for SmartShadow are presented and an application for smart cars is also introduced.  The book can serve as a valuable reference work for resea

  16. Modeling and computational issues far air/water quality problems: a grid computing approach

    International Nuclear Information System (INIS)

    In this paper we report some results on the design of a grid computing application in the field of environmental sciences. The case study concerns the integration of several independent computational models (weather, air and water quality and sea wave and currents) aver a grid computing infrastructure. The aim of the project is the development of an efficient, high-performance and general purpose distributed laboratory far environmental modeling. Expected end users may be either researchers in computational environmental sciences, whom a standard interface to access existing and distributed resources (database, models, visualization tools, parallel computers and virtual organisation's collaborative community facilities) is provided, or ordinary citizens who can access the results of operational runs of the integrated system far obtaining short-scale forecasts using a web-based interface. Presently, the application continuously supplies real-time forecasts and scenario analysis far both weather and air quality and it is interactively serviceable via a dedicated web portal

  17. An integrated introduction to computer graphics and geometric modeling

    CERN Document Server

    Goldman, Ronald

    2009-01-01

    … this book may be the first book on geometric modelling that also covers computer graphics. In addition, it may be the first book on computer graphics that integrates a thorough introduction to 'freedom' curves and surfaces and to the mathematical foundations for computer graphics. … the book is well suited for an undergraduate course. … The entire book is very well presented and obviously written by a distinguished and creative researcher and educator. It certainly is a textbook I would recommend. …-Computer-Aided Design, 42, 2010… Many books concentrate on computer programming and soon beco

  18. Analysis of a computer model of emotions

    OpenAIRE

    Moffat, D.; Frijda, N.H.; Phaf, R.H.

    1993-01-01

    In the fields of psychology, AI, and philosophy there has recently been theoretical activity in the cognitively-based modelling of emotions. Using AI methodology it is possible to implement and test these complex models, and in this paper we examine an emotion model called ACRES. We propose a set of requirements any such model should satisfy, and compare ACRES against them. Then, analysing its behaviour in detail, we formulate more requirements and criteria that can be applied to future compu...

  19. Overweight and television and computer habits in Swedish school-age children and adolescents: a cross-sectional study.

    Science.gov (United States)

    Garmy, Pernilla; Clausson, Eva K; Nyberg, Per; Jakobsson, Ulf

    2014-06-01

    The aim of this cross-sectional study was to investigate the prevalence of overweight and obesity in children and adolescents (6-16 years), and relationships between being overweight and sleep, experiencing of fatigue, enjoyment of school, and time spent in watching television and in sitting at the computer. Trained school nurses measured the weight and height of 2891 children aged 6, 7, 10, 14, and 16, and distributed a questionnaire to them regarding television and computer habits, sleep, and enjoyment of school. Overweight, obesity included, was present in 16.1% of the study population. Relationships between lifestyle factors and overweight were studied using multivariate logistic regression analysis. Having a bedroom television and spending more than 2 h a day watching television were found to be associated with overweight (OR 1.26 and 1.55 respectively). No association was found between overweight and time spent at the computer, short sleep duration, enjoyment of school, tiredness at school, or difficulties in sleeping and waking up. It is recommended that the school health service discuss with pupils their media habits so as to promote their maintaining a healthy lifestyle. PMID:23796145

  20. Computer modeling of ORNL storage tank sludge mobilization and mixing

    International Nuclear Information System (INIS)

    This report presents and analyzes the results of the computer modeling of mixing and mobilization of sludge in horizontal, cylindrical storage tanks using submerged liquid jets. The computer modeling uses the TEMPEST computational fluid dynamics computer program. The horizontal, cylindrical storage tank configuration is similar to the Melton Valley Storage Tanks (MVST) at Oak Ridge National (ORNL). The MVST tank contents exhibit non-homogeneous, non-Newtonian rheology characteristics. The eventual goals of the simulations are to determine under what conditions sludge mobilization using submerged liquid jets is feasible in tanks of this configuration, and to estimate mixing times required to approach homogeneity of the contents of the tanks

  1. Models of parallel computation :a survey and classification

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yunquan; CHEN Guoliang; SUN Guangzhong; MIAO Qiankun

    2007-01-01

    In this paper,the state-of-the-art parallel computational model research is reviewed.We will introduce various models that were developed during the past decades.According to their targeting architecture features,especially memory organization,we classify these parallel computational models into three generations.These models and their characteristics are discussed based on three generations classification.We believe that with the ever increasing speed gap between the CPU and memory systems,incorporating non-uniform memory hierarchy into computational models will become unavoidable.With the emergence of multi-core CPUs,the parallelism hierarchy of current computing platforms becomes more and more complicated.Describing this complicated parallelism hierarchy in future computational models becomes more and more important.A semi-automatic toolkit that can extract model parameters and their values on real computers can reduce the model analysis complexity,thus allowing more complicated models with more parameters to be adopted.Hierarchical memory and hierarchical parallelism will be two very important features that should be considered in future model design and research.

  2. Fractal approach to computer-analytical modelling of tree crown

    International Nuclear Information System (INIS)

    In this paper we discuss three approaches to the modeling of a tree crown development. These approaches are experimental (i.e. regressive), theoretical (i.e. analytical) and simulation (i.e. computer) modeling. The common assumption of these is that a tree can be regarded as one of the fractal objects which is the collection of semi-similar objects and combines the properties of two- and three-dimensional bodies. We show that a fractal measure of crown can be used as the link between the mathematical models of crown growth and light propagation through canopy. The computer approach gives the possibility to visualize a crown development and to calibrate the model on experimental data. In the paper different stages of the above-mentioned approaches are described. The experimental data for spruce, the description of computer system for modeling and the variant of computer model are presented. (author). 9 refs, 4 figs

  3. Integrating Numerical Computation into the Modeling Instruction Curriculum

    CERN Document Server

    Caballero, Marcos D; Aiken, John M; Douglas, Scott S; Scanlon, Erin M; Thoms, Brian; Schatz, Michael F

    2012-01-01

    We describe a way to introduce physics high school students with no background in programming to computational problem-solving experiences. Our approach builds on the great strides made by the Modeling Instruction reform curriculum. This approach emphasizes the practices of "Developing and using models" and "Computational thinking" highlighted by the NRC K-12 science standards framework. We taught 9th-grade students in a Modeling-Instruction-based physics course to construct computational models using the VPython programming environment. Numerical computation within the Modeling Instruction curriculum provides coherence among the curriculum's different force and motion models, links the various representations which the curriculum employs, and extends the curriculum to include real-world problems that are inaccessible to a purely analytic approach.

  4. Quantum Field Symbolic Analog Computation: Relativity Model

    OpenAIRE

    Manoharan, A. C.

    2000-01-01

    It is natural to consider a quantum system in the continuum limit of space-time configuration. Incorporating also, Einstein's special relativity, leads to the quantum theory of fields. Non-relativistic quantum mechanics and classical mechanics are special cases. By studying vacuum expectation values (Wightman functions W(n; z) where z denotes the set of n complex variables) of products of quantum field operators in a separable Hilbert space, one is led to computation of holomorphy domains for...

  5. Airflow modelling in a computer room

    International Nuclear Information System (INIS)

    This study concerns the numerical simulation of airflow and prediction of comfort properties in the visualization room of the Center for Research on Computation and its Applications, CERCA. Mass, momentum, energy, species and radiation conservation equations have been solved using the commercial software Fluent. Obtained airflow and heat transfer parameters were used for numerical prediction of indoor air quality quantities based on ISO 7730. (author)

  6. Punishing adolescents

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2014-01-01

    Should an adolescent offender be punished more leniently than an adult offender? Many theorists believe the answer to be in the affirmative. According to the diminished culpability model, adolescents are less mature than adults and, therefore, less responsible for their wrongdoings and should...

  7. Operation of the computer model for microenvironment atomic oxygen exposure

    Science.gov (United States)

    Bourassa, R. J.; Gillis, J. R.; Gruenbaum, P. E.

    1995-01-01

    A computer model for microenvironment atomic oxygen exposure has been developed to extend atomic oxygen modeling capability to include shadowing and reflections. The model uses average exposure conditions established by the direct exposure model and extends the application of these conditions to treat surfaces of arbitrary shape and orientation.

