WorldWideScience

Sample records for correct message passing

  1. Future-based Static Analysis of Message Passing Programs

    Directory of Open Access Journals (Sweden)

    Wytse Oortwijn

    2016-06-01

    Full Text Available Message passing is widely used in industry to develop programs consisting of several distributed communicating components. Developing functionally correct message passing software is very challenging due to the concurrent nature of message exchanges. Nonetheless, many safety-critical applications rely on the message passing paradigm, including air traffic control systems and emergency services, which makes proving their correctness crucial. We focus on the modular verification of MPI programs by statically verifying concrete Java code. We use separation logic to reason about local correctness and define abstractions of the communication protocol in the process algebra used by mCRL2. We call these abstractions futures as they predict how components will interact during program execution. We establish a provable link between futures and program code and analyse the abstract futures via model checking to prove global correctness. Finally, we verify a leader election protocol to demonstrate our approach.

  2. Message Passing Framework for Globally Interconnected Clusters

    International Nuclear Information System (INIS)

    Hafeez, M; Riaz, N; Asghar, S; Malik, U A; Rehman, A

    2011-01-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  3. Message passing for quantified Boolean formulas

    International Nuclear Information System (INIS)

    Zhang, Pan; Ramezanpour, Abolfazl; Zecchina, Riccardo; Zdeborová, Lenka

    2012-01-01

    We introduce two types of message passing algorithms for quantified Boolean formulas (QBF). The first type is a message passing based heuristics that can prove unsatisfiability of the QBF by assigning the universal variables in such a way that the remaining formula is unsatisfiable. In the second type, we use message passing to guide branching heuristics of a Davis–Putnam–Logemann–Loveland (DPLL) complete solver. Numerical experiments show that on random QBFs our branching heuristics give robust exponential efficiency gain with respect to state-of-the-art solvers. We also manage to solve some previously unsolved benchmarks from the QBFLIB library. Apart from this, our study sheds light on using message passing in small systems and as subroutines in complete solvers

  4. Message passing with parallel queue traversal

    Science.gov (United States)

    Underwood, Keith D [Albuquerque, NM; Brightwell, Ronald B [Albuquerque, NM; Hemmert, K Scott [Albuquerque, NM

    2012-05-01

    In message passing implementations, associative matching structures are used to permit list entries to be searched in parallel fashion, thereby avoiding the delay of linear list traversal. List management capabilities are provided to support list entry turnover semantics and priority ordering semantics.

  5. Blind sensor calibration using approximate message passing

    International Nuclear Information System (INIS)

    Schülke, Christophe; Caltagirone, Francesco; Zdeborová, Lenka

    2015-01-01

    The ubiquity of approximately sparse data has led a variety of communities to take great interest in compressed sensing algorithms. Although these are very successful and well understood for linear measurements with additive noise, applying them to real data can be problematic if imperfect sensing devices introduce deviations from this ideal signal acquisition process, caused by sensor decalibration or failure. We propose a message passing algorithm called calibration approximate message passing (Cal-AMP) that can treat a variety of such sensor-induced imperfections. In addition to deriving the general form of the algorithm, we numerically investigate two particular settings. In the first, a fraction of the sensors is faulty, giving readings unrelated to the signal. In the second, sensors are decalibrated and each one introduces a different multiplicative gain to the measurements. Cal-AMP shares the scalability of approximate message passing, allowing us to treat large sized instances of these problems, and experimentally exhibits a phase transition between domains of success and failure. (paper)

  6. Belief propagation decoding of quantum channels by passing quantum messages

    International Nuclear Information System (INIS)

    Renes, Joseph M

    2017-01-01

    The belief propagation (BP) algorithm is a powerful tool in a wide range of disciplines from statistical physics to machine learning to computational biology, and is ubiquitous in decoding classical error-correcting codes. The algorithm works by passing messages between nodes of the factor graph associated with the code and enables efficient decoding of the channel, in some cases even up to the Shannon capacity. Here we construct the first BP algorithm which passes quantum messages on the factor graph and is capable of decoding the classical–quantum channel with pure state outputs. This gives explicit decoding circuits whose number of gates is quadratic in the code length. We also show that this decoder can be modified to work with polar codes for the pure state channel and as part of a decoder for transmitting quantum information over the amplitude damping channel. These represent the first explicit capacity-achieving decoders for non-Pauli channels. (fast track communication)

  7. Belief propagation decoding of quantum channels by passing quantum messages

    Science.gov (United States)

    Renes, Joseph M.

    2017-07-01

    The belief propagation (BP) algorithm is a powerful tool in a wide range of disciplines from statistical physics to machine learning to computational biology, and is ubiquitous in decoding classical error-correcting codes. The algorithm works by passing messages between nodes of the factor graph associated with the code and enables efficient decoding of the channel, in some cases even up to the Shannon capacity. Here we construct the first BP algorithm which passes quantum messages on the factor graph and is capable of decoding the classical-quantum channel with pure state outputs. This gives explicit decoding circuits whose number of gates is quadratic in the code length. We also show that this decoder can be modified to work with polar codes for the pure state channel and as part of a decoder for transmitting quantum information over the amplitude damping channel. These represent the first explicit capacity-achieving decoders for non-Pauli channels.

  8. Analysis and Design of Binary Message-Passing Decoders

    DEFF Research Database (Denmark)

    Lechner, Gottfried; Pedersen, Troels; Kramer, Gerhard

    2012-01-01

    Binary message-passing decoders for low-density parity-check (LDPC) codes are studied by using extrinsic information transfer (EXIT) charts. The channel delivers hard or soft decisions and the variable node decoder performs all computations in the L-value domain. A hard decision channel results...... message-passing decoders. Finally, it is shown that errors on cycles consisting only of degree two and three variable nodes cannot be corrected and a necessary and sufficient condition for the existence of a cycle-free subgraph is derived....... in the well-know Gallager B algorithm, and increasing the output alphabet from hard decisions to two bits yields a gain of more than 1.0 dB in the required signal to noise ratio when using optimized codes. The code optimization requires adapting the mixing property of EXIT functions to the case of binary...

  9. The serial message-passing schedule for LDPC decoding algorithms

    Science.gov (United States)

    Liu, Mingshan; Liu, Shanshan; Zhou, Yuan; Jiang, Xue

    2015-12-01

    The conventional message-passing schedule for LDPC decoding algorithms is the so-called flooding schedule. It has the disadvantage that the updated messages cannot be used until next iteration, thus reducing the convergence speed . In this case, the Layered Decoding algorithm (LBP) based on serial message-passing schedule is proposed. In this paper the decoding principle of LBP algorithm is briefly introduced, and then proposed its two improved algorithms, the grouped serial decoding algorithm (Grouped LBP) and the semi-serial decoding algorithm .They can improve LBP algorithm's decoding speed while maintaining a good decoding performance.

  10. EXIT Chart Analysis of Binary Message-Passing Decoders

    DEFF Research Database (Denmark)

    Lechner, Gottfried; Pedersen, Troels; Kramer, Gerhard

    2007-01-01

    Binary message-passing decoders for LDPC codes are analyzed using EXIT charts. For the analysis, the variable node decoder performs all computations in the L-value domain. For the special case of a hard decision channel, this leads to the well know Gallager B algorithm, while the analysis can...... be extended to channels with larger output alphabets. By increasing the output alphabet from hard decisions to four symbols, a gain of more than 1.0 dB is achieved using optimized codes. For this code optimization, the mixing property of EXIT functions has to be modified to the case of binary message......-passing decoders....

  11. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    We present ParTypes, a type-based methodology for the verification of Message Passing Interface (MPI) programs written in the C programming language. The aim is to statically verify programs against protocol specifications, enforcing properties such as fidelity and absence of deadlocks. We develo...

  12. Track-stitching using graphical models and message passing

    CSIR Research Space (South Africa)

    Van der Merwe, LJ

    2013-07-01

    Full Text Available In order to stitch tracks together, two tasks are required, namely tracking and track stitching. In this study track stitching is performed using a graphical model and message passing (belief propagation) approach. Tracks are modelled as nodes in a...

  13. A message passing algorithm for the evaluation of social influence

    NARCIS (Netherlands)

    Vassio, Luca; Fagnani, Fabio; Frasca, Paolo; Ozdaglar, Asuman

    2014-01-01

    In this paper, we define a new measure of node centrality in social networks, the Harmonic Influence Centrality, which emerges naturally in the study of social influence over networks. Next, we introduce a distributed message passing algorithm to compute the Harmonic Influence Centrality of each

  14. Statistics of Epidemics in Networks by Passing Messages

    Science.gov (United States)

    Shrestha, Munik Kumar

    Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result

  15. S-AMP: Approximate Message Passing for General Matrix Ensembles

    DEFF Research Database (Denmark)

    Cakmak, Burak; Winther, Ole; Fleury, Bernard H.

    2014-01-01

    the approximate message-passing (AMP) algorithm to general matrix ensembles with a well-defined large system size limit. The generalization is based on the S-transform (in free probability) of the spectrum of the measurement matrix. Furthermore, we show that the optimality of S-AMP follows directly from its......We propose a novel iterative estimation algorithm for linear observation models called S-AMP. The fixed points of S-AMP are the stationary points of the exact Gibbs free energy under a set of (first- and second-) moment consistency constraints in the large system limit. S-AMP extends...

  16. Fault-tolerant Agreement in Synchronous Message-passing Systems

    CERN Document Server

    Raynal, Michel

    2010-01-01

    The present book focuses on the way to cope with the uncertainty created by process failures (crash, omission failures and Byzantine behavior) in synchronous message-passing systems (i.e., systems whose progress is governed by the passage of time). To that end, the book considers fundamental problems that distributed synchronous processes have to solve. These fundamental problems concern agreement among processes (if processes are unable to agree in one way or another in presence of failures, no non-trivial problem can be solved). They are consensus, interactive consistency, k-set agreement an

  17. Parallelization of a hydrological model using the message passing interface

    Science.gov (United States)

    Wu, Yiping; Li, Tiejian; Sun, Liqun; Chen, Ji

    2013-01-01

    With the increasing knowledge about the natural processes, hydrological models such as the Soil and Water Assessment Tool (SWAT) are becoming larger and more complex with increasing computation time. Additionally, other procedures such as model calibration, which may require thousands of model iterations, can increase running time and thus further reduce rapid modeling and analysis. Using the widely-applied SWAT as an example, this study demonstrates how to parallelize a serial hydrological model in a Windows® environment using a parallel programing technology—Message Passing Interface (MPI). With a case study, we derived the optimal values for the two parameters (the number of processes and the corresponding percentage of work to be distributed to the master process) of the parallel SWAT (P-SWAT) on an ordinary personal computer and a work station. Our study indicates that model execution time can be reduced by 42%–70% (or a speedup of 1.74–3.36) using multiple processes (two to five) with a proper task-distribution scheme (between the master and slave processes). Although the computation time cost becomes lower with an increasing number of processes (from two to five), this enhancement becomes less due to the accompanied increase in demand for message passing procedures between the master and all slave processes. Our case study demonstrates that the P-SWAT with a five-process run may reach the maximum speedup, and the performance can be quite stable (fairly independent of a project size). Overall, the P-SWAT can help reduce the computation time substantially for an individual model run, manual and automatic calibration procedures, and optimization of best management practices. In particular, the parallelization method we used and the scheme for deriving the optimal parameters in this study can be valuable and easily applied to other hydrological or environmental models.

  18. Weighted community detection and data clustering using message passing

    Science.gov (United States)

    Shi, Cheng; Liu, Yanchen; Zhang, Pan

    2018-03-01

    Grouping objects into clusters based on the similarities or weights between them is one of the most important problems in science and engineering. In this work, by extending message-passing algorithms and spectral algorithms proposed for an unweighted community detection problem, we develop a non-parametric method based on statistical physics, by mapping the problem to the Potts model at the critical temperature of spin-glass transition and applying belief propagation to solve the marginals corresponding to the Boltzmann distribution. Our algorithm is robust to over-fitting and gives a principled way to determine whether there are significant clusters in the data and how many clusters there are. We apply our method to different clustering tasks. In the community detection problem in weighted and directed networks, we show that our algorithm significantly outperforms existing algorithms. In the clustering problem, where the data were generated by mixture models in the sparse regime, we show that our method works all the way down to the theoretical limit of detectability and gives accuracy very close to that of the optimal Bayesian inference. In the semi-supervised clustering problem, our method only needs several labels to work perfectly in classic datasets. Finally, we further develop Thouless-Anderson-Palmer equations which heavily reduce the computation complexity in dense networks but give almost the same performance as belief propagation.

  19. Why pass on viral messages? Because they connect emotionally

    NARCIS (Netherlands)

    Dobele, A.; Lindgreen, A.; Beverland, M.; Vanhamme, J.; Wijk, van R.

    2007-01-01

    In this article, we identify that successful viral marketing campaigns trigger an emotional response in recipients. Working under this premise, we examine the effects of viral messages containing the six primary emotions (surprise, joy, sadness, anger, fear, and disgust) on recipients' emotional

  20. High performance message passing for the ATLAS DAQ/EF-1 project

    CERN Document Server

    Mornacchi, Giuseppe

    1999-01-01

    Summary form only. A message passing library has been developed in the context of the ATLAS DAQ/EF-1 project. It is used for time critical applications within the front-end part of the DAQ system, mainly to exchange data control messages between I/O processors. Key objectives of the design were low message overheads, efficient use of the data transfer buses, provision of broadcast functionality and a hardware and operating system independent implementation of the application interface. The design and implementation of the message passing library are presented. As required by the project, the implementation is based on commercial components, namely VMEbus, PCI, the Lynx-OS real-time operating system and an additional inter- processor link, PVIC. The latter offers broadcast functionality identified as being important to the overall performance of the message passing. In addition, performance benchmarks for all implementing buses are presented for both simple test programs and the full DAQ applications. (0 refs)...

  1. Theoretic derivation of directed acyclic subgraph algorithm and comparisons with message passing algorithm

    Science.gov (United States)

    Ha, Jeongmok; Jeong, Hong

    2016-07-01

    This study investigates the directed acyclic subgraph (DAS) algorithm, which is used to solve discrete labeling problems much more rapidly than other Markov-random-field-based inference methods but at a competitive accuracy. However, the mechanism by which the DAS algorithm simultaneously achieves competitive accuracy and fast execution speed, has not been elucidated by a theoretical derivation. We analyze the DAS algorithm by comparing it with a message passing algorithm. Graphical models, inference methods, and energy-minimization frameworks are compared between DAS and message passing algorithms. Moreover, the performances of DAS and other message passing methods [sum-product belief propagation (BP), max-product BP, and tree-reweighted message passing] are experimentally compared.

  2. An efficient communication scheme for solving Sn equations on message-passing multiprocessors

    International Nuclear Information System (INIS)

    Azmy, Y.Y.

    1993-01-01

    Early models of Intel's hypercube multiprocessors, e.g., the iPSC/1 and iPSC/2, were characterized by the high latency of message passing. This relatively weak dependence of the communication penalty on the size of messages, in contrast to its strong dependence on the number of messages, justified using the Fan-in Fan-out algorithm (which implements a minimum spanning tree path) to perform global operations, such as global sums, etc. Recent models of message-passing computers, such as the iPSC/860 and the Paragon, have been found to possess much smaller latency, thus forcing a reexamination of the issue of performance optimization with respect to communication schemes. Essentially, the Fan-in Fan-out scheme minimizes the number of nonsimultaneous messages sent but not the volume of data traffic across the network. Furthermore, if a global operation is performed in conjunction with the message passing, a large fraction of the attached nodes remains idle as the number of utilized processors is halved in each step of the process. On the other hand, the Recursive Halving scheme offers the smallest communication cost for global operations but has some drawbacks

  3. Message-Passing Receivers for Single Carrier Systems with Frequency-Domain Equalization

    DEFF Research Database (Denmark)

    Zhang, Chuanzong; Manchón, Carles Navarro; Wang, Zhongyong

    2015-01-01

    In this letter, we design iterative receiver algorithms for joint frequency-domain equalization and decoding in a single carrier system assuming perfect channel state information. Based on an approximate inference framework that combines belief propagation (BP) and the mean field (MF) approximation......, we propose two receiver algorithms with, respectively, parallel and sequential message-passing schedules in the MF part. A recently proposed receiver based on generalized approximate message passing (GAMP) is used as a benchmarking reference. The simulation results show that the BP-MF receiver...

  4. Discrete geometric analysis of message passing algorithm on graphs

    Science.gov (United States)

    Watanabe, Yusuke

    2010-04-01

    We often encounter probability distributions given as unnormalized products of non-negative functions. The factorization structures are represented by hypergraphs called factor graphs. Such distributions appear in various fields, including statistics, artificial intelligence, statistical physics, error correcting codes, etc. Given such a distribution, computations of marginal distributions and the normalization constant are often required. However, they are computationally intractable because of their computational costs. One successful approximation method is Loopy Belief Propagation (LBP) algorithm. The focus of this thesis is an analysis of the LBP algorithm. If the factor graph is a tree, i.e. having no cycle, the algorithm gives the exact quantities. If the factor graph has cycles, however, the LBP algorithm does not give exact results and possibly exhibits oscillatory and non-convergent behaviors. The thematic question of this thesis is "How the behaviors of the LBP algorithm are affected by the discrete geometry of the factor graph?" The primary contribution of this thesis is the discovery of a formula that establishes the relation between the LBP, the Bethe free energy and the graph zeta function. This formula provides new techniques for analysis of the LBP algorithm, connecting properties of the graph and of the LBP and the Bethe free energy. We demonstrate applications of the techniques to several problems including (non) convexity of the Bethe free energy, the uniqueness and stability of the LBP fixed point. We also discuss the loop series initiated by Chertkov and Chernyak. The loop series is a subgraph expansion of the normalization constant, or partition function, and reflects the graph geometry. We investigate theoretical natures of the series. Moreover, we show a partial connection between the loop series and the graph zeta function.

  5. McMPI – a managed-code message passing interface library for high performance communication in C#

    OpenAIRE

    Holmes, Daniel John

    2012-01-01

    This work endeavours to achieve technology transfer between established best-practice in academic high-performance computing and current techniques in commercial high-productivity computing. It shows that a credible high-performance message-passing communication library, with semantics and syntax following the Message-Passing Interface (MPI) Standard, can be built in pure C# (one of the .Net suite of computer languages). Message-passing has been the dominant paradigm in high-pe...

  6. Neighbourhood-consensus message passing and its potentials in image processing applications

    Science.gov (United States)

    Ružic, Tijana; Pižurica, Aleksandra; Philips, Wilfried

    2011-03-01

    In this paper, a novel algorithm for inference in Markov Random Fields (MRFs) is presented. Its goal is to find approximate maximum a posteriori estimates in a simple manner by combining neighbourhood influence of iterated conditional modes (ICM) and message passing of loopy belief propagation (LBP). We call the proposed method neighbourhood-consensus message passing because a single joint message is sent from the specified neighbourhood to the central node. The message, as a function of beliefs, represents the agreement of all nodes within the neighbourhood regarding the labels of the central node. This way we are able to overcome the disadvantages of reference algorithms, ICM and LBP. On one hand, more information is propagated in comparison with ICM, while on the other hand, the huge amount of pairwise interactions is avoided in comparison with LBP by working with neighbourhoods. The idea is related to the previously developed iterated conditional expectations algorithm. Here we revisit it and redefine it in a message passing framework in a more general form. The results on three different benchmarks demonstrate that the proposed technique can perform well both for binary and multi-label MRFs without any limitations on the model definition. Furthermore, it manifests improved performance over related techniques either in terms of quality and/or speed.

  7. Stampi: a message passing library for distributed parallel computing. User's guide

    International Nuclear Information System (INIS)

    Imamura, Toshiyuki; Koide, Hiroshi; Takemiya, Hiroshi

    1998-11-01

    A new message passing library, Stampi, has been developed to realize a computation with different kind of parallel computers arbitrarily and making MPI (Message Passing Interface) as an unique interface for communication. Stampi is based on MPI2 specification. It realizes dynamic process creation to different machines and communication between spawned one within the scope of MPI semantics. Vender implemented MPI as a closed system in one parallel machine and did not support both functions; process creation and communication to external machines. Stampi supports both functions and enables us distributed parallel computing. Currently Stampi has been implemented on COMPACS (COMplex PArallel Computer System) introduced in CCSE, five parallel computers and one graphic workstation, and any communication on them can be processed on. (author)

  8. Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis

    Science.gov (United States)

    Wang, Yi-Min

    1993-01-01

    Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.

  9. Stampi: a message passing library for distributed parallel computing. User's guide, second edition

    International Nuclear Information System (INIS)

    Imamura, Toshiyuki; Koide, Hiroshi; Takemiya, Hiroshi

    2000-02-01

    A new message passing library, Stampi, has been developed to realize a computation with different kind of parallel computers arbitrarily and making MPI (Message Passing Interface) as an unique interface for communication. Stampi is based on the MPI2 specification, and it realizes dynamic process creation to different machines and communication between spawned one within the scope of MPI semantics. Main features of Stampi are summarized as follows: (i) an automatic switch function between external- and internal communications, (ii) a message routing/relaying with a routing module, (iii) a dynamic process creation, (iv) a support of two types of connection, Master/Slave and Client/Server, (v) a support of a communication with Java applets. Indeed vendors implemented MPI libraries as a closed system in one parallel machine or their systems, and did not support both functions; process creation and communication to external machines. Stampi supports both functions and enables us distributed parallel computing. Currently Stampi has been implemented on COMPACS (COMplex PArallel Computer System) introduced in CCSE, five parallel computers and one graphic workstation, moreover on eight kinds of parallel machines, totally fourteen systems. Stampi provides us MPI communication functionality on them. This report describes mainly the usage of Stampi. (author)

  10. A Message-Passing Hardware/Software Cosimulation Environment for Reconfigurable Computing Systems

    Directory of Open Access Journals (Sweden)

    Manuel Saldaña

    2009-01-01

    Full Text Available High-performance reconfigurable computers (HPRCs provide a mix of standard processors and FPGAs to collectively accelerate applications. This introduces new design challenges, such as the need for portable programming models across HPRCs and system-level verification tools. To address the need for cosimulating a complete heterogeneous application using both software and hardware in an HPRC, we have created a tool called the Message-passing Simulation Framework (MSF. We have used it to simulate and develop an interface enabling an MPI-based approach to exchange data between X86 processors and hardware engines inside FPGAs. The MSF can also be used as an application development tool that enables multiple FPGAs in simulation to exchange messages amongst themselves and with X86 processors. As an example, we simulate a LINPACK benchmark hardware core using an Intel-FSB-Xilinx-FPGA platform to quickly prototype the hardware, to test the communications. and to verify the benchmark results.

  11. A real-time MPEG software decoder using a portable message-passing library

    Energy Technology Data Exchange (ETDEWEB)

    Kwong, Man Kam; Tang, P.T. Peter; Lin, Biquan

    1995-12-31

    We present a real-time MPEG software decoder that uses message-passing libraries such as MPL, p4 and MPI. The parallel MPEG decoder currently runs on the IBM SP system but can be easil ported to other parallel machines. This paper discusses our parallel MPEG decoding algorithm as well as the parallel programming environment under which it uses. Several technical issues are discussed, including balancing of decoding speed, memory limitation, 1/0 capacities, and optimization of MPEG decoding components. This project shows that a real-time portable software MPEG decoder is feasible in a general-purpose parallel machine.

  12. The specification of Stampi, a message passing library for distributed parallel computing

    International Nuclear Information System (INIS)

    Imamura, Toshiyuki; Takemiya, Hiroshi; Koide, Hiroshi

    2000-03-01

    At CCSE, Center for Promotion of Computational Science and Engineering, a new message passing library for heterogeneous and distributed parallel computing has been developed, and it is called as Stampi. Stampi enables us to communicate between any combination of parallel computers as well as workstations. Currently, a Stampi system is constructed from Stampi library and Stampi/Java. It provides functions to connect a Stampi application with not only those on COMPACS, COMplex Parallel Computer System, but also applets which work on WWW browsers. This report summarizes the specifications of Stampi and details the development of its system. (author)

  13. A message-passing approach to random constraint satisfaction problems with growing domains

    International Nuclear Information System (INIS)

    Zhao, Chunyan; Zheng, Zhiming; Zhou, Haijun; Xu, Ke

    2011-01-01

    Message-passing algorithms based on belief propagation (BP) are implemented on a random constraint satisfaction problem (CSP) referred to as model RB, which is a prototype of hard random CSPs with growing domain size. In model RB, the number of candidate discrete values (the domain size) of each variable increases polynomially with the variable number N of the problem formula. Although the satisfiability threshold of model RB is exactly known, finding solutions for a single problem formula is quite challenging and attempts have been limited to cases of N ∼ 10 2 . In this paper, we propose two different kinds of message-passing algorithms guided by BP for this problem. Numerical simulations demonstrate that these algorithms allow us to find a solution for random formulas of model RB with constraint tightness slightly less than p cr , the threshold value for the satisfiability phase transition. To evaluate the performance of these algorithms, we also provide a local search algorithm (random walk) as a comparison. Besides this, the simulated time dependence of the problem size N and the entropy of the variables for growing domain size are discussed

  14. Partition function expansion on region graphs and message-passing equations

    International Nuclear Information System (INIS)

    Zhou, Haijun; Wang, Chuang; Xiao, Jing-Qing; Bi, Zedong

    2011-01-01

    Disordered and frustrated graphical systems are ubiquitous in physics, biology, and information science. For models on complete graphs or random graphs, deep understanding has been achieved through the mean-field replica and cavity methods. But finite-dimensional 'real' systems remain very challenging because of the abundance of short loops and strong local correlations. A statistical mechanics theory is constructed in this paper for finite-dimensional models based on the mathematical framework of the partition function expansion and the concept of region graphs. Rigorous expressions for the free energy and grand free energy are derived. Message-passing equations on the region graph, such as belief propagation and survey propagation, are also derived rigorously. (letter)

  15. Distributed primal–dual interior-point methods for solving tree-structured coupled convex problems using message-passing

    DEFF Research Database (Denmark)

    Khoshfetrat Pakazad, Sina; Hansson, Anders; Andersen, Martin S.

