WorldWideScience

Sample records for correct message passing

  1. Convergent and Correct Message Passing Schemes for Optimization Problems over Graphical Models

    CERN Document Server

    Ruozzi, Nicholas

    2010-01-01

    The max-product algorithm, which attempts to compute the most probable assignment (MAP) of a given probability distribution, has recently found applications in quadratic minimization and combinatorial optimization. Unfortunately, the max-product algorithm is not guaranteed to converge and, even if it does, is not guaranteed to produce the MAP assignment. In this work, we provide a simple derivation of a new family of message passing algorithms. We first show how to arrive at this general message passing scheme by "splitting" the factors of our graphical model and then we demonstrate that this construction can be extended beyond integral splitting. We prove that, for any objective function which attains its maximum value over its domain, this new family of message passing algorithms always contains a message passing scheme that guarantees correctness upon convergence to a unique estimate. We then adopt a serial message passing schedule and prove that, under mild assumptions, such a schedule guarantees the conv...

  2. Entropy Message Passing Algorithm

    CERN Document Server

    Ilic, Velimir M; Branimir, Todorovic T

    2009-01-01

    Message passing over factor graph can be considered as generalization of many well known algorithms for efficient marginalization of multivariate function. A specific instance of the algorithm is obtained by choosing an appropriate commutative semiring for the range of the function to be marginalized. Some examples are Viterbi algorithm, obtained on max-product semiring and forward-backward algorithm obtained on sum-product semiring. In this paper, Entropy Message Passing algorithm (EMP) is developed. It operates over entropy semiring, previously introduced in automata theory. It is shown how EMP extends the use of message passing over factor graphs to probabilistic model algorithms such as Expectation Maximization algorithm, gradient methods and computation of model entropy, unifying the work of different authors.

  3. Error Correction Coding Meets Cyber-Physical Systems: Message-Passing Analysis of Self-Healing Interdependent Networks

    CERN Document Server

    Behfarnia, Ali

    2016-01-01

    Coupling cyber and physical systems gives rise to numerous engineering challenges and opportunities. An important challenge is the contagion of failure from one system to another, which can lead to large-scale cascading failures. However, the \\textit{self-healing} ability emerges as a valuable opportunity where the overlaying cyber network can cure failures in the underlying physical network. To capture both self-healing and contagion, this paper considers a graphical model representation of an interdependent cyber-physical system, in which nodes represent various cyber or physical functionalities, and edges capture the interactions between the nodes. A message-passing algorithm used in low-density parity-check codes is extended to this representation to study the dynamics of failure propagation and healing. By applying a density evolution analysis to this algorithm, network reaction to initial disruptions is investigated. It is proved that as the number of message-passing iterations increases, the network re...

  4. Clandestine Message Passing in Virtual Environments

    Science.gov (United States)

    2008-09-01

    Steganography Hiding messages in pictures, audio , packets Place messages in clothing textures, object files Bots Automate the logic and control of...information will be developed along with proof of concepts. Visual cues, steganography and autonomous bots will be examined. Monitoring techniques are...14. SUBJECT TERMS Message Passing, Virtual Environments, Steganography , Second Life, Internet Terrorism, Honeyworld, Sun MPK20, Clandestine Messages

  5. Future-based Static Analysis of Message Passing Programs

    Directory of Open Access Journals (Sweden)

    Wytse Oortwijn

    2016-06-01

    Full Text Available Message passing is widely used in industry to develop programs consisting of several distributed communicating components. Developing functionally correct message passing software is very challenging due to the concurrent nature of message exchanges. Nonetheless, many safety-critical applications rely on the message passing paradigm, including air traffic control systems and emergency services, which makes proving their correctness crucial. We focus on the modular verification of MPI programs by statically verifying concrete Java code. We use separation logic to reason about local correctness and define abstractions of the communication protocol in the process algebra used by mCRL2. We call these abstractions futures as they predict how components will interact during program execution. We establish a provable link between futures and program code and analyse the abstract futures via model checking to prove global correctness. Finally, we verify a leader election protocol to demonstrate our approach.

  6. Message Passing Framework for Globally Interconnected Clusters

    Science.gov (United States)

    Hafeez, M.; Asghar, S.; Malik, U. A.; Rehman, A.; Riaz, N.

    2011-12-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  7. Message passing for quantified Boolean formulas

    CERN Document Server

    Zhang, Pan; Zdeborová, Lenka; Zecchina, Riccardo

    2012-01-01

    We introduce two types of message passing algorithms for quantified Boolean formulas (QBF). The first type is a message passing based heuristics that can prove unsatisfiability of the QBF by assigning the universal variables in such a way that the remaining formula is unsatisfiable. In the second type, we use message passing to guide branching heuristics of a Davis-Putnam Logemann-Loveland (DPLL) complete solver. Numerical experiments show that on random QBFs our branching heuristics gives robust exponential efficiency gain with respect to the state-of-art solvers. We also manage to solve some previously unsolved benchmarks from the QBFLIB library. Apart from this our study sheds light on using message passing in small systems and as subroutines in complete solvers.

  8. Physics/computer science. Passing messages between disciplines.

    Science.gov (United States)

    Mézard, Marc

    2003-09-19

    Problems in computer science, such as error correction in information transfer and "satisfiability" in optimization, show phase transitions familiar from solid-state physics. In his Perspective, Mézard explains how recent advances in these three fields originate in similar "message passing" procedures. The exchange of elaborate messages between different variables and constraints, used in the study of phase transitions in physical systems, helps to make error correction and satisfiability codes more efficient.

  9. MAP Estimation, Message Passing, and Perfect Graphs

    CERN Document Server

    Jebara, Tony S

    2012-01-01

    Efficiently finding the maximum a posteriori (MAP) configuration of a graphical model is an important problem which is often implemented using message passing algorithms. The optimality of such algorithms is only well established for singly-connected graphs and other limited settings. This article extends the set of graphs where MAP estimation is in P and where message passing recovers the exact solution to so-called perfect graphs. This result leverages recent progress in defining perfect graphs (the strong perfect graph theorem), linear programming relaxations of MAP estimation and recent convergent message passing schemes. The article converts graphical models into nand Markov random fields which are straightforward to relax into linear programs. Therein, integrality can be established in general by testing for graph perfection. This perfection test is performed efficiently using a polynomial time algorithm. Alternatively, known decomposition tools from perfect graph theory may be used to prove perfection ...

  10. Analysis and Design of Binary Message-Passing Decoders

    DEFF Research Database (Denmark)

    Lechner, Gottfried; Pedersen, Troels; Kramer, Gerhard

    2012-01-01

    Binary message-passing decoders for low-density parity-check (LDPC) codes are studied by using extrinsic information transfer (EXIT) charts. The channel delivers hard or soft decisions and the variable node decoder performs all computations in the L-value domain. A hard decision channel results...... message-passing decoders. Finally, it is shown that errors on cycles consisting only of degree two and three variable nodes cannot be corrected and a necessary and sufficient condition for the existence of a cycle-free subgraph is derived....

  11. Message Passing for Dynamic Network Energy Management

    CERN Document Server

    Kraning, Matt; Lavaei, Javad; Boyd, Stephen

    2012-01-01

    We consider a network of devices, such as generators, fixed loads, deferrable loads, and storage devices, each with its own dynamic constraints and objective, connected by lossy capacitated lines. The problem is to minimize the total network objective subject to the device and line constraints, over a given time horizon. This is a large optimization problem, with variables for consumption or generation in each time period for each device. In this paper we develop a decentralized method for solving this problem. The method is iterative: At each step, each device exchanges simple messages with its neighbors in the network and then solves its own optimization problem, minimizing its own objective function, augmented by a term determined by the messages it has received. We show that this message passing method converges to a solution when the device objective and constraints are convex. The method is completely decentralized, and needs no global coordination other than synchronizing iterations; the problems to be...

  12. Polymorphic Endpoint Types for Copyless Message Passing

    Directory of Open Access Journals (Sweden)

    Viviana Bono

    2011-07-01

    Full Text Available We present PolySing#, a calculus that models process interaction based on copyless message passing, in the style of Singularity OS. We equip the calculus with a type system that accommodates polymorphic endpoint types, which are a variant of polymorphic session types, and we show that well-typed processes are free from faults, leaks, and communication errors. The type system is essentially linear, although linearity alone may leave room for scenarios where well-typed processes leak memory. We identify a condition on endpoint types that prevents these leaks from occurring.

  13. Compressive Imaging via Approximate Message Passing

    Science.gov (United States)

    2015-09-04

    20] uses an adaptive Wiener filter [21] for 2D denoising. Another option is to use a more sophisticated image 2D denoiser such as BM3D [22] within AMP... filtering ,” IEEE Trans. Image Process ., vol. 16, no. 8, pp. 2080–2095, Aug. 2007. [23] J. Tan, Y. Ma, H. Rueda, D. Baron, and G. Arce, “Application of...JOURNAL OF SELECTED TOPICS IN in Signal Processing , (06 2015): 1. doi: Jin Tan, Yanting Ma, Dror Baron. Compressive Imaging via Approximate MessagePassing

  14. Belief propagation decoding of quantum channels by passing quantum messages

    Science.gov (United States)

    Renes, Joseph M.

    2017-07-01

    The belief propagation (BP) algorithm is a powerful tool in a wide range of disciplines from statistical physics to machine learning to computational biology, and is ubiquitous in decoding classical error-correcting codes. The algorithm works by passing messages between nodes of the factor graph associated with the code and enables efficient decoding of the channel, in some cases even up to the Shannon capacity. Here we construct the first BP algorithm which passes quantum messages on the factor graph and is capable of decoding the classical-quantum channel with pure state outputs. This gives explicit decoding circuits whose number of gates is quadratic in the code length. We also show that this decoder can be modified to work with polar codes for the pure state channel and as part of a decoder for transmitting quantum information over the amplitude damping channel. These represent the first explicit capacity-achieving decoders for non-Pauli channels.

  15. Message-Passing Estimation from Quantized Samples

    CERN Document Server

    Kamilov, Ulugbek; Rangan, Sundeep

    2011-01-01

    Estimation of a vector from quantized linear measurements is a common problem for which simple linear techniques are suboptimal -- sometimes greatly so. This paper develops generalized approximate message passing (GAMP) algorithms for minimum mean-squared error estimation of a random vector from quantized linear measurements, notably allowing the linear expansion to be overcomplete or undercomplete and the scalar quantization to be regular or non-regular. GAMP is a recently-developed class of algorithms that uses Gaussian approximations in belief propagation and allows arbitrary separable input and output channels. Scalar quantization of measurements is incorporated into the output channel formalism, leading to the first tractable and effective method for high-dimensional estimation problems involving non-regular scalar quantization. Non-regular quantization is empirically demonstrated to greatly improve rate--distortion performance in some problems with oversampling or with undersampling combined with a spar...

  16. Tracking particles by passing messages between images

    Energy Technology Data Exchange (ETDEWEB)

    Chertkov, Michael [Los Alamos National Laboratory; Kroc, Lukas [Los Alamos National Laboratory; Zdeborova, Lenka [Los Alamos National Laboratory; Krakala, Florent [ESPCI; Vergassola, M [CNRS

    2009-01-01

    Methods to extract information from the tracking of mobile objects/particles have broad interest in biological and physical sciences. Techniques based on the simple criterion of proximity in time-consecutive snapshots are useful to identify the trajectories of the particles. However, they become problematic as the motility and/or the density of the particles increases because of the uncertainties on the trajectories that particles have followed during the acquisition time of the images. Here, we report efficient methods for learning parameters of the dynamics of the particles from their positions in time-consecutive images. Our algorithm belongs to the class of message-passing algorithms, also known in computer science, information theory and statistical physics under the name of Belief Propagation (BP). The algorithm is distributed, thus allowing parallel implementation suitable for computations on multiple machines without significant inter-machine overhead. We test our method on the model example of particle tracking in turbulent flows, which is particularly challenging due to the strong transport that those flows produce. Our numerical experiments show that the BP algorithm compares in quality with exact Markov Chain Monte-Carlo algorithms, yet BP is far superior in speed. We also suggest and analyze a random-distance model that provides theoretical justification for BP accuracy. Methods developed here systematically formulate the problem of particle tracking and provide fast and reliable tools for its extensive range of applications.

  17. Tracking particles by passing messages between images

    Energy Technology Data Exchange (ETDEWEB)

    Chertkov, Michael [Los Alamos National Laboratory; Kroc, Lukas [Los Alamos National Laboratory; Zdeborova, Lenka [Los Alamos National Laboratory; Krakala, Florent [ESPCI; Vergassola, M [CNRS

    2009-01-01

    Methods to extract information from the tracking of mobile objects/particles have broad interest in biological and physical sciences. Techniques based on the simple criterion of proximity in time-consecutive snapshots are useful to identify the trajectories of the particles. However, they become problematic as the motility and/or the density of the particles increases because of the uncertainties on the trajectories that particles have followed during the acquisition time of the images. Here, we report efficient methods for learning parameters of the dynamics of the particles from their positions in time-consecutive images. Our algorithm belongs to the class of message-passing algorithms, also known in computer science, information theory and statistical physics under the name of Belief Propagation (BP). The algorithm is distributed, thus allowing parallel implementation suitable for computations on multiple machines without significant inter-machine overhead. We test our method on the model example of particle tracking in turbulent flows, which is particularly challenging due to the strong transport that those flows produce. Our numerical experiments show that the BP algorithm compares in quality with exact Markov Chain Monte-Carlo algorithms, yet BP is far superior in speed. We also suggest and analyze a random-distance model that provides theoretical justification for BP accuracy. Methods developed here systematically formulate the problem of particle tracking and provide fast and reliable tools for its extensive range of applications.

  18. Message passing with a limited number of DMA byte counters

    Energy Technology Data Exchange (ETDEWEB)

    Blocksome, Michael (Rochester, MN); Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN)

    2011-10-04

    A method for passing messages in a parallel computer system constructed as a plurality of compute nodes interconnected as a network where each compute node includes a DMA engine but includes only a limited number of byte counters for tracking a number of bytes that are sent or received by the DMA engine, where the byte counters may be used in shared counter or exclusive counter modes of operation. The method includes using rendezvous protocol, a source compute node deterministically sending a request to send (RTS) message with a single RTS descriptor using an exclusive injection counter to track both the RTS message and message data to be sent in association with the RTS message, to a destination compute node such that the RTS descriptor indicates to the destination compute node that the message data will be adaptively routed to the destination node. Using one DMA FIFO at the source compute node, the RTS descriptors are maintained for rendezvous messages destined for the destination compute node to ensure proper message data ordering thereat. Using a reception counter at a DMA engine, the destination compute node tracks reception of the RTS and associated message data and sends a clear to send (CTS) message to the source node in a rendezvous protocol form of a remote get to accept the RTS message and message data and processing the remote get (CTS) by the source compute node DMA engine to provide the message data to be sent.

  19. Direct Deposit -- When Message Passing Meets Shared Memory

    Science.gov (United States)

    2000-05-19

    by H. Karl in [64]. The paper implements the pure DSM code, the pure message passing code and a few intermediate forms on the Charlotte DSM system [8...ASPLOS VI), pages 51–60, San Jose, October 1994. ACM. [64] H. Karl . Bridging the gap between distributed shared memory and message passing. Concurrency...pages 94 – 101, 1988. [73] P.N. Loewenstein and D.L. Dill. Verification of a multiprocessor cache protocol using simulation relations and higher-order

  20. Data Handover: Reconciling Message Passing and Shared Memory

    OpenAIRE

    Gustedt, Jens

    2004-01-01

    Data Handover (DHO) is a programming paradigm and interface that aims to handle data between parallel or distributed processes that mixes aspects of message passing and shared memory. It is designed to overcome the potential problems in terms of efficiency of both: (1) memory blowup and forced copies for message passing and (2) data consistency and latency problems for shared memory. Our approach attempts to be simple and easy to understand. It content...

  1. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco;

    2015-01-01

    a protocol language based on a dependent type system for message-passing parallel programs, which includes various communication operators, such as point-to-point messages, broadcast, reduce, array scatter and gather. For the verification of a program against a given protocol, the protocol is first...

  2. Efficiently passing messages in distributed spiking neural network simulation.

    Science.gov (United States)

    Thibeault, Corey M; Minkovich, Kirill; O'Brien, Michael J; Harris, Frederick C; Srinivasa, Narayan

    2013-01-01

    Efficiently passing spiking messages in a neural model is an important aspect of high-performance simulation. As the scale of networks has increased so has the size of the computing systems required to simulate them. In addition, the information exchange of these resources has become more of an impediment to performance. In this paper we explore spike message passing using different mechanisms provided by the Message Passing Interface (MPI). A specific implementation, MVAPICH, designed for high-performance clusters with Infiniband hardware is employed. The focus is on providing information about these mechanisms for users of commodity high-performance spiking simulators. In addition, a novel hybrid method for spike exchange was implemented and benchmarked.

  3. Efficiently passing messages in distributed spiking neural network simulation

    Directory of Open Access Journals (Sweden)

    Corey Michael Thibeault

    2013-06-01

    Full Text Available Efficiently passing spiking messages in a neural model is an important aspect of high-performance simulation. As the scale of networks has increased so has the size of the computing systems required to simulate them. In addition, the information exchange of these resources has become more of an impediment to performance. In this paper we explore spike message passing using different mechanisms provided by the Message Passing Interface (MPI. A specific implementation, MVAPICH, designed for high-performance clusters with Infiniband hardware is employed. The focus is on providing information about these mechanisms for users of commodity high-performance spiking simulators. In addition, a novel hybrid-method for spike exchange was implemented and benchmarked.

  4. An Improved Three-Weight Message-Passing Algorithm

    CERN Document Server

    Derbinsky, Nate; Elser, Veit; Yedidia, Jonathan S

    2013-01-01

    We describe how the powerful "Divide and Concur" algorithm for constraint satisfaction can be derived as a special case of a message-passing version of the Alternating Direction Method of Multipliers (ADMM) algorithm for convex optimization, and introduce an improved message-passing algorithm based on ADMM/DC by introducing three distinct weights for messages, with "certain" and "no opinion" weights, as well as the standard weight used in ADMM/DC. The "certain" messages allow our improved algorithm to implement constraint propagation as a special case, while the "no opinion" messages speed convergence for some problems by making the algorithm focus only on active constraints. We describe how our three-weight version of ADMM/DC can give greatly improved performance for non-convex problems such as circle packing and solving large Sudoku puzzles, while retaining the exact performance of ADMM for convex problems. We also describe the advantages of our algorithm compared to other message-passing algorithms based u...

  5. Message-Passing Interface - Selected Topics and Best Practices

    OpenAIRE

    Janetzko, Florian

    2013-01-01

    The Message-Passing Interface (MPI) is a widely-used standard library for programming parallel applications using the distributed-memory model. In the first part of this talk we will give a short overview over concepts and properties of modern HPC hardware architectures as well as basic programming concepts. A brief introduction into a design strategy for parallel algorithms is presented.The focus of the second part will be on the Message-Passing interface. After a short overview over general...

  6. EXIT Chart Analysis of Binary Message-Passing Decoders

    DEFF Research Database (Denmark)

    Lechner, Gottfried; Pedersen, Troels; Kramer, Gerhard

    2007-01-01

    Binary message-passing decoders for LDPC codes are analyzed using EXIT charts. For the analysis, the variable node decoder performs all computations in the L-value domain. For the special case of a hard decision channel, this leads to the well know Gallager B algorithm, while the analysis can...... be extended to channels with larger output alphabets. By increasing the output alphabet from hard decisions to four symbols, a gain of more than 1.0 dB is achieved using optimized codes. For this code optimization, the mixing property of EXIT functions has to be modified to the case of binary message-passing...

  7. Message Passing on a Time-predictable Multicore Processor

    DEFF Research Database (Denmark)

    Sørensen, Rasmus Bo; Puffitsch, Wolfgang; Schoeberl, Martin

    2015-01-01

    Real-time systems need time-predictable computing platforms. For a multicore processor to be time-predictable, communication between processor cores needs to be time-predictable as well. This paper presents a time-predictable message-passing library for such a platform. We show how to build up...

  8. Statistics of Epidemics in Networks by Passing Messages

    Science.gov (United States)

    Shrestha, Munik Kumar

    Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result

  9. Denoising Message Passing for X-ray Computed Tomography Reconstruction

    CERN Document Server

    Perelli, Alessandro; Can, Ali; Davies, Mike E

    2016-01-01

    X-ray Computed Tomography (CT) reconstruction from sparse number of views is becoming a powerful way to reduce either the radiation dose or the acquisition time in CT systems but still requires a huge computational time. This paper introduces an approximate Bayesian inference framework for CT reconstruction based on a family of denoising approximate message passing (DCT-AMP) algorithms able to improve both the convergence speed and the reconstruction quality. Approximate Message Passing for Compressed Sensing has been extensively analysed for random linear measurements but there are still not clear solutions on how AMP should be modified and how it performs with real world problems. In particular to overcome the convergence issues of DCT-AMP with structured measurement matrices, we propose a disjoint preconditioned version of the algorithm tailored for both the geometric system model and the noise model. In addition the Bayesian DCT-AMP formulation allows to measure how the current estimate is close to the pr...

  10. Compressive Imaging via Approximate Message Passing with Image Denoising

    OpenAIRE

    Tan, Jin; Ma, Yanting; Baron, Dror

    2014-01-01

    We consider compressive imaging problems, where images are reconstructed from a reduced number of linear measurements. Our objective is to improve over existing compressive imaging algorithms in terms of both reconstruction error and runtime. To pursue our objective, we propose compressive imaging algorithms that employ the approximate message passing (AMP) framework. AMP is an iterative signal reconstruction algorithm that performs scalar denoising at each iteration; in order for AMP to reco...

  11. Feedback Message Passing for Inference in Gaussian Graphical Models

    CERN Document Server

    Liu, Ying; Anandkumar, Animashree; Willsky, Alan S

    2011-01-01

    While loopy belief propagation (LBP) performs reasonably well for inference in some Gaussian graphical models with cycles, its performance is unsatisfactory for many others. In particular for some models LBP does not converge, and in general when it does converge, the computed variances are incorrect (except for cycle-free graphs for which belief propagation (BP) is non-iterative and exact). In this paper we propose {\\em feedback message passing} (FMP), a message-passing algorithm that makes use of a special set of vertices (called a {\\em feedback vertex set} or {\\em FVS}) whose removal results in a cycle-free graph. In FMP, standard BP is employed several times on the cycle-free subgraph excluding the FVS while a special message-passing scheme is used for the nodes in the FVS. The computational complexity of exact inference is $O(k^2n)$, where $k$ is the number of feedback nodes, and $n$ is the total number of nodes. When the size of the FVS is very large, FMP is intractable. Hence we propose {\\em approximat...

  12. Message Passing Algorithms for Compressed Sensing: I. Motivation and Construction

    CERN Document Server

    Donoho, David L; Montanari, Andrea

    2009-01-01

    In a recent paper, the authors proposed a new class of low-complexity iterative thresholding algorithms for reconstructing sparse signals from a small set of linear measurements \\cite{DMM}. The new algorithms are broadly referred to as AMP, for approximate message passing. This is the first of two conference papers describing the derivation of these algorithms, connection with the related literature, extensions of the original framework, and new empirical evidence. In particular, the present paper outlines the derivation of AMP from standard sum-product belief propagation, and its extension in several directions. We also discuss relations with formal calculations based on statistical mechanics methods.

  13. Fault-tolerant Agreement in Synchronous Message-passing Systems

    CERN Document Server

    Raynal, Michel

    2010-01-01

    The present book focuses on the way to cope with the uncertainty created by process failures (crash, omission failures and Byzantine behavior) in synchronous message-passing systems (i.e., systems whose progress is governed by the passage of time). To that end, the book considers fundamental problems that distributed synchronous processes have to solve. These fundamental problems concern agreement among processes (if processes are unable to agree in one way or another in presence of failures, no non-trivial problem can be solved). They are consensus, interactive consistency, k-set agreement an

  14. IMP: A Message-Passing Algorithmfor Matrix Completion

    CERN Document Server

    Kim, Byung-Hak; Pfister, Henry D

    2010-01-01

    A new message-passing (MP) method is considered for the matrix completion problem associated with recommender systems. We attack the problem using a (generative) factor graph model that is related to a probabilistic low-rank matrix factorization. Based on the model, we propose a new algorithm, termed IMP, for the recovery of a data matrix from incomplete observations. The algorithm is based on a clustering followed by inference via MP (IMP). The algorithm is compared with a number of other matrix completion algorithms on real collaborative filtering (e.g., Netflix) data matrices. Our results show that, while many methods perform similarly with a large number of revealed entries, the IMP algorithm outperforms all others when the fraction of observed entries is small. This is helpful because it reduces the well-known cold-start problem associated with collaborative filtering (CF) systems in practice.

  15. Approximate message passing with restricted Boltzmann machine priors

    Science.gov (United States)

    Tramel, Eric W.; Drémeau, Angélique; Krzakala, Florent

    2016-07-01

    Approximate message passing (AMP) has been shown to be an excellent statistical approach to signal inference and compressed sensing problems. The AMP framework provides modularity in the choice of signal prior; here we propose a hierarchical form of the Gauss-Bernoulli prior which utilizes a restricted Boltzmann machine (RBM) trained on the signal support to push reconstruction performance beyond that of simple i.i.d. priors for signals whose support can be well represented by a trained binary RBM. We present and analyze two methods of RBM factorization and demonstrate how these affect signal reconstruction performance within our proposed algorithm. Finally, using the MNIST handwritten digit dataset, we show experimentally that using an RBM allows AMP to approach oracle-support performance.

  16. Approximate Message Passing with Restricted Boltzmann Machine Priors

    CERN Document Server

    Tramel, Eric W; Krzakala, Florent

    2015-01-01

    Approximate Message Passing (AMP) has been shown to be an excellent statistical approach to signal inference and compressed sensing problem. The AMP framework provides modularity in the choice of signal prior; here we propose a hierarchical form of the Gauss-Bernouilli prior which utilizes a Restricted Boltzmann Machine (RBM) trained on the signal support to push reconstruction performance beyond that of simple iid priors for signals whose support can be well represented by a trained binary RBM. We present and analyze two methods of RBM factorization and demonstrate how these affect signal reconstruction performance within our proposed algorithm. Finally, using the MNIST handwritten digit dataset, we show experimentally that using an RBM allows AMP to approach oracle-support performance.

  17. MPI-2: Extending the Message-Passing Interface

    Energy Technology Data Exchange (ETDEWEB)

    Geist, A. [Oak Ridge National Lab., TN (United States); Gropp, W.; Lusk, E. [Argonne National Lab., IL (United States); Huss-Lederman, S. [Argonne National Lab., IL (United States)]|[Wisconsin Univ., Madison, WI (United States); Lumsdaine, A. [Notre Dame Univ., IN (United States); Saphir, W. [NAS (United States); Skjellum, T. [Mississippi State Univ., MS (United States); Snir, M. [IBM Corp. (United States)

    1996-10-01

    This paper describes current activities of the MPI-2 Forum. The MPI - 2 Forum is a group of parallel computer vendors, library writers, and application specialists working together to define a set of extensions to MPI (Message Passing Interface). MPI was defined by the same process and now has many implementations, both vendor- proprietary and publicly available, for a wide variety of parallel computing environments. In this paper we present the salient aspects of the evolving MPI-2 document as it now stands. We discuss proposed extensions and enhancements to MPI in the areas of dynamic process management, one-sided operations, collective operations, new language binding, real-time computing, external interfaces, and miscellaneous topics.

  18. Incremental learning by message passing in hierarchical temporal memory.

    Science.gov (United States)

    Rehn, Erik M; Maltoni, Davide

    2014-08-01

    Hierarchical temporal memory (HTM) is a biologically inspired framework that can be used to learn invariant representations of patterns in a wide range of applications. Classical HTM learning is mainly unsupervised, and once training is completed, the network structure is frozen, thus making further training (i.e., incremental learning) quite critical. In this letter, we develop a novel technique for HTM (incremental) supervised learning based on gradient descent error minimization. We prove that error backpropagation can be naturally and elegantly implemented through native HTM message passing based on belief propagation. Our experimental results demonstrate that a two-stage training approach composed of unsupervised pretraining and supervised refinement is very effective (both accurate and efficient). This is in line with recent findings on other deep architectures.

  19. Parallelization of a hydrological model using the message passing interface

    Science.gov (United States)

    Wu, Yiping; Li, Tiejian; Sun, Liqun; Chen, Ji

    2013-01-01

    With the increasing knowledge about the natural processes, hydrological models such as the Soil and Water Assessment Tool (SWAT) are becoming larger and more complex with increasing computation time. Additionally, other procedures such as model calibration, which may require thousands of model iterations, can increase running time and thus further reduce rapid modeling and analysis. Using the widely-applied SWAT as an example, this study demonstrates how to parallelize a serial hydrological model in a Windows® environment using a parallel programing technology—Message Passing Interface (MPI). With a case study, we derived the optimal values for the two parameters (the number of processes and the corresponding percentage of work to be distributed to the master process) of the parallel SWAT (P-SWAT) on an ordinary personal computer and a work station. Our study indicates that model execution time can be reduced by 42%–70% (or a speedup of 1.74–3.36) using multiple processes (two to five) with a proper task-distribution scheme (between the master and slave processes). Although the computation time cost becomes lower with an increasing number of processes (from two to five), this enhancement becomes less due to the accompanied increase in demand for message passing procedures between the master and all slave processes. Our case study demonstrates that the P-SWAT with a five-process run may reach the maximum speedup, and the performance can be quite stable (fairly independent of a project size). Overall, the P-SWAT can help reduce the computation time substantially for an individual model run, manual and automatic calibration procedures, and optimization of best management practices. In particular, the parallelization method we used and the scheme for deriving the optimal parameters in this study can be valuable and easily applied to other hydrological or environmental models.

  20. Passing messages between biological networks to refine predicted interactions.

    Directory of Open Access Journals (Sweden)

    Kimberly Glass

    Full Text Available Regulatory network reconstruction is a fundamental problem in computational biology. There are significant limitations to such reconstruction using individual datasets, and increasingly people attempt to construct networks using multiple, independent datasets obtained from complementary sources, but methods for this integration are lacking. We developed PANDA (Passing Attributes between Networks for Data Assimilation, a message-passing model using multiple sources of information to predict regulatory relationships, and used it to integrate protein-protein interaction, gene expression, and sequence motif data to reconstruct genome-wide, condition-specific regulatory networks in yeast as a model. The resulting networks were not only more accurate than those produced using individual data sets and other existing methods, but they also captured information regarding specific biological mechanisms and pathways that were missed using other methodologies. PANDA is scalable to higher eukaryotes, applicable to specific tissue or cell type data and conceptually generalizable to include a variety of regulatory, interaction, expression, and other genome-scale data. An implementation of the PANDA algorithm is available at www.sourceforge.net/projects/panda-net.

  1. Passing messages between biological networks to refine predicted interactions.

    Science.gov (United States)

    Glass, Kimberly; Huttenhower, Curtis; Quackenbush, John; Yuan, Guo-Cheng

    2013-01-01

    Regulatory network reconstruction is a fundamental problem in computational biology. There are significant limitations to such reconstruction using individual datasets, and increasingly people attempt to construct networks using multiple, independent datasets obtained from complementary sources, but methods for this integration are lacking. We developed PANDA (Passing Attributes between Networks for Data Assimilation), a message-passing model using multiple sources of information to predict regulatory relationships, and used it to integrate protein-protein interaction, gene expression, and sequence motif data to reconstruct genome-wide, condition-specific regulatory networks in yeast as a model. The resulting networks were not only more accurate than those produced using individual data sets and other existing methods, but they also captured information regarding specific biological mechanisms and pathways that were missed using other methodologies. PANDA is scalable to higher eukaryotes, applicable to specific tissue or cell type data and conceptually generalizable to include a variety of regulatory, interaction, expression, and other genome-scale data. An implementation of the PANDA algorithm is available at www.sourceforge.net/projects/panda-net.

  2. Intel NX to PVM 3.2 message passing conversion library

    Science.gov (United States)

    Arthur, Trey; Nelson, Michael L.

    1993-01-01

    NASA Langley Research Center has developed a library that allows Intel NX message passing codes to be executed under the more popular and widely supported Parallel Virtual Machine (PVM) message passing library. PVM was developed at Oak Ridge National Labs and has become the defacto standard for message passing. This library will allow the many programs that were developed on the Intel iPSC/860 or Intel Paragon in a Single Program Multiple Data (SPMD) design to be ported to the numerous architectures that PVM (version 3.2) supports. Also, the library adds global operations capability to PVM. A familiarity with Intel NX and PVM message passing is assumed.

  3. Message passing performance of Intel Paragon, IBM SP1 and Cray T3D using PVM

    Energy Technology Data Exchange (ETDEWEB)

    Manke, J.W.; Patterson, J.C. [Boeing Computer Services, Seattle, WA (United States)

    1995-12-01

    For distributed applications on MPP machinse, message passing performance is a critical factor in the overall speed and scalability of the application. This is particularly true when all-to-all communication between nodes is required. In this study we measured the message passing performance of our PVM implementation of an all-to-all communication method called recursive doubling. The measurements were done on an Intel Paragon, IBM SP1 and CRAY T3D. Using a model of message passing times for recursive doubling, we developed several measures that can be used to compare the message passing performance of MPP machines.

  4. Containing epidemic outbreaks by message-passing techniques

    CERN Document Server

    Altarelli, F; Dall'Asta, L; Wakeling, J R; Zecchina, R

    2013-01-01

    The problem of targeted network immunization can be defined as the one of finding a subset of nodes in a network to immunize or vaccinate in order to minimize a tradeoff between the cost of vaccination and the final (stationary) expected infection under a given epidemic model. Although computing the expected infection is a hard computational problem, simple and efficient mean-field approximations have been put forward in the literature in recent years. The optimization problem can be recast into a constrained one in which the constraints enforce local mean-field equations describing the average stationary state of the epidemic process. For a wide class of epidemic models, including the susceptible-infected-removed and the susceptible-infected-susceptible models, we define a message-passing approach to network immunization that allows us to study the statistical properties of epidemic outbreaks in the presence of immunized nodes as well as to find (nearly) optimal immunization sets for a given choice of parame...

  5. A message passing approach for general epidemic models

    CERN Document Server

    Karrer, Brian

    2010-01-01

    In most models of the spread of disease over contact networks it is assumed that the probabilities of disease transmission and recovery from disease are constant in time. In real life, however, this is far from true. In many diseases, for instance, recovery occurs at about the same time after infection for all individuals, rather than at a constant rate. In this paper, we study a generalized version of the SIR (susceptible-infected-recovered) model of epidemic disease that allows for arbitrary nonuniform distributions of transmission and recovery times. Standard differential equation approaches cannot be used for this generalized model, but we show that the problem can be reformulated as a time-dependent message passing calculation on the appropriate contact network. The calculation is exact on trees (i.e., loopless networks) or locally tree-like networks (such as random graphs) in the large system size limit. On non-tree-like networks we show that the calculation gives a rigorous bound on the size of disease...

  6. Characterizing Computation-Communication Overlap in Message-Passing Systems

    Energy Technology Data Exchange (ETDEWEB)

    David E. Bernholdt; Jarek Nieplocha; P. Sadayappan; Aniruddha G. Shet; Vinod Tipparaju

    2008-01-31

    Effective overlap of computation and communication is a well understood technique for latency hiding and can yield significant performance gains for applications on high-end computers. In this report, we describe an instrumentation framework developed for message-passing systems to characterize the degree of overlap of communication with computation in the execution of parallel applications. The inability to obtain precise time-stamps for pertinent communication events is a significant problem, and is addressed by generation of minimum and maximum bounds on achieved overlap. The overlap measures can aid application developers and system designers in investigating scalability issues. The approach has been used to instrument two MPI implementations as well as the ARMCI system. The implementation resides entirely within the communication library and thus integrates well with existing approaches that operate outside the library. The utility of the framework is demonstrated by analyzing communication-computation overlap for micro-benchmarks and the NAS benchmarks, and the insights obtained are used to modify the NAS SP benchmark, resulting in improved overlap.

  7. Performance Evaluation Tools for Message-Passing Parallel Problems

    Directory of Open Access Journals (Sweden)

    Wlodzimierz Funika

    1999-01-01

    Full Text Available The article presents a number of issues of designing and implementing performance evolution tools for message-passing parallel programs, eg. MPI and PVM. There is at number ofspecial techniques for investigating parallel programs, whose implementations are tools presented, A concept of performance observability is introduced. Although a number of interesting solutions of performance tools was developed in the course of last decade, there is a great demand for portable and integrated tools. Understanding the reason for this situation requires evaluating the state of art of existing tools, their advantages and drawbacks. Due to a complicated mechanism of interactions between a tool and operating system, computer architecture and application, evaluating the tool includes taking into account a large number of features. There is introduced a set of criteria, which enable a thorough evaluation of tools. based on the work of HPC standardizing organizations as well as the author's work. The second part of the article presents the review of features of the particular tools developed over last decade. The tools are being evaluated on the base of the criteria introduced. The features of the PARNAS performance tool project and its implementation are presented. The summary presents further avenues of inquiry in parallel performance evaluation tools.

  8. List-Message Passing Achieves Capacity on the q-ary Symmetric Channel for Large q

    CERN Document Server

    Zhang, Fan

    2008-01-01

    We discuss and analyze a list-message-passing decoder with verification for low-density parity-check (LDPC) codes on the q-ary symmetric channel (q-SC). Rather than passing messages consisting of symbol probabilities, we pass lists of possible symbols and mark very likely symbols as verified. The density evolution (DE) equations for this decoder are derived and used to compute decoding thresholds. If the maximum list-size is unbounded, then we find that any capacity-achieving LDPC code for the binary erasure channel can be used to achieve capacity on the q-SC for large q. The decoding thresholds are also computed via DE for the case where each list is truncated to satisfy a maximum list-size constraint. We observe that one of the algorithms proposed in [7] is analyzed incorrectly and derive the correct analysis. The probability of false verification (FV) is also considered and techniques are discussed to mitigate the FV. Optimization of the degree distribution is also used to improve the threshold for a fixed...

  9. Theoretic derivation of directed acyclic subgraph algorithm and comparisons with message passing algorithm

    Science.gov (United States)

    Ha, Jeongmok; Jeong, Hong

    2016-07-01

    This study investigates the directed acyclic subgraph (DAS) algorithm, which is used to solve discrete labeling problems much more rapidly than other Markov-random-field-based inference methods but at a competitive accuracy. However, the mechanism by which the DAS algorithm simultaneously achieves competitive accuracy and fast execution speed, has not been elucidated by a theoretical derivation. We analyze the DAS algorithm by comparing it with a message passing algorithm. Graphical models, inference methods, and energy-minimization frameworks are compared between DAS and message passing algorithms. Moreover, the performances of DAS and other message passing methods [sum-product belief propagation (BP), max-product BP, and tree-reweighted message passing] are experimentally compared.

  10. High-Performance Message Passing over generic Ethernet Hardware with Open-MX

    OpenAIRE

    Goglin, Brice

    2011-01-01

    International audience; In the last decade, cluster computing has become the most popular high-performance computing architecture. Although numerous technological innovations have been proposed to improve the interconnection of nodes, many clusters still rely on commodity Ethernet hardware to implement message passing within parallel applications. We present Open-MX, an open-source message passing stack over generic Ethernet. It offers the same abilities as the specialized Myrinet Express sta...

  11. Message Passing Based Time Synchronization in Wireless Sensor Networks: A Survey

    OpenAIRE

    2016-01-01

    Various protocols have been proposed in the area of wireless sensor networks in order to achieve network-wide time synchronization. A large number of proposed protocols in the literature employ a message passing mechanism to make sensor node clocks tick in unison. In this paper, we first classify Message Passing based Time Synchronization (MPTS) protocols and then analyze them based on different metrics. The classification is based on the following three criteria: structure formation of the n...

  12. Verification of Faulty Message Passing Systems with Continuous State Space in PVS

    Science.gov (United States)

    Pilotto, Concetta; White, Jerome

    2010-01-01

    We present a library of Prototype Verification System (PVS) meta-theories that verifies a class of distributed systems in which agent commu nication is through message-passing. The theoretic work, outlined in, consists of iterative schemes for solving systems of linear equations , such as message-passing extensions of the Gauss and Gauss-Seidel me thods. We briefly review that work and discuss the challenges in formally verifying it.

  13. Propositional Dynamic Logic for Message-Passing Systems

    CERN Document Server

    Bollig, Benedikt; Meinecke, Ingmar

    2010-01-01

    We examine a bidirectional propositional dynamic logic (PDL) for finite and infinite message sequence charts (MSCs) extending LTL and TLC$^{-}$. By this kind of multi-modal logic we can express properties both in the entire future and in the past of an event. Path expressions strengthen the classical until operator of temporal logic. For every formula defining an MSC language, we construct a communicating finite-state machine (CFM) accepting the same language. The CFM obtained has size exponential in the size of the formula. This synthesis problem is solved in full generality, i.e., also for MSCs with unbounded channels. The model checking problem for CFMs and HMSCs turns out to be in PSPACE for existentially bounded MSCs. Finally, we show that, for PDL with intersection, the semantics of a formula cannot be captured by a CFM anymore.

  14. MPWide: a light-weight library for efficient message passing over wide area networks

    Directory of Open Access Journals (Sweden)

    Derek Groen

    2013-12-01

    Full Text Available We present MPWide, a light weight communication library which allows efficient message passing over a distributed network. MPWide has been designed to connect application running on distributed (supercomputing resources, and to maximize the communication performance on wide area networks for those without administrative privileges. It can be used to provide message-passing between application, move files, and make very fast connections in client-server environments. MPWide has already been applied to enable distributed cosmological simulations across up to four supercomputers on two continents, and to couple two different bloodflow simulations to form a multiscale simulation.

  15. The relationships between message passing, pairwise, Kermack-McKendrick and stochastic SIR epidemic models

    CERN Document Server

    Wilkinson, Robert R; Sharkey, Kieran J

    2016-01-01

    We consider a generalised form of Karrer and Newman's (Phys. Rev. E 82, 016101, 2010) message passing representation of S(E)IR dynamics and show that this, and hence the original system of Karrer and Newman, has a unique feasible solution. The rigorous bounds on the stochastic dynamics, and exact results for trees, first obtained by Karrer and Newman, still hold in this more general setting. We also derive an expression which provides a rigorous lower bound on the variance of the number of susceptibles at any time for trees. By applying the message passing approach to stochastic SIR dynamics on symmetric graphs, we then obtain several key results. Firstly we obtain a low-dimensional message passing system comprising of only four equations. From this system, by assuming that transmission processes are Poisson and independent of the recovery processes, we derive a non-Markovian pairwise model which gives exactly the same infectious time series as the message passing system. Thus, this pairwise model provides th...

  16. Supporting the Development of Soft-Error Resilient Message Passing Applications using Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Engelmann, Christian [ORNL; Naughton III, Thomas J [ORNL

    2016-01-01

    Radiation-induced bit flip faults are of particular concern in extreme-scale high-performance computing systems. This paper presents a simulation-based tool that enables the development of soft-error resilient message passing applications by permitting the investigation of their correctness and performance under various fault conditions. The documented extensions to the Extreme-scale Simulator (xSim) enable the injection of bit flip faults at specific of injection location(s) and fault activation time(s), while supporting a significant degree of configurability of the fault type. Experiments show that the simulation overhead with the new feature is ~2,325% for serial execution and ~1,730% at 128 MPI processes, both with very fine-grain fault injection. Fault injection experiments demonstrate the usefulness of the new feature by injecting bit flips in the input and output matrices of a matrix-matrix multiply application, revealing vulnerability of data structures, masking and error propagation. xSim is the very first simulation-based MPI performance tool that supports both, the injection of process failures and bit flip faults.

  17. A Message-Passing Algorithm for Counting Short Cycles in a Graph

    CERN Document Server

    Karimi, Mehdi

    2010-01-01

    A message-passing algorithm for counting short cycles in a graph is presented. For bipartite graphs, which are of particular interest in coding, the algorithm is capable of counting cycles of length g, g +2,..., 2g - 2, where g is the girth of the graph. For a general (non-bipartite) graph, cycles of length g; g + 1, ..., 2g - 1 can be counted. The algorithm is based on performing integer additions and subtractions in the nodes of the graph and passing extrinsic messages to adjacent nodes. The complexity of the proposed algorithm grows as $O(g|E|^2)$, where $|E|$ is the number of edges in the graph. For sparse graphs, the proposed algorithm significantly outperforms the existing algorithms in terms of computational complexity and memory requirements.

  18. Message passing theory for percolation models on multiplex networks with link overlap

    CERN Document Server

    Cellai, Davide; Bianconi, Ginestra

    2016-01-01

    Multiplex networks describe a large variety of complex systems including infrastructures, transportation networks and biological systems. Most of these networks feature a significant link overlap. It is therefore of particular importance to characterize the mutually connected giant component in these networks. Here we provide a message passing theory for characterizing the percolation transition in multiplex networks with link overlap and an arbitrary number of layers $M$. Specifically we propose and compare two message passing algorithms, that generalize the algorithm widely used to study the percolation transition in multiplex networks without link overlap. The first algorithm describes a directed percolation transition and admits an epidemic spreading interpretation. The second algorithm describes the emergence of the mutually connected giant component, that is the percolation transition, but does not preserve the epidemic spreading interpretation. We obtain the phase diagrams for the percolation and direc...