  8. High burnup models in computer code fair

    International Nuclear Information System (INIS)

    An advanced fuel analysis code FAIR has been developed for analyzing the behavior of fuel rods of water cooled reactors under severe power transients and high burnups. The code is capable of analyzing fuel pins of both collapsible clad, as in PHWR and free standing clad as in LWR. The main emphasis in the development of this code is on evaluating the fuel performance at extended burnups and modelling of the fuel rods for advanced fuel cycles. For this purpose, a number of suitable models have been incorporated in FAIR. For modelling the fission gas release, three different models are implemented, namely Physically based mechanistic model, the standard ANS 5.4 model and the Halden model. Similarly the pellet thermal conductivity can be modelled by the MATPRO equation, the SIMFUEL relation or the Halden equation. The flux distribution across the pellet is modelled by using the model RADAR. For modelling pellet clad interaction (PCMI)/ stress corrosion cracking (SCC) induced failure of sheath, necessary routines are provided in FAIR. The validation of the code FAIR is based on the analysis of fuel rods of EPRI project ''Light water reactor fuel rod modelling code evaluation'' and also the analytical simulation of threshold power ramp criteria of fuel rods of pressurized heavy water reactors. In the present work, a study is carried out by analysing three CRP-FUMEX rods to show the effect of various combinations of fission gas release models and pellet conductivity models, on the fuel analysis parameters. The satisfactory performance of FAIR may be concluded through these case studies. (author). 12 refs, 5 figs

  9. A Computational Model of Neuro-Glio-Vascular Loop Interactions

    OpenAIRE

    Chander, Bankim Subhash; Chakravarthy, V. Srinivasa

    2012-01-01

    We present a computational, biophysical model of neuron-astrocyte-vessel interaction. Unlike other cells, neurons convey “hunger” signals to the vascular network via an intervening layer of glial cells (astrocytes); vessels dilate and release glucose which fuels neuronal firing. Existing computational models focus on only parts of this loop (neuron→astrocyte→vessel→neuron), whereas the proposed model describes the entire loop. Neuronal firing causes release of a neurotransmitter like glutamat...

  10. Classical model for bulk-ensemble NMR quantum computation

    OpenAIRE

    Schack, R.; Caves, C. M.

    1999-01-01

    We present a classical model for bulk-ensemble NMR quantum computation: the quantum state of the NMR sample is described by a probability distribution over the orientations of classical tops, and quantum gates are described by classical transition probabilities. All NMR quantum computing experiments performed so far with three quantum bits can be accounted for in this classical model. After a few entangling gates, the classical model suffers an exponential decrease of the measured signal, whe...

  11. Pharmaceutical Industry and Trade Liberalization Using Computable General Equilibrium Model

    OpenAIRE

    Barouni, M; Ghaderi, H; AA Banouei

    2012-01-01

    Background Computable general equilibrium models are known as a powerful instrument in economic analyses and widely have been used in order to evaluate trade liberalization effects. The purpose of this study was to provide the impacts of trade openness on pharmaceutical industry using CGE model. Methods: Using a computable general equilibrium model in this study, the effects of decrease in tariffs as a symbol of trade liberalization on key variables of Iranian pharmaceutical products were stu...

  12. Introduction to computation and modeling for differential equations

    CERN Document Server

    Edsberg, Lennart

    2008-01-01

    An introduction to scientific computing for differential equationsIntroduction to Computation and Modeling for Differential Equations provides a unified and integrated view of numerical analysis, mathematical modeling in applications, and programming to solve differential equations, which is essential in problem-solving across many disciplines, such as engineering, physics, and economics. This book successfully introduces readers to the subject through a unique ""Five-M"" approach: Modeling, Mathematics, Methods, MATLAB, and Multiphysics. This approach facilitates a thorough understanding of h

  13. Computer vision techniques for background modelling in urban traffic monitoring

    OpenAIRE

    Milla, José Manuel; S. L. Toral; Vargas Villanueva, Manuel; Barrero, Federico; Soylu, Seref

    2010-01-01

    Jose Manuel Milla, Sergio Luis Toral, Manuel Vargas and Federico Barrero (2010). Computer Vision Techniques for Background Modeling in Urban Traffic Monitoring, Urban Transport and Hybrid Vehicles, Seref Soylu (Ed.), ISBN: 978-953-307-100-8, InTech, DOI: 10.5772/10179. Available from: http://www.intechopen.com/books/urban-transport-and-hybrid-vehicles/computer-vision-techniques-for-background-modeling-in-urban-traffic-monitoring In this chapter, several background modelling techniques have...

  14. An alternative model for the description of computational estimation strategies

    OpenAIRE

    Castro Hernández, Carlos de; Segovia Álex, Isidoro; Castro Martínez, Enrique

    2002-01-01

    In this study we have analyzed the estimation strategies employed by preservice elementary teachers. It has been used an alternative model for the description of computational estimation strategies. In this model, strategies are integrated by approximation skills, mental computation algorithms, cognitive processes (reformulation, translation and compensation) and metacognitive processes (as the assessment of the outcome). The adoption of this model allows making the identification and charact...

  15. Computer-based modelling and analysis in engineering geology

    OpenAIRE

    Giles, David

    2014-01-01

    This body of work presents the research and publications undertaken under a general theme of computer-based modelling and analysis in engineering geology. Papers are presented on geotechnical data management, data interchange, Geographical Information Systems, surface modelling, geostatistical methods, risk-based modelling, knowledge-based systems, remote sensing in engineering geology and on the integration of computer applications into applied geoscience teaching. The work highlights my...

  16. The depression distress amplification model in adolescents: A longitudinal examination of anxiety sensitivity cognitive concerns, depression and suicidal ideation.

    Science.gov (United States)

    Capron, Daniel W; Allan, Nicholas P; Ialongo, Nicholas S; Leen-Feldner, Ellen; Schmidt, Norman B

    2015-06-01

    Adolescents with comorbid anxiety and depression are at significantly increased risk of suicide. The recently proposed depression distress amplification model appears to have promise for explaining the relations between anxiety, depression, and suicidality, but it has not been tested in adolescents. Participants were 524 adolescents followed over two years. Baseline data for the current report were collected by trained interviewers while the adolescents were in eighth grade. Data were obtained in the same manner when the adolescents were in tenth grade. Baseline anxiety sensitivity cognitive concerns significantly predicted suicidal ideation two years later, above and beyond baseline suicidal ideation and depression. Further, consistent with the depression distress amplification model, anxiety sensitivity cognitive concerns interacted with depressive symptoms to predict suicidal ideation. This report extends the empirical and theoretical support for a relationship between anxiety sensitivity cognitive concerns and suicidality. PMID:25754194

  17. Computational neurorehabilitation: modeling plasticity and learning to predict recovery.

    Science.gov (United States)

    Reinkensmeyer, David J; Burdet, Etienne; Casadio, Maura; Krakauer, John W; Kwakkel, Gert; Lang, Catherine E; Swinnen, Stephan P; Ward, Nick S; Schweighofer, Nicolas

    2016-01-01

    Despite progress in using computational approaches to inform medicine and neuroscience in the last 30 years, there have been few attempts to model the mechanisms underlying sensorimotor rehabilitation. We argue that a fundamental understanding of neurologic recovery, and as a result accurate predictions at the individual level, will be facilitated by developing computational models of the salient neural processes, including plasticity and learning systems of the brain, and integrating them into a context specific to rehabilitation. Here, we therefore discuss Computational Neurorehabilitation, a newly emerging field aimed at modeling plasticity and motor learning to understand and improve movement recovery of individuals with neurologic impairment. We first explain how the emergence of robotics and wearable sensors for rehabilitation is providing data that make development and testing of such models increasingly feasible. We then review key aspects of plasticity and motor learning that such models will incorporate. We proceed by discussing how computational neurorehabilitation models relate to the current benchmark in rehabilitation modeling - regression-based, prognostic modeling. We then critically discuss the first computational neurorehabilitation models, which have primarily focused on modeling rehabilitation of the upper extremity after stroke, and show how even simple models have produced novel ideas for future investigation. Finally, we conclude with key directions for future research, anticipating that soon we will see the emergence of mechanistic models of motor recovery that are informed by clinical imaging results and driven by the actual movement content of rehabilitation therapy as well as wearable sensor-based records of daily activity. PMID:27130577