    2017-01-01

    In this paper, we propose a distributed algorithm for solving coupled problems with chordal sparsity or an inherent tree structure which relies on primal–dual interior-point methods. We achieve this by distributing the computations at each iteration, using message-passing. In comparison to existi...

  16. Parallelization of MCNP Monte Carlo neutron and photon transport code in parallel virtual machine and message passing interface

    International Nuclear Information System (INIS)

    Deng Li; Xie Zhongsheng

    1999-01-01

    The coupled neutron and photon transport Monte Carlo code MCNP (version 3B) has been parallelized in parallel virtual machine (PVM) and message passing interface (MPI) by modifying a previous serial code. The new code has been verified by solving sample problems. The speedup increases linearly with the number of processors and the average efficiency is up to 99% for 12-processor. (author)

  17. Design of a Message Passing Model for Use in a Heterogeneous CPU-NFP Framework for Network Analytics

    CSIR Research Space (South Africa)

    Pennefather, S

    2017-09-01

    Full Text Available of applications written in the Go programming language to be executed on a Network Flow Processor (NFP) for enhanced performance. This paper explores the need and feasibility of implementing a message passing model for data transmission between the NFP and CPU...

  18. Approximate message passing for nonconvex sparse regularization with stability and asymptotic analysis

    Science.gov (United States)

    Sakata, Ayaka; Xu, Yingying

    2018-03-01

    We analyse a linear regression problem with nonconvex regularization called smoothly clipped absolute deviation (SCAD) under an overcomplete Gaussian basis for Gaussian random data. We propose an approximate message passing (AMP) algorithm considering nonconvex regularization, namely SCAD-AMP, and analytically show that the stability condition corresponds to the de Almeida-Thouless condition in spin glass literature. Through asymptotic analysis, we show the correspondence between the density evolution of SCAD-AMP and the replica symmetric (RS) solution. Numerical experiments confirm that for a sufficiently large system size, SCAD-AMP achieves the optimal performance predicted by the replica method. Through replica analysis, a phase transition between replica symmetric and replica symmetry breaking (RSB) region is found in the parameter space of SCAD. The appearance of the RS region for a nonconvex penalty is a significant advantage that indicates the region of smooth landscape of the optimization problem. Furthermore, we analytically show that the statistical representation performance of the SCAD penalty is better than that of \

  19. Communication strategies for angular domain decomposition of transport calculations on message passing multiprocessors

    International Nuclear Information System (INIS)

    Azmy, Y.Y.

    1997-01-01

    The effect of three communication schemes for solving Arbitrarily High Order Transport (AHOT) methods of the Nodal type on parallel performance is examined via direct measurements and performance models. The target architecture in this study is Oak Ridge National Laboratory's 128 node Paragon XP/S 5 computer and the parallelization is based on the Parallel Virtual Machine (PVM) library. However, the conclusions reached can be easily generalized to a large class of message passing platforms and communication software. The three schemes considered here are: (1) PVM's global operations (broadcast and reduce) which utilizes the Paragon's native corresponding operations based on a spanning tree routing; (2) the Bucket algorithm wherein the angular domain decomposition of the mesh sweep is complemented with a spatial domain decomposition of the accumulation process of the scalar flux from the angular flux and the convergence test; (3) a distributed memory version of the Bucket algorithm that pushes the spatial domain decomposition one step farther by actually distributing the fixed source and flux iterates over the memories of the participating processes. Their conclusion is that the Bucket algorithm is the most efficient of the three if all participating processes have sufficient memories to hold the entire problem arrays. Otherwise, the third scheme becomes necessary at an additional cost to speedup and parallel efficiency that is quantifiable via the parallel performance model

  20. Using Partial Reconfiguration and Message Passing to Enable FPGA-Based Generic Computing Platforms

    Directory of Open Access Journals (Sweden)

    Manuel Saldaña

    2012-01-01

    Full Text Available Partial reconfiguration (PR is an FPGA feature that allows the modification of certain parts of an FPGA while the rest of the system continues to operate without disruption. This distinctive characteristic of FPGAs has many potential benefits but also challenges. The lack of good CAD tools and the deep hardware knowledge requirement result in a hard-to-use feature. In this paper, the new partition-based Xilinx PR flow is used to incorporate PR within our MPI-based message-passing framework to allow hardware designers to create template bitstreams, which are predesigned, prerouted, generic bitstreams that can be reused for multiple applications. As an example of the generality of this approach, four different applications that use the same template bitstream are run consecutively, with a PR operation performed at the beginning of each application to instantiate the desired application engine. We demonstrate a simplified, reusable, high-level, and portable PR interface for X86-FPGA hybrid machines. PR issues such as local resets of reconfigurable modules and context saving and restoring are addressed in this paper followed by some examples and preliminary PR overhead measurements.

  1. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Science.gov (United States)

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  2. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  3. Message passing vs. shared address space on a cluster of SMPs

    International Nuclear Information System (INIS)

    Shan, Hongzhang; Singh, Jaswinder Pal; Oliker, Leonid; Biswas, Rupak

    2001-01-01

    The emergence of scalable computer architectures using clusters of PCs or PC-SMPs with commodity networking has made them attractive platforms for high-end scientific computing. Currently, message passing (MP) and shared address space (SAS) are the two leading programming paradigms for these systems. MP has been standardized with MPI, and is the most common and mature parallel programming approach. However, MP code development can be extremely difficult, especially for irregularly structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality and high protocol overhead. In this paper, they compare the performance of and programming effort required for six applications under both programming models on a 32-CPU PC-SMP cluster. Our application suite consists of codes that typically do not exhibit scalable performance under shared-memory programming due to their high communication-to-computation ratios and complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of the applications; however, on certain classes of problems, SAS performance is competitive with MPI

  4. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response.

    Directory of Open Access Journals (Sweden)

    Jeannette Sutton

    Full Text Available Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials' Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events.

  5. Scalable High Performance Message Passing over InfiniBand for Open MPI

    Energy Technology Data Exchange (ETDEWEB)

    Friedley, A; Hoefler, T; Leininger, M L; Lumsdaine, A

    2007-10-24

    InfiniBand (IB) is a popular network technology for modern high-performance computing systems. MPI implementations traditionally support IB using a reliable, connection-oriented (RC) transport. However, per-process resource usage that grows linearly with the number of processes, makes this approach prohibitive for large-scale systems. IB provides an alternative in the form of a connectionless unreliable datagram transport (UD), which allows for near-constant resource usage and initialization overhead as the process count increases. This paper describes a UD-based implementation for IB in Open MPI as a scalable alternative to existing RC-based schemes. We use the software reliability capabilities of Open MPI to provide the guaranteed delivery semantics required by MPI. Results show that UD not only requires fewer resources at scale, but also allows for shorter MPI startup times. A connectionless model also improves performance for applications that tend to send small messages to many different processes.

  6. The design of multi-core DSP parallel model based on message passing and multi-level pipeline

    Science.gov (United States)

    Niu, Jingyu; Hu, Jian; He, Wenjing; Meng, Fanrong; Li, Chuanrong

    2017-10-01

    Currently, the design of embedded signal processing system is often based on a specific application, but this idea is not conducive to the rapid development of signal processing technology. In this paper, a parallel processing model architecture based on multi-core DSP platform is designed, and it is mainly suitable for the complex algorithms which are composed of different modules. This model combines the ideas of multi-level pipeline parallelism and message passing, and summarizes the advantages of the mainstream model of multi-core DSP (the Master-Slave model and the Data Flow model), so that it has better performance. This paper uses three-dimensional image generation algorithm to validate the efficiency of the proposed model by comparing with the effectiveness of the Master-Slave and the Data Flow model.

  7. Education and training in radiation protection: a challenge in passing on a difficult and intricate message

    Energy Technology Data Exchange (ETDEWEB)

    Sabol, Jozef; Hudzietzova, Jana; Rosina, Jozef, E-mail: j.sabol44@gmail.com, E-mail: hudzijan@fbmi.cvut.cz, E-mail: rosina@fbmi.cvut.cz [Faculty of Biomedical Engineering, Czech Technical University in Prague (Czech Republic)

    2013-07-01

    protection in the correct way consistent with their latest definitions and ICRP recommendations. (author)

  8. Education and training in radiation protection: a challenge in passing on a difficult and intricate message

    International Nuclear Information System (INIS)

    Sabol, Jozef; Hudzietzova, Jana; Rosina, Jozef

    2013-01-01

    protection in the correct way consistent with their latest definitions and ICRP recommendations. (author)

  9. Temporal high-pass non-uniformity correction algorithm based on grayscale mapping and hardware implementation

    Science.gov (United States)

    Jin, Minglei; Jin, Weiqi; Li, Yiyang; Li, Shuo

    2015-08-01

    In this paper, we propose a novel scene-based non-uniformity correction algorithm for infrared image processing-temporal high-pass non-uniformity correction algorithm based on grayscale mapping (THP and GM). The main sources of non-uniformity are: (1) detector fabrication inaccuracies; (2) non-linearity and variations in the read-out electronics and (3) optical path effects. The non-uniformity will be reduced by non-uniformity correction (NUC) algorithms. The NUC algorithms are often divided into calibration-based non-uniformity correction (CBNUC) algorithms and scene-based non-uniformity correction (SBNUC) algorithms. As non-uniformity drifts temporally, CBNUC algorithms must be repeated by inserting a uniform radiation source which SBNUC algorithms do not need into the view, so the SBNUC algorithm becomes an essential part of infrared imaging system. The SBNUC algorithms' poor robustness often leads two defects: artifacts and over-correction, meanwhile due to complicated calculation process and large storage consumption, hardware implementation of the SBNUC algorithms is difficult, especially in Field Programmable Gate Array (FPGA) platform. The THP and GM algorithm proposed in this paper can eliminate the non-uniformity without causing defects. The hardware implementation of the algorithm only based on FPGA has two advantages: (1) low resources consumption, and (2) small hardware delay: less than 20 lines, it can be transplanted to a variety of infrared detectors equipped with FPGA image processing module, it can reduce the stripe non-uniformity and the ripple non-uniformity.

  10. Statistical Physics, Optimization, Inference, and Message-Passing Algorithms : Lecture Notes of the Les Houches School of Physics : Special Issue, October 2013

    CERN Document Server

    Ricci-Tersenghi, Federico; Zdeborova, Lenka; Zecchina, Riccardo; Tramel, Eric W; Cugliandolo, Leticia F

    2015-01-01

    This book contains a collection of the presentations that were given in October 2013 at the Les Houches Autumn School on statistical physics, optimization, inference, and message-passing algorithms. In the last decade, there has been increasing convergence of interest and methods between theoretical physics and fields as diverse as probability, machine learning, optimization, and inference problems. In particular, much theoretical and applied work in statistical physics and computer science has relied on the use of message-passing algorithms and their connection to the statistical physics of glasses and spin glasses. For example, both the replica and cavity methods have led to recent advances in compressed sensing, sparse estimation, and random constraint satisfaction, to name a few. This book’s detailed pedagogical lectures on statistical inference, computational complexity, the replica and cavity methods, and belief propagation are aimed particularly at PhD students, post-docs, and young researchers desir...

  11. Can rare SAT formulae be easily recognized? On the efficiency of message-passing algorithms for K-SAT at large clause-to-variable ratios

    International Nuclear Information System (INIS)

    Altarelli, Fabrizio; Monasson, Remi; Zamponi, Francesco

    2007-01-01

    For large clause-to-variable ratios, typical K-SAT instances drawn from the uniform distribution have no solution. We argue, based on statistical mechanics calculations using the replica and cavity methods, that rare satisfiable instances from the uniform distribution are very similar to typical instances drawn from the so-called planted distribution, where instances are chosen uniformly between the ones that admit a given solution. It then follows, from a recent article by Feige, Mossel and Vilenchik (2006 Complete convergence of message passing algorithms for some satisfiability problems Proc. Random 2006 pp 339-50), that these rare instances can be easily recognized (in O(log N) time and with probability close to 1) by a simple message-passing algorithm

  12. Effects of projection and background correction method upon calculation of right ventricular ejection fraction using first-pass radionuclide angiography

    International Nuclear Information System (INIS)

    Caplin, J.L.; Flatman, W.D.; Dymond, D.S.

    1985-01-01

    There is no consensus as to the best projection or correction method for first-pass radionuclide studies of the right ventricle. We assessed the effects of two commonly used projections, 30 degrees right anterior oblique and anterior-posterior, on the calculation of right ventricular ejection fraction. In addition two background correction methods, planar background correction to account for scatter, and right atrial correction to account for right atrio-ventricular overlap were assessed. Two first-pass radionuclide angiograms were performed in 19 subjects, one in each projection, using gold-195m (half-life 30.5 seconds), and each study was analysed using the two methods of correction. Right ventricular ejection fraction was highest using the right anterior oblique projection with right atrial correction 35.6 +/- 12.5% (mean +/- SD), and lowest when using the anterior posterior projection with planar background correction 26.2 +/- 11% (p less than 0.001). The study design allowed assessment of the effects of correction method and projection independently. Correction method appeared to have relatively little effect on right ventricular ejection fraction. Using right atrial correction correlation coefficient (r) between projections was 0.92, and for planar background correction r = 0.76, both p less than 0.001. However, right ventricular ejection fraction was far more dependent upon projection. When the anterior-posterior projection was used calculated right ventricular ejection fraction was much more dependent on correction method (r = 0.65, p = not significant), than using the right anterior oblique projection (r = 0.85, p less than 0.001)

  13. Correction of magnetization sextupole in one-meter long dipole magnets using passing superconductor

    International Nuclear Information System (INIS)

    Green, M.A.; Althaus, R.F.; Barale, P.J.; Benjegerdes, R.W.; Gilbert, W.S.; Green, M.I.; Scanlan, R.M.

    1990-03-01

    The generation of higher multipoles due to the magnetization of the superconductor in the dipoles of the SSC is a problem during injection of the beam into the machine. The use of passive superconductor was proposed some years ago to correct the magnetization sextupole in the dipole magnet. This paper presents the LBL test results in which the magnetization sextupole was greatly reduced in two one-meter long dipole magnets by the use of passive superconductor mounted on the magnet bore tube. The magnetization sextupole was reduced a factor of five on one magnet and a factor of eight on the other magnet using this technique. Magnetization decapole was also reduced by the passive superconductor. The passive superconductor method of correction also reduced the temperature dependence of the magnetization multipoles. In addition, the drift in the magnetization sextupole due to flux creep was also reduced. Passive superconductor correction appears to be a promising method of correcting out the effects of superconductor magnetization in SSC dipoles and quadrupoles. 10 refs., 6 figs

  14. Getting the Message? Native Reactive Electrophiles Pass Two Out of Three Thresholds to be Bona Fide Signaling Mediators.

    Science.gov (United States)

    Poganik, Jesse R; Long, Marcus J C; Aye, Yimon

    2018-05-01

    Precision cell signaling activities of reactive electrophilic species (RES) are arguably among the most poorly-understood means to transmit biological messages. Latest research implicates native RES to be a chemically-distinct subset of endogenous redox signals that influence cell decision making through non-enzyme-assisted modifications of specific proteins. Yet, fundamental questions remain regarding the role of RES as bona fide second messengers. Here, we lay out three sets of criteria we feel need to be met for RES to be considered as true cellular signals that directly mediate information transfer by modifying "first-responding" sensor proteins. We critically assess the available evidence and define the extent to which each criterion has been fulfilled. Finally, we offer some ideas on the future trajectories of the electrophile signaling field taking inspiration from work that has been done to understand canonical signaling mediators. Also see the video abstract here: https://youtu.be/rG7o0clVP0c. © 2018 WILEY Periodicals, Inc.

  15. Message-passing-interface-based parallel FDTD investigation on the EM scattering from a 1-D rough sea surface using uniaxial perfectly matched layer absorbing boundary.

    Science.gov (United States)

    Li, J; Guo, L-X; Zeng, H; Han, X-B

    2009-06-01

    A message-passing-interface (MPI)-based parallel finite-difference time-domain (FDTD) algorithm for the electromagnetic scattering from a 1-D randomly rough sea surface is presented. The uniaxial perfectly matched layer (UPML) medium is adopted for truncation of FDTD lattices, in which the finite-difference equations can be used for the total computation domain by properly choosing the uniaxial parameters. This makes the parallel FDTD algorithm easier to implement. The parallel performance with different processors is illustrated for one sea surface realization, and the computation time of the parallel FDTD algorithm is dramatically reduced compared to a single-process implementation. Finally, some numerical results are shown, including the backscattering characteristics of sea surface for different polarization and the bistatic scattering from a sea surface with large incident angle and large wind speed.

  16. Fully automated motion correction in first-pass myocardial perfusion MR image sequences.

    Science.gov (United States)

    Milles, Julien; van der Geest, Rob J; Jerosch-Herold, Michael; Reiber, Johan H C; Lelieveldt, Boudewijn P F

    2008-11-01

    This paper presents a novel method for registration of cardiac perfusion magnetic resonance imaging (MRI). The presented method is capable of automatically registering perfusion data, using independent component analysis (ICA) to extract physiologically relevant features together with their time-intensity behavior. A time-varying reference image mimicking intensity changes in the data of interest is computed based on the results of that ICA. This reference image is used in a two-pass registration framework. Qualitative and quantitative validation of the method is carried out using 46 clinical quality, short-axis, perfusion MR datasets comprising 100 images each. Despite varying image quality and motion patterns in the evaluation set, validation of the method showed a reduction of the average right ventricle (LV) motion from 1.26+/-0.87 to 0.64+/-0.46 pixels. Time-intensity curves are also improved after registration with an average error reduced from 2.65+/-7.89% to 0.87+/-3.88% between registered data and manual gold standard. Comparison of clinically relevant parameters computed using registered data and the manual gold standard show a good agreement. Additional tests with a simulated free-breathing protocol showed robustness against considerable deviations from a standard breathing protocol. We conclude that this fully automatic ICA-based method shows an accuracy, a robustness and a computation speed adequate for use in a clinical environment.

  17. Scattering of light passing through a statistically rough interface between media with different refractive indices after laser correction of vision

    Energy Technology Data Exchange (ETDEWEB)

    Semchishen, A V; Seminogov, V N; Semchishen, V A [Institute of Laser and Information Technologies, Russian Academy of Sciences, Troitsk, Moscow Region (Russian Federation)

    2012-04-30

    Forward scattering of light passing through large-scale irregularities of the interface between two media having different refractive indices is considered. An analytical expression for the ratio of intensities of directional and diffusion components of scattered light in the far-field zone is derived. It is theoretically shown that the critical depth of possible interface relief irregularities, starting from which the intensity of the diffuse component in the passing light flow becomes comparable with the directional light component, responsible for the image formation on the eye retina, is 3 - 4 {mu}m, with the increase in the refractive index in the postoperational zone taken into account. These profile depth values agree with the experimentally measured ones and may affect the contrast sensitivity of vision.

  18. Scattering of light passing through a statistically rough interface between media with different refractive indices after laser correction of vision

    International Nuclear Information System (INIS)

    Semchishen, A V; Seminogov, V N; Semchishen, V A

    2012-01-01

    Forward scattering of light passing through large-scale irregularities of the interface between two media having different refractive indices is considered. An analytical expression for the ratio of intensities of directional and diffusion components of scattered light in the far-field zone is derived. It is theoretically shown that the critical depth of possible interface relief irregularities, starting from which the intensity of the diffuse component in the passing light flow becomes comparable with the directional light component, responsible for the image formation on the eye retina, is 3 - 4 μm, with the increase in the refractive index in the postoperational zone taken into account. These profile depth values agree with the experimentally measured ones and may affect the contrast sensitivity of vision.

  19. Coverage of breast cancer in the Australian print media--does advertising and editorial coverage reflect correct social marketing messages?

    Science.gov (United States)

    Jones, Sandra C

    2004-01-01

    Early detection of breast cancer by mammographic screening has the potential to dramatically reduce mortality rates, but many women do not comply with screening recommendations. The media are an important source of health information for many women--through both direct social marketing advertisements and indirect dissemination of information via editorial content. This study investigated the accuracy of breast cancer detection messages in the top-selling Australian women's magazines and three weekend newspapers in the six-month period from December 2000 to May 2001 that included any reference to breast cancer and found that current coverage of breast cancer in the Australian print media conveys messages that are unlikely to encourage appropriate screening.

  20. Correction

    DEFF Research Database (Denmark)

    Pinkevych, Mykola; Cromer, Deborah; Tolstrup, Martin

    2016-01-01

    [This corrects the article DOI: 10.1371/journal.ppat.1005000.][This corrects the article DOI: 10.1371/journal.ppat.1005740.][This corrects the article DOI: 10.1371/journal.ppat.1005679.].......[This corrects the article DOI: 10.1371/journal.ppat.1005000.][This corrects the article DOI: 10.1371/journal.ppat.1005740.][This corrects the article DOI: 10.1371/journal.ppat.1005679.]....

  1. Quantitative Analysis of First-Pass Contrast-Enhanced Myocardial Perfusion Multidetector CT Using a Patlak Plot Method and Extraction Fraction Correction During Adenosine Stress

    Science.gov (United States)

    Ichihara, Takashi; George, Richard T.; Silva, Caterina; Lima, Joao A. C.; Lardo, Albert C.

    2011-02-01

    The purpose of this study was to develop a quantitative method for myocardial blood flow (MBF) measurement that can be used to derive accurate myocardial perfusion measurements from dynamic multidetector computed tomography (MDCT) images by using a compartment model for calculating the first-order transfer constant (K1) with correction for the capillary transit extraction fraction (E). Six canine models of left anterior descending (LAD) artery stenosis were prepared and underwent first-pass contrast-enhanced MDCT perfusion imaging during adenosine infusion (0.14-0.21 mg/kg/min). K1 , which is the first-order transfer constant from left ventricular (LV) blood to myocardium, was measured using the Patlak plot method applied to time-attenuation curve data of the LV blood pool and myocardium. The results were compared against microsphere MBF measurements, and the extraction fraction of contrast agent was calculated. K1 is related to the regional MBF as K1=EF, E=(1-exp(-PS/F)), where PS is the permeability-surface area product and F is myocardial flow. Based on the above relationship, a look-up table from K1 to MBF can be generated and Patlak plot-derived K1 values can be converted to the calculated MBF. The calculated MBF and microsphere MBF showed a strong linear association. The extraction fraction in dogs as a function of flow (F) was E=(1-exp(-(0.2532F+0.7871)/F)) . Regional MBF can be measured accurately using the Patlak plot method based on a compartment model and look-up table with extraction fraction correction from K1 to MBF.

  2. Correction

    CERN Multimedia

    2007-01-01

    From left to right: Luis, Carmen, Mario, Christian and José listening to speeches by theorists Alvaro De Rújula and Luis Alvarez-Gaumé (right) at their farewell gathering on 15 May.We unfortunately cut out a part of the "Word of thanks" from the team retiring from Restaurant No. 1. The complete message is published below: Dear friends, You are the true "nucleus" of CERN. Every member of this extraordinary human mosaic will always remain in our affections and in our thoughts. We have all been very touched by your spontaneous generosity. Arrivederci, Mario Au revoir,Christian Hasta Siempre Carmen, José and Luis PS: Lots of love to the theory team and to the hidden organisers. So long!

  3. Correction

    CERN Multimedia

    2002-01-01

    Tile Calorimeter modules stored at CERN. The larger modules belong to the Barrel, whereas the smaller ones are for the two Extended Barrels. (The article was about the completion of the 64 modules for one of the latter.) The photo on the first page of the Bulletin n°26/2002, from 24 July 2002, illustrating the article «The ATLAS Tile Calorimeter gets into shape» was published with a wrong caption. We would like to apologise for this mistake and so publish it again with the correct caption.

  4. Correction

    Directory of Open Access Journals (Sweden)

    2012-01-01

    Full Text Available Regarding Gorelik, G., & Shackelford, T.K. (2011. Human sexual conflict from molecules to culture. Evolutionary Psychology, 9, 564–587: The authors wish to correct an omission in citation to the existing literature. In the final paragraph on p. 570, we neglected to cite Burch and Gallup (2006 [Burch, R. L., & Gallup, G. G., Jr. (2006. The psychobiology of human semen. In S. M. Platek & T. K. Shackelford (Eds., Female infidelity and paternal uncertainty (pp. 141–172. New York: Cambridge University Press.]. Burch and Gallup (2006 reviewed the relevant literature on FSH and LH discussed in this paragraph, and should have been cited accordingly. In addition, Burch and Gallup (2006 should have been cited as the originators of the hypothesis regarding the role of FSH and LH in the semen of rapists. The authors apologize for this oversight.

  5. Correction

    CERN Multimedia

    2002-01-01

    The photo on the second page of the Bulletin n°48/2002, from 25 November 2002, illustrating the article «Spanish Visit to CERN» was published with a wrong caption. We would like to apologise for this mistake and so publish it again with the correct caption.   The Spanish delegation, accompanied by Spanish scientists at CERN, also visited the LHC superconducting magnet test hall (photo). From left to right: Felix Rodriguez Mateos of CERN LHC Division, Josep Piqué i Camps, Spanish Minister of Science and Technology, César Dopazo, Director-General of CIEMAT (Spanish Research Centre for Energy, Environment and Technology), Juan Antonio Rubio, ETT Division Leader at CERN, Manuel Aguilar-Benitez, Spanish Delegate to Council, Manuel Delfino, IT Division Leader at CERN, and Gonzalo León, Secretary-General of Scientific Policy to the Minister.