  19. The design of a standard message passing interface for distributed memory concurrent computers

    Energy Technology Data Exchange (ETDEWEB)

    Walker, D.W.

    1993-10-01

    This paper presents an overview of MPI, a proposed standard message passing interface for MIMD distributed memory concurrent computers. The design of MPI has been a collective effort involving researchers in the United States and Europe from many organizations and institutions. MPI includes point-to-point and collective communication routines, as well as support for process groups, communication contexts, and application topologies. While making use of new ideas where appropriate, the MPI standard is based largely on current practice.

  20. Gradient Computation In Linear-Chain Conditional Random Fields Using The Entropy Message Passing Algorithm

    CERN Document Server

    Ilic, Velimir M; Todorovic, Branimir T; Stankovic, Miomir S

    2010-01-01

    The paper proposes a new recursive algorithm for the exact computation of the linear chain conditional random fields gradient. The algorithm is an instance of the Entropy Message Passing (EMP), introduced in our previous work, and has the purpose to enhance memory efficiency when applied to long observation sequences. Unlike the traditional algorithm based on the forward and the backward recursions, the memory complexity of our algorithm does not depend on the sequence length, having the same computational complexity as the standard algorithm.

  1. ScaLAPACK: A linear algebra library for message-passing computers

    Energy Technology Data Exchange (ETDEWEB)

    Blackford, L.S., Cleary, A., Petitet, A., Whaley, R.C., Dongarra, J. [Dept. of Computer Science, Tennessee Univ., Knoxville, TN (United States); Choi, J., [Soongsil University (Korea); D`Azevedo, E. [Mathematical Science Section, Oak Ridge National Lab., TN (United States); Demmel, J., Dhillon, I., Stanley, K. [California Univ., Berkeley, CA (United States). Computer Science Div.; Hammarling, S. [Nag Ltd., (England); Henry, G., Walker, D. [Itel SSPD, Beaverton, OR (United States)

    1997-01-06

    This article outlines the content and performance of some of the ScaLAPACK software. ScaLAPACK is a collection of mathematical software for linear algebra computations on distributed-memory computers. The importance of developing standards for computational and message-passing interfaces is discussed. We present the different components and building blocks of ScaLAPACK and provide initial performance results for selected PBLAS routines and a subset of ScaLAPACK driver routines.

  2. Unsupervised feature learning from finite data by message passing: Discontinuous versus continuous phase transition

    Science.gov (United States)

    Huang, Haiping; Toyoizumi, Taro

    2016-12-01

    Unsupervised neural network learning extracts hidden features from unlabeled training data. This is used as a pretraining step for further supervised learning in deep networks. Hence, understanding unsupervised learning is of fundamental importance. Here, we study the unsupervised learning from a finite number of data, based on the restricted Boltzmann machine where only one hidden neuron is considered. Our study inspires an efficient message-passing algorithm to infer the hidden feature and estimate the entropy of candidate features consistent with the data. Our analysis reveals that the learning requires only a few data if the feature is salient and extensively many if the feature is weak. Moreover, the entropy of candidate features monotonically decreases with data size and becomes negative (i.e., entropy crisis) before the message passing becomes unstable, suggesting a discontinuous phase transition. In terms of convergence time of the message-passing algorithm, the unsupervised learning exhibits an easy-hard-easy phenomenon as the training data size increases. All these properties are reproduced in an approximate Hopfield model, with an exception that the entropy crisis is absent, and only continuous phase transition is observed. This key difference is also confirmed in a handwritten digits dataset. This study deepens our understanding of unsupervised learning from a finite number of data and may provide insights into its role in training deep networks.

  3. A Message-Passing Hardware/Software Cosimulation Environment for Reconfigurable Computing Systems

    Directory of Open Access Journals (Sweden)

    Manuel Saldaña

    2009-01-01

    Full Text Available High-performance reconfigurable computers (HPRCs provide a mix of standard processors and FPGAs to collectively accelerate applications. This introduces new design challenges, such as the need for portable programming models across HPRCs and system-level verification tools. To address the need for cosimulating a complete heterogeneous application using both software and hardware in an HPRC, we have created a tool called the Message-passing Simulation Framework (MSF. We have used it to simulate and develop an interface enabling an MPI-based approach to exchange data between X86 processors and hardware engines inside FPGAs. The MSF can also be used as an application development tool that enables multiple FPGAs in simulation to exchange messages amongst themselves and with X86 processors. As an example, we simulate a LINPACK benchmark hardware core using an Intel-FSB-Xilinx-FPGA platform to quickly prototype the hardware, to test the communications. and to verify the benchmark results.

  4. A Modified Nonparametric Message Passing Algorithm for Soft Iterative Channel Estimation

    Directory of Open Access Journals (Sweden)

    Linlin Duan

    2013-08-01

    Full Text Available Based on the factor graph framework, we derived a Modified Nonparametric Message Passing Algorithm (MNMPA for soft iterative channel estimation in a Low Density Parity-Check (LDPC coded Bit-Interleaved Coded Modulation (BICM system. The algorithm combines ideas from Particle Filtering (PF with popular factor graph techniques. A Markov Chain Monte Carlo (MCMC move step is added after typical sequential Important Sampling (SIS -resampling to prevent particle impoverishment and to improve channel estimation precision. To reduce complexity, a new max-sum rule for updating particle based messages is reformulated and two proper update schedules are designed. Simulation results illustrate the effectiveness of MNMPA and its comparison with other sum-product algorithms in a Gaussian or non-Gaussian noise environment. We also studied the effect of the particle number, pilot symbol spacing and different schedules on BER performance.

  5. Implementation of the Message Passing Software Layer over SCI for theATLAS Second Level Trigger Testbeds

    CERN Document Server

    Giacomini, F; Bogaerts, A; Botterill, David R; Middleton, R; Wickens, F J; Werner, P

    2000-01-01

    This document describes how the Message Passing layer ofthe Reference Software for the Second Level Trigger has beenimplemented using the Scalable Coherent Interface (SCI)as the underlying networking technology.

  6. Two Parallel Swendsen-Wang Cluster Algorithms Using Message-Passing Paradigm

    CERN Document Server

    Lin, Shizeng

    2008-01-01

    In this article, we present two different parallel Swendsen-Wang Cluster(SWC) algorithms using message-passing interface(MPI). One is based on Master-Slave Parallel Model(MSPM) and the other is based on Data-Parallel Model(DPM). A speedup of 24 with 40 processors and 16 with 37 processors is achieved with the DPM and MSPM respectively. The speedup of both algorithms at different temperature and system size is carefully examined both experimentally and theoretically, and a comparison of their efficiency is made. In the last section, based on these two parallel SWC algorithms, two parallel probability changing cluster(PCC) algorithms are proposed.

  7. A real-time MPEG software decoder using a portable message-passing library

    Energy Technology Data Exchange (ETDEWEB)

    Kwong, Man Kam; Tang, P.T. Peter; Lin, Biquan

    1995-12-31

    We present a real-time MPEG software decoder that uses message-passing libraries such as MPL, p4 and MPI. The parallel MPEG decoder currently runs on the IBM SP system but can be easil ported to other parallel machines. This paper discusses our parallel MPEG decoding algorithm as well as the parallel programming environment under which it uses. Several technical issues are discussed, including balancing of decoding speed, memory limitation, 1/0 capacities, and optimization of MPEG decoding components. This project shows that a real-time portable software MPEG decoder is feasible in a general-purpose parallel machine.

  8. Performance Evaluation of Parallel Message Passing and Thread Programming Model on Multicore Architectures

    CERN Document Server

    Hasta, D T

    2010-01-01

    The current trend of multicore architectures on shared memory systems underscores the need of parallelism. While there are some programming model to express parallelism, thread programming model has become a standard to support these system such as OpenMP, and POSIX threads. MPI (Message Passing Interface) which remains the dominant model used in high-performance computing today faces this challenge. Previous version of MPI which is MPI-1 has no shared memory concept, and Current MPI version 2 which is MPI-2 has a limited support for shared memory systems. In this research, MPI-2 version of MPI will be compared with OpenMP to see how well does MPI perform on multicore / SMP (Symmetric Multiprocessor) machines. Comparison between OpenMP for thread programming model and MPI for message passing programming model will be conducted on multicore shared memory machine architectures to see who has a better performance in terms of speed and throughput. Application used to assess the scalability of the evaluated parall...

  9. MPICH-GQ: quality-of-service for message passing programs

    Energy Technology Data Exchange (ETDEWEB)

    Roy, A.; Foster, I.; Gropp, W.; Karonis, N.; Sander, V.; Toonen, B.

    2000-07-28

    Parallel programmers typically assume that all resources required for a program's execution are dedicated to that purpose. However, in local and wide area networks, contention for shared networks, CPUs, and I/O systems can result in significant variations in availability, with consequent adverse effects on overall performance. The authors describe a new message-passing architecture, MPICH-GQ, that uses quality of service (QoS) mechanisms to manage contention and hence improve performance of message passing interface (MPI) applications. MPICH-GQ combines new QoS specification, traffic shaping, QoS reservation, and QoS implementation techniques to deliver QoS capabilities to the high-bandwidth bursty flows, complex structures, and reliable protocols used in high-performance applications--characteristics very different from the low-bandwidth, constant bit-rate media flows and unreliable protocols for which QoS mechanisms were designed. Results obtained on a differentiated services testbed demonstrate their ability to maintain application performance in the face of heavy network contention.

  10. A grid-enabled MPI : message passing in heterogeneous distributed computing systems.

    Energy Technology Data Exchange (ETDEWEB)

    Foster, I.; Karonis, N. T.

    2000-11-30

    Application development for high-performance distributed computing systems, or computational grids as they are sometimes called, requires grid-enabled tools that hide mundate aspects of the heterogeneous grid environment without compromising performance. As part of an investigation of these issues, they have developed MPICH-G, a grid-enabled implementation of the Message Passing Interface (MPI) that allows a user to run MPI programs across multiple computers at different sites using the same commands that would be used on a parallel computer. This library extends the Argonne MPICH implementation of MPI to use services provided by the globus grid toolkit. In this paper, they describe the MPICH-G implementation and present preliminary performance results.

  11. Parallelization of plasma 2-D hydrodynamics code using Message Passing Interface (MPI)

    Energy Technology Data Exchange (ETDEWEB)

    Sasaki, Akira [Japan Atomic Energy Research Inst., Neyagawa, Osaka (Japan). Kansai Research Establishment

    1997-11-01

    2 dimensional hydrodynamics code using CIP method is parallelized for Intel Paragon XP/S massive parallel computer at Kansai Research Establishment using MPI (Message Passing Interface). The communicator is found to be useful to divide and parallelize programs into functional modules. Using the process topology and the derived data type, large scale finite difference simulation codes can be significantly accelerated with simple coding of the area division method. MPI has functions which simplify the program to process boundary conditions and simplify the communication between adjacent nodes. 357 and 576 times acceleration is obtained for 400 and 782 nodes, respectively. MPI utilizes feature of scalar massive parallel computers with distributed memories. Fast and portable codes can be developed using MPI. (author)

  12. Message passing for integrating and assessing renewable generation in a redundant power grid

    Energy Technology Data Exchange (ETDEWEB)

    Zdeborova, Lenka [Los Alamos National Laboratory; Backhaus, Scott [Los Alamos National Laboratory; Chertkov, Michael [Los Alamos National Laboratory

    2009-01-01

    A simplified model of a redundant power grid is used to study integration of fluctuating renewable generation. The grid consists of large number of generator and consumer nodes. The net power consumption is determined by the difference between the gross consumption and the level of renewable generation. The gross consumption is drawn from a narrow distribution representing the predictability of aggregated loads, and we consider two different distributions representing wind and solar resources. Each generator is connected to D consumers, and redundancy is built in by connecting R {le} D of these consumers to other generators. The lines are switchable so that at any instance each consumer is connected to a single generator. We explore the capacity of the renewable generation by determining the level of 'firm' generation capacity that can be displaced for different levels of redundancy R. We also develop message-passing control algorithm for finding switch sellings where no generator is overloaded.

  13. An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis

    Directory of Open Access Journals (Sweden)

    Alaa I. Elnashar

    2014-12-01

    Full Text Available Message Passing Interface (MPI is a well know paradigm that is widely used in coding explicit parallel programs. MPI programs exchange data among parallel processes using communication routines. Program execution trace depends on the way that its processes are communicated together. For the same program, there are a lot of processes transitions states that may appear due to the nondeterministic features of parallel execution. In this paper we present a new algorithm that statically generates the execution trace of a given MPI program using data flow analysis technique. The performance of the proposed algorithm is evaluated and compared with that of two heuristic techniques that use a random and genetic algorithm approaches to generate trace sequences. The results show that the proposed algorithm scales well with the program size and avoids the problem of processes state explosion which the other techniques suffer from.

  14. Parallelization of the TRIGRS model for rainfall-induced landslides using the message passing interface

    Science.gov (United States)

    Alvioli, M.; Baum, R.L.

    2016-01-01

    We describe a parallel implementation of TRIGRS, the Transient Rainfall Infiltration and Grid-Based Regional Slope-Stability Model for the timing and distribution of rainfall-induced shallow landslides. We have parallelized the four time-demanding execution modes of TRIGRS, namely both the saturated and unsaturated model with finite and infinite soil depth options, within the Message Passing Interface framework. In addition to new features of the code, we outline details of the parallel implementation and show the performance gain with respect to the serial code. Results are obtained both on commercial hardware and on a high-performance multi-node machine, showing the different limits of applicability of the new code. We also discuss the implications for the application of the model on large-scale areas and as a tool for real-time landslide hazard monitoring.

  15. A message-passing approach for recurrent-state epidemic models on networks

    CERN Document Server

    Shrestha, Munik; Moore, Cristopher

    2015-01-01

    Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. Recently, dynamic message-passing (DMP) has been proposed as an efficient algorithm for simulating epidemic models on networks, and in particular for estimating the probability that a given node will become infectious at a particular time. To date, DMP has been applied exclusively to models with one-way state changes, as opposed to models like SIS (susceptible-infectious-susceptible) and SIRS (susceptible-infectious-recovered-susceptible) where nodes can return to previously inhabited states. Because many real-world epidemics can exhibit such recurrent dynamics, we propose a DMP algorithm for complex, recurrent epidemic models on networks. Our approach takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. We ...

  16. Dynamic Compressive Sensing of Time-Varying Signals via Approximate Message Passing

    CERN Document Server

    Ziniel, Justin

    2012-01-01

    In this work the dynamic compressive sensing (CS) problem of recovering sparse, correlated, time-varying signals from sub-Nyquist, non-adaptive, linear measurements is explored from a Bayesian perspective. While there has been a handful of previously proposed Bayesian dynamic CS algorithms in the literature, the ability to perform inference on high-dimensional problems in a computationally efficient manner remains elusive. In response, we propose a probabilistic dynamic CS signal model that captures both amplitude and support correlation structure, and describe an approximate message passing algorithm that performs soft signal estimation and support detection with a computational complexity that is linear in all problem dimensions. The algorithm, DCS-AMP, can perform either causal filtering or non-causal smoothing, and is capable of learning model parameters adaptively from the data through an expectation-maximization learning procedure. We provide numerical evidence that DCS-AMP performs within 3 dB of oracl...

  17. Message-Passing Multi-Cell Molecular Dynamics on the Connection Machine 5

    CERN Document Server

    Beazley, D M

    1993-01-01

    We present a new scalable algorithm for short-range molecular dynamics simulations on distributed memory MIMD multicomputer based on a message-passing multi-cell approach. We have implemented the algorithm on the Connection Machine 5 (CM-5) and demonstrate that meso-scale molecular dynamics with more than $10^8$ particles is now possible on massively parallel MIMD computers. Typical runs show single particle update-times of $0.15 \\mu s$ in 2 dimensions (2D) and approximately $1 \\mu s$ in 3 dimensions (3D) on a 1024 node CM-5 without vector units, corresponding to more than 1.8 GFlops overall performance. We also present a scaling equation which agrees well with actually observed timings.

  18. Message passing for integrating and assessing renewable generation in a redundant power grid

    Energy Technology Data Exchange (ETDEWEB)

    Zdeborova, Lenka [Los Alamos National Laboratory; Backhaus, Scott [Los Alamos National Laboratory; Chertkov, Michael [Los Alamos National Laboratory

    2009-01-01

    A simplified model of a redundant power grid is used to study integration of fluctuating renewable generation. The grid consists of large number of generator and consumer nodes. The net power consumption is determined by the difference between the gross consumption and the level of renewable generation. The gross consumption is drawn from a narrow distribution representing the predictability of aggregated loads, and we consider two different distributions representing wind and solar resources. Each generator is connected to D consumers, and redundancy is built in by connecting R {le} D of these consumers to other generators. The lines are switchable so that at any instance each consumer is connected to a single generator. We explore the capacity of the renewable generation by determining the level of 'firm' generation capacity that can be displaced for different levels of redundancy R. We also develop message-passing control algorithm for finding switch sellings where no generator is overloaded.

  19. Message-Passing Algorithms for Quadratic Programming Formulations of MAP Estimation

    CERN Document Server

    Kumar, Akshat

    2012-01-01

    Computing maximum a posteriori (MAP) estimation in graphical models is an important inference problem with many applications. We present message-passing algorithms for quadratic programming (QP) formulations of MAP estimation for pairwise Markov random fields. In particular, we use the concave-convex procedure (CCCP) to obtain a locally optimal algorithm for the non-convex QP formulation. A similar technique is used to derive a globally convergent algorithm for the convex QP relaxation of MAP. We also show that a recently developed expectation-maximization (EM) algorithm for the QP formulation of MAP can be derived from the CCCP perspective. Experiments on synthetic and real-world problems confirm that our new approach is competitive with max-product and its variations. Compared with CPLEX, we achieve more than an order-of-magnitude speedup in solving optimally the convex QP relaxation.

  20. Message-passing algorithm for two-dimensional dependent bit allocation

    Science.gov (United States)

    Sagetong, Phoom; Ortega, Antonio

    2003-05-01

    We address the bit allocation problem in scenarios where there exist two-dimensional (2D) dependencies in the bit allocation, i.e., where the allocation involves a 2D set of coding units (e.g., DCT blocks in standard MPEG coding) and where the rate-distortion (RD) characteristics of each coding unit depend on one or more of the other coding units. These coding units can be located anywhere in 2D space. As an example we consider MPEG-4 intra-coding where, in order to further reduce the redundancy between coefficients, both the DC and certain of the AC coefficients of each block are predicted from the corresponding coefficients in either the previous block in the same line (to the left) or the one above the current block. To find the optimal solution may be a time-consuming problem, given that the RD characteristics of each block depend on those of the neighbors. Greedy search approaches are popular due to their low complexity and low memory consumption, but they may be far from optimal due to the dependencies in the coding. In this work, we propose an iterative message-passing technique to solve 2D dependent bit allocation problems. This technique is based on (i) Soft-in/Soft-out (SISO) algorithms first used in the context of Turbo codes, (ii) a grid model, and (iii) Lagrangian optimization techniques. In order to solve this problem our approach is to iteratively compute the soft information of a current DCT block (intrinsic information) and pass the soft decision (extrinsic information) to other nearby DCT block(s). Since the computational complexity is also dominated by the data generation phase, i.e., in the Rate-Distortion (RD) data population process, we introduce an approximation method to eliminate the need to generate the entire set of RD points. Experimental studies reveal that the system that uses the proposed message-passing algorithm is able to outperform the greedy search approach by 0.57 dB on average. We also show that the proposed algorithm requires

  1. Scampi: a robust approximate message-passing framework for compressive imaging

    Science.gov (United States)

    Barbier, Jean; Tramel, Eric W.; Krzakala, Florent

    2016-03-01

    Reconstruction of images from noisy linear measurements is a core problem in image processing, for which convex optimization methods based on total variation (TV) minimization have been the long-standing state-of-the-art. We present an alternative probabilistic reconstruction procedure based on approximate message-passing, Scampi, which operates in the compressive regime, where the inverse imaging problem is underdetermined. While the proposed method is related to the recently proposed GrAMPA algorithm of Borgerding, Schniter, and Rangan, we further develop the probabilistic approach to compressive imaging by introducing an expectation-maximization learning of model parameters, making the Scampi robust to model uncertainties. Additionally, our numerical experiments indicate that Scampi can provide reconstruction performance superior to both GrAMPA as well as convex approaches to TV reconstruction. Finally, through exhaustive best-case experiments, we show that in many cases the maximal performance of both Scampi and convex TV can be quite close, even though the approaches are a prori distinct. The theoretical reasons for this correspondence remain an open question. Nevertheless, the proposed algorithm remains more practical, as it requires far less parameter tuning to perform optimally.

  2. Using Partial Reconfiguration and Message Passing to Enable FPGA-Based Generic Computing Platforms

    Directory of Open Access Journals (Sweden)

    Manuel Saldaña

    2012-01-01

    Full Text Available Partial reconfiguration (PR is an FPGA feature that allows the modification of certain parts of an FPGA while the rest of the system continues to operate without disruption. This distinctive characteristic of FPGAs has many potential benefits but also challenges. The lack of good CAD tools and the deep hardware knowledge requirement result in a hard-to-use feature. In this paper, the new partition-based Xilinx PR flow is used to incorporate PR within our MPI-based message-passing framework to allow hardware designers to create template bitstreams, which are predesigned, prerouted, generic bitstreams that can be reused for multiple applications. As an example of the generality of this approach, four different applications that use the same template bitstream are run consecutively, with a PR operation performed at the beginning of each application to instantiate the desired application engine. We demonstrate a simplified, reusable, high-level, and portable PR interface for X86-FPGA hybrid machines. PR issues such as local resets of reconfigurable modules and context saving and restoring are addressed in this paper followed by some examples and preliminary PR overhead measurements.

  3. MPICH-G2 : a grid-enabled implementation of the message passing interface.

    Energy Technology Data Exchange (ETDEWEB)

    Karonis, N. T.; Toonen, B.; Foster, I.; Mathematics and Computer Science; Northern Illinois Univ.; Univ. of Chicago

    2003-05-01

    Application development for distributed-computing 'Grids' can benefit from tools that variously hide or enable application-level management of critical aspects of the heterogeneous environment. As part of an investigation of these issues, we have developed MPICH-G2, a Grid-enabled implementation of the Message Passing Interface (MPI) that allows a user to run MPI programs across multiple computers, at the same or different sites, using the same commands that would be used on a parallel computer. This library extends the Argonne MPICH implementation of MPI to use services provided by the Globus Toolkit for authentication, authorization, resource allocation, executable staging, and I/O, as well as for process creation, monitoring, and control. Various performance-critical operations, including startup and collective operations, are configured to exploit network topology information. The library also exploits MPI constructs for performance management; for example, the MPI communicator construct is used for application-level discovery of, and adaptation to, both network topology and network quality-of-service mechanisms. We describe the MPICH-G2 design and implementation, present performance results, and review application experiences, including record-setting distributed simulations.

  4. Message-Passing Inference on a Factor Graph for Collaborative Filtering

    CERN Document Server

    Kim, Byung-Hak; Pfister, Henry D

    2010-01-01

    This paper introduces a novel message-passing (MP) framework for the collaborative filtering (CF) problem associated with recommender systems. We model the movie-rating prediction problem popularized by the Netflix Prize, using a probabilistic factor graph model and study the model by deriving generalization error bounds in terms of the training error. Based on the model, we develop a new MP algorithm, termed IMP, for learning the model. To show superiority of the IMP algorithm, we compare it with the closely related expectation-maximization (EM) based algorithm and a number of other matrix completion algorithms. Our simulation results on Netflix data show that, while the methods perform similarly with large amounts of data, the IMP algorithm is superior for small amounts of data. This improves the cold-start problem of the CF systems in practice. Another advantage of the IMP algorithm is that it can be analyzed using the technique of density evolution (DE) that was originally developed for MP decoding of err...

  5. Monitoring Data-Structure Evolution in Distributed Message-Passing Programs

    Science.gov (United States)

    Sarukkai, Sekhar R.; Beers, Andrew; Woodrow, Thomas S. (Technical Monitor)

    1996-01-01

    Monitoring the evolution of data structures in parallel and distributed programs, is critical for debugging its semantics and performance. However, the current state-of-art in tracking and presenting data-structure information on parallel and distributed environments is cumbersome and does not scale. In this paper we present a methodology that automatically tracks memory bindings (not the actual contents) of static and dynamic data-structures of message-passing C programs, using PVM. With the help of a number of examples we show that in addition to determining the impact of memory allocation overheads on program performance, graphical views can help in debugging the semantics of program execution. Scalable animations of virtual address bindings of source-level data-structures are used for debugging the semantics of parallel programs across all processors. In conjunction with light-weight core-files, this technique can be used to complement traditional debuggers on single processors. Detailed information (such as data-structure contents), on specific nodes, can be determined using traditional debuggers after the data structure evolution leading to the semantic error is observed graphically.

  6. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  7. Development of a low-latency scalar communication routine on message-passing architectures

    Energy Technology Data Exchange (ETDEWEB)

    Pai, R.

    1994-01-11

    One of the most significant advances in computer systems over the past decade is parallel processing. To be scalable to a large number of processing nodes and to be able to support multiple levels and forms of parallelism and its flexible use, new parallel machines have to be multicomputer architectures that have general networking support and extremely low internode communication latencies. The performance of a program when ported to a parallel machine is limited mainly by the internode communication latencies of the machine. Therefore, the best parallel applications are those that seldom require communications which must be routed through the nodes. Thus the ratio of computation time to that of communication time is what determines, to a large extent, the performance metrics of an algorithm. The cost of synchronization and load imbalance appear secondary to that of the time required for internode communication and I/O, for communication intensive applications. This thesis is organized in chapters. The first chapter deals with the communication strategies in various message-passing computers. A taxonomy of inter-node communication strategies is presented in the second chapter and a comparison of the strategies in some existing machines is done. The implementation of communication in nCUBE Vertex O.S is explained in the third chapter. The fourth chapter deals with the communication routines in the Vertex O.S, and the last chapter explains the development and implementation of the scalar communication call. Finally some conclusions are presented.

  8. Development of a low-latency scalar communication routine on message-passing architectures

    Energy Technology Data Exchange (ETDEWEB)

    Pai, Rekha [Iowa State Univ., Ames, IA (United States)

    1994-01-11

    One of the most significant advances in computer systems over the past decade is parallel processing. To be scalable to a large number of processing nodes and to be able to support multiple levels and forms of parallelism and its flexible use, new parallel machines have to be multicomputer architectures that have general networking support and extremely low internode communication latencies. The performance of a program when ported to a parallel machine is limited mainly by the internode communication latencies of the machine. Therefore, the best parallel applications are those that seldom require communications which must be routed through the nodes. Thus the ratio of computation time to that of communication time is what determines, to a large extent, the performance metrics of an algorithm. The cost of synchronization and load imbalance appear secondary to that of the time required for internode communication and I/O, for communication intensive applications. This thesis is organized in chapters. The first chapter deals with the communication strategies in various message-passing computers. A taxonomy of inter-node communication strategies is presented in the second chapter and a comparison of the strategies in some existing machines is done. The implementation of communication in nCUBE Vertex O.S is explained in the third chapter. The fourth chapter deals with the communication routines in the Vertex O.S, and the last chapter explains the development and implementation of the scalar communication call. Finally some conclusions are presented.

  9. Constrained low-rank matrix estimation: phase transitions, approximate message passing and applications

    Science.gov (United States)

    Lesieur, Thibault; Krzakala, Florent; Zdeborová, Lenka

    2017-07-01

    This article is an extended version of previous work of Lesieur et al (2015 IEEE Int. Symp. on Information Theory Proc. pp 1635-9 and 2015 53rd Annual Allerton Conf. on Communication, Control and Computing (IEEE) pp 680-7) on low-rank matrix estimation in the presence of constraints on the factors into which the matrix is factorized. Low-rank matrix factorization is one of the basic methods used in data analysis for unsupervised learning of relevant features and other types of dimensionality reduction. We present a framework to study the constrained low-rank matrix estimation for a general prior on the factors, and a general output channel through which the matrix is observed. We draw a parallel with the study of vector-spin glass models—presenting a unifying way to study a number of problems considered previously in separate statistical physics works. We present a number of applications for the problem in data analysis. We derive in detail a general form of the low-rank approximate message passing (Low-RAMP) algorithm, that is known in statistical physics as the TAP equations. We thus unify the derivation of the TAP equations for models as different as the Sherrington-Kirkpatrick model, the restricted Boltzmann machine, the Hopfield model or vector (xy, Heisenberg and other) spin glasses. The state evolution of the Low-RAMP algorithm is also derived, and is equivalent to the replica symmetric solution for the large class of vector-spin glass models. In the section devoted to result we study in detail phase diagrams and phase transitions for the Bayes-optimal inference in low-rank matrix estimation. We present a typology of phase transitions and their relation to performance of algorithms such as the Low-RAMP or commonly used spectral methods.

  10. Implementation of a Message Passing Interface into a Cloud-Resolving Model for Massively Parallel Computing

    Science.gov (United States)

    Juang, Hann-Ming Henry; Tao, Wei-Kuo; Zeng, Xi-Ping; Shie, Chung-Lin; Simpson, Joanne; Lang, Steve

    2004-01-01

    The capability for massively parallel programming (MPP) using a message passing interface (MPI) has been implemented into a three-dimensional version of the Goddard Cumulus Ensemble (GCE) model. The design for the MPP with MPI uses the concept of maintaining similar code structure between the whole domain as well as the portions after decomposition. Hence the model follows the same integration for single and multiple tasks (CPUs). Also, it provides for minimal changes to the original code, so it is easily modified and/or managed by the model developers and users who have little knowledge of MPP. The entire model domain could be sliced into one- or two-dimensional decomposition with a halo regime, which is overlaid on partial domains. The halo regime requires that no data be fetched across tasks during the computational stage, but it must be updated before the next computational stage through data exchange via MPI. For reproducible purposes, transposing data among tasks is required for spectral transform (Fast Fourier Transform, FFT), which is used in the anelastic version of the model for solving the pressure equation. The performance of the MPI-implemented codes (i.e., the compressible and anelastic versions) was tested on three different computing platforms. The major results are: 1) both versions have speedups of about 99% up to 256 tasks but not for 512 tasks; 2) the anelastic version has better speedup and efficiency because it requires more computations than that of the compressible version; 3) equal or approximately-equal numbers of slices between the x- and y- directions provide the fastest integration due to fewer data exchanges; and 4) one-dimensional slices in the x-direction result in the slowest integration due to the need for more memory relocation for computation.

  11. Optics correction for the multi-pass FFAG ERL machine eRHIC

    Energy Technology Data Exchange (ETDEWEB)

    Liu, C. [Brookhaven National Lab. (BNL), Upton, NY (United States); Brooks, S. [Brookhaven National Lab. (BNL), Upton, NY (United States); Litvinenko, V. [Brookhaven National Lab. (BNL), Upton, NY (United States); Minty, M. [Brookhaven National Lab. (BNL), Upton, NY (United States); Ptitsyn, V. [Brookhaven National Lab. (BNL), Upton, NY (United States); Trbojevic, D. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-05-03

    Gradient errors in the multi-pass Fixed Field Alternating Gradient (FFAG) Energy Recovery Linac (ERL) machine, eRHIC, distort the beam orbit and therefore cause emittance increase. The localization and correction of gradient errors are essential for an effective orbit correction and emittance preservation. In this report, the methodology and simulation of optics correction for the multi-pass FFAG ERL machine eRHIC will be presented.

  12. Parallel finite difference beam propagation method based on message passing interface: application to MMI couplers with two-dimensional confinement

    Institute of Scientific and Technical Information of China (English)

    Chaojun Yan; Wenbiao Peng; Haijun Li

    2007-01-01

    @@ The alternate-direction implicit finite difference beam propagation method (FD-BPM) is used to analyze the two-dimensional (2D) symmetrical multimode interference (MMI) couplers. The positions of the images at the output plane and the length of multimode waveguide are accurately determined numerically. In order to reduce calculation time, the parallel processing of the arithmetic is implemented by the message passing interface and the simulation is accomplished by eight personal computers.

  13. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response.

    Directory of Open Access Journals (Sweden)

    Jeannette Sutton

    Full Text Available Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials' Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events.

  14. Spherical Refractive Correction With an Electro-Optical Liquid Lens in a Double-Pass System

    Science.gov (United States)

    Sanàbria, F.; Díaz-Doutón, F.; Aldaba, M.; Pujol, J.

    2013-09-01

    In this study we show a novel double-pass configuration to correct the spherical refractive error by means of an electro-optical liquid lens.The proposed method enables spherical correction in the -12 D to +7 D range without movable parts using an electro-optical liquid lens.We have measured the optical performance of the spherical corrector in terms of power, pupil size and optical quality verifying that it fitsthe requirements to be applied to a double-pass system. We have also evaluated the performance of the proposed method in patients bycomparison with a conventional double-pass system using a Badal optometer.

  15. Distributed primal–dual interior-point methods for solving tree-structured coupled convex problems using message-passing

    DEFF Research Database (Denmark)

    Khoshfetrat Pakazad, Sina; Hansson, Anders; Andersen, Martin S.;

    2016-01-01

    In this paper, we propose a distributed algorithm for solving coupled problems with chordal sparsity or an inherent tree structure which relies on primal–dual interior-point methods. We achieve this by distributing the computations at each iteration, using message-passing. In comparison to existing...... distributed algorithms for solving such problems, this algorithm requires far fewer iterations to converge to a solution with high accuracy. Furthermore, it is possible to compute an upper-bound for the number of required iterations which, unlike existing methods, only depends on the coupling structure...... in the problem. We illustrate the performance of our proposed method using a set of numerical examples....

  16. Scalable High Performance Message Passing over InfiniBand for Open MPI

    Energy Technology Data Exchange (ETDEWEB)

    Friedley, A; Hoefler, T; Leininger, M L; Lumsdaine, A

    2007-10-24

    InfiniBand (IB) is a popular network technology for modern high-performance computing systems. MPI implementations traditionally support IB using a reliable, connection-oriented (RC) transport. However, per-process resource usage that grows linearly with the number of processes, makes this approach prohibitive for large-scale systems. IB provides an alternative in the form of a connectionless unreliable datagram transport (UD), which allows for near-constant resource usage and initialization overhead as the process count increases. This paper describes a UD-based implementation for IB in Open MPI as a scalable alternative to existing RC-based schemes. We use the software reliability capabilities of Open MPI to provide the guaranteed delivery semantics required by MPI. Results show that UD not only requires fewer resources at scale, but also allows for shorter MPI startup times. A connectionless model also improves performance for applications that tend to send small messages to many different processes.

  17. Main-Branch Structure Iterative Detection Using Approximate Message Passing for Uplink Large-Scale Multiuser MIMO Systems

    Directory of Open Access Journals (Sweden)

    Qifeng Zou

    2016-01-01

    Full Text Available The emerging large-scale/massive multi-input multioutput (MIMO system combined with orthogonal frequency division multiplexing (OFDM is considered a key technology for its advantage of improving the spectral efficiency. In this paper, we introduce an iterative detection algorithm for uplink large-scale multiuser MIMO-OFDM communication systems. We design a Main-Branch structure iterative turbo detector using the Approximate Message Passing algorithm simplified by linear approximation (AMP-LA and using the Mean Square Error (MSE criterion to calculate the correlation coefficients between main detector and branch detector for the given iteration. The complexity of our method is compared with other detection algorithms. The simulation results show that our scheme can achieve better performance than the conventional detection methods and have the acceptable complexity.

  18. New temporal high-pass filter nonuniformity correction based on bilateral filter

    Science.gov (United States)

    Zuo, Chao; Chen, Qian; Gu, Guohua; Qian, Weixian

    2011-03-01

    A thorough analysis of low convergence speed and ghosting artifacts in temporal high-pass filter correction has been undertaken in this paper and it has found out that the keys of these problems are the interference of a large sum of unrelated scene information in the nonuniformity correction (NUC) process. In order to overcome these drawbacks, a new scene-based NUC technique based on bilateral filter has been developed. This method separates the original input frames into two parts and it estimates the NUC parameters only by using the residuals. The experimental results have shown that it can significantly increase convergence speed and reduce ghosting artifacts.

  19. Standard and Chineses Strategy of MPI(Message-Passing Interface)%MPI(消息传输界面)的标准化与我国的对策

    Institute of Scientific and Technical Information of China (English)

    苏运霖

    2002-01-01

    The motivation of posing the message-passing interface and thereby the development of the standardization of it are surveyed in the paper.Then the goals and the contents are presented.Finally the paper discusses bow would china deal with the issue.

  20. A Study on the Effect of Communication Performance on Message-Passing Parallel Programs: Methodology and Case Studies

    Science.gov (United States)

    Sarukkai, Sekhar R.; Yan, Jerry; Woodrow, Thomas (Technical Monitor)

    1994-01-01

    From a source-program perspective, the performance achieved on distributed/parallel systems is governed by the underlying message-passing library overhead and the network capabilities of the architecture. Studying the impact of changes in these features on the source-program. can have a significant influence in the development of next-generation system designs. In this paper we introduce a simple and robust tool that can be used for this purpose. This tool is based on event-driven simulation of programs that generates a new set of trace events - that preserves causality and partial order - corresponding to the expected execution of the program in the simulated environment. Trace events can be visualized and source-level profile information can be used to pin-point locations of program which are most significantly affected with changing system parameters in the simulated environment. We present a number of examples from the NAS benchmark suite, executed on the Intel Paragon and iPSC/860 that are used to identify and expose performance bottlenecks with varying system parameters. Specific aspects of the system that significantly effect these benchmarks are presented and discussed,

  1. A Study on the Effect of Communication Performance on Message-Passing Parallel Programs: Methodology and Case Studies

    Science.gov (United States)

    Sarukkai, Sekhar R.; Yan, Jerry; Woodrow, Thomas (Technical Monitor)

    1994-01-01

    From a source-program perspective, the performance achieved on distributed/parallel systems is governed by the underlying message-passing library overhead and the network capabilities of the architecture. Studying the impact of changes in these features on the source-program. can have a significant influence in the development of next-generation system designs. In this paper we introduce a simple and robust tool that can be used for this purpose. This tool is based on event-driven simulation of programs that generates a new set of trace events - that preserves causality and partial order - corresponding to the expected execution of the program in the simulated environment. Trace events can be visualized and source-level profile information can be used to pin-point locations of program which are most significantly affected with changing system parameters in the simulated environment. We present a number of examples from the NAS benchmark suite, executed on the Intel Paragon and iPSC/860 that are used to identify and expose performance bottlenecks with varying system parameters. Specific aspects of the system that significantly effect these benchmarks are presented and discussed,

  2. First pass cable artefact correction for cardiac C-arm CT imaging.

    Science.gov (United States)

    Haase, C; Schäfer, D; Kim, M; Chen, S J; Carroll, J D; Eshuis, P; Dössel, O; Grass, M

    2014-07-21

    Cardiac C-arm CT imaging delivers a tomographic region-of-interest reconstruction of the patient's heart during image guided catheter interventions. Due to the limited size of the flat detector a volume image is reconstructed, which is truncated in the cone-beam (along the patient axis) and the fan-beam (in the transaxial plane) direction. To practically address this local tomography problem correction methods, like projection extension, are available for first pass image reconstruction. For second pass correction methods, like metal artefact reduction, alternative correction schemes are required when the field of view is limited to a region-of-interest of the patient. In classical CT imaging metal artefacts are corrected by metal identification in a first volume reconstruction and generation of a corrected projection data set followed by a second reconstruction. This approach fails when the metal structures are located outside the reconstruction field of view. When a C-arm CT is performed during a cardiac intervention pacing leads and other cables are frequently positioned on the patients skin, which results in propagating streak artefacts in the reconstruction volume. A first pass approach to reduce this type of artefact is introduced and evaluated here. It makes use of the fact that the projected position of objects outside the reconstruction volume changes with the projection perspective. It is shown that projection based identification, tracking and removal of high contrast structures like cables, only detected in a subset of the projections, delivers a more consistent reconstruction volume with reduced artefact level. The method is quantitatively evaluated based on 50 simulations using cardiac CT data sets with variable cable positioning. These data sets are forward projected using a C-arm CT system geometry and generate artefacts comparable to those observed in clinical cardiac C-arm CT acquisitions. A C-arm CT simulation of every cardiac CT data set without

  3. Message passing interface and multithreading hybrid for parallel molecular docking of large databases on petascale high performance computing machines.

    Science.gov (United States)

    Zhang, Xiaohua; Wong, Sergio E; Lightstone, Felice C

    2013-04-30

    A mixed parallel scheme that combines message passing interface (MPI) and multithreading was implemented in the AutoDock Vina molecular docking program. The resulting program, named VinaLC, was tested on the petascale high performance computing (HPC) machines at Lawrence Livermore National Laboratory. To exploit the typical cluster-type supercomputers, thousands of docking calculations were dispatched by the master process to run simultaneously on thousands of slave processes, where each docking calculation takes one slave process on one node, and within the node each docking calculation runs via multithreading on multiple CPU cores and shared memory. Input and output of the program and the data handling within the program were carefully designed to deal with large databases and ultimately achieve HPC on a large number of CPU cores. Parallel performance analysis of the VinaLC program shows that the code scales up to more than 15K CPUs with a very low overhead cost of 3.94%. One million flexible compound docking calculations took only 1.4 h to finish on about 15K CPUs. The docking accuracy of VinaLC has been validated against the DUD data set by the re-docking of X-ray ligands and an enrichment study, 64.4% of the top scoring poses have RMSD values under 2.0 Å. The program has been demonstrated to have good enrichment performance on 70% of the targets in the DUD data set. An analysis of the enrichment factors calculated at various percentages of the screening database indicates VinaLC has very good early recovery of actives.

  4. QLWFPC2: Parallel-Processing Quick-Look WFPC2 Stellar Photometry Based on the Message Passing Interface

    Science.gov (United States)

    Mighell, K. J.

    2004-07-01

    I describe a new parallel-processing stellar photometry code called QLWFPC2 (http://www.noao.edu/staff/mighell/qlwfpc2) which is designed to do quick-look analysis of two entire WFPC2 observations from the Hubble Space Telescope in under 5 seconds using a fast Beowulf cluster with a Gigabit-Ethernet local network. This program is written in ANSI C and uses MPICH implementation of the Message Passing Interface from the Argonne National Laboratory for the parallel-processing communications, the CFITSIO library (from HEASARC at NASA's GSFC) for reading the standard FITS files from the HST Data Archive, and the Parameter Interface Library (from the INTEGRAL Science Data Center) for the IRAF parameter-file user interface. QLWFPC2 running on 4 processors takes about 2.4 seconds to analyze the WFPC2 archive datasets u37ga407r.c0.fits (F555W; 300 s) and u37ga401r.c0.fits (F814W; 300 s) of M54 (NGC 6715) which is the bright massive globular cluster near the center of the nearby Sagittarius dwarf spheroidal galaxy. The analysis of these HST observations of M54 lead to the serendipitous discovery of more than 50 new bright variable stars in the central region of M54. Most of the candidate variables stars are found on the PC1 images of the cluster center --- a region where no variables have been reported by previous ground-based studies of variables in M54. This discovery is an example of how QLWFPC2 can be used to quickly explore the time domain of observations in the HST Data Archive.

  5. Effect of refractive correction on ocular optical quality measurement using double-pass system

    Institute of Scientific and Technical Information of China (English)

    WAN Xiu-hua; CAI Xiao-gu; QIAO Li-ya; ZHANG Ye; TAN Jia-xuan; Jhanji Vishal; WANG Ning-li

    2013-01-01

    Background Optical Quality Analysis System Ⅱ (OQAS,Visiometrics,Terrassa,Spain) that uses double-pass (DP) technique is the only commercially available device that allows objective measurement of ocular retinal image quality.This study aimed to evaluate the impact of spectacle lenses on the ocular optical quality parameters and the validity of the optometer within OQAS.Methods Seventy eyes of healthy volunteers were enrolled.Optical quality measurements were performed using OQAS with an artificial pupil diameter of 4.0 mm.Three consecutive measurements were obtained from spectacle correction corresponding to subjective refraction and from the OQAS built-in optometer separately.The modulation transfer function cutoff frequency,the Strehl ratio,the width of the point spread function (PSF) at 10% of its maximal height (PSF10),and the width of the PSF at 50% of its maximal height (PSF50) were analyzed.Results There was no significant difference in any of the parameters between the spectacle correction and the optometer correction (all P >0.05,paired t-test).A good agreement was found between both the methods and a good intraobserver repeatability in both the correction methods.Difference in best focus between two methods was the only parameter associated significantly with optical quality parameter differences.Best focus difference,built-in optometer correction with or without external cylindrical lens,and age were associated significantly with PSF10 difference.No linear correlation between refractive status and optical quality measurement difference was observed.A hyperopic bias (best focus difference of (0.50±0.44) D) and a relatively better optical quality using spectacle correction in high myopia group were found.Conclusions OQAS based on DP system is a clinically reliable instrument.In patients with high myopia,measurements using built-in optometer correction should be considered and interpreted with caution.

  6. Implementation and optimization of Message Passing Interface-based Warshall algorithm%Warshall算法在MPI中的实现及优化

    Institute of Scientific and Technical Information of China (English)

    赵岩; 郭善良; 佘玲玲

    2007-01-01

    Message Passing Interface并行编程方法是目前编程人员广泛使用的方法之一,但此方法将并行性开发的任务完全交给编程人员,程序的质量与效率往往因编程人员水平及风格不同而各异.在Message Passing Interface环境下把传统串行程序转变为并行程序从而提高其性能.此外通过MPI所提供的函数来进一步优化并行程序以便提高其性能.