  18. Sensory reweighting is altered in adolescent patients with scoliosis: Evidence from a neuromechanical model.

    Science.gov (United States)

    Pialasse, Jean-Philippe; Descarreaux, Martin; Mercier, Pierre; Simoneau, Martin

    2015-10-01

    Idiopathic scoliosis is the most frequent spinal deformity in adolescence. While its aetiology remains unclear, impairments in balance control suggest a dysfunction of the sensorimotor control mechanisms. The objective of this paper is to evaluate the ability of patients with idiopathic scoliosis to reweigh sensory information. Using a neuromechanical model, the relative sensory weighting of vestibular and proprioceptive information was assessed. Sixteen healthy adolescents and respectively 20 and 16 adolescents with mild or severe scoliosis were recruited. Binaural bipolar galvanic vestibular stimulation was delivered to elicit postural movement along the coronal plane. The kinematics of the upper body, using normalized horizontal displacement of the 7th cervical vertebra, was recorded 1s before, 2s during, and 1s following vestibular stimulation. The neuromechanical model included active feedback mechanisms that generated corrective torque from the vestibular and proprioceptive error signals. The model successfully predicted the normalized horizontal displacement of the 7th cervical vertebra. All groups showed similar balance control before vestibular stimulation; however, the amplitude (i.e., peak horizontal displacement) of the body sway during and immediately following vestibular stimulation was approximately 3 times larger in patients compared to control adolescents. The outcome of the model revealed that patients assigned a larger weight to vestibular information compared to controls; vestibular weight was 6.03% for controls, whereas it was 13.09% and 13.26% for the mild and severe scoliosis groups, respectively. These results suggest that despite the amplitude of spine deformation, the sensory reweighting mechanism is altered similarly in adolescent patients with scoliosis. PMID:26371828

  19. Computational modeling of induced emotion using GEMS

    OpenAIRE

    Aljanaki, Anna; Wiering, Frans; Veltkamp, Remco

    2014-01-01

    Most researchers in the automatic music emotion recognition field focus on the two-dimensional valence and arousal model. This model though does not account for the whole diversity of emotions expressible through music. Moreover, in many cases it might be important to model induced (felt) emotion, rather than perceived emotion. In this paper we explore a multidimensional emotional space, the Geneva Emotional Music Scales (GEMS), which addresses these two issues. We collected the data for our ...

  20. Computational modeling of shallow geothermal systems

    CERN Document Server

    Al-Khoury, Rafid

    2011-01-01

    A Step-by-step Guide to Developing Innovative Computational Tools for Shallow Geothermal Systems Geothermal heat is a viable source of energy and its environmental impact in terms of CO2 emissions is significantly lower than conventional fossil fuels. Shallow geothermal systems are increasingly utilized for heating and cooling of buildings and greenhouses. However, their utilization is inconsistent with the enormous amount of energy available underneath the surface of the earth. Projects of this nature are not getting the public support they deserve because of the uncertainties associated with

  1. Performance Predictable ServiceBSP Model for Grid Computing

    Institute of Scientific and Technical Information of China (English)

    TONG Weiqin; MIAO Weikai

    2007-01-01

    This paper proposes a performance prediction model for grid computing model ServiceBSP to support developing high quality applications in grid environment. In ServiceBSP model,the agents carrying computing tasks are dispatched to the local domain of the selected computation services. By using the IP (integer program) approach, the Service Selection Agent selects the computation services with global optimized QoS (quality of service) consideration. The performance of a ServiceBSP application can be predicted according to the performance prediction model based on the QoS of the selected services. The performance prediction model can help users to analyze their applications and improve them by optimized the factors which affects the performance. The experiment shows that the Service Selection Agent can provide ServiceBSP users with satisfied QoS of applications.

  2. Robust speech features representation based on computational auditory model

    Institute of Scientific and Technical Information of China (English)

    LU Xugang; JIA Chuan; DANG Jianwu

    2004-01-01

    A speech signal processing and features extracting method based on computational auditory model is proposed. The computational model is based on psychological, physiological knowledge and digital signal processing methods. In each stage of a hearing perception system, there is a corresponding computational model to simulate its function. Based on this model, speech features are extracted. In each stage, the features in different kinds of level are extracted. A further processing for primary auditory spectrum based on lateral inhibition is proposed to extract much more robust speech features. All these features can be regarded as the internal representations of speech stimulation in hearing system. The robust speech recognition experiments are conducted to test the robustness of the features. Results show that the representations based on the proposed computational auditory model are robust representations for speech signals.

  3. The Architectural Designs of a Nanoscale Computing Model

    Directory of Open Access Journals (Sweden)

    Mary M. Eshaghian-Wilner

    2004-08-01

    Full Text Available A generic nanoscale computing model is presented in this paper. The model consists of a collection of fully interconnected nanoscale computing modules, where each module is a cube of cells made out of quantum dots, spins, or molecules. The cells dynamically switch between two states by quantum interactions among their neighbors in all three dimensions. This paper includes a brief introduction to the field of nanotechnology from a computing point of view and presents a set of preliminary architectural designs for fabricating the nanoscale model studied.

  4. Epidemiological Models Applied to Viruses in Computer Networks

    Directory of Open Access Journals (Sweden)

    José R.S. Piqueira

    2005-01-01

    Full Text Available To investigate the use of classical epidemiological models for studying computer virus propagation we described analogies between computer and population disease propagation using SIR (Susceptible-Infected-Removed epidemiological models. By modifying these models with the introduction of anti-viral individuals we analyzed the stability of the disease free equilibrium points. Consequently, the basal virus reproduction rate gives some theoretical hints about how to avoid infections in a computer network. Numerical simulations show the dynamics of the process for several parameter values giving the number of infected machines as a function of time.

  5. Quantum Computers: Noise Propagation and Adversarial Noise Models

    OpenAIRE

    Kalai, Gil

    2009-01-01

    In this paper we consider adversarial noise models that will fail quantum error correction and fault-tolerant quantum computation. We describe known results regarding high-rate noise, sequential computation, and reversible noisy computation. We continue by discussing highly correlated noise and the "boundary," in terms of correlation of errors, of the "threshold theorem." Next, we draw a picture of adversarial forms of noise called (collectively) "detrimental noise." Detrimental noise is mode...

  6. Computational Electromagnetic Modeling of SansEC(Trade Mark) Sensors

    Science.gov (United States)

    Smith, Laura J.; Dudley, Kenneth L.; Szatkowski, George N.

    2011-01-01

    This paper describes the preliminary effort to apply computational design tools to aid in the development of an electromagnetic SansEC resonant sensor composite materials damage detection system. The computational methods and models employed on this research problem will evolve in complexity over time and will lead to the development of new computational methods and experimental sensor systems that demonstrate the capability to detect, diagnose, and monitor the damage of composite materials and structures on aerospace vehicles.

  7. Recent developments in multiphysics computational models of physiological flows

    Science.gov (United States)

    Eldredge, Jeff D.; Mittal, Rajat

    2016-04-01

    A mini-symposium on computational modeling of fluid-structure interactions and other multiphysics in physiological flows was held at the 11th World Congress on Computational Mechanics in July 2014 in Barcelona, Spain. This special issue of Theoretical and Computational Fluid Dynamics contains papers from among the participants of the mini-symposium. The present paper provides an overview of the mini-symposium and the special issue.