  6. Correction

    Directory of Open Access Journals (Sweden)

    2014-01-01

    Full Text Available Regarding Tagler, M. J., and Jeffers, H. M. (2013. Sex differences in attitudes toward partner infidelity. Evolutionary Psychology, 11, 821–832: The authors wish to correct values in the originally published manuscript. Specifically, incorrect 95% confidence intervals around the Cohen's d values were reported on page 826 of the manuscript where we reported the within-sex simple effects for the significant Participant Sex × Infidelity Type interaction (first paragraph, and for attitudes toward partner infidelity (second paragraph. Corrected values are presented in bold below. The authors would like to thank Dr. Bernard Beins at Ithaca College for bringing these errors to our attention. Men rated sexual infidelity significantly more distressing (M = 4.69, SD = 0.74 than they rated emotional infidelity (M = 4.32, SD = 0.92, F(1, 322 = 23.96, p < .001, d = 0.44, 95% CI [0.23, 0.65], but there was little difference between women's ratings of sexual (M = 4.80, SD = 0.48 and emotional infidelity (M = 4.76, SD = 0.57, F(1, 322 = 0.48, p = .29, d = 0.08, 95% CI [−0.10, 0.26]. As expected, men rated sexual infidelity (M = 1.44, SD = 0.70 more negatively than they rated emotional infidelity (M = 2.66, SD = 1.37, F(1, 322 = 120.00, p < .001, d = 1.12, 95% CI [0.85, 1.39]. Although women also rated sexual infidelity (M = 1.40, SD = 0.62 more negatively than they rated emotional infidelity (M = 2.09, SD = 1.10, this difference was not as large and thus in the evolutionary theory supportive direction, F(1, 322 = 72.03, p < .001, d = 0.77, 95% CI [0.60, 0.94].

  7. Passing excellence

    Science.gov (United States)

    Tsoupikova, Daria

    2007-02-01

    This paper describes the research and development of a virtual reality visualization project "Passing excellence" about the world famous architectural ensemble "Kizhi". The Kizhi Pogost is located on an island in Lake Onega in northern Karelia in Russia. It is an authentic museum of an ancient wood building tradition which presents a unique artistic achievement. This ensemble preserves a concentration of masterpieces of the Russian heritage and is included in the List of Most Endangered Sites of the World Monuments Watch protected by World Heritage List of UNESCO. The project strives to create a unique virtual observation of the dynamics of the architectural changes of the museum area beginning from the 15th Century up to the 21st Century. The visualization is being created to restore the original architecture of Kizhi island based on the detailed photographs, architectural and geometric measurements, textural data, video surveys and resources from the Kizhi State Open-Air Museum archives. The project is being developed using Electro, an application development environment for the tiled display high-resolution graphics visualization system and can be shown on the virtual reality systems such as the GeoWall TM and the C-Wall.

  8. GPS Ephemeris Message Broadcast Simulation

    National Research Council Canada - National Science Library

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  9. Experimental study of the correction factor for the grid by-pass orifices inlet pressure drop for the new core of the RA 6 reactor

    International Nuclear Information System (INIS)

    Masson, Viviana P.; Garcia, Juan C.; Delmastro, Dario F.

    2007-01-01

    It is necessary to determine the pressure drop in the different components in order to calculate the total pressure drop of RA-6 reactor core. Some of these components have simple geometries and the calculation of its pressure drop is relatively easy. But in some cases, the sub-channels where the cooling water flows have non uniform cross sections and its geometries are not in the handbook. Due to changes in the design of components of the new nucleus of the RA-6 it was necessary to perform a new set of full-scale experiments to determine the pressure drop in some affected subchannels. Different gaps between fuel elements are considered in order to take into account the design allowances. With the obtained results we calculate correction coefficients for the pressure loss coefficients. These coefficients allow fitting the model of calculation with the results obtained in the experiments and they were used to calculate the flow distribution in the core. (author) [es

  10. Subtle Messages.

    Science.gov (United States)

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  11. Advanced Messaging Concept Development Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  12. DMS message design workshops.

    Science.gov (United States)

    2009-03-01

    This report summarizes the training conducted statewide regarding the design and display of messages on : dynamic message signs. The training is based on the Dynamic Message Sign Message Design and Display : Manual (0-4023-P3). Researchers developed ...

  13. Algorithms for parallel flow solvers on message passing architectures

    Science.gov (United States)

    Vanderwijngaart, Rob F.

    1995-01-01

    The purpose of this project has been to identify and test suitable technologies for implementation of fluid flow solvers -- possibly coupled with structures and heat equation solvers -- on MIMD parallel computers. In the course of this investigation much attention has been paid to efficient domain decomposition strategies for ADI-type algorithms. Multi-partitioning derives its efficiency from the assignment of several blocks of grid points to each processor in the parallel computer. A coarse-grain parallelism is obtained, and a near-perfect load balance results. In uni-partitioning every processor receives responsibility for exactly one block of grid points instead of several. This necessitates fine-grain pipelined program execution in order to obtain a reasonable load balance. Although fine-grain parallelism is less desirable on many systems, especially high-latency networks of workstations, uni-partition methods are still in wide use in production codes for flow problems. Consequently, it remains important to achieve good efficiency with this technique that has essentially been superseded by multi-partitioning for parallel ADI-type algorithms. Another reason for the concentration on improving the performance of pipeline methods is their applicability in other types of flow solver kernels with stronger implied data dependence. Analytical expressions can be derived for the size of the dynamic load imbalance incurred in traditional pipelines. From these it can be determined what is the optimal first-processor retardation that leads to the shortest total completion time for the pipeline process. Theoretical predictions of pipeline performance with and without optimization match experimental observations on the iPSC/860 very well. Analysis of pipeline performance also highlights the effect of uncareful grid partitioning in flow solvers that employ pipeline algorithms. If grid blocks at boundaries are not at least as large in the wall-normal direction as those immediately adjacent to them, then the first processor in the pipeline will receive a computational load that is less than that of subsequent processors, magnifying the pipeline slowdown effect. Extra compensation is needed for grid boundary effects, even if all grid blocks are equally sized.

  14. Optimizing spread dynamics on graphs by message passing

    International Nuclear Information System (INIS)

    Altarelli, F; Braunstein, A; Dall’Asta, L; Zecchina, R

    2013-01-01

    Cascade processes are responsible for many important phenomena in natural and social sciences. Simple models of irreversible dynamics on graphs, in which nodes activate depending on the state of their neighbors, have been successfully applied to describe cascades in a large variety of contexts. Over the past decades, much effort has been devoted to understanding the typical behavior of the cascades arising from initial conditions extracted at random from some given ensemble. However, the problem of optimizing the trajectory of the system, i.e. of identifying appropriate initial conditions to maximize (or minimize) the final number of active nodes, is still considered to be practically intractable, with the only exception being models that satisfy a sort of diminishing returns property called submodularity. Submodular models can be approximately solved by means of greedy strategies, but by definition they lack cooperative characteristics which are fundamental in many real systems. Here we introduce an efficient algorithm based on statistical physics for the optimization of trajectories in cascade processes on graphs. We show that for a wide class of irreversible dynamics, even in the absence of submodularity, the spread optimization problem can be solved efficiently on large networks. Analytic and algorithmic results on random graphs are complemented by the solution of the spread maximization problem on a real-world network (the Epinions consumer reviews network). (paper)

  15. Optimizing spread dynamics on graphs by message passing

    Science.gov (United States)

    Altarelli, F.; Braunstein, A.; Dall'Asta, L.; Zecchina, R.

    2013-09-01

    Cascade processes are responsible for many important phenomena in natural and social sciences. Simple models of irreversible dynamics on graphs, in which nodes activate depending on the state of their neighbors, have been successfully applied to describe cascades in a large variety of contexts. Over the past decades, much effort has been devoted to understanding the typical behavior of the cascades arising from initial conditions extracted at random from some given ensemble. However, the problem of optimizing the trajectory of the system, i.e. of identifying appropriate initial conditions to maximize (or minimize) the final number of active nodes, is still considered to be practically intractable, with the only exception being models that satisfy a sort of diminishing returns property called submodularity. Submodular models can be approximately solved by means of greedy strategies, but by definition they lack cooperative characteristics which are fundamental in many real systems. Here we introduce an efficient algorithm based on statistical physics for the optimization of trajectories in cascade processes on graphs. We show that for a wide class of irreversible dynamics, even in the absence of submodularity, the spread optimization problem can be solved efficiently on large networks. Analytic and algorithmic results on random graphs are complemented by the solution of the spread maximization problem on a real-world network (the Epinions consumer reviews network).

  16. Mixed messages

    Science.gov (United States)

    Chen, Christopher B.; Hall, Kevin; Tsuyuki, Ross T.

    2014-01-01

    Background: More than 5 years ago, the Blueprint for Pharmacy developed a plan for transitioning pharmacy practice toward more patient-centred care. Much of the strategy for change involves communicating the new vision. Objective: To evaluate the communication of the Vision for Pharmacy by the organizations and corporations that signed the Blueprint for Pharmacy’s Commitment to Act. Methods: The list of 88 signatories of the Commitment to Act was obtained from the Blueprint for Pharmacy document. The website of each of these signatories was searched for all references to the Blueprint for Pharmacy or Vision for Pharmacy. Each of the identified references was then analyzed using summative content analysis. Results: A total of 934 references were identified from the webpages of the 88 signatories. Of these references, 549 were merely links to the Blueprint for Pharmacy’s website, 350 of the references provided some detailed information about the Blueprint for Pharmacy and only 35 references provided any specific plans to transition pharmacy practice. Conclusion: Widespread proliferation of the Vision for Pharmacy has not been achieved. One possible explanation for this is that communication of the vision by the signatories has been incomplete. To ensure the success of future communications, change leaders must develop strategies that consider how individual pharmacists and pharmacies understand the message. PMID:24660012

  17. TPG bus passes

    CERN Multimedia

    Staff Association

    2013-01-01

    The CERN Staff Association will stop selling TPG bus passes. All active and retired members of the CERN personnel will be able to purchase Unireso bus passes from the CERN Hostel - Building 39 (Meyrin site) from 1st February 2013. For more information: https://cds.cern.ch/journal/CERNBulletin/2013/04/Announcements/1505279?ln=en

  18. Passing and Catching in Rugby.

    Science.gov (United States)

    Namudu, Mike M.

    This booklet contains the fundamentals for rugby at the primary school level. It deals primarily with passing and catching the ball. It contains instructions on (1) holding the ball for passing, (2) passing the ball to the left--standing, (3) passing the ball to the left--running, (4) making a switch pass, (5) the scrum half's normal pass, (6) the…

  19. Retail Bank Interest Rate Pass-Through; Is Chile Atypical?

    OpenAIRE

    Alessandro Rebucci; Marco A Espinosa-Vega

    2003-01-01

    This paper investigates empirically the pass-through of money market interest rates to retail banking interest rates in Chile, the United States, Canada, Australia, New Zealand, and five European countries. Overall, Chile's pass-through does not appear atypical. Based on a standard error-correction model, we find that, as in most countries considered, Chile's measured pass-through is incomplete. But Chile's pass-through is also faster than in many other countries considered and is comparable ...

  20. EMI Messaging Guidelines

    CERN Document Server

    Cons, L.

    2011-01-01

    Guidelines for potential users of messaging within EMI. The goal is to provide enough practical information so that EMI product teams can start investigating whether using messaging in their products can be beneficial or not.

  1. Public-channel cryptography based on mutual chaos pass filters.

    Science.gov (United States)

    Klein, Einat; Gross, Noam; Kopelowitz, Evi; Rosenbluh, Michael; Khaykovich, Lev; Kinzel, Wolfgang; Kanter, Ido

    2006-10-01

    We study the mutual coupling of chaotic lasers and observe both experimentally and in numeric simulations that there exists a regime of parameters for which two mutually coupled chaotic lasers establish isochronal synchronization, while a third laser coupled unidirectionally to one of the pair does not synchronize. We then propose a cryptographic scheme, based on the advantage of mutual coupling over unidirectional coupling, where all the parameters of the system are public knowledge. We numerically demonstrate that in such a scheme the two communicating lasers can add a message signal (compressed binary message) to the transmitted coupling signal and recover the message in both directions with high fidelity by using a mutual chaos pass filter procedure. An attacker, however, fails to recover an errorless message even if he amplifies the coupling signal.

  2. Introduction: Mirrors of Passing

    DEFF Research Database (Denmark)

    Seebach, Sophie Hooge; Willerslev, Rane

    How is death, time, and materiality interconnected? How to approach an understanding of the world of the dead? In this introduction, we seek to understand how the experience of material decay, of the death of those around us, makes us aware of the passing of time. Through the literary lens of Neil...... Gaiman’s The Graveyard Book, we explore how the world of the dead and the world of the living can intersect; how time and materiality shifts and changes depending on who experiences it. These revelations, based on fiction, provide a mirror through which the reader can experience the varied chapters...

  3. Unified Internet Messaging

    OpenAIRE

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  4. Passing the baton

    CERN Multimedia

    2011-01-01

    It was not only in South Korea that batons were being passed last week. While the cream of the world’s athletes were competing in the World Athletics Championships, the cream of the world’s accelerator scientists were on their way to San Sebastian in Spain for the International Particle Accelerator Conference.  One of them was carrying a rather special baton for a handover of a different kind.   When Fermilab’s Vladimir Shiltsev handed the high-energy frontier baton to CERN’s Mike Lamont on Tuesday, it marked the end of an era: a time to look back on the phenomenal contribution the Tevatron has made to particle physics over its 25-year operational lifetime, and the great contribution Fermilab has made over that period to global collaboration in particle physics. There’s always a lot of emotion involved in passing the baton. In athletics, it’s the triumph of wining or the heartbreak of losing. But for this special baton, the...

  5. TRT Barrel milestones passed

    CERN Multimedia

    Ogren, H

    2004-01-01

    The barrel TRT detector passed three significant milestones this spring. The Barrel Support Structure (BSS) was completed and moved to the SR-1 building on February 24th. On March 12th the first module passed the quality assurance testing in Building 154 and was transported to the assembly site in the SR-1 building for barrel assembly. Then on April 21st the final production module that had been scanned at Hampton University was shipped to CERN. TRT Barrel Module Production The production of the full complement of barrel modules (96 plus 9 total spares) is now complete. This has been a five-year effort by Duke University, Hampton University, and Indiana University. Actual construction of the modules in the United States was completed in the first part of 2004. The production crews at each of the sites in the United States have now completed their missions. They are shown in the following pictures. Duke University: Production crew with the final completed module. Indiana University: Module producti...

  6. Deuterium pass through target

    International Nuclear Information System (INIS)

    Alger, D.L.

    1975-01-01

    A neutron emitting target is described for use in neutron generating apparatus including a deuteron source and an accelerator vacuum chamber. The target consists of a tritium-containing target layer, a deuteron accumulation layer, and a target support containing passages providing communication between the accumulation layer and portions of the surface of the support exposed to the accelerator vacuum chamber. With this arrangement, deuterons passing through the target layer and implanting in and diffusing through the accumulation layer, diffuse into the communicating passages and are returned to the accelerator vacuum chamber. The invention allows the continuous removal of deuterons from the target in conventional water cooled neutron generating apparatus. Preferably, the target is provided with thin barrier layers to prevent undesirable tritium diffusion out of the target layer, as well as deuteron diffusion into the target layer

  7. Auctioning Bulk Mobile Messages

    NARCIS (Netherlands)

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  8. Actors with Multi-Headed Message Receive Patterns

    DEFF Research Database (Denmark)

    Sulzmann, Martin; Lam, Edmund Soon Lee; Van Weert, Peter

    2008-01-01

    style actors with receive clauses containing multi-headed message patterns. Patterns may be non-linear and constrained by guards. We provide a number of examples to show the usefulness of the extension. We also explore the design space for multi-headed message matching semantics, for example first-match......The actor model provides high-level concurrency abstractions to coordinate simultaneous computations by message passing. Languages implementing the actor model such as Erlang commonly only support single-headed pattern matching over received messages. We propose and design an extension of Erlang...... and rule priority-match semantics. The various semantics are inspired by the multi-set constraint matching semantics found in Constraint Handling Rules. This provides us with a formal model to study actors with multi-headed message receive patterns. The system can be implemented efficiently and we have...

  9. Instant Messaging by SIP

    Science.gov (United States)

    Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd

    2008-11-01

    SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.

  10. A System for Exchanging Control and Status Messages in the NOvA Data Acquisition

    International Nuclear Information System (INIS)

    Biery, K.A.; Cooper, R.G.; Foulkes, S.C.; Guglielmo, G.M.; Piccoli, L.P.; Votava, M.E.V.; Fermilab

    2007-01-01

    In preparation for NOvA, a future neutrino experiment at Fermilab, we are developing a system for passing control and status messages in the data acquisition system. The DAQ system will consist of applications running on approximately 450 nodes. The message passing system will use a publish-subscribe model and will provide support for sending messages and receiving the associated replies. Additional features of the system include a layered architecture with custom APIs tailored to the needs of a DAQ system, the use of an open source messaging system for handling the reliable delivery of messages, the ability to send broadcasts to groups of applications, and APIs in Java, C++, and Python. Our choice for the open source system to deliver messages is EPICS. We will discuss the architecture of the system, our experience with EPICS, and preliminary test results

  11. A System for Exchanging Control and Status Messages in the NOvA Data Acquisition

    Energy Technology Data Exchange (ETDEWEB)

    Biery, K.A.; Cooper, R.G.; Foulkes, S.C.; Guglielmo, G.M.; Piccoli, L.P.; Votava, M.E.V.; /Fermilab

    2007-04-01

    In preparation for NOvA, a future neutrino experiment at Fermilab, we are developing a system for passing control and status messages in the data acquisition system. The DAQ system will consist of applications running on approximately 450 nodes. The message passing system will use a publish-subscribe model and will provide support for sending messages and receiving the associated replies. Additional features of the system include a layered architecture with custom APIs tailored to the needs of a DAQ system, the use of an open source messaging system for handling the reliable delivery of messages, the ability to send broadcasts to groups of applications, and APIs in Java, C++, and Python. Our choice for the open source system to deliver messages is EPICS. We will discuss the architecture of the system, our experience with EPICS, and preliminary test results.

  12. Linear network error correction coding

    CERN Document Server

    Guang, Xuan

    2014-01-01

    There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences?similar to algebraic coding,?and also briefly discuss the main results following the?other approach,?that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances an

  13. Increasing the Operational Value of Event Messages

    Science.gov (United States)

    Li, Zhenping; Savkli, Cetin; Smith, Dan

    2003-01-01

    Assessing the health of a space mission has traditionally been performed using telemetry analysis tools. Parameter values are compared to known operational limits and are plotted over various time periods. This presentation begins with the notion that there is an incredible amount of untapped information contained within the mission s event message logs. Through creative advancements in message handling tools, the event message logs can be used to better assess spacecraft and ground system status and to highlight and report on conditions not readily apparent when messages are evaluated one-at-a-time during a real-time pass. Work in this area is being funded as part of a larger NASA effort at the Goddard Space Flight Center to create component-based, middleware-based, standards-based general purpose ground system architecture referred to as GMSEC - the GSFC Mission Services Evolution Center. The new capabilities and operational concepts for event display, event data analyses and data mining are being developed by Lockheed Martin and the new subsystem has been named GREAT - the GMSEC Reusable Event Analysis Toolkit. Planned for use on existing and future missions, GREAT has the potential to increase operational efficiency in areas of problem detection and analysis, general status reporting, and real-time situational awareness.

  14. Two-way text messaging: an interactive mobile learning environment in higher education

    OpenAIRE

    Premadasa, H. K. Salinda; Meegama, R. G. N.

    2016-01-01

    Short messaging service (SMS) is perhaps the most popular mobile technology prevalent among students in higher education due to its ubiquitous nature and the capability of two-way communication. However, a major limitation in two-way text messaging is sending back a part of received data with the reply message. This limitation results in users of a mobile learning environment being unable to reply back to the correct destination. This article presents a two-way text messaging system that can ...

  15. Couriers in the Inca Empire: Getting Your Message Across. [Lesson Plan].

    Science.gov (United States)

    2002

    This lesson shows how the Inca communicated across the vast stretches of their mountain realm, the largest empire of the pre-industrial world. The lesson explains how couriers carried messages along mountain-ridge roads, up and down stone steps, and over chasm-spanning footbridges. It states that couriers could pass a message from Quito (Ecuador)…

  16. The message is the message-maker.

    Science.gov (United States)

    Chalkley, A B

    1977-03-01

    For those engaged in family planning or other demographic work of an active kind, serious errors can be made and much money and skill wasted unless there is a clear idea of available means of communication. Literacy and media-diffusion figures offer vague parameters, especially in Asia, and the role of spoken communication -- considered key in "illiterate" societies -- is even more difficult to assess. For mass media, the starting point is "diffusion rates" representing numbers of TV sets owned or newspapers sold per 1000 population and so on -- measures of quantity. This article surveys the population growth rates, urban-rural distribution, educational levels, literacy rates, numbers of newspapers bought, radios and TVs owned (per 1000 population) for 12 Asian countries, and discusses their meaning in terms of media use. Chief among the points made are that print media still have an enormous role to play in the developing countries -- newspaper diffusion rates are quite high, even in countries with low urban population (especially India). The quality of electronic media (too often considered the natural "wave of the future" everywhere) varies but is generally not high. Where they are fully developed their role is vital -- but it might be noted that it is the message makers themselves who are most vital. Choosing the right medium and the proper message for it is essential.

  17. An Examination of Adolescent Recall of Anti-Smoking Messages: Attitudes, Message Type, and Message Perceptions.

    Science.gov (United States)

    Bigsby, Elisabeth; Monahan, Jennifer L; Ewoldsen, David R

    2017-04-01

    Delayed message recall may be influenced by currently held accessible attitudes, the nature of the message, and message perceptions (perception of bias and message elaboration). This study examined the potential of message perceptions to mediate the influence of valenced attitude accessibility and message type on unaided recall of anti-smoking Public Service Announcements (PSAs). In a field experiment, ninth grade students (N = 244) watched three PSAs and responded to items on laptop computers. Twelve weeks later, follow-up telephone surveys were conducted to assess unaided recall. Both valenced attitude accessibility and message type were associated with message perceptions. However, only perception of message bias partially mediated the relationship between message type and unaided recall.

  18. Popular Mobilization Messaging

    Directory of Open Access Journals (Sweden)

    James Garrison

    2017-04-01

    Full Text Available This Research Paper examines the Iraqi Popular Mobilization Unit’s (PMU messaging on the organisation’s website and social media platforms through early January 2017 to develop a more nuanced understanding of the PMU’s outlook, both present and future. After providing an overview of the PMU’s media presence online, the paper discusses how the organisation promotes its core narrative: that it is a cross-confessional and patriotic force for the defence of all Iraqis against a brutal and evil IS. The paper then addresses the PMU’s use of messaging to refute the sectarian portrayal of the organisation in some quarters before turning to the way the PMU approaches regional and international states in its media. Finally, the paper summarises the PMU’s messaging strategy and discusses how this strategy implies a less threatening future for the organisation than is often anticipated.

  19. WebPASS Explorer (HR Personnel Management)

    Data.gov (United States)

    US Agency for International Development — WebPass Explorer (WebPASS Framework): USAID is partnering with DoS in the implementation of their WebPass Post Personnel (PS) Module. WebPassPS does not replace...

  20. Multi-pass spectroscopic ellipsometry

    International Nuclear Information System (INIS)

    Stehle, Jean-Louis; Samartzis, Peter C.; Stamataki, Katerina; Piel, Jean-Philippe; Katsoprinakis, George E.; Papadakis, Vassilis; Schimowski, Xavier; Rakitzis, T. Peter; Loppinet, Benoit

    2014-01-01

    Spectroscopic ellipsometry is an established technique, particularly useful for thickness measurements of thin films. It measures polarization rotation after a single reflection of a beam of light on the measured substrate at a given incidence angle. In this paper, we report the development of multi-pass spectroscopic ellipsometry where the light beam reflects multiple times on the sample. We have investigated both theoretically and experimentally the effect of sample reflectivity, number of reflections (passes), angles of incidence and detector dynamic range on ellipsometric observables tanΨ and cosΔ. The multiple pass approach provides increased sensitivity to small changes in Ψ and Δ, opening the way for single measurement determination of optical thickness T, refractive index n and absorption coefficient k of thin films, a significant improvement over the existing techniques. Based on our results, we discuss the strengths, the weaknesses and possible applications of this technique. - Highlights: • We present multi-pass spectroscopic ellipsometry (MPSE), a multi-pass approach to ellipsometry. • Different detectors, samples, angles of incidence and number of passes were tested. • N passes improve polarization ratio sensitivity to the power of N. • N reflections improve phase shift sensitivity by a factor of N. • MPSE can significantly improve thickness measurements in thin films

  1. SMS Messaging Applications

    CERN Document Server

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  2. Are Instant Messages Speech?

    Science.gov (United States)

    Baron, Naomi S.

    Instant messaging (IM) is commonly viewed as a “spoken” medium, in light of its reputation for informality, non-standard spelling and punctuation, and use of lexical shortenings and emoticons. However, the actual nature of IM is an empirical issue that bears linguistic analysis.

  3. Microprocessorized message multiplexer

    International Nuclear Information System (INIS)

    Ejzman, S.; Guglielmi, L.; Jaeger, J.J.

    1980-07-01

    The 'Microprocessorized Message Multiplexer' is an elementary development tool used to create and debug the software of a target microprocessor (User Module: UM). It connects together four devices: a terminal, a cassette recorder, the target microprocessor and a host computer where macro and editor for the M 6800 microprocessor are resident [fr

  4. Grounding in Instant Messaging

    Science.gov (United States)

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  5. The Prodiguer Messaging Platform

    Science.gov (United States)

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  6. 3. Secure Messaging

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 1. Electronic Commerce - Secure Messaging. V Rajaraman. Series Article Volume 6 Issue 1 January 2001 pp 8-17. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/01/0008-0017 ...