  7. Statistical Physics, Optimization, Inference, and Message-Passing Algorithms : Lecture Notes of the Les Houches School of Physics : Special Issue, October 2013

    CERN Document Server

    Ricci-Tersenghi, Federico; Zdeborova, Lenka; Zecchina, Riccardo; Tramel, Eric W; Cugliandolo, Leticia F

    2015-01-01

    This book contains a collection of the presentations that were given in October 2013 at the Les Houches Autumn School on statistical physics, optimization, inference, and message-passing algorithms. In the last decade, there has been increasing convergence of interest and methods between theoretical physics and fields as diverse as probability, machine learning, optimization, and inference problems. In particular, much theoretical and applied work in statistical physics and computer science has relied on the use of message-passing algorithms and their connection to the statistical physics of glasses and spin glasses. For example, both the replica and cavity methods have led to recent advances in compressed sensing, sparse estimation, and random constraint satisfaction, to name a few. This book’s detailed pedagogical lectures on statistical inference, computational complexity, the replica and cavity methods, and belief propagation are aimed particularly at PhD students, post-docs, and young researchers desir...

  8. Temporal high-pass non-uniformity correction algorithm based on grayscale mapping and hardware implementation

    Science.gov (United States)

    Jin, Minglei; Jin, Weiqi; Li, Yiyang; Li, Shuo

    2015-08-01

    In this paper, we propose a novel scene-based non-uniformity correction algorithm for infrared image processing-temporal high-pass non-uniformity correction algorithm based on grayscale mapping (THP and GM). The main sources of non-uniformity are: (1) detector fabrication inaccuracies; (2) non-linearity and variations in the read-out electronics and (3) optical path effects. The non-uniformity will be reduced by non-uniformity correction (NUC) algorithms. The NUC algorithms are often divided into calibration-based non-uniformity correction (CBNUC) algorithms and scene-based non-uniformity correction (SBNUC) algorithms. As non-uniformity drifts temporally, CBNUC algorithms must be repeated by inserting a uniform radiation source which SBNUC algorithms do not need into the view, so the SBNUC algorithm becomes an essential part of infrared imaging system. The SBNUC algorithms' poor robustness often leads two defects: artifacts and over-correction, meanwhile due to complicated calculation process and large storage consumption, hardware implementation of the SBNUC algorithms is difficult, especially in Field Programmable Gate Array (FPGA) platform. The THP and GM algorithm proposed in this paper can eliminate the non-uniformity without causing defects. The hardware implementation of the algorithm only based on FPGA has two advantages: (1) low resources consumption, and (2) small hardware delay: less than 20 lines, it can be transplanted to a variety of infrared detectors equipped with FPGA image processing module, it can reduce the stripe non-uniformity and the ripple non-uniformity.

  9. MPPIE:RDFS Parallel Inference Framework Based on Message Passing%MPPIE:基于消息传递的RDFS并行推理框架

    Institute of Scientific and Technical Information of China (English)

    吕小玲; 王鑫; 冯志勇; 饶国政; 张小旺; 许光全

    2016-01-01

    随着语义Web的快速发展,RDF(resource description framework)语义数据规模呈现爆炸性增长趋势,大规模语义数据上的推理工作面临严峻挑战。基于消息传递机制提出了一种新的RDFS(RDF schema)并行推理方案。利用RDF图数据结构,建立RDFS推理过程的图上加边模型。以顶点为计算中心,根据不同推理模型,向其他顶点传递推理消息,完成推理操作。当所有推导出的新三元组以边的形式加入原RDF图中时,整个推理过程结束。在基于消息传递模型的开源框架Giraph上,实现了RDFS并行推理框架MPPIE(message passing parallel inference engine)。实验结果表明,在标准数据集LUBM和真实数据集DBpedia上,MPPIE执行速度均比当前性能最好的语义推理引擎WebPIE快一个数量级,且展现了良好的可伸展性。%Reasoning over semantic data poses a challenge, since large volumes of RDF (resource description frame-work) data have been published with the rapid development of the Semantic Web. This paper proposes an RDFS (RDF schema) parallel inference framework based on message passing mechanism. The graph structure of RDF data is exploited to abstract inference process to an edge addition model. Vertices execute the parallel inference algorithm, which can send reasoning messages to other vertices to complete inference process. When all derivations are regarded as new edges of initial RDF graph, the computation terminates. MPPIE (message passing parallel inference engine), the RDFS parallel inference framework, is implemented on top of open source framework Giraph. The experimental results on both benchmark dataset LUBM and real world dataset DBpedia show that the performance of the proposed method outperforms WebPIE, the state-of-art semantic scalable inference engine. Furthermore, the proposed method provides good scalability.

  10. PERFORMANCE ANALYSIS OF MESSAGE PASSING INTERFACE COLLECTIVE COMMUNICATION ON INTEL XEON QUAD-CORE GIGABIT ETHERNET AND INFINIBAND CLUSTERS

    Directory of Open Access Journals (Sweden)

    Roswan Ismail

    2013-01-01

    Full Text Available The performance of MPI implementation operations still presents critical issues for high performance computing systems, particularly for more advanced processor technology. Consequently, this study concentrates on benchmarking MPI implementation on multi-core architecture by measuring the performance of Open MPI collective communication on Intel Xeon dual quad-core Gigabit Ethernet and InfiniBand clusters using SKaMPI. It focuses on well known collective communication routines such as MPI-Bcast, MPI-AlltoAll, MPI-Scatter and MPI-Gather. From the collection of results, MPI collective communication on InfiniBand clusters had distinctly better performance in terms of latency and throughput. The analysis indicates that the algorithm used for collective communication performed very well for all message sizes except for MPI-Bcast and MPI-Alltoall operation of inter-node communication. However, InfiniBand provides the lowest latency for all operations since it provides applications with an easy to use messaging service, compared to Gigabit Ethernet, which still requests the operating system for access to one of the server communication resources with the complex dance between an application and a network.

  11. Message-passing-interface-based parallel FDTD investigation on the EM scattering from a 1-D rough sea surface using uniaxial perfectly matched layer absorbing boundary.

    Science.gov (United States)

    Li, J; Guo, L-X; Zeng, H; Han, X-B

    2009-06-01

    A message-passing-interface (MPI)-based parallel finite-difference time-domain (FDTD) algorithm for the electromagnetic scattering from a 1-D randomly rough sea surface is presented. The uniaxial perfectly matched layer (UPML) medium is adopted for truncation of FDTD lattices, in which the finite-difference equations can be used for the total computation domain by properly choosing the uniaxial parameters. This makes the parallel FDTD algorithm easier to implement. The parallel performance with different processors is illustrated for one sea surface realization, and the computation time of the parallel FDTD algorithm is dramatically reduced compared to a single-process implementation. Finally, some numerical results are shown, including the backscattering characteristics of sea surface for different polarization and the bistatic scattering from a sea surface with large incident angle and large wind speed.

  12. Task-parallel message passing interface implementation of Autodock4 for docking of very large databases of compounds using high-performance super-computers.

    Science.gov (United States)

    Collignon, Barbara; Schulz, Roland; Smith, Jeremy C; Baudry, Jerome

    2011-04-30

    A message passing interface (MPI)-based implementation (Autodock4.lga.MPI) of the grid-based docking program Autodock4 has been developed to allow simultaneous and independent docking of multiple compounds on up to thousands of central processing units (CPUs) using the Lamarkian genetic algorithm. The MPI version reads a single binary file containing precalculated grids that represent the protein-ligand interactions, i.e., van der Waals, electrostatic, and desolvation potentials, and needs only two input parameter files for the entire docking run. In comparison, the serial version of Autodock4 reads ASCII grid files and requires one parameter file per compound. The modifications performed result in significantly reduced input/output activity compared with the serial version. Autodock4.lga.MPI scales up to 8192 CPUs with a maximal overhead of 16.3%, of which two thirds is due to input/output operations and one third originates from MPI operations. The optimal docking strategy, which minimizes docking CPU time without lowering the quality of the database enrichments, comprises the docking of ligands preordered from the most to the least flexible and the assignment of the number of energy evaluations as a function of the number of rotatable bounds. In 24 h, on 8192 high-performance computing CPUs, the present MPI version would allow docking to a rigid protein of about 300K small flexible compounds or 11 million rigid compounds.

  13. Multiple node remote messaging

    Energy Technology Data Exchange (ETDEWEB)

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Steinmacher-Burow, Burkhard (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  14. High-pass filters and baseline correction in M/EEG analysis. Commentary on: "How inappropriate high-pass filters can produce artefacts and incorrect conclusions in ERP studies of language and cognition".

    Science.gov (United States)

    Maess, Burkhard; Schröger, Erich; Widmann, Andreas

    2016-06-15

    Tanner et al. (2015. Psychophysiology, 52(8), 1009. doi: 10.1111/psyp.12437) convincingly demonstrate how a late deflection like the N400 or the P600 is reflected into both earlier and later latencies by the application of high-pass filters with cutoff frequencies higher than 0.1Hz. It nicely underlines the importance of test-wise application of filters with different parameters to electrophysiological data to identify such unwanted filter effects. In general, we agree with their approach and conclusions, particularly with the notions that the application of a high-pass filter is reasonable if it improves the signal-to-noise ratio (SNR) of the signal of interest, and that low frequency signals may carry important information. However, we disagree in two aspects: First, the test data of Tanner et al. are not optimally suited to demonstrate the benefits of high-pass filtering as they are only minimally contaminated by low frequency noise, and second, the standard baseline correction for particular applications in M/EEG data analysis should be replaced with high-pass filtering-as recommended by Widmann et al. (2015. J Neurosci Methods, 250, 46. doi: 10.1016/j.jneumeth.2014.08.002). Copyright © 2015 Elsevier B.V. All rights reserved.

  15. Analysis and Design Optimization of Communication Process on Message-Passing-Based MPSoC%消息传递型MPSoC通信过程分析及其优化设计

    Institute of Scientific and Technical Information of China (English)

    付方发; 王进祥; 王良; 吴子旭; 喻明艳

    2011-01-01

    通过分析消息传递型MPSoC通信过程,总结出提高通信性能的有效途径——降低一对多消息发送延迟和提高多条消息并发接收效率.从减少数据拷贝延迟的角度提出了基于硬件抽象层广播优化策略,有效地降低了一对多消息发送延迟;针对并发接收瓶颈,充分考虑减少交互次数和提高长消息通信效率,提出一种基于查找表和DMA模式相结合的接收策略.实验结果表明,广播优化策略及接收策略均能明显提高性能;在64×64的矩阵乘法中,采用优化策略整体性能提高接近1.5倍.%By analyzing the message-passing communication process on MPSoC, efficient ways to enhance communication performance are concluded, which are reducing one-to-many message sending latency and improving efficiency of concurrently receiving multiple messages. A broadcast optimization strategy based on the hardware abstraction level to cut down the cost of data copy is proposed, which decreases one-to-many message sending latency efficiently. Fully taking into consideration reducing interaction times and improving the efficiency of long message communication when dealing with the bottleneck of concurrently receiving multiple messages, a novel network interface (NI) receiving strategy that combines a lookup table (LUT) mechanism and DMA mode is presented. Experimental results show that both broadcast optimization strategy and NI receiving strategy can achieve better performance. In a 64X64 matrix multiplication, the overall performance is increased approximately by 50%.

  16. 基于消息传递的并行计算环境:MPI与PVM的比较%TWO KINDS OF BASED MESSAGE-PASSING PARALLEL COMPUTING ENVIRONMENT: PVM AND MPI'S COMPARISON

    Institute of Scientific and Technical Information of China (English)

    邵子立; 宋杰

    2000-01-01

    本文对在分布式计算中广泛应用的二种并行计算环境MPI(Message Passing Interface)和PVM(Parallel Vir-tual Machine)进行了比较.从MPI和PVM的设计思想出发,在可移植性、任务控制和分配、资源管理、容错、安全通信的上下文和多线程、通信方式、名字服务和消息句柄八个方面分析了它们各自的功能特点.

  17. Coverage of breast cancer in the Australian print media--does advertising and editorial coverage reflect correct social marketing messages?

    Science.gov (United States)

    Jones, Sandra C

    2004-01-01

    Early detection of breast cancer by mammographic screening has the potential to dramatically reduce mortality rates, but many women do not comply with screening recommendations. The media are an important source of health information for many women--through both direct social marketing advertisements and indirect dissemination of information via editorial content. This study investigated the accuracy of breast cancer detection messages in the top-selling Australian women's magazines and three weekend newspapers in the six-month period from December 2000 to May 2001 that included any reference to breast cancer and found that current coverage of breast cancer in the Australian print media conveys messages that are unlikely to encourage appropriate screening.

  18. Launch Control System Message Reduction

    Science.gov (United States)

    Nguyen, Uyen

    2014-01-01

    System Monitoring and Control (SMC) message browsers receive many messages daily that operators do not need to see. My job is to reduce the number of messages so that warning and emergency messages can be seen easily and therefore, responded to promptly. There are two methods to reduce messages: duplicate and state-based message correlations. With duplicate message correlation, SMC display the message the first time it shows up. The next times it occurs, a duplicate number will count the number of times the message appears. State-based message correlation is a process in which more informative messages acknowledge less useful ones and send them to history. I also work on correcting the severity level and text formats of messages. I follow two SMC message filtering tenets as I'm working on this project. Firstly, before filtering an offending message, a non-conformance (NC) must be created in order to attempt fixing that message through hardware or software. Only after the NC assessment states that it cannot fix an offending message, it can be filtered by SMC. Secondly, per Launch Control System (LCS) Coding Standards, SMC does not send information messages to the active message browser unless it's a response to an operator action.

  19. Weak Mutation Testing and Its Transformation for Message Passing Parallel Programs%消息传递并行程序的弱变异测试及其转化∗

    Institute of Scientific and Technical Information of China (English)

    巩敦卫; 陈永伟; 田甜

    2016-01-01

    A parallel program can yield nondeterministic execution, which increases the complexity and the difficulty in program testing. The mutation testing of a message passing parallel program is investigated, and an approach to transforming the weak mutation testing for the program is presented in this study with the purpose of improving the efficiency of the mutation testing. First, the mutation condition statements are built based on the type of statements and the changes resulted from mutating these statements. Then, a new program is formed by inserting all these mutation condition statements into the original program. As a result, the problem of the weak mutation testing of the original program can be transformed into that of covering the branches of the new program, therefore providing advantages of solving the problem of mutation testing by using previous methods of branch coverage. The proposed approach is applied to test eight benchmark message passing parallel programs, and the empirical results demonstrate that this new approach is not only feasible but also necessary.%并行程序执行的不确定性,增加了测试的复杂性和难度。研究消息传递并行程序的变异测试,提出其弱变异测试转化方法,以提高该程序变异测试的效率。首先,根据消息传递并行程序包含语句的类型和语句变异之后导致的变化构建相应的变异条件语句;然后,将构建好的所有变异条件语句插入到原程序中,形成新的被测程序,从而将原程序的弱变异测试问题转化为新程序的分支覆盖问题。这样做的好处是,能够利用已有的分支覆盖方法解决变异测试问题。将该方法应用于8个典型的消息传递并行程序测试中,实验结果表明,该方法不但是可行的,也是必要的。

  20. Correction

    DEFF Research Database (Denmark)

    Pinkevych, Mykola; Cromer, Deborah; Tolstrup, Martin

    2016-01-01

    [This corrects the article DOI: 10.1371/journal.ppat.1005000.][This corrects the article DOI: 10.1371/journal.ppat.1005740.][This corrects the article DOI: 10.1371/journal.ppat.1005679.].......[This corrects the article DOI: 10.1371/journal.ppat.1005000.][This corrects the article DOI: 10.1371/journal.ppat.1005740.][This corrects the article DOI: 10.1371/journal.ppat.1005679.]....

  1. Message passing with relaxed moment matching

    OpenAIRE

    Qi, Yuan; Guo, Yandong

    2012-01-01

    Bayesian learning is often hampered by large computational expense. As a powerful generalization of popular belief propagation, expectation propagation (EP) efficiently approximates the exact Bayesian computation. Nevertheless, EP can be sensitive to outliers and suffer from divergence for difficult cases. To address this issue, we propose a new approximate inference approach, relaxed expectation propagation (REP). It relaxes the moment matching requirement of expectation propagation by addin...

  2. Thread-Oriented Message-Passing Interface

    Institute of Scientific and Technical Information of China (English)

    1998-01-01

    Thread┐OrientedMesage┐PasingInterfaceTongWeiqinZhouQinghuaGuZhikui(SchoolofComputerEngineringandScience)AbstractInthispaperth...

  3. When the expectations from a message will not be realized: Naïve theories can eliminate expectation-congruent judgments via correction.

    Science.gov (United States)

    Handley, Ian M; Albarracín, Dolores; Brown, Rick D; Li, Hong; Kumkale, Ece C; Kumkale, G Tarcan

    2009-07-01

    Research typically reveals that individuals like an object more when a persuasive message convinces them that this object is pleasant. In this paper, two experiments were conducted to understand the influence of such message-induced affective-expectations on judgments of experienced affect following direct encounter with an alcohol type of drink. As predicted, before trying the drink, recipients of the positive-expectation message had more positive expectations than recipients of the negative-expectation message. After drinking, participants judged the beverage to elicit affect congruent with message-induced expectations to the extent they did not endorse a naïve theory that their affective expectations congruently influence their experienced affect. In contrast, after drinking, the effect of the message disappeared when participants did endorse this naïve theory. Moderation of these effects, as well as theoretical and practical implications, are addressed.

  4. Correction

    CERN Multimedia

    2007-01-01

    From left to right: Luis, Carmen, Mario, Christian and José listening to speeches by theorists Alvaro De Rújula and Luis Alvarez-Gaumé (right) at their farewell gathering on 15 May.We unfortunately cut out a part of the "Word of thanks" from the team retiring from Restaurant No. 1. The complete message is published below: Dear friends, You are the true "nucleus" of CERN. Every member of this extraordinary human mosaic will always remain in our affections and in our thoughts. We have all been very touched by your spontaneous generosity. Arrivederci, Mario Au revoir,Christian Hasta Siempre Carmen, José and Luis PS: Lots of love to the theory team and to the hidden organisers. So long!

  5. Correction

    CERN Document Server

    2002-01-01

    Tile Calorimeter modules stored at CERN. The larger modules belong to the Barrel, whereas the smaller ones are for the two Extended Barrels. (The article was about the completion of the 64 modules for one of the latter.) The photo on the first page of the Bulletin n°26/2002, from 24 July 2002, illustrating the article «The ATLAS Tile Calorimeter gets into shape» was published with a wrong caption. We would like to apologise for this mistake and so publish it again with the correct caption.

  6. Correction

    CERN Multimedia

    2002-01-01

    The photo on the second page of the Bulletin n°48/2002, from 25 November 2002, illustrating the article «Spanish Visit to CERN» was published with a wrong caption. We would like to apologise for this mistake and so publish it again with the correct caption.   The Spanish delegation, accompanied by Spanish scientists at CERN, also visited the LHC superconducting magnet test hall (photo). From left to right: Felix Rodriguez Mateos of CERN LHC Division, Josep Piqué i Camps, Spanish Minister of Science and Technology, César Dopazo, Director-General of CIEMAT (Spanish Research Centre for Energy, Environment and Technology), Juan Antonio Rubio, ETT Division Leader at CERN, Manuel Aguilar-Benitez, Spanish Delegate to Council, Manuel Delfino, IT Division Leader at CERN, and Gonzalo León, Secretary-General of Scientific Policy to the Minister.

  7. Correction

    Directory of Open Access Journals (Sweden)

    2012-01-01

    Full Text Available Regarding Gorelik, G., & Shackelford, T.K. (2011. Human sexual conflict from molecules to culture. Evolutionary Psychology, 9, 564–587: The authors wish to correct an omission in citation to the existing literature. In the final paragraph on p. 570, we neglected to cite Burch and Gallup (2006 [Burch, R. L., & Gallup, G. G., Jr. (2006. The psychobiology of human semen. In S. M. Platek & T. K. Shackelford (Eds., Female infidelity and paternal uncertainty (pp. 141–172. New York: Cambridge University Press.]. Burch and Gallup (2006 reviewed the relevant literature on FSH and LH discussed in this paragraph, and should have been cited accordingly. In addition, Burch and Gallup (2006 should have been cited as the originators of the hypothesis regarding the role of FSH and LH in the semen of rapists. The authors apologize for this oversight.

  8. Correction

    Directory of Open Access Journals (Sweden)

    2014-01-01

    Full Text Available Regarding Tagler, M. J., and Jeffers, H. M. (2013. Sex differences in attitudes toward partner infidelity. Evolutionary Psychology, 11, 821–832: The authors wish to correct values in the originally published manuscript. Specifically, incorrect 95% confidence intervals around the Cohen's d values were reported on page 826 of the manuscript where we reported the within-sex simple effects for the significant Participant Sex × Infidelity Type interaction (first paragraph, and for attitudes toward partner infidelity (second paragraph. Corrected values are presented in bold below. The authors would like to thank Dr. Bernard Beins at Ithaca College for bringing these errors to our attention. Men rated sexual infidelity significantly more distressing (M = 4.69, SD = 0.74 than they rated emotional infidelity (M = 4.32, SD = 0.92, F(1, 322 = 23.96, p < .001, d = 0.44, 95% CI [0.23, 0.65], but there was little difference between women's ratings of sexual (M = 4.80, SD = 0.48 and emotional infidelity (M = 4.76, SD = 0.57, F(1, 322 = 0.48, p = .29, d = 0.08, 95% CI [−0.10, 0.26]. As expected, men rated sexual infidelity (M = 1.44, SD = 0.70 more negatively than they rated emotional infidelity (M = 2.66, SD = 1.37, F(1, 322 = 120.00, p < .001, d = 1.12, 95% CI [0.85, 1.39]. Although women also rated sexual infidelity (M = 1.40, SD = 0.62 more negatively than they rated emotional infidelity (M = 2.09, SD = 1.10, this difference was not as large and thus in the evolutionary theory supportive direction, F(1, 322 = 72.03, p < .001, d = 0.77, 95% CI [0.60, 0.94].

  9. Muley Pass

    OpenAIRE

    Conkey, Ross

    2013-01-01

    Muley Pass tells the story of a town that's not really a town. It was built as a live-on movie set for a western tv show fifty years ago. But, when the show left forty years ago, Slug McLeod didn't. As de facto caretaker, he has to find a way to save the town from imminent destruction in service to High Speed rail - including stepping out of the 1890s into modern day Hollywood.

  10. Correction.

    Science.gov (United States)

    2015-10-01

    In the article by Quintavalle et al (Quintavalle C, Anselmi CV, De Micco F, Roscigno G, Visconti G, Golia B, Focaccio A, Ricciardelli B, Perna E, Papa L, Donnarumma E, Condorelli G, Briguori C. Neutrophil gelatinase–associated lipocalin and contrast-induced acute kidney injury. Circ Cardiovasc Interv. 2015;8:e002673. DOI: 10.1161/CIRCINTERVENTIONS.115.002673.), which published online September 2, 2015, and appears in the September 2015 issue of the journal, a correction was needed. On page 1, the institutional affiliation for Elvira Donnarumma, PhD, “SDN Foundation,” has been changed to read, “IRCCS SDN, Naples, Italy.” The institutional affiliation for Laura Papa, PhD, “Institute for Endocrinology and Experimental Oncology, National Research Council, Naples, Italy,” has been changed to read, “Institute of Genetics and Biomedical Research, Milan Unit, Milan, Italy” and “Humanitas Research Hospital, Rozzano, Italy.” The authors regret this error.

  11. Subtle Messages.

    Science.gov (United States)

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  12. Subtle Messages.

    Science.gov (United States)

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  13. Advanced Messaging Concept Development Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  14. The Studying of Virtual Token Passing Approach in ControlNet

    Institute of Scientific and Technical Information of China (English)

    Sun Fanjin(孙凡金); Tong Weiming; Cheng Shukang

    2004-01-01

    MAC protocol of ControlNet uses Virtual Token Passing (VTP) to solve the medium access contention, to assure the deterministic and repeatability of message transmission. This paper presents the basic method that VTP uses to transmit real-time I/O message, explicit message and maintenance message in scheduled part, unscheduled part and guardband part respectively. On the basis of analyzing the factors of message transmission delay, the maximum message transmission delay in scheduled part is studied, and the result shows it can be determined, so the deterministic and repeatability of message transmission in ControlNet is validated.

  15. Increasing fault resiliency in a message-passing environment.

    Energy Technology Data Exchange (ETDEWEB)

    Stearley, Jon R.; Riesen, Rolf E.; Laros, James H., III; Ferreira, Kurt Brian; Pedretti, Kevin Thomas Tauke; Oldfield, Ron A.; Kordenbrock, Todd (Hewlett-Packard Company); Brightwell, Ronald Brian

    2009-10-01

    Petaflops systems will have tens to hundreds of thousands of compute nodes which increases the likelihood of faults. Applications use checkpoint/restart to recover from these faults, but even under ideal conditions, applications running on more than 30,000 nodes will likely spend more than half of their total run time saving checkpoints, restarting, and redoing work that was lost. We created a library that performs redundant computations on additional nodes allocated to the application. An active node and its redundant partner form a node bundle which will only fail, and cause an application restart, when both nodes in the bundle fail. The goal of this library is to learn whether this can be done entirely at the user level, what requirements this library places on a Reliability, Availability, and Serviceability (RAS) system, and what its impact on performance and run time is. We find that our redundant MPI layer library imposes a relatively modest performance penalty for applications, but that it greatly reduces the number of applications interrupts. This reduction in interrupts leads to huge savings in restart and rework time. For large-scale applications the savings compensate for the performance loss and the additional nodes required for redundant computations.

  16. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    translated into a representation read by VCC, a software verifier for C. We successfully verified several MPI programs in a running time that is independent of the number of processes or other input parameters. This contrasts with alternative techniques, notably model checking and runtime verification...

  17. Optimizing spread dynamics on graphs by message passing

    Science.gov (United States)

    Altarelli, F.; Braunstein, A.; Dall'Asta, L.; Zecchina, R.

    2013-09-01

    Cascade processes are responsible for many important phenomena in natural and social sciences. Simple models of irreversible dynamics on graphs, in which nodes activate depending on the state of their neighbors, have been successfully applied to describe cascades in a large variety of contexts. Over the past decades, much effort has been devoted to understanding the typical behavior of the cascades arising from initial conditions extracted at random from some given ensemble. However, the problem of optimizing the trajectory of the system, i.e. of identifying appropriate initial conditions to maximize (or minimize) the final number of active nodes, is still considered to be practically intractable, with the only exception being models that satisfy a sort of diminishing returns property called submodularity. Submodular models can be approximately solved by means of greedy strategies, but by definition they lack cooperative characteristics which are fundamental in many real systems. Here we introduce an efficient algorithm based on statistical physics for the optimization of trajectories in cascade processes on graphs. We show that for a wide class of irreversible dynamics, even in the absence of submodularity, the spread optimization problem can be solved efficiently on large networks. Analytic and algorithmic results on random graphs are complemented by the solution of the spread maximization problem on a real-world network (the Epinions consumer reviews network).

  18. An Adaptive Message Passing MPSoC Framework

    Directory of Open Access Journals (Sweden)

    Gabriel Marchesan Almeida

    2009-01-01

    Full Text Available Multiprocessor Systems-on-Chips (MPSoCs offer superior performance while maintaining flexibility and reusability thanks to software oriented personalization. While most MPSoCs are today heterogeneous for better meeting the targeted application requirements, homogeneous MPSoCs may become in a near future a viable alternative bringing other benefits such as run-time load balancing and task migration. The work presented in this paper relies on a homogeneous NoC-based MPSoC framework we developed for exploring scalable and adaptive on-line continuous mapping techniques. Each processor of this system is compact and runs a tiny preemptive operating system that monitors various metrics and is entitled to take remapping decisions through code migration techniques. This approach that endows the architecture with decisional capabilities permits refining application implementation at run-time according to various criteria. Experiments based on simple policies are presented on various applications that demonstrate the benefits of such an approach.

  19. Characterizing Computation-Communication Overlap in Message-Passing Systems

    Energy Technology Data Exchange (ETDEWEB)

    David E. Bernholdt; Jarek Nieplocha; P. Sadayappan; Aniruddha G. Shet; Vinod Tipparaju

    2008-01-31

    Effective overlap of computation and communication is a well understood technique for latency hiding and can yield significant performance gains for applications on high-end computers. In this report, we describe an instrumentation framework developed for messagepassing systems to characterize the degree of overlap of communication with computation in the execution of parallel applications. The inability to obtain precise time-stamps for pertinent communication events is a significant problem, and is addressed by generation of minimum and maximum bounds on achieved overlap. The overlap measures can aid application developers and system designers in investigating scalability issues. The approach has been used to instrument two MPI implementations as well as the ARMCI system. The implementation resides entirely within the communication library and thus integrates well with existing approaches that operate outside the library. The utility of the framework is demonstrated by analyzing communication-computation overlap for micro-benchmarks and the NAS benchmarks, and the insights obtained are used to modify the NAS SP benchmark, resulting in improved overlap.

  20. Parallel Ray Tracing Using the Message Passing Interface

    Science.gov (United States)

    2007-09-01

    efficiency of 97.9% and a normalized ray-tracing rate of 6.95 ?106 rays ? surfaces/(s ? processor) in a system with 22 planar surfaces, two paraboloid ...with 22 planar surfaces, two paraboloid reflectors, and one hyperboloid refractor. The need for a load-balancing software was obviated by the use of a...specified for each type of optical surface—planar, spherical, paraboloid , hyperboloid, aspheric—and whether it applies for reflection or refraction. The

  1. Sharing Memory Robustly in Message-Passing Systems

    Science.gov (United States)

    1990-02-16

    ust: a very restricted form of communication. Chor and Moscovici ([20]) present a hierarchy of resiliency for problems in shared-memory systems and...1985. [20] B. Chor, and L. Moscovici , Solvability in Asynchronous Environments, Proc. 30th Syrup. on Foun- * dations of Comp. Sc~en ce, pp. 422-427, 1989

  2. S-AMP: Approximate Message Passing for General Matrix Ensembles

    DEFF Research Database (Denmark)

    Cakmak, Burak; Winther, Ole; Fleury, Bernard H.

    2014-01-01

    We propose a novel iterative estimation algorithm for linear observation models called S-AMP. The fixed points of S-AMP are the stationary points of the exact Gibbs free energy under a set of (first- and second-) moment consistency constraints in the large system limit. S-AMP extends...

  3. Track-stitching using graphical models and message passing

    CSIR Research Space (South Africa)

    Van der Merwe, LJ

    2013-07-01

    Full Text Available . Multiple crossing targets, with fragmented tracks, are simulated. It is then shown, that the algorithm successfully stitches track fragments together, even in the presence of false tracks, caused by noisy observations....

  4. EMI Messaging Guidelines

    CERN Document Server

    Cons, L.

    2011-01-01

    Guidelines for potential users of messaging within EMI. The goal is to provide enough practical information so that EMI product teams can start investigating whether using messaging in their products can be beneficial or not.

  5. Information Management and Learning in Computer Conferences: Coping with Irrelevant and Unconnected Messages.

    Science.gov (United States)

    Schwan, Stephan; Straub, Daniela; Hesse, Friedrich W.

    2002-01-01

    Describes a study of computer conferencing where learners interacted over the course of four log-in sessions to acquire the knowledge sufficient to pass a learning test. Studied the number of messages irrelevant to the topic, explicit threading of messages, reading times of relevant messages, and learning outcomes. (LRW)

  6. Passing crisis and emergency risk communications: the effects of communication channel, information type, and repetition.

    Science.gov (United States)

    Edworthy, Judy; Hellier, Elizabeth; Newbold, Lex; Titchener, Kirsteen

    2015-05-01

    Three experiments explore several factors which influence information transmission when warning messages are passed from person to person. In Experiment 1, messages were passed down chains of participants using five different modes of communication. Written communication channels resulted in more accurate message transmission than verbal. In addition, some elements of the message endured further down the chain than others. Experiment 2 largely replicated these effects and also demonstrated that simple repetition of a message eliminated differences between written and spoken communication. In a final field experiment, chains of participants passed information however they wanted to, with the proviso that half of the chains could not use telephones. Here, the lack of ability to use a telephone did not affect accuracy, but did slow down the speed of transmission from the recipient of the message to the last person in the chain. Implications of the findings for crisis and emergency risk communication are discussed.

  7. Mobile Agents - Smart Messages

    OpenAIRE

    Hurst, Leon; Cunningham, Padraig

    1997-01-01

    Wireless communication with Mobile Computing devices is known to be problematic. It is very different in character from conventional communication over wired networks. Since many distributed applications make assumptions about network characteristics, they may not be used in a hostile mobile environment. We are proposing a new kind of messaging system which incorporates adaptive behaviour into the messages themselves. We call these `Smart Messages?, and implement them using ...

  8. Auctioning Bulk Mobile Messages

    NARCIS (Netherlands)

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  9. Effective Compiler Error Message Enhancement for Novice Programming Students

    Science.gov (United States)

    Becker, Brett A.; Glanville, Graham; Iwashima, Ricardo; McDonnell, Claire; Goslin, Kyle; Mooney, Catherine

    2016-01-01

    Programming is an essential skill that many computing students are expected to master. However, programming can be difficult to learn. Successfully interpreting compiler error messages (CEMs) is crucial for correcting errors and progressing toward success in programming. Yet these messages are often difficult to understand and pose a barrier to…

  10. Message in a molecule.

    Science.gov (United States)

    Sarkar, Tanmay; Selvakumar, Karuthapandi; Motiei, Leila; Margulies, David

    2016-05-03

    Since ancient times, steganography, the art of concealing information, has largely relied on secret inks as a tool for hiding messages. However, as the methods for detecting these inks improved, the use of simple and accessible chemicals as a means to secure communication was practically abolished. Here, we describe a method that enables one to conceal multiple different messages within the emission spectra of a unimolecular fluorescent sensor. Similar to secret inks, this molecular-scale messaging sensor (m-SMS) can be hidden on regular paper and the messages can be encoded or decoded within seconds using common chemicals, including commercial ingredients that can be obtained in grocery stores or pharmacies. Unlike with invisible inks, however, uncovering these messages by an unauthorized user is almost impossible because they are protected by three different defence mechanisms: steganography, cryptography and by entering a password, which are used to hide, encrypt or prevent access to the information, respectively.

  11. Message in a molecule

    Science.gov (United States)

    Sarkar, Tanmay; Selvakumar, Karuthapandi; Motiei, Leila; Margulies, David

    2016-01-01

    Since ancient times, steganography, the art of concealing information, has largely relied on secret inks as a tool for hiding messages. However, as the methods for detecting these inks improved, the use of simple and accessible chemicals as a means to secure communication was practically abolished. Here, we describe a method that enables one to conceal multiple different messages within the emission spectra of a unimolecular fluorescent sensor. Similar to secret inks, this molecular-scale messaging sensor (m-SMS) can be hidden on regular paper and the messages can be encoded or decoded within seconds using common chemicals, including commercial ingredients that can be obtained in grocery stores or pharmacies. Unlike with invisible inks, however, uncovering these messages by an unauthorized user is almost impossible because they are protected by three different defence mechanisms: steganography, cryptography and by entering a password, which are used to hide, encrypt or prevent access to the information, respectively. PMID:27138465

  12. TPG bus passes

    CERN Multimedia

    Staff Association

    2013-01-01

    The CERN Staff Association will stop selling TPG bus passes. All active and retired members of the CERN personnel will be able to purchase Unireso bus passes from the CERN Hostel - Building 39 (Meyrin site) from 1st February 2013. For more information: https://cds.cern.ch/journal/CERNBulletin/2013/04/Announcements/1505279?ln=en

  13. Passing and Catching in Rugby.

    Science.gov (United States)

    Namudu, Mike M.

    This booklet contains the fundamentals for rugby at the primary school level. It deals primarily with passing and catching the ball. It contains instructions on (1) holding the ball for passing, (2) passing the ball to the left--standing, (3) passing the ball to the left--running, (4) making a switch pass, (5) the scrum half's normal pass, (6) the…

  14. Passing and Catching in Rugby.

    Science.gov (United States)

    Namudu, Mike M.

    This booklet contains the fundamentals for rugby at the primary school level. It deals primarily with passing and catching the ball. It contains instructions on (1) holding the ball for passing, (2) passing the ball to the left--standing, (3) passing the ball to the left--running, (4) making a switch pass, (5) the scrum half's normal pass, (6) the…

  15. Pass 390 dollari eest

    Index Scriptorium Estoniae

    2003-01-01

    Venekeelne internetilehekülg müüb võltsitud Eesti Vabariigi passe. Kodakondsus- ja migratsiooniameti pressiesindaja Heikki Kirotari ja Piirivalveameti reisidokumentide keskuse ülema kapten Veiko Kulla hinnangud

  16. School Health Message

    Science.gov (United States)

    Califano, Joseph A., Jr.

    1977-01-01

    This article presents the message delivered to the National School Health Association Conference by the Secretary of the Department of Health, Education, and Welfare in May 1977 and the response of the participants in the conference. (JD)

  17. Making your message competitive

    Energy Technology Data Exchange (ETDEWEB)

    Burns, D.B.; Ulick, B.D.; Bradford, D.M. [SAIC, Las Vegas, NV (United States)

    1994-12-31

    Even in the best of situations, effective communication can be difficult to achieve. For those working in fields that are highly controversial and technical, where an ability to communicate effectively with the general public is fundamental to the success of a project or program, this task can be particularly onerous. This is especially true for communicators working in the nuclear arena, such as the US Department of Energy`s Yucca Mountain Site Characterization Project (YMP). Although these difficulties exist as a part of daily communications, numerous lessons have been learned that may be applicable for others in the field. A variety of factors can influence the effectiveness of communications. These include a message`s relative complexity, its salience, competing messages, verbal and nonverbal cues, and, perhaps most importantly, the role played by the news media. To communicate effectively with one`s audience, it is essential that each of these factors be considered and used to advantage.

  18. SMS Messaging Applications

    CERN Document Server

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  19. Couriers in the Inca Empire: Getting Your Message Across. [Lesson Plan].

    Science.gov (United States)

    2002

    This lesson shows how the Inca communicated across the vast stretches of their mountain realm, the largest empire of the pre-industrial world. The lesson explains how couriers carried messages along mountain-ridge roads, up and down stone steps, and over chasm-spanning footbridges. It states that couriers could pass a message from Quito (Ecuador)…

  20. Character images uneven illumination correction method based on Gaussian frequency low pass filtering and image difference%基于高斯频域低通滤波和图像差分的字符图像光照不均校正法

    Institute of Scientific and Technical Information of China (English)

    杨颖; 戴彬

    2013-01-01

    光照不匀会对字符图像检测带来极大的负面影响.基于高斯频域低通滤波和图像差分提出一个新的字符图像光照不均校正法,该方法首先根据照明光场和图像细节分别对应低频分量和高频分量的特点,设计高斯低通滤波器去除光照背景以获取照明光场,然后再以此为根据对字符图像进行校正.同时,针对高斯低通滤波器参数选择上的难点,提出了实验法确定参数σ加逐次滤波对照明光场进行逼近的方法,以确保最终校正结果的准确.实验结果表明该方法校正效果较好.%Uneven illumination can result in serious negative impact on character image detection, Based on Gaussian frequency low pass filtering and image difference, a new character image uneven illumination correction method was proposed. According to the characteristics which Lighting light field and image detail respectively corresponding to low-frequency components and high-frequency components, gaussian frequency low pass filtering was firstly designed to remove light background which aims to get lighting light field. And then, character image was corrected based on the designed gaussian frequency low pass filtering. Meanwhile, for the difficulty on choice of gaussian low-pass filter parameter, a method which obtains parameter σ based on experimentation and successive filtering on lighting light field was presented to ensure the end correction results. The experimental results show that the correction effect of the proposed method is better.

  1. Concurrent Smalltalk on the Message-Driven Processor

    Science.gov (United States)

    1991-09-01

    NDPSim -x 2 -y 2 - maize Ox1O00 ::Coamoa:Coamoa.m NewFact.mdp Message-Driven Processor Simulator Version 7.0 Rev B Accompanies MDP Architecture Document...it could peel invocations of recursive functions forever. However, the sin- gle pass of inlining does not mean that functions are only inlined one

  2. Medium is the message

    NARCIS (Netherlands)

    Kuipers, G.; Ritzer, G.

    2012-01-01

    "The medium is the message" is a phrase coined by Canadian media theorist Marshall McLuhan (1911-1980), in his book Understanding Media: The Extensions of Man (1964). In this book, McLuhan examines the impact of media on societies and human relations, arguing for the primacy of the medium -

  3. Understanding Telex Messages.

    Science.gov (United States)

    Kitto, Michael

    1984-01-01

    Examines the problems of writing grammatical rules for the writing of telexes and makes some suggestions as to how to teach comprehension of telex messages. Emphasizes the inconsistency in style, length, and form of telexes, and the impact this has had on international correspondence, which involves many nonnative speakers of English. (SL)

  4. Grounding in Instant Messaging

    Science.gov (United States)

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  5. Medium is the message

    NARCIS (Netherlands)

    Kuipers, G.; Ritzer, G.

    2012-01-01

    "The medium is the message" is a phrase coined by Canadian media theorist Marshall McLuhan (1911-1980), in his book Understanding Media: The Extensions of Man (1964). In this book, McLuhan examines the impact of media on societies and human relations, arguing for the primacy of the medium - understo

  6. The Message from Boston

    Institute of Scientific and Technical Information of China (English)

    Wang Wenfeng

    2004-01-01

    @@ The election program entitled "A Strong Nation Respected in the World " came out in Boston at the July 26-29 Democratic National Convention along with the nomination of John Kerry and John Edwards as the presidential and vice presidential candidates of the party. What message do the Democrats want to convey from Boston?

  7. The Prodiguer Messaging Platform

    Science.gov (United States)

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  8. Multi-pass microscopy

    Science.gov (United States)

    Juffmann, Thomas; Klopfer, Brannon B.; Frankort, Timmo L. I.; Haslinger, Philipp; Kasevich, Mark A.

    2016-09-01

    Microscopy of biological specimens often requires low light levels to avoid damage. This yields images impaired by shot noise. An improved measurement accuracy at the Heisenberg limit can be achieved exploiting quantum correlations. If sample damage is the limiting resource, an equivalent limit can be reached by passing photons through a specimen multiple times sequentially. Here we use self-imaging cavities and employ a temporal post-selection scheme to present full-field multi-pass polarization and transmission micrographs with variance reductions of 4.4+/-0.8 dB (11.6+/-0.8 dB in a lossless setup) and 4.8+/-0.8 dB, respectively, compared with the single-pass shot-noise limit. If the accuracy is limited by the number of detected probe particles, our measurements show a variance reduction of 25.9+/-0.9 dB. The contrast enhancement capabilities in imaging and in diffraction studies are demonstrated with nanostructured samples and with embryonic kidney 293T cells. This approach to Heisenberg-limited microscopy does not rely on quantum state engineering.

  9. Correcting sequencing errors in DNA coding regions using a dynamic programming approach.

    Science.gov (United States)

    Xu, Y; Mural, R J; Uberbacher, E C

    1995-04-01

    This paper presents an algorithm for detecting and 'correcting' sequencing errors that occur in DNA coding regions. The types of sequencing errors addressed are insertions and deletions (indels) of DNA bases. The goal is to provide a capability which makes single-pass or low-redundancy sequence data more informative, reducing the need for high-redundancy sequencing for gene identification and characterization purposes. This would permit improved sequencing efficiency and reduce genome sequencing costs. The algorithm detects sequencing errors by discovering changes in the statistically preferred reading frame within a putative coding region and then inserts a number of 'neutral' bases at a perceived reading frame transition point to make the putative exon candidate frame consistent. We have implemented the algorithm as a front-end subsystem of the GRAIL DNA sequence analysis system to construct a version which is very error tolerant and also intend to use this as a testbed for further development of sequencing error-correction technology. Preliminary test results have shown the usefulness of this algorithm and also exhibited some of its weakness, providing possible directions for further improvement. On a test set consisting of 68 human DNA sequences with 1% randomly generated indels in coding regions, the algorithm detected and corrected 76% of the indels. The average distance between the position of an indel and the predicted one was 9.4 bases. With this subsystem in place, GRAIL correctly predicted 89% of the coding messages with 10% false message on the 'corrected' sequences, compared to 69% correctly predicted coding messages and 11% falsely predicted messages on the 'corrupted' sequences using standard GRAIL II method (version 1.2).(ABSTRACT TRUNCATED AT 250 WORDS)

  10. Message from Fermilab Director

    CERN Multimedia

    2009-01-01

    With this issue’s message, Fermilab Director Pier Oddone opens a new series of occasional exchanges between CERN and other laboratories world-wide. As part of this exchange, CERN Director-General Rolf Heuer, wrote a message in Tuesday’s edition of Fermilab TodayPerspectivesNothing is more important for our worldwide particle physics community than successfully turning on the LHC later this year. The promise for great discoveries is huge, and many of the plans for our future depend on LHC results. Those of us planning national programmes in anticipation of data from the LHC face formidable challenges to develop future facilities that are complementary to the LHC, whatever the physics discoveries may be. At Fermilab, this has led us to move forcefully with a programme at the intensity frontier, where experiments with neutrinos and rare decays open a complementary window into nature. Our ultimate goal for a unified picture of nat...