  8. Adapting an evidence-based model to retain adolescent study participants in longitudinal research.

    Science.gov (United States)

    Davis, Erin; Demby, Hilary; Jenner, Lynne Woodward; Gregory, Alethia; Broussard, Marsha

    2016-02-01

    Maintaining contact with and collecting outcome data from adolescent study participants can present a significant challenge for researchers conducting longitudinal studies. Establishing an organized and effective protocol for participant follow-up is crucial to reduce attrition and maintain high retention rates. This paper describes our methods in using and adapting the evidence-based Engagement, Verification, Maintenance, and Confirmation (EVMC) model to follow up with adolescents 6 and 12 months after implementation of a health program. It extends previous research by focusing on two key modifications to the model: (1) the central role of cell phones and texting to maintain contact with study participants throughout the EVMC process and, (2) use of responsive two-way communication between staff and participants and flexible administration modes and methods in the confirmation phase to ensure that busy teens not only respond to contacts, but also complete data collection. These strategies have resulted in high overall retention rates (87-91%) with adolescent study participants at each follow-up data collection point without the utilization of other, more involved tracking measures. The methods and findings presented may be valuable for other researchers with limited resources planning for or engaged in collecting follow-up outcome data from adolescents enrolled in longitudinal studies. PMID:26539953

  9. Computing broadband accelerograms using kinematic rupture modeling

    International Nuclear Information System (INIS)

    In order to make the broadband kinematic rupture modeling more realistic with respect to dynamic modeling, physical constraints are added to the rupture parameters. To improve the slip velocity function (SVF) modeling, an evolution of the k-2 source model is proposed, which consists to decompose the slip as a sum of sub-events by band of k. This model yields to SVF close to the solution proposed by Kostrov for a crack, while preserving the spectral characteristics of the radiated wave field, i.e. a w2 model with spectral amplitudes at high frequency scaled to the coefficient of directivity Cd. To better control the directivity effects, a composite source description is combined with a scaling law defining the extent of the nucleation area for each sub-event. The resulting model allows to reduce the apparent coefficient of directivity to a fraction of Cd, as well as to reproduce the standard deviation of the new empirical attenuation relationships proposed for Japan. To make source models more realistic, a variable rupture velocity in agreement with the physics of the rupture must be considered. The followed approach that is based on an analytical relation between the fracture energy, the slip and the rupture velocity, leads to higher values of the peak ground acceleration in the vicinity of the fault. Finally, to better account for the interaction of the wave field with the geological medium, a semi-empirical methodology is developed combining a composite source model with empirical Green functions, and is applied to the Yamaguchi, Mw 5.9 earthquake. The modeled synthetics reproduce satisfactorily well the observed main characteristics of ground motions. (author)

  10. Transforming High School Physics with Modeling and Computation

    CERN Document Server

    Aiken, John M

    2013-01-01

    The Engage to Excel (PCAST) report, the National Research Council's Framework for K-12 Science Education, and the Next Generation Science Standards all call for transforming the physics classroom into an environment that teaches students real scientific practices. This work describes the early stages of one such attempt to transform a high school physics classroom. Specifically, a series of model-building and computational modeling exercises were piloted in a ninth grade Physics First classroom. Student use of computation was assessed using a proctored programming assignment, where the students produced and discussed a computational model of a baseball in motion via a high-level programming environment (VPython). Student views on computation and its link to mechanics was assessed with a written essay and a series of think-aloud interviews. This pilot study shows computation's ability for connecting scientific practice to the high school science classroom.

  11. A Computational Trust Model for Collaborative Ventures

    Directory of Open Access Journals (Sweden)

    Weigang Wang

    2012-01-01

    Full Text Available Problem statement: The conceptual notion of trust and its underlying computational methods has been an important issue for researchers in electronic communities. While the independent trust evaluation is suitable in certain circumstances, such unilateral process falls short in supporting mutual evaluation between partners. Perceived reputation, the depth and breadth of trust, Trust Perception (TP, Repeat Collaborators at a Threshold (RCT and a collective trust index (c index have all been defined to specify the optimal trust criteria. Approach: By taking the evaluator’s own trust level as a threshold to identify compatible partners, a mutual balance between excess and deficiency in trust has been addressed. Since the number of repeated collaborations which signify retested confidence is more straightforward to capture than the manually provided feedback ratings, we have developed computational definitions for the above-mentioned concepts. Results and Conclusion: The results from the experiments based on the eBay dataset shows that the c index can be used to classify PowerSellers into normally distributed and comprehensible categories that can facilitate mutual evaluation.

  12. The role of computer modelling in structural integrity assessment

    International Nuclear Information System (INIS)

    There is little doubt that computer technology has spawned extraordinary advances in the traditional fields of science and engineering along with the introduction of new disciplines and technologies. In particular, significant developments directly related to modern computer technology that have had a profound impact on the field of structural integrity include: Computational methods (probabilistic, parametric, data analysis); Finite Element Technique; and, Computer-Aided Design and Engineering. In fact it can be argued that these developments have re-defined and expanded the role of structural integrity assessments by providing comprehensive modelling capabilities to the designer and engineers involved in failure analyses. As computer processing speeds and capacity have increased, so has the role of computer modelling in assessments of component structural integrity. While innovation in these fields has been packaged into various CAE software used by the engineering community, the advantages of simulation have only just begun to be realized. With new product development cycles shrinking with the view to improving time-to-market, the role of initial testing is being reduced in favour of computer modelling and simulation to assess component life and durability. For ageing structures, the evaluation of remaining life and the impact of degraded structural integrity becomes tractable with state-of-the-art computational methods. Needless to say, for complex structures, computer modelling coupled with testing provides a robust method that can avoid costly and sometimes fatal errors in design. Computer modelling brings together a number of disciplines including numerical techniques such as the finite element method, fracture mechanics, continuum mechanics, dynamics, heat transfer, structural reliability and probabilistic methods. One of the salient features of the current methods is the ability to handle large complex steady state or transient dynamic problems that

  13. Computational model of cellular metabolic dynamics

    DEFF Research Database (Denmark)

    Li, Yanjun; Solomon, Thomas; Haus, Jacob M;

    2010-01-01

    Identifying the mechanisms by which insulin regulates glucose metabolism in skeletal muscle is critical to understanding the etiology of insulin resistance and type 2 diabetes. Our knowledge of these mechanisms is limited by the difficulty of obtaining in vivo intracellular data. To quantitatively...... cytosol and mitochondria. The model simulated skeletal muscle metabolic responses to insulin corresponding to human hyperinsulinemic-euglycemic clamp studies. Insulin-mediated rate of glucose disposal was the primary model input. For model validation, simulations were compared with experimental data...... type 2 diabetes....

  14. Utilizing Cloud Computing to Improve Climate Modeling and Studies

    Science.gov (United States)

    Li, Z.; Yang, C.; Liu, K.; Sun, M.; XIA, J.; Huang, Q.

    2013-12-01

    Climate studies have become increasingly important due to the global climate change, one of the biggest challenges for the human in the 21st century. Climate data, not only observations data collected from various sensors but also simulated data generated from diverse climate models, are essential for scientists to explore the potential climate change patterns and analyze the complex climate dynamics. Climate modeling and simulation, a critical methodology for simulating the past and predicting the future climate conditions, can produce huge amount of data that contains potentially valuable information for climate studies. However, using modeling method in climate studies poses at least two challenges for scientists. First, running climate models is a computing intensive process, which requires large amounts of computation resources. Second, running climate models is also a data intensive process generating Big geospatial Data (model output), which demands large storage for managing the data and large computing power to process and analyze these data. This presentation introduces a novel framework to tackle the two challenges by 1) running climate models in a cloud environment in an automated fashion, and 2) managing and parallel processing Big model output Data by leveraging cloud computing technologies. A prototype system is developed based on the framework using ModelE as the climate model. Experiment results show that this framework can improve climate modeling in the research cycle by accelerating big data generation (model simulation), big data management (storage and processing) and on demand big data analytics.

  15. Current status of uncertainty analysis methods for computer models

    International Nuclear Information System (INIS)

    This report surveys several existing uncertainty analysis methods for estimating computer output uncertainty caused by input uncertainties, illustrating application examples of those methods to three computer models, MARCH/CORRAL II, TERFOC and SPARC. Merits and limitations of the methods are assessed in the application, and recommendation for selecting uncertainty analysis methods is provided. (author)

  16. Computational numerical modelling of plasma focus

    International Nuclear Information System (INIS)

    Several models for calculation of the dynamics of Plasma Focus have been developed. All of them begin from the same physic principle: the current sheet run down the anode length, ionizing and collecting the gas that finds in its way.This is known as snow-plow model.Concerning pinch's compression, a MHD model is proposed.The plasma is treated as a fluid , particularly as a high ionized gas.However, there are not many models that, taking into account thermal equilibrium inside the plasma, make approximated calculations of the maximum temperatures reached in the pinch.Besides, there are no models which use those temperatures to estimate the termofusion neutron yield for the Deuterium or Deuterium-Tritium gas filled cases.In the PLADEMA network (Dense Magnetized Plasmas) a code was developed with the objective of describe the plasma focus dynamics, in a conceptual engineering stage.The codes calculates the principal variables (currents, time to focus, etc) and estimates the neutron yield in Deuterium-filled plasma focus devices.It can be affirmed that the code's experimental validation, in its axial and radial stages, was very successfully. However, it was accepted that the compression stage should be formulated again, to find a solution for a large variation of a parameter related with velocity profiles for the particles trapped inside the pinch.The objectives of this work can be stated in the next way : - Check the compression's model hypothesis. Develop a new model .- Implement the new model in the code. Compare results against experimental data of Plasma Focus devices from all around the world