  7. Passing crisis and emergency risk communications: the effects of communication channel, information type, and repetition.

    Science.gov (United States)

    Edworthy, Judy; Hellier, Elizabeth; Newbold, Lex; Titchener, Kirsteen

    2015-05-01

    Three experiments explore several factors which influence information transmission when warning messages are passed from person to person. In Experiment 1, messages were passed down chains of participants using five different modes of communication. Written communication channels resulted in more accurate message transmission than verbal. In addition, some elements of the message endured further down the chain than others. Experiment 2 largely replicated these effects and also demonstrated that simple repetition of a message eliminated differences between written and spoken communication. In a final field experiment, chains of participants passed information however they wanted to, with the proviso that half of the chains could not use telephones. Here, the lack of ability to use a telephone did not affect accuracy, but did slow down the speed of transmission from the recipient of the message to the last person in the chain. Implications of the findings for crisis and emergency risk communication are discussed. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  8. Does the Screening Status of Message Characters Affect Message Effects?

    Science.gov (United States)

    Alber, Julia M.; Glanz, Karen

    2018-01-01

    Public health messages can be used to increase awareness about colorectal cancer screenings. Free or inexpensive images for creating health messages are readily available, yet little is known about how a pictured individual's engagement in the behavior of interest affects message outcomes. Participants (N = 360), aged 50 to 75 years, completed an…

  9. Analysis of Biomechanical Structure and Passing Techniques in Basketball

    Directory of Open Access Journals (Sweden)

    Ricardo E. Izzo

    2011-06-01

    Full Text Available The basketball is a complex sport, which these days has become increasingly linked to its’ psychophysical aspects rather than to the technical ones. Therefore, it is important to make a through study of the passing techniques from the point of view of the type of the pass and its’ biomechanics. From the point of view of the type of the used passes, the most used is the two-handed chest pass with a frequency of 39.9%. This is followed, in terms of frequency, by one-handed passes – the baseball, with 20.9 % – and by the two-handed over the head pass, with 18.2 %, and finally, one- or two-handed indirect passes (bounces, with 11.2 % and 9.8 %. Considering the most used pass in basketball, from the biomechanical point of view, the muscles involved in the correct movement consider all the muscles of the upper extremity, adding also the shoulder muscles as well as the body fixators (abdominals, hip flexors, knee extensors, and dorsal flexors of the foot. The technical and conditional analysis considers the throwing speed, the throw height and the air resistance. In conclusion, the aim of this study is to give some guidelines to improve the mechanical execution of the movements in training, without neglecting the importance of the harmony of the movements themselves.

  10. Degree sequence in message transfer

    Science.gov (United States)

    Yamuna, M.

    2017-11-01

    Message encryption is always an issue in current communication scenario. Methods are being devised using various domains. Graphs satisfy numerous unique properties which can be used for message transfer. In this paper, I propose a message encryption method based on degree sequence of graphs.

  11. Message from Fermilab Director

    CERN Multimedia

    2009-01-01

    With this issue’s message, Fermilab Director Pier Oddone opens a new series of occasional exchanges between CERN and other laboratories world-wide. As part of this exchange, CERN Director-General Rolf Heuer, wrote a message in Tuesday’s edition of Fermilab TodayPerspectivesNothing is more important for our worldwide particle physics community than successfully turning on the LHC later this year. The promise for great discoveries is huge, and many of the plans for our future depend on LHC results. Those of us planning national programmes in anticipation of data from the LHC face formidable challenges to develop future facilities that are complementary to the LHC, whatever the physics discoveries may be. At Fermilab, this has led us to move forcefully with a programme at the intensity frontier, where experiments with neutrinos and rare decays open a complementary window into nature. Our ultimate goal for a unified picture of nat...

  12. Geocoding location expressions in Twitter messages: A preference learning method

    Directory of Open Access Journals (Sweden)

    Wei Zhang

    2014-12-01

    Full Text Available Resolving location expressions in text to the correct physical location, also known as geocoding or grounding, is complicated by the fact that so many places around the world share the same name. Correct resolution is made even more difficult when there is little context to determine which place is intended, as in a 140-character Twitter message, or when location cues from different sources conflict, as may be the case among different metadata fields of a Twitter message. We used supervised machine learning to weigh the different fields of the Twitter message and the features of a world gazetteer to create a model that will prefer the correct gazetteer candidate to resolve the extracted expression. We evaluated our model using the F1 measure and compared it to similar algorithms. Our method achieved results higher than state-of-the-art competitors.

  13. A First-Order One-Pass CPS Transformation

    DEFF Research Database (Denmark)

    Danvy, Olivier; Nielsen, Lasse Reichstein

    2001-01-01

    We present a new transformation of λ-terms into continuation-passing style (CPS). This transformation operates in one pass and is both compositional and first-order. Previous CPS transformations only enjoyed two out of the three properties of being first-order, one-pass, and compositional......, but the new transformation enjoys all three properties. It is proved correct directly by structural induction over source terms instead of indirectly with a colon translation, as in Plotkin's original proof. Similarly, it makes it possible to reason about CPS-transformed terms by structural induction over...... source terms, directly.The new CPS transformation connects separately published approaches to the CPS transformation. It has already been used to state a new and simpler correctness proof of a direct-style transformation, and to develop a new and simpler CPS transformation of control-flow information....

  14. A First-Order One-Pass CPS Transformation

    DEFF Research Database (Denmark)

    Danvy, Olivier; Nielsen, Lasse Reichstein

    2003-01-01

    We present a new transformation of λ-terms into continuation-passing style (CPS). This transformation operates in one pass and is both compositional and first-order. Previous CPS transformations only enjoyed two out of the three properties of being first-order, one-pass, and compositional......, but the new transformation enjoys all three properties. It is proved correct directly by structural induction over source terms instead of indirectly with a colon translation, as in Plotkin's original proof. Similarly, it makes it possible to reason about CPS-transformed terms by structural induction over...... source terms, directly.The new CPS transformation connects separately published approaches to the CPS transformation. It has already been used to state a new and simpler correctness proof of a direct-style transformation, and to develop a new and simpler CPS transformation of control-flow information....

  15. The ISO 5-pass authentication in χ-Spaces

    DEFF Research Database (Denmark)

    Cáccamo, Mario J.; Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    We implement the ISO 5-pass authentication protocol and study its correctness using the χ-Space framework. χ-Spaces is a novel domain specific programming language designed for developing protocols and in particular security protocols. χ-Spaces programming language is an implementation of SPL...

  16. North Texas Sediment Budget: Sabine Pass to San Luis Pass

    Science.gov (United States)

    2006-09-01

    concrete units have been placed over sand-filled fabric tube . .......................................33 Figure 28. Sand-filled fabric tubes protecting...system UTM Zone 15, NAD 83 Longshore drift directions King (in preparation) Based on wave hindcast statistics and limited buoy data Rollover Pass...along with descriptions of the jetties and limited geographic coordinate data1 (Figure 18). The original velum or Mylar sheets from which the report

  17. 'Correction of unrealizable service choreographies’

    NARCIS (Netherlands)

    Mancioppi, M.

    2015-01-01

    This thesis is devoted to the detection and correction of design flaws affecting service choreographies. Service choreographies are models that specify how software services are composed in a decentralized, message-driven fashion. In particular, this work focuses on flaws that compromise the

  18. A Messaging Infrastructure for WLCG

    International Nuclear Information System (INIS)

    Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin

    2011-01-01

    During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.

  19. Survey of Instant Messaging Applications Encryption Methods

    OpenAIRE

    Kabakuş, Abdullah; Kara, Resul

    2015-01-01

    Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Reali...

  20. What motivates consumers to re-tweet brand content? The impact of information, emotion, and traceability on pass-along behavior

    NARCIS (Netherlands)

    Araujo, T.; Neijens, P.; Vliegenthart, R.

    2015-01-01

    How do certain cues influence pass-along behavior (re-Tweeting) of brand messages on Twitter? Analyzing 19,343 global brand messages over a three-year period, the authors of this article found that informational cues were predictors of higher levels of re-Tweeting, particularly product details and

  1. Getting Your Message Across: Mobile Phone Text Messaging

    Science.gov (United States)

    Beecher, Constance C.; Hayungs, Lori

    2017-01-01

    Want to send a message that 99% of your audience will read? Many Extension professionals are familiar with using social media tools to enhance Extension programming. Extension professionals may be less familiar with the use of mobile phone text-based marketing tools. The purpose of this article is to introduce SMS (short message system) marketing…

  2. Chaos-pass filtering in injection-locked semiconductor lasers

    International Nuclear Information System (INIS)

    Murakami, Atsushi; Shore, K. Alan

    2005-01-01

    Chaos-pass filtering (CPF) of semiconductor lasers has been studied theoretically. CPF is a phenomenon which occurs in laser chaos synchronization by injection locking and is a fundamental technique for the extraction of messages at the receiver laser in chaotic communications systems. We employ a simple theory based on driven damped oscillators to clarify the physical background of CPF. The receiver laser is optically driven by injection from the transmitter laser. We have numerically investigated the response characteristics of the receiver when it is driven by periodic (message) and chaotic (carrier) signals. It is thereby revealed that the response of the receiver laser in the two cases is quite different. For the periodic drive, the receiver exhibits a response depending on the signal frequency, while the chaotic drive provides a frequency-independent synchronous response to the receiver laser. We verify that the periodic and chaotic drives occur independently in the CPF response, and, consequently, CPF can be clearly understood in the difference of the two drives. Message extraction using CPF is also examined, and the validity of our theoretical explanation for the physical mechanism underlying CPF is thus verified

  3. A Visualized Message Interface (VMI) for intelligent messaging services

    International Nuclear Information System (INIS)

    Endo, T.; Kasahara, H.; Nakagawa, T.

    1984-01-01

    In CCITT, Message Handling Systems (MHS) have been studied from the viewpoint of communications protocol standardization. In addition to MHS services, Message Processing (MP) services, such as image processing, filing and retrieving services, will come into increasing demand in office automation field. These messaging services, including MHS services, can be thought of as Intelligent Messaging (IM) services. IM services include many basic services, optional user facilities and service parameters. Accordingly, it is necessary to deal with these parameters and MP procedures in as systematic and user-friendly a manner as possible. As one step towards realizing a user-friendly IM services interface, the characteristics of IM service parameters are studied and a Visualized Message Interface (VMI) which resembles a conventional letter exchange format is presented. The concept of VMI formation is discussed using the generic document structure concept as well as a Screen Interface and Protocol Interface conversion package

  4. Young children's perceptions of fire-safety messages: do framing and parental mediation matter?

    Science.gov (United States)

    Borzekowski, Dina; Clearfield, Elizabeth; Rimal, Rajiv; Gielen, Andrea

    2014-01-01

    Media can deliver health and safety messages promoting child health and injury prevention. This study examined the effects of message framing and parental mediation on children's perceptions of fire-safety messages. Using a 2 × 3 randomized experimental design, this study considered both message framing (gain or loss) and parental mediation (no mediation/control, unscripted, or scripted) with 320 children who were 4 and 5 years of age. Children saw two messages (burn and smoke inhalation) embedded in a cartoon. Afterward, researchers assessed children's recall, understanding, and perceptions of self-efficacy and social norms. Children were more likely to recall the safety messages if they were older (burn: adjusted odds ration [AOR] = 2.74 and smoke: AOR = 2.58), and could recall the smoke inhalation message if they had unscripted mediation (AOR = 3.16). Message understanding was poor, with only about 50% of children choosing a correct behavior in a similar scenario. For the burn message, correct understanding was associated with gain-framing and scripted mediation (AOR = 3.22 and 5.77, respectively). Only the scripted mediation group was significantly associated with an increase in perceived social norms (burn: coefficient =.37 and smoke: coefficient =.55; P video-based messages to teach children safety behaviors needs to be enhanced.

  5. Connecticut church passes genetics resolution.

    Science.gov (United States)

    Culliton, B J

    1984-11-09

    The Connecticut Conference of the United Church of Christ, which represents the largest Protestant denomination in the state, has passed a resolution affirming an ethical duty to do research on human gene therapy and is planning to form local church groups to study the scientific and ethical issues involved. The resolution is intended to counter an earlier one proposed by Jeremy Rifkin to ban all efforts at engineering specific traits into the human germline. The Rifkin proposal had been endorsed by a large number of religious leaders, including the head of the U.S. United Church of Christ, but was subsequently characterized by many of the church leaders as overly restrictive.

  6. Sending the wrong message?

    International Nuclear Information System (INIS)

    2000-01-01

    The choice of climate policy instruments affects the price signals to invest in transmission capacity, and the question is whether the resulting price signals are socially optimal. A first-best policy consisting of an optimal carbon tax obviously yields the correct investment signals, but other climate policy choices may also succeed under certain assumptions. However, some sort of policy coordination between countries with a common power market is needed for the investment signals to be correct regardless of the historically given transmission capacity. The set of available generation technologies is also crucial. In the absence of coordinated climate policies, government intervention in transmission investment decisions seems unavoidable.(author)

  7. A First-Order One-Pass CPS Transformation

    DEFF Research Database (Denmark)

    Danvy, Olivier; Nielsen, Lasse Reichstein

    2002-01-01

    We present a new transformation of call-by-value lambdaterms into continuation-passing style (CPS). This transformation operates in one pass and is both compositional and first-order. Because it operates in one pass, it directly yields compact CPS programs that are comparable to what one would...... write by hand. Because it is compositional, it allows proofs by structural induction. Because it is first-order, reasoning about it does not require the use of a logical relation. This new CPS transformation connects two separate lines of research. It has already been used to state a new and simpler...... correctness proof of a direct-style transformation, and to develop a new and simpler CPS transformation of control-flow information....

  8. The Swedish Blood Pass project.

    Science.gov (United States)

    Berglund, B; Ekblom, B; Ekblom, E; Berglund, L; Kallner, A; Reinebo, P; Lindeberg, S

    2007-06-01

    Manipulation of the blood's oxygen carrying capacity (CaO(2)) through reinfusion of red blood cells, injections of recombinant erythropoietin or by other means results in an increased maximal oxygen uptake and concomitantly enhanced endurance performance. Therefore, there is a need to establish a system--"A Blood Pass"--through which such illegal and unethical methods can be detected. Venous blood samples were taken under standardized conditions from 47 male and female Swedish national and international elite endurance athletes four times during the athletic year of the individual sport (beginning and end of the preparation period and at the beginning and during peak performance in the competition period). In these samples, different hematological values were determined. ON(hes) and OFF(hre) values were calculated according to the formula of Gore et al. A questionnaire regarding training at altitude, alcohol use and other important factors for hematological status was answered by the athletes. There were some individual variations comparing hematological values obtained at different times of the athletic year or at the same time in the athletic year but in different years. However, the median values of all individual hematological, ON(hes) and OFF(hre), values taken at the beginning and the end of the preparation or at the beginning and the end of the competition period, respectively, as well as median values for the preparation and competition periods in the respective sport, were all within the 95% confidence limit (CI) of each comparison. It must be mentioned that there was no gender difference in this respect. This study shows that even if there are some individual variations in different hematological values between different sampling times in the athletic year, median values of important hematological factors are stable over time. It must be emphasized that for each blood sample, the 95% CI in each athlete will be increasingly narrower. The conclusion is that

  9. The PASS project architectural model

    International Nuclear Information System (INIS)

    Day, C.T.; Loken, S.; Macfarlane, J.F.

    1994-01-01

    The PASS project has as its goal the implementation of solutions to the foreseen data access problems of the next generation of scientific experiments. The architectural model results from an evaluation of the operational and technical requirements and is described in terms of an abstract reference model, an implementation model and a discussion of some design aspects. The abstract reference model describes a system that matches the requirements in terms of its components and the mechanisms by which they communicate, but does not discuss policy or design issues that would be necessary to match the model to an actual implementation. Some of these issues are discussed, but more detailed design and simulation work will be necessary before choices can be made

  10. WebPASS ICASS (HR Personnel Management)

    Data.gov (United States)

    US Agency for International Development — WebPASS Joint Administrative Support Platforms Post Administrative Software Suite - U.S. Department of State Executive Officers application suite. Web.PASS is the...

  11. A Survey of Rollback-Recovery Protocols in Message-Passing Systems

    Science.gov (United States)

    1999-06-01

    and M.A. Castillo. "Checkpointing through garbage collection." Technical report. Departamento de Ciencia de la Computation, Escuela de Ingenieria ...between consecutive checkpoints. It can be implemented by using the dirty-bit of the memory protection hardware or by emulating a dirty-bit in software [4...compare the program’s state with the previous checkpoint in software , and writing the difference in a new checkpoint [46]. The required storage and

  12. Message-Passing Receiver for OFDM Systems over Highly Delay-Dispersive Channels

    DEFF Research Database (Denmark)

    Barbu, Oana-Elena; Manchón, Carles Navarro; Rom, Christian

    2017-01-01

    Propagation channels with maximum excess delay exceeding the duration of the cyclic prefix (CP) in OFDM systems cause intercarrier and intersymbol interference which, unless accounted for, degrade the receiver performance. Using tools from Bayesian inference and sparse signal reconstruction, we...... derive an iterative algorithm that estimates an approximate representation of the channel impulse response and the noise variance, estimates and cancels the intrinsic interference and decodes the data over a block of symbols. Simulation results show that the receiver employing our algorithm outperforms...

  13. A model based message passing approach for flexible and scalable home automation controllers

    Energy Technology Data Exchange (ETDEWEB)

    Bienhaus, D. [INNIAS GmbH und Co. KG, Frankenberg (Germany); David, K.; Klein, N.; Kroll, D. [ComTec Kassel Univ., SE Kassel Univ. (Germany); Heerdegen, F.; Jubeh, R.; Zuendorf, A. [Kassel Univ. (Germany). FG Software Engineering; Hofmann, J. [BSC Computer GmbH, Allendorf (Germany)

    2012-07-01

    There is a large variety of home automation systems that are largely proprietary systems from different vendors. In addition, the configuration and administration of home automation systems is frequently a very complex task especially, if more complex functionality shall be achieved. Therefore, an open model for home automation was developed that is especially designed for easy integration of various home automation systems. This solution also provides a simple modeling approach that is inspired by typical home automation components like switches, timers, etc. In addition, a model based technology to achieve rich functionality and usability was implemented. (orig.)

  14. Shared memory and message passing revisited in the many-core era

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    In the 70s, Edsgar Dijkstra, Per Brinch Hansen and C.A.R Hoare introduced the fundamental concepts for concurrent computing. It was clear that concrete communication mechanisms were required in order to achieve effective concurrency. Whether you're developing a multithreaded program running on a single node, or a distributed system spanning over hundreds of thousands cores, the choice of the communication mechanism for your system must be done intelligently because of the implicit programmability, performance and scalability trade-offs. With the emergence of many-core computing architectures many assumptions may not be true anymore. In this talk we will try to provide insight on the characteristics of these communication models by providing basic theoretical background and then focus on concrete practical examples based on indicative use case scenarios. The case studies of this presentation cover popular programming models, operating systems and concurrency frameworks in the context of many-core processors.

  15. On the adequacy of message-passing parallel supercomputers for solving neutron transport problems

    International Nuclear Information System (INIS)

    Azmy, Y.Y.

    1990-01-01

    A coarse-grained, static-scheduling parallelization of the standard iterative scheme used for solving the discrete-ordinates approximation of the neutron transport equation is described. The parallel algorithm is based on a decomposition of the angular domain along the discrete ordinates, thus naturally producing a set of completely uncoupled systems of equations in each iteration. Implementation of the parallel code on Intcl's iPSC/2 hypercube, and solutions to test problems are presented as evidence of the high speedup and efficiency of the parallel code. The performance of the parallel code on the iPSC/2 is analyzed, and a model for the CPU time as a function of the problem size (order of angular quadrature) and the number of participating processors is developed and validated against measured CPU times. The performance model is used to speculate on the potential of massively parallel computers for significantly speeding up real-life transport calculations at acceptable efficiencies. We conclude that parallel computers with a few hundred processors are capable of producing large speedups at very high efficiencies in very large three-dimensional problems. 10 refs., 8 figs

  16. Parallel multigrid methods: implementation on message-passing computers and applications to fluid dynamics. A draft

    International Nuclear Information System (INIS)

    Solchenbach, K.; Thole, C.A.; Trottenberg, U.

    1987-01-01

    For a wide class of problems in scientific computing, in particular for partial differential equations, the multigrid principle has proved to yield highly efficient numerical methods. However, the principle has to be applied carefully: if the multigrid components are not chosen adequately with respect to the given problem, the efficiency may be much smaller than possible. This has been demonstrated for many practical problems. Unfortunately, the general theories on multigrid convergence do not give much help in constructing really efficient multigrid algorithms. Although some progress has been made in bridging the gap between theory and practice during the last few years, there are still several theoretical approaches which are misleading rather than helpful with respect to the objective of real efficiency. The research in finding highly efficient algorithms for non-model applications therefore is still a sophisticated mixture of theoretical considerations, a transfer of experiences from model to real life problems and systematical experimental work. The emphasis of the practical research activity today lies - among others - in the following fields: - finding efficient multigrid components for really complex problems, - combining the multigrid approach with advanced discretizative techniques: - constructing highly parallel multigrid algorithms. In this paper, we want to deal mainly with the last topic

  17. Geometrical influences on multi-pass laser forming

    International Nuclear Information System (INIS)

    Edwardson, S P; Abed, E; Bartkowiak, K; Dearden, G; Watkins, K G

    2006-01-01

    Laser forming (LF) offers the industrial promise of controlled shaping of metallic and non-metallic components for prototyping, the correction of design shape or distortion and precision adjustment applications. The potential process advantages include precise incremental adjustment, flexibility of application and no mechanical 'spring-back' effect. To date there has been a considerable amount of work carried out on two-dimensional LF, using multi-pass straight line scan strategies to produce a reasonably controlled bend angle in a number of materials, including aerospace alloys. A key area, however, where there is a limited understanding, is the variation in bend angle per pass during multi-pass LF along a single irradiation track; in particular, the decrease in bend angle per pass after many irradiations for a given set of process parameters. Understanding this is essential if the process is to be fully controlled in a manufacturing environment. The research presented in this paper highlights the current theories as to why this occurs and proposes a further reason based on the geometrical effects of the component deformation, which in turn influences the process parameters per pass. This theory is confirmed through empirical analysis of the 2D LF process

  18. Military Message Experiment. Volume II.

    Science.gov (United States)

    1982-04-01

    elements of the Department of Defense. This resulted in a memorandum from the Director, Telecomunications and Comand and Control, OSD, in June 1975...1978 to April 1979 and provides a discussion of the telecomunications inter- face aspects of the experiment. This Final Report covers the period of...arise in the telecomunication system which require A retransmission of an outgoing message. A "service" message may be created within the

  19. Triplets pass their pressure test

    CERN Multimedia

    2007-01-01

    All the LHC inner triplets have now been repaired and are in position. The first ones have passed their pressure tests with flying colours. The repaired inner triplet at LHC Point 1, right side (1R). Ranko Ostojic (on the right), who headed the team responsible for repairing the triplets, shows the magnet to Robert Zimmer, President of the University of Chicago and of Fermi Research Alliance, who visited CERN on 20th August.Three cheers for the triplets! All the LHC inner triplets have now been repaired and are in position in the tunnel. Thanks to the mobilisation of a multidisciplinary team from CERN and Fermilab, assisted by the KEK Laboratory and the Lawrence Berkeley National Laboratory (LBNL), a solution has been found, tested, validated and applied. At the end of March this year, one of the inner triplets at Point 5 failed to withstand a pressure test. A fault was identified in the supports of two out of the three quadruple magne...

  20. MessageSpace: a messaging system for health research

    Science.gov (United States)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  1. Reactions to threatening health messages.

    Science.gov (United States)

    Ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; Köhninger, Constanze; Kölgen, Lizan; Pelssers, Isabelle; Schütt, Toby; Thomas, Sophia; Ruiter, Robert A C; Kok, Gerjo

    2012-11-21

    Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93). Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72). Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  2. Oil price pass-through into inflation

    International Nuclear Information System (INIS)

    Chen, Shiu-Sheng

    2009-01-01

    This paper uses data from 19 industrialized countries to investigate oil price pass-through into inflation across countries and over time. A time-varying pass-through coefficient is estimated and the determinants of the recent declining effects of oil shocks on inflation are investigated. The appreciation of the domestic currency, a more active monetary policy in response to inflation, and a higher degree of trade openness are found to explain the decline in oil price pass-through. (author)

  3. Evaluating low pass filters on SPECT reconstructed cardiac orientation estimation

    Science.gov (United States)

    Dwivedi, Shekhar

    2009-02-01

    Low pass filters can affect the quality of clinical SPECT images by smoothing. Appropriate filter and parameter selection leads to optimum smoothing that leads to a better quantification followed by correct diagnosis and accurate interpretation by the physician. This study aims at evaluating the low pass filters on SPECT reconstruction algorithms. Criteria for evaluating the filters are estimating the SPECT reconstructed cardiac azimuth and elevation angle. Low pass filters studied are butterworth, gaussian, hamming, hanning and parzen. Experiments are conducted using three reconstruction algorithms, FBP (filtered back projection), MLEM (maximum likelihood expectation maximization) and OSEM (ordered subsets expectation maximization), on four gated cardiac patient projections (two patients with stress and rest projections). Each filter is applied with varying cutoff and order for each reconstruction algorithm (only butterworth used for MLEM and OSEM). The azimuth and elevation angles are calculated from the reconstructed volume and the variation observed in the angles with varying filter parameters is reported. Our results demonstrate that behavior of hamming, hanning and parzen filter (used with FBP) with varying cutoff is similar for all the datasets. Butterworth filter (cutoff > 0.4) behaves in a similar fashion for all the datasets using all the algorithms whereas with OSEM for a cutoff < 0.4, it fails to generate cardiac orientation due to oversmoothing, and gives an unstable response with FBP and MLEM. This study on evaluating effect of low pass filter cutoff and order on cardiac orientation using three different reconstruction algorithms provides an interesting insight into optimal selection of filter parameters.