  11. 47 CFR 11.44 - EAS message priorities.

    Science.gov (United States)

    2010-10-01

    ... Messages; second, State Messages; and third, National Information Center (NIC) Messages. (c) Key EAS... distribution of Presidential Messages. NIC messages received from national networks which are not broadcast...

  12. Navigation message designing with high accuracy for NAV

    Institute of Scientific and Technical Information of China (English)

    Wang Luxiao; Huang Zhigang; Zhao Yun

    2014-01-01

    Navigation message designing with high accuracy guarantee is the key to efficient navi-gation message distribution in the global navigation satellite system (GNSS). Developing high accu-racy-aware navigation message designing algorithms is an important topic. This paper investigates the high-accuracy navigation message designing problem with the message structure unchanged. The contributions made in this paper include a heuristic that employs the concept of the estimated range deviation (ERD) to improve the existing well-known navigation message on L1 frequency (NAV) of global positioning system (GPS) for good accuracy service; a numerical analysis approximation method (NAAM) to evaluate the range error due to truncation (RET) of different navigation messages; and a basic positioning parameters designing algorithm in the limited space allocation. Based on the predicted ultra-rapid data from the ultra-rapid data from the international GPS service for geodynamic (IGU), ERDs are generated in real time for error correction. Simulations show that the algorithms developed in this paper are general and flexible, and thus are applicable to NAV improvement and other navigation message designs.

  13. Quantum Message Distribution

    Institute of Scientific and Technical Information of China (English)

    LUO Ming-Xing; CHEN Xiu-Bo; DENG Yun; Yang Yi-Xian

    2013-01-01

    The semiquantum techniques have been explored recently to bridge the classical communications and the quantum communications.In this paper,we present one scheme to distribute the messages from one quantum participate to one weak quantum participate who can only measure the quantum states.It is proved to be robust by combining the classical coding encryption,quantum coding and other quantum techniques.

  14. Passing the baton

    CERN Multimedia

    2011-01-01

    It was not only in South Korea that batons were being passed last week. While the cream of the world’s athletes were competing in the World Athletics Championships, the cream of the world’s accelerator scientists were on their way to San Sebastian in Spain for the International Particle Accelerator Conference.  One of them was carrying a rather special baton for a handover of a different kind.   When Fermilab’s Vladimir Shiltsev handed the high-energy frontier baton to CERN’s Mike Lamont on Tuesday, it marked the end of an era: a time to look back on the phenomenal contribution the Tevatron has made to particle physics over its 25-year operational lifetime, and the great contribution Fermilab has made over that period to global collaboration in particle physics. There’s always a lot of emotion involved in passing the baton. In athletics, it’s the triumph of wining or the heartbreak of losing. But for this special baton, the...

  15. TRT Barrel milestones passed

    CERN Multimedia

    Ogren, H

    2004-01-01

    The barrel TRT detector passed three significant milestones this spring. The Barrel Support Structure (BSS) was completed and moved to the SR-1 building on February 24th. On March 12th the first module passed the quality assurance testing in Building 154 and was transported to the assembly site in the SR-1 building for barrel assembly. Then on April 21st the final production module that had been scanned at Hampton University was shipped to CERN. TRT Barrel Module Production The production of the full complement of barrel modules (96 plus 9 total spares) is now complete. This has been a five-year effort by Duke University, Hampton University, and Indiana University. Actual construction of the modules in the United States was completed in the first part of 2004. The production crews at each of the sites in the United States have now completed their missions. They are shown in the following pictures. Duke University: Production crew with the final completed module. Indiana University: Module producti...

  16. Geocoding location expressions in Twitter messages: A preference learning method

    Directory of Open Access Journals (Sweden)

    Wei Zhang

    2014-12-01

    Full Text Available Resolving location expressions in text to the correct physical location, also known as geocoding or grounding, is complicated by the fact that so many places around the world share the same name. Correct resolution is made even more difficult when there is little context to determine which place is intended, as in a 140-character Twitter message, or when location cues from different sources conflict, as may be the case among different metadata fields of a Twitter message. We used supervised machine learning to weigh the different fields of the Twitter message and the features of a world gazetteer to create a model that will prefer the correct gazetteer candidate to resolve the extracted expression. We evaluated our model using the F1 measure and compared it to similar algorithms. Our method achieved results higher than state-of-the-art competitors.

  17. The mushroom message.

    Science.gov (United States)

    Zimmerman, M

    1992-04-28

    A basic law of ecology is that living things are tightly dependent on one another, often in ways that are not easy to imagine. Who, for example, would have predicted that when the last dodo was killed in 1675, that death would lead to the slow extermination of the tambalocoque tree, whose fruits germinate only after passing through the dodo's digestive system? Now no natural strands of tambalocoque younger than 300 years can be found. Or who would have predicted that clear-cutting tropical rainforests would so significantly alter local weather patterns that the tropical rainforest biome itself and its vast diversity of life might not survive? Such interactions are worth noting because of the possible ramifications of a phenomenon that ecologists have just begun to document. Mushrooms worldwide appear to be in a catastrophic state of decline. Throughout Europe, in countries with terrains as diverse as Holland, Germany, Austria, Czechoslovakia, Poland and England, wild mushrooms are becoming increasingly difficult to find. Those fungi that are found are significantly smaller than those found years ago. Preliminary data suggest that the same troubling situation is occurring throughout North American as well. The decline has been so precipitous that biologists have begun to refer to it as a mass extinction. The 2 obvious explanations for the demise of the mushrooms--habitat destruction and overpicking of edible types by an ever growing human population--have been ruled out. Sophisticated sampling schemes designed by ecologists control for the fact that there is less land available for wild mushrooms; they have been declining at a rate that far exceeds the rate at which land is being developed. The fact that the decline has affected both edible and inedible mushrooms equally indicates that humans hunting for tasty treats are not the main cause of the problem. The loss of wild mushrooms worldwide might not seem like that big a deal, but the consequences may well be grave

  18. Passing on power & voice

    DEFF Research Database (Denmark)

    Noer, Vibeke Røn; Nielsen, Cathrine Sand

    2014-01-01

    . The education lasts for 3,5 years and the landmark of the educational model is the continuously shifts between teaching in classroom and teaching in clinical practice. Clinical teaching takes place at approved clinical placement institutions in hospitals and in the social and health care services outside...... intention of gaining knowledge about other possible ways to perform the education. The class, named the E-class, followed what in the field was named ‘an experimental educational model based on experienced-based learning’ (Nielsen et al. 2011). The experiential educational model is argued as an experiment.......aspx Higher degree of student involvement in planning as well as teaching was in the field presented as a part of ‘the overall educational approach’. In the course ‘Acute, Critical Nursing & Terminal, Palliative Care’ this was transferred into an innovative pedagogy with intend to pass on power and voice...

  19. Education Bill passes

    Science.gov (United States)

    Richman, Barbara T.

    On March 2 the U.S. House of Representatives passed a bill authorizing $425 million for science and mathematics education in fiscal 1984; the authorization is $350 million more than President Ronald Reagan requested in his budget proposal (Eos, February 15, 1983, p. 65).H.R. 1310 allocates $295 million to the Department of Education not only to improve precollege instruction in science and math, but to beef up foreign language training to aid in improving international communication among scientists. The bill also allots $130 million to the National Science Foundation for a variety of programs, the lion's share of which aims to upgrade research equipment at colleges and universities. It is hoped that industry will match the $100 million targeted for this program.

  20. What's in a Message?

    CERN Document Server

    Afantenos, Stergos D

    2009-01-01

    In this paper we present the first step in a larger series of experiments for the induction of predicate/argument structures. The structures that we are inducing are very similar to the conceptual structures that are used in Frame Semantics (such as FrameNet). Those structures are called messages and they were previously used in the context of a multi-document summarization system of evolving events. The series of experiments that we are proposing are essentially composed from two stages. In the first stage we are trying to extract a representative vocabulary of words. This vocabulary is later used in the second stage, during which we apply to it various clustering approaches in order to identify the clusters of predicates and arguments--or frames and semantic roles, to use the jargon of Frame Semantics. This paper presents in detail and evaluates the first stage.

  1. Breaking the Barrier: Effectively Communicating Nutrition and Health Messages.

    Science.gov (United States)

    Bouchoux, Ann

    1994-01-01

    Health professionals can work to correct common misconceptions through nutrition and fitness education and sharing information and resources to provide consistent public messages. The article discusses the impact of the media, food labels, and the Fuel for Fitness program, encouraging teamwork to ensure proper communication of diet and exercise…

  2. Multiple pass laser amplifier system

    Science.gov (United States)

    Brueckner, Keith A.; Jorna, Siebe; Moncur, N. Kent

    1977-01-01

    A laser amplification method for increasing the energy extraction efficiency from laser amplifiers while reducing the energy flux that passes through a flux limited system which includes apparatus for decomposing a linearly polarized light beam into multiple components, passing the components through an amplifier in delayed time sequence and recombining the amplified components into an in phase linearly polarized beam.

  3. Constructing parallel long-message signcryption scheme from trapdoor permutation

    Institute of Scientific and Technical Information of China (English)

    HU ZhenYu; LIN DongDai; WU WenLing; FENG DengGuo

    2007-01-01

    A highly practical parallel signcryption scheme named PLSC from trapdoor permutations (TDPs for short) was built to perform long messages directly. The new scheme follows the idea "scramble all, and encrypt small", using some scrambling operation on message m along with the user's identities, and then passing, in parallel, small parts of the scrambling result through corresponding TDPs. This design enables the scheme to flexibly perform long messages of arbitrary length while avoid repeatedly invoking TDP operations such as the CBC mode, or verbosely black-box composing symmetric encryption and signcryption, resulting in noticeable practical savings in both message bandwidth and efficiency. Concretely, the signcryption scheme requires exactly one computation of the "receiver's TDP" (for "encryption") and one inverse computation of the "sender's TDP" (for "authentication"), which is of great practical significance in directly performing long messages, since the major bottleneck for many public encryption schemes is the excessive computational overhead of performing TDP operations. Cutting out the verbosely repeated padding, the newly proposed scheme is more efficient than a black-box hybrid scheme. Most importantly, the proposed scheme has been proven to be tightly semantically secure under adaptive chosen ciphertext attacks (IND-CCA2) and to provide integrity of ciphertext (INT-CTXT) as well as non-repudiation in the random oracle model. All of these security guarantees are provided in the full multi-user, insider-security setting. Moreover, though the scheme is designed to perform long messages, it may also be appropriate for settings where it is impractical to perform large block of messages (i.e. extremely low memory environments such as smart cards).

  4. Anonymous Broadcast Messages

    Directory of Open Access Journals (Sweden)

    Dragan Lazic

    2013-01-01

    Full Text Available The Dining Cryptographer network (or DC-net is a privacy preserving communication protocol devised by David Chaum for anonymous message publication. A very attractive feature of DC-nets is the strength of its security, which is inherent in the protocol and is not dependent on other schemes, like encryption. Unfortunately the DC-net protocol has a level of complexity that causes it to suffer from exceptional communication overhead and implementation difficulty that precludes its use in many real-world use-cases. We have designed and created a DC-net implementation that uses a pure client-server model, which successfully avoids much of the complexity inherent in the DC-net protocol. We describe the theory of DC-nets and our pure client-server implementation, as well as the compromises that were made to reduce the protocol’s level of complexity. Discussion centers around the details of our implementation of DC-net.

  5. A Novel Single Pass Authenticated Encryption Stream Cipher for Software Defined Radios

    DEFF Research Database (Denmark)

    Khajuria, Samant

    2012-01-01

    high throughput and low overhead for SDRs. The thesis is divided into two research topics. One topic is the design of a 1-pass authenticated encryption scheme that can accomplish both message secrecy and authenticity in a single cryptographic primitive. The other topic is the implementation...... and achieves throughput in the range of 0.8 Gbps which can be suitably used for SDR applications. Comparing with traditional two pass approaches, the presented design demonstrates high throughput and small area to performance ratio....

  6. WebPASS PP (HR Personnel Management)

    Data.gov (United States)

    US Agency for International Development — WebPass Explorer (WebPASS Framework): USAID is partnering with DoS in the implementation of their WebPass Post Personnel (PS) Module. WebPassPS does not replace...

  7. WebPASS Explorer (HR Personnel Management)

    Data.gov (United States)

    US Agency for International Development — WebPass Explorer (WebPASS Framework): USAID is partnering with DoS in the implementation of their WebPass Post Personnel (PS) Module. WebPassPS does not replace...

  8. A Hoare-Like Logic of Asserted Single-Pass Instruction Sequences

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2016-01-01

    We present a formal system for proving the partial correctness of a single-pass instruction sequence as considered in program algebra by decomposition into proofs of the partial correctness of segments of the single-pass instruction sequence concerned. The system is similar to Hoare logics, but

  9. Multi-pass spectroscopic ellipsometry

    Energy Technology Data Exchange (ETDEWEB)

    Stehle, Jean-Louis [Sopralab, 7 rue du Moulin des Bruyeres, 92400 Courbevoie (France); Samartzis, Peter C., E-mail: sama@iesl.forth.gr [Institute of Electronic Structure and Laser, Foundation of Research and Technology-Hellas, Vassilika Vouton 71110, Heraklion Crete (Greece); Stamataki, Katerina [Institute of Electronic Structure and Laser, Foundation of Research and Technology-Hellas, Vassilika Vouton 71110, Heraklion Crete (Greece); Department of Chemistry, University of Crete, Voutes, 71003, Heraklion (Greece); Piel, Jean-Philippe [Sopralab, 7 rue du Moulin des Bruyeres, 92400 Courbevoie (France); Katsoprinakis, George E.; Papadakis, Vassilis [Institute of Electronic Structure and Laser, Foundation of Research and Technology-Hellas, Vassilika Vouton 71110, Heraklion Crete (Greece); Schimowski, Xavier [Sopralab, 7 rue du Moulin des Bruyeres, 92400 Courbevoie (France); Rakitzis, T. Peter [Institute of Electronic Structure and Laser, Foundation of Research and Technology-Hellas, Vassilika Vouton 71110, Heraklion Crete (Greece); Department of Physics, University of Crete, Voutes, 71003, Heraklion (Greece); Loppinet, Benoit [Institute of Electronic Structure and Laser, Foundation of Research and Technology-Hellas, Vassilika Vouton 71110, Heraklion Crete (Greece)

    2014-03-31

    Spectroscopic ellipsometry is an established technique, particularly useful for thickness measurements of thin films. It measures polarization rotation after a single reflection of a beam of light on the measured substrate at a given incidence angle. In this paper, we report the development of multi-pass spectroscopic ellipsometry where the light beam reflects multiple times on the sample. We have investigated both theoretically and experimentally the effect of sample reflectivity, number of reflections (passes), angles of incidence and detector dynamic range on ellipsometric observables tanΨ and cosΔ. The multiple pass approach provides increased sensitivity to small changes in Ψ and Δ, opening the way for single measurement determination of optical thickness T, refractive index n and absorption coefficient k of thin films, a significant improvement over the existing techniques. Based on our results, we discuss the strengths, the weaknesses and possible applications of this technique. - Highlights: • We present multi-pass spectroscopic ellipsometry (MPSE), a multi-pass approach to ellipsometry. • Different detectors, samples, angles of incidence and number of passes were tested. • N passes improve polarization ratio sensitivity to the power of N. • N reflections improve phase shift sensitivity by a factor of N. • MPSE can significantly improve thickness measurements in thin films.

  10. Priority nutrition messages.

    Science.gov (United States)

    1991-01-01

    The Philippine Food and Nutrition Program deliver priority short, simple, clear, and action filled nutrition messages in different languages and dialects to different audiences. Its 1st priority task is to promote breast feeding. It informs mothers that breast milk is the most nutritious food for infants and that it protects them from infectious diseases. The program also encourages breast feeding as long as possible. If mothers cannot breast feed, they should talk to an infant nutrition expert to help them choose the best formula and learn about proper preparation. A 4-6 month infant needs to begin eating small amounts of semisolid nutritious foods. Moreover these foods must include body building foods, such as meat and eggs, and energy providing foods, such as corn and rice. Mothers must 1st attend to food needs of infants and preschoolers since they are more likely to suffer malnutrition than older children and adults. This is especially important when they suffer from an infection. Specifically, the very young need a variety of foods each day including the vitamin and mineral rich vegetables and fruits. In fact, families should grow their own fruits and vegetables to ensure an adequate supply. Hands must be cleaned with soap and water after defecation and before preparing foods. Mothers should add fats and oils when preparing foods because they provide concentrated energy, fatty acids, and fat soluble vitamins. Pregnant mothers must consume increased amounts of fish, beans, and other body building foods as well as regulating foods (vegetables and fruits). Mothers must also space births. They should weigh children each month to monitor nutritional levels. Moreover they must pay attention to signs indicating inadequate and insufficient food intake e.g., underweight and night blindness.

  11. The classification on short message

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This paper discusses the importance of the classification of short message, and details some key technologies related. Through implementing a fundamental prototype, some basic models and technical references are provided.

  12. Broadcasting a message in a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Archer, Charles J; Faraj, Daniel A

    2014-11-18

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer that includes: transmitting, by the logical root to all of the nodes directly connected to the logical root, a message; and for each node except the logical root: receiving the message; if that node is the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received; if that node received the message from a parent node and if that node is not a leaf node, then transmitting the message to all of the child nodes; and if that node received the message from a child node and if that node is not the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received and transmitting the message to the parent node.

  13. Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages

    CERN Document Server

    Hayashi, Masahito

    2012-01-01

    The secure multiplex coding (SMC) is a technique to remove rate loss in the coding for wiretap channels and broadcast channels with confidential messages caused by the inclusion of random bits into transmitted signals. SMC replaces the random bits by other meaningful secret messages, and a collection of secret messages serves as the random bits to hide the rest of messages. In the previous researches, multiple secret messages were assumed to have independent and uniform distributions, which is difficult to be ensured in practice. We remove this restrictive assumption by a generalization of the channel resolvability technique. We also give practical construction techniques for SMC by using an arbitrary given error-correcting code as an ingredient, and channel-universal coding of SMC. By using the same principle as the channel-universal SMC, we give coding for the broadcast channel with confidential messages universal to both channel and source distributions.

  14. Text messaging during simulated driving.

    Science.gov (United States)

    Drews, Frank A; Yazdani, Hina; Godfrey, Celeste N; Cooper, Joel M; Strayer, David L

    2009-10-01

    This research aims to identify the impact of text messaging on simulated driving performance. In the past decade, a number of on-road, epidemiological, and simulator-based studies reported the negative impact of talking on a cell phone on driving behavior. However, the impact of text messaging on simulated driving performance is still not fully understood. Forty participants engaged in both a single task (driving) and a dual task (driving and text messaging) in a high-fidelity driving simulator. Analysis of driving performance revealed that participants in the dual-task condition responded more slowly to the onset of braking lights and showed impairments in forward and lateral control compared with a driving-only condition. Moreover, text-messaging drivers were involved in more crashes than drivers not engaged in text messaging. Text messaging while driving has a negative impact on simulated driving performance. This negative impact appears to exceed the impact of conversing on a cell phone while driving. The results increase our understanding of driver distraction and have potential implications for public safety and device development.

  15. MessageSpace: a messaging system for health research

    Science.gov (United States)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  16. A First-Order One-Pass CPS Transformation

    DEFF Research Database (Denmark)

    Danvy, Olivier; Nielsen, Lasse Reichstein

    2001-01-01

    We present a new transformation of λ-terms into continuation-passing style (CPS). This transformation operates in one pass and is both compositional and first-order. Previous CPS transformations only enjoyed two out of the three properties of being first-order, one-pass, and compositional......, but the new transformation enjoys all three properties. It is proved correct directly by structural induction over source terms instead of indirectly with a colon translation, as in Plotkin's original proof. Similarly, it makes it possible to reason about CPS-transformed terms by structural induction over...... source terms, directly.The new CPS transformation connects separately published approaches to the CPS transformation. It has already been used to state a new and simpler correctness proof of a direct-style transformation, and to develop a new and simpler CPS transformation of control-flow information....

  17. A First-Order One-Pass CPS Transformation

    DEFF Research Database (Denmark)

    Danvy, Olivier; Nielsen, Lasse Reichstein

    2003-01-01

    We present a new transformation of λ-terms into continuation-passing style (CPS). This transformation operates in one pass and is both compositional and first-order. Previous CPS transformations only enjoyed two out of the three properties of being first-order, one-pass, and compositional......, but the new transformation enjoys all three properties. It is proved correct directly by structural induction over source terms instead of indirectly with a colon translation, as in Plotkin's original proof. Similarly, it makes it possible to reason about CPS-transformed terms by structural induction over...... source terms, directly.The new CPS transformation connects separately published approaches to the CPS transformation. It has already been used to state a new and simpler correctness proof of a direct-style transformation, and to develop a new and simpler CPS transformation of control-flow information....

  18. The ISO 5-pass authentication in χ-Spaces

    DEFF Research Database (Denmark)

    Cáccamo, Mario J.; Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    We implement the ISO 5-pass authentication protocol and study its correctness using the χ-Space framework. χ-Spaces is a novel domain specific programming language designed for developing protocols and in particular security protocols. χ-Spaces programming language is an implementation of SPL...

  19. The ISO 5-pass authentication in χ-Spaces

    DEFF Research Database (Denmark)

    Cáccamo, Mario J.; Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    We implement the ISO 5-pass authentication protocol and study its correctness using the χ-Space framework. χ-Spaces is a novel domain specific programming language designed for developing protocols and in particular security protocols. χ-Spaces programming language is an implementation of SPL...

  20. Neuberger's double-pass algorithm

    Science.gov (United States)

    Chiu, Ting-Wai; Hsieh, Tung-Han

    2003-12-01

    We analyze Neuberger’s double-pass algorithm for the matrix-vector multiplication R(H)ṡY [where R(H) is (n-1,n)th degree rational polynomial of positive definite operator H], and show that the number of floating-point operations is independent of the degree n, provided that the number of sites is much larger than the number of iterations in the conjugate gradient. This implies that the matrix-vector product (H)-1/2Y≃R(n-1,n)(H)ṡY can be approximated to very high precision with sufficiently large n, without noticeably extra costs. Further, we show that there exists a threshold nT such that the double-pass is faster than the single pass for n>nT, where nT≃12 25 for most platforms.

  1. Multiple-pass water reuse

    Energy Technology Data Exchange (ETDEWEB)

    Bhattacharyya, D.; Farthing, S.S.; Cheng, C.S.

    1982-02-01

    Low-pressure membranes have definite advantages for the treatment of metal-processing wastewaters and acid mine water. The membrane processes are evaluated in terms of obtaining maximum water recovery (greater than 90%), proper ultrafiltrate quality, multiple-pass water reuse, and concentrate recycle. Various multi-salt solutions containing heavy metals (including cyanide complexes), and acid mine waters have been extensively investigated with a bench-scale unit, and a computer simulation model has been used to scale-up from the laboratory data. Water reuse models are presented for multiple passes. 9 references, 12 figures, 3 tables. (JMT)

  2. Split-C and active messages under SUNMOS on the Intel Paragon

    Energy Technology Data Exchange (ETDEWEB)

    Reisen, R. [Sandia National Labs., Albuquerque, NM (United States); Maccabe, A.B. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

    1994-04-01

    The compute power of the individual nodes of massively parallel systems increases steadily, while network latencies and bandwidth have not improved as quickly. Many researches believe that it is necessary to use explicit message passing in order to get the best possible performance out of these systems. High level parallel languages are shunned out of fear they might compromise performance. In this paper we have a look at one such language called Split-C. It fits into a middle ground between efforts such as High Performance Fortran (HPF) and explicit message passing. HPF tries to hide the underlying architecture from the programmer and let the compiler and the run time system make decision about parallelization, location of data, and the mechanisms used to transfer the data from one node to another. On the other hand, explicit message passing leaves all the decision to the programmer. Split-C allows access to a global address space, but leaves the programmer in control of the location of data, and offers a clear cost model for data access. Split-C is based on Active Messages. We have implemented both under the SUNMOS operating system on the Intel Paragon. We will discuss performance issues of Split-C and make direct comparisons to the Thinking Machines CM-5 implementation. We will also scrutinize Active Messages, discuss their properties and drawbacks, and show that other mechanisms can be used to support Split-C.

  3. Young children's perceptions of fire-safety messages: do framing and parental mediation matter?

    Science.gov (United States)

    Borzekowski, Dina; Clearfield, Elizabeth; Rimal, Rajiv; Gielen, Andrea

    2014-01-01

    Media can deliver health and safety messages promoting child health and injury prevention. This study examined the effects of message framing and parental mediation on children's perceptions of fire-safety messages. Using a 2 × 3 randomized experimental design, this study considered both message framing (gain or loss) and parental mediation (no mediation/control, unscripted, or scripted) with 320 children who were 4 and 5 years of age. Children saw two messages (burn and smoke inhalation) embedded in a cartoon. Afterward, researchers assessed children's recall, understanding, and perceptions of self-efficacy and social norms. Children were more likely to recall the safety messages if they were older (burn: adjusted odds ration [AOR] = 2.74 and smoke: AOR = 2.58), and could recall the smoke inhalation message if they had unscripted mediation (AOR = 3.16). Message understanding was poor, with only about 50% of children choosing a correct behavior in a similar scenario. For the burn message, correct understanding was associated with gain-framing and scripted mediation (AOR = 3.22 and 5.77, respectively). Only the scripted mediation group was significantly associated with an increase in perceived social norms (burn: coefficient =.37 and smoke: coefficient =.55; P framing was associated with increased odds of self-efficacy for both behaviors (burn: AOR = 1.77 and smoke: AOR = 1.77). Messages that show positive outcomes combined with scripted parental mediation appear most effective in communicating safety behaviors, but the overall effectiveness of video-based messages to teach children safety behaviors needs to be enhanced.

  4. ASSESSING AND MITIGATING THE IMPACTS OF DYNAMIC MESSAGE SIGNS ON HIGHWAY TRAFFIC

    Directory of Open Access Journals (Sweden)

    Miao Song

    2016-03-01

    Full Text Available As a critical component in Intelligent Transportation Systems (ITS of modern traffic management, dynamic message signs (DMS are widely used in many countries as an effective means to provide motorists with up-to-date information regarding accidents, congestion, road conditions and travel time, etc. However, it was observed in traffic data that motorists tended to slow down when approaching active DMSs and speed up after passing these signs. The speed variations could pose safety hazards to other motorists on highways. To gain insights into this issue and understand associated causes and risks, a human factors study was conducted to help ease the speed variation when approaching DMSs. The effect of DMS messages on traffic approaching and passing the signs were assessed by analyzing highway traffic data near DMSs. A questionnaire survey was conducted to identify associated causes and risks. Participants were further surveyed about their preferences on DMS characteristics such as message category, message type, number of frames, message details, and the use of graphics. Individual drivers' responses to various DMS designs were evaluated through a simulation test. This study has provided updated knowledge regarding the effects of DMSs on highway traffic and has identified measures to improve the design and display of DMS messages to help ease the speed variation of approaching traffic.

  5. Two-way text messaging: an interactive mobile learning environment in higher education

    Directory of Open Access Journals (Sweden)

    H.K. Salinda Premadasa

    2016-11-01

    Full Text Available Short messaging service (SMS is perhaps the most popular mobile technology prevalent among students in higher education due to its ubiquitous nature and the capability of two-way communication. However, a major limitation in two-way text messaging is sending back a part of received data with the reply message. This limitation results in users of a mobile learning environment being unable to reply back to the correct destination. This article presents a two-way text messaging system that can be integrated into a learning management system (LMS to provide an interactive learning experience to the user community. Initially, a database is integrated into the LMS that holds message information such as recipient's phone number, message body and user data header. A specific port associated with the SMS is used to conceal and exchange data of a particular course unit. Subsequently, software in the student's mobile device captures this message and sends back the reply message to the appropriate course unit allowing both teachers and students to view messages sent and replies received pertaining to a particular course. Results indicate the educational impact of the proposed system in improving the learning environment and benefits it offers to the community in a campus-wide implementation.

  6. Feasibility study: PASS computer environment

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-03-10

    The Policy Analysis Screening System (PASS) is a computerized information-retrieval system designed to provide analysts in the Department of Energy, Assistant Secretary for Environment, Office of Technology Impacts (DOE-ASEV-OTI) with automated access to articles, computer simulation outputs, energy-environmental statistics, and graphics. Although it is essential that PASS respond quickly to user queries, problems at the computer facility where it was originally installed seriously slowed PASS's operations. Users attempting to access the computer by telephone repeatedly encountered busy signals and, once logged on, experienced unsatisfactory delays in response to commands. Many of the problems stemmed from the system's facility manager having brought another large user onto the system shortly after PASS was implemented, thereby significantly oversubscribing the facility. Although in March 1980 Energy Information Administration (EIA) transferred operations to its own computer facility, OTI has expressed concern that any improvement in computer access time and response time may not be sufficient or permanent. Consequently, a study was undertaken to assess the current status of the system, to identify alternative computer environments, and to evaluate the feasibility of each alternative in terms of its cost and its ability to alleviate current problems.

  7. EDITORIAL: Message from the Editor

    Science.gov (United States)

    Thomas, Paul

    2009-01-01

    The end of 2008 cannot pass without remarking that the economic news has repeatedly strengthened the case for nuclear fusion; not perhaps to solve the immediate crises but to offer long-term security of energy supply. Although temporary, the passage of the price of oil through 100 per barrel is a portent of things to come and should bolster our collective determination to develop nuclear fusion into a viable energy source. It is with great pride, therefore, that I can highlight the contributions that the Nuclear Fusion journal has made to the research programme and the consolidation of its position as the lead journal in the field. Of course, the journal would be nothing without its authors and referees and I would like to pass on my sincere thanks to them all for their work in 2008 and look forward to a continuing, successful collaboration in 2009. Refereeing The Nuclear Fusion Editorial Office understands how much effort is required of our referees. The Editorial Board decided that an expression of thanks to our most loyal referees is appropriate and so, since January 2005, we have been offering the top ten most loyal referees over the past year a personal subscription to Nuclear Fusion with electronic access for one year, free of charge. To select the top referees we have adopted the criterion that a researcher should have acted as a referee or adjudicator for at least two different manuscripts during the period from November 2007 to November 2008 and provided particularly detailed advice to the authors. We have excluded our Board members and those referees who were already listed in the last four years. According to our records the following people met this criterion. Congratulations and many, many thanks! T. Hino (Hokkaido University, Japan) M. Sugihara (ITER Cadarache, France) M. Dreval (Saskatchewan University, Canada) M. Fenstermacher (General Atomics, USA) V.S. Marchenko (Institute for Nuclear Research, Ukraine) G.V. Pereverzev (Max-Planck-Institut fuer

  8. Radiating Messages: An International Perspective.

    Science.gov (United States)

    Walker, Janet

    2003-01-01

    Negative messages about the detrimental impacts of divorce on children prompted urgent calls in the United Kingdom for a reinstatement of traditional family values. Suggests that although the effects of divorce are real, care should be taken to avoid exaggeration, thus moving the debate to one centered on providing better support, advice, and…

  9. Applications of quantum message sealing

    CERN Document Server

    Worley, G G

    2005-01-01

    In 2003, Bechmann-Pasquinucci introduced the concept of quantum seals, a quantum analogue to wax seals used to close letters and envelopes. Since then, some improvements on the method have been found. We first review the current quantum sealing techniques, then introduce and discuss potential applications of quantum message sealing, and conclude with some discussion of the limitations of quantum seals.

  10. rMPI : increasing fault resiliency in a message-passing environment.

    Energy Technology Data Exchange (ETDEWEB)

    Stearley, Jon R.; Laros, James H., III; Ferreira, Kurt Brian; Pedretti, Kevin Thomas Tauke; Oldfield, Ron A.; Riesen, Rolf (IBM Research, Ireland); Brightwell, Ronald Brian

    2011-04-01

    As High-End Computing machines continue to grow in size, issues such as fault tolerance and reliability limit application scalability. Current techniques to ensure progress across faults, like checkpoint-restart, are unsuitable at these scale due to excessive overheads predicted to more than double an applications time to solution. Redundant computation, long used in distributed and mission critical systems, has been suggested as an alternative to checkpoint-restart on its own. In this paper we describe the rMPI library which enables portable and transparent redundant computation for MPI applications. We detail the design of the library as well as two replica consistency protocols, outline the overheads of this library at scale on a number of real-world applications, and finally outline the significant increase in an applications time to solution at extreme scale as well as show the scenarios in which redundant computation makes sense.

  11. Ein effizientes Message-Passing-Interface (MPI) für HiPPI

    OpenAIRE

    Beisel, Thomas

    1996-01-01

    In dieser Programmbeschreibung wird auf den internen Aufbau von MPI eingegangen und begründet, warum eine Erweiterung der Funktionalitäten erforderlich ist. Der Lösungsansatzes zur Erweiterung von MPI wird vorgestellt.

  12. Scalable detection of statistically significant communities and hierarchies: message-passing for modularity

    CERN Document Server

    Zhang, Pan

    2014-01-01

    Modularity is a popular measure of community structure. However, maximizing the modularity can lead to many competing partitions with almost the same modularity that are poorly correlated to each other; it can also overfit, producing illusory "communities" in random graphs where none exist. We address this problem by using the modularity as a Hamiltonian, and computing the marginals of the resulting Gibbs distribution. If we assign each node to its most-likely community under these marginals, we claim that, unlike the ground state, the resulting partition is a good measure of statistically-significant community structure. We propose an efficient Belief Propagation (BP) algorithm to compute these marginals. In random networks with no true communities, the system has two phases as we vary the temperature: a paramagnetic phase where all marginals are equal, and a spin glass phase where BP fails to converge. In networks with real community structure, there is an additional retrieval phase where BP converges, and ...

  13. A model based message passing approach for flexible and scalable home automation controllers

    Energy Technology Data Exchange (ETDEWEB)

    Bienhaus, D. [INNIAS GmbH und Co. KG, Frankenberg (Germany); David, K.; Klein, N.; Kroll, D. [ComTec Kassel Univ., SE Kassel Univ. (Germany); Heerdegen, F.; Jubeh, R.; Zuendorf, A. [Kassel Univ. (Germany). FG Software Engineering; Hofmann, J. [BSC Computer GmbH, Allendorf (Germany)

    2012-07-01

    There is a large variety of home automation systems that are largely proprietary systems from different vendors. In addition, the configuration and administration of home automation systems is frequently a very complex task especially, if more complex functionality shall be achieved. Therefore, an open model for home automation was developed that is especially designed for easy integration of various home automation systems. This solution also provides a simple modeling approach that is inspired by typical home automation components like switches, timers, etc. In addition, a model based technology to achieve rich functionality and usability was implemented. (orig.)

  14. rMPI : increasing fault resiliency in a message-passing environment.

    Energy Technology Data Exchange (ETDEWEB)

    Stearley, Jon R.; Laros, James H., III; Ferreira, Kurt Brian; Pedretti, Kevin Thomas Tauke; Oldfield, Ron A.; Riesen, Rolf (IBM Research, Ireland); Brightwell, Ronald Brian

    2011-04-01

    As High-End Computing machines continue to grow in size, issues such as fault tolerance and reliability limit application scalability. Current techniques to ensure progress across faults, like checkpoint-restart, are unsuitable at these scale due to excessive overheads predicted to more than double an applications time to solution. Redundant computation, long used in distributed and mission critical systems, has been suggested as an alternative to checkpoint-restart on its own. In this paper we describe the rMPI library which enables portable and transparent redundant computation for MPI applications. We detail the design of the library as well as two replica consistency protocols, outline the overheads of this library at scale on a number of real-world applications, and finally outline the significant increase in an applications time to solution at extreme scale as well as show the scenarios in which redundant computation makes sense.

  15. An Efficient Clustering Technique for Message Passing between Data Points using Affinity Propagation

    Directory of Open Access Journals (Sweden)

    D. NAPOLEON,

    2011-01-01

    Full Text Available A wide range of clustering algorithms is available in literature and still an open area for researcher’s k-means algorithm is one of the basic and most simple partitioning clustering technique is given by Macqueen in 1967. A new clustering algorithm used in this paper is affinity propagation. The number of cluster k has been supplied by the user and the Affinity propagation found clusters with much lower error than other methods, and it did so in less than one-hundredth the amount of time between data point. In this paper we make analysis on cluster algorithm k-means, efficient k-means, and affinity propagation with colon dataset. And the result of affinity ropagation shows much lower error when compare with other algorithm and the average accuracy is good.

  16. Shared memory and message passing revisited in the many-core era

    CERN Document Server

    CERN. Geneva

    2016-01-01

    In the 70s, Edsgar Dijkstra, Per Brinch Hansen and C.A.R Hoare introduced the fundamental concepts for concurrent computing. It was clear that concrete communication mechanisms were required in order to achieve effective concurrency. Whether you're developing a multithreaded program running on a single node, or a distributed system spanning over hundreds of thousands cores, the choice of the communication mechanism for your system must be done intelligently because of the implicit programmability, performance and scalability trade-offs. With the emergence of many-core computing architectures many assumptions may not be true anymore. In this talk we will try to provide insight on the characteristics of these communication models by providing basic theoretical background and then focus on concrete practical examples based on indicative use case scenarios. The case studies of this presentation cover popular programming models, operating systems and concurrency frameworks in the context of many-core processors.

  17. Techniques for Enabling Highly Efficient Message Passing on Many-Core Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Si, Min; Balaji, Pavan; Ishikawa, Yutaka

    2015-01-01

    Many-core architecture provides a massively parallel environment with dozens of cores and hundreds of hardware threads. Scientific application programmers are increasingly looking at ways to utilize such large numbers of lightweight cores for various programming models. Efficiently executing these models on massively parallel many-core environments is not easy, however and performance may be degraded in various ways. The first author's doctoral research focuses on exploiting the capabilities of many-core architectures on widely used MPI implementations. While application programmers have studied several approaches to achieve better parallelism and resource sharing, many of those approaches still face communication problems that degrade performance. In the thesis, we investigate the characteristics of MPI on such massively threaded architectures and propose two efficient strategies -- a multi-threaded MPI approach and a process-based asynchronous model -- to optimize MPI communication for modern scientific applications.

  18. Run-time scheduling and execution of loops on message passing machines

    Science.gov (United States)

    Saltz, Joel; Crowley, Kathleen; Mirchandaney, Ravi; Berryman, Harry

    1990-01-01

    Sparse system solvers and general purpose codes for solving partial differential equations are examples of the many types of problems whose irregularity can result in poor performance on distributed memory machines. Often, the data structures used in these problems are very flexible. Crucial details concerning loop dependences are encoded in these structures rather than being explicitly represented in the program. Good methods for parallelizing and partitioning these types of problems require assignment of computations in rather arbitrary ways. Naive implementations of programs on distributed memory machines requiring general loop partitions can be extremely inefficient. Instead, the scheduling mechanism needs to capture the data reference patterns of the loops in order to partition the problem. First, the indices assigned to each processor must be locally numbered. Next, it is necessary to precompute what information is needed by each processor at various points in the computation. The precomputed information is then used to generate an execution template designed to carry out the computation, communication, and partitioning of data, in an optimized manner. The design is presented for a general preprocessor and schedule executer, the structures of which do not vary, even though the details of the computation and of the type of information are problem dependent.

  19. Message-Passing Algorithms for Channel Estimation and Decoding Using Approximate Inference

    DEFF Research Database (Denmark)

    Badiu, Mihai Alin; Kirkelund, Gunvor Elisabeth; Manchón, Carles Navarro

    2012-01-01

    We design iterative receiver schemes for a generic communication system by treating channel estimation and information decoding as an inference problem in graphical models. We introduce a recently proposed inference framework that combines belief propagation (BP) and the mean field (MF) approxima...

  20. Message-Passing Receiver for OFDM Systems over Highly Delay-Dispersive Channels

    DEFF Research Database (Denmark)

    Barbu, Oana-Elena; Manchón, Carles Navarro; Rom, Christian

    2017-01-01

    Propagation channels with maximum excess delay exceeding the duration of the cyclic prefix (CP) in OFDM systems cause intercarrier and intersymbol interference which, unless accounted for, degrade the receiver performance. Using tools from Bayesian inference and sparse signal reconstruction, we...... and future wireless communications systems. By enabling the OFDM receiver experiencing these harsh conditions to locally cancel the interference, our design circumvents the spectral efficiency loss incurred by extending the CP duration, otherwise a straightforward solution. Furthermore, it sets the premises...

  1. Reactions to threatening health messages

    Directory of Open Access Journals (Sweden)

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  2. Representing culture in interstellar messages

    Science.gov (United States)

    Vakoch, Douglas A.

    2008-09-01

    As scholars involved with the Search for Extraterrestrial Intelligence (SETI) have contemplated how we might portray humankind in any messages sent to civilizations beyond Earth, one of the challenges they face is adequately representing the diversity of human cultures. For example, in a 2003 workshop in Paris sponsored by the SETI Institute, the International Academy of Astronautics (IAA) SETI Permanent Study Group, the International Society for the Arts, Sciences and Technology (ISAST), and the John Templeton Foundation, a varied group of artists, scientists, and scholars from the humanities considered how to encode notions of altruism in interstellar messages art_science/2003>. Though the group represented 10 countries, most were from Europe and North America, leading to the group's recommendation that subsequent discussions on the topic should include more globally representative perspectives. As a result, the IAA Study Group on Interstellar Message Construction and the SETI Institute sponsored a follow-up workshop in Santa Fe, New Mexico, USA in February 2005. The Santa Fe workshop brought together scholars from a range of disciplines including anthropology, archaeology, chemistry, communication science, philosophy, and psychology. Participants included scholars familiar with interstellar message design as well as specialists in cross-cultural research who had participated in the Symposium on Altruism in Cross-cultural Perspective, held just prior to the workshop during the annual conference of the Society for Cross-cultural Research . The workshop included discussion of how cultural understandings of altruism can complement and critique the more biologically based models of altruism proposed for interstellar messages at the 2003 Paris workshop. This paper, written by the chair of both the Paris and Santa Fe workshops, will explore the challenges of communicating concepts of altruism that draw on both biological and cultural models.

  3. The use of messages in altering risky gambling behavior in college students: an experimental analogue study.

    Science.gov (United States)

    Jardin, Bianca; Wulfert, Edelgard

    2009-01-01

    This study examined the effects of messages on altering risky gambling behavior in college students. While playing a chance-based computerized game with play money, three groups of participants either viewed occasional accurate messages that correctly described the contingencies of the game, neutral messages unrelated to the contingencies, or no messages. Participants in the accurate message condition spent overall less money gambling, played fewer trials in the final phase of the game when all trials resulted in losses, and were more likely to quit the game while they still had money remaining in the bank. The findings suggest that "reminders" about the random nature of games and the overall negative rate of return might lead to more responsible gaming.

  4. Supercomputing "Grid" passes latest test

    CERN Multimedia

    Dumé, Belle

    2005-01-01

    When the Large Hadron Collider (LHC) comes online at the CERN in 2007, it will produce more data than any other experiment in the history of physics. Particle physicists have now passed another milestone in their preparations for the LHC by sustaining a continuous flow of 600 megabytes of dat per second (MB/s) for 10 days from the Geneva laboratory to seven sites in Europe and the US (1/2 page)

  5. Toward Predicting Popularity of Social Marketing Messages

    Science.gov (United States)

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  6. 27 CFR 9.88 - Pacheco Pass.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Pacheco Pass. 9.88 Section... Pass. (a) Name. The name of the viticultural area described in this section is “Pacheco Pass.” (b) Approved maps. The appropriate maps for determining the boundaries of Pacheco Pass viticultural area...

  7. Do oral messages help visual search?

    CERN Document Server

    Carbonell, Noëlle

    2005-01-01

    A preliminary experimental study is presented, that aims at eliciting the contribution of oral messages to facilitating visual search tasks on crowded visual displays. Results of quantitative and qualitative analyses suggest that appropriate verbal messages can improve both target selection time and accuracy. In particular, multimodal messages including a visual presentation of the isolated target together with absolute spatial oral information on its location in the displayed scene seem most effective. These messages also got top-ranking ratings from most subjects.

  8. The eel ladders of the double slot pass Geesthacht; Aalleitern am Doppelschlitzpass Geesthacht

    Energy Technology Data Exchange (ETDEWEB)

    Adam, Beate [Institut fuer angewandte Oekologie, Kirtorf-Wahlen (Germany); Neumann, Christof [Knabe Enders Duehrkop Ingenieure GmbH, Hamburg (Germany)

    2012-07-01

    To facilitate the upstream migration of glass eels, four eel ladders were installed within and next to the fish pass at the Geesthacht dam. Similar to other fish pass construction types it was necessary to ensure that the ladders could be both detected and passed by the juvenile eels. A custom built monitoring station will be used to guarantee the correct functioning of the eel ladders and subsequently document the eel migration from the beginning of the next season. (orig.)

  9. Oral messages improve visual search

    CERN Document Server

    Kieffer, Suzanne

    2007-01-01

    Input multimodality combining speech and hand gestures has motivated numerous usability studies. Contrastingly, issues relating to the design and ergonomic evaluation of multimodal output messages combining speech with visual modalities have not yet been addressed extensively. The experimental study presented here addresses one of these issues. Its aim is to assess the actual efficiency and usability of oral system messages including brief spatial information for helping users to locate objects on crowded displays rapidly. Target presentation mode, scene spatial structure and task difficulty were chosen as independent variables. Two conditions were defined: the visual target presentation mode (VP condition) and the multimodal target presentation mode (MP condition). Each participant carried out two blocks of visual search tasks (120 tasks per block, and one block per condition). Scene target presentation mode, scene structure and task difficulty were found to be significant factors. Multimodal target presenta...