  17. Computational Modeling of Healthy Myocardium in Diastole.

    Science.gov (United States)

    Nikou, Amir; Dorsey, Shauna M; McGarvey, Jeremy R; Gorman, Joseph H; Burdick, Jason A; Pilla, James J; Gorman, Robert C; Wenk, Jonathan F

    2016-04-01

    In order to better understand the mechanics of the heart and its disorders, engineers increasingly make use of the finite element method (FEM) to investigate healthy and diseased cardiac tissue. However, FEM is only as good as the underlying constitutive model, which remains a major challenge to the biomechanics community. In this study, a recently developed structurally based constitutive model was implemented to model healthy left ventricular myocardium during passive diastolic filling. This model takes into account the orthotropic response of the heart under loading. In-vivo strains were measured from magnetic resonance images (MRI) of porcine hearts, along with synchronous catheterization pressure data, and used for parameter identification of the passive constitutive model. Optimization was performed by minimizing the difference between MRI measured and FE predicted strains and cavity volumes. A similar approach was followed for the parameter identification of a widely used phenomenological constitutive law, which is based on a transversely isotropic material response. Results indicate that the parameter identification with the structurally based constitutive law is more sensitive to the assigned fiber architecture and the fit between the measured and predicted strains is improved with more realistic sheet angles. In addition, the structurally based model is capable of generating a more physiological end-diastolic pressure-volume relationship in the ventricle. PMID:26215308

  18. Transport modeling and advanced computer techniques

    International Nuclear Information System (INIS)

    A workshop was held at the University of Texas in June 1988 to consider the current state of transport codes and whether improved user interfaces would make the codes more usable and accessible to the fusion community. Also considered was the possibility that a software standard could be devised to ease the exchange of routines between groups. It was noted that two of the major obstacles to exchanging routines now are the variety of geometrical representation and choices of units. While the workshop formulated no standards, it was generally agreed that good software engineering would aid in the exchange of routines, and that a continued exchange of ideas between groups would be worthwhile. It seems that before we begin to discuss software standards we should review the current state of computer technology --- both hardware and software to see what influence recent advances might have on our software goals. This is done in this paper

  19. Drive for muscularity and disordered eating among French adolescent boys: a sociocultural model.

    Science.gov (United States)

    Rodgers, Rachel F; Ganchou, Camille; Franko, Debra L; Chabrol, Henri

    2012-06-01

    The pursuit of muscularity is an important body image concern among boys which has been described within sociocultural models of risk for eating disorders. This study explored a sociocultural model of disordered eating in which drive for thinness and pursuit of muscularity were both pathways to disordered eating among French adolescent boys. A sample of 146 adolescents completed a questionnaire assessing drive for thinness, drive for muscularity, media-ideal internalization, appearance comparison, and sociocultural pressure. The model was a good fit to the data and both drive for thinness and the pursuit of muscularity were related to disordered eating. Furthermore, internalization and appearance comparison mediated the relationships between pressure to increase muscle and both drive for muscularity and drive for thinness. Longitudinal research could help clarify the role of the pursuit of muscularity in the development of disordered eating and extreme body shape changing behaviors. PMID:22494958

  20. Importance of facial physical attractiveness of audiovisual models in descriptions and preferences of children and adolescents.

    Science.gov (United States)

    Ruiz, Cristina; Conde, Elena; Torres, Esteban

    2005-08-01

    We performed a cross-sectional study with three age groups (8, 14, and 17 years) to evaluate developmental differences in stereotyped beliefs about physical attractiveness and the value of this as perceived by the participants. Given the current importance of television in the development of social knowledge, television models were used. The children and adolescents were asked to evaluate, using bipolar open scales, the physical attractiveness, likeableness, generosity, intelligence, fun, and altruism of 12 television models of both sexes, previously selected by judges, as well as the desire to resemble or feel close to the models. Analysis showed developmental differences across age groups both in the concept of physical attractiveness and in stereotyped beliefs about this. As in other areas of social knowledge, the younger children's responses were bipolar, global, and much more stereotyped, while the adolescents introduced subtle distinctions and elaborated their responses. Nevertheless, physical attractiveness appeared a desirable characteristic for all age groups. PMID:16350629

  1. Hybrid Computational Model for High-Altitude Aeroassist Vehicles Project

    Data.gov (United States)

    National Aeronautics and Space Administration — A hybrid continuum/noncontinuum computational model will be developed for analyzing the aerodynamics and heating on aeroassist vehicles. Unique features of this...

  2. Computer models as social learning tools in participatory integrated assessment

    OpenAIRE

    De Kraker, Joop; Kroeze, Carolien; Kirschner, Paul A.

    2011-01-01

    De Kraker, J., Kroeze, C., & Kirschner, P. A. (2011). Computer models as social learning tools in participatory integrated assessment. International Journal of Agricultural Sustainability, 9, 297-309. doi:10.1080/14735903.2011.582356

  3. Hybrid Computational Model for High-Altitude Aeroassist Vehicles Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed effort addresses a need for accurate computational models to support aeroassist and entry vehicle system design over a broad range of flight conditions...

  4. Methodology of modeling and measuring computer architectures for plasma simulations

    Science.gov (United States)

    Wang, L. P. T.

    1977-01-01

    A brief introduction to plasma simulation using computers and the difficulties on currently available computers is given. Through the use of an analyzing and measuring methodology - SARA, the control flow and data flow of a particle simulation model REM2-1/2D are exemplified. After recursive refinements the total execution time may be greatly shortened and a fully parallel data flow can be obtained. From this data flow, a matched computer architecture or organization could be configured to achieve the computation bound of an application problem. A sequential type simulation model, an array/pipeline type simulation model, and a fully parallel simulation model of a code REM2-1/2D are proposed and analyzed. This methodology can be applied to other application problems which have implicitly parallel nature.

  5. Computational Modeling, Formal Analysis, and Tools for Systems Biology.

    Directory of Open Access Journals (Sweden)

    Ezio Bartocci

    2016-01-01

    Full Text Available As the amount of biological data in the public domain grows, so does the range of modeling and analysis techniques employed in systems biology. In recent years, a number of theoretical computer science developments have enabled modeling methodology to keep pace. The growing interest in systems biology in executable models and their analysis has necessitated the borrowing of terms and methods from computer science, such as formal analysis, model checking, static analysis, and runtime verification. Here, we discuss the most important and exciting computational methods and tools currently available to systems biologists. We believe that a deeper understanding of the concepts and theory highlighted in this review will produce better software practice, improved investigation of complex biological processes, and even new ideas and better feedback into computer science.

  6. Modeling and performance evaluation of computer systems security operation

    OpenAIRE

    Guster, D.; Krivulin, N. K.

    2012-01-01

    A model of computer system security operation is developed based on the fork-join queueing network formalism. We introduce a security operation performance measure, and show how it may be used to performance evaluation of actual systems.

  7. PRO: a model for Parallel Resource-Optimal Computation

    OpenAIRE

    Gebremedhin, Assefaw Hadish,; Gustedt, Jens; Guérin Lassous, Isabelle; Telle, Jan Arne

    2001-01-01

    We present a new parallel computational model that enables the design of resource-optimal scalable parallel algorithms and simplifies their analysis. The model rests on the novel idea of incorporating relative optimality as an integral part of the model and measuring the quality of a parallel algorithm in terms of granularity.

  8. Computer Integrated Manufacturing: Physical Modelling Systems Design. A Personal View.

    Science.gov (United States)

    Baker, Richard

    A computer-integrated manufacturing (CIM) Physical Modeling Systems Design project was undertaken in a time of rapid change in the industrial, business, technological, training, and educational areas in Australia. A specification of a manufacturing physical modeling system was drawn up. Physical modeling provides a flexibility and configurability…

  9. Computational model of miniature pulsating heat pipes.

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, Mario J.; Givler, Richard C.