  4. Photoacoustic Soot Spectrometer (PASS) Instrument Handbook

    Energy Technology Data Exchange (ETDEWEB)

    Dubey, M [Los Alamos National Laboratory; Springston, S [Brookhaven National Laboratory; Koontz, A [Pacific Northwest National Laboratory; Aiken, A [Los Alamos National Laboratory

    2013-01-17

    The photoacoustic soot spectrometer (PASS) measures light absorption by aerosol particles. As the particles pass through a laser beam, the absorbed energy heats the particles and in turn the surrounding air, which sets off a pressure wave that can be detected by a microphone. The PASS instruments deployed by ARM can also simultaneously measure the scattered laser light at three wavelengths and therefore provide a direct measure of the single-scattering albedo. The Operator Manual for the PASS-3100 is included here with the permission of Droplet Measurement Technologies, the instrument’s manufacturer.

  5. Possibilities of the fish pass restoration

    Science.gov (United States)

    Čubanová, Lea

    2018-03-01

    According to the new elaborated methodology of the Ministry of Environment of the Slovak Republic: Identification of the appropriate fish pass types according to water body typology (2015) each barrier on the river must be passable. On the barriers or structures without fish passes new ones should be design and built and on some water structures with existed but nonfunctional fish passes must be realized reconstruction or restoration of such objects. Assessment should be done in terms of the existing migratory fish fauna and hydraulic conditions. Fish fauna requirements resulting from the ichthyological research of the river section with barrier. Hydraulic conditions must than fulfil these requirements inside the fish pass body.

  6. Extracting messages masked by chaos

    International Nuclear Information System (INIS)

    Perez, G.; Cerdeira, H.A.

    1995-01-01

    We show how to extract messages that are masked by a chaotic signal in a system of two Lorenz oscillators. This mask removal is done for two different modes of transmission, a digital one where a parameter of the sender is switched between two values, and an analog mode, where a small amplitude message is added to the carrier signal. We achieve this without using a second Lorenz oscillator as receiver, and without doing a full reconstruction of the dynamics. This method is robust with respect to transformations that impede the unmasking using a Lorenz receiver, and is not affected by the broad-band noise that is inherent to the synchronization process. We also discuss the limitations of this way of extraction for messages in high frequency bands. (author). 12 refs, 4 figs

  7. EDITORIAL: Message from the Editor

    Science.gov (United States)

    Thomas, Paul

    2009-01-01

    The end of 2008 cannot pass without remarking that the economic news has repeatedly strengthened the case for nuclear fusion; not perhaps to solve the immediate crises but to offer long-term security of energy supply. Although temporary, the passage of the price of oil through 100 per barrel is a portent of things to come and should bolster our collective determination to develop nuclear fusion into a viable energy source. It is with great pride, therefore, that I can highlight the contributions that the Nuclear Fusion journal has made to the research programme and the consolidation of its position as the lead journal in the field. Of course, the journal would be nothing without its authors and referees and I would like to pass on my sincere thanks to them all for their work in 2008 and look forward to a continuing, successful collaboration in 2009. Refereeing The Nuclear Fusion Editorial Office understands how much effort is required of our referees. The Editorial Board decided that an expression of thanks to our most loyal referees is appropriate and so, since January 2005, we have been offering the top ten most loyal referees over the past year a personal subscription to Nuclear Fusion with electronic access for one year, free of charge. To select the top referees we have adopted the criterion that a researcher should have acted as a referee or adjudicator for at least two different manuscripts during the period from November 2007 to November 2008 and provided particularly detailed advice to the authors. We have excluded our Board members and those referees who were already listed in the last four years. According to our records the following people met this criterion. Congratulations and many, many thanks! T. Hino (Hokkaido University, Japan) M. Sugihara (ITER Cadarache, France) M. Dreval (Saskatchewan University, Canada) M. Fenstermacher (General Atomics, USA) V.S. Marchenko (Institute for Nuclear Research, Ukraine) G.V. Pereverzev (Max-Planck-Institut fuer

  8. Two-way text messaging: an interactive mobile learning environment in higher education

    Directory of Open Access Journals (Sweden)

    H.K. Salinda Premadasa

    2016-11-01

    Full Text Available Short messaging service (SMS is perhaps the most popular mobile technology prevalent among students in higher education due to its ubiquitous nature and the capability of two-way communication. However, a major limitation in two-way text messaging is sending back a part of received data with the reply message. This limitation results in users of a mobile learning environment being unable to reply back to the correct destination. This article presents a two-way text messaging system that can be integrated into a learning management system (LMS to provide an interactive learning experience to the user community. Initially, a database is integrated into the LMS that holds message information such as recipient's phone number, message body and user data header. A specific port associated with the SMS is used to conceal and exchange data of a particular course unit. Subsequently, software in the student's mobile device captures this message and sends back the reply message to the appropriate course unit allowing both teachers and students to view messages sent and replies received pertaining to a particular course. Results indicate the educational impact of the proposed system in improving the learning environment and benefits it offers to the community in a campus-wide implementation.

  9. Publisher Correction

    DEFF Research Database (Denmark)

    Turcot, Valérie; Lu, Yingchang; Highland, Heather M

    2018-01-01

    In the published version of this paper, the name of author Emanuele Di Angelantonio was misspelled. This error has now been corrected in the HTML and PDF versions of the article.......In the published version of this paper, the name of author Emanuele Di Angelantonio was misspelled. This error has now been corrected in the HTML and PDF versions of the article....

  10. Author Correction

    DEFF Research Database (Denmark)

    Grundle, D S; Löscher, C R; Krahmann, G

    2018-01-01

    A correction to this article has been published and is linked from the HTML and PDF versions of this paper. The error has not been fixed in the paper.......A correction to this article has been published and is linked from the HTML and PDF versions of this paper. The error has not been fixed in the paper....

  11. A Dynamic Continuation-Passing Style for Dynamic Delimited Continuations

    DEFF Research Database (Denmark)

    Biernacki, Dariusz; Danvy, Olivier; Millikin, Kevin Scott

    2005-01-01

    We present a new abstract machine that accounts for dynamic delimited continuations. We prove the correctness of this new abstract machine with respect to a pre-existing, definitional abstract machine. Unlike this definitional abstract machine, the new abstract machine is in defunctionalized form......, which makes it possible to state the corresponding higher-order evaluator. This evaluator is in continuation+state passing style and threads a trail of delimited continuations and a meta-continuation. Since this style accounts for dynamic delimited continuations, we refer to it as `dynamic continuation......-passing style.' We show that the new machine operates more efficiently than the definitional one and that the notion of computation induced by the corresponding evaluator takes the form of a monad. We also present new examples and a new simulation of dynamic delimited continuations in terms of static ones....

  12. Radiating Messages: An International Perspective.

    Science.gov (United States)

    Walker, Janet

    2003-01-01

    Negative messages about the detrimental impacts of divorce on children prompted urgent calls in the United Kingdom for a reinstatement of traditional family values. Suggests that although the effects of divorce are real, care should be taken to avoid exaggeration, thus moving the debate to one centered on providing better support, advice, and…

  13. Re: Design Changing the Message

    Science.gov (United States)

    Wall, Miranda Wakeman

    2008-01-01

    The advertisements that flood everyone's visual culture are designed to create desire. From the author's experience, most high school students are not aware of the messages that they are bombarded with every day, and if they are, few care or think about them critically. The author's goals for this lesson were to increase students' awareness of the…

  14. Instant Apache Camel message routing

    CERN Document Server

    Ibryam, Bilgin

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This short, instruction-based guide shows you how to perform application integration using the industry standard Enterprise Integration Patterns.This book is intended for Java developers who are new to Apache Camel and message- oriented applications.

  15. The Media and the Message.

    Science.gov (United States)

    Cook, Glenn

    2001-01-01

    The experiences of Columbine and El Cajon high schools with media onslaughts following traumatic shooting incidents underscore the importance of getting the message across and sticking to known facts. In a crisis, speculation can hurt everyone. The most important elements in crisis communications are planning and media relations. (MLH)

  16. Spatial variation in messaging effects

    Science.gov (United States)

    Warshaw, Christopher

    2018-05-01

    There is large geographic variation in the public's views about climate change in the United States. Research now shows that climate messages can influence public beliefs about the scientific consensus on climate change, particularly in the places that are initially more skeptical.

  17. Reactions to threatening health messages

    Directory of Open Access Journals (Sweden)

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  18. Representing culture in interstellar messages

    Science.gov (United States)

    Vakoch, Douglas A.

    2008-09-01

    As scholars involved with the Search for Extraterrestrial Intelligence (SETI) have contemplated how we might portray humankind in any messages sent to civilizations beyond Earth, one of the challenges they face is adequately representing the diversity of human cultures. For example, in a 2003 workshop in Paris sponsored by the SETI Institute, the International Academy of Astronautics (IAA) SETI Permanent Study Group, the International Society for the Arts, Sciences and Technology (ISAST), and the John Templeton Foundation, a varied group of artists, scientists, and scholars from the humanities considered how to encode notions of altruism in interstellar messages . Though the group represented 10 countries, most were from Europe and North America, leading to the group's recommendation that subsequent discussions on the topic should include more globally representative perspectives. As a result, the IAA Study Group on Interstellar Message Construction and the SETI Institute sponsored a follow-up workshop in Santa Fe, New Mexico, USA in February 2005. The Santa Fe workshop brought together scholars from a range of disciplines including anthropology, archaeology, chemistry, communication science, philosophy, and psychology. Participants included scholars familiar with interstellar message design as well as specialists in cross-cultural research who had participated in the Symposium on Altruism in Cross-cultural Perspective, held just prior to the workshop during the annual conference of the Society for Cross-cultural Research . The workshop included discussion of how cultural understandings of altruism can complement and critique the more biologically based models of altruism proposed for interstellar messages at the 2003 Paris workshop. This paper, written by the chair of both the Paris and Santa Fe workshops, will explore the challenges of communicating concepts of altruism that draw on both biological and cultural models.

  19. Toward Predicting Popularity of Social Marketing Messages

    Science.gov (United States)

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  20. Improving Type Error Messages in OCaml

    OpenAIRE

    Charguéraud , Arthur

    2015-01-01

    International audience; Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise ...

  1. 78 FR 52166 - Quantitative Messaging Research

    Science.gov (United States)

    2013-08-22

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast-track OMB approval... message testing research (for which CFTC received fast-track OMB approval) and is necessary to identify...

  2. Effects of Text Messaging on Academic Performance

    OpenAIRE

    Barks Amanda; Searight H. Russell; Ratwik Susan

    2011-01-01

    University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were ...

  3. Message exchange in the building industry

    NARCIS (Netherlands)

    Vries, de B.; Somers, L.J.A.M.

    1995-01-01

    A process model is described for exchanging information in the building industry. In this model participants send and receive messages. On receipt of a message an activity is executed if all required information is available. Otherwise a message will be sent to another participant to obtain the

  4. How to pass higher English colour

    CERN Document Server

    Bridges, Ann

    2009-01-01

    How to Pass is the Number 1 revision series for Scottish qualifications across the three examination levels of Standard Grade, Intermediate and Higher! Second editions of the books present all of the material in full colour for the first time.

  5. Framing of health information messages.

    Science.gov (United States)

    Akl, Elie A; Oxman, Andrew D; Herrin, Jeph; Vist, Gunn E; Terrenato, Irene; Sperati, Francesca; Costiniuk, Cecilia; Blank, Diana; Schünemann, Holger

    2011-12-07

    -planned subgroup analyses based on the type of message (screening, prevention, and treatment). The primary outcome was behaviour. We did not assess any adverse outcomes. We included 35 studies involving 16,342 participants (all health consumers) and reporting 51 comparisons.In the context of attribute framing, participants in one included study understood the message better when it was framed negatively than when it was framed positively (1 study; SMD -0.58 (95% confidence interval (CI) -0.94 to -0.22); moderate effect size; low quality evidence). Although positively-framed messages may have led to more positive perception of effectiveness than negatively-framed messages (2 studies; SMD 0.36 (95% CI -0.13 to 0.85); small effect size; low quality evidence), there was little or no difference in persuasiveness (11 studies; SMD 0.07 (95% CI -0.23 to 0.37); low quality evidence) and behavior (1 study; SMD 0.09 (95% CI -0.14 to 0.31); moderate quality evidence).In the context of goal framing, loss messages led to a more positive perception of effectiveness compared to gain messages for screening messages (5 studies; SMD -0.30 (95% CI -0.49 to -0.10); small effect size; moderate quality evidence) and may have been more persuasive for treatment messages (3 studies; SMD -0.50 (95% CI -1.04 to 0.04); moderate effect size; very low quality evidence). There was little or no difference in behavior (16 studies; SMD -0.06 (95% CI -0.15 to 0.03); low quality evidence). No study assessed the effect on understanding. Contrary to commonly held beliefs, the available low to moderate quality evidence suggests that both attribute and goal framing may have little if any consistent effect on health consumers' behaviour. The unexplained heterogeneity between studies suggests the possibility of a framing effect under specific conditions. Future research needs to investigate these conditions.

  6. Reactions to threatening health messages

    OpenAIRE

    ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; K?hninger, Constanze; K?lgen, Lizan; Pelssers, Isabelle; Sch?tt, Toby; Thomas, Sophia; Ruiter, Robert AC; Kok, Gerjo

    2012-01-01

    Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence th...

  7. A message to school girls.

    Science.gov (United States)

    Akinwande, A

    1993-06-01

    Information, education, and communication (IEC) programs need to be strengthened to appeal to adolescents, who are increasingly contributing to unwanted pregnancy and are using abortion as a means of birth control. Successful IEC programs have the following characteristics: 1) established communication theories that guide development of materials; 2) a multimedia and a mass media approach to information dissemination, and 3) emphasis on visual displays. The primary emphasis should be on presentation of a concise, clear message with the appropriate visual medium. Many communication specialists in developing countries, however, lack the training to design and use effective IEC software. Designing effective messages involves a process of integrating scientific ideas with artistic appeal. The aim is to stimulate the target audience to change its behavior of life style. The message must be convincing and contain practical and useful information. The IEC Software Design Cycle focuses on analysis and diagnosis, design production, pretesting and modification, and distribution and evaluation. Each of these processes are described. Necessary before any attempt is made is obtaining data on historical, sociocultural, and demographic characteristics, economic activities, health and social services, communication infrastructure, marriage and family life patterns, and decision making systems. Focus group discussions may be used to collect information about the target group. An example is given of the process of development, in a course through the Center or African Family Studies, of a poster about premarital sex directed to 11-16 year olds. On the basis of focus group discussions, it was decided that the message would be to encourage girls to talk with their mothers about family life and premarital sex. The poster was produced with 2 school girls talking in front of the school. The evaluation yielded modifications such as including a school building that resembled actual

  8. Instant Messaging in Dental Education.

    Science.gov (United States)

    Khatoon, Binish; Hill, Kirsty B; Walmsley, A Damien

    2015-12-01

    Instant messaging (IM) is when users communicate instantly via their mobile devices, and it has become one of the most preferred choices of tools to communicate amongst health professions students. The aim of this study was to understand how dental students communicate via IM, faculty members' perspectives on using IM to communicate with students, and whether such tools are useful in the learning environment. After free-associating themes on online communication, two draft topic guides for structured interviews were designed that focussed on mobile device-related communication activities. A total of 20 students and six faculty members at the University of Birmingham School of Dentistry agreed to take part in the interviews. Students were selected from years 1-5 representing each year group. The most preferred communication tools were emails, social networking, and IM. Emails were used for more formal messages, and IM and social networking sites were used for shorter messages. WhatsApp was the most used IM app because of its popular features such as being able to check if recipients have read and received messages and group work. The students reported that changes were necessary to improve their communication with faculty members. The faculty members reported having mixed feelings toward the use of IM to communicate with students. The students wished to make such tools a permanent part of their learning environment, but only with the approval of faculty members. The faculty members were willing to accept IM as a communication tool only if it is monitored and maintained by the university and has a positive effect on learning.

  9. A Modular Instant Messaging System

    OpenAIRE

    Mohamad Raad; Zouhair Bazzal; Majd Ghareeb; Hanan Farhat; Semar Bahmad

    2017-01-01

    Instant Messaging (IM) Android applications are a trend nowadays. These applications are categorized according to their features: usability, flexibility, privacy and security. However, IM applications tend to be inflexible in terms of functionality offered. The “Dble-U” system was developed as a solution to this inflexibility, with a focus on privacy as an example use case. “Dble-U” is a configurable modular system consisting of an Android chatting application, a privacy controller applicatio...

  10. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm

    Science.gov (United States)

    Rachmawati, D.; Budiman, M. A.; Aulya, L.

    2018-02-01

    Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

  11. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  12. Distributed parallel messaging for multiprocessor systems

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  13. Entity-based Classification of Twitter Messages

    OpenAIRE

    Yerva, Surender Reddy; Miklós, Zoltán; Aberer, Karl

    2012-01-01

    Twitter is a popular micro-blogging service on theWeb, where people can enter short messages, which then become visible to some other users of the service. While the topics of these messages varies, there are a lot of messages where the users express their opinions about some companies or their products. These messages are a rich source of information for companies for sentiment analysis or opinion mining. There is however a great obstacle for analyzing the messages directly: as the company n...

  14. Asynchronous Message Service Reference Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to

  15. Guidelines for designing messages in risk communication

    International Nuclear Information System (INIS)

    Takashita, Hirofumi; Horikoshi, Hidehiko

    2004-07-01

    Risk Communication Study Team (hereafter called RC team) has designed messages for risk communication based on the analysis of the local residents' opinions which were expressed in several questionnaire surveys. The messages are described in a side format (Power Point format) every single content. This report provides basic guidelines for making messages that are used for risk communication, and does not include concrete messages which RC team designed. The RC team has already published the report entitled 'Information materials for risk communication' (JNC TN8450 2003-008) separately, and it gives the concrete messages. This report shows general cautions and checklists in designing messages, comments on the messages from outside risk communication experts, and opinions from local residents. (author)

  16. Changing knowledge and beliefs through an oral health pregnancy message.

    Science.gov (United States)

    Bates, S Brady; Riedy, Christine A

    2012-01-01

    Pregnancy can be a critical and important period in which to intervene to improve oral health in both the mother and her child. This study examined an online approach for promoting awareness of oral health messages targeted at pregnant women, and whether this type of health messaging impacts oral health knowledge and beliefs. The study was conducted in three parts: production and pilot testing of a brief commercial, Web site/commercial launch and testing, and dissemination and monitoring of the commercial on a video-sharing site. The brief commercial and pre- and postsurveys were produced and pilot tested among a convenience sample of pregnant women (n = 13). The revised commercial and surveys were launched on a newly created Web site and monitored for activity. After 2 months, the commercial was uploaded to a popular video-sharing Web site. Fifty-five individuals completed both the pre- and postsurveys after the Web site was launched. No one responded 100 percent correctly on the presurvey; 77.4 percent responded correctly about dental visits during pregnancy, 66.0 percent about cavity prevention, and 50.9 percent about transmission of bacteria by saliva. Most respondents recalled the correct information on the posttest; 100 percent or close to 100 percent accurately responded about visiting the dentist during pregnancy and preventing cavities, while 79.2 percent responded correctly to the transmission question. Social media can effectively provide dental health messages during pregnancy. This approach can play an important role in increasing awareness and improving oral health of both mother and child. © 2011 American Association of Public Health Dentistry.

  17. Publisher Correction

    DEFF Research Database (Denmark)

    Stokholm, Jakob; Blaser, Martin J.; Thorsen, Jonathan

    2018-01-01

    The originally published version of this Article contained an incorrect version of Figure 3 that was introduced following peer review and inadvertently not corrected during the production process. Both versions contain the same set of abundance data, but the incorrect version has the children...

  18. Publisher Correction

    DEFF Research Database (Denmark)

    Flachsbart, Friederike; Dose, Janina; Gentschew, Liljana

    2018-01-01

    The original version of this Article contained an error in the spelling of the author Robert Häsler, which was incorrectly given as Robert Häesler. This has now been corrected in both the PDF and HTML versions of the Article....

  19. Correction to

    DEFF Research Database (Denmark)

    Roehle, Robert; Wieske, Viktoria; Schuetz, Georg M

    2018-01-01

    The original version of this article, published on 19 March 2018, unfortunately contained a mistake. The following correction has therefore been made in the original: The names of the authors Philipp A. Kaufmann, Ronny Ralf Buechel and Bernhard A. Herzog were presented incorrectly....

  20. Improving the effectiveness of fundraising messages: The impact of charity goal attainment, message framing, and evidence on persuasion

    NARCIS (Netherlands)

    Das, E.; Kerkhof, P.; Kuiper, J.

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a

  1. INVESTIGATION OF SINGLE-PASS/DOUBLE-PASS TECHNIQUES ON FRICTION STIR WELDING OF ALUMINIUM

    Directory of Open Access Journals (Sweden)

    N.A.A. Sathari

    2014-12-01

    Full Text Available The aim of this research is to study the effects of single-pass/ double-pass techniques on friction stir welding of aluminium. Two pieces of AA1100 with a thickness of 6.0 mm were friction stir welded using a CNC milling machine at rotational speeds of 1400 rpm, 1600 rpm and 1800 rpm respectively for single-pass and double-pass. Microstructure observations of the welded area were studied using an optical microscope. The specimens were tested by using a tensile test and Vickers hardness test to evaluate their mechanical properties. The results indicated that, at low rotational speed, defects such as ‘surface lack of fill’ and tunnels in the welded area contributed to a decrease in mechanical properties. Welded specimens using double-pass techniques show increasing values of tensile strength and hardness. From this investigation it is found that the best parameters of FSW welded aluminium AA1100 plate were those using double-pass techniques that produce mechanically sound joints with a hardness of 56.38 HV and 108 MPa strength at 1800 rpm compared to the single-pass technique. Friction stir welding, single-pass/ double-pass techniques, AA1100, microstructure, mechanical properties.

  2. A Novel Single Pass Authenticated Encryption Stream Cipher for Software Defined Radios

    DEFF Research Database (Denmark)

    Khajuria, Samant

    2012-01-01

    to propose cryptographic services such as confidentiality, integrity and authentication. Therefore, integration of security services into SDR devices is essential. Authenticated Encryption schemes donate the class of cryptographic algorithms that are designed for protecting both message confidentiality....... This makes authenticated encryption very attractive for low-cost low-power hardware implementations, as it allows for the substantial decrease in the circuit area and power consumed compared to the traditional schemes. In this thesis, an authenticated encryption scheme is proposed with the focus of achieving...... high throughput and low overhead for SDRs. The thesis is divided into two research topics. One topic is the design of a 1-pass authenticated encryption scheme that can accomplish both message secrecy and authenticity in a single cryptographic primitive. The other topic is the implementation...

  3. Effects of Text Messaging on Academic Performance

    Directory of Open Access Journals (Sweden)

    Barks Amanda

    2011-12-01

    Full Text Available University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were randomly assigned to one of two conditions: 1. a group that sent andreceived text messages during a lecture or, 2. a group that did not engage in text messagingduring the lecture. Participants who engaged in text messaging demonstrated significantlypoorer performance on a test covering lecture content compared with the group that did notsend and receive text messages. Participants exhibiting higher levels of text messaging skill hadsignificantly lower test scores than participants who were less proficient at text messaging. It ishypothesized that in terms of retention of lecture material, more frequent task shifting by thosewith greater text messaging proficiency contributed to poorer performance. Overall, the findingsdo not support the view, held by many university students, that this form of multitasking has littleeffect on the acquisition of lecture content. Results provide empirical support for teachers andprofessors who ban text messaging in the classroom.

  4. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... out more. Corrective Jaw Surgery Corrective Jaw Surgery Orthognathic surgery is performed to correct the misalignment of jaws ... out more. Corrective Jaw Surgery Corrective Jaw Surgery Orthognathic surgery is performed to correct the misalignment of jaws ...

  5. Setting pass scores for clinical skills assessment.

    Science.gov (United States)

    Liu, Min; Liu, Keh-Min

    2008-12-01

    In a clinical skills assessment, the decision to pass or fail an examinee should be based on the test content or on the examinees' performance. The process of deciding a pass score is known as setting a standard of the examination. This requires a properly selected panel of expert judges and a suitable standard setting method, which best fits the purpose of the examination. Six standard setting methods that are often used in clinical skills assessment are described to provide an overview of the standard setting process.

  6. Setting Pass Scores for Clinical Skills Assessment

    Directory of Open Access Journals (Sweden)

    Min Liu

    2008-12-01

    Full Text Available In a clinical skills assessment, the decision to pass or fail an examinee should be based on the test content or on the examinees' performance. The process of deciding a pass score is known as setting a standard of the examination. This requires a properly selected panel of expert judges and a suitable standard setting method, which best fits the purpose of the examination. Six standard setting methods that are often used in clinical skills assessment are described to provide an overview of the standard setting process.

  7. Single beam pass migmacell method and apparatus

    International Nuclear Information System (INIS)

    Maglich, B.C.; Nering, J.E.; Mazarakis, M.G.; Miller, R.A.