  10. Syndromic classification of Twitter messages

    CERN Document Server

    Collier, Nigel

    2011-01-01

    Recent studies have shown strong correlation between social networking data and national influenza rates. We expanded upon this success to develop an automated text mining system that classifies Twitter messages in real time into six syndromic categories based on key terms from a public health ontology. 10-fold cross validation tests were used to compare Naive Bayes (NB) and Support Vector Machine (SVM) models on a corpus of 7431 Twitter messages. SVM performed better than NB on 4 out of 6 syndromes. The best performing classifiers showed moderately strong F1 scores: respiratory = 86.2 (NB); gastrointestinal = 85.4 (SVM polynomial kernel degree 2); neurological = 88.6 (SVM polynomial kernel degree 1); rash = 86.0 (SVM polynomial kernel degree 1); constitutional = 89.3 (SVM polynomial kernel degree 1); hemorrhagic = 89.9 (NB). The resulting classifiers were deployed together with an EARS C2 aberration detection algorithm in an experimental online system.

  11. Framing of health information messages.

    Science.gov (United States)

    Akl, Elie A; Oxman, Andrew D; Herrin, Jeph; Vist, Gunn E; Terrenato, Irene; Sperati, Francesca; Costiniuk, Cecilia; Blank, Diana; Schünemann, Holger

    2011-12-07

    -planned subgroup analyses based on the type of message (screening, prevention, and treatment). The primary outcome was behaviour. We did not assess any adverse outcomes. We included 35 studies involving 16,342 participants (all health consumers) and reporting 51 comparisons.In the context of attribute framing, participants in one included study understood the message better when it was framed negatively than when it was framed positively (1 study; SMD -0.58 (95% confidence interval (CI) -0.94 to -0.22); moderate effect size; low quality evidence). Although positively-framed messages may have led to more positive perception of effectiveness than negatively-framed messages (2 studies; SMD 0.36 (95% CI -0.13 to 0.85); small effect size; low quality evidence), there was little or no difference in persuasiveness (11 studies; SMD 0.07 (95% CI -0.23 to 0.37); low quality evidence) and behavior (1 study; SMD 0.09 (95% CI -0.14 to 0.31); moderate quality evidence).In the context of goal framing, loss messages led to a more positive perception of effectiveness compared to gain messages for screening messages (5 studies; SMD -0.30 (95% CI -0.49 to -0.10); small effect size; moderate quality evidence) and may have been more persuasive for treatment messages (3 studies; SMD -0.50 (95% CI -1.04 to 0.04); moderate effect size; very low quality evidence). There was little or no difference in behavior (16 studies; SMD -0.06 (95% CI -0.15 to 0.03); low quality evidence). No study assessed the effect on understanding. Contrary to commonly held beliefs, the available low to moderate quality evidence suggests that both attribute and goal framing may have little if any consistent effect on health consumers' behaviour. The unexplained heterogeneity between studies suggests the possibility of a framing effect under specific conditions. Future research needs to investigate these conditions.

  12. Message Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-01-01

    Full Text Available The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent’s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication.

  13. Detection and Correction of Silent Data Corruption for Large-Scale High-Performance Computing

    Energy Technology Data Exchange (ETDEWEB)

    Fiala, David J [ORNL; Mueller, Frank [North Carolina State University; Engelmann, Christian [ORNL; Ferreira, Kurt Brian [Sandia National Laboratories (SNL); Brightwell, Ron [Sandia National Laboratories (SNL); Riesen, Rolf [IBM Research, Ireland

    2013-01-01

    Faults have become the norm rather than the exception for high-end computing on clusters with 10s/100s of thousands of cores. Exacerbating this situation, some of these faults remain undetected, manifesting themselves as silent errors that corrupt memory while applications continue to operate and report incorrect results. This paper studies the potential for redundancy to both detect and correct soft errors in MPI message-passing applications. Our study investigates the challenges inherent to detecting soft errors within MPI application while providing transparent MPI redundancy. By assuming a model wherein corruption in application data manifests itself by producing differing MPI message data between replicas, we study the best suited protocols for detecting and correcting MPI data that is the result of corruption. To experimentally validate our proposed detection and correction protocols, we introduce RedMPI, an MPI library which resides in the MPI profiling layer. RedMPI is capable of both online detection and correction of soft errors that occur in MPI applications without requiring any modifications to the application source by utilizing either double or triple redundancy. Our results indicate that our most efficient consistency protocol can successfully protect applications experiencing even high rates of silent data corruption with runtime overheads between 0% and 30% as compared to unprotected applications without redundancy. Using our fault injector within RedMPI, we observe that even a single soft error can have profound effects on running applications, causing a cascading pattern of corruption in most cases causes that spreads to all other processes. RedMPI's protection has been shown to successfully mitigate the effects of soft errors while allowing applications to complete with correct results even in the face of errors.

  14. Instant Messaging in Dental Education.

    Science.gov (United States)

    Khatoon, Binish; Hill, Kirsty B; Walmsley, A Damien

    2015-12-01

    Instant messaging (IM) is when users communicate instantly via their mobile devices, and it has become one of the most preferred choices of tools to communicate amongst health professions students. The aim of this study was to understand how dental students communicate via IM, faculty members' perspectives on using IM to communicate with students, and whether such tools are useful in the learning environment. After free-associating themes on online communication, two draft topic guides for structured interviews were designed that focussed on mobile device-related communication activities. A total of 20 students and six faculty members at the University of Birmingham School of Dentistry agreed to take part in the interviews. Students were selected from years 1-5 representing each year group. The most preferred communication tools were emails, social networking, and IM. Emails were used for more formal messages, and IM and social networking sites were used for shorter messages. WhatsApp was the most used IM app because of its popular features such as being able to check if recipients have read and received messages and group work. The students reported that changes were necessary to improve their communication with faculty members. The faculty members reported having mixed feelings toward the use of IM to communicate with students. The students wished to make such tools a permanent part of their learning environment, but only with the approval of faculty members. The faculty members were willing to accept IM as a communication tool only if it is monitored and maintained by the university and has a positive effect on learning.

  15. A message to school girls.

    Science.gov (United States)

    Akinwande, A

    1993-06-01

    Information, education, and communication (IEC) programs need to be strengthened to appeal to adolescents, who are increasingly contributing to unwanted pregnancy and are using abortion as a means of birth control. Successful IEC programs have the following characteristics: 1) established communication theories that guide development of materials; 2) a multimedia and a mass media approach to information dissemination, and 3) emphasis on visual displays. The primary emphasis should be on presentation of a concise, clear message with the appropriate visual medium. Many communication specialists in developing countries, however, lack the training to design and use effective IEC software. Designing effective messages involves a process of integrating scientific ideas with artistic appeal. The aim is to stimulate the target audience to change its behavior of life style. The message must be convincing and contain practical and useful information. The IEC Software Design Cycle focuses on analysis and diagnosis, design production, pretesting and modification, and distribution and evaluation. Each of these processes are described. Necessary before any attempt is made is obtaining data on historical, sociocultural, and demographic characteristics, economic activities, health and social services, communication infrastructure, marriage and family life patterns, and decision making systems. Focus group discussions may be used to collect information about the target group. An example is given of the process of development, in a course through the Center or African Family Studies, of a poster about premarital sex directed to 11-16 year olds. On the basis of focus group discussions, it was decided that the message would be to encourage girls to talk with their mothers about family life and premarital sex. The poster was produced with 2 school girls talking in front of the school. The evaluation yielded modifications such as including a school building that resembled actual

  16. Mining Opinion in Online Messages

    Directory of Open Access Journals (Sweden)

    Norlela Samsudin

    2013-09-01

    Full Text Available The number of messages that can be mined from online entries increases as the number of online application users increases. In Malaysia, online messages are written in mixed languages known as ‘Bahasa Rojak’. Therefore, mining opinion using natural language processing activities is difficult. This study introduces a Malay Mixed Text Normalization Approach (MyTNA and a feature selection technique based on Immune Network System (FS-INS in the opinion mining process using machine learning approach. The purpose of MyTNA is to normalize noisy texts in online messages. In addition, FS-INS will automatically select relevant features for the opinion mining process. Several experiments involving 1000 positive movies feedback and 1000 negative movies feedback have been conducted. The results show that accuracy values of opinion mining using Naïve Bayes (NB, k-Nearest Neighbor (kNN and Sequential Minimal Optimization (SMO increase after the introduction of MyTNA and FS-INS.

  17. Distributed parallel messaging for multiprocessor systems

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  18. A First-Order One-Pass CPS Transformation

    DEFF Research Database (Denmark)

    Danvy, Olivier; Nielsen, Lasse Reichstein

    2002-01-01

    We present a new transformation of call-by-value lambdaterms into continuation-passing style (CPS). This transformation operates in one pass and is both compositional and first-order. Because it operates in one pass, it directly yields compact CPS programs that are comparable to what one would...... write by hand. Because it is compositional, it allows proofs by structural induction. Because it is first-order, reasoning about it does not require the use of a logical relation. This new CPS transformation connects two separate lines of research. It has already been used to state a new and simpler...... correctness proof of a direct-style transformation, and to develop a new and simpler CPS transformation of control-flow information....

  19. 78 FR 62344 - Sabine Pass Liquefaction Expansion, LLC, Sabine Pass Liquefaction, LLC, and Sabine Pass LNG, L.P...

    Science.gov (United States)

    2013-10-18

    ... Sabine Pass LNG, L.P., Cheniere Creole Trail Pipeline, L.P.; Notice of Application Take notice that on... LNG, L.P. (collectively referred to as Sabine Pass) filed with the Federal Energy Regulatory..., construct, and operate additional liquefied natural gas (LNG) export facilities at the Sabine Pass...

  20. Changing knowledge and beliefs through an oral health pregnancy message.

    Science.gov (United States)

    Bates, S Brady; Riedy, Christine A

    2012-01-01

    Pregnancy can be a critical and important period in which to intervene to improve oral health in both the mother and her child. This study examined an online approach for promoting awareness of oral health messages targeted at pregnant women, and whether this type of health messaging impacts oral health knowledge and beliefs. The study was conducted in three parts: production and pilot testing of a brief commercial, Web site/commercial launch and testing, and dissemination and monitoring of the commercial on a video-sharing site. The brief commercial and pre- and postsurveys were produced and pilot tested among a convenience sample of pregnant women (n = 13). The revised commercial and surveys were launched on a newly created Web site and monitored for activity. After 2 months, the commercial was uploaded to a popular video-sharing Web site. Fifty-five individuals completed both the pre- and postsurveys after the Web site was launched. No one responded 100 percent correctly on the presurvey; 77.4 percent responded correctly about dental visits during pregnancy, 66.0 percent about cavity prevention, and 50.9 percent about transmission of bacteria by saliva. Most respondents recalled the correct information on the posttest; 100 percent or close to 100 percent accurately responded about visiting the dentist during pregnancy and preventing cavities, while 79.2 percent responded correctly to the transmission question. Social media can effectively provide dental health messages during pregnancy. This approach can play an important role in increasing awareness and improving oral health of both mother and child. © 2011 American Association of Public Health Dentistry.

  1. WebPASS ICASS (HR Personnel Management)

    Data.gov (United States)

    US Agency for International Development — WebPASS Joint Administrative Support Platforms Post Administrative Software Suite - U.S. Department of State Executive Officers application suite. Web.PASS is the...

  2. When you pass your due date

    Science.gov (United States)

    ... medlineplus.gov/ency/patientinstructions/000515.htm When you pass your due date To use the sharing features ... link between you and your baby. As you pass your due date, the placenta may not work ...

  3. Detecting the Incorrect Safety Message in VANETS

    Directory of Open Access Journals (Sweden)

    Huibin Xu

    2013-05-01

    Full Text Available There always are some vehicles (nodes to demonstrate various misdemeanours, such as, modifying data, transmitting fraudulent data about road congestion or vehicle, due to the distinct characteristics of Vehicular Ad-Hoc Networks (VANETs. Those malicious data from safety message have the potential to damage in VANETs. Therefore, the received safety message should be verified before the message is accepted and relayed. In this study, we address the challenge by detecting incorrect safety message. We propose a novel approach to deal with evaluating the trustworthiness of safety message reported by neighbor vehicles by detecting the consistency between the actions and the words (safety message. If it is inconsistent, the safety message is recognized as incorrect message; otherwise, the message is accepted and relayed. Moreover, the safety precaution is considered to protect itself and minimize the losses. Simulation results show that our proposed method can detect effectively the incorrect safety message. The detection ration is about 90% when the number of malicious vehicles is small.

  4. Senate passes clean air bill

    Science.gov (United States)

    In an 89 to 11 vote the Senate passed a clean air bill aimed at reducing pollution by the turn of the century by imposing tougher controls on American industry. The bill is the first revision of the Clean Air Act of 1970 in 13 years and calls for new limits on auto pollution to clean up smog in most U.S. cities, decreasing by half emissions by power plants that cause acid rain to protect the ecology, and increasing technological controls on factories to protect against cancer-causing and toxic substances. The bill will add about $20 billion per year to the estimated $33 billion cost of complying with current pollution laws.

  5. Regulatory fit messages and physical activity motivation.

    Science.gov (United States)

    Pfeffer, Ines

    2013-04-01

    Targeted communication about health behaviors seems to be more effective than mass communication in which undifferentiated audiences receive identical messages. Regulatory focus is psychological variable that can be used to build two target groups: promotion-focused or prevention-focused people. It is hypothesized that targeting messages to an individual's regulatory focus creates regulatory fit and is more successful to promote a physically active lifestyle than nonfit messages. Two different print messages promoting a physically active lifestyle derived from regulatory focus theory (promotion message vs. prevention message) were randomly assigned to N = 98 participants after measuring their regulatory focus. It was examined whether regulatory fit between the regulatory focus and the assigned print message would lead to more positive evaluations in the dependent variables inclination toward the message (preference for the message), intention to perform the behavior, prospective and retrospective feelings associated with the behavior (positive and negative), and perceived value of the behavior directly after reading the message. Hierarchical linear regression analyses revealed that regulatory fit led to stronger intentions in the prevention-message condition and more prospective positive and retrospective positive feelings associated with the behavior in the promotion-message condition in contrast to the nonfit conditions. Prospective positive feelings associated with the behavior mediated the effect of regulatory fit on intention. The results partly provided support for the regulatory fit concept. Matching print messages to the regulatory focus of individuals seems to be a useful approach to enhance physical activity motivation. Future studies should include an objective measure of physical activity behavior.

  6. Key paediatric messages from Amsterdam

    Directory of Open Access Journals (Sweden)

    Jonathan Grigg

    2016-04-01

    Full Text Available The Paediatric Assembly of the European Respiratory Society (ERS maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress.

  7. Precision Assembly of Systems on Surfaces (PASS)

    Science.gov (United States)

    2015-02-06

    Precision Assembly of Systems on Surfaces ( PASS ) This program was directed at generating functionalized surfaces and assemblies for electronic and...journals: Number of Papers published in non peer-reviewed journals: Final Report: Precision Assembly of Systems on Surfaces ( PASS ) Report Title This...PRECISION ASSEMBLY OF SYSTEMS ON SURFACES ( PASS ) PI: Timothy M. Swager Massachusetts Institute of Technology Final Report: DARPA, Defense

  8. 33 CFR 117.311 - New Pass.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false New Pass. 117.311 Section 117.311... REGULATIONS Specific Requirements Florida § 117.311 New Pass. The drawspan for the State Road 789 Drawbridge... must be passed at anytime....

  9. Message transfer in a communication network

    Indian Academy of Sciences (India)

    Satyam Mukherjee; Neelima Gupte

    2008-06-01

    We study message transfer in a 2-d communication network of regular nodes and randomly distributed hubs. We study both single message transfer and multiple message transfer on the lattice. The average travel time for single messages travelling between source and target pairs of fixed separations shows -exponential behaviour as a function of hub density with a characteristic power-law tail, indicating a rapid drop in the average travel time as a function of hub density. This power-law tail arises as a consequence of the log-normal distribution of travel times seen at high hub densities. When many messages travel on the lattice, a congestion-decongestion transition can be seen. The waiting times of messages in the congested phase show a Gaussian distribution, whereas the decongested phase shows a log-normal distribution. Thus the waiting time distributions carry the signature of congested or decongested behaviour.

  10. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed

    2012-08-19

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  11. The use of messages in altering risky gambling behavior in experienced gamblers.

    Science.gov (United States)

    Jardin, Bianca F; Wulfert, Edelgard

    2012-03-01

    The present study was an experimental analogue that examined the relationship between gambling-related irrational beliefs and risky gambling behavior. Eighty high-frequency gamblers were randomly assigned to four conditions and played a chance-based computer game in a laboratory setting. Depending on the condition, during the game a pop-up screen repeatedly displayed either accurate or inaccurate messages concerning the game, neutral messages, or no messages. Consistent with a cognitive-behavioral model of gambling, accurate messages that correctly described the random contingencies governing the game decreased risky gambling behavior. Contrary to predictions, inaccurate messages designed to mimic gamblers' irrational beliefs about their abilities to influence chance events did not lead to more risky gambling behavior than exposure to neutral or no messages. Participants in the latter three conditions did not differ significantly from one another and all showed riskier gambling behavior than participants in the accurate message condition. The results suggest that harm minimization strategies that help individuals maintain a rational perspective while gambling may protect them from unreasonable risk-taking. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  12. gender differences in short message language use

    Institute of Scientific and Technical Information of China (English)

    张丽君

    2011-01-01

    “language and gender” is one of the main research fields in sociolinguistics.with the introduction of short message service,another communication method appears.due to the problem of privacy aggression,few people have done researches on short message.so gender differences in short message language use are discussed here and at last reasons for the differences will also be generalized.

  13. Message framing in social networking sites.

    Science.gov (United States)

    Kao, Danny Tengti; Chuang, Shih-Chieh; Wang, Sui-Min; Zhang, Lei

    2013-10-01

    Online social networking sites represent significant new opportunities for Internet advertisers. However, results based on the real world cannot be generalized to all virtual worlds. In this research, the moderating effects of need for cognition (NFC) and knowledge were applied to examine the impact of message framing on attitudes toward social networking sites. A total of 216 undergraduates participated in the study. Results reveal that for social networking sites, while high-NFC individuals form more favorable attitudes toward negatively framed messages than positively framed messages, low-NFC individuals form more favorable attitudes toward positively framed messages than negatively framed messages. In addition, low-knowledge individuals demonstrate more favorable attitudes toward negatively framed messages than positively framed messages; however, the framing effect does not differentially affect the attitudes of high-knowledge individuals. Furthermore, the framing effect does not differentially affect the attitudes of high-NFC individuals with high knowledge. In contrast, low-NFC individuals with low knowledge hold more favorable attitudes toward positively framed messages than negatively framed messages.

  14. Short Message System (SMS) revisited

    DEFF Research Database (Denmark)

    Simonsen, Eivind Ortind; Dahl, Mads Ronald

    both students and educators are changing. There is a risk of information overload and difficulty ensuring, that important information passes through to all relevant individuals. This provides a challenge to institutions, which have an urgent need to pass on personal important information. One way......In a rapidly changing world of technology, communication and information is everywhere around us. Technology is constantly moving the frontier for what is possible and having an increasing impact on education. New inventions create new ways of effective mass communication and the expectations from...... route was chosen as part of improving the digital communication and information environment at the faculty. A SMS service was implemented and tested in three settings: course communication tool, University administration tool and as examination result tool....

  15. Triplets pass their pressure test

    CERN Multimedia

    2007-01-01

    All the LHC inner triplets have now been repaired and are in position. The first ones have passed their pressure tests with flying colours. The repaired inner triplet at LHC Point 1, right side (1R). Ranko Ostojic (on the right), who headed the team responsible for repairing the triplets, shows the magnet to Robert Zimmer, President of the University of Chicago and of Fermi Research Alliance, who visited CERN on 20th August.Three cheers for the triplets! All the LHC inner triplets have now been repaired and are in position in the tunnel. Thanks to the mobilisation of a multidisciplinary team from CERN and Fermilab, assisted by the KEK Laboratory and the Lawrence Berkeley National Laboratory (LBNL), a solution has been found, tested, validated and applied. At the end of March this year, one of the inner triplets at Point 5 failed to withstand a pressure test. A fault was identified in the supports of two out of the three quadruple magne...

  16. A Comparison of Parametric and Sample-Based Message Representation in Cooperative Localization

    Directory of Open Access Journals (Sweden)

    Jaime Lien

    2012-01-01

    Full Text Available Location awareness is a key enabling feature and fundamental challenge in present and future wireless networks. Most existing localization methods rely on existing infrastructure and thus lack the flexibility and robustness necessary for large ad hoc networks. In this paper, we build upon SPAWN (sum-product algorithm over a wireless network, which determines node locations through iterative message passing, but does so at a high computational cost. We compare different message representations for SPAWN in terms of performance and complexity and investigate several types of cooperation based on censoring. Our results, based on experimental data with ultra-wideband (UWB nodes, indicate that parametric message representation combined with simple censoring can give excellent performance at relatively low complexity.

  17. 33 CFR 110.196 - Sabine Pass Channel, Sabine Pass, Tex.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Sabine Pass Channel, Sabine Pass, Tex. 110.196 Section 110.196 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.196 Sabine Pass Channel, Sabine Pass,...

  18. 78 FR 62657 - Proposed Information Collection; The Interagency Access Pass and Senior Pass Application Processes

    Science.gov (United States)

    2013-10-22

    ... National Park Service Proposed Information Collection; The Interagency Access Pass and Senior Pass... Parks and Federal Recreation Lands Pass Program covers recreation opportunities on public lands managed... U.S. Forest Service. The passes provide U.S. citizens and visitors an affordable and convenient...

  19. Do Tele-Operators Learn to Better Judge Whether a Robot Can Pass Through an Aperture?

    Science.gov (United States)

    Schmidlin, Elizabeth A; Jones, Keith S

    2016-03-01

    This experiment examined whether tele-operators learn to better judge a robot's ability to pass through an aperture, hereafter referred to as pass-ability judgments, and detailed the nature of such learning. Jones, Johnson, and Schmidlin reported that tele-operators' pass-ability judgments did not improve over the course of their experiment, which was surprising. In each of seven blocks, tele-operators made pass-ability judgments about 10 apertures whose width varied. During each trial, participants drove the robot toward the aperture, answered yes or no to whether it could pass through that aperture, and then attempted to drive the robot through the aperture. Pass-ability judgments were analyzed in terms of percentage correct and absolute thresholds; the latter mimicked how Jones et al. analyzed their data. Learning was revealed when judgments were analyzed in terms of percentage correct and not when analyzed in terms of absolute thresholds. Further analyses revealed that tele-operators only improved their pass-ability judgments for impassable apertures, and tele-operators' perceptual sensitivity and response bias changed over the course of the experiment. The percentage correct-based analyses revealed that tele-operators learned to make better pass-ability judgments. Jones et al.'s decision to analyze their data in terms of absolute thresholds obscured learning. The present results suggested that researchers should employ percentage correct when studying learning in this domain, training protocols should focus on improving tele-operators' abilities to judge the pass-ability of impassable apertures, and tele-operators truly learned to better discriminate passable and impassable apertures. © 2015, Human Factors and Ergonomics Society.

  20. Arbitrated quantum signature scheme with message recovery

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-02-16

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission.

  1. 78 FR 52166 - Quantitative Messaging Research

    Science.gov (United States)

    2013-08-22

    ... COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures Trading Commission. ACTION: Notice... qualitative message testing research (for which CFTC received fast-track OMB approval) and is necessary to... research (for which CFTC received fast-track OMB approval) and is necessary to identify, with...

  2. Undergraduates' Text Messaging Language and Literacy Skills

    Science.gov (United States)

    Grace, Abbie; Kemp, Nenagh; Martin, Frances Heritage; Parrila, Rauno

    2014-01-01

    Research investigating whether people's literacy skill is being affected by the use of text messaging language has produced largely positive results for children, but mixed results for adults. We asked 150 undergraduate university students in Western Canada and 86 in South Eastern Australia to supply naturalistic text messages and to complete…

  3. Depth prediction model of nano-grooves fabricated by AFM-based multi-passes scratching method

    Energy Technology Data Exchange (ETDEWEB)

    Geng, Yanquan; Yan, Yongda, E-mail: yanyongda@hit.edu.cn; Yu, Bowen; Li, Jiran; Zhang, Qi; Hu, Zhenjiang; Zhao, Xuesen

    2014-09-15

    Highlights: • An AFM-based depth prediction model of nano-grooves for the atomic force microscopy (AFM)-based multi-passes scratching method is given. • The effect of the tip geometry is considered in the theoretical model. • A correction factor is introduced into the two-passes scratching model and the prediction error of the correction model is less than 10%. - Abstract: This paper proposes a nano-groove depth prediction model for the atomic force microscopy (AFM)-based multi-passes scratching method in which the AFM tip is considered as a cone with a spherical apex. The relationship between the normal load applied on the sample and the depth of the machined nano-groove is systematically investigated for the multi-passes scratching process. Nano-grooves are fabricated with several normal loads and two passes scratches on a 2A12 aluminum alloy surface to verify the developed models. Results show that the hardness may become larger near the machined region after one pass scratching test and a correction factor is introduced into the two passes scratching model which is as a function of the first pass machined depths of the nano-grooves. Based on the correction model, several nano-grooves with an expected depth are machined with different normal loads for each pass in the two passes scratching tests and the difference between the experiment results and the expected values is less than 10%. Actually, to machine a nano-groove with a desired depth, this method has the potential to distribute the appropriate normal load applied for each pass to reduce the tip wear and be used for nano-groove depth correction using the multi passes scratching technique.

  4. Photoacoustic Soot Spectrometer (PASS) Instrument Handbook

    Energy Technology Data Exchange (ETDEWEB)

    Dubey, M [Los Alamos National Laboratory; Springston, S [Brookhaven National Laboratory; Koontz, A [Pacific Northwest National Laboratory; Aiken, A [Los Alamos National Laboratory

    2013-01-17

    The photoacoustic soot spectrometer (PASS) measures light absorption by aerosol particles. As the particles pass through a laser beam, the absorbed energy heats the particles and in turn the surrounding air, which sets off a pressure wave that can be detected by a microphone. The PASS instruments deployed by ARM can also simultaneously measure the scattered laser light at three wavelengths and therefore provide a direct measure of the single-scattering albedo. The Operator Manual for the PASS-3100 is included here with the permission of Droplet Measurement Technologies, the instrument’s manufacturer.

  5. Message communications of particular message types between compute nodes using DMA shadow buffers

    Science.gov (United States)

    Blocksome, Michael A.; Parker, Jeffrey J.

    2010-11-16

    Message communications of particular message types between compute nodes using DMA shadow buffers includes: receiving a buffer identifier specifying an application buffer having a message of a particular type for transmission to a target compute node through a network; selecting one of a plurality of shadow buffers for a DMA engine on the compute node for storing the message, each shadow buffer corresponding to a slot of an injection FIFO buffer maintained by the DMA engine; storing the message in the selected shadow buffer; creating a data descriptor for the message stored in the selected shadow buffer; injecting the data descriptor into the slot of the injection FIFO buffer corresponding to the selected shadow buffer; selecting the data descriptor from the injection FIFO buffer; and transmitting the message specified by the selected data descriptor through the data communications network to the target compute node.

  6. Improving the Effectiveness of Fundraising Messages: The Impact of Charity Goal Attainment, Message Framing, and Evidence on Persuasion

    Science.gov (United States)

    Das, Enny; Kerkhof, Peter; Kuiper, Joyce

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a positive message frame. In addition, building on…

  7. Messages about appearance, food, weight and exercise in "tween" television.

    Science.gov (United States)

    Simpson, Courtney C; Kwitowski, Melissa; Boutte, Rachel; Gow, Rachel W; Mazzeo, Suzanne E

    2016-12-01

    Tweens (children ages ~8-14years) are a relatively recently defined age group, increasingly targeted by marketers. Individuals in this age group are particularly vulnerable to opinions and behaviors presented in media messages, given their level of cognitive and social development. However, little research has examined messages about appearance, food, weight, and exercise in television specifically targeting tweens, despite the popularity of this media type among this age group. This study used a content analytic approach to explore these messages in the five most popular television shows for tweens on the Disney Channel (as of 2015). Using a multiple-pass approach, relevant content in episodes from the most recently completed seasons of each show was coded. Appearance related incidents occurred in every episode; these most frequently mentioned attractiveness/beauty. Food related incidents were also present in every episode; typically, these situations were appearance and weight neutral. Exercise related incidents occurred in 53.3% of episodes; the majority expressed resistance to exercise. Weight related incidents occurred in 40.0% of the episodes; the majority praised the muscular ideal. Women were more likely to initiate appearance incidents, and men were more likely to initiate exercise incidents. These results suggest that programs specifically marketed to tweens reinforce appearance ideals, including stereotypes about female attractiveness and male athleticism, two constructs linked to eating pathology and body dissatisfaction. Given the developmental vulnerability of the target group, these findings are concerning, and highlight potential foci for prevention programming, including media literacy, for tweens. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. 78 FR 25432 - Sabine Pass LNG, L.P., Sabine Pass Liquefaction, LLC; Notice of Availability of the Environmental...

    Science.gov (United States)

    2013-05-01

    ... Energy Regulatory Commission Sabine Pass LNG, L.P., Sabine Pass Liquefaction, LLC; Notice of Availability... Sabine Pass Sabine Pass LNG, L.P. and Sabine Pass Liquefaction, LLC (Sabine Pass) in the above-referenced... construction at the existing Sabine Pass LNG terminal in Cameron Parish, Louisiana. The EA assesses...

  9. Congestion Control Strategy for Opportunistic Network Based on Message Values

    Directory of Open Access Journals (Sweden)

    Deng-yin Zhang

    2014-05-01

    Full Text Available To solve the congestion problem in opportunistic networks, a congestion control strategy based on message deleting and transferring(DATM is proposed. The congested node calculates the storage value of each message according to the forwarding probability and TTL of message, then deletes the message with the minimum storage value and transfers the message with the minimum forwarding probability to neighboring nodes. The neighboring nodes calculate the receiving value of the message according to the forwarding probability and free buffer capacity of this message. The congested node transfers the message to the neighboring node with the maximum receiving value. The message will be deleted when there is no neighboring node to receive it. The algorithm is more targeted at deleting messages. Besides, it combines the strategy of transferring message. Therefore, it can deal with the congestion more efficiently. The message arrival rate is improved significantly and the end-to-end delay is also reduced to some extent.

  10. Quantum interactive proofs with short messages

    CERN Document Server

    Beigi, Salman; Watrous, John

    2010-01-01

    This paper considers three variants of quantum interactive proof systems in which short (meaning logarithmic-length) messages are exchanged between the prover and verifier. The first variant is one in which the verifier sends a short message to the prover, and the prover responds with an ordinary, or polynomial-length, message; the second variant is one in which any number of messages can be exchanged, but where the combined length of all the messages is logarithmic; and the third variant is one in which the verifier sends polynomially many random bits to the prover, who responds with a short quantum message. We prove that in all of these cases the short messages can be eliminated without changing the power of the model, so the first variant has the expressive power of QMA and the second and third variants have the expressive power of BQP. These facts are proved through the use of quantum state tomography, along with the finite quantum de Finetti theorem for the first variant.

  11. Communicating Concepts about Altruism in Interstellar Messages

    Science.gov (United States)

    Vakoch, Douglas A.

    2002-01-01

    This project identifies key principles of altruism that can be translated into interstellar messages for communication with extraterrestrial intelligence. The message contents will focus specifically on the evolution of altruism, drawing on recent insights in evolutionary biology, with particular emphasis on sociobiological accounts of kin selection and reciprocal altruism. This focus on altruism for message contents has several advantages. First, the subject can be translated into interstellar messages both via an existing formal interstellar language and via pictorial messages. For example, aspects of reciprocal altruism can be described through mathematical modeling, such as game theoretic approaches, which in turn can be described readily in the interstellar language Lincos. Second, concentrating on altruism as a message content may facilitate communications with extraterrestrial intelligence. Some scientists have argued that humans may be expected to communicate something about their moral status and development in an exchange with extraterrestrials. One of the most salient ways that terrestrial and extraterrestrial civilizations might be expected to evaluate one another is in terms of ethical motivations. Indeed, current search strategies assume some measure of altruism on the part of transmitting civilizations; with no guarantee of a response, the other civilization would be providing information to us with no direct payoff. Thus, concepts about altruism provide an appropriate content for interstellar messages, because the concepts themselves might be understood by extraterrestrial civilizations.

  12. Message composition and its application to event- driven system construction

    Directory of Open Access Journals (Sweden)

    A. Colesnicov

    1995-11-01

    Full Text Available Due to the object-oriented technology of event-driven system construction, the message composition may be used. Rules of message composition are alike those of program statement composition. The interpreting message queue is described which produces primitive messages from compound ones. The proposed conception lets to include the information on message dependence to compound messages themselves, which permits to simplify programs.

  13. Management and Archiving e-mail Messages in Governmental Organization

    Directory of Open Access Journals (Sweden)

    Ashraf Mohamed A.Mohsen

    2006-06-01

    Full Text Available The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  14. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  15. 33 CFR 117.487 - Pierre Pass.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Pierre Pass. 117.487 Section 117.487 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.487 Pierre Pass. The draw of the S70...

  16. Ulysses Passes South Pole of Sun

    Institute of Scientific and Technical Information of China (English)

    程林

    1995-01-01

    On the 14th of September,1994, the fastest scientific instrument in space passed the south pole of the Sun,a place where no human-made object has been before. A spaceprobe called Ulysses made the polar pass at about midday as it continued to collect data on the solar wind,a stream of high-energy sub-atomic

  17. 33 CFR 117.484 - Pass Manchac.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Pass Manchac. 117.484 Section 117.484 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.484 Pass Manchac. The draw of the...

  18. 33 CFR 117.303 - Matlacha Pass.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Matlacha Pass. 117.303 Section 117.303 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Florida § 117.303 Matlacha Pass. The draw of the...

  19. Evaluation of Sexual Communication Message Strategies

    Directory of Open Access Journals (Sweden)

    Khan Munziba

    2011-05-01

    Full Text Available Abstract Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  20. Battle of Kasserine Pass: Defeat is a Matter of Scale

    Science.gov (United States)

    2016-05-26

    America’s First Battles, 247. 7 Ernest Harmon, Combat Commander: Autobiography of a Soldier (New Jersey: Prentice- Hall , 1970), 146. 5 ENGIMA. The...Armored Division on February 14. The 10th Panzer Division quickly destroyed the ten M3 Stuart tanks of the 2nd Battalion, 168th Regimental Combat Team...Kasserine Pass.44 He is correct if he is comparing the diminutive M3 Stuart or the cobbled together M3 Grant/Lee to the German Panzer IV. The M4 Sherman

  1. The Zen Scavenger Hunt: Constructing and Presenting Persuasive Messages

    Science.gov (United States)

    Hamilton, Heidi

    2017-01-01

    Courses: Persuasion; Persuasive Speaking. Objectives: Students will demonstrate the ability to apply persuasive concepts in constructing persuasive messages creatively, and students will present and analyze their persuasive messages.

  2. Cockpit Interfaces, Displays, and Alerting Messages for the Interval Management Alternative Clearances (IMAC) Experiment

    Science.gov (United States)

    Baxley, Brian T.; Palmer, Michael T.; Swieringa, Kurt A.

    2015-01-01

    This document describes the IM cockpit interfaces, displays, and alerting capabilities that were developed for and used in the IMAC experiment, which was conducted at NASA Langley in the summer of 2015. Specifically, this document includes: (1) screen layouts for each page of the interface; (2) step-by-step instructions for data entry, data verification and input error correction; (3) algorithm state messages and error condition alerting messages; (4) aircraft speed guidance and deviation indications; and (5) graphical display of the spatial relationships between the Ownship aircraft and the Target aircraft. The controller displays for IM will be described in a separate document.

  3. Analysis and Application of Covert Channels of Internet Control Message Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Xueguang; ZHANG Huanguo

    2006-01-01

    Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channel's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network.

  4. TXT4Tots Message Library - Spanish

    Data.gov (United States)

    U.S. Department of Health & Human Services — TXT4Tots is a library of short, evidence-based messages focused on nutrition and physical activity. The library is targeted to parents and caregivers of children,...

  5. TXT4Tots Message Library - English

    Data.gov (United States)

    U.S. Department of Health & Human Services — TXT4Tots is a library of short, evidence-based messages focused on nutrition and physical activity. The library is targeted to parents and caregivers of children,...

  6. Text messaging is a useful reminder tool.

    Science.gov (United States)

    Balzer, Ben W R; Kelly, Patrick J; Hazell, Philip; Paxton, Karen; Hawke, Catherine; Steinbeck, Katharine S

    2014-07-01

    Longitudinal studies of adolescents must be 'adolescent-friendly', to collect data and to encourage maintenance in the study cohort. Text messaging may offer a feasible means to do both. Adolescents in the Adolescent Rural Cohort, Hormones and Health, Education, Environments and Relationships (ARCHER) study (n=342) are sent automated text messages every 3 months, prompting biological specimen collection. A total of 99.2% of participants (or their parents) owned a mobile phone, of which 89.1% of participants responded to text messages and 97.3% of intended urine samples were collected. The average time to provide a urine sample after prompting correlated with time to reply to Short Message Service (SMS). This study shows SMS can be used effectively in longitudinal research involving adolescents and is feasible and useful as a reminder tool for regular biological specimen collection.

  7. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  8. Influences of Product Involvement, Environmental Message and ...

    African Journals Online (AJOL)

    Influences of Product Involvement, Environmental Message and Green ... The study employs an empirical research by 2x2x2 between subject factorial design. ... Advertising Appeals, Green Marketing, Elaboration Likelihood Model (ELM) ...

  9. QuitNowTXT Text Messaging Library

    Data.gov (United States)

    U.S. Department of Health & Human Services — Overview: The QuitNowTXT text messaging program is designed as a resource that can be adapted to specific contexts including those outside the United States and in...

  10. Continuation-Passing C, compiling threads to events through continuations

    CERN Document Server

    Kerneis, Gabriel

    2010-01-01

    In this paper, we introduce Continuation Passing C (CPC), a programming language for concurrent systems in which native and cooperative threads are unified and presented to the programmer as a single abstraction. The CPC compiler uses a compilation technique, based on the CPS transform, that yields efficient code and an extremely lightweight representation for contexts. We provide a complete proof of the correctness of our compilation scheme. We show in particular that lambda-lifting, a common compilation technique for functional languages, is also correct in an imperative language like C, under some conditions enforced by the CPC compiler. The current CPC compiler is mature enough to write substantial programs such as Hekate, a highly concurrent BitTorrent seeder. Our benchmark results show that CPC is as efficient, while significantly cheaper, as the most efficient thread libraries available.

  11. Messaging to Extra-Terrestrial Intelligence

    CERN Document Server

    Zaitsev, A

    2006-01-01

    Throughout the entire history of terrestrial civilization, only four projects involving transmitting of interstellar radio messages (IRMs) have yet been fully developed and realized. Nevertheless, we should understand a simple thing -- if all civilizations in the Universe are only recipients, and not message-sending civilizations, than no SETI searches make any sense. We present the theory and methodology of composing and transmitting of future IRMs.

  12. Bolt elongation of variable message signs

    Science.gov (United States)

    Scancella, Robert J.; Skalla, Robert

    1998-03-01

    The purpose of this paper is to describe existing problem areas in the manufacturing and erecting of variable message signs (VMS) on cantilever truss units. VMS are electronic message boards that are rectangular in shape and weigh between 3,000 and 5,000 pounds. The structures that were inspected for this paper are part of the Route 80 Magic Project and the Traffic Signal Contract #25 (Route 37).

  13. Nutrition Education Research Brief: Message Framing, Use of Interactive Technology to Tailor Messages, and Intervention Intensity

    OpenAIRE

    Mary Kay Fox; Charlotte Hanson; Ronette Briefel

    2007-01-01

    This research brief is intended to assist nutrition educators in assessing whether specific characteristics of nutrition messages promote desired dietary behavior changes. Based on a computerized literature search targeting peer-reviewed journal articles, it highlights three topics pertinent to the design of nutrition education programs—message framing, use of interactive technology to tailor messages, and intervention intensity. While some promising results were found to be associated with...

  14. Gender messages in contemporary popular Malay songs

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2013-07-01

    Full Text Available Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992 method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. The results showed that the messages revolve mainly around socially constructed gender roles and expectations in romantic relationships. Gender stereotypes are also used in the songs to reinforce men’s and women’s roles in romantic relationships. The results also showed that, while listeners acknowledge the songs’ messages about gender, their own perceptions of gender and what it means to be a gendered being in today’s world are neither represented nor discussed fully in the songs analysed. It is hoped the findings from this, particularly the mismatch between projected and perceived notions of gender, contribute to the field of popular Malay music studies in particular, and popular music studies in general where gender messages in popular songs and their influence on listeners’ perceptions of their own gender is concerned.

  15. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  16. Self-regulating Message Throughput in Enterprise Messaging Servers – A Feedback Control Solution

    Directory of Open Access Journals (Sweden)

    Ravi Kumar G

    2012-01-01

    Full Text Available Enterprise Messaging is a very popular message exchange concept in asynchronous distributed computing environments. The Enterprise Messaging Servers are heavily used in building business critical Enterprise applications such as Internet based Order processing systems, pricing distribution of B2B, geographically dispersed enterprise applications. It is always desirable that Messaging Servers exhibit high performance to meet the Service Level Agreements (SLAs. There are investigations in this area of managing the performance of the distributed computing systems in different ways such as the IT administrators configuring and tuning the Messaging Servers parameters, implement complex conditional programming to handle the workload dynamics. But in practice it is extremely difficult to handle such dynamics of changing workloads in order to meet the performance requirements. Additionally it is challenging to cater to the future resource requirements based on the future workloads. Though there have been attempts to self-regulate the performance of Enterprise Messaging Servers, there is a limited investigation done in exploring feedback control systems theory in managing the Messaging Servers performance. We propose an adaptive control based solution to not only manage the performance of the servers to meet SLAs but also to pro-actively self-regulate the performance such that the Messaging Servers are capable to meet the current and future workloads. We implemented and evaluated our solution and observed that the control theory based solution will improve the performance of Enterprise Messaging Servers significantly.

  17. 77 FR 65546 - Sabine Pass Liquefaction, LLC; Sabine Pass LNG, L.P.; Notice of Petition To Amend Authorizations...

    Science.gov (United States)

    2012-10-29

    ... Energy Regulatory Commission Sabine Pass Liquefaction, LLC; Sabine Pass LNG, L.P.; Notice of Petition To... Pass Liquefaction, LLC and Sabine Pass LNG, L.P. (collectively, Sabine Pass), 700 Milam Street, Suite... and operate certain related facilities (Modification Project) at the existing Sabine Pass LNG...

  18. 78 FR 62319 - Golden Pass Products, LLC, Golden Pass Pipeline, LLC; Notice of Intent To Prepare an...

    Science.gov (United States)

    2013-10-16

    ... Energy Regulatory Commission Golden Pass Products, LLC, Golden Pass Pipeline, LLC; Notice of Intent To Prepare an Environmental Assessment for the Planned Golden Pass LNG Export Project and Golden Pass Export... operation of the Golden Pass Liquefied Natural Gas (LNG) Project and Golden Pass Export Pipeline...

  19. 78 FR 66909 - Sabine Pass Liquefaction, LLC; Sabine Pass LNG, L.P.; Notice of Application to Amend...

    Science.gov (United States)

    2013-11-07

    ... Energy Regulatory Commission Sabine Pass Liquefaction, LLC; Sabine Pass LNG, L.P.; Notice of Application... Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P. (collectively, Sabine Pass), 700 Milam Street...,006 Bcf per year). Sabine Pass' requested increase in authorized capacity is an increase from...

  20. How to pass higher English colour

    CERN Document Server

    Bridges, Ann

    2009-01-01

    How to Pass is the Number 1 revision series for Scottish qualifications across the three examination levels of Standard Grade, Intermediate and Higher! Second editions of the books present all of the material in full colour for the first time.

  1. Automated Procedure for Roll Pass Design

    Science.gov (United States)

    Lambiase, F.; Langella, A.

    2009-04-01

    The aim of this work has been to develop an automatic roll pass design method, capable of minimizing the number of roll passes. The adoption of artificial intelligence technologies, particularly expert systems, and a hybrid model for the surface profile evaluation of rolled bars, has allowed us to model the search for the minimal sequence with a tree path search. This approach permitted a geometrical optimization of roll passes while allowing automation of the roll pass design process. Moreover, the heuristic nature of the inferential engine contributes a great deal toward reducing search time, thus allowing such a system to be employed for industrial purposes. Finally, this new approach was compared with other recently developed automatic systems to validate and measure possible improvements among them.

  2. Torch Relay:Love Is Passing on

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ May is not an ordinary month for the whole China, as the 8.0-magnitude earthquake hit sonthwest of China and shocked thc whole nation. And now, the torch relay in China is endowed with more responsibility and significance: to pass on the passion, also the compassion. No matter the torch relay is paused or going on, Olym-pic spirit is passing on. So is the love.