    2013-01-01

    The modeling work described herein represents Sandia National Laboratories (SNL) portion of a collaborative three-year project with Northrop Grumman Electronic Systems (NGES) and the University of Missouri to develop an advanced, thermal ground-plane (TGP), which is a device, of planar configuration, that delivers heat from a source to an ambient environment with high efficiency. Work at all three institutions was funded by DARPA/MTO; Sandia was funded under DARPA/MTO project number 015070924. This is the final report on this project for SNL. This report presents a numerical model of a pulsating heat pipe, a device employing a two phase (liquid and its vapor) working fluid confined in a closed loop channel etched/milled into a serpentine configuration in a solid metal plate. The device delivers heat from an evaporator (hot zone) to a condenser (cold zone). This new model includes key physical processes important to the operation of flat plate pulsating heat pipes (e.g. dynamic bubble nucleation, evaporation and condensation), together with conjugate heat transfer with the solid portion of the device. The model qualitatively and quantitatively predicts performance characteristics and metrics, which was demonstrated by favorable comparisons with experimental results on similar configurations. Application of the model also corroborated many previous performance observations with respect to key parameters such as heat load, fill ratio and orientation.

  10. PEMAHAMAN DASAR ANALISIS MODEL COMPUTABLE GENERAL EQUILIBRIUM (CGE)

    OpenAIRE

    Mardiyah Hayati

    2013-01-01

    Simple paper about basic understanding of computable general equilibrium aimed to give basic understanding about CGE. It consist of history of CGE, assumption of CGE model, excess and lack of CGE model, and creation of simple CGE model for closed economy. CGE model is suitable to be used for seeing impact of new policy implementation. It is because CGE model use general equilibrium in which this theory of general equilibrium explaining about inter-relation among markets in the economy system....

  11. Multiscale Computing with the Multiscale Modeling Library and Runtime Environment

    OpenAIRE

    Borgdorff J.; Mamonski M.; Bosak B.; Groen D.; Ben Belgacem M.; Kurowski K.; Hoekstra A.G.

    2013-01-01

    We introduce a software tool to simulate multiscale models: The Multiscale Coupling Library and Environment 2 (MUSCLE 2). MUSCLE 2 is a component-based modeling tool inspired by the multiscale modeling and simulation framework, with an easy-to-use API which supports Java, C++, C, and Fortran. We present MUSCLE 2's runtime features, such as its distributed computing capabilities, and its benefits to multiscale modelers. We also describe two multiscale models that use MUSCLE 2 to do distributed...

  12. Computing Small 1-Homological Models for Commutative Differential Graded Algebras

    OpenAIRE

    Alvarez, Victor; Armario, Jose Andres; Frau, Maria Dolores; Gonzalez-Diaz, Rocio; Jimenez, Maria Jose; Real, Pedro; Silva, Beatriz

    2001-01-01

    We use homological perturbation machinery specific for the algebra category [P. Real. Homological Perturbation Theory and Associativity. Homology, Homotopy and Applications vol. 2, n. 5 (2000) 51-88] to give an algorithm for computing the differential structure of a small 1--homological model for commutative differential graded algebras (briefly, CDGAs). The complexity of the procedure is studied and a computer package in Mathematica is described for determining such models.

  13. Communication models in mobile computing systems and mobile agents

    OpenAIRE

    Tufekcioglu, Refik

    2000-01-01

    This thesis study covers wired and wireless mobile computing environments, introduces the components of the mobile environment, discusses the constraints of mobility, and contains a taxonomy of the current techniques/ models that reduce the overheads associated with wireless mobile communication. One of the goals of this thesis study was to identify and define communication techniques and models that are used by mobile computing systems to minimize wireless communication cost. The following c...

  14. Cascade recursion models of computing the temperatures of underground layers

    Institute of Scientific and Technical Information of China (English)

    HAN; Liqun; BI; Siwen; SONG; Shixin

    2006-01-01

    An RBF neural network was used to construct computational models of the underground temperatures of different layers, using ground-surface parameters and the temperatures of various underground layers. Because series recursion models also enable researchers to use above-ground surface parameters to compute the temperatures of different underground layers, this method provides a new way of using thermal infrared remote sensing to monitor the suture zones of large areas of blocks and to research thermal anomalies in geologic structures.

  15. Modeling cost/performance of a parallel computer simulator

    OpenAIRE

    Falsafi, Babak; Wood, David A.

    1997-01-01

    This article examines the cost/performance of simulating a hypothetical target parallel computer using a commercial host parallel computer. We address the question of whether parallel simulation is simply faster than sequential simulation, or if it is also more cost-effective. To answer this, we develop a performance model of the Wisconsin Wind Tunnel (WWT), a system that simulates cache-coherent shared-memory machines on a message-passing Thinking Machines CM-5. The performance model uses Kr...

  16. Educational Model of Computer as a Base for Informatics Learning

    OpenAIRE

    Eremin, Evgeny

    2005-01-01

    It is proposed to use one common model of computer for teaching different parts of the informatics course, connected with both hardware and software subjects. Reasoning of such slant is presented; the most suitable themes of the course, where it is practical, are enumerated. The own author's development (including software support) – the educational model of virtual computer "E97" and compiler from Pascal language for it – are described. It is accented, that the discussed ideas ar...

  17. Letter perception: from item-level ERPs to computational models

    OpenAIRE

    Rey, Arnaud; Dufau, Stéphane; Massol, Stéphanie; Grainger, Jonathan

    2008-01-01

    In the present study, online measures of letter identification were used to test computational models of letter perception. Event-related potentials (ERPs) were recorded to letters and pseudo-letters revealing a transition from feature analysis to letter identification in the 100-200 ms time window. Measures indexing this transition were then computed at the level of individual letters. Simulations with several versions of an interactive-activation model of letter perception were fitted with ...

  18. Model Of Orbital Density Of Air For Computing Drag

    Science.gov (United States)

    Lear, W. M.

    1990-01-01

    Simple, Orbital Density Model for Drag Equations program useful for computing effect of drag over one or more orbits. Mathematical model embodied in program incorporates major changes in density due to solar activity and magnetic activity of Earth. Diurnal (day/night) effects on orbit averaged out. Based on Jacchia daily-average density, evaluated at average time of year. Advantages, right ascension and declination of Sun not needed and computation time much reduced. Written in FORTRAN 77.

  19. A Novel Computer Virus Model and Its Stability

    OpenAIRE

    Mei Peng; Huajian Mou

    2014-01-01

    Computer virus is a malicious code which can causes great damage. A SEIR model is proposed which considered that the newly entered computer in the network has been infected by other ways. It is concerned with the constant immigration, which includes susceptible, exposed and infectious, the threshold and equilibrium of this model are investigated. The locally and globally asymptotical stable results of virus-free equilibrium and viral equilibrium were being proved. Finally, some numerical exam...

  20. Theoretic computing model of combustion process of asphalt smoke

    Institute of Scientific and Technical Information of China (English)

    HUANG Rui; CHAI Li-yuan; HE De-wen; PENG Bing; WANG Yun-yan

    2005-01-01

    Based on the data and methods provided by research literature, dispersing mathematical model of combustion process of asphalt smoke is set by theoretic analysis. Through computer programming, the dynamic combustion process of asphalt smoke is calculated to simulate an experimental model. The computing result shows that the temperature and the concentration of asphalt smoke influence its burning temperature in approximatively linear manner. The consumed quantity of fuel to ignite the asphalt smoke needs to be measured from the two factors.

  1. Software Infrastructure for Effective Communication and Reuse of Computational Models

    OpenAIRE

    Finney, Andrew; Hucka, Michael; Bornstein, Benjamin J.; Keating, Sarah M; Shapiro, Bruce E.; Matthews, Joanne; Kovitz, Ben L.; Schilstra, Maria J; Funahashi, Akira; Doyle, John; Kitano, Hiroaki

    2006-01-01

    Until recently, the majority of computational models in biology were implemented in custom programs and published as statements of the underlying mathematics. However, to be useful as formal embodiments of our understanding of biological systems, computational models must be put into a consistent form that can be communicated more directly between the software tools used to work with them. In this chapter, we describe the Systems Biology Markup Language (SBML), a format for ...