    1976-01-01

    The invention provides improvements in migmacell apparatus and method by dispensing with the need for metastable confinement of injected molecular ions for multiple precession periods. Injected molecular ions undergo a 'single pass' through the reaction volume. By preconditioning the injected beam such that it contains a population distribution of molecules in higher vibrational states than in the case of a normal distribution, injected molecules in the single pass exper-ience collisionless dissociation in the migmacell under magnetic influence, i.e., so-called Lorentz dissociation. Dissociationions then form atomic migma

  8. Ultrastructural evaluation of multiple pass low energy versus single pass high energy radio-frequency treatment.

    Science.gov (United States)

    Kist, David; Burns, A Jay; Sanner, Roth; Counters, Jeff; Zelickson, Brian

    2006-02-01

    The radio-frequency (RF) device is a system capable of volumetric heating of the mid to deep dermis and selective heating of the fibrous septa strands and fascia layer. Clinically, these effects promote dermal collagen production, and tightening of these deep subcutaneous structures. A new technique of using multiple low energy passes has been described which results in lower patient discomfort and fewer side effects. This technique has also been anecdotally described as giving more reproducible and reliable clinical results of tissue tightening and contouring. This study will compare ultrastructural changes in collagen between a single pass high energy versus up to five passes of a multiple pass lower energy treatment. Three subjects were consented and treated in the preauricular region with the RF device using single or multiple passes (three or five) in the same 1.5 cm(2) treatment area with a slight delay between passes to allow tissue cooling. Biopsies from each treatment region and a control biopsy were taken immediately, 24 hours or 6 months post treatment for electron microscopic examination of the 0-1 mm and 1-2 mm levels. Sections of tissue 1 mm x 1 mm x 80 nm were examined with an RCA EMU-4 Transmission Electron Microscope. Twenty sections from 6 blocks from each 1 mm depth were examined by 2 blinded observers. The morphology and degree of collagen change in relation to area examined was compared to the control tissue, and estimated using a quantitative scale. Ultrastructural examination of tissue showed that an increased amount of collagen fibril changes with increasing passes at energies of 97 J (three passes) and 122 J (five passes), respectively. The changes seen after five multiple passes were similar to those detected after much more painful single pass high-energy treatments. This ultrastructural study shows changes in collagen fibril morphology with an increased effect demonstrated at greater depths of the skin with multiple low-fluence passes

  9. The Physical Therapy and Society Summit (PASS) Meeting: observations and opportunities.

    Science.gov (United States)

    Kigin, Colleen M; Rodgers, Mary M; Wolf, Steven L

    2010-11-01

    The construct of delivering high-quality and cost-effective health care is in flux, and the profession must strategically plan how to meet the needs of society. In 2006, the House of Delegates of the American Physical Therapy Association passed a motion to convene a summit on "how physical therapists can meet current, evolving, and future societal health care needs." The Physical Therapy and Society Summit (PASS) meeting on February 27-28, 2009, in Leesburg, Virginia, sent a clear message that for physical therapists to be effective and thrive in the health care environment of the future, a paradigm shift is required. During the PASS meeting, participants reframed our traditional focus on the physical therapist and the patient/client (consumer) to one in which physical therapists are an integral part of a collaborative, multidisciplinary health care team with the health care consumer as its focus. The PASS Steering Committee recognized that some of the opportunities that surfaced during the PASS meeting may be disruptive or may not be within the profession's present strategic or tactical plans. Thus, adopting a framework that helps to establish the need for change that is provocative and potentially disruptive to our present care delivery, yet prioritizes opportunities, is a critical and essential step. Each of us in the physical therapy profession must take on post-PASS roles and responsibilities to accomplish the systemic change that is so intimately intertwined with our destiny. This article offers a perspective of the dynamic dialogue and suggestions that emerged from the PASS event, providing further opportunities for discussion and action within our profession.

  10. The use of messages in altering risky gambling behavior in experienced gamblers.

    Science.gov (United States)

    Jardin, Bianca F; Wulfert, Edelgard

    2012-03-01

    The present study was an experimental analogue that examined the relationship between gambling-related irrational beliefs and risky gambling behavior. Eighty high-frequency gamblers were randomly assigned to four conditions and played a chance-based computer game in a laboratory setting. Depending on the condition, during the game a pop-up screen repeatedly displayed either accurate or inaccurate messages concerning the game, neutral messages, or no messages. Consistent with a cognitive-behavioral model of gambling, accurate messages that correctly described the random contingencies governing the game decreased risky gambling behavior. Contrary to predictions, inaccurate messages designed to mimic gamblers' irrational beliefs about their abilities to influence chance events did not lead to more risky gambling behavior than exposure to neutral or no messages. Participants in the latter three conditions did not differ significantly from one another and all showed riskier gambling behavior than participants in the accurate message condition. The results suggest that harm minimization strategies that help individuals maintain a rational perspective while gambling may protect them from unreasonable risk-taking. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  11. EXCHANGE RATE PASS-THROUGH, IMPORT PRICES AND INFLATION UNDER STRUCTURAL BREAKS

    Directory of Open Access Journals (Sweden)

    Arintoko Arintoko

    2011-09-01

    Full Text Available This research estimates the exchange rate pass-through (ERPT into import prices by applying an extension of the basic model of ERPT on Indonesia. It estimates models of cointegration and error-correction mechanism (ECM, with and without structural breaks. It uses the techniques of Zivot-Andrews and of Gregory-Hansen to test for structural breaks and cointegration with the structural breaks, respectively. The results show that with the control variables, inflation affects import prices and lower the pass-through for short term, in a condition of free floating exchange rate. In the short term, with the inclusion of structural breaks, significant inflation affects import prices and lowers the ERPT coefficient.  Keywords:    Exchange rate pass-through, inflation, structural breaks, cointegration, error-correction mechanismJEL classification numbers: C22, C32, E31, F41

  12. The WLCG Messaging Service and its Future

    International Nuclear Information System (INIS)

    Cons, Lionel; Paladin, Massimo

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures will support the growth of the WLCG messaging service.

  13. Hand hygiene posters: motivators or mixed messages?

    Science.gov (United States)

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-07-01

    Poster campaigns regarding hand hygiene are commonly used by infection control teams to improve practice, yet little is known of the extent to which they are based on established theory or research. This study reports on the content analysis of hand hygiene posters (N=69) and their messages (N=75) using message-framing theory. The results showed that posters seldom drew on knowledge about effective ways to frame messages. Frequently, they simply conveyed information 'telling' rather than 'selling' and some of this was confusing. Most posters were not designed to motivate, and some conveyed mixed messages. Few used fear appeals. Hand hygiene posters could have a greater impact if principles of message framing were utilized in their design. Suggestions for gain-framed messages are offered, but these need to be tested empirically.

  14. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2012-01-01

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  15. Diabetes education via mobile text messaging.

    Science.gov (United States)

    Wangberg, Silje C; Arsand, Eirik; Andersson, Niklas

    2006-01-01

    Living with diabetes makes great educational demands on a family. We have tested the feasibility of using the mobile phone short message service (SMS) for reaching people with diabetes information. We also assessed user satisfaction and perceived pros and cons of the medium through interviews. Eleven parents of children with type 1 diabetes received messages for 11 weeks. The parents were positive about the system and said that they would like to continue to use it. The pop-up reminding effect of SMS messages in busy everyday life was noted as positive. Some parents experienced the messages as somewhat intrusive, arriving too often and at inconvenient times. The parents also noted the potential of the messages to facilitate communication with their adolescent children. The inability to store all of the messages or to print them out were seen as major disadvantages. Overall, the SMS seems to hold promise as means of delivering diabetes information.

  16. CMLOG: A common message logging system

    International Nuclear Information System (INIS)

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  17. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed

    2012-08-19

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  18. Application of a Tsunami Warning Message Metric to refine NOAA NWS Tsunami Warning Messages

    Science.gov (United States)

    Gregg, C. E.; Johnston, D.; Sorensen, J.; Whitmore, P.

    2013-12-01

    In 2010, the U.S. National Weather Service (NWS) funded a three year project to integrate social science into their Tsunami Program. One of three primary requirements of the grant was to make improvements to tsunami warning messages of the NWS' two Tsunami Warning Centers- the West Coast/Alaska Tsunami Warning Center (WCATWC) in Palmer, Alaska and the Pacific Tsunami Warning Center (PTWC) in Ewa Beach, Hawaii. We conducted focus group meetings with a purposive sample of local, state and Federal stakeholders and emergency managers in six states (AK, WA, OR, CA, HI and NC) and two US Territories (US Virgin Islands and American Samoa) to qualitatively asses information needs in tsunami warning messages using WCATWC tsunami messages for the March 2011 Tohoku earthquake and tsunami event. We also reviewed research literature on behavioral response to warnings to develop a tsunami warning message metric that could be used to guide revisions to tsunami warning messages of both warning centers. The message metric is divided into categories of Message Content, Style, Order and Formatting and Receiver Characteristics. A message is evaluated by cross-referencing the message with the operational definitions of metric factors. Findings are then used to guide revisions of the message until the characteristics of each factor are met. Using findings from this project and findings from a parallel NWS Warning Tiger Team study led by T. Nicolini, the WCATWC implemented the first of two phases of revisions to their warning messages in November 2012. A second phase of additional changes, which will fully implement the redesign of messages based on the metric, is in progress. The resulting messages will reflect current state-of-the-art knowledge on warning message effectiveness. Here we present the message metric; evidence-based rational for message factors; and examples of previous, existing and proposed messages.

  19. Incorporating Pass-Phrase Dependent Background Models for Text-Dependent Speaker verification

    DEFF Research Database (Denmark)

    Sarkar, Achintya Kumar; Tan, Zheng-Hua

    2018-01-01

    -dependent. We show that the proposed method significantly reduces the error rates of text-dependent speaker verification for the non-target types: target-wrong and impostor-wrong while it maintains comparable TD-SV performance when impostors speak a correct utterance with respect to the conventional system......In this paper, we propose pass-phrase dependent background models (PBMs) for text-dependent (TD) speaker verification (SV) to integrate the pass-phrase identification process into the conventional TD-SV system, where a PBM is derived from a text-independent background model through adaptation using...... the utterances of a particular pass-phrase. During training, pass-phrase specific target speaker models are derived from the particular PBM using the training data for the respective target model. While testing, the best PBM is first selected for the test utterance in the maximum likelihood (ML) sense...

  20. Generalizing Galileo's Passe-Dix Game

    Science.gov (United States)

    Hombas, Vassilios

    2012-01-01

    This article shows a generalization of Galileo's "passe-dix" game. The game was born following one of Galileo's [G. Galileo, "Sopra le Scoperte dei Dadi" (Galileo, Opere, Firenze, Barbera, Vol. 8). Translated by E.H. Thorne, 1898, pp. 591-594] explanations on a paradox that occurred in the experiment of tossing three fair "six-sided" dice.…

  1. TREsPASS Book 3: Creative Engagements

    NARCIS (Netherlands)

    Coles-Kemp, Lizzie; Hall, Peter

    2016-01-01

    In this book we examine the role that creative security engagements have played in the TREsPASS project. These engagements are part of a wider creative securities approach that explores the contributions that social practices make to protection of data and information. Our most popular creative

  2. Passing the Bond Issue (with Related Video)

    Science.gov (United States)

    Erickson, Paul W.

    2011-01-01

    When a bond referendum comes around for a school district, it often is the culmination of years of planning, strategizing and communicating to the public. Especially in these economic times, passing a building referendum is challenging. Complete transparency among the superintendent, school board and community is essential to communicate the…

  3. Message Received: Virtual Ethnography in Online Message Boards

    Directory of Open Access Journals (Sweden)

    Kevin F. Steinmetz

    2012-02-01

    Full Text Available As the Internet begins to encapsulate more people within online communities, it is important that the social researcher have well-rounded ethnographic methodologies for observing these phenomena. This article seeks to contribute to methodology by detailing and providing insights into three specific facets of virtual ethnography that need attention: space and time, identity and authenticity, and ethics. Because the Internet is a globalized and instantaneous medium where space and time collapse, identity becomes more playful, and ethics become more tenuous; understanding these aspects is crucial to the study of online social groups. A second focus of this article is to apply these notions to the study of online message boards—a frequently used medium for online communication that is frequently overlooked by methodologists.

  4. Nonlinear unknown input sliding mode observer based chaotic system synchronization and message recovery scheme with uncertainty

    International Nuclear Information System (INIS)

    Sharma, Vivek; Sharma, B.B.; Nath, R.

    2017-01-01

    In the present manuscript, observer based synchronization and message recovery scheme is discussed for a system with uncertainties. LMI conditions are analytically derived solution of which gives the observer design matrices. Earlier approaches have used adaptive laws to address the uncertainties, however in present work, decoupling approach is used to make observer robust against uncertainties. The methodology requires upper bounds on nonlinearity and the message signal and estimates for these bounds are generated adaptively. Thus no information about the nature of nonlinearity and associated Lipschitz constant is needed in proposed approach. Message signal is recovered using equivalent output injection which is a low pass filtered equivalent of the discontinuous effort required to maintain the sliding motion. Finally, the efficacy of proposed Nonlinear Unknown Input Sliding Mode Observer (NUISMO) for chaotic communication is verified by conducting simulation studies on two chaotic systems i.e. third order Chua circuit and Rossler system.

  5. Modeling drivers' passing duration and distance in a virtual environment

    Directory of Open Access Journals (Sweden)

    Haneen Farah

    2013-07-01

    The main contribution of this paper is in the empirical models developed for passing duration and distance which highlights the factors that affect drivers' passing behavior and can be used to enhance the passing models in simulation programs.

  6. Message framing in social networking sites.

    Science.gov (United States)

    Kao, Danny Tengti; Chuang, Shih-Chieh; Wang, Sui-Min; Zhang, Lei

    2013-10-01

    Online social networking sites represent significant new opportunities for Internet advertisers. However, results based on the real world cannot be generalized to all virtual worlds. In this research, the moderating effects of need for cognition (NFC) and knowledge were applied to examine the impact of message framing on attitudes toward social networking sites. A total of 216 undergraduates participated in the study. Results reveal that for social networking sites, while high-NFC individuals form more favorable attitudes toward negatively framed messages than positively framed messages, low-NFC individuals form more favorable attitudes toward positively framed messages than negatively framed messages. In addition, low-knowledge individuals demonstrate more favorable attitudes toward negatively framed messages than positively framed messages; however, the framing effect does not differentially affect the attitudes of high-knowledge individuals. Furthermore, the framing effect does not differentially affect the attitudes of high-NFC individuals with high knowledge. In contrast, low-NFC individuals with low knowledge hold more favorable attitudes toward positively framed messages than negatively framed messages.

  7. Evaluation of Sexual Communication Message Strategies

    Science.gov (United States)

    2011-01-01

    Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC) have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity. PMID:21599875

  8. Electroweak corrections

    International Nuclear Information System (INIS)

    Beenakker, W.J.P.

    1989-01-01

    The prospect of high accuracy measurements investigating the weak interactions, which are expected to take place at the electron-positron storage ring LEP at CERN and the linear collider SCL at SLAC, offers the possibility to study also the weak quantum effects. In order to distinguish if the measured weak quantum effects lie within the margins set by the standard model and those bearing traces of new physics one had to go beyond the lowest order and also include electroweak radiative corrections (EWRC) in theoretical calculations. These higher-order corrections also can offer the possibility of getting information about two particles present in the Glashow-Salam-Weinberg model (GSW), but not discovered up till now, the top quark and the Higgs boson. In ch. 2 the GSW standard model of electroweak interactions is described. In ch. 3 some special techniques are described for determination of integrals which are responsible for numerical instabilities caused by large canceling terms encountered in the calculation of EWRC effects, and methods necessary to get hold of the extensive algebra typical for EWRC. In ch. 4 various aspects related to EWRC effects are discussed, in particular the dependence of the unknown model parameters which are the masses of the top quark and the Higgs boson. The processes which are discussed are production of heavy fermions from electron-positron annihilation and those of the fermionic decay of the Z gauge boson. (H.W.). 106 refs.; 30 figs.; 6 tabs.; schemes

  9. Coding for Parallel Links to Maximize the Expected Value of Decodable Messages

    Science.gov (United States)

    Klimesh, Matthew A.; Chang, Christopher S.

    2011-01-01

    When multiple parallel communication links are available, it is useful to consider link-utilization strategies that provide tradeoffs between reliability and throughput. Interesting cases arise when there are three or more available links. Under the model considered, the links have known probabilities of being in working order, and each link has a known capacity. The sender has a number of messages to send to the receiver. Each message has a size and a value (i.e., a worth or priority). Messages may be divided into pieces arbitrarily, and the value of each piece is proportional to its size. The goal is to choose combinations of messages to send on the links so that the expected value of the messages decodable by the receiver is maximized. There are three parts to the innovation: (1) Applying coding to parallel links under the model; (2) Linear programming formulation for finding the optimal combinations of messages to send on the links; and (3) Algorithms for assisting in finding feasible combinations of messages, as support for the linear programming formulation. There are similarities between this innovation and methods developed in the field of network coding. However, network coding has generally been concerned with either maximizing throughput in a fixed network, or robust communication of a fixed volume of data. In contrast, under this model, the throughput is expected to vary depending on the state of the network. Examples of error-correcting codes that are useful under this model but which are not needed under previous models have been found. This model can represent either a one-shot communication attempt, or a stream of communications. Under the one-shot model, message sizes and link capacities are quantities of information (e.g., measured in bits), while under the communications stream model, message sizes and link capacities are information rates (e.g., measured in bits/second). This work has the potential to increase the value of data returned from

  10. Smoker reactions to a "radio message" that Light cigarettes are as dangerous as Regular cigarettes.

    Science.gov (United States)

    Kozlowski, L T; Goldberg, M E; Sweeney, C T; Palmer, R F; Pillitteri, J L; Yost, B A; White, E L; Stine, M M

    1999-03-01

    The purpose of this study was to examine in a systematic, controlled fashion the reactions of smokers to scientifically correct information about the risks of smoking Light cigarettes (about 6-15 mg tar by the FTC method). Random-digit dialing, computer-assisted telephone interviews were used to locate daily smokers of Light cigarettes. In an experimental design, smokers were randomly assigned to listen (n = 293) or not (n = 275) to a persuasive simulated radio message on the risks of Light cigarettes; 108 of those who did not listen to the message in the first part of the interview were played the message in the second part, to evaluate some repeated-measures effects. Those who heard the message were more likely to report that one Light cigarette could give a smoker the same amount of tar as one Regular cigarette and that Light cigarettes were more dangerous: 55% said the message made them think more about quitting and 46% said the message increased the amount they wanted to quit; 42% said that after hearing the message they thought Light cigarettes were more dangerous. Using the Theory of Planned Behavior, structural equation modeling analysis indicated that the message acted to increase intention to quit smoking by increasing the desire to quit smoking. Seventy-three per cent of the smokers agreed that it was important to play such messages widely on the radio; 77% agreed that there should be a warning on packs that vent blocking increases tar; 61% agreed that the location of filter vents should be marked. The majority of smokers of Light cigarettes seem to value being informed that Light cigarettes are as dangerous for them as Regular cigarettes, and this information increases their intentions to quit smoking.

  11. Persuasiveness of Statistics and Patients’ and Mothers’ Narratives in Human Papillomavirus Vaccine Recommendation Messages: A Randomized Controlled Study in Japan

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Okuhara

    2018-04-01

    Full Text Available BackgroundThe human papillomavirus (HPV vaccination percentage among age-eligible girls in Japan is only in the single digits. This signals the need for effective vaccine communication tactics. This study aimed to examine the influence of statistical data and narrative HPV vaccination recommendation massages on recipients’ vaccination intentions.MethodsThis randomized controlled study covered 1,432 mothers who had daughters aged 12–16 years. It compared message persuasiveness among four conditions: statistical messages only; narrative messages of a patient who experienced cervical cancer, in addition to statistical messages; narrative messages of a mother whose daughter experienced cervical cancer, in addition to statistical messages; and a control. Vaccination intentions to have one’s daughter(s receive the HPV vaccine before and after reading intervention materials were assessed. Statistical analysis was conducted using analysis of variance with Tukey’s test or Games–Howell post hoc test, and analysis of covariance with Bonferroni correction.ResultsVaccination intentions after intervention in the three intervention conditions were higher than the control condition (p < 0.001. A mother’s narrative messages in addition to statistical messages increased HPV vaccination intention the most of all tested intervention conditions. A significant difference in the estimated means of intention with the covariate adjustment for baseline value (i.e., intention before intervention was found between a mother’s narrative messages in addition to statistical messages and statistical messages only (p = 0.040.DiscussionMothers’ narrative messages may be persuasive when targeting mothers for promoting HPV vaccination. This may be because mothers can easily relate to and identify with communications from other mothers. However, for effective HPV vaccine communication, further studies are needed to understand more about persuasive

  12. Contact conditions in skin-pass rolling

    DEFF Research Database (Denmark)

    Kijima, Hideo; Bay, Niels

    2007-01-01

    The special contact conditions in skin-pass rolling of steel strip is analysed by studying plane strain upsetting of thin sheet with low reduction applying long narrow tools and dry friction conditions. An extended sticking region is estimated by an elasto-plastic FEM analysis of the plane strain...... upsetting. This sticking region causes a highly inhomogeneous elasto-plastic deformation with large influence of work-hardening and friction. A numerical analysis of skin-pass rolling shows the same contact conditions, i.e. an extended sticking region around the center of the contact zone. The calculated...... size of the sticking region with varying contact length and pressure/reduction is experimentally verified by plane strain upsetting tests measuring the local surface deformation of the work pieces after unloading....

  13. Two-pass greedy regular expression parsing

    DEFF Research Database (Denmark)

    Grathwohl, Niels Bjørn Bugge; Henglein, Fritz; Nielsen, Lasse

    2013-01-01

    We present new algorithms for producing greedy parses for regular expressions (REs) in a semi-streaming fashion. Our lean-log algorithm executes in time O(mn) for REs of size m and input strings of size n and outputs a compact bit-coded parse tree representation. It improves on previous algorithms...... by: operating in only 2 passes; using only O(m) words of random-access memory (independent of n); requiring only kn bits of sequentially written and read log storage, where k ... and not requiring it to be stored at all. Previous RE parsing algorithms do not scale linearly with input size, or require substantially more log storage and employ 3 passes where the first consists of reversing the input, or do not or are not known to produce a greedy parse. The performance of our unoptimized C...

  14. Expectancy Theory in Media and Message Selection.

    Science.gov (United States)

    Van Leuven, Jim

    1981-01-01

    Argues for reversing emphasis on uses and gratifications research in favor of an expectancy model which holds that selection of a particular medium depends on (1) the expectation that the choice will be followed by a message of interest and (2) the importance of that message in satisfying user's values. (PD)

  15. Should We Ban Instant Messaging In School?

    Science.gov (United States)

    Texley, Sharon; DeGennaro, Donna

    2005-01-01

    This article is a brief debate on the pros and cons of allowing students to use instant messaging (IM) in school. On one hand, teenagers' desire to socialize can overcome other priorities and schools may set policies to ban instant messaging. The contrary view is that schools should embrace the IM technology being popularized by youth and find…

  16. 78 FR 64202 - Quantitative Messaging Research

    Science.gov (United States)

    2013-10-28

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast- track OMB approval... comments. Please submit your comments using only one method and identify that it is for the ``Quantitative...

  17. Undergraduates' Text Messaging Language and Literacy Skills

    Science.gov (United States)

    Grace, Abbie; Kemp, Nenagh; Martin, Frances Heritage; Parrila, Rauno

    2014-01-01

    Research investigating whether people's literacy skill is being affected by the use of text messaging language has produced largely positive results for children, but mixed results for adults. We asked 150 undergraduate university students in Western Canada and 86 in South Eastern Australia to supply naturalistic text messages and to complete…

  18. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  19. Messages about Sexuality: An Ecological Perspective

    Science.gov (United States)

    Boone, Tanya L.

    2015-01-01

    The goal of this two-part study was to identify the perceived influence of sexuality messages from parents, peers, school and the media--four microsystems within the Ecological Model--on emerging adult US college women's sexual attitudes. Findings suggest that parents were the most likely source of the message to "remain abstinent until…

  20. Suspecting Neurological Dysfunction From E Mail Messages ...

    African Journals Online (AJOL)

    A non medical person suspected and confirmed neurological dysfunction in an individual, based only on e mail messages sent by the individual. With email communication becoming rampant “peculiar” email messages may raise the suspicion of neurological dysfunction. Organic pathology explaining the abnormal email ...

  1. Single Pass Albumin Dialysis in Hepatorenal Syndrome

    Directory of Open Access Journals (Sweden)

    Rahman Ebadur

    2008-01-01

    Full Text Available Hepatorenal syndrome (HRS is the most appalling complication of acute or chronic liver disease with 90% mortality rate. Single pass albumin dialysis (SPAD can be considered as a noble liver support technique in HRS. Here, we present a case of a young healthy patient who developed hyperacute fulminant liver failure that progressed to HRS. The patient was offered SPAD as a bridge to liver transplantation, however, it resulted in an excellent recovery.

  2. Double-pass quantum volume hologram

    International Nuclear Information System (INIS)

    Vasilyev, Denis V.; Sokolov, Ivan V.

    2011-01-01

    We propose a scheme for parallel, spatially multimode quantum memory for light. The scheme is based on the propagation in different directions of a quantum signal wave and strong classical reference wave, like in a classical volume hologram and the previously proposed quantum volume hologram [D. V. Vasilyev et al., Phys. Rev. A 81, 020302(R) (2010)]. The medium for the hologram consists of a spatially extended ensemble of cold spin-polarized atoms. In the absence of the collective spin rotation during the interaction, two passes of light for both storage and retrieval are required, and therefore the present scheme can be called a double-pass quantum volume hologram. The scheme is less sensitive to diffraction and therefore is capable of achieving a higher density of storage of spatial modes as compared to the previously proposed thin quantum hologram [D. V. Vasilyev et al., Phys. Rev. A 77, 020302(R) (2008)], which also requires two passes of light for both storage and retrieval. However, the present scheme allows one to achieve a good memory performance with a lower optical depth of the atomic sample as compared to the quantum volume hologram. A quantum hologram capable of storing entangled images can become an important ingredient in quantum information processing and quantum imaging.

  3. The WLCG Messaging Service and its Future

    CERN Document Server

    Cons, Lionel

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures wil...