  3. SCALAR MULTI-PASS ATOMIC MAGNETOMETER

    Science.gov (United States)

    2017-08-01

    active volume including relaxation on cell walls. 4 Approved for public release; distribution is unlimited. Fig. 6...measurements, and suppression of spin-exchange relaxation to achieve the highest sensitivity per unit volume. We developed a new multi-pass cell geometry...suppression of spin-exchange relaxation to achieve the highest sensitivity per unit volume. During the project we developed a new multi-pass cell geometry

  4. An Analysis of Normative Messages in Signs at Recreation Settings.

    Science.gov (United States)

    Winter, Patricia L.; Cialdini, Robert B.; Bator, Renee J.; Rhoads, Kelton; Sagarin, Brad J.

    1998-01-01

    A systematic evaluation of signs and messages at 42 recreation areas in California and Arizona focused on type of site, managing agency, density of message locales, sign attributes, and message content. The vast majority of messages presented behavioral commands and were negatively worded. This striking imbalance points to concerns in visitor…

  5. Replacing the Message Service Component In an Integration Framework.

    Science.gov (United States)

    1994-10-01

    routine: add- eventO if (event->type == Message && event->tt~pattern 1= NULL) tt-pattern-register(event->tt~pattern); A..4 ToolTalk Message Pattern...Message Pattern Destruction A.5.1 routine: free- eventO if (event->type == Message && event->tt~pattern 1= NULL) tt-free (event->tt~pattern); A.6

  6. The Physical Therapy and Society Summit (PASS) Meeting: observations and opportunities.

    Science.gov (United States)

    Kigin, Colleen M; Rodgers, Mary M; Wolf, Steven L

    2010-11-01

    The construct of delivering high-quality and cost-effective health care is in flux, and the profession must strategically plan how to meet the needs of society. In 2006, the House of Delegates of the American Physical Therapy Association passed a motion to convene a summit on "how physical therapists can meet current, evolving, and future societal health care needs." The Physical Therapy and Society Summit (PASS) meeting on February 27-28, 2009, in Leesburg, Virginia, sent a clear message that for physical therapists to be effective and thrive in the health care environment of the future, a paradigm shift is required. During the PASS meeting, participants reframed our traditional focus on the physical therapist and the patient/client (consumer) to one in which physical therapists are an integral part of a collaborative, multidisciplinary health care team with the health care consumer as its focus. The PASS Steering Committee recognized that some of the opportunities that surfaced during the PASS meeting may be disruptive or may not be within the profession's present strategic or tactical plans. Thus, adopting a framework that helps to establish the need for change that is provocative and potentially disruptive to our present care delivery, yet prioritizes opportunities, is a critical and essential step. Each of us in the physical therapy profession must take on post-PASS roles and responsibilities to accomplish the systemic change that is so intimately intertwined with our destiny. This article offers a perspective of the dynamic dialogue and suggestions that emerged from the PASS event, providing further opportunities for discussion and action within our profession.

  7. Supervising simulations with the Prodiguer Messaging Platform

    Science.gov (United States)

    Greenslade, Mark; Carenton, Nicolas; Denvil, Sebastien

    2015-04-01

    At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of High Performance Computing (HPC) environments spread throughout France. The IPSL's simulation execution runtime is called libIGCM (library for IPSL Global Climate Modeling group). libIGCM has recently been enhanced so as to support realtime operational use cases. Such use cases include simulation monitoring, data publication, environment metrics collection, automated simulation control … etc. At the core of this enhancement is the Prodiguer messaging platform. libIGCM now emits information, in the form of messages, for remote processing at IPSL servers in Paris. The remote message processing takes several forms, for example: 1. Persisting message content to database(s); 2. Notifying an operator of changes in a simulation's execution status; 3. Launching rollback jobs upon simulation failure; 4. Dynamically updating controlled vocabularies; 5. Notifying downstream applications such as the Prodiguer web portal; We will describe how the messaging platform has been implemented from a technical perspective and demonstrate the Prodiguer web portal receiving realtime notifications.

  8. Effects of Electronic Word - of - Mouth Messages

    Directory of Open Access Journals (Sweden)

    Choong Hoon Lim

    2012-01-01

    Full Text Available With the increased usage of online technologies, there has been an escalation of Electronic Word - of –Mouth (eWOM messages related to sport products and services offered and consumed. Therefore, in this original investigation by applying eWOM to the sport industry, this study examined how the combination of the quality of the eWOM message and the provider of the eWOM message affects purchaseintentions depending on the expertise level of the consumer. This study – which involved the collection of data from 134 students at a large university situated in the Midwest of the United States – utilized repeated measures of Analysis of Variance (ANOVA with tripartite groups of expertise and experimental conditions as independent variables. Purchase intention was the dependent variables. The results indicated that the quality of the eWOM message moderated the effect of the provider of the eWOM message. The subject’s level of expertise also had a moderating role on purchase intention.

  9. The message development tool: a case for effective operationalization of messaging in social marketing practice.

    Science.gov (United States)

    Mattson, Marifran; Basu, Ambar

    2010-07-01

    That messages are essential, if not the most critical component of any communicative process, seems like an obvious claim. More so when the communication is about health--one of the most vital and elemental of human experiences (Babrow & Mattson, 2003). Any communication campaign that aims to change a target audience's health behaviors needs to centralize messages. Even though messaging strategies are an essential component of social marketing and are a widely used campaign model, health campaigns based on this framework have not always been able to effectively operationalize this key component, leading to cases where initiating and sustaining prescribed health behavior has been difficult (MacStravic, 2000). Based on an examination of the VERB campaign and an Australian breastfeeding promotion campaign, we propose a message development tool within the ambit of the social marketing framework that aims to extend the framework and ensure that the messaging component of the model is contextualized at the core of planning, implementation, and evaluation efforts.

  10. Scalable Replay with Partial-Order Dependencies for Message-Logging Fault Tolerance

    Energy Technology Data Exchange (ETDEWEB)

    Lifflander, Jonathan; Meneses, Esteban; Menon, Harshita; Miller, Phil; Krishnamoorthy, Sriram; Kale, Laxmikant

    2014-09-22

    Deterministic replay of a parallel application is commonly used for discovering bugs or to recover from a hard fault with message-logging fault tolerance. For message passing programs, a major source of overhead during forward execution is recording the order in which messages are sent and received. During replay, this ordering must be used to deterministically reproduce the execution. Previous work in replay algorithms often makes minimal assumptions about the programming model and application in order to maintain generality. However, in many cases, only a partial order must be recorded due to determinism intrinsic in the code, ordering constraints imposed by the execution model, and events that are commutative (their relative execution order during replay does not need to be reproduced exactly). In this paper, we present a novel algebraic framework for reasoning about the minimum dependencies required to represent the partial order for different concurrent orderings and interleavings. By exploiting this theory, we improve on an existing scalable message-logging fault tolerance scheme. The improved scheme scales to 131,072 cores on an IBM BlueGene/P with up to 2x lower overhead than one that records a total order.

  11. Randomized controlled trial of a messaging intervention to increase fruit and vegetable intake in adolescents: Affective versus instrumental messages.

    Science.gov (United States)

    Carfora, Valentina; Caso, Daniela; Conner, Mark

    2016-11-01

    The present research aimed to test the efficacy of affective and instrumental text messages compared with a no-message control as a strategy to increase fruit and vegetable intake (FVI) in adolescents. A randomized controlled trial was used test impact of different text messages compared with no message on FVI over a 2-week period. A total of 1,065 adolescents (14-19 years) from a high school of the South of Italy completed the baseline questionnaire and were randomly allocated to one of three conditions: instrumental messages (N = 238), affective messages (N = 300), and no messages (N = 521). Students in the message conditions received one message each day over a 2-week period. The messages targeted affective (affective benefits) or instrumental (instrumental benefits) information about FVI. Self-reported FVI at 2 weeks was the key dependent variable. Analyses were based on the N = 634 who completed all aspects of the study. Findings showed that messages significantly increased FVI, particularly in the affective condition and this effect was partially mediated by changes in affective attitude and intentions towards FVI. Text messages can be used to increase FVI in adolescents. Text messages based on affective benefits are more effective than text messages based on instrumental benefits. Statement of contribution What is already known on this subject? Text messages have been shown to promote positive change in health behaviours. However, the most appropriate target for such text messages is less clear although targeting attitudes may be effective. What does this study add? This randomized controlled study shows that text messages targeting instrumental or affective attitudes produce changes in fruit and vegetable intake (FVI) in adolescents. Text messages targeting affective attitudes are shown to be more effective than text messages targeting instrumental attitudes. The effect of affective text messages on FVI was partially mediated by changes in

  12. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  13. Short Message Service using SMS Gateway

    Directory of Open Access Journals (Sweden)

    Veena K.Katankar

    2010-08-01

    Full Text Available Short message service (SMS will play a very vital role in the future business areas whose are popularly known as mobile banking, organizational marketing system etc. For this future, SMS could make a mobile device in a business tool as it has the availability and the effectiveness. This thesis is about software development that is based on short messaging service (SMS system for delivering messages through SMS gateway. Main goal of proposed system is to provide multi level local authentication to the SMS gateway service. This service can be implemented in any multi departmental organization whereSMS service is used for notification system and marketing purpose. Proposed system has web interface and the encryption method for providing service.

  14. A Secure Short Message Communication Protocol

    Institute of Scientific and Technical Information of China (English)

    Chao-Wen Chang; Heng Pan; Hong-Yong Jia

    2008-01-01

    According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway are realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application.

  15. EXCHANGE RATE PASS-THROUGH, IMPORT PRICES AND INFLATION UNDER STRUCTURAL BREAKS

    Directory of Open Access Journals (Sweden)

    Arintoko Arintoko

    2011-09-01

    Full Text Available This research estimates the exchange rate pass-through (ERPT into import prices by applying an extension of the basic model of ERPT on Indonesia. It estimates models of cointegration and error-correction mechanism (ECM, with and without structural breaks. It uses the techniques of Zivot-Andrews and of Gregory-Hansen to test for structural breaks and cointegration with the structural breaks, respectively. The results show that with the control variables, inflation affects import prices and lower the pass-through for short term, in a condition of free floating exchange rate. In the short term, with the inclusion of structural breaks, significant inflation affects import prices and lowers the ERPT coefficient.  Keywords:    Exchange rate pass-through, inflation, structural breaks, cointegration, error-correction mechanismJEL classification numbers: C22, C32, E31, F41

  16. Are Dual-Method Messages Undermining STI/HIV Prevention?

    Directory of Open Access Journals (Sweden)

    Ann O'Leary

    2011-01-01

    Full Text Available Adolescent girls and young women who are at risk for unplanned pregnancy and sexually transmitted infection (STI, including HIV, are frequently counseled to use a hormonal contraceptive to protect against the former and condoms to protect against the latter, for exampe, American College of Obstetricians and Gynecologists, 2011. The present paper reviews the literature on multiple risk messages, compliance with this dual-use recommendation, predictors of dual use, and interventions developed to encourage dual use. Data indicate that simultaneous use of these two methods is not common, and that efforts to encourage dual use have not yielded promising results. An alternative is to recommend condom use alone, since condoms protect very well against STI and HIV, and quite well against pregnancy when used consistently and correctly. The availability of emergency contraception is relevant here. Research utilizing a randomized controlled trial is recommended.

  17. Optimizing of the functionality of fish passes; Optimierung der Auffindbarkeit von Fischaufstiegsanlagen

    Energy Technology Data Exchange (ETDEWEB)

    Sobirey, Axel [WAGU GmbH Kassel (Germany)

    2011-07-01

    An important criterion of the correct operation of fish passes is their ease of localize for fishes and benthos willing to migrate upstream. If in practice an optimal solution can not be realized because of local restrictions, some aids can improve the functionality of fish ladders, such as a supplied tube, a fish attracting pump or a useful positioned fish deflector. (orig.)

  18. A Simple Correctness Proof of the Direct-Style Transformation

    DEFF Research Database (Denmark)

    Nielsen, Lasse Riechstein

    2002-01-01

    We build on Danvy and Nielsen's first-order program transformation into continuation-passing style (CPS) to present a new correctness proof of the converse transformation, i.e., a one-pass transformation from CPS back to direct style. Previously published proofs were based on, e.g., a one...

  19. Detecting influenza outbreaks by analyzing Twitter messages

    CERN Document Server

    Culotta, Aron

    2010-01-01

    We analyze over 500 million Twitter messages from an eight month period and find that tracking a small number of flu-related keywords allows us to forecast future influenza rates with high accuracy, obtaining a 95% correlation with national health statistics. We then analyze the robustness of this approach to spurious keyword matches, and we propose a document classification component to filter these misleading messages. We find that this document classifier can reduce error rates by over half in simulated false alarm experiments, though more research is needed to develop methods that are robust in cases of extremely high noise.

  20. EDITORIAL: Message from the Editor Message from the Editor

    Science.gov (United States)

    Thomas, Paul

    2010-02-01

    passing away of the following former members of the Board of Editors: Ravindra Sudan (1975 to 1984), Joe Di Marco (1984 to 1991) and Roy Bickerton (1975 to 1986). The Nuclear Fusion Office and IOP Publishing Just as the journal depends on the authors and referees, so its success is also due to the tireless and largely unsung efforts of the Nuclear Fusion Office in Vienna and IOP Publishing in Bristol. I would like to express my personal thanks to Maria Bergamini-Roedler, Katja Haslinger, Sophy Le Masurier, Yasmin McGlashan, Caroline Wilkinson, Sarah Ryder, Rachael Kriefman and Katie Gerrard for the support that they have given to me, the authors and the referees. Season's Greetings The January special edition delayed this editorial for a month. Nevertheless, I would like belatedly to wish our readers, authors, referees and Board of Editors the season's greetings and thank them for their contributions to Nuclear Fusion in 2009.

  1. Efficient, Narrow-Pass-Band Optical Filters

    Science.gov (United States)

    Sandford, Stephen P.

    1996-01-01

    Optical filters with both narrow pass bands and high efficiencies fabricated to design specifications. Offer tremendous improvements in performance for number of optical (including infrared) systems. In fiber-optic and free-space communication systems, precise frequency discrimination afforded by narrow pass bands of filters provide higher channel capacities. In active and passive remote sensors like lidar and gas-filter-correlation radiometers, increased efficiencies afforded by filters enhance detection of small signals against large background noise. In addition, sizes, weights, and power requirements of many optical and infrared systems reduced by taking advantage of gains in signal-to-noise ratios delivered by filters.

  2. Contact conditions in skin-pass rolling

    DEFF Research Database (Denmark)

    Kijima, Hideo; Bay, Niels

    2007-01-01

    The special contact conditions in skin-pass rolling of steel strip is analysed by studying plane strain upsetting of thin sheet with low reduction applying long narrow tools and dry friction conditions. An extended sticking region is estimated by an elasto-plastic FEM analysis of the plane strain...... upsetting. This sticking region causes a highly inhomogeneous elasto-plastic deformation with large influence of work-hardening and friction. A numerical analysis of skin-pass rolling shows the same contact conditions, i.e. an extended sticking region around the center of the contact zone. The calculated...

  3. All Pass Network Based MSO Using OTRA

    Directory of Open Access Journals (Sweden)

    Rajeshwari Pandey

    2015-01-01

    Full Text Available This paper presents multiphase sinusoidal oscillators (MSOs using operational transresistance amplifier (OTRA based all pass networks. Both even and odd phase oscillations of equal amplitudes which are equally spaced in phase can be produced using single all pass section per phase. The proposed MSOs provide voltage output and can readily be used for driving voltage input circuits without increasing component count. The effect of nonideality of OTRA on the circuit performance is also analysed. The functionality of the proposed circuit is verified through PSPICE simulations.

  4. Message from%致辞

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    标准典范的发展,此典范可在示范工程完全实施前被进行尝试。 最后,我衷心祝愿研讨会圆满成功,我希望能在今后的项目进程中不断获得对该项目的报道。 2001年3月6日 Message from Carma Elliot Consul General, British Consulate General Chongqing Distinguished guests, ladies and gentlemen: I would like to commence by thanking the organizers for inviting me to attend this important seminar for the future of the quality and affordability of housing in Chongqing. I would also like to thank the Municipal Government and the Mayor, the Chongqing Construction Commission, together with the Ministry of Construction, local companies and developers and Chongqing University for supporting this event. The British Consulate General was delighted to assist in the initial stages of this project and we would like to continue our support by encouraging the involvement of British expertise and companies in the development of industrialized housing in Chongqing. There have been advances in the provision of industrialized housing in the United Kingdom, especially in lightweight steel frame construction and innovative cladding using re-cylced materials and we see these as particularly relevant to Chongqing. The co-operation between Chongqing University, Hong Kong Polytechnic University and South Bank University in London has been quite exceptional and strong relationships have been built. These are beginning to bear fruit and have led to notable achievements already involving research and a masters degree programme in construction project management. It is also pleasing that industrial and commercial partners have joined the universities in what has become known as the Chongqing Project. I very much approve of, and appreciate, the involvement of local companies and developers, and the support of Battle McCarthy, Gammon Construction, Building Research Establishment and J. Prewer Associates, all of whom are participating in the

  5. Message from%致辞

    Institute of Scientific and Technical Information of China (English)

    吴中福

    2001-01-01

    经验和技术,充分利用地方资源提供了很好的机会。我相信,通过这次研讨会,通过相互学习、互相交流,国内外政府、企业、以及专家学者必能携手并进,为在此领域的进一步的合作,为建设重庆美好的未来做出贡献! 藉此,我谨祝国际研讨会圆满成功。 谢谢! 2001年3月6日 Message from WU Zhong-fu President of Chongqing University Distinguished guests, ladies and gentlemen: Good morning! It is my great pleasure to speak at "International Seminar on Industrialised Housing in Chongqing" at the beginning of the spring of this promising new century. I'd like to take this opportunity to extend my warmest welcome to all the foreign and Chinese leaders, experts, researchers and practitioners attending this seminar. Chongqing is the central city, traffic hinge and foreign trade port along Yangtze River and in the southwest part of China. Since the establishment of China, great changes have taken place and remarkable achievements have been acquired in economy, city construction, education and other aspects. Though development and progress have been made in housing development, the level of techniques, management and the quality of people engaged in construction need to be improved. In the 21st century, more and more specialists and scholars have realised that promoting housing industrialisation is an effective way to meet the need for houses from local people, since the traditional way of housing building can not reach the requirement of the quantity and quality of houses in Chongqing. As one of the biggest comprehensive universities in the west, Chongqing University possesses great strength in scientific research and technological innovation. Especially after the merge with former Chongqing Jianzhu University and Chongqing Civil Engineering &Technology College in 2000, 23 faculties have been set up with varieties of disciplines and subjects. Such a reform has greatly enhanced the

  6. Developing effective messages about potable recycled water: The importance of message structure and content

    Science.gov (United States)

    Price, J.; Fielding, K. S.; Gardner, J.; Leviston, Z.; Green, M.

    2015-04-01

    Community opposition is a barrier to potable recycled water schemes. Effective communication strategies about such schemes are needed. Drawing on social psychological literature, two experimental studies are presented, which explore messages that improve public perceptions of potable recycled water. The Elaboration-Likelihood Model of information processing and attitude change is tested and supported. Study 1 (N = 415) premeasured support for recycled water, and trust in government information at Time 1. Messages varied in complexity and sidedness were presented at Time 2 (3 weeks later), and support and trust were remeasured. Support increased after receiving information, provided that participants received complex rather than simple information. Trust in government was also higher after receiving information. There was tentative evidence of this in response to two-sided messages rather than one-sided messages. Initial attitudes to recycled water moderated responses to information. Those initially neutral or ambivalent responded differently to simple and one-sided messages, compared to participants with positive or negative attitudes. Study 2 (N = 957) tested the effectiveness of information about the low relative risks, and/or benefits of potable recycled water, compared to control groups. Messages about the low risks resulted in higher support when the issue of recycled water was relevant. Messages about benefits resulted in higher perceived issue relevance, but did not translate into greater support. The results highlight the importance of understanding people's motivation to process information, and need to tailor communication to match attitudes and stage of recycled water schemes' development.

  7. 76 FR 9573 - Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P.; Notice of Application

    Science.gov (United States)

    2011-02-18

    ... Energy Regulatory Commission Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P.; Notice of Application Take notice that on January 31, 2011, Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P... (Liquefaction Project) at the existing Sabine Pass LNG Terminal, located in Cameron Parish, Louisiana....

  8. What's in a message? Delivering sexual health promotion to young people in Australia via text messaging

    Directory of Open Access Journals (Sweden)

    Hellard Margaret E

    2010-12-01

    Full Text Available Abstract Background Advances in communication technologies have dramatically changed how individuals access information and communicate. Recent studies have found that mobile phone text messages (SMS can be used successfully for short-term behaviour change. However there is no published information examining the acceptability, utility and efficacy of different characteristics of health promotion SMS. This paper presents the results of evaluation focus groups among participants who received twelve sexual health related SMS as part of a study examining the impact of text messaging for sexual health promotion to on young people in Victoria, Australia. Methods Eight gender-segregated focus groups were held with 21 males and 22 females in August 2008. Transcripts of audio recordings were analysed using thematic analysis. Data were coded under one or more themes. Results Text messages were viewed as an acceptable and 'personal' means of health promotion, with participants particularly valuing the informal language. There was a preference for messages that were positive, relevant and short and for messages to cover a variety of topics. Participants were more likely to remember and share messages that were funny, rhymed and/or tied into particular annual events. The message broadcasting, generally fortnightly on Friday afternoons, was viewed as appropriate. Participants said the messages provided new information, a reminder of existing information and reduced apprehension about testing for sexually transmitted infections. Conclusions Mobile phones, in particular SMS, offer health promoters an exciting opportunity to engage personally with a huge number of individuals for low cost. The key elements emerging from this evaluation, such as message style, language and broadcast schedule are directly relevant to future studies using SMS for health promotion, as well as for future health promotion interventions in other mediums that require short formats, such

  9. 33 CFR 401.31 - Meeting and passing.

    Science.gov (United States)

    2010-07-01

    ..., no vessel shall overtake and pass or attempt to overtake and pass another vessel— (1) In any canal; (2) Within 600 m of a canal or lock entrance; or (3) After the order of passing through has...

  10. Modeling drivers' passing duration and distance in a virtual environment

    Directory of Open Access Journals (Sweden)

    Haneen Farah

    2013-07-01

    The main contribution of this paper is in the empirical models developed for passing duration and distance which highlights the factors that affect drivers' passing behavior and can be used to enhance the passing models in simulation programs.

  11. Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications Under Jamming

    Science.gov (United States)

    2015-01-16

    anti-islanding in the power engineering commu- nity [3], [28]. In this work, we use universal software radio peripheral (USRP) devices with GNU Radio ...error correction is not used in our experiments in order to reduce the GNU Radio proc- essing delay. Table 3 shows the message invalidation probability as...attack that constantly broadcasts radio interference is a primary security threat to prevent the deployment of wireless networks in the smart grid. Hence

  12. Alcohol Messages in Prime-Time Television Series.

    Science.gov (United States)

    Russell, Cristel Antonia; Russell, Dale W

    2009-01-01

    Alcohol messages contained in television programming serve as sources of information about drinking. To better understand the ways embedded messages about alcohol are communicated, it is crucial to objectively monitor and analyze television alcohol depictions. This article presents a content analysis of an eight-week sample of eighteen prime-time programs. Alcohol messages were coded based on modalities of presentation, level of plot connection, and valence. The analysis reveals that mixed messages about alcohol often coexist but the ways in which they are presented differ: whereas negative messages are tied to the plot and communicated verbally, positive messages are associated with subtle visual portrayals.

  13. The Application of the Cooperative Principle in Text Messages

    Institute of Scientific and Technical Information of China (English)

    李军霞

    2015-01-01

    The language of text messages speeds up the transmission of information,shows the richness of languages,and contains all kinds of implication. Many researches on text messages have been published but the analysis of the languages of text messages in the domain of Grice’s cooperative principle is open to investigate. This paper explores the language of text messages based on Grice’s Cooperative Principle(CP) and its maxims,which aims to understand how the theory influences the text message communication and create some humorous effect. It is of practical significance to research text messages as a kind of language phenomenon.

  14. The Application of the Cooperative Principle in Text Messages

    Institute of Scientific and Technical Information of China (English)

    李军霞

    2015-01-01

    The language of text messages speeds up the transmission of information,shows the richness of languages,and contains all kinds of implication. Many researches on text messages have been published but the analysis of the languages of text messages in the domain of Grice’s cooperative principle is open to investigate. This paper explores the language of text messages based on Grice’s Cooperative Principle (CP) and its maxims,which aims to understand how the theory influences the text message communication and create some humorous effect. It is of practical significance to research text messages as a kind of language phenomenon.

  15. Generalizing Galileo's passé-dix game

    Science.gov (United States)

    Hombas, Vassilios

    2012-07-01

    This article shows a generalization of Galileo's 'passé-dix' game. The game was born following one of Galileo's [G. Galileo, Sopra le Scoperte dei Dadi (Galileo, Opere, Firenze, Barbera, Vol. 8). Translated by E.H. Thorne, 1898, pp. 591-594] explanations on a paradox that occurred in the experiment of tossing three fair 'six-sided' dice.

  16. The Physics of "String Passing through Ice"

    Science.gov (United States)

    Mohazzabi, Pirooz

    2011-01-01

    One of the oldest yet interesting experiments related to heat and thermodynamics is placing a string on a block of ice and hanging two masses from the ends of the string. Sometime later, it is discovered that the string has passed through the ice without cutting it in half. A simple explanation of this effect is that the pressure caused by the…

  17. PASS: Creating Physically Active School Systems

    Science.gov (United States)

    Ciotto, Carol M.; Fede, Marybeth H.

    2014-01-01

    PASS, a Physically Active School System, is a program by which school districts and schools utilize opportunities for school-based physical activity that enhance overall fitness and cognition, which can be broken down into four integral parts consisting of connecting, communicating, collaborating, and cooperating. There needs to be an…

  18. A characterization of attribute evaluation in passes

    NARCIS (Netherlands)

    Alblas, Henk

    1981-01-01

    This paper describes the evaluation of semantic attributes in a bounded number of passes from left-to-right and/or from right-to-left over the derivation tree of a program. Evaluation strategies where different instances of the same attribute in any derivation tree are restricted to be evaluated in

  19. Generalizing Galileo's Passe-Dix Game

    Science.gov (United States)

    Hombas, Vassilios

    2012-01-01

    This article shows a generalization of Galileo's "passe-dix" game. The game was born following one of Galileo's [G. Galileo, "Sopra le Scoperte dei Dadi" (Galileo, Opere, Firenze, Barbera, Vol. 8). Translated by E.H. Thorne, 1898, pp. 591-594] explanations on a paradox that occurred in the experiment of tossing three fair "six-sided" dice.…

  20. Educational Messages in Tevfik Fikret's Poems

    Science.gov (United States)

    Erdal, Kelime

    2011-01-01

    Being in the education community for long years, Tevfik Fikret aims to educate children and teenagers with the works he has written while he is carrying out his profession. Knowing child's world very well, the poet gives messages which can be counted valid in today's education perception. Emphasizing the basic humanistic and moral values such as…

  1. Maintaining High Assurance in Asynchronous Messaging

    Science.gov (United States)

    2015-10-24

    be inconvenient and not consistent with normal dialog communication. II. PRIOR WORK A proliferation of standards for asynchronous messaging has...Software Technology Conference, “A Persona -Based Framework for Flexible Delegation and Least Privilege,” Las Vegas, Nevada, May 2008. [25] William

  2. Perfectly secure message transmission in two rounds

    NARCIS (Netherlands)

    G. Spini (Gabriele); Zémor, G (Gilles); M. Hirt; A. Smith

    2016-01-01

    textabstractIn the model that has become known as "Perfectly Secure Message Transmission"(PSMT), a sender Alice is connected to a receiver Bob through n parallel two-way channels. A computationally unbounded adversary Eve controls t of these channels, meaning she can acquire and alter any data that

  3. Interactive source and message effects in persuasion.

    Science.gov (United States)

    Siu, Wanda

    2010-04-01

    In this study, the influence of source and message frame on judgments of a public service announcement was examined. The participants in the experiment were 408 undergraduate students (126 men, 280 women, 2 unknown; M age=20.0, SD=2.5, range=18-23) of a Midwestern U.S. university. Message frame and source were manipulated in a between-subjects design. Two levels of the message frame were benefits of physical activity and costs of not engaging in regular physical activity; the source was a healthy or unhealthy individual. In the Healthy-source condition, "Kim Jones" set realistic goals for exercise and had a healthy lifestyle. Conversely, she was described as a sedentary individual who led an unhealthy lifestyle in the Sick-source condition. Results indicated that respondents in the conditions of gain frame-healthy source and cost frame-unhealthy source had more positive message judgment as compared to respondents in the conditions of gain frame-unhealthy source and cost frame-healthy source.

  4. An approach for message exchange using archetypes.

    Science.gov (United States)

    Moraes, João L C; Souza, Wanderley L; Cavalini, Luciana T; Pires, Luís F; Prado, Antonio F

    2013-01-01

    The application of ICT on the whole range of health sector activities, known as e-health, can simplify the access to health care services and will only be acceptable for realistic scenarios if it supports efficient information exchange amongst the caregivers and their patients. The aim of this paper is present an approach for message exchange to realistic scenarios.

  5. Graphical route information on variable message signs

    NARCIS (Netherlands)

    Alkim, T.P.; Mede, P.H.J. van der; Janssen, W.H.

    2002-01-01

    Reports on experiments in the Netherlands on the use of graphical route information panels (GRIP) as part of variable message systems (VMS) providing information to drivers. GRIP appear to be as safe as regular VMS. Digestion of the information presented is initially quicker for regular VMS, but mot

  6. Princess Picture Books: Content and Messages

    Science.gov (United States)

    Dale, Lourdes P.; Higgins, Brittany E.; Pinkerton, Nick; Couto, Michelle; Mansolillo, Victoria; Weisinger, Nica; Flores, Marci

    2016-01-01

    Because many girls develop their understanding of what it means to be a girl from books about princesses, the researchers coded the messages and content in 58 princess books (picture, fairy tales, and fractured fairy tales). Results indicate that gender stereotypes are present in the books--the princesses were more likely to be nurturing, in…

  7. Message Integrity Model for Wireless Sensor Networks

    Science.gov (United States)

    Qleibo, Haider W.

    2009-01-01

    WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…

  8. Advanced Steganography Algorithm using Encrypted secret message

    Directory of Open Access Journals (Sweden)

    Joyshree Nath

    2011-03-01

    Full Text Available In the present work the authors have introduced a new method for hiding any encrypted secret message inside a cover file. For encrypting secret message the authors have used new algorithm proposed by Nath et al(1. For hiding secret message we have used a method proposed by Nath et al(2. In MSA(1 method we have modified the idea of Play fair method into a new platform where we can encrypt or decrypt any file. We have introduced a new randomization method for generating the randomized key matrix to encrypt plain text file and to decrypt cipher text file. We have also introduced a new algorithm for encrypting the plain text multiple times. Our method is totally dependent on the random text_key which is to be supplied by the user. The maximum length of the text_key can be of 16 characters long and it may contain any character(ASCII code 0 to 255. We have developed an algorithm to calculate the randomization number and the encryption number from the given text_key. The size of the encryption key matrix is 16x16 and the total number of matrices can be formed from 16 x 16 is 256! which is quite large and hence if someone applies the brute force method then he/she has to give trail for 256! times which is quite absurd. Moreover the multiple encryption method makes the system further secured. For hiding secret message in the cover file we have inserted the 8 bits of each character of encrypted message file in 8 consecutive bytes of the cover file. We have introduced password for hiding data in the cover file. We propose that our new method could be most appropriate for hiding any file in any standard cover file such as image, audio, video files. Because the hidden message is encrypted hence it will be almost impossible for the intruder to unhide the actual secret message from the embedded cover file. This method may be the most secured method in digital water marking.

  9. Creative Analytics of Mission Ops Event Messages

    Science.gov (United States)

    Smith, Dan

    2017-01-01

    Historically, tremendous effort has been put into processing and displaying mission health and safety telemetry data; and relatively little attention has been paid to extracting information from missions time-tagged event log messages. Todays missions may log tens of thousands of messages per day and the numbers are expected to dramatically increase as satellite fleets and constellations are launched, as security monitoring continues to evolve, and as the overall complexity of ground system operations increases. The logs may contain information about orbital events, scheduled and actual observations, device status and anomalies, when operators were logged on, when commands were resent, when there were data drop outs or system failures, and much much more. When dealing with distributed space missions or operational fleets, it becomes even more important to systematically analyze this data. Several advanced information systems technologies make it appropriate to now develop analytic capabilities which can increase mission situational awareness, reduce mission risk, enable better event-driven automation and cross-mission collaborations, and lead to improved operations strategies: Industry Standard for Log Messages. The Object Management Group (OMG) Space Domain Task Force (SDTF) standards organization is in the process of creating a formal standard for industry for event log messages. The format is based on work at NASA GSFC. Open System Architectures. The DoD, NASA, and others are moving towards common open system architectures for mission ground data systems based on work at NASA GSFC with the full support of the commercial product industry and major integration contractors. Text Analytics. A specific area of data analytics which applies statistical, linguistic, and structural techniques to extract and classify information from textual sources. This presentation describes work now underway at NASA to increase situational awareness through the collection of non

  10. Fault Tolerant Message Efficient Coordinator Election Algorithm in High Traffic Bidirectional Ring Network

    Directory of Open Access Journals (Sweden)

    Danial Rahdari

    2012-12-01

    Full Text Available Nowadays use of distributed systems such as internet and cloud computing is growing dramatically. Coordinator existence in these systems is crucial due to processes coordinating and consistency requirement as well. However the growth makes their election algorithm even more complicated. Too many algorithms are proposed in this area but the two most well known one are Bully and Ring. In this paper we propose a fault tolerant coordinator election algorithm in typical bidirectional ring topology which is twice as fast as Ring algorithm although far fewer messages are passing due to election. Fault tolerance technique is applied which leads the waiting time for the election reaching to zero.

  11. Ionospheric effects on repeat-pass SAR interferometry

    Science.gov (United States)

    Feng, Jian; Zhen, Weimin; Wu, Zhensen

    2017-10-01

    InSAR measurements can be significantly affected by the atmosphere when the radar signal propagates through the atmosphere since it varies with space and time. Great efforts have been made in recent years to better understand the properties of the tropospheric effects and to develop methods for mitigating these effects. By using the basic principles of InSAR, the quantitative analysis of ionospheric delay effects on topography and surface deformation have been introduced for the first time. The measurement errors can be related to the vertical ionospheric total electron content (vTEC). By using the ionospheric observations, the effects of temporal ionospheric variations on InSAR have been analyzed. The results indicate that the ionospheric variations with time, season, solar cycle and geomagnetic activities can compromise the effectiveness of InSAR for both the measurement of topography and surface determination. The repeat-pass SAR interferometry errors induced by ionosphere should be corrected by actual measurements.

  12. Interest Rate Pass-Through: The Case of Indonesia

    Directory of Open Access Journals (Sweden)

    Chandra Utama

    2017-07-01

    Full Text Available This paper examines the direct and indirect interest rate pass-trough (IRPT from policy interest rate (BI rate to banks’ retail interest rates in Indonesia during a full-fledged inflation-targeting regime. We use montly data of policy interest rate (BI rate as well as interest rates for interbank money market (interbank, deposit, and loan during July 2005 to May 2015. We employ Error Correction Mechanism (ECM and Ordinary Least Square (OLS to find the significant of IRPT and the speed of adjustment process of IRPT. The study suggests the existence of direct and indirect IRPT in Indonesia. The change of policy rate is transmitted quicker in the direct channel compared to the indirect channel. However, indirect channel is more stable than the direct channel. We conclude that the direct and indirect IRPT are complementary.

  13. A Bespoke Technique for Secret Messaging

    Directory of Open Access Journals (Sweden)

    Mahimn Pandya

    2013-04-01

    Full Text Available The communication of digital assets on the internet infrastructure is increasing in its volume with threats on its security with regard to active and passive attacks of eavesdroppers. This concern has opened up the research channel to improve the techniques of secure and reliable communication protecting intellectual property rights and message security. Constant efforts of researchers in this area to achieve communication at faster rate maintaining security of digital assets, is giving improved techniques to achieve the goal. The efforts made here in this work are in the direction to enhance level of security in making faster reliable and secure communication. In spite of continued efforts, still as on today, it is challenging to hide the communication from eavesdropper. The disciplines of Cryptography, Steganography and Digital Watermarking are still popular areas of research. They are continuously digging to find robust and effective algorithms to protect digital communications and digital assets. It is very true that if the complexity in algorithm is increased, higher security level can be achieved. In the reviewed work, Researchers have developed algorithms for text encryption and embedment in digital watermarking using LSB at cost of time. The proposed work is targeted to maintain the tradeoff between the complexity level of algorithm and security level of message considering the time factor. The proposed work has evolved with two algorithms: AMEADT (ASCII Message Encryption and Decryption Technique to protect secret message and AMEAET (ASCII Message Embedment and Extraction Technique to embed encrypted text to digital image. The implementation of these algorithms has resulted in justifying higher level of security with comparatively lower level of complexity of algorithm.

  14. Making Vaccine Messaging Stick: Perceived Causal Instability as a Barrier to Effective Vaccine Messaging.

    Science.gov (United States)

    Dixon, Graham N

    2017-08-01

    Health officials often face challenges in communicating the risks associated with not vaccinating, where persuasive messages can fail to elicit desired responses. However, the mechanisms behind these failures have not been fully ascertained. To address this gap, an experiment (N = 163) tested the differences between loss-framed messages-one emphasizing the consequence of not receiving a flu vaccine; the other emphasizing the consequence of receiving the flu vaccine. Despite an identical consequence (i.e., Guillain-Barre syndrome), the message highlighting the consequence of not receiving the flu vaccine produced lower negative affect scores as compared to the message highlighting the consequence of receiving the flu vaccine. Mediation analyses suggest that one reason for this difference is due to non-vaccination being perceived as temporary and reversible, whereas vaccination is perceived as being permanent. Implications on health communication and future research are discussed.

  15. Scaling and performance of a 3-D radiation hydrodynamics code on message-passing parallel computers: final report

    Energy Technology Data Exchange (ETDEWEB)

    Hayes, J C; Norman, M

    1999-10-28

    This report details an investigation into the efficacy of two approaches to solving the radiation diffusion equation within a radiation hydrodynamic simulation. Because leading-edge scientific computing platforms have evolved from large single-node vector processors to parallel aggregates containing tens to thousands of individual CPU's, the ability of an algorithm to maintain high compute efficiency when distributed over a large array of nodes is critically important. The viability of an algorithm thus hinges upon the tripartite question of numerical accuracy, total time to solution, and parallel efficiency.

  16. Toxoplasmosis: An Important Message for Women

    Science.gov (United States)

    ... Keep indoor cats indoors. • Avoid stray cats, especially kittens. • Cover your outdoor sandboxes. • Do not get a ... parasite is then passed in the cat’s feces. Kittens and young cats can shed millions of parasites ...

  17. Preventing messaging queue deadlocks in a DMA environment

    Science.gov (United States)

    Blocksome, Michael A; Chen, Dong; Gooding, Thomas; Heidelberger, Philip; Parker, Jeff

    2014-01-14

    Embodiments of the invention may be used to manage message queues in a parallel computing environment to prevent message queue deadlock. A direct memory access controller of a compute node may determine when a messaging queue is full. In response, the DMA may generate and interrupt. An interrupt handler may stop the DMA and swap all descriptors from the full messaging queue into a larger queue (or enlarge the original queue). The interrupt handler then restarts the DMA. Alternatively, the interrupt handler stops the DMA, allocates a memory block to hold queue data, and then moves descriptors from the full messaging queue into the allocated memory block. The interrupt handler then restarts the DMA. During a normal messaging advance cycle, a messaging manager attempts to inject the descriptors in the memory block into other messaging queues until the descriptors have all been processed.

  18. Yap: A High-Performance Cursor on Target Message Router

    Science.gov (United States)

    2014-09-01

    Yap: A High-Performance Cursor on Target Message Router by Jesse Kovach ARL-TR-7096 September 2014...High-Performance Cursor on Target Message Router Jesse Kovach Computational and Information Sciences Directorate, ARL...

  19. Comparing tailored and untailored text messages for smoking cessation

    DEFF Research Database (Denmark)

    Skov-Ettrup, Lise; Ringgaard, L W; Dalum, Peter

    2014-01-01

    the entire study population, as well as those opting for text messages (n = 1619). In intention-to-treat analysis with multiple imputation of missing data, the odds ratio for 30-day point abstinence was 1.28 (95% CI 0.91-2.08) for the tailored compared with untailored messages. When restricting the analysis...... to those who had chosen to receive text messages, the corresponding odds ratio was 1.45 (95% CI 1.01-2.08). The higher long-term quit rates in the group receiving the tailored text messages compared with untailored text messages in the restricted analysis indicated that tailoring and higher frequency......The aim was to compare the effectiveness of untailored text messages for smoking cessation to tailored text messages delivered at a higher frequency. From February 2007 to August 2009, 2030 users of an internet-based smoking cessation program with optional text message support aged 15-25 years were...

  20. Using Publish-Subscribe Messaging for System Status and Automation

    Science.gov (United States)

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  1. Investigating the impact of viral message appeal and message credibility on consumer attitude toward the brand

    Directory of Open Access Journals (Sweden)

    Esmaeilpour Majid

    2016-07-01

    Full Text Available Due to the rapid growth of the Internet and use of e-commerce in the recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers’ attitude with mediating role of intellectual involvement of consumers and their risk taking level. The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in the Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, we analysed the data through smart PLS software. The results show that the appeal and credibility of the message source impact the consumer attitudes toward the brand. We also found that the intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brands. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role.

  2. HyperPASS, a New Aeroassist Tool

    Science.gov (United States)

    Gates, Kristin; McRonald, Angus; Nock, Kerry

    2005-01-01

    A new software tool designed to perform aeroassist studies has been developed by Global Aerospace Corporation (GAC). The Hypersonic Planetary Aeroassist Simulation System (HyperPASS) [1] enables users to perform guided aerocapture, guided ballute aerocapture, aerobraking, orbit decay, or unguided entry simulations at any of six target bodies (Venus, Earth, Mars, Jupiter, Titan, or Neptune). HyperPASS is currently being used for trade studies to investigate (1) aerocapture performance with alternate aeroshell types, varying flight path angle and entry velocity, different gload and heating limits, and angle of attack and angle of bank variations; (2) variable, attached ballute geometry; (3) railgun launched projectile trajectories, and (4) preliminary orbit decay evolution. After completing a simulation, there are numerous visualization options in which data can be plotted, saved, or exported to various formats. Several analysis examples will be described.

  3. Optimum design of low-pass switched-capacitor ladder filters

    Science.gov (United States)

    Davis, R. D.; Trick, T. N.

    1980-06-01

    A general technique for realizing Bruton's LDI transformation in low-pass switched-capacitor ladder filters is presented, which results in switched-capacitor integrators that are insensitive to parasitic capacitances. It is shown that the correct filter response may be obtained by realizing only the stable poles of the LDI transformed LC network. Realization of these 'stable' poles is reduced to the problem of solving a system of nonlinear equations. The design of a third-order Chebyshev low-pass filter is presented as an example.

  4. The Message Reporting System in the ATLAS DAQ System

    Science.gov (United States)

    Caprini, M.; Fedorko, I.; Kolos, S.

    2008-06-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process communication is achieved using the CORBA technology. The design, architecture and the used technology of MRS are reviewed in this paper.

  5. Potential Nutrition Messages in Magazines Read by College Students.

    Science.gov (United States)

    Hertzler, Ann A.; Grun, Ingolf

    1990-01-01

    Surveyed advertisements in magazines read by college students in nutrition class for hidden food and nutrition messages. Hidden messages for females could imply beauty through fashion products, beauty aids, and supplements but with nutrition slimming plan. Males may be receiving subtle message that food choices do not matter and that alcohol and…

  6. Lol: New Language and Spelling in Instant Messaging

    Science.gov (United States)

    Varnhagen, Connie K.; McFall, G. Peggy; Pugh, Nicole; Routledge, Lisa; Sumida-MacDonald, Heather; Kwong, Trudy E.

    2010-01-01

    Written communication in instant messaging, text messaging, chat, and other forms of electronic communication appears to have generated a "new language" of abbreviations, acronyms, word combinations, and punctuation. In this naturalistic study, adolescents collected their instant messaging conversations for a 1-week period and then completed a…

  7. The Message Reporting System of the ATLAS DAQ System

    CERN Document Server

    Caprini, M; Kolos, S; 10th ICATPP Conference on Astroparticle, Particle, Space Physics, Detectors and Medical Physics Applications

    2008-01-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process comm...

  8. 19 CFR 4.7d - Container status messages.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Container status messages. 4.7d Section 4.7d... TREASURY VESSELS IN FOREIGN AND DOMESTIC TRADES Arrival and Entry of Vessels § 4.7d Container status messages. (a) Container status messages required. In addition to the advance filing requirements...

  9. Teaching Students the Persuasive Message through Small Group Activity

    Science.gov (United States)

    Creelman, Valerie

    2008-01-01

    Teaching students to write persuasive messages is a critical feature of any undergraduate business communications course. For the persuasive writing module in the author's course, students write a persuasive message on the basis of the four-part indirect pattern often used for sales or fund-raising messages. The course text she uses identifies…

  10. UN-aided Project Passing Final Assessment

    Institute of Scientific and Technical Information of China (English)

    Wang Anfang

    1995-01-01

    @@ A number of projects funded by the United Nations Development Program passed final examination and assessment in April 1994.They are the well-completion technical center project of the Southwest Petroleum Institute with a fund of 1.27 million US dollars and the acidizing and fracturing technical service center of Wanzhuang Branch Research Institute of Petroleum Exploration and Development (RIPED) with a fund of 1.41 million US dollars.