  2. Computational Models of Narrative: Review of a Workshop

    OpenAIRE

    Finlayson, Mark A.; Massachusetts Institute of Technology; Richards, Whitman; Massachusetts Institute of Technology; Winston, Patrick Henry; Massachusetts Institute of Technology

    2010-01-01

    On October 8-10, 2009 an interdisciplinary group met at the Wylie Center in Beverley, Massachusetts to evaluate the state of the art in the computational modeling of narrative. Three important findings emerged: (1) current work in computational modeling is described by three different levels of representation; (2) there is a paucity of studies at the highest, most abstract level aimed at inferring the meaning or message of the narrative; and (3) there is a need to establish a standard data ba...

  3. Computational modelling, explicit mathematical treatments, and scientific explanation

    OpenAIRE

    Bryden, J; Noble, J

    2006-01-01

    A computer simulation model, can produce some interesting and surprising results which one would not expect from initial analysis of the algorithm and data. We question however, whether the description of such a computer simulation modelling procedure (data + algorithm + results) can constitute an explanation as to why the algorithm produces such an effect. Specifically, in the field of theoretical biology, can such a procedure constitute real scientific explanation of biological phenomena? W...

  4. Computer Models Simulate Fine Particle Dispersion

    Science.gov (United States)

    2010-01-01

    Through a NASA Seed Fund partnership with DEM Solutions Inc., of Lebanon, New Hampshire, scientists at Kennedy Space Center refined existing software to study the electrostatic phenomena of granular and bulk materials as they apply to planetary surfaces. The software, EDEM, allows users to import particles and obtain accurate representations of their shapes for modeling purposes, such as simulating bulk solids behavior, and was enhanced to be able to more accurately model fine, abrasive, cohesive particles. These new EDEM capabilities can be applied in many industries unrelated to space exploration and have been adopted by several prominent U.S. companies, including John Deere, Pfizer, and Procter & Gamble.

  5. Computational Modeling of Fluorescence Loss in Photobleaching

    DEFF Research Database (Denmark)

    Hansen, Christian Valdemar; Schroll, Achim; Wüstner, Daniel

    2015-01-01

    Fluorescence loss in photobleaching (FLIP) is a modern microscopy method for visualization of transport processes in living cells. Although FLIP is widespread, an automated reliable analysis of image data is still lacking. This paper presents a framework for modeling and simulation of FLIP...... sequences as reaction– diffusion systems on segmented cell images. The cell geometry is extracted from microscopy images using the Chan–Vese active contours algorithm [8]. The PDE model is subsequently solved by the automated Finite Element software package FEniCS [20]. The flexibility of FEniCS allows...

  6. Computational social network modeling of terrorist recruitment.

    Energy Technology Data Exchange (ETDEWEB)

    Berry, Nina M.; Turnley, Jessica Glicken (Sandia National Laboratories, Albuquerque, NM); Smrcka, Julianne D. (Sandia National Laboratories, Albuquerque, NM); Ko, Teresa H.; Moy, Timothy David (Sandia National Laboratories, Albuquerque, NM); Wu, Benjamin C.

    2004-10-01

    The Seldon terrorist model represents a multi-disciplinary approach to developing organization software for the study of terrorist recruitment and group formation. The need to incorporate aspects of social science added a significant contribution to the vision of the resulting Seldon toolkit. The unique addition of and abstract agent category provided a means for capturing social concepts like cliques, mosque, etc. in a manner that represents their social conceptualization and not simply as a physical or economical institution. This paper provides an overview of the Seldon terrorist model developed to study the formation of cliques, which are used as the major recruitment entity for terrorist organizations.

  7. Computational modeling of magnets for electrophysical setups

    International Nuclear Information System (INIS)

    The design, construction and operation of magnetic systems of some electrophysical setups require preliminary mathematical modeling. While calculating the fields of the magnetic systems mentioned (based on solving a set of direct problems of magnetostatics), we attempted to solve the inverse problem of magnetostatics, namely, to find an optimal construction of the current elements and ferromagnetic yoke for a required distribution of the magnetic field. This work discusses the results of numerical modeling of the magnet field distribution for some modifications of the SP-94 spectrometric magnet used in some experimental setups

  8. Computational models of the single substitutional nitrogen atom in diamond

    International Nuclear Information System (INIS)

    The single substitutional nitrogen atom in diamond is apparently a very simple defect in a very simple elemental solid. It has been modelled by a range of computational models, few of which either agree with each other, or with the experimental data on the defect. If the computational models of less well understood defects in this and more complex materials are to be reliable, we should understand why the discrepancies arise and how they can be avoided in future modelling. This paper presents an all-electron, augmented plane-wave (APW) density functional theory (DFT) calculation using the modern APW with local orbitals full potential periodic approximation. This is compared to DFT, finite cluster pseudopotential calculations and a semi-empirical Hartree-Fock model. Comparisons between the results of these and previous models allow us to discuss the reliability of computational methods of this and similar defects

  9. Practical Use of Computationally Frugal Model Analysis Methods.

    Science.gov (United States)

    Hill, Mary C; Kavetski, Dmitri; Clark, Martyn; Ye, Ming; Arabi, Mazdak; Lu, Dan; Foglia, Laura; Mehl, Steffen

    2016-03-01

    Three challenges compromise the utility of mathematical models of groundwater and other environmental systems: (1) a dizzying array of model analysis methods and metrics make it difficult to compare evaluations of model adequacy, sensitivity, and uncertainty; (2) the high computational demands of many popular model analysis methods (requiring 1000's, 10,000 s, or more model runs) make them difficult to apply to complex models; and (3) many models are plagued by unrealistic nonlinearities arising from the numerical model formulation and implementation. This study proposes a strategy to address these challenges through a careful combination of model analysis and implementation methods. In this strategy, computationally frugal model analysis methods (often requiring a few dozen parallelizable model runs) play a major role, and computationally demanding methods are used for problems where (relatively) inexpensive diagnostics suggest the frugal methods are unreliable. We also argue in favor of detecting and, where possible, eliminating unrealistic model nonlinearities-this increases the realism of the model itself and facilitates the application of frugal methods. Literature examples are used to demonstrate the use of frugal methods and associated diagnostics. We suggest that the strategy proposed in this paper would allow the environmental sciences community to achieve greater transparency and falsifiability of environmental models, and obtain greater scientific insight from ongoing and future modeling efforts. PMID:25810333

  10. Efficiently modeling neural networks on massively parallel computers

    Science.gov (United States)

    Farber, Robert M.

    1993-01-01

    Neural networks are a very useful tool for analyzing and modeling complex real world systems. Applying neural network simulations to real world problems generally involves large amounts of data and massive amounts of computation. To efficiently handle the computational requirements of large problems, we have implemented at Los Alamos a highly efficient neural network compiler for serial computers, vector computers, vector parallel computers, and fine grain SIMD computers such as the CM-2 connection machine. This paper describes the mapping used by the compiler to implement feed-forward backpropagation neural networks for a SIMD (Single Instruction Multiple Data) architecture parallel computer. Thinking Machines Corporation has benchmarked our code at 1.3 billion interconnects per second (approximately 3 gigaflops) on a 64,000 processor CM-2 connection machine (Singer 1990). This mapping is applicable to other SIMD computers and can be implemented on MIMD computers such as the CM-5 connection machine. Our mapping has virtually no communications overhead with the exception of the communications required for a global summation across the processors (which has a sub-linear runtime growth on the order of O(log(number of processors)). We can efficiently model very large neural networks which have many neurons and interconnects and our mapping can extend to arbitrarily large networks (within memory limitations) by merging the memory space of separate processors with fast adjacent processor interprocessor communications. This paper will consider the simulation of only feed forward neural network although this method is extendable to recurrent networks.

  11. An Impulse Dynamic Model for Computer Worms

    OpenAIRE

    Yingjiang Wu; Yun Zhao; Chunming Zhang

    2013-01-01

    A worm spread model concerning impulsive control strategy is proposed and analyzed. We prove that there exists a globally attractive virus-free periodic solution when the vaccination rate is larger than ${\\theta }_{1}$ . Moreover, we show that the system is uniformly persistent if the vaccination rate is less than ${\\theta }_{1}$ . Some numerical simulations are also given to illustrate our main results.