  4. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-04-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require and application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI 'C' and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  5. Factors influencing message dissemination through social media

    Science.gov (United States)

    Zheng, Zeyu; Yang, Huancheng; Fu, Yang; Fu, Dianzheng; Podobnik, Boris; Stanley, H. Eugene

    2018-06-01

    Online social networks strongly impact our daily lives. An internet user (a "Netizen") wants messages to be efficiently disseminated. The susceptible-infected-recovered (SIR) dissemination model is the traditional tool for exploring the spreading mechanism of information diffusion. We here test our SIR-based dissemination model on open and real-world data collected from Twitter. We locate and identify phase transitions in the message dissemination process. We find that message content is a stronger factor than the popularity of the sender. We also find that the probability that a message will be forwarded has a threshold that affects its ability to spread, and when the probability is above the threshold the message quickly achieves mass dissemination.

  6. Hand hygiene posters: selling the message.

    Science.gov (United States)

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-02-01

    This literature review was undertaken to determine the established theory and research that might be utilized to inform the construction of persuasive messages on hand hygiene posters. It discusses the principles of message framing and the use of fear appeals. Current theory suggests that the most effective messages for health promotion behaviours should be framed in terms of gains rather than losses for the individual. However, as clinical hand hygiene is largely for the benefit of others (i.e. patients), messages should also invoke a sense of personal responsibility and appeal to altruistic behaviour. The use of repeated minimal fear appeals have their place. Posters that simply convey training messages are not effective persuaders.

  7. Messages about appearance, food, weight and exercise in "tween" television.

    Science.gov (United States)

    Simpson, Courtney C; Kwitowski, Melissa; Boutte, Rachel; Gow, Rachel W; Mazzeo, Suzanne E

    2016-12-01

    Tweens (children ages ~8-14years) are a relatively recently defined age group, increasingly targeted by marketers. Individuals in this age group are particularly vulnerable to opinions and behaviors presented in media messages, given their level of cognitive and social development. However, little research has examined messages about appearance, food, weight, and exercise in television specifically targeting tweens, despite the popularity of this media type among this age group. This study used a content analytic approach to explore these messages in the five most popular television shows for tweens on the Disney Channel (as of 2015). Using a multiple-pass approach, relevant content in episodes from the most recently completed seasons of each show was coded. Appearance related incidents occurred in every episode; these most frequently mentioned attractiveness/beauty. Food related incidents were also present in every episode; typically, these situations were appearance and weight neutral. Exercise related incidents occurred in 53.3% of episodes; the majority expressed resistance to exercise. Weight related incidents occurred in 40.0% of the episodes; the majority praised the muscular ideal. Women were more likely to initiate appearance incidents, and men were more likely to initiate exercise incidents. These results suggest that programs specifically marketed to tweens reinforce appearance ideals, including stereotypes about female attractiveness and male athleticism, two constructs linked to eating pathology and body dissatisfaction. Given the developmental vulnerability of the target group, these findings are concerning, and highlight potential foci for prevention programming, including media literacy, for tweens. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Designing Anti-Binge Drinking Prevention Messages: Message Framing vs. Evidence Type.

    Science.gov (United States)

    Kang, Hannah; Lee, Moon J

    2017-09-27

    We investigated whether presenting anti-binge drinking health campaign messages in different message framing and evidence types influences college students' intention to avoid binge drinking, based on prospect theory (PT) and exemplification theory. A 2 (message framing: loss-framed message/gain-framed message) X 2 (evidence type: statistical/narrative) between-subjects factorial design with a control group was conducted with 156 college students. College students who were exposed to the loss-framed message condition exhibited a higher level of intention to avoid binge drinking in the near future than those who did not see any messages (the control group). This finding was mainly among non-binge drinkers. Regardless of evidence type, those who were exposed to the messages exhibited a higher level of intention to avoid binge drinking than those in the control group. This is also mainly among non-binge drinkers. We also found the main effects of message framing and evidence type on attitude toward the message and the main effect of message framing on attitude toward drinking.

  9. "Which pass is better?" Novel approaches to assess passing effectiveness in elite soccer.

    Science.gov (United States)

    Rein, Robert; Raabe, Dominik; Memmert, Daniel

    2017-10-01

    Passing behaviour is a key property of successful performance in team sports. Previous investigations however have mainly focused on notational measurements like total passing frequencies which provide little information about what actually constitutes successful passing behaviour. Consequently, this has hampered the transfer of research findings into applied settings. Here we present two novel approaches to assess passing effectiveness in elite soccer by evaluating their effects on majority situations and space control in front of the goal. Majority situations are assessed by calculating the number of defenders between the ball carrier and the goal. Control of space is estimated using Voronoi-diagrams based on the player's positions on the pitch. Both methods were applied to position data from 103 German First division games from the 2011/2012, 2012/2013 and 2014/2015 seasons using a big data approach. The results show that both measures are significantly related to successful game play with respect to the number of goals scored and to the probability of winning a game. The results further show that on average passes from the mid-field into the attacking area are most effective. The presented passing efficiency measures thereby offer new opportunities for future applications in soccer and other sports disciplines whilst maintaining practical relevance with respect to tactical training regimes or game performances analysis. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. Improving the Effectiveness of Fundraising Messages: The Impact of Charity Goal Attainment, Message Framing, and Evidence on Persuasion

    Science.gov (United States)

    Das, Enny; Kerkhof, Peter; Kuiper, Joyce

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a positive message frame. In addition, building on…

  11. Text messages as a learning tool for midwives | Woods | South ...

    African Journals Online (AJOL)

    The use of cell phone text messaging to improve access to continuing ... with 50 of the message recipients, demonstrated that the text messages were well received by ... services, such as the management of HIV-infected children and adults.

  12. Statistical mechanics of error-correcting codes

    Science.gov (United States)

    Kabashima, Y.; Saad, D.

    1999-01-01

    We investigate the performance of error-correcting codes, where the code word comprises products of K bits selected from the original message and decoding is carried out utilizing a connectivity tensor with C connections per index. Shannon's bound for the channel capacity is recovered for large K and zero temperature when the code rate K/C is finite. Close to optimal error-correcting capability is obtained for finite K and C. We examine the finite-temperature case to assess the use of simulated annealing for decoding and extend the analysis to accommodate other types of noisy channels.

  13. A Message Without a Code?

    Directory of Open Access Journals (Sweden)

    Tom Conley

    1981-01-01

    Full Text Available The photographic paradox is said to be that of a message without a code, a communication lacking a relay or gap essential to the process of communication. Tracing the recurrence of Barthes's definition in the essays included in Image/Music/Text and in La Chambre claire , this paper argues that Barthes's definition is platonic in its will to dematerialize the troubling — graphic — immediacy of the photograph. He writes of the image in order to flee its signature. As a function of media, his categories are written in order to be insufficient and inadequate; to maintain an ineluctable difference between language heard and letters seen; to protect an idiom of loss which the photograph disallows. The article studies the strategies of his definition in «The Photographic Paradox» as instrument of abstraction, opposes the notion of code, in an aural sense, to audio-visual markers of closed relay in advertising, and critiques the layout and order of La Chambre claire in respect to Barthes's ideology of absence.

  14. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  15. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  16. Pass-transistor asynchronous sequential circuits

    Science.gov (United States)

    Whitaker, Sterling R.; Maki, Gary K.

    1989-01-01

    Design methods for asynchronous sequential pass-transistor circuits, which result in circuits that are hazard- and critical-race-free and which have added degrees of freedom for the input signals, are discussed. The design procedures are straightforward and easy to implement. Two single-transition-time state assignment methods are presented, and hardware bounds for each are established. A surprising result is that the hardware realizations for each next state variable and output variable is identical for a given flow table. Thus, a state machine with N states and M outputs can be constructed using a single layout replicated N + M times.

  17. Evaluation of Sexual Communication Message Strategies

    Directory of Open Access Journals (Sweden)

    Khan Munziba

    2011-05-01

    Full Text Available Abstract Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  18. When message-frame fits salient cultural-frame, messages feel more persuasive.

    Science.gov (United States)

    Uskul, Ayse K; Oyserman, Daphna

    2010-03-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a message about health risks of caffeine consumption among individuals prescreened to be regular caffeine consumers. After being primed for individualism, European Americans who read a health message that focused on the personal self were more likely to accept the message-they found it more persuasive, believed they were more at risk and engaged in more message-congruent behaviour. These effects were also found among Asian Americans who were primed for collectivism and who read a health message that focused on relational obligations. The findings point to the importance of investigating the role of situational cues in persuasive effects of health messages and suggest that matching content to primed frame consistent with the chronic frame may be a way to know what to match messages to.

  19. Comment ameliorer la selection et le traitement des messages verbaux? (How to Improve the Selection and Processing of Verbal Messages)

    National Research Council Canada - National Science Library

    Rivenez, Marie; Darwin, Chris; Guillaume, Anne

    2005-01-01

    L'objectif de cette recherche est d'ameliorer la selection des messages verbaux. Nous cherchons a determiner les facteurs influencant le traitement d'un message verbal lorsque l'attention est portee sur un autre message...

  20. Fabrication of seamless calandria tubes by cold pilgering route using 3-pass and 2-pass schedules

    Science.gov (United States)

    Saibaba, N.

    2008-12-01

    Calandria tube is a large diameter, extremely thin walled zirconium alloy tube which has diameter to wall thickness ratio as high as 90-95. Such tubes are conventionally produced by the 'welded route', which involves extrusion of slabs followed by a series of hot and cold rolling passes, intermediate anneals, press forming of sheets into circular shape and closing the gap by TIG welding. Though pilgering is a well established process for the fabrication of seamless tubes, production of extremely thin walled tubes offers several challenges during pilgering. Nuclear fuel complex (NFC), Hyderabad, has successfully developed a process for the production of Zircaloy-4 calandria tubes by adopting the 'seamless route' which involves hot extrusion of mother blanks followed by three-pass pilgering or two-pass pilgering schedules. This paper deals with standardization of the seamless route processes for fabrication of calandria tubes, comparison between the tubes produced by 2-pass and 3-pass pilgering schedules, role of ultrasonic test charts for control of process parameters, development of new testing methods for burst testing and other properties.

  1. Fabrication of seamless calandria tubes by cold pilgering route using 3-pass and 2-pass schedules

    International Nuclear Information System (INIS)

    Saibaba, N.

    2008-01-01

    Calandria tube is a large diameter, extremely thin walled zirconium alloy tube which has diameter to wall thickness ratio as high as 90-95. Such tubes are conventionally produced by the 'welded route', which involves extrusion of slabs followed by a series of hot and cold rolling passes, intermediate anneals, press forming of sheets into circular shape and closing the gap by TIG welding. Though pilgering is a well established process for the fabrication of seamless tubes, production of extremely thin walled tubes offers several challenges during pilgering. Nuclear fuel complex (NFC), Hyderabad, has successfully developed a process for the production of Zircaloy-4 calandria tubes by adopting the 'seamless route' which involves hot extrusion of mother blanks followed by three-pass pilgering or two-pass pilgering schedules. This paper deals with standardization of the seamless route processes for fabrication of calandria tubes, comparison between the tubes produced by 2-pass and 3-pass pilgering schedules, role of ultrasonic test charts for control of process parameters, development of new testing methods for burst testing and other properties

  2. Common pass decentered annular ring resonator

    Energy Technology Data Exchange (ETDEWEB)

    Holmes, D. A.; Waite, T. R.

    1985-04-30

    An optical resonator having an annular cylindrical gain region for use in a chemical laser or the like in which two ring-shaped mirrors having substantially conical reflecting surfaces are spaced apart along a common axis of revolution of the respective conical surfaces. A central conical mirror reflects incident light directed along said axis radially outwardly to the reflecting surface of a first one of the ring-shaped mirrors. The radial light rays are reflected by the first ring mirror to the second ring mirror within an annular cylindrical volume concentric with said common axis and forming a gain region. Light rays impinging on the second ring mirror are reflected to diametrically opposite points on the same conical mirror surfaces and back to the first ring mirror through the same annular cylindrical volume. The return rays are then reflected by the conical mirror surface of the first ring mirror back to the central conical mirror. The mirror surfaces are angled such that the return rays are reflected back along the common axis by the central mirror in a concentric annular cylindrical volume. A scraper mirror having a central opening centered on said axis and an offset opening reflects all but the rays passing through the two openings in an output beam. The rays passing through the second opening are reflected back through the first opening to provide feedback.

  3. Comparison of cryogenic low-pass filters

    Science.gov (United States)

    Thalmann, M.; Pernau, H.-F.; Strunk, C.; Scheer, E.; Pietsch, T.

    2017-11-01

    Low-temperature electronic transport measurements with high energy resolution require both effective low-pass filtering of high-frequency input noise and an optimized thermalization of the electronic system of the experiment. In recent years, elaborate filter designs have been developed for cryogenic low-level measurements, driven by the growing interest in fundamental quantum-physical phenomena at energy scales corresponding to temperatures in the few millikelvin regime. However, a single filter concept is often insufficient to thermalize the electronic system to the cryogenic bath and eliminate spurious high frequency noise. Moreover, the available concepts often provide inadequate filtering to operate at temperatures below 10 mK, which are routinely available now in dilution cryogenic systems. Herein we provide a comprehensive analysis of commonly used filter types, introduce a novel compact filter type based on ferrite compounds optimized for the frequency range above 20 GHz, and develop an improved filtering scheme providing adaptable broad-band low-pass characteristic for cryogenic low-level and quantum measurement applications at temperatures down to few millikelvin.

  4. Comparison of cryogenic low-pass filters.

    Science.gov (United States)

    Thalmann, M; Pernau, H-F; Strunk, C; Scheer, E; Pietsch, T

    2017-11-01

    Low-temperature electronic transport measurements with high energy resolution require both effective low-pass filtering of high-frequency input noise and an optimized thermalization of the electronic system of the experiment. In recent years, elaborate filter designs have been developed for cryogenic low-level measurements, driven by the growing interest in fundamental quantum-physical phenomena at energy scales corresponding to temperatures in the few millikelvin regime. However, a single filter concept is often insufficient to thermalize the electronic system to the cryogenic bath and eliminate spurious high frequency noise. Moreover, the available concepts often provide inadequate filtering to operate at temperatures below 10 mK, which are routinely available now in dilution cryogenic systems. Herein we provide a comprehensive analysis of commonly used filter types, introduce a novel compact filter type based on ferrite compounds optimized for the frequency range above 20 GHz, and develop an improved filtering scheme providing adaptable broad-band low-pass characteristic for cryogenic low-level and quantum measurement applications at temperatures down to few millikelvin.

  5. An experimental evaluation of multi-pass solar air heaters

    Energy Technology Data Exchange (ETDEWEB)

    Satcunanathan, S.; Persad, P.

    1980-12-01

    Three collectors of identical dimensions but operating in the single-pass, two-pass and three-pass modes were tested simultaneously under ambient conditions. It was found that the two-pass air heater was consistently better than the single-pass air heater over the day for the range of mass flow rates considered. It was also found that at a mass flow rate of 0.0095 kg s/sup -1/ m/sup -2/, the thermal performances of the two-pass and three-pass collectors were identical, but at higher flow rates the two-pass collector was superior to the three-pass collector, the superiority decreasing with increasing mass flow rate.

  6. Anxiety, Construct Differentiation, and Message Production.

    Science.gov (United States)

    Shepherd, Gregory J.; Condra, Mollie B.

    1989-01-01

    Examines the nature of the construct differentiation/anxiety relationship in light of messages produced. Considers recent and complex conceptualizations of social-cognitive development and anxiety. Finds no significant relationship between state anxiety and construct differentiation. (MM)

  7. MORPHOLOGICAL STRATEGIES IN TEXT MESSAGING AMONG ...

    African Journals Online (AJOL)

    Text messaging is the application of abridged morphological forms in order ... the emergence of the Global System for Mobile Communication (GSM) in the world. ... Our thesis statement is that these morphological patterns as used in SMS are ...

  8. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  9. Photometric requirements for portable changeable message signs.

    Science.gov (United States)

    2001-09-01

    This project reviewed the performance of pchangeable message signs (PCMSs) and developed photometric standards to establish performance requirements. In addition, researchers developed photometric test methods and recommended them for use in evaluati...

  10. Wyoming CV Pilot Traveler Information Message Sample

    Data.gov (United States)

    Department of Transportation — This dataset contains a sample of the sanitized Traveler Information Messages (TIM) being generated by the Wyoming Connected Vehicle (CV) Pilot. The full set of TIMs...

  11. Getting the message across: age differences in the positive and negative framing of health care messages.

    Science.gov (United States)

    Shamaskin, Andrea M; Mikels, Joseph A; Reed, Andrew E

    2010-09-01

    Although valenced health care messages influence impressions, memory, and behavior (Levin, Schneider, & Gaeth, 1998) and the processing of valenced information changes with age (Carstensen & Mikels, 2005), these 2 lines of research have thus far been disconnected. This study examined impressions of, and memory for, positively and negatively framed health care messages that were presented in pamphlets to 25 older adults and 24 younger adults. Older adults relative to younger adults rated positive pamphlets more informative than negative pamphlets and remembered a higher proportion of positive to negative messages. However, older adults misremembered negative messages to be positive. These findings demonstrate the age-related positivity effect in health care messages with promise as to the persuasive nature and lingering effects of positive messages. (c) 2010 APA, all rights reserved.

  12. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  13. A second pass correction method for calcification artifacts in digital breast tomosynthesis

    NARCIS (Netherlands)

    Erhard, K.; Grass, M.; Nielsen, T.

    2011-01-01

    Digital breast tomosynthesis (DBT) aims for improving the diagnosis of breast cancer and reducing the false positive rates by going from 2D projection mammography to 3D volume information. With the acquisition of a series of projection images, taken over a limited angular range, DBT allows for

  14. Message-driven factors influencing opening and forwarding of mobile advertising messages

    OpenAIRE

    Sanz Blas, Silvia; Ruiz Mafé, Carla; Martí Parreño, José

    2015-01-01

    This work aims to analyse the influence of message-driven factors -informativeness, ubiquity, frequency and personalization- on consumer attitude and behaviour -opening and forwarding- towards mobile advertising messages. A theoretical model was developed and empirically tested using a sample of 355 Spanish teenager mobile users. Findings show that frequency is the dimension accounting the most -and significantly- of the four message-driven factors analysed on attitude toward mobile advertisi...

  15. When message-frame fits salient cultural-frame, messages feel more persuasive

    OpenAIRE

    Uskul, Ayse K.; Oyserman, Daphna

    2010-01-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a me...

  16. Persuasive messages. Development of persuasive messages may help increase mothers' compliance of their children's immunization schedule.

    Science.gov (United States)

    Gore, P; Madhavan, S; Curry, D; McClurg, G; Castiglia, M; Rosenbluth, S A; Smego, R A

    1998-01-01

    Effective immunization campaigns can be designed by determining which persuasion strategy is most effective in attracting the attention of mothers of preschoolers. The authors assess the impact of three persuasional strategies: fear-arousal, motherhood-arousal, and rational messages, on mothers of preschoolers who are late for their immunizations. The fear-arousal message was found to be most effective, followed by the motherhood-arousal, and then the rational message, in attracting mothers' attention to their child's immunization status.

  17. Improving Type Error Messages in OCaml

    Directory of Open Access Journals (Sweden)

    Arthur Charguéraud

    2015-12-01

    Full Text Available Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise and systematically useful to the programmer, but also to handle a full-blown programming language and to cope with large-sized programs efficiently. In this work, we present a modification to the traditional ML type inference algorithm implemented in OCaml that, by significantly reducing the left-to-right bias, allows us to report error messages that are more helpful to the programmer. Our algorithm remains fully predictable and continues to produce fairly concise error messages that always help making some progress towards fixing the code. We implemented our approach as a patch to the OCaml compiler in just a few hundred lines of code. We believe that this patch should benefit not just to beginners, but also to experienced programs developing large-scale OCaml programs.

  18. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  19. Gender messages in contemporary popular Malay songs

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2013-07-01

    Full Text Available Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992 method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. The results showed that the messages revolve mainly around socially constructed gender roles and expectations in romantic relationships. Gender stereotypes are also used in the songs to reinforce men’s and women’s roles in romantic relationships. The results also showed that, while listeners acknowledge the songs’ messages about gender, their own perceptions of gender and what it means to be a gendered being in today’s world are neither represented nor discussed fully in the songs analysed. It is hoped the findings from this, particularly the mismatch between projected and perceived notions of gender, contribute to the field of popular Malay music studies in particular, and popular music studies in general where gender messages in popular songs and their influence on listeners’ perceptions of their own gender is concerned.

  20. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  1. Gallager error-correcting codes for binary asymmetric channels

    International Nuclear Information System (INIS)

    Neri, I; Skantzos, N S; Bollé, D

    2008-01-01

    We derive critical noise levels for Gallager codes on asymmetric channels as a function of the input bias and the temperature. Using a statistical mechanics approach we study the space of codewords and the entropy in the various decoding regimes. We further discuss the relation of the convergence of the message passing algorithm with the endogenous property and complexity, characterizing solutions of recursive equations of distributions for cavity fields

  2. An Approach to Ad-hoc Messaging Networks Using Time Shifted Propagation

    Directory of Open Access Journals (Sweden)

    Christoph Fuchß

    2007-10-01

    Full Text Available Many communication devices, like mobile phones and PDAs, are enabled for near field communication by using Bluetooth. Many approaches dealt so far with the attempt to transfer mobile ad-hoc networks (MANET to the mechanism of the “fixed internet” to mobile networks. In order to achieve liability and robustness of common TCP connections routing algorithm in near field communication based networks become more sophisticated and complex. These mechanisms often do not reflect on the application’s particularities.Our approach of an ad-hoc messaging network (AMNET uses simple store-and-forward message passing to spread data asynchronously. We do not aim at the reliability of common internet networks but focus on application specific needs that can be covered by simple message passing mechanism. In this paper we will portray a powerful network by using simple devices and communication protocols on the basis of AMNETs. Simulation results of our AMNET approach provide insights towards speeding up the network setup process and to enable the use of AMNETs even with few participants by introducing a hybrid structure of infrastructure and mobile nodes.

  3. The Pension Fund passes important milestones

    CERN Document Server

    2012-01-01

    In this column, the Chairman of the Pension Fund Governing Board (PFGB) presents the Board's latest main decisions, initiatives and accomplishments to the Fund's members and beneficiaries.   Since my last report in October, the PFGB has passed several milestones in actuarial, technical and investment matters. The PFGB has completed an analysis of a request by the European Organisation for Astronomical Research in the Southern Hemisphere (ESO) to reduce the increased cost of pension insurance for new ESO recruits that has been caused by the increased CHF/€ exchange ratio. Currently the staff of ESO are admitted to the CERN Pension Fund, pursuant to a co-operation agreement between CERN and ESO dating back to 1968. This analysis assessed the actuarial, financial, administrative and legal implications, and is scheduled to be presented to the CERN Council and the Finance Committee in December. After an open tendering process the PFGB has selected Buck Consultants Limited...

  4. The baton passes to the LHC

    CERN Multimedia

    CERN Bulletin

    2011-01-01

    Held in the picturesque mountain setting of La Thuile in the Italian Alps, the international conference “Rencontres de Moriond” showed how the baton of discovery in the field of high-energy physics is definitely passing to the LHC experiments. In the well-known spirit of Moriond, the conference was an important platform for young students to present their latest results. The Higgs boson might well be within reach this year and the jet-quenching phenomenon might reveal new things soon…   New physics discussed over the Italian Alps during the "Les rencontres de Moriond" conference.  (Photographer: Paul Gerritsen. Adapted by Katarina Anthony) Known by physicists as one of the most important winter conferences, “Les rencontres de Moriond” are actually a series of conferences spread over two weeks covering the main themes of electroweak interactions, QCD and high-energy interactions, cosmology, gravitation, astropar...

  5. Comparing tailored and untailored text messages for smoking cessation

    DEFF Research Database (Denmark)

    Skov-Ettrup, L S; Ringgaard, L W; Dalum, P

    2014-01-01

    The aim was to compare the effectiveness of untailored text messages for smoking cessation to tailored text messages delivered at a higher frequency. From February 2007 to August 2009, 2030 users of an internet-based smoking cessation program with optional text message support aged 15-25 years were...... of text messages increases quit rates among young smokers....

  6. Art messaging to engage homeless young adults.

    Science.gov (United States)

    Nyamathi, Adeline; Slagle, Alexandra; Thomas, Alexandra; Hudson, Angela; Kahilifard, Farinaz; Avila, Glenna; Orser, Julie; Cuchilla, Manuel

    2011-01-01

    Art has been shown to be an empowering and engaging entity with numerous benefits to vulnerable populations, including the homeless persons and young adults. However, little is known how homeless young adults perceive the use of art as messages that can communicate the danger of initiating or continuing drug and alcohol use. The purpose of this study was to solicit perspectives of homeless, drug-using young adults as to how art can be used to design messages for their peers about the danger of initiating or continuing drug and alcohol use. Qualitative methodology via focus group discussions was utilized to engage 24 homeless young adults enrolled from a drop-in site in Santa Monica, California. The findings revealed support for a myriad of delivery styles, including in-person communication, flyers, music, documentary film, and creative writing. The young adults also provided insight into the importance of the thematic framework of messages. Such themes ranged from empowering and hopeful messages to those designed to scare young homeless adults into not experimenting with drugs. The findings indicate that in addition to messages communicating the need to prevent or reduce drug and alcohol use, homeless young adults respond to messages that remind them of goals and dreams they once had for their future, and to content that is personal, real, and truthful. Our research indicates that messages that reinforce protective factors such as hope for the future and self-esteem may be as important to homeless young adults as information about the risks and consequences of drug use.

  7. 36 CFR 13.918 - Sable Pass Wildlife Viewing Area.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Sable Pass Wildlife Viewing... Preserve General Provisions § 13.918 Sable Pass Wildlife Viewing Area. (a) Entry into the Sable Pass Wildlife Viewing Area is prohibited from May 1 to September 30 unless authorized by the Superintendent. (b...