  11. Low Pass Filters with Linear Phase.

    Science.gov (United States)

    1985-12-12

    DISCUSSION OF RESULTS............................... 35 LIST OF ILLUSTRATIONS Figure page 1. Template applicable to single stage linear phase filter .................. 2...technology suggests examination of the low-pass lin- ear phase filter as a means of prefiltering such data before, or concurrently with, sam- pling. Today, a...stage low passlinear phase filter . Here, M is the number of "main poles". A linear phase design alsorequires a minimum overhead of two "corrector poles

  12. Price pass-through and minimum wages

    OpenAIRE

    Daniel Aaronson

    1997-01-01

    A textbook consequence of competitive markets is that an industry-wide increase in the price of inputs will be passed on to consumers through an increase in prices. This fundamental implication has been explored by researchers interested in who bears the burden of taxation and exchange rate fluctuations. However, little attention has focused on the price implications of minimum wage hikes. From a policy perspective, this is an oversight. Welfare analysis of minimum wage laws should not ignore...

  13. Content analysis of antismoking videos on YouTube: message sensation value, message appeals, and their relationships with viewer responses.

    Science.gov (United States)

    Paek, Hye-Jin; Kim, Kyongseok; Hove, Thomas

    2010-12-01

    Focusing on several message features that are prominent in antismoking campaign literature, this content-analytic study examines 934 antismoking video clips on YouTube for the following characteristics: message sensation value (MSV) and three types of message appeal (threat, social and humor). These four characteristics are then linked to YouTube's interactive audience response mechanisms (number of viewers, viewer ratings and number of comments) to capture message reach, viewer preference and viewer engagement. The findings suggest the following: (i) antismoking messages are prevalent on YouTube, (ii) MSV levels of online antismoking videos are relatively low compared with MSV levels of televised antismoking messages, (iii) threat appeals are the videos' predominant message strategy and (iv) message characteristics are related to viewer reach and viewer preference.

  14. 30 CFR 57.19018 - Overtravel by-pass switches.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Overtravel by-pass switches. 57.19018 Section... Hoisting Hoists § 57.19018 Overtravel by-pass switches. When an overtravel by-pass switch is installed, the... switch is held in the closed position by the hoistman. The overtravel by-pass switch shall...

  15. 30 CFR 56.19018 - Overtravel by-pass switches.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Overtravel by-pass switches. 56.19018 Section... Hoisting Hoists § 56.19018 Overtravel by-pass switches. When an overtravel by-pass switch is installed, the... switch is held in the closed position by the hoistman. The overtravel by-pass switch shall...

  16. 20 CFR 416.2099 - Compliance with pass-along.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Compliance with pass-along. 416.2099 Section... pass-along. (a) Information regarding compliance. Any State required to enter into a pass-along... Commissioner's satisfaction that the State is meeting the pass-along requirements. The information...

  17. Ritual, meaningfulness, and interstellar message construction

    Science.gov (United States)

    Traphagan, John W.

    2010-10-01

    In this paper, I am interested in exploring the potential of ritual performance as a means of communication with ETI. I argue that the study of ritual and ritualized behavior, understood as a technique for representation of meaning and meaningfulness about the world, has potential to inform how scientists think about the construction and interpretation of interstellar messages. I do not suggest that ritual activities themselves provide more than limited potential for communication with ETI. However, the structural elements of ritual and the manner in which meaning is conveyed through the formality and repetition of ritual is at least to some extent decipherable cross-culturally and provides one way to think about how to express important aspects of humans and their cultures to ETI and to represent, if not specific meanings themselves, the fact that a message is meaningful.

  18. Ensuring message embedding in wet paper steganography

    CERN Document Server

    Augot, Daniel; Fontaine, Caroline

    2011-01-01

    Syndrome coding has been proposed by Crandall in 1998 as a method to stealthily embed a message in a cover-medium through the use of bounded decoding. In 2005, Fridrich et al. introduced wet paper codes to improve the undetectability of the embedding by nabling the sender to lock some components of the cover-data, according to the nature of the cover-medium and the message. Unfortunately, almost all existing methods solving the bounded decoding syndrome problem with or without locked components have a non-zero probability to fail. In this paper, we introduce a randomized syndrome coding, which guarantees the embedding success with probability one. We analyze the parameters of this new scheme in the case of perfect codes.

  19. An Opportunistic Error Correction Layer for OFDM Systems

    Directory of Open Access Journals (Sweden)

    Shao Xiaoying

    2009-01-01

    Full Text Available Abstract We propose a novel cross layer scheme to reduce the power consumption of ADCs in OFDM systems. The ADCs in a receiver can consume up to 50% of the total baseband energy. Our scheme is based on resolution-adaptive ADCs and Fountain codes. In a wireless frequency-selective channel some subcarriers have good channel conditions and others are attenuated. The key part of the proposed system is that the dynamic range of ADCs can be reduced by discarding subcarriers that are attenuated by the channel. Correspondingly, the power consumption in ADCs can be decreased. In our approach, each subcarrier carries a Fountain-encoded packet. To protect Fountain-encoded packets against bit errors, an LDPC code has been used. The receiver only decodes subcarriers (i.e., Fountain-encoded packets with the highest SNR. Others are discarded. For that reason a LDPC code with a relatively high code rate can be used. The new error correction layer does not require perfect channel knowledge, so it can be used in a realistic system where the channel is estimated. With our approach, more than 70% of the energy consumption in the ADCs can be saved compared with the conventional IEEE 802.11a WLAN system under the same channel conditions and throughput. In addition, it requires 7.5 dB less SNR than the 802.11a system. To reduce the overhead of Fountain codes, we apply message passing and Gaussian elimination in the decoder. In this way, the overhead is 3% for a small block size (i.e., 500 packets. Using both methods results in an efficient system with low delay.

  20. An Opportunistic Error Correction Layer for OFDM Systems

    Directory of Open Access Journals (Sweden)

    Xiaoying Shao

    2009-01-01

    Full Text Available We propose a novel cross layer scheme to reduce the power consumption of ADCs in OFDM systems. The ADCs in a receiver can consume up to 50% of the total baseband energy. Our scheme is based on resolution-adaptive ADCs and Fountain codes. In a wireless frequency-selective channel some subcarriers have good channel conditions and others are attenuated. The key part of the proposed system is that the dynamic range of ADCs can be reduced by discarding subcarriers that are attenuated by the channel. Correspondingly, the power consumption in ADCs can be decreased. In our approach, each subcarrier carries a Fountain-encoded packet. To protect Fountain-encoded packets against bit errors, an LDPC code has been used. The receiver only decodes subcarriers (i.e., Fountain-encoded packets with the highest SNR. Others are discarded. For that reason a LDPC code with a relatively high code rate can be used. The new error correction layer does not require perfect channel knowledge, so it can be used in a realistic system where the channel is estimated. With our approach, more than 70% of the energy consumption in the ADCs can be saved compared with the conventional IEEE 802.11a WLAN system under the same channel conditions and throughput. In addition, it requires 7.5 dB less SNR than the 802.11a system. To reduce the overhead of Fountain codes, we apply message passing and Gaussian elimination in the decoder. In this way, the overhead is 3% for a small block size (i.e., 500 packets. Using both methods results in an efficient system with low delay.

  1. Sending and Addressing Messages in Web Services

    OpenAIRE

    Borkowski, Piotr

    2007-01-01

    This thesis provides an overview of Web Services technology. The concept of Web Services and Service Oriented Architecture are explained. The thesis focuses on the mechanisms for transporting and addressing messages in web services, especially SOAP. It presents the development history of SOAP, an overview of the SOAP 1.2 specification, and the differences between SOAP in version 1.1 and 1.2. Further, the thesis presents two web servers for development and deployment of web services using Java...

  2. The perfect message at the perfect moment.

    Science.gov (United States)

    Kalyanam, Kirthi; Zweben, Monte

    2005-11-01

    Marketers planning promotional campaigns ask questions to boost the odds that the messages will be accepted: Who should receive each message? What should be its content? How should we deliver it? The one question they rarely ask is, when should we deliver it? That's too bad, because in marketing, timing is arguably the most important variable of all. Indeed, there are moments in a customer's relationship with a business when she wants to communicate with that business because something has changed. If the company contacts her with the right message in the right format at the right time, there's a good chance of a warm reception. The question of "when" can be answered by a new computer-based model called "dialogue marketing," which is, to date, the highest rung on an evolutionary ladder that ascends from database marketing to relationship marketing to one-to-one marketing. Its principle advantages over older approaches are that it is completely interactive, exploits many communication channels, and is "relationship aware": that is, it continuously tracks every nuance of the customer's interaction with the business. Thus, dialogue marketing responds to each transition in that relationship at the moment the customer requires attention. Turning a traditional marketing strategy into a dialogue-marketing program is a straightforward matter. Begin by identifying the batch communications you make with customers, then ask yourself what events could trigger those communications to make them more timely. Add a question or call to action to each message and prepare a different treatment or response for each possible answer. Finally, create a series of increasingly urgent calls to action that kick in if the question or call to action goes unanswered by the customer. As dialogue marketing proliferates, it may provide the solid new footing that Madison Avenue seeks.

  3. ZeroMQ: Messaging Made Simple

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Since its inception in 2007, ZeroMQ has defined a new product category of thin, fast, open source message transports. This little library has now grown into a large, vibrant community of projects tied together with standard protocols and APIs. Applications, written in any language, talk to each other over TCP, multicast, or inproc transports, using a single socket-based API, and a set of "patterns" (pub-sub, request-reply, dealer-router, pipeline). ZeroMQ handles message framing, batching, and I/O, but ignores aspects like serialization and persistence. By focussing on the essentials, and acting as a toolkit rather than a pre-packaged solution, ZeroMQ turns the complex problem of distributed computing into a relatively simple recipe. About the speaker Pieter Hintjens is a writer, programmer, and public speaker who has spent decades building large software systems, organizations, and businesses. He designed the Advanced Message Queuing Protocol (AMQP) in 2006 for JPMorganChase and left ...

  4. ZeroMQ messaging for many applications

    CERN Document Server

    Hintjens, Pieter

    2013-01-01

    Dive into ØMQ (aka ZeroMQ), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. ØMQ maintainer Pieter Hintjens takes you on a tour of real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns. Learn how to use specific ØMQ programming techniques, build multithreaded applications, and create your own messaging architectures. You’ll discover how ØMQ works with several programming languages and most operating systems—with little or no cost. Learn ØMQ’s main patterns: request-reply, publish-subscribe, and pipeline Work with ØMQ sockets and patterns by building several small applications Explore advanced uses of ØMQ’s request-reply pattern through working examples Build reliable request...

  5. Effect of Ball Mass on Dribble, Pass, and Pass Reception in 9-11-Year-Old Boys' Basketball

    Science.gov (United States)

    Arias, Jose L.; Argudo, Francisco M.; Alonso, Jose I.

    2012-01-01

    The objective of the study was to analyze the effect of ball mass on dribble, pass, and pass reception in real game situations in 9-11-year-old boys' basketball. Participants were 54 boys identified from six federated teams. The independent variable was ball mass, and dependent variables were number of dribbles, passes, and pass receptions. Three…

  6. 78 FR 1851 - Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P.; Notice of Intent To Prepare an...

    Science.gov (United States)

    2013-01-09

    ... Energy Regulatory Commission Sabine Pass Liquefaction, LLC and Sabine Pass LNG, L.P.; Notice of Intent To Prepare an Environmental Assessment for the Proposed Sabine Pass Liquefaction Modification Project and... impacts of the Sabine Pass Liquefaction Modification Project (Project) involving the modification...

  7. 75 FR 68347 - Sabine Pass Liquefaction LLC, and Sabine Pass LNG, L.P.; Notice of Intent To Prepare an...

    Science.gov (United States)

    2010-11-05

    ... Energy Regulatory Commission Sabine Pass Liquefaction LLC, and Sabine Pass LNG, L.P.; Notice of Intent To Prepare an Environmental Assessment for the Planned Sabine Pass Liquefaction Project and Request for... impacts of the Sabine Pass Liquefaction Project (Project) involving construction and operation...

  8. Effects of motives on reactions to safe sun messages.

    Science.gov (United States)

    Aspden, Trefor; Ingledew, David K; Parkinson, John A

    2015-01-01

    We investigated whether appearance motive for sun exposure, which strongly predicts exposure behaviour, would predict reactions to safe sun messages. In a survey with an embedded experiment, 245 individuals completed measures of motives, read a safe sun message framed by incentive (appearance/health), tone (directive/nondirective) and valence (gain/loss), then completed measures of reactions. For participants high in appearance motive, an appearance-nondirective message was most persuasive. Regardless of individual's appearance motive, appearance messages produced lower reactance if phrased using nondirective language. To maximise persuasion and minimise reactance in individuals most motivated to sun expose, safe sun messages should focus on appearance using nondirective language.

  9. Assessing clarity of message communication for mandated USEPA drinking water quality reports.

    Science.gov (United States)

    Phetxumphou, Katherine; Roy, Siddhartha; Davy, Brenda M; Estabrooks, Paul A; You, Wen; Dietrich, Andrea M

    2016-04-01

    The United States Environmental Protection Agency mandates that community water systems (CWSs), or drinking water utilities, provide annual consumer confidence reports (CCRs) reporting on water quality, compliance with regulations, source water, and consumer education. While certain report formats are prescribed, there are no criteria ensuring that consumers understand messages in these reports. To assess clarity of message, trained raters evaluated a national sample of 30 CCRs using the Centers for Disease Control Clear Communication Index (Index) indices: (1) Main Message/Call to Action; (2) Language; (3) Information Design; (4) State of the Science; (5) Behavioral Recommendations; (6) Numbers; and (7) Risk. Communication materials are considered qualifying if they achieve a 90% Index score. Overall mean score across CCRs was 50 ± 14% and none scored 90% or higher. CCRs did not differ significantly by water system size. State of the Science (3 ± 15%) and Behavioral Recommendations (77 ± 36%) indices were the lowest and highest, respectively. Only 63% of CCRs explicitly stated if the water was safe to drink according to federal and state standards and regulations. None of the CCRs had passing Index scores, signaling that CWSs are not effectively communicating with their consumers; thus, the Index can serve as an evaluation tool for CCR effectiveness and a guide to improve water quality communications.

  10. Manipulative Use of Short Messaging Service (SMS Text Messages by Nigerian Telecommunications Companies

    Directory of Open Access Journals (Sweden)

    Ayoola, Kehinde A.

    2014-02-01

    Full Text Available This paper is an application of Relevance Theory for the interpretation of short messaging service (SMS text messages emanating from Nigerian telecommunications companies to their subscribers. The aim of the research was to identify and describe the manipulative strategies employed by Nigerian telecommunications companies to induce subscribers to part with their money through sales promotion lotteries. 100 SMS texts were purposively extracted from the cell phones of randomly selected residents of Lagos Nigeria who had received promotional SMS text messages from three major Nigerian telecommunications companies. Using Sperber and Wilson's Relevance Theory (1995 as its theoretical framework, the paper described the manipulative use of SMS by Nigerian telecommunications companies. The analysis revealed that SMS text messages were encoded to achieve maximization of relevance through explicature and implicature; contextual implication and strengthening; and the reduction of processing effort through violating the maxim of truthfulness and the creative use of graphology. The paper concludes that SMS text-messages were used manipulatively by Nigerian telecommunications companies to earn indirect income from sales promotion lottery.

  11. Source Similarity and Social Media Health Messages: Extending Construal Level Theory to Message Sources.

    Science.gov (United States)

    Young, Rachel

    2015-09-01

    Social media users post messages about health goals and behaviors to online social networks. Compared with more traditional sources of health communication such as physicians or health journalists, peer sources are likely to be perceived as more socially close or similar, which influences how messages are processed. This experimental study uses construal level theory of psychological distance to predict how mediated health messages from peers influence health-related cognition and behavioral intention. Participants were exposed to source cues that identified peer sources as being either highly attitudinally and demographically similar to or different from participants. As predicted by construal level theory, participants who perceived sources of social media health messages as highly similar listed a greater proportion of beliefs about the feasibility of health behaviors and a greater proportion of negative beliefs, while participants who perceived sources as more dissimilar listed a greater proportion of positive beliefs about the health behaviors. Results of the study could be useful in determining how health messages from peers could encourage individuals to set realistic health goals.

  12. Engineered cell-cell communication via DNA messaging

    Directory of Open Access Journals (Sweden)

    Ortiz Monica E

    2012-09-01

    Full Text Available Abstract Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia.

  13. Crafting a Real-Time Information Aggregator for Mobile Messaging

    Directory of Open Access Journals (Sweden)

    Jenq-Shiou Leu

    2010-01-01

    Full Text Available Mobile messaging is evolving beyond SMS (Short Message Service text messaging with the introduction of MMS (Multimedia Messaging Service. In the past, such a scheme is used for peer-to-peer communication. Messages are generally displayed on a cellular phone with a limited-sized screen. However, such a visualizing process is not suitable to broadcast real-time SMS/MMS messages to people in public. To facilitate the instancy and publicity, we develop a real-time information aggregator—Visualizing SMS and MMS Messages System (VSMMS—to realize the concept by integrating SMS and MMS messaging over GSM/GPRS/UMTS onto a remote display device. The device exhibits messages on a larger display device in public. VSMMS features a revolutionized variation of mass media broadcasting. In this paper, we practically illustrate how to design and implement VSMMS and use a M/M/1 model to conduct a theoretical analysis about the message delay in the system queue. Meanwhile, we make an empirical performance evaluation about the message transmission time over different networks.

  14. Emerging adults' perceptions of messages about physical appearance.

    Science.gov (United States)

    Gillen, Meghan M; Lefkowitz, Eva S

    2009-06-01

    Emerging adults receive messages about physical appearance from a range of sources, but few studies have examined the content of these messages. Undergraduates (N=154) who identified as African American, Latino American, and European American answered 4 open-ended questions about messages they perceived about physical appearance from family, peers, school, and media. Raters coded responses for content and affect. The most common messages perceived were the importance/non-importance of appearance, positive comments about appearance, and the link between attractiveness and success. The perception of these messages frequently differed by gender and source, but rarely by ethnicity. Women perceived more frequent and more negative messages than did men. Individuals perceived the media as transmitting more negative messages and the family more healthful and positive ones.

  15. STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE

    Directory of Open Access Journals (Sweden)

    Kobozeva A.

    2014-04-01

    Full Text Available One of the main requirements to steganografic algorithm to be developed is robustness against disturbing influences, that is, to attacks against the embedded message. It was shown that guaranteeing the stego algorithm robustness does not depend on whether the additional information is embedded into the spatial or transformation domain of the cover image. Given the existing advantages of the spatial domain of the cover image in organization of embedding and extracting processes, a sufficient condition for ensuring robustness of such stego transformation was obtained in this work. It was shown that the amount of brightness correction related to the pixels of the cover image block is similar to the amount of correction related to the maximum singular value of the corresponding matrix of the block in case of embedding additional data that ensures robustness against attacks on the embedded message. Recommendations were obtained for selecting the size of the cover image block used in stego transformation as one of the parameters determining the calculation error of stego message. Given the inversely correspondence between the stego capacity of the stego channel being organized and the size of the cover image block, l=8 value was recommended.

  16. Electronically Tunable Fractional Order All Pass Filter

    Science.gov (United States)

    Verma, Rakesh; Pandey, Neeta; Pandey, Rajeshwari

    2017-08-01

    In this paper, an electronically tunable fractional order all pass filter (FOAPF) based on operational transconductance amplifier (OTA) is presented. It uses two OTAs and single fractional order capacitor (FC) of non-integer order α to provide FOAPF of α order. Two different values of α, in particular 0.5 and 0.9, for FC are taken for investigation. The functionality of the proposal is verified through SPICE simulations using TSMC 0.18 μm Complementary Metal Oxide Semiconductor (CMOS) process parameters. Simulated and theoretical frequency and time domain responses are found to be in close agreement.

  17. Thermal Fission Rate Calculated Numerically by Particles Multi-passing over Saddle Point

    Institute of Scientific and Technical Information of China (English)

    LIU Ling; BAO Jing-Dong

    2004-01-01

    Langevin simulation of the particles multi-passing over the saddle point is proposed to calculate thermal fission rate. Due to finite friction and the corresponding thermal fluctuation, a backstreaming exists in the process of the particle descent from the saddle to the scission. This leads to that the diffusion behind the saddle point has influence upon the stationary flow across the saddle point. A dynamical correction factor, as a ratio of the flows of multi- and firstoverpassing the saddle point, is evaluated analytically. The results show that the fission rate calculated by the particles multi-passing over the saddle point is lower than the one calculated by the particle firstly passing over the saddle point,and the former approaches the results at the scission point.

  18. An experimental evaluation of multi-pass solar air heaters

    Energy Technology Data Exchange (ETDEWEB)

    Satcunanathan, S.; Persad, P.

    1980-12-01

    Three collectors of identical dimensions but operating in the single-pass, two-pass and three-pass modes were tested simultaneously under ambient conditions. It was found that the two-pass air heater was consistently better than the single-pass air heater over the day for the range of mass flow rates considered. It was also found that at a mass flow rate of 0.0095 kg s/sup -1/ m/sup -2/, the thermal performances of the two-pass and three-pass collectors were identical, but at higher flow rates the two-pass collector was superior to the three-pass collector, the superiority decreasing with increasing mass flow rate.

  19. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages

    Science.gov (United States)

    Cole, Galen E.; Keller, Punam A.; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-01-01

    The Centers for Disease Control and Prevention’s Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces. PMID:26877714

  20. When Communications Collide With Recipients’ Actions: Effects of Post-Message Behavior on Intentions to Follow the Message Recommendation

    Science.gov (United States)

    Albarracín, Dolores; Cohen, Joel B.; Kumkale, G. Tarcan

    2013-01-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance. PMID:15018672

  1. Technical improvements applied to a double-pass setup for performance and cost optimization

    Science.gov (United States)

    Sanabria, Ferran; Arévalo, Mikel Aldaba; Díaz-Doutón, Fernando; García-Guerra, Carlos Enrique; Ramo, Jaume Pujol

    2014-06-01

    We have studied the possibility of improving the performance, simplifying, and reducing the cost of a double-pass system by the use of alternative technologies. The system for correcting the spherical correction has been based on a focusable electro-optical lens, and a recording device based on CMOS technology and a superluminescent diode (SLED) light source have been evaluated separately. The suitability of the CMOS camera has been demonstrated, while the SLED could not break the speckle by itself. The final experimental setup, consisting of a CMOS camera and a laser diode, has been compared with a commercial double-pass system, proving its usefulness for ocular optical quality and scattering measurements.

  2. The role of error correction in communicative second language teaching

    Directory of Open Access Journals (Sweden)

    H. Ludolph Botha

    2013-02-01

    Full Text Available According to recent rese~rch, correction of errors in both oral and written communication does little to a~d language proficiency in the second language. In the Natural Approach of Krashen and Terrell the emphasis is on the acquisition of informal communication. Because the message and the understanding of the message remain of utmost importance, error correction is avoided. In Suggestopedia where the focus is also on communication, error correction is avoided as it inhibits the pupil. Onlangse navorsing het getoon dat die verbetering van foute in beide mondelinge en skriftelike kommunikasie min bydra tot beter taalvaardigheid in die tweede taal. In die Natural Approach van Krashen en Terrell val die klem op die verwerwing van informele kommunikasie, want die boodskap en die verstaan daarvan bly verreweg die belangrikste; die verbetering van foute word vermy. In Suggestopedagogiek, waar die klem ook op kommunikasie val, word die verbetering van foute vermy omdat dit die leerling beperk.

  3. ABM Drag_Pass Report Generator

    Science.gov (United States)

    Fisher, Forest; Gladden, Roy; Khanampornpan, Teerapat

    2008-01-01

    dragREPORT software was developed in parallel with abmREPORT, which is described in the preceding article. Both programs were built on the capabilities created during that process. This tool generates a drag_pass report that summarizes vital information from the MRO aerobreaking drag_pass build process to facilitate both sequence reviews and provide a high-level summarization of the sequence for mission management. The script extracts information from the ENV, SSF, FRF, SCMFmax, and OPTG files, presenting them in a single, easy-to-check report providing the majority of parameters needed for cross check and verification as part of the sequence review process. Prior to dragReport, all the needed information was spread across a number of different files, each in a different format. This software is a Perl script that extracts vital summarization information and build-process details from a number of source files into a single, concise report format used to aid the MPST sequence review process and to provide a high-level summarization of the sequence for mission management reference. This software could be adapted for future aerobraking missions to provide similar reports, review and summarization information.

  4. PASSING STANDARDIZED ASSESSMENTS WITH FADING PROMPTS

    Directory of Open Access Journals (Sweden)

    Amy Marie GREENE

    2015-11-01

    Full Text Available Introduction: No Child Left Behind Act of 2001 mandates that all students perform at a level of proficient on state assessments. This includes students with learning and intellectual disabilities who are inherently performing below grade level. Given that schools are held accountable for meeting these goals and some states are not allowing students to graduate if they do not pass the assessments, this is a large concern for students, parents, teachers, and administration Method: Forty-five students with a disability in writing or an intellectual disability participated in this quasi-experimental, single-group, pretest-posttest design that evaluated the effectiveness of the Fading Prompts through Graphic Organizers method for students with learning and intellectual disabilities in written expression as measured according to the Pennsylvania System of School Assessment. Results: Data analyses were conducted through the use of four dichotomies for percent differences, which compared teacher administered pretests and posttests, pretests and the state administered PSSA, teacher administered posttests and the PSSA, and the participants’ PSSA and the average state PSSA score. All forty-five students performed at a below basic level during baseline and a proficient level on the posttest. The learned skills generalized to the PSSA with forty-three students earning a passing score of proficient, while two students advanced to basic. Conclusion: Based on the outcomes of this study, it is highly recommended that this program be utilized at least for students with learning and intellectual disabilities until further research can be done.

  5. A second pass correction method for calcification artifacts in digital breast tomosynthesis

    NARCIS (Netherlands)

    Erhard, K.; Grass, M.; Nielsen, T.

    2011-01-01

    Digital breast tomosynthesis (DBT) aims for improving the diagnosis of breast cancer and reducing the false positive rates by going from 2D projection mammography to 3D volume information. With the acquisition of a series of projection images, taken over a limited angular range, DBT allows for tomog

  6. EMISAR single pass topographic SAR interferometer modes

    DEFF Research Database (Denmark)

    Madsen, Søren Nørvang; Skou, Niels; Woelders, Kim

    1996-01-01

    acquired in 1995 indicates that height resolutions better than one meter should be attainable at least in areas with benign topography where overlay shadows and phase unwrapping errors are minimal. Calibration procedures applied to correct for multipath and limited channel isolation are discussed...

  7. Getting your message out with social marketing.

    Science.gov (United States)

    Manoff, R K

    1997-09-01

    This article was based on a speech presented at a Plenary Session of the 1996 Annual Meeting of the American Society of Tropical Medicine and Hygiene. The address describes the nature of social marketing with examples and some lessons learned in developing countries. The earliest social marketers were Moses with the Ten Commandments of God and Indian religious authorities with fertility motifs inscribed on temple walls. Modern marketers of beer and snack food preempted the ancients and made social marketing more ingenious. The strategy shifted to supplying a product to satisfy a consumer want. Messages became a two-way process that minimized feedback shock. Focus groups were used to probe consumers' thoughts. Research must probe the total environment of the "problem." In Brazil, breast feeding promotions revealed that the perceived problem may not be the real problem, and there was no single magic solution. Most tropical disease prevention approaches do not rely on multistage strategies. The oral rehydration therapy (ORT) strategy became a world-wide model when strategists realized that the formula had to be easy to remember, diarrhea had to be recognized as a disease, and the function of ORT had to be clearly defined. The Bangladesh Social Marketing Campaign was successful in getting men to discuss family planning with their wives and establishing the family planning worker as a heroine. Effective messages must uncover points of resistance to the message. Public health advances in the 19th century were due to social policy to improve water supply, sanitation, and nutrition. The iodization of salt in Ecuador was possible with political will, public awareness, redirection of perception, and motivation of demand. Social marketing resources exist in all countries nowadays. Only medical and scientific professionals can promote concern about tropical diseases and raise the prevention priority on the public agenda.

  8. Electronic folklore among teenagers: SMS messages

    Directory of Open Access Journals (Sweden)

    Cvjetićanin Tijana

    2006-01-01

    Full Text Available The development of ICT media made way for a new form of folklore communication. Newly developed media, such as mobile phones, make it possible for their users to participate in electronically mediated communication, thus approaching the form of oral communication. The exchange of special type of SMS text messages represents a new way of transmitting contemporary folklore short forms. These messages use poetic language, they have standard style themes, patterns and formulas, and they form different genres and categories corresponding with already existing familiar folklore forms. The communication process that happens during the exchange of these messages also has folklore’s characteristics: it takes place within small groups, the communication is informal, the texts circulate in chain style, and undergo different transformation which generates the making of variants, etc. This form of electronic folklore is especially popular among teenagers, where it’s social functions and meanings are also most emphasized. Within this population, it adds to an older tradition of children’s written folklore poetry albums. Like poetry albums, SMS exchange influences the development of girls’ gender identity, providing also a socially defined channel for contacts between the sexes. It also functions as a mechanism of socialization and stratification within the group. At the same time, it creates a new field of meaning, which derives from the very media’s novelty and significance. In this sense, the exchange of SMS represents a symbolic act of acknowledging one’s belonging to the group of mobile telephone users. In this way, a new phenomenon is being symbolically processed through a new form of folklore.

  9. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

    KAUST Repository

    Elwhishi, Ahmed

    2013-05-01

    Multicopy routing strategies have been considered the most applicable approaches to achieve message delivery in Delay Tolerant Networks (DTNs). Epidemic routing and two-hop forwarding routing are two well-reported approaches for delay tolerant networks routing which allow multiple message replicas to be launched in order to increase message delivery ratio and/or reduce message delivery delay. This advantage, nonetheless, is at the expense of additional buffer space and bandwidth overhead. Thus, to achieve efficient utilization of network resources, it is important to come up with an effective message scheduling strategy to determine which messages should be forwarded and which should be dropped in case of buffer is full. This paper investigates a new message scheduling framework for epidemic and two-hop forwarding routing in DTNs, such that the forwarding/dropping decision can be made at a node during each contact for either optimal message delivery ratio or message delivery delay. Extensive simulation results show that the proposed message scheduling framework can achieve better performance than its counterparts.

  10. A Multifunction Filter for Realizing Gain Variable Low-Pass and Band-Pass Responses

    Directory of Open Access Journals (Sweden)

    Halil ALPASLAN

    2010-02-01

    Full Text Available The second generation current conveyors (CCIIs as active circuit devices are widely used for designing current-mode (CM filters. In this paper, a single input multi output filter employing only plus-type CCIIs (CCII+s and grounded capacitors, and for providing variable gain low-pass and band-pass responses, is suggested. The proposed filter is free from critical passive component matching conditions. Therefore, it is suitable for integrated circuit (IC technology. Further, developed filter configuration can be easily realized with commercially available active devices such as AD844s. The circuit performance is demonstrated by means of SPICE simulation and experimental test results.

  11. Snap-Stabilizing Linear Message Forwarding

    CERN Document Server

    Lamani, Anissa; Dubois, Swan; Petit, Franck; Villain, Vincent

    2010-01-01

    In this paper, we present the first snap-stabilizing message forwarding protocol that uses a number of buffers per node being inde- pendent of any global parameter, that is 4 buffers per link. The protocol works on a linear chain of nodes, that is possibly an overlay on a large- scale and dynamic system, e.g., Peer-to-Peer systems, Grids. . . Provided that the topology remains a linear chain and that nodes join and leave "neatly", the protocol tolerates topology changes. We expect that this protocol will be the base to get similar results on more general topologies.

  12. Upgrading messaging system on faculty systems

    OpenAIRE

    Farkaš, Aleš

    2014-01-01

    The graduation thesis provides a solution for the transition a part of mail servers of University of Ljubljana. The transition was carried out from the Microsoft Exchange Server 2003 to Microsoft Exchange Server 2010. Next to upgrade of messaging system, the upgrade of the Active Directory carriers has been needed. For this purpose the upgrade to Windows Server 2008 R2 has been performed. In the first part of the work, the overview of the process of the MS Exchange server and Outlook clie...

  13. Counselling young cannabis users by text message

    DEFF Research Database (Denmark)

    Laursen, Ditte

    2010-01-01

    This article presents the results of a study of two SMS services aimed at providing young people with information on cannabis and helping them to reduce their consumption of the drug. The attitude of the 12 participants in the study towards the SMS services is generally positive, but they prefer...... factual information to advice and counselling. The messages prompt reflection and awareness among the recipients, and their repetitive, serial nature plays a significant part in the process of change. This is especially true of the young people whose use of cannabis is recreational. For them, the SMS...

  14. Automatic Sarcasm Detection in Twitter Messages

    OpenAIRE

    Ræder, Johan Georg Cyrus Mazaher

    2016-01-01

    In the past decade, social media like Twitter have become popular and a part of everyday life for many people. Opinion mining of the thoughts and opinions they share can be of interest to, e.g., companies and organizations. The sentiment of a text can be drastically altered when figurative language such as sarcasm is used. This thesis presents a system for automatic sarcasm detection in Twitter messages. To get a better understanding of the field, state-of-the-art systems fo...

  15. Language Models for Handwritten Short Message Services

    CERN Document Server

    Prochasson, Emmanuel Ep; Morin, Emmanuel

    2009-01-01

    Handwriting is an alternative method for entering texts composing Short Message Services. However, a whole new language features the texts which are produced. They include for instance abbreviations and other consonantal writing which sprung up for time saving and fashion. We have collected and processed a significant number of such handwriting SMS, and used various strategies to tackle this challenging area of handwriting recognition. We proposed to study more specifically three different phenomena: consonant skeleton, rebus, and phonetic writing. For each of them, we compare the rough results produced by a standard recognition system with those obtained when using a specific language model.

  16. The message processing and distribution system development

    Science.gov (United States)

    Whitten, K. L.

    1981-06-01

    A historical approach is used in presenting the life cycle development of the Navy's message processing and distribution system beginning with the planning phase and ending with the integrated logistic support phase. Several maintenance problems which occurred after the system was accepted for fleet use were examined to determine if they resulted from errors in the acquisition process. The critical decision points of the acquisition process are examined and constructive recommendations are made for avoiding the problems which hindered the successful development of this system.

  17. Neuroscience and education: myths and messages.

    Science.gov (United States)

    Howard-Jones, Paul A

    2014-12-01

    For several decades, myths about the brain - neuromyths - have persisted in schools and colleges, often being used to justify ineffective approaches to teaching. Many of these myths are biased distortions of scientific fact. Cultural conditions, such as differences in terminology and language, have contributed to a 'gap' between neuroscience and education that has shielded these distortions from scrutiny. In recent years, scientific communications across this gap have increased, although the messages are often distorted by the same conditions and biases as those responsible for neuromyths. In the future, the establishment of a new field of inquiry that is dedicated to bridging neuroscience and education may help to inform and to improve these communications.

  18. Superdense Coding Interleaved with Forward Error Correction

    Directory of Open Access Journals (Sweden)

    Sadlier Ronald J.

    2016-01-01

    Full Text Available Superdense coding promises increased classical capacity and communication security but this advantage may be undermined by noise in the quantum channel. We present a numerical study of how forward error correction (FEC applied to the encoded classical message can be used to mitigate against quantum channel noise. By studying the bit error rate under different FEC codes, we identify the unique role that burst errors play in superdense coding, and we show how these can be mitigated against by interleaving the FEC codewords prior to transmission. We conclude that classical FEC with interleaving is a useful method to improve the performance in near-term demonstrations of superdense coding.

  19. Strong low-pass filtering effects on water vapour flux measurements with closed-path eddy correlation systems

    DEFF Research Database (Denmark)

    Ibrom, Andreas; Dellwik, Ebba; Flyvbjerg, Henrik K.

    2007-01-01

    datasets for this substantial measurement error. In contrast to earlier studies, a large number of spectra and raw data have been used in the analysis to define the low-pass filtering characteristic of the EC system. This revealed that the cut-off frequency of the closed-path EC system for water vapour...... concentration measurements decreases exponentially with increasing relative humidity. After correction for this unintended filtering, the fluxes are consistent with CO2 and H2O fluxes that were measured with an open-path sensor at the same time. The correction of water vapour flux measurements over a Beech......-pass filtering effects. Other than for CO2 is the magnitude of the correction for water vapour flux measurements unsatisfactorily high, i.e. the EC system needs to be technically improved. Our results suggest that such high correction can be avoided by keeping relative humidity in the entire gas transport system...

  20. Zika May Be Passed on Through Tears, Sweat: Report

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_161204.html Zika May Be Passed on Through Tears, Sweat: Report ... 2016 WEDNESDAY, Sept. 28, 2016 (HealthDay News) -- The Zika virus might be able to pass from person ...

  1. Enhanced transmittance of a dual pass-band metamaterial filter

    Science.gov (United States)

    Wang, XiaoZhi; Zhu, Honghui; Liu, Zhigang

    2017-03-01

    A broad pass-band metamaterial-based optical filter is experimentally and numerically studied. The designed structure consists of periodically arranged composite metallic arrays and dielectric layer that exhibits transmission responses composed of two flat pass-bands. The coupling of localized surface plasmon (LSP) modes results in the low-frequency pass-band, while the internal surface plasmon polaritons (ISPPs) between the upper and lower metal layers leads to the high-frequency pass-band. Structural parameters (L and R) are experimentally considered from the viewpoint of exploiting their effects on the pass-bands and resonance frequencies. The bandwidths of these pass-bands both can reach to maximums by optimization of these structural parameters. In addition, the two pass-bands can be modulated to be a single pass-band with a bandwidth of 10.7 THz by optimizing L and R simultaneously.

  2. Source entitativity and the elaboration of persuasive messages: the roles of perceived efficacy and message discrepancy.

    Science.gov (United States)

    Clark, Jason K; Wegener, Duane T

    2009-07-01

    Compared with nonentitative groups, entitative targets are considered to elicit more elaborative processing because of the singularity or unity they represent. However, when groups serve as sources of persuasive messages, other dynamics may operate. The current research suggests that entitativity is intrinsically linked to perceptions of a group's efficacy related to the advocacy, and this efficacy combines with the position of the appeal to determine message elaboration. When messages are counterattitudinal, entitative (efficacious) sources should elicit greater processing than nonentitative groups because of concern that the entitative sources may be more likely to bring about the negative outcomes proposed. However, when appeals are proattitudinal, sources low in entitativity (nonefficacious) should initiate more elaboration due to concern that they may be unlikely to facilitate the positive outcomes proposed. These hypotheses were supported in a series of studies. Preliminary studies established the entitativity-efficacy relation (Studies 1A and 1B). Primary persuasion studies showed that manipulations of source entitativity (Studies 2 and 3) and source efficacy (Studies 4A and 4B) have opposite effects on processing as a function of message discrepancy.

  3. Stages in the Analysis of Persuasive Messages: The Role of Causal Attributions and Message Comprehension.

    Science.gov (United States)

    Wood, Wendy; Eagly, Alice H.

    According to an attribution analysis, changing one's opinion toward the position advocated in a persuasive message is an outcome of one's inferences concerning why the communicator has taken the position. A study was undertaken to clarify the cognitive steps by which recipients went from information about communicator characteristics or…

  4. The baton passes to the LHC

    CERN Multimedia

    CERN Bulletin

    2011-01-01

    Held in the picturesque mountain setting of La Thuile in the Italian Alps, the international conference “Rencontres de Moriond” showed how the baton of discovery in the field of high-energy physics is definitely passing to the LHC experiments. In the well-known spirit of Moriond, the conference was an important platform for young students to present their latest results. The Higgs boson might well be within reach this year and the jet-quenching phenomenon might reveal new things soon…   New physics discussed over the Italian Alps during the "Les rencontres de Moriond" conference.  (Photographer: Paul Gerritsen. Adapted by Katarina Anthony) Known by physicists as one of the most important winter conferences, “Les rencontres de Moriond” are actually a series of conferences spread over two weeks covering the main themes of electroweak interactions, QCD and high-energy interactions, cosmology, gravitation, astropar...

  5. The Pension Fund passes important milestones

    CERN Multimedia

    2012-01-01

    In this column, the Chairman of the Pension Fund Governing Board (PFGB) presents the Board's latest main decisions, initiatives and accomplishments to the Fund's members and beneficiaries.   Since my last report in October, the PFGB has passed several milestones in actuarial, technical and investment matters. The PFGB has completed an analysis of a request by the European Organisation for Astronomical Research in the Southern Hemisphere (ESO) to reduce the increased cost of pension insurance for new ESO recruits that has been caused by the increased CHF/€ exchange ratio. Currently the staff of ESO are admitted to the CERN Pension Fund, pursuant to a co-operation agreement between CERN and ESO dating back to 1968. This analysis assessed the actuarial, financial, administrative and legal implications, and is scheduled to be presented to the CERN Council and the Finance Committee in December. After an open tendering process the PFGB has selected Buck Consultants Limited...

  6. L'avenir au passé

    Directory of Open Access Journals (Sweden)

    Lionel Acher

    2000-05-01

    Full Text Available Il n'y a, bien évidemment, aucun mérite dans un roman historique à faire prédire par un personnage ou par le narrateur lui-même quels seront les événements du futur. Ce type de roman étant, par définition, consacré à la narration d'une intrigue située dans le passé et à la recons­titution d'une époque révolue (quelquefois, comme c'est le cas dans notre corpus de romans, depuis près de vingt siècles, point n'est besoin d'être grand clerc pour annoncer un avenir que l'historiographie a ampleme...

  7. An Active Tracking Band-Pass Filter,

    Science.gov (United States)

    1985-05-01

    Cette boucle comporte un amplificateur i commande automatique de gain et un convertisseur de fr~quence A tension rapides ainsi qu’un filtre passe-bas...attenuates the DC voltage and low-frequency fluctuations that accompany the output. 3.4 Frequency-to-Voltage Converter and Voltage Adaptor The output of the...m 0..’C X dC ., m o) ICU...C X CC. a,.. a V1 CCr.4 CC - CC 4 0 0 oC w4 rCC 6~..I 0 =1I .X C .C 0 C cC ’ C.C E.0 0 C o z .oo. o o .V o r C0 CC w0I vr 0

  8. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Corrective Jaw Surgery Corrective Jaw Surgery Orthognathic surgery is performed to correct the misalignment of jaws and ... Implant Surgery Dental Implant Surgery Dental implant surgery is, of course, surgery, and is best performed by ...

  9. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require one or more ... find out more. Corrective Jaw Surgery Corrective Jaw Surgery Orthognathic surgery is performed to correct the misalignment ...

  10. Corrective Jaw Surgery

    Science.gov (United States)

    ... and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require one or more ... find out more. Corrective Jaw Surgery Corrective Jaw Surgery Orthognathic surgery is performed to correct the misalignment ...

  11. Comics: a medium for today's development messages.

    Science.gov (United States)

    Opilas, E A

    1978-03-01

    Filipino illustrated magazines, or the comics, may yet prove to be the most effective media, if not the most effective, for spreading the country's development messages. Long criticized by intellectuals and the social elite, the comics have been grossly underrated in their potential to inform, persuade, and even influence the life-style of the people. The government's Commission on Population (Popcom) has developed an information-education-communication program using the comics, among other media, to disseminate stories on family planning, responsible parenthood, and related topics. Its best quality is popular appeal, and for publishers and distribution outlets, the comics provide good business. A review of these materials shows that their themes reflect the following topics or issues: 1) population trends and consequences; 2) socioeconomic benefits of family planning; 3) customs which influence family planning; 4) family planning concepts; 5) family planning methods; 6) human sexuality and reproduction; 7) the husband-wife relationship; 8) guides for family planning motivation or communication; and 9) guides for teaching family planning. The materials were developed with 4 qualities in mind so as to attract audience or reader interest: simplicity, familiarity, realism, and attractiveness of materials. The consensus is that in the comics, population and development agencies may have found a "secret weapon" in getting these messages across, and that this new-found use for the illustrated magazines may be giving them a new respectability without in any way diminishing their popular appeal.

  12. On the Conceptual Ambiguity Surrounding Perceived Message Effectiveness

    Science.gov (United States)

    Yzer, Marco; LoRusso, Susan; Nagler, Rebekah H.

    2015-01-01

    Health message quality is best understood in terms of a message’s ability to effectively produce change in the variables that it was designed to change. The importance of determining a message’s effectiveness in producing change prior to implementation is clear: The better a message’s potential effectiveness is understood, the better able interventionists are to distinguish effective from ineffective messages before allocating scarce resources to message implementation. For this purpose, research has relied on perceived message effectiveness measures as a proxy of a message’s potential effectiveness. Remarkably, however, very little conceptual work has been done on perceived message effectiveness, which renders its measures under-informed and inconsistent across studies. To encourage greater conceptual work on this important construct, we review several threats to the validity of existing measures and consider strategies for improving our understanding of perceived message effectiveness. PMID:25470437

  13. MAXIMUM PRODUCTION OF TRANSMISSION MESSAGES RATE FOR SERVICE DISCOVERY PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Intisar Al-Mejibli

    2011-12-01

    Full Text Available Minimizing the number of dropped User Datagram Protocol (UDP messages in a network is regarded asa challenge by researchers. This issue represents serious problems for many protocols particularly thosethat depend on sending messages as part of their strategy, such us service discovery protocols.This paper proposes and evaluates an algorithm to predict the minimum period of time required betweentwo or more consecutive messages and suggests the minimum queue sizes for the routers, to manage thetraffic and minimise the number of dropped messages that has been caused by either congestion or queueoverflow or both together. The algorithm has been applied to the Universal Plug and Play (UPnPprotocol using ns2 simulator. It was tested when the routers were connected in two configurations; as acentralized and de centralized. The message length and bandwidth of the links among the routers weretaken in the consideration. The result shows Better improvement in number of dropped messages `amongthe routers.