  12. Modeling Astrophysical Explosions with Sustained Exascale Computing

    CERN Document Server

    Zingale, M; Malone, C M; Timmes, F X

    2015-01-01

    Our understanding of stars and their fates is based on coupling observations to theoretical models. Unlike laboratory physicists, we cannot perform experiments on stars, but rather must patiently take what nature allows us to observe. Simulation offers a means of virtual experimentation, enabling a detailed understanding of the most violent ongoing explosions in the Universe---the deaths of stars.

  13. Computational methods for Bayesian model choice

    OpenAIRE

    Robert, Christian P.; Wraith, Darren

    2009-01-01

    In this note, we shortly survey some recent approaches on the approximation of the Bayes factor used in Bayesian hypothesis testing and in Bayesian model choice. In particular, we reassess importance sampling, harmonic mean sampling, and nested sampling from a unified perspective.

  14. Trusting explanatory and exploratory models in computational geomorphology

    Science.gov (United States)

    Van De Wiel, Marco; Desjardins, Eric; Rousseau, Yannick; Martel, Tristan; Ashmore, Peter

    2014-05-01

    Computer simulations have become an increasingly important part of geomorphological investigation in the last decades. Simulations can be used not only to make specific predictions of the evolution of a geomorphic system (predictive modelling), but also to test theories and learn about geomorphic form and process in a timely and non destructive way (explanatory and exploratory modelling). The latter modes of modelling can be very useful for discovering spatial and temporal patterns, developing insights in the relation between form and process, and for understanding the causal structure of the physical landscape. But before we can have any hope that these type of simulations can effectively accomplish these tasks, simulationists must make the case that their computer modelling goes beyond mere numerical computation of theoretical idealization; that geomorphic investigation through computer modelling can play a similar role as field observation or laboratory experiment. Many of these explanatory and exploratory models are reduced-complexity models which exhibit a high degree of idealization and simplification. Moreover, they are often uncalibrated and untested on real geomorphic systems. Indeed, they are often used on idealized hypothetical landscapes, and sometimes are acknowledged not to be suitable for simulation of real systems. Does it make sense then to conceive of this type of computer modelling as a form of investigation capable of providing reliable knowledge about actual geomorphological phenomena? In this analysis it is argued that the traditional notion of establishing reliability or trustworthiness of models, i.e. a confirmation of predictive ability with regards to observed data, is not applicable to explanatory or exploratory modelling. Instead, trustworthiness of these models is established through broad qualitative conformity with known system dynamics, followed by a posteriori field and laboratory testing of hypotheses generated from the modelling

  15. Modeling the contribution of personality, social identity and social norms to problematic Facebook use in adolescents.

    Science.gov (United States)

    Marino, Claudia; Vieno, Alessio; Pastore, Massimiliano; Albery, Ian P; Frings, Daniel; Spada, Marcantonio M

    2016-12-01

    Facebook is the most popular social networking site in the world providing the opportunity to maintain and/or establish relationships, to share media contents and experiences with friends, and to easily communicate with them. Despite the resources and the innovative social features offered by Facebook research has emerged indicating that its use may become problematic, with negative consequences on personal psycho-social well-being, especially among adolescents and young adults. The main aim of this study was to examine the unique contribution of personality traits and social influence processes (i.e. subjective norms, group norms, and social identity) to perceived frequency of Facebook Use and Problematic Facebook Use in a sample of adolescents. A total of 968 Italian adolescents participated in the study. Structural equation modeling showed that emotional stability, extraversion, conscientiousness and norms directly predicted Problematic Facebook Use, whereas gender, group norms and social identity predicted perceived frequency of Facebook use. In conclusion, both personal and social variables appear to explain perceived frequency of Facebook use and Problematic Facebook Use among adolescents, and should be taken into account by researchers and educational practitioners. PMID:27423098

  16. Application of computer simulated persons in indoor environmental modeling

    DEFF Research Database (Denmark)

    Topp, C.; Nielsen, P. V.; Sørensen, Dan Nørtoft

    2002-01-01

    Computer simulated persons are often applied when the indoor environment is modeled by computational fluid dynamics. The computer simulated persons differ in size, shape, and level of geometrical complexity, ranging from simple box or cylinder shaped heat sources to more humanlike models. Little ...... ventilated enclosure is considered, as little or no influence of geometry was observed at some distance from the computer simulated person. For local flow conditions, though, a more detailed geometry should be applied in order to assess thermal and atmospheric comfort....... effort, however, has been focused on the influence of the geometry. This work provides an investigation of geometrically different computer simulated persons with respect to both local and global airflow distribution. The results show that a simple geometry is sufficient when the global airflow of a...

  17. Complex system modelling and control through intelligent soft computations

    CERN Document Server

    Azar, Ahmad

    2015-01-01

    The book offers a snapshot of the theories and applications of soft computing in the area of complex systems modeling and control. It presents the most important findings discussed during the 5th International Conference on Modelling, Identification and Control, held in Cairo, from August 31-September 2, 2013. The book consists of twenty-nine selected contributions, which have been thoroughly reviewed and extended before their inclusion in the volume. The different chapters, written by active researchers in the field, report on both current theories and important applications of soft-computing. Besides providing the readers with soft-computing fundamentals, and soft-computing based inductive methodologies/algorithms, the book also discusses key industrial soft-computing applications, as well as multidisciplinary solutions developed for a variety of purposes, like windup control, waste management, security issues, biomedical applications and many others. It is a perfect reference guide for graduate students, r...

  18. Application of computer simulated persons in indoor environmental modeling

    DEFF Research Database (Denmark)

    Topp, C.; Nielsen, P. V.; Sørensen, Dan Nørtoft

    2002-01-01

    Computer simulated persons are often applied when the indoor environment is modeled by computational fluid dynamics. The computer simulated persons differ in size, shape, and level of geometrical complexity, ranging from simple box or cylinder shaped heat sources to more humanlike models. Little...... effort, however, has been focused on the influence of the geometry. This work provides an investigation of geometrically different computer simulated persons with respect to both local and global airflow distribution. The results show that a simple geometry is sufficient when the global airflow of a...... ventilated enclosure is considered, as little or no influence of geometry was observed at some distance from the computer simulated person. For local flow conditions, though, a more detailed geometry should be applied in order to assess thermal and atmospheric comfort....

  19. Computer Models and Automata Theory in Biology and Medicine

    CERN Document Server

    Baianu, I C

    2004-01-01

    The applications of computers to biological and biomedical problem solving goes back to the very beginnings of computer science, automata theory [1], and mathematical biology [2]. With the advent of more versatile and powerful computers, biological and biomedical applications of computers have proliferated so rapidly that it would be virtually impossible to compile a comprehensive review of all developments in this field. Limitations of computer simulations in biology have also come under close scrutiny, and claims have been made that biological systems have limited information processing power [3]. Such general conjectures do not, however, deter biologists and biomedical researchers from developing new computer applications in biology and medicine. Microprocessors are being widely employed in biological laboratories both for automatic data acquisition/processing and modeling; one particular area, which is of great biomedical interest, involves fast digital image processing and is already established for rout...

  20. Computational Modeling Develops Ultra-Hard Steel

    Science.gov (United States)

    2007-01-01

    Glenn Research Center's Mechanical Components Branch developed a spiral bevel or face gear test rig for testing thermal behavior, surface fatigue, strain, vibration, and noise; a full-scale, 500-horsepower helicopter main-rotor transmission testing stand; a gear rig that allows fundamental studies of the dynamic behavior of gear systems and gear noise; and a high-speed helical gear test for analyzing thermal behavior for rotorcraft. The test rig provides accelerated fatigue life testing for standard spur gears at speeds of up to 10,000 rotations per minute. The test rig enables engineers to investigate the effects of materials, heat treat, shot peen, lubricants, and other factors on the gear's performance. QuesTek Innovations LLC, based in Evanston, Illinois, recently developed a carburized, martensitic gear steel with an ultra-hard case using its computational design methodology, but needed to verify surface fatigue, lifecycle performance, and overall reliability. The Battelle Memorial Institute introduced the company to researchers at Glenn's Mechanical Components Branch and facilitated a partnership allowing researchers at the NASA Center to conduct spur gear fatigue testing for the company. Testing revealed that QuesTek's gear steel outperforms the current state-of-the-art alloys used for aviation gears in contact fatigue by almost 300 percent. With the confidence and credibility provided by the NASA testing, QuesTek is commercializing two new steel alloys. Uses for this new class of steel are limitless in areas that demand exceptional strength for high throughput applications.