  8. PASS Student Leader and Mentor Roles: A Tertiary Leadership Pathway

    Science.gov (United States)

    Skalicky, Jane; Caney, Annaliese

    2010-01-01

    In relation to developing leadership skills during tertiary studies, this paper considers the leadership pathway afforded by a Peer Assisted Study Sessions (PASS) program which includes the traditional PASS Leader role and a more senior PASS Mentor role. Data was collected using a structured survey with open-ended questions designed to capture the…

  9. A Prototype of Tropospheric Delay Correction in L1-SAIF Augmentation

    Science.gov (United States)

    Takeichi, Noboru; Sakai, Takeyasu; Fukushima, Sounosuke; Ito, Ken

    L1-SAIF signal is one of the navigation signals of Quasi-Zenith Satellite System, which provides an augmentation function for mobile users in Japan. This paper presents the detail of the tropospheric delay correction in L1-SAIF augmentation. The tropospheric delay correction information is generated at the ground station using the data collected at GEONET (GPS Earth Observation NETwork) stations. The correction message contains the information of the zenith tropospheric delay (ZTD) values at 105 Tropospheric Grid Points (TGP) in the experiment area. From this message a mobile user can acquire the ZTD value at some neighboring TGPs, and estimate the local ZTD value accurately by using a suitable ZTD model function. Only 3 L1-SAIF messages are necessary to provide all of the tropospheric correction information. Several investigations using the actual data observed at many GEONET stations overall Japan have proved that it is possible to achieve the correction accuracy of 13.2mm (rms).

  10. Astor Pass Seismic Surveys Preliminary Report

    Energy Technology Data Exchange (ETDEWEB)

    Louie, John [UNR; Pullammanappallil, Satish [Optim; Faulds, James; Eisses, Amy; Kell, Annie; Frary, Roxanna; Kent, Graham

    2011-08-05

    In collaboration with the Pyramid Lake Paiute Tribe (PLPT), the University of Nevada, Reno (UNR) and Optim re-processed, or collected and processed, over 24 miles of 2d seismic-reflection data near the northwest corner of Pyramid Lake, Nevada. The network of 2d land surveys achieved a near-3d density at the Astor Pass geothermal prospect that the PLPT drilled during Nov. 2010 to Feb. 2011. The Bureau of Indian Affairs funded additional seismic work around the Lake, and an extensive, detailed single-channel marine survey producing more than 300 miles of section, imaging more than 120 ft below the Lake bottom. Optim’s land data collection utilized multiple heavy vibrators and recorded over 200 channels live, providing a state-of-the-art reflection-refraction data set. After advanced seismic analysis including first-arrival velocity optimization and prestack depth migration, the 2d sections show clear fault-plane reflections, in some areas as deep as 4000 ft, tying to distinct terminations of the mostly volcanic stratigraphy. Some lines achieved velocity control to 3000 ft depth; all lines show reflections and terminations to 5000 ft depth. Three separate sets of normal faults appear in an initial interpretation of fault reflections and stratigraphic terminations, after loading the data into the OpendTect 3d seismic visualization system. Each preliminary fault set includes a continuous trace more than 3000 ft long, and a swarm of short fault strands. The three preliminary normal-fault sets strike northerly with westward dip, northwesterly with northeast dip, and easterly with north dip. An intersection of all three fault systems documented in the seismic sections at the end of Phase I helped to locate the APS-2 and APS-3 slimholes. The seismic sections do not show the faults connected to the Astor Pass tufa spire, suggesting that we have imaged mostly Tertiary-aged faults. We hypothesize that the Recent, active faults that produced the tufa through hotspring

  11. Comic books carry health messages to rural children in Honduras.

    Science.gov (United States)

    Vigano, O

    1983-12-01

    This article reports on the use of children as message carriers in a rural water and sanitation project in western Honduras. The Honduran Water and Sanitation Project represents the 1st such effort to have a specific health education component. It was decided to direct the education component toward children because of their important role in providing and handling drinking water and caring for younger members of the family. Rural primary schools surfaced as a potential channel of communication. The comic book format was selected because it is simple enough to be used in the schools without much training, economical to produce (US$0.30/copy), effective and attractive to children, and consistent with the Project's philosophy that dialogue and participation are essential components of health education. Each comic book contains a single-concept message, e.g., 1 cause of water contamination or a method of water purification. The 1st module was pretested in 3 rural schools. Following classroom study of the comic book, correct answers on 5 questions related to the comic book story increased from 59% to 80%. 95% of the children indicated that they liked the characters, and teachers expressed satisfaction with the materials. 1200 copies of the 1st module have been distributed to 30 rural schools, and production plans include 11 additional modules on topics such as prevention of water-related sickness and personal hygiene.

  12. The ICRP message;Le message de la CIPR

    Energy Technology Data Exchange (ETDEWEB)

    Ortiz Lopez, P. [Groupe de travail de la CIPR sur la prevention des expositions accidentelles liees a l' utilisation des nouvelles technologies de Radiotherapie par Faisceau Externe, Madrid (Spain)

    2009-12-15

    The ICRP gives its recommendations in the case of use of new technologies in radiotherapy: lessons learned from conventional technologies and also applicable to the new ones. Training, and specialization of the personnel as well as the need in personnel must be evaluated again. Managers of a radiotherapy service should bear in mind that the work environment must focus on concentration and avoid the risk of inattention. Manufacturers, for their part must provide reliable equipment with correct calibration files and documentation. the acquisition and implementation programs must focus not only on devices for treatment but also on treatment planning systems, computer systems and imaging devices used in radiation therapy, software, procedures and whole clinical process. The devices and procedures need to be re-classified after any changes to hardware, including upgrades and updates of software. The dosimetry protocols must be developed specially for the low doses irradiations and non standard irradiations. To increase the dose without increasing a probability of complication in sane tissues it is necessary to use a conformal therapy with a positioning of the patient. Communication is essential, especially concerning the activities of maintenance and repair that must ne notified to the physicists. In the same way, procedures of failures management in the computer systems must be implemented in order to avoid a loss of data susceptible to lead to serious accidental irradiations. The return of experience can be an help and then must be integrated in personnel training that is encouraged to share the experience in matter of incidents by providing information in a data base such the R.O.S.I.S. data base (radiation oncology safety information system). Before introducing new technologies it is recommended to realize probabilistic safety evaluations in order to develop quality assurance programmes integrating risk factors as, by example the analysis of failure modes and

  13. Emotional flow in persuasive health messages.

    Science.gov (United States)

    Nabi, Robin L

    2015-01-01

    Overwhelmingly, the literature on the persuasive influence of emotions has focused on individual emotions, fear in particular, though some recent attention has been given to mixed emotions in persuasive appeals. Building on this newer wave of research, this article argues that instead of focusing on singular emotional states or collections of emotions evoked by a message, it might prove valuable to explore the flow, or evolution, of emotional experience over the course of exposure to a health message. The article offers a brief introduction to the concept of emotion, followed by a review of the state of the literature on the use of emotion in health messages. The concept of emotional flow is then introduced along with a consideration of how it has been tacitly incorporated into the study of emotional health messages. Finally, the utility of the concept of emotional flow is elaborated by articulating the ways in which it might be harnessed to facilitate the creation of more effective health messages, individually as well as across campaigns. The article concludes with an agenda for future research.

  14. Effects of Electronic Word - of - Mouth Messages

    Directory of Open Access Journals (Sweden)

    Choong Hoon Lim

    2012-01-01

    Full Text Available With the increased usage of online technologies, there has been an escalation of Electronic Word - of –Mouth (eWOM messages related to sport products and services offered and consumed. Therefore, in this original investigation by applying eWOM to the sport industry, this study examined how the combination of the quality of the eWOM message and the provider of the eWOM message affects purchaseintentions depending on the expertise level of the consumer. This study – which involved the collection of data from 134 students at a large university situated in the Midwest of the United States – utilized repeated measures of Analysis of Variance (ANOVA with tripartite groups of expertise and experimental conditions as independent variables. Purchase intention was the dependent variables. The results indicated that the quality of the eWOM message moderated the effect of the provider of the eWOM message. The subject’s level of expertise also had a moderating role on purchase intention.

  15. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-01-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require an application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI open-quote C close-quote and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  16. Supervising simulations with the Prodiguer Messaging Platform

    Science.gov (United States)

    Greenslade, Mark; Carenton, Nicolas; Denvil, Sebastien

    2015-04-01

    At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of High Performance Computing (HPC) environments spread throughout France. The IPSL's simulation execution runtime is called libIGCM (library for IPSL Global Climate Modeling group). libIGCM has recently been enhanced so as to support realtime operational use cases. Such use cases include simulation monitoring, data publication, environment metrics collection, automated simulation control … etc. At the core of this enhancement is the Prodiguer messaging platform. libIGCM now emits information, in the form of messages, for remote processing at IPSL servers in Paris. The remote message processing takes several forms, for example: 1. Persisting message content to database(s); 2. Notifying an operator of changes in a simulation's execution status; 3. Launching rollback jobs upon simulation failure; 4. Dynamically updating controlled vocabularies; 5. Notifying downstream applications such as the Prodiguer web portal; We will describe how the messaging platform has been implemented from a technical perspective and demonstrate the Prodiguer web portal receiving realtime notifications.

  17. Positive messaging promotes walking in older adults.

    Science.gov (United States)

    Notthoff, Nanna; Carstensen, Laura L

    2014-06-01

    Walking is among the most cost-effective and accessible means of exercise. Mounting evidence suggests that walking may help to maintain physical and cognitive independence in old age by preventing a variety of health problems. However, older Americans fall far short of meeting the daily recommendations for walking. In 2 studies, we examined whether considering older adults' preferential attention to positive information may effectively enhance interventions aimed at promoting walking. In Study 1, we compared the effectiveness of positive, negative, and neutral messages to encourage walking (as measured with pedometers). Older adults who were informed about the benefits of walking walked more than those who were informed about the negative consequences of failing to walk, whereas younger adults were unaffected by framing valence. In Study 2, we examined within-person change in walking in older adults in response to positively- or negatively-framed messages over a 28-day period. Once again, positively-framed messages more effectively promoted walking than negatively-framed messages, and the effect was sustained across the intervention period. Together, these studies suggest that consideration of age-related changes in preferences for positive and negative information may inform the design of effective interventions to promote healthy lifestyles. Future research is needed to examine the mechanisms underlying the greater effectiveness of positively- as opposed to negatively-framed messages and the generalizability of findings to other intervention targets and other subpopulations of older adults. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  18. Passing the NBCOT Examination: Preadmission, Academic, and Fieldwork Factors

    Directory of Open Access Journals (Sweden)

    Sharon D. Novalis

    2017-10-01

    Full Text Available All occupational therapy students are required to successfully complete the certification examination administered by the National Board for Certification in Occupational Therapy (NBCOT before they can practice independently. The need to repeat the examination can result in stress, anxiety, and financial hardship. This paper explores the relationship of preadmission factors, academic and fieldwork performance, and demographic variables to successful first-time attempts on the certification examination for occupational therapists. Data were gathered from 144 student files in a Master of Occupational Therapy (MOT Program at a single university. Of the sample, 82% passed and 18% failed their first NBCOT test trial. Considered independently, preadmission recommendation letters and writing sample scores, graduate MOT program GPA, lack of MOT program difficulty, fieldwork self-reports, and gender predicted NBCOT certification examination outcomes. When considered together in logistic regression models predicting outcome, this combination of factors correctly predicted 86.2% of student outcomes (or 20% to 32% of the variance in certification examination success, with OT program GPA and preadmission recommendation scores predicting unique outcome variance. This information may be helpful to admissions committees as well as to occupational therapy faculty as they identify strategies and practices to facilitate first-time test taking success on the NBCOT certification examination

  19. The message development tool: a case for effective operationalization of messaging in social marketing practice.

    Science.gov (United States)

    Mattson, Marifran; Basu, Ambar

    2010-07-01

    That messages are essential, if not the most critical component of any communicative process, seems like an obvious claim. More so when the communication is about health--one of the most vital and elemental of human experiences (Babrow & Mattson, 2003). Any communication campaign that aims to change a target audience's health behaviors needs to centralize messages. Even though messaging strategies are an essential component of social marketing and are a widely used campaign model, health campaigns based on this framework have not always been able to effectively operationalize this key component, leading to cases where initiating and sustaining prescribed health behavior has been difficult (MacStravic, 2000). Based on an examination of the VERB campaign and an Australian breastfeeding promotion campaign, we propose a message development tool within the ambit of the social marketing framework that aims to extend the framework and ensure that the messaging component of the model is contextualized at the core of planning, implementation, and evaluation efforts.

  20. Analysis of Biomechanical Structure and Passing Techniques in Basketball

    OpenAIRE

    Ricardo E. Izzo; Luca Russo

    2011-01-01

    The basketball is a complex sport, which these days has become increasingly linked to its’ psychophysical aspects rather than to the technical ones. Therefore, it is important to make a through study of the passing techniques from the point of view of the type of the pass and its’ biomechanics. From the point of view of the type of the used passes, the most used is the two-handed chest pass with a frequency of 39.9%. This is followed, in terms of frequency, by one-handed passes – the baseball...

  1. Nanomechanical characterization by double-pass force-distance mapping

    Energy Technology Data Exchange (ETDEWEB)

    Dagdas, Yavuz S; Tekinay, Ayse B; Guler, Mustafa O; Dana, Aykutlu [UNAM Institute of Materials Science and Nanotechnology, Bilkent University, 06800 Ankara (Turkey); Necip Aslan, M, E-mail: aykutlu@unam.bilkent.edu.tr [Department of Physics, Istanbul Technical University, Istanbul (Turkey)

    2011-07-22

    We demonstrate high speed force-distance mapping using a double-pass scheme. The topography is measured in tapping mode in the first pass and this information is used in the second pass to move the tip over the sample. In the second pass, the cantilever dither signal is turned off and the sample is vibrated. Rapid (few kHz frequency) force-distance curves can be recorded with small peak interaction force, and can be processed into an image. Such a double-pass measurement eliminates the need for feedback during force-distance measurements. The method is demonstrated on self-assembled peptidic nanofibers.

  2. Nanomechanical characterization by double-pass force-distance mapping

    International Nuclear Information System (INIS)

    Dagdas, Yavuz S; Tekinay, Ayse B; Guler, Mustafa O; Dana, Aykutlu; Necip Aslan, M

    2011-01-01

    We demonstrate high speed force-distance mapping using a double-pass scheme. The topography is measured in tapping mode in the first pass and this information is used in the second pass to move the tip over the sample. In the second pass, the cantilever dither signal is turned off and the sample is vibrated. Rapid (few kHz frequency) force-distance curves can be recorded with small peak interaction force, and can be processed into an image. Such a double-pass measurement eliminates the need for feedback during force-distance measurements. The method is demonstrated on self-assembled peptidic nanofibers.

  3. Anon-Pass: Practical Anonymous Subscriptions.

    Science.gov (United States)

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  4. Distributed Programming via Safe Closure Passing

    Directory of Open Access Journals (Sweden)

    Philipp Haller

    2016-02-01

    Full Text Available Programming systems incorporating aspects of functional programming, e.g., higher-order functions, are becoming increasingly popular for large-scale distributed programming. New frameworks such as Apache Spark leverage functional techniques to provide high-level, declarative APIs for in-memory data analytics, often outperforming traditional "big data" frameworks like Hadoop MapReduce. However, widely-used programming models remain rather ad-hoc; aspects such as implementation trade-offs, static typing, and semantics are not yet well-understood. We present a new asynchronous programming model that has at its core several principles facilitating functional processing of distributed data. The emphasis of our model is on simplicity, performance, and expressiveness. The primary means of communication is by passing functions (closures to distributed, immutable data. To ensure safe and efficient distribution of closures, our model leverages both syntactic and type-based restrictions. We report on a prototype implementation in Scala. Finally, we present preliminary experimental results evaluating the performance impact of a static, type-based optimization of serialization.

  5. How My Program Passed the Turing Test

    Science.gov (United States)

    Humphrys, Mark

    In 1989, the author put an ELIZA-like chatbot on the Internet. The conversations this program had can be seen - depending on how one defines the rules (and how seriously one takes the idea of the test itself) - as a passing of the Turing Test. This is the first time this event has been properly written. This chatbot succeeded due to profanity, relentless aggression, prurient queries about the user, and implying that they were a liar when they responded. The element of surprise was also crucial. Most chatbots exist in an environment where people expectto find some bots among the humans. Not this one. What was also novel was the onlineelement. This was certainly one of the first AI programs online. It seems to have been the first (a) AI real-time chat program, which (b) had the element of surprise, and (c) was on the Internet. We conclude with some speculation that the future of all of AI is on the Internet, and a description of the "World- Wide-Mind" project that aims to bring this about.

  6. Are Dual-Method Messages Undermining STI/HIV Prevention?

    Directory of Open Access Journals (Sweden)

    Ann O'Leary

    2011-01-01

    Full Text Available Adolescent girls and young women who are at risk for unplanned pregnancy and sexually transmitted infection (STI, including HIV, are frequently counseled to use a hormonal contraceptive to protect against the former and condoms to protect against the latter, for exampe, American College of Obstetricians and Gynecologists, 2011. The present paper reviews the literature on multiple risk messages, compliance with this dual-use recommendation, predictors of dual use, and interventions developed to encourage dual use. Data indicate that simultaneous use of these two methods is not common, and that efforts to encourage dual use have not yielded promising results. An alternative is to recommend condom use alone, since condoms protect very well against STI and HIV, and quite well against pregnancy when used consistently and correctly. The availability of emergency contraception is relevant here. Research utilizing a randomized controlled trial is recommended.

  7. Notes on basis band-pass circuits; Notes sur les circuits de base passe-bande

    Energy Technology Data Exchange (ETDEWEB)

    Ailloud, J [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1959-07-01

    Resistor load amplifier stages, basic band-pass RC networks, conventional single-tuned circuits, have the same transfer function. Common properties and differences because diverse magnitude of parameters with proposed problems are exposed. Next the case of several cascaded stages (or networks) is examined when there is no reaction ones to another. (author) [French] Les etages amplificateurs a resistances, les circuits passe-bande RC elementaires, le circuit resonnant classique possedent la meme fonction de transfert. On fait ressortir les proprietes communes et les differences de comportement dues aux ordres de grandeur qu'il est possible de donner aux parametres en fonction des problemes a resoudre. On examine ensuite le cas de plusieurs etages (ou de plusieurs circuits) en cascade lorsqu'ils ne reagissent pas les uns sur les autres. (auteur)

  8. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  9. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... and Craniofacial Surgery Cleft Lip/Palate and Craniofacial Surgery A cleft lip may require one or more ... find out more. Corrective Jaw Surgery Corrective Jaw Surgery Orthognathic surgery is performed to correct the misalignment ...

  10. EDITORIAL: Message from the Editor Message from the Editor

    Science.gov (United States)

    Thomas, Paul

    2010-02-01

    passing away of the following former members of the Board of Editors: Ravindra Sudan (1975 to 1984), Joe Di Marco (1984 to 1991) and Roy Bickerton (1975 to 1986). The Nuclear Fusion Office and IOP Publishing Just as the journal depends on the authors and referees, so its success is also due to the tireless and largely unsung efforts of the Nuclear Fusion Office in Vienna and IOP Publishing in Bristol. I would like to express my personal thanks to Maria Bergamini-Roedler, Katja Haslinger, Sophy Le Masurier, Yasmin McGlashan, Caroline Wilkinson, Sarah Ryder, Rachael Kriefman and Katie Gerrard for the support that they have given to me, the authors and the referees. Season's Greetings The January special edition delayed this editorial for a month. Nevertheless, I would like belatedly to wish our readers, authors, referees and Board of Editors the season's greetings and thank them for their contributions to Nuclear Fusion in 2009.

  11. Portsmouth Atmospheric Science School (PASS) Project

    Science.gov (United States)

    Coleman, Clarence D.; Hathaway, Roger (Technical Monitor)

    2002-01-01

    The Portsmouth Atmospheric Science School Project (PASS) Project was granted a one-year no cost extension for 2001-2002. In year three of the project, objectives and strategies were modified based on the previous year-end evaluation. The recommendations were incorporated and the program was replicated within most of the remaining elementary schools in Portsmouth, Virginia and continued in the four middle schools. The Portsmouth Atmospheric Science School Project is a partnership, which includes Norfolk State University, Cooperating Hampton Roads Organizations for Minorities in Engineering (CHROME), NASA Langley Research Center, and the City of Portsmouth, Virginia Public Schools. The project seeks to strengthen the knowledge of Portsmouth Public Schools students in the field of atmospheric sciences and enhance teacher awareness of hands on activities in the atmospheric sciences. The project specifically seeks to: 1) increase the interest and participation of elementary and middle school students in science and mathematics; 2) strengthen existing science programs; and 3) facilitate greater achievement in core subjects, which are necessary for math, science, and technical careers. Emphasis was placed on providing training activities, materials and resources for elementary students (grades 3 - 5) and middle school students (grades 6 - 8), and teachers through a CHROME club structure. The first year of the project focused on introducing elementary students to concepts and activities in atmospheric science. Year two of the project built on the first year's activities and utilizes advanced topics and activities appropriate for middle school students. During the third year of the project, in addition to the approaches used in years one and two, emphasis was placed on activities that enhanced the Virginia Standards of Learning (SOL).

  12. Hashtag (# as Message Identity in Virtual Community

    Directory of Open Access Journals (Sweden)

    Urip Mulyadi

    2018-02-01

    Full Text Available Computer Mediated Communication or CMC is able to present a virtual community, where the people inside have the same interest to share information related to events, activities, competitions, entertainment, history, event and others in Semarang City for publication. This research attempted to describe that hashtags can be utilized as the identity of a message in a communications network on Facebook Group MIK Semar. The results of this study are hashtags have changed how we build a virtual community, as the use of hashtags in Facebook Group MIK SEMAR as message identity to build better relationship and support communication among its members.

  13. Nuclear fuel cycle modelling using MESSAGE

    International Nuclear Information System (INIS)

    Guiying Zhang; Dongsheng Niu; Guoliang Xu; Hui Zhang; Jue Li; Lei Cao; Zeqin Guo; Zhichao Wang; Yutong Qiu; Yanming Shi; Gaoliang Li

    2017-01-01

    In order to demonstrate the possibilities of application of MESSAGE tool for the modelling of a Nuclear Energy System at the national level, one of the possible open nuclear fuel cycle options based on thermal reactors has been modelled using MESSAGE. The steps of the front-end and back-end of nuclear fuel cycle and nuclear reactor operation are described. The optimal structure for Nuclear Power Development and optimal schedule for introducing various reactor technologies and fuel cycle options; infrastructure facilities, nuclear material flows and waste, investments and other costs are demonstrated. (author)

  14. Upon a Message-Oriented Trading API

    Directory of Open Access Journals (Sweden)

    Claudiu VINTE

    2010-01-01

    Full Text Available In this paper, we introduce the premises for a trading system application-programming interface (API based on a message-oriented middleware (MOM, and present the results of our research regarding the design and the implementation of a simulation-trading system employing a service-oriented architecture (SOA and messaging. Our research has been conducted with the aim of creating a simulation-trading platform, within the academic environment, that will provide both the foundation for future experiments with trading systems architectures, components, APIs, and the framework for research on trading strategies, trading algorithm design, and equity markets analysis tools. Mathematics Subject Classification: 68M14 (distributed systems.

  15. Developing effective messages about potable recycled water: The importance of message structure and content

    Science.gov (United States)

    Price, J.; Fielding, K. S.; Gardner, J.; Leviston, Z.; Green, M.

    2015-04-01

    Community opposition is a barrier to potable recycled water schemes. Effective communication strategies about such schemes are needed. Drawing on social psychological literature, two experimental studies are presented, which explore messages that improve public perceptions of potable recycled water. The Elaboration-Likelihood Model of information processing and attitude change is tested and supported. Study 1 (N = 415) premeasured support for recycled water, and trust in government information at Time 1. Messages varied in complexity and sidedness were presented at Time 2 (3 weeks later), and support and trust were remeasured. Support increased after receiving information, provided that participants received complex rather than simple information. Trust in government was also higher after receiving information. There was tentative evidence of this in response to two-sided messages rather than one-sided messages. Initial attitudes to recycled water moderated responses to information. Those initially neutral or ambivalent responded differently to simple and one-sided messages, compared to participants with positive or negative attitudes. Study 2 (N = 957) tested the effectiveness of information about the low relative risks, and/or benefits of potable recycled water, compared to control groups. Messages about the low risks resulted in higher support when the issue of recycled water was relevant. Messages about benefits resulted in higher perceived issue relevance, but did not translate into greater support. The results highlight the importance of understanding people's motivation to process information, and need to tailor communication to match attitudes and stage of recycled water schemes' development.

  16. What's in a message? Delivering sexual health promotion to young people in Australia via text messaging

    Directory of Open Access Journals (Sweden)

    Hellard Margaret E

    2010-12-01

    Full Text Available Abstract Background Advances in communication technologies have dramatically changed how individuals access information and communicate. Recent studies have found that mobile phone text messages (SMS can be used successfully for short-term behaviour change. However there is no published information examining the acceptability, utility and efficacy of different characteristics of health promotion SMS. This paper presents the results of evaluation focus groups among participants who received twelve sexual health related SMS as part of a study examining the impact of text messaging for sexual health promotion to on young people in Victoria, Australia. Methods Eight gender-segregated focus groups were held with 21 males and 22 females in August 2008. Transcripts of audio recordings were analysed using thematic analysis. Data were coded under one or more themes. Results Text messages were viewed as an acceptable and 'personal' means of health promotion, with participants particularly valuing the informal language. There was a preference for messages that were positive, relevant and short and for messages to cover a variety of topics. Participants were more likely to remember and share messages that were funny, rhymed and/or tied into