  14. Music carries a message to youths.

    Science.gov (United States)

    Coleman, P L

    1986-01-01

    The most widely played song in Mexico in March 1986 is a special record designed to encourage young people to be sexually responsible and not to bring into the world children they cannot care for. "It's OK to say 'no,'" is the message of a unique new family planning and health communication project designed to reach young people in 11 Spanish speaking countries of Latin America and the Caribbean. What makes this ambitious regional project so unique is not just the message or the remarkable success of the 1st song but the combination of materials that were produced, the way they were produced, and how they are now being used throughout the region. The Population Communication Services project in the Johns Hopkins School of Hygiene and Public Health (JHU/PCS) has been working in Latin America and elsewhere for 4 years to support innovative family planning communication projects. It became evident that 1 key group was not being reached, i.e., young people aged 13-18 who comprise approximately 30% of the total population in Latin America. The fertility and sexual behavior of young people have a significant impact on their own lives, their community, their country, and the region. Early pregnancy is a major health and social problem throughout the region and the world. To address this problem, the JHU/PCS decided to develop a regional Latin American project to make young people more sharply aware of the personal advantages to them of responsible parenthood. JHU/PCS put together a financial, marketing, and institutional package. The US Agency for International Development (USAID) provided the finances. Analysis showed that the common denominator for young people throughout the region is music. The decision was made to produce 2 songs, each with a music video, pressed on each side of 45 rpm single records and enclosed in a full-size, full-color, 2-sided record jacket which folds out into a poster. The next step was to refine the general message of sexual responsibility to

  15. 34 CFR 300.190 - By-pass-general.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false By-pass-general. 300.190 Section 300.190 Education... DISABILITIES State Eligibility By-Pass for Children in Private Schools § 300.190 By-pass—general. (a) If, on... Secretary implements a by-pass. (Authority: 20 U.S.C. 1412(f)(1))...

  16. 75 FR 62690 - Radio Broadcasting Services; Grants Pass, Oregon

    Science.gov (United States)

    2010-10-13

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Grants Pass, Oregon AGENCY: Federal Communications..., allots FM Channel 257A at Grants Pass, Oregon, as the community's second commercial FM transmission service. Channel 257A can be allotted at Grants Pass, consistent with the minimum distance...

  17. A First-Order One-Pass CPS Transformation

    DEFF Research Database (Denmark)

    Danvy, Olivier; Nielsen, Lasse Reichstein

    2001-01-01

    We present a new transformation of λ-terms into continuation-passing style (CPS). This transformation operates in one pass and is both compositional and first-order. Previous CPS transformations only enjoyed two out of the three properties of being first-order, one-pass, and compositional...

  18. 47 CFR 7.9 - Information pass through.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Information pass through. 7.9 Section 7.9... EQUIPMENT BY PEOPLE WITH DISABILITIES Obligations-What Must Covered Entities Do? § 7.9 Information pass through. Telecommunications equipment and customer premises equipment shall pass through...

  19. 47 CFR 6.9 - Information pass through.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Information pass through. 6.9 Section 6.9... Entities Do? § 6.9 Information pass through. Telecommunications equipment and customer premises equipment shall pass through cross-manufacturer, non-proprietary, industry-standard codes, translation...

  20. 75 FR 43897 - FM TABLE OF ALLOTMENTS, GRANTS PASS, OREGON

    Science.gov (United States)

    2010-07-27

    ... COMMISSION 47 CFR Part 73 FM TABLE OF ALLOTMENTS, GRANTS PASS, OREGON AGENCY: Federal Communications... the allotment of FM Channel 257A as the second commercial allotment at Grants Pass, Oregon. The channel can be allotted at Grants Pass in compliance with the Commission's minimum distance...

  1. 78 FR 18479 - Drawbridge Operation Regulations; Pass Manchac, LA

    Science.gov (United States)

    2013-03-27

    ... SECURITY Coast Guard 33 CFR Part 117 Drawbridge Operation Regulations; Pass Manchac, LA AGENCY: Coast Guard... automated bascule span drawbridge across Pass Manchac, mile 6.7, at Manchac, between St. John and Tangipahoa... Pass Manchac, mile 6.7, at Manchac, between St. John and Tangipahoa Parishes, Louisiana. The bridge...

  2. 20 CFR 631.18 - Federal by-pass authority.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Federal by-pass authority. 631.18 Section 631... Procedures § 631.18 Federal by-pass authority. (a) In the event that a State fails to submit a biennial State... Secretary's intent to exercise by-pass authority and an opportunity to request and to receive a...

  3. 48 CFR 652.237-71 - Identification/Building Pass.

    Science.gov (United States)

    2010-10-01

    ... Pass. 652.237-71 Section 652.237-71 Federal Acquisition Regulations System DEPARTMENT OF STATE CLAUSES... Identification/Building Pass. As prescribed in 637.110(b), insert the following clause. Identification/Building Pass (APR 2004) (a) Contractors working in domestic facilities who already possess a security...

  4. A First-Order One-Pass CPS Transformation

    DEFF Research Database (Denmark)

    Danvy, Olivier; Nielsen, Lasse Reichstein

    2002-01-01

    We present a new transformation of call-by-value lambdaterms into continuation-passing style (CPS). This transformation operates in one pass and is both compositional and first-order. Because it operates in one pass, it directly yields compact CPS programs that are comparable to what one would...

  5. A First-Order One-Pass CPS Transformation

    DEFF Research Database (Denmark)

    Danvy, Olivier; Nielsen, Lasse Reichstein

    2003-01-01

    We present a new transformation of λ-terms into continuation-passing style (CPS). This transformation operates in one pass and is both compositional and first-order. Previous CPS transformations only enjoyed two out of the three properties of being first-order, one-pass, and compositional...

  6. Ningwu——An Ancient Pass On The Plateau

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    <正>Ningwu situated on the Loess Plateau in north of Shanxi Province is one of the three passes along the Great Wall. The other two are the Pian Pass in the west and the Yanmen Pass in the east. In the ancient times, it had been a key military town in the northern Chinese borders.

  7. 36 CFR 1193.37 - Information pass through.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Information pass through... § 1193.37 Information pass through. Telecommunications equipment and customer premises equipment shall pass through cross-manufacturer, non-proprietary, industry-standard codes, translation...

  8. Error message recording and reporting in the SLC control system

    Energy Technology Data Exchange (ETDEWEB)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-04-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed.

  9. Error message recording and reporting in the SLC control system

    Energy Technology Data Exchange (ETDEWEB)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-10-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed.

  10. 3-Receiver Broadcast Channels with Common and Confidential Messages

    CERN Document Server

    Chia, Yeow-Khiang

    2009-01-01

    Achievable secrecy rate regions for the general 3-receiver broadcast channel with one common and one confidential message sets are established. We consider two setups: (i) when the confidential message is to be sent to two of the receivers and the third receiver is an eavesdropper; and (ii) when the confidential message is to be sent to one of the receivers and the other two receivers are eavesdroppers. We show that our secrecy rate regions are optimum for some special cases.

  11. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    OpenAIRE

    Cho Choong-Ho; Leung VictorCM; Won Jeong-Jae; Vadapalli Murahari

    2009-01-01

    The IEEE 802.21 framework for Media Independent Handover (MIH) provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that ha...

  12. A Secure Hash Function MD-192 With Modified Message Expansion

    CERN Document Server

    Tiwari, Harshvardhan

    2010-01-01

    Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash function. In this paper a new approach is presented that produces 192 bit message digest and uses a modified message expansion mechanism which generates more bit difference in each working variable to make the algorithm more secure. This hash function is collision resistant and assures a good compression and preimage resistance.

  13. Event Driven Messaging with Role-Based Subscriptions

    Science.gov (United States)

    Bui, Tung; Bui, Bach; Malhotra, Shantanu; Chen, Fannie; Kim, rachel; Allen, Christopher; Luong, Ivy; Chang, George; Zendejas, Silvino; Sadaqathulla, Syed

    2009-01-01

    Event Driven Messaging with Role-Based Subscriptions (EDM-RBS) is a framework integrated into the Service Management Database (SMDB) to allow for role-based and subscription-based delivery of synchronous and asynchronous messages over JMS (Java Messaging Service), SMTP (Simple Mail Transfer Protocol), or SMS (Short Messaging Service). This allows for 24/7 operation with users in all parts of the world. The software classifies messages by triggering data type, application source, owner of data triggering event (mission), classification, sub-classification and various other secondary classifying tags. Messages are routed to applications or users based on subscription rules using a combination of the above message attributes. This program provides a framework for identifying connected users and their applications for targeted delivery of messages over JMS to the client applications the user is logged into. EDMRBS provides the ability to send notifications over e-mail or pager rather than having to rely on a live human to do it. It is implemented as an Oracle application that uses Oracle relational database management system intrinsic functions. It is configurable to use Oracle AQ JMS API or an external JMS provider for messaging. It fully integrates into the event-logging framework of SMDB (Subnet Management Database).

  14. Nanomechanical characterization by double-pass force-distance mapping

    Energy Technology Data Exchange (ETDEWEB)

    Dagdas, Yavuz S; Tekinay, Ayse B; Guler, Mustafa O; Dana, Aykutlu [UNAM Institute of Materials Science and Nanotechnology, Bilkent University, 06800 Ankara (Turkey); Necip Aslan, M, E-mail: aykutlu@unam.bilkent.edu.tr [Department of Physics, Istanbul Technical University, Istanbul (Turkey)

    2011-07-22

    We demonstrate high speed force-distance mapping using a double-pass scheme. The topography is measured in tapping mode in the first pass and this information is used in the second pass to move the tip over the sample. In the second pass, the cantilever dither signal is turned off and the sample is vibrated. Rapid (few kHz frequency) force-distance curves can be recorded with small peak interaction force, and can be processed into an image. Such a double-pass measurement eliminates the need for feedback during force-distance measurements. The method is demonstrated on self-assembled peptidic nanofibers.

  15. Astor Pass Seismic Surveys Preliminary Report

    Energy Technology Data Exchange (ETDEWEB)

    Louie, John [UNR; Pullammanappallil, Satish [Optim; Faulds, James; Eisses, Amy; Kell, Annie; Frary, Roxanna; Kent, Graham

    2011-08-05

    In collaboration with the Pyramid Lake Paiute Tribe (PLPT), the University of Nevada, Reno (UNR) and Optim re-processed, or collected and processed, over 24 miles of 2d seismic-reflection data near the northwest corner of Pyramid Lake, Nevada. The network of 2d land surveys achieved a near-3d density at the Astor Pass geothermal prospect that the PLPT drilled during Nov. 2010 to Feb. 2011. The Bureau of Indian Affairs funded additional seismic work around the Lake, and an extensive, detailed single-channel marine survey producing more than 300 miles of section, imaging more than 120 ft below the Lake bottom. Optim’s land data collection utilized multiple heavy vibrators and recorded over 200 channels live, providing a state-of-the-art reflection-refraction data set. After advanced seismic analysis including first-arrival velocity optimization and prestack depth migration, the 2d sections show clear fault-plane reflections, in some areas as deep as 4000 ft, tying to distinct terminations of the mostly volcanic stratigraphy. Some lines achieved velocity control to 3000 ft depth; all lines show reflections and terminations to 5000 ft depth. Three separate sets of normal faults appear in an initial interpretation of fault reflections and stratigraphic terminations, after loading the data into the OpendTect 3d seismic visualization system. Each preliminary fault set includes a continuous trace more than 3000 ft long, and a swarm of short fault strands. The three preliminary normal-fault sets strike northerly with westward dip, northwesterly with northeast dip, and easterly with north dip. An intersection of all three fault systems documented in the seismic sections at the end of Phase I helped to locate the APS-2 and APS-3 slimholes. The seismic sections do not show the faults connected to the Astor Pass tufa spire, suggesting that we have imaged mostly Tertiary-aged faults. We hypothesize that the Recent, active faults that produced the tufa through hotspring

  16. Multi-Pass Quadrupole Mass Analyzer

    Science.gov (United States)

    Prestage, John D.

    2013-01-01

    Analysis of the composition of planetary atmospheres is one of the most important and fundamental measurements in planetary robotic exploration. Quadrupole mass analyzers (QMAs) are the primary tool used to execute these investigations, but reductions in size of these instruments has sacrificed mass resolving power so that the best present-day QMA devices are still large, expensive, and do not deliver performance of laboratory instruments. An ultra-high-resolution QMA was developed to resolve N2 +/CO+ by trapping ions in a linear trap quadrupole filter. Because N2 and CO are resolved, gas chromatography columns used to separate species before analysis are eliminated, greatly simplifying gas analysis instrumentation. For highest performance, the ion trap mode is used. High-resolution (or narrow-band) mass selection is carried out in the central region, but near the DC electrodes at each end, RF/DC field settings are adjusted to allow broadband ion passage. This is to prevent ion loss during ion reflection at each end. Ions are created inside the trap so that low-energy particles are selected by low-voltage settings on the end electrodes. This is beneficial to good mass resolution since low-energy particles traverse many cycles of the RF filtering fields. Through Monte Carlo simulations, it is shown that ions are reflected at each end many tens of times, each time being sent back through the central section of the quadrupole where ultrahigh mass filtering is carried out. An analyzer was produced with electrical length orders of magnitude longer than its physical length. Since the selector fields are sized as in conventional devices, the loss of sensitivity inherent in miniaturizing quadrupole instruments is avoided. The no-loss, multi-pass QMA architecture will improve mass resolution of planetary QMA instruments while reducing demands on the RF electronics for high-voltage/high-frequency production since ion transit time is no longer limited to a single pass. The

  17. Framing political messages to fit the audience's regulatory orientation: how to improve the efficacy of the same message content.

    Directory of Open Access Journals (Sweden)

    Lucia Mannetti

    Full Text Available This research investigates how the impact of persuasive messages in the political domain can be improved when fit is created by subliminally priming recipients' regulatory focus (either promotion or prevention and by linguistic framing of the message (either strategic approach framing or strategic avoidance framing. Results of two studies show that regulatory fit: a increases the impact of a political message favoring nuclear energy on implicit attitudes of the target audience (Study 1; and b induces a more positive evaluation of, and intentions to vote for, the political candidate who is delivering a message concerning immigration policies (Study 2.

  18. Framing political messages to fit the audience's regulatory orientation: how to improve the efficacy of the same message content.

    Science.gov (United States)

    Mannetti, Lucia; Brizi, Ambra; Giacomantonio, Mauro; Higgins, E Tory

    2013-01-01

    This research investigates how the impact of persuasive messages in the political domain can be improved when fit is created by subliminally priming recipients' regulatory focus (either promotion or prevention) and by linguistic framing of the message (either strategic approach framing or strategic avoidance framing). Results of two studies show that regulatory fit: a) increases the impact of a political message favoring nuclear energy on implicit attitudes of the target audience (Study 1); and b) induces a more positive evaluation of, and intentions to vote for, the political candidate who is delivering a message concerning immigration policies (Study 2).

  19. Facilities to monitor the upstream migration at the double slot fish pass Geesthacht; Einrichtungen zum Monitoring des Fischaufstiegs im Doppelschlitzpass Geesthacht

    Energy Technology Data Exchange (ETDEWEB)

    Adam, Beate [Institut fuer angewandte Oekologie, Kirtorf-Wahlen (Germany); Neumann, Christof [Knabe Enders Duehrkop Ingenieure GmbH, Hamburg (Germany)

    2012-07-01

    Both fish passes at the Geesthacht dam are continuously monitored to not only provide long term data about fish movements through the passes, but also to verify the correct functioning of the recently constructed double slot pass. To evaluate the traceability of fish passes by upstream moving fishes, transponder technology is used on a grand scale for the first time. Here, antennas located within fish passes automatically detect movements of individuals marked with transponder tags. In addition, a specially designed trap is used to confirm the presence of upstream moving fish of all species and sizes and thereby validate the functionality of the double slot pass. The use of this trap facilitates the collection of continuous and reliable monitoring data even during high discharges and harsh environmental conditions, whilst maintaining health and safety regulations for the personnel in charge. (orig.)

  20. Direct messaging to parents/guardians to improve adolescent immunizations.

    Science.gov (United States)

    Bar-Shain, David S; Stager, Margaret M; Runkle, Anne P; Leon, Janeen B; Kaelber, David C

    2015-05-01

    To study the impact on adolescent immunization rates of direct messages to parents/guardians. Electronic health record rules identified adolescents needing an immunization. Parents/guardians of adolescents were messaged via a single vendor using automated text, prerecorded voice, and/or postcard. Parents/guardians of 3,393 patients, ages 11-18 years, with one or more primary care visits in the prior 2 years, identified as needing (average of 2.04 years) a vaccination (meningococcal conjugate, human papillomavirus, or tetanus, diphtheria, and pertussis vaccines) were messaged (mean age, 14 years; 50% male; 38% African-American; 23% white; 19% Hispanic; and 79% public health insurance). A total of 7,094 messages were sent: 3,334 automated voice (47%), 2,631 texts (37%), and 1,129 postcards (16%). After the first message, 865 adolescents (25.5%) received at least one vaccine. Within 24 weeks of messaging 1,324 vaccines (745 human papillomavirus; 403 meningococcal conjugate; and 176 tetanus, diphtheria, and pertussis vaccines) occurred in 959 visits (83.8% physician visits and 16.2% nurse visits). Average visits generated $204 gross reimbursement for $1.77 in messaging expenses per vaccine given. No differences in immunization completion rates occurred by age, gender, race/ethnicity, or insurance type. At 24 weeks, one message was more effective than two or three messages (35.6%, 19.4%, and 24.1% effectiveness, respectively; p Texts and postcards correlated with more vaccination visits (38.8% and 40.1%, respectively) than phone calls (31.5%; p = .04). More vaccines due led to increasing message effectiveness. Automated texts, voice messages, and postcards had a significant positive effect on vaccination rates in adolescents needing vaccination and required minimal financial expenditure. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  1. Enhanced Secure Algorithm for Message Communion

    CERN Document Server

    Rasool, Shaik; Kumar, K Hemanth; Kumar, P Ravi

    2011-01-01

    This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the al...

  2. Distributed Programming via Safe Closure Passing

    Directory of Open Access Journals (Sweden)

    Philipp Haller

    2016-02-01

    Full Text Available Programming systems incorporating aspects of functional programming, e.g., higher-order functions, are becoming increasingly popular for large-scale distributed programming. New frameworks such as Apache Spark leverage functional techniques to provide high-level, declarative APIs for in-memory data analytics, often outperforming traditional "big data" frameworks like Hadoop MapReduce. However, widely-used programming models remain rather ad-hoc; aspects such as implementation trade-offs, static typing, and semantics are not yet well-understood. We present a new asynchronous programming model that has at its core several principles facilitating functional processing of distributed data. The emphasis of our model is on simplicity, performance, and expressiveness. The primary means of communication is by passing functions (closures to distributed, immutable data. To ensure safe and efficient distribution of closures, our model leverages both syntactic and type-based restrictions. We report on a prototype implementation in Scala. Finally, we present preliminary experimental results evaluating the performance impact of a static, type-based optimization of serialization.

  3. Airborne Radar Interferometric Repeat-Pass Processing

    Science.gov (United States)

    Hensley, Scott; Michel, Thierry R.; Jones, Cathleen E.; Muellerschoen, Ronald J.; Chapman, Bruce D.; Fore, Alexander; Simard, Marc; Zebker, Howard A.

    2011-01-01

    Earth science research often requires crustal deformation measurements at a variety of time scales, from seconds to decades. Although satellites have been used for repeat-track interferometric (RTI) synthetic-aperture-radar (SAR) mapping for close to 20 years, RTI is much more difficult to implement from an airborne platform owing to the irregular trajectory of the aircraft compared with microwave imaging radar wavelengths. Two basic requirements for robust airborne repeat-pass radar interferometry include the ability to fly the platform to a desired trajectory within a narrow tube and the ability to have the radar beam pointed in a desired direction to a fraction of a beam width. Uninhabited Aerial Vehicle Synthetic Aperture Radar (UAVSAR) is equipped with a precision auto pilot developed by NASA Dryden that allows the platform, a Gulfstream III, to nominally fly within a 5 m diameter tube and with an electronically scanned antenna to position the radar beam to a fraction of a beam width based on INU (inertial navigation unit) attitude angle measurements.

  4. Single Pass Multi-component Harvester

    Energy Technology Data Exchange (ETDEWEB)

    Reed Hoskinson; J. Richard Hess

    2004-08-01

    Abstract. In order to meet the U. S. government’s goal of supplementing the energy available from petroleum by increasing the production of energy from renewable resources, increased production of bioenergy has become one of the new goals of the United States government and our society. U.S. Executive Orders and new Federal Legislation have mandated changes in government procedures and caused reorganizations within the government to support these goals. The Biomass Research and Development Initiative is a multi-agency effort to coordinate and accelerate all U.S. Federal biobased products and bioenergy research and development. The Initiative is managed by the National Biomass Coordination Office, which is staffed by both the DOE and the USDA. One of the most readily available sources of biomass from which to produce bioenergy is an agricultural crop residue, of which straw from small grains is the most feasible residue with which to start. For the straw residue to be used its collection must be energy efficient and its removal must not impact the sustainability of the growing environment. In addition, its collection must be economically advantageous to the producer. To do all that, a single pass multi-component harvester system is most desirable. Results from our first prototype suggest that current combines probably do adequate threshing and that a separate chassis can be developed that does additional separation and that is economically feasible.

  5. How My Program Passed the Turing Test

    Science.gov (United States)

    Humphrys, Mark

    In 1989, the author put an ELIZA-like chatbot on the Internet. The conversations this program had can be seen - depending on how one defines the rules (and how seriously one takes the idea of the test itself) - as a passing of the Turing Test. This is the first time this event has been properly written. This chatbot succeeded due to profanity, relentless aggression, prurient queries about the user, and implying that they were a liar when they responded. The element of surprise was also crucial. Most chatbots exist in an environment where people expectto find some bots among the humans. Not this one. What was also novel was the onlineelement. This was certainly one of the first AI programs online. It seems to have been the first (a) AI real-time chat program, which (b) had the element of surprise, and (c) was on the Internet. We conclude with some speculation that the future of all of AI is on the Internet, and a description of the "World- Wide-Mind" project that aims to bring this about.

  6. The Effectiveness of Heat Exchangers with One Shell Pass and Three Tube Passes.

    Science.gov (United States)

    1985-06-01

    Yorf, NY, 1973. 14. Chapra , S. C. and Canale, R. P., Numerical Methods for Engineers with Personal Computer Applications, "Mcraw-Hill Book Company, New...Effectiveness Ntu Method Three Tube Passes 20. ABSTRACT eConrnue an rere aid4eIf nocesey and Identify by block m bi6e r .Heat exchangers with one shell...THE DEVELOPMENT OF THE EFFECTIVENESS METHOD . . .. 20 A. LITERATURE SURVEY . . . . . . .......... 20 B. FISCHER’S WORK . . . . . . . . ......... 23

  7. Individual differences in drivers' cognitive processing of road safety messages.

    Science.gov (United States)

    Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M

    2013-01-01

    Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message

  8. A Survey and Comparative Study of Broadcast Warning Message Dissemination Schemes for VANETs

    Directory of Open Access Journals (Sweden)

    Julio A. Sanguesa

    2016-01-01

    Full Text Available Vehicle-to-vehicle (V2V communications also known as vehicular ad hoc networks (VANETs allow vehicles to cooperate to increase driving efficiency and safety on the roads. In particular, they are forecasted as one of the key technologies to increase traffic safety by providing useful traffic services. In this scope, vehicle-to-vehicle dissemination of warning messages to alert nearby vehicles is one of the most significant and representative solutions. The main goal of the different dissemination strategies available is to reduce the message delivery latency of such information while ensuring the correct reception of warning messages in the vehicle’s neighborhood as soon as a dangerous situation occurs. Despite the fact that several dissemination schemes have been proposed so far, their evaluation has been done under different conditions, using different simulators, making it difficult to determine the optimal dissemination scheme for each particular scenario. In this paper, besides reviewing the most relevant broadcast dissemination schemes available in the recent literature, we also provide a fair comparative analysis by evaluating them under the same environmental conditions, focusing on the same metrics, and using the same simulation platform. Overall, we provide researchers with a clear guideline of the benefits and drawbacks associated with each scheme.

  9. Erratum "New arbitrated quantum signature of classical messages against collective amplitude damping noise" [Optics Communications 284 (2011) 3144

    Science.gov (United States)

    Luo, Yi-Ping; Hwang, Tzonelih

    2013-08-01

    We point out that our previous work [Optics Communications 284 (2011) 3144] contains a mistake in the key updating equation. We correct the error to avoid an information leakage problem. We revisit our previous work entitled "New arbitrated quantum signature of classical messages against collective amplitude damping noise" [1] and discover a mistake in the key updating equation which could cause a key to reveal to a semi-honest arbitrator.

  10. A nomogram to predict the probability of passing the American Board of Internal Medicine examination

    Directory of Open Access Journals (Sweden)

    Andrei Brateanu

    2012-10-01

    Full Text Available Background : Although the American Board of Internal Medicine (ABIM certification is valued as a reflection of physicians’ experience, education, and expertise, limited methods exist to predict performance in the examination. Purpose : The objective of this study was to develop and validate a predictive tool based on variables common to all residency programs, regarding the probability of an internal medicine graduate passing the ABIM certification examination. Methods : The development cohort was obtained from the files of the Cleveland Clinic internal medicine residents who began training between 2004 and 2008. A multivariable logistic regression model was built to predict the ABIM passing rate. The model was represented as a nomogram, which was internally validated with bootstrap resamples. The external validation was done retrospectively on a cohort of residents who graduated from two other independent internal medicine residency programs between 2007 and 2011. Results : Of the 194 Cleveland Clinic graduates used for the nomogram development, 175 (90.2% successfully passed the ABIM certification examination. The final nomogram included four predictors: In-Training Examination (ITE scores in postgraduate year (PGY 1, 2, and 3, and the number of months of overnight calls in the last 6 months of residency. The nomogram achieved a concordance index (CI of 0.98 after correcting for over-fitting bias and allowed for the determination of an estimated probability of passing the ABIM exam. Of the 126 graduates from two other residency programs used for external validation, 116 (92.1% passed the ABIM examination. The nomogram CI in the external validation cohort was 0.94, suggesting outstanding discrimination. Conclusions : A simple user-friendly predictive tool, based on readily available data, was developed to predict the probability of passing the ABIM exam for internal medicine residents. This may guide program directors’ decision

  11. Unpacking attitude certainty: attitude clarity and attitude correctness.

    Science.gov (United States)

    Petrocelli, John V; Tormala, Zakary L; Rucker, Derek D

    2007-01-01

    Attitude certainty has been the subject of considerable attention in the attitudes and persuasion literature. The present research identifies 2 aspects of attitude certainty and provides evidence for the distinctness of the constructs. Specifically, it is proposed that attitude certainty can be conceptualized, and empirically separated, in terms of attitude clarity (the subjective sense that one knows what one's attitude is) and attitude correctness (the subjective sense that one's attitude is correct or valid). Experiment 1 uses factor analysis and correlational data to provide evidence for viewing attitude clarity and attitude correctness as separate constructs. Experiments 2 and 3 demonstrate that attitude clarity and attitude correctness can have distinct antecedents (repeated expression and consensus feedback, respectively). Experiment 4 reveals that these constructs each play an independent role in persuasion and resistance situations. As clarity and correctness increase, attitudes become more resistant to counterattitudinal persuasive messages. These findings are discussed in relation to the existing attitude strength literature. 2007 APA, all rights reserved

  12. Astronaut Franklin Chang-Diaz organizes shuttle mail message

    Science.gov (United States)

    1994-01-01

    On Discovery's aft flight deck, Astronaut Franklin R. Chang-Diaz begins to organize what was believed to be among the longest mail messages in Shuttle history. Though early Shuttle flights could brag of longer teleprinted messages, the Thermal Imaging Printing Systems's day four correspondence, most of which is out of frame here, is a record length for recent flights.

  13. Effects of Targeted Sales Messages on Subscription Sales and Retention.

    Science.gov (United States)

    Gamst, Glenn; And Others

    1987-01-01

    Investigates the effects of targeted sales messages on newspaper subscription sales and retention by combining two large research projects--a demographic market segmentation scheme, and a readership-lifestyle survey. Proposes that the content of sales messages influences new subscriptions but does not affect retention. (MM)

  14. Emotional Responses to Environmental Messages and Future Behavioral Intentions

    Science.gov (United States)

    Perrin, Jeffrey L.

    2011-01-01

    The present research investigated effects of message framing (losses-framed or gains-framed), message modality (video with text or text-only) and emotional arousal on environmentally responsible behavioral intentions. The sample consisted of 161 college students. The present research did not find a significant difference in behavioral intentions…

  15. Enhancing the security of chaotic signals in binary message transmission

    OpenAIRE

    Kostenko, Pavlo Yu.; Symonenko, S. N.; S.G. Semenov; Vasiuta, K. S.

    2009-01-01

    A technique for inserting a binary message into chaotic carrier has been proposed that enhances the security of data transmission systems at the expense of destructing the behavior typical for chaotic processes on the phase plane. An algorithm for recovery of the transmitted message was obtained and its quality for different signal-to-noise levels was estimated.

  16. Message framing and credibility: application in dental services.

    Science.gov (United States)

    Arora, R

    2000-01-01

    This study uses an experimental approach to test the influence of message framing and credibility on the attitude toward a dental exam and consumers' intention to use the dental office. The findings indicate a strong effect of credibility on attitude as well as intention. The influence of framing is also statistically significant. Implications for marketers in terms of message strategy are discussed.

  17. Messages Discriminated from the Media about Illicit Drugs.

    Science.gov (United States)

    Patterson, Scott J.

    1994-01-01

    Investigates how much and what type of information college students receive from the media about drugs. Interviews were conducted with 228 students using the message discrimination protocol. Results are discussed in terms of the audience receiving fear and fight messages rather than clear, accurate information necessary to make informed decisions…

  18. Identifying spam e-mail messages using an intelligence algorithm

    Directory of Open Access Journals (Sweden)

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  19. International Students, University Health Centers, and Memorable Messages about Health

    Science.gov (United States)

    Carmack, Heather J.; Bedi, Shireen; Heiss, Sarah N.

    2016-01-01

    International students entering US universities often experience a variety of important socialization messages. One important message is learning about and using the US health system. International students often first encounter the US health system through their experiences with university health centers. The authors explore the memorable…

  20. Persuasion with Unintelligible Messages: A Cognitive Response Analysis.

    Science.gov (United States)

    Padgett, Vernon R.; Brock, Timothy C.

    Theories of persuasion have long assumed a process which includes comprehension of the message by the recipient. Several hundred undergraduates at Ohio State University and Marshall University (Ohio) participated in six experiments examining persuasion and the use of unintelligible messages. Subjects in individual cubicles of a university language…

  1. Using BDH for the Message Authentication in VANET

    Directory of Open Access Journals (Sweden)

    Mei-Wen Huang

    2014-01-01

    Full Text Available The transport message security provided by vehicles in VANETs is quite important; vehicle message should be real-time and it will be not complicated to validate message calculation. The method proposed in the essay is mainly to validate the identity by means of Bilinear Diffie-Hellman method, and make vehicles validate the authenticity of RSU and TA’s identity and the effectiveness of key. RSU and TA only need to validate vehicle identity, without helping vehicles produce any key. When vehicle identity validation is completed, vehicles will produce public value and transmit it to other RSU and vehicles, while other vehicles could validate the identity through the message from the sender and public value from RSU. The advantages of the method proposed in this essay are listed as follows. (1 Vehicles, RSU, and TA can validate mutual identities and the effectiveness of keys. (2 Vehicles can produce public value functions automatically, thus reducing key control risks. (3 Vehicles do not need to show certificates to validate their identities, preventing the certificates from attacking because of long-term exposure. (4 Vehicles adopt a pseudonym ID challenge to validate their own identities during the process of handoff. (5 Vehicle messages can be validated using the Bilinear Diffie-Hellman (BDH method without waiting for the RSU to validate messages, thus improving the instantaneity of messaging. The method proposed in the essay can satisfy source authentication, message integrity, nonrepudiation, privacy, and conditional untraceability requirements.

  2. 47 CFR 80.327 - Urgency signals and messages.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Urgency signals and messages. 80.327 Section 80... Safety Procedures § 80.327 Urgency signals and messages. (a) The urgency signal indicates that the... vehicle, or the safety of a person. The urgency signal must be sent only on the authority of the master or...

  3. 47 CFR 80.329 - Safety signals and messages.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Safety signals and messages. 80.329 Section 80... Safety Procedures § 80.329 Safety signals and messages. (a) The safety signal indicates that the station... warnings. (b) In radiotelegraphy, the safety signal consists of three repetitions of the group TTT, sent...

  4. An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption

    OpenAIRE

    Awasthi, Amit K; Lal, Sunder

    2005-01-01

    Blind signature schemes enable a useful protocol that guarantee the anonymity of the participants while Signcryption offers authentication of message and confidentiality of messages at the same time and more efficiently. In this paper, we present a blind signcryption scheme that combines the functionality of blind signature and signcryption. This blind Signcryption is useful for applications that are based on anonymity untracebility and unlinkability.

  5. Transmission of Correlated Messages over Interference Channels with Strong Interference

    Science.gov (United States)

    Choi, Suhan; Yoon, Eunchul; Moon, Hichan

    Transmission of correlated messages over interference channels with strong interference is considered. As a result, an achievable rate region is presented. It is shown that if the messages are correlated, the achievable rate region can be larger than the capacity region given by Costa and El Gamal. As an example, the Gaussian interference channel is considered.

  6. Resonant Messages to Prevent Prescription Drug Misuse by Teens

    Science.gov (United States)

    Twombly, Eric C.; Holtz, Kristen D.; Agnew, Christine B.

    2011-01-01

    Prescription drug misuse is a major health problem, particularly among teens. A key step in curbing misuse is the development of effective prescription drug prevention messages. This paper explores the elements of prescription drug misuse prevention messages that resonate with teens using data from focus groups with seventh and eighth grade…

  7. Exchanging Second Language Messages Online: Developing an Intercultural Communicative Competence?

    Science.gov (United States)

    Schuetze, Ulf

    2008-01-01

    This article reports on a study carried out twice on an online second language course that was set up between a Canadian University and a German University. In that course, students of German in Canada and students of English in Germany exchanged 2,412 messages in 2004 and 1,831 messages in 2005. A list of processing criteria for assessment was…

  8. How peer conversations about HIV/AIDS media messages affect ...

    African Journals Online (AJOL)

    2016-06-16

    Jun 16, 2016 ... Keywords: beliefs, comprehension, health messages, interpersonal discussions, female adolescents, prevention. Résumé ... prehension of the participants (do they understand the message?), on their perceived comprehension (do they think ... relationships on decision making among individuals. The Diffu-.

  9. Effects of Targeted Sales Messages on Subscription Sales and Retention.

    Science.gov (United States)

    Gamst, Glenn; And Others

    1987-01-01

    Investigates the effects of targeted sales messages on newspaper subscription sales and retention by combining two large research projects--a demographic market segmentation scheme, and a readership-lifestyle survey. Proposes that the content of sales messages influences new subscriptions but does not affect retention. (MM)

  10. Multiculturalism and AIDS: different communities mean different educational messages required.

    Science.gov (United States)

    Lechky, O

    1997-05-15

    Having a multitude of different ethnic communities forces Canada's AIDS educators to use many different methods to deliver their messages. These range from an AIDS bingo game that has been used to educate natives in northern Manitoba to attempts to take AIDS education to the streets of Toronto. With AIDS education, reports Olga Lechky, one message definitely does not fit all.

  11. Children's Text Messaging: Abbreviations, Input Methods and Links with Literacy

    Science.gov (United States)

    Kemp, N.; Bushnell, C.

    2011-01-01

    This study investigated the effects of mobile phone text-messaging method (predictive and multi-press) and experience (in texters and non-texters) on children's textism use and understanding. It also examined popular claims that the use of text-message abbreviations, or "textese" spelling, is associated with poor literacy skills. A sample of 86…

  12. Short message service or disService: issues with text messaging in a complex medical environment.

    Science.gov (United States)

    Wu, Robert; Appel, Lora; Morra, Dante; Lo, Vivian; Kitto, Simon; Quan, Sherman

    2014-04-01

    Hospitals today are experiencing major changes in their clinical communication workflows as conventional numeric paging and face-to-face verbal conversations are being replaced by computer mediated communication systems. In this paper, we highlight the importance of understanding this transition and discuss some of the impacts that may emerge when verbal clinical conversations are replaced by short text messages. In-depth interviews (n=108) and non-participatory observation sessions (n=260h) were conducted on the General Internal Medicine wards at five academic teaching hospitals in Toronto, Canada. From our analysis of the qualitative data, we identified two major themes. De-contextualization of complex issues led to an increase in misinterpretation and an increase in back and forth messaging for clarification. Depersonalization of communication was due to less verbal conversations and face-to-face interactions and led to a negative impact on work relationships. Text-based communication in hospital settings led to the oversimplification of messages and the depersonalization of communication. It is important to recognize and understand these unintended consequences of new technology to avoid the negative impacts to patient care and work relationships. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  13. An analysis of patient-provider secure messaging at two Veterans Health Administration medical centers: message content and resolution through secure messaging.

    Science.gov (United States)

    Shimada, Stephanie L; Petrakis, Beth Ann; Rothendler, James A; Zirkle, Maryan; Zhao, Shibei; Feng, Hua; Fix, Gemmae M; Ozkaynak, Mustafa; Martin, Tracey; Johnson, Sharon A; Tulu, Bengisu; Gordon, Howard S; Simon, Steven R; Woods, Susan S

    2017-09-01

    We sought to understand how patients and primary care teams use secure messaging (SM) to communicate with one another by analyzing secure message threads from 2 Department of Veterans Affairs facilities. We coded 1000 threads of SM communication sampled from 40 primary care teams. Most threads (94.5%) were initiated by patients (90.4%) or caregivers (4.1%); only 5.5% were initiated by primary care team members proactively reaching out to patients. Medication renewals and refills (47.2%), scheduling requests (17.6%), medication issues (12.9%), and health issues (12.7%) were the most common patient-initiated requests, followed by referrals (7.0%), administrative issues (6.5%), test results (5.4%), test issues (5.2%), informing messages (4.9%), comments about the patient portal or SM (4.1%), appreciation (3.9%), self-reported data (2.8%), life issues (1.5%), and complaints (1.5%). Very few messages were clinically urgent (0.7%) or contained other potentially challenging content. Message threads were mostly short (2.7 messages), comprising an average of 1.35 discrete content types. A substantial proportion of issues (24.2%) did not show any evidence of being resolved through SM. Time to response and extent of resolution via SM varied by message content. Proactive SM use by teams varied, but was most often for test results (32.7%), medication-related issues (21.8%), medication renewals (16.4%), or scheduling issues (18.2%). The majority of messages were transactional and initiated by patients or caregivers. Not all content categories were fully addressed over SM. Further education and training for both patients and clinical teams could improve the quality and efficiency of SM communication.

  14. Single pass kernel -means clustering method

    Indian Academy of Sciences (India)

    T Hitendra Sarma; P Viswanath; B Eswara Reddy

    2013-06-01

    In unsupervised classification, kernel -means clustering method has been shown to perform better than conventional -means clustering method in identifying non-isotropic clusters in a data set. The space and time requirements of this method are $O(n^2)$, where is the data set size. Because of this quadratic time complexity, the kernel -means method is not applicable to work with large data sets. The paper proposes a simple and faster version of the kernel -means clustering method, called single pass kernel k-means clustering method. The proposed method works as follows. First, a random sample $\\mathcal{S}$ is selected from the data set $\\mathcal{D}$. A partition $\\Pi_{\\mathcal{S}}$ is obtained by applying the conventional kernel -means method on the random sample $\\mathcal{S}$. The novelty of the paper is, for each cluster in $\\Pi_{\\mathcal{S}}$, the exact cluster center in the input space is obtained using the gradient descent approach. Finally, each unsampled pattern is assigned to its closest exact cluster center to get a partition of the entire data set. The proposed method needs to scan the data set only once and it is much faster than the conventional kernel -means method. The time complexity of this method is $O(s^2+t+nk)$ where is the size of the random sample $\\mathcal{S}$, is the number of clusters required, and is the time taken by the gradient descent method (to find exact cluster centers). The space complexity of the method is $O(s^2)$. The proposed method can be easily implemented and is suitable for large data sets, like those in data mining applications. Experimental results show that, with a small loss of quality, the proposed method can significantly reduce the time taken than the conventional kernel -means clustering method. The proposed method is also compared with other recent similar methods.

  15. Alternative Data Storage Solution for Mobile Messaging Services

    Directory of Open Access Journals (Sweden)

    David C. C. Ong

    2007-01-01

    Full Text Available In recent years, mobile devices have become relatively more powerful with additional features which have the capability to provide multimedia streaming. Better, faster and more reliable data storage solutions in the mobile messaging platform have become more essential with these additional improvements. The existing mobile messaging infrastructure, in particular the data storage platform has become less proficient in coping with the increased demand for its services. This demand especially in the mobile messaging area (i.e. SMS – Short Messaging Service, MMS – Multimedia Messaging Service, which may well exceeded 250,000 requests per second, means that the need to evaluate competing data management systems has become not only necessary but essential. This paper presents an evaluation of SMS and MMS platforms using different database management systems – DBMS and recommends the best data management strategies for these platforms.

  16. Framing Effects in Narrative and Non-Narrative Risk Messages.

    Science.gov (United States)

    Steinhardt, Joseph; Shapiro, Michael A

    2015-08-01

    Narrative messages are increasingly popular in health and risk campaigns, yet gain/loss framing effects have never been tested with such messages. Three experiments examined framing in narrative messages. Experiment 1 found that only the character's decision, not framing, influenced judgments about characters in a narrative derived from a prospect theory context. Experiment 2 found that a framing effect that occurred when presented in a decision format did not occur when the same situation was presented as a narrative. Using a different story/decision context, Experiment 3 found no significant difference in preference for surgery over radiation therapy in a narrative presentation compared to a non-narrative presentation. The results suggest that health and risk campaigns cannot assume that framing effects will be the same in narrative messages and non-narrative messages. Potential reasons for these differences and suggestions for future research are discussed.

  17. Impact of nutrition messages on children's food choice: pilot study.

    Science.gov (United States)

    Bannon, Katie; Schwartz, Marlene B

    2006-03-01

    This pilot study tested the influence of nutrition message framing on snack choice among kindergarteners. Three classrooms were randomly assigned to watch one of the following 60s videos: (a) a gain-framed nutrition message (i.e. the positive benefits of eating apples) (n=14); (b) a loss-framed message (i.e. the negative consequences of not eating apples) (n=18); or (c) a control scene (children playing a game) (n=18). Following this, the children were offered a choice between animal crackers and an apple for their snack. Among the children who saw one of the nutrition message videos, 56% chose apples rather than animal crackers; in the control condition only 33% chose apples. This difference was statistically significant (chi2=7.56, p<0.01). These results suggest that videos containing nutritional messages may have a positive influence on children's short-term food choices.

  18. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  19. The Message Logger for the LHCb on-line farm

    CERN Document Server

    Bonifazi, F; Carbone, A; Galli, D; Gregori, D; Marconi, U; Peco, G; Vagnoni, V

    2005-01-01

    The Message Logger is a utility which provide a logger facility for the processes running on the nodes of the on-line farm. It can also be used to collect the processes stdout/stderr. The Message Logger can be exploited using two different policies: either as a no-drop logger facility (messages cannot be lost, but a write to the logger facility blocks in case of full-buffer condition, due e.g. to a network congestion) or as a congestion-proof logger facility (a write to the logger facility never locks even in case of network congestion, but, in this case, messages are dropped). The Message Logger package includes a Linux DIM server (logSrv), a Linux terminal/command-line DIM client (logViewer) and a PVSS DIM client.

  20. Message Encryption Using Deceptive Text and Randomized Hashing

    Directory of Open Access Journals (Sweden)

    VAMSIKRISHNA YENIKAPATI,

    2011-02-01

    Full Text Available In this paper a new approach for message encryption using the concept called deceptive text is proposed.In this scheme we don’t need send encrypted plain text to receiver, instead, we send a meaningful deceptive text and an encrypted special index file to message receiver.The original message is embedded in the meaningful deceptive text.The positions of the characters of the plain text in thedeceptive text are stored in the index file.The receiver decrypts the index file and gets back the original message from the received deceptive text. Authentication is achieved by verifying the hash value of the plaintext created by the Message Digest Algorithm at the receiver side.In order to prevent collision attcks on hashing algorithms that are intended for use with standard digital signature algorithms we provide an extra layer of security using randomized hashing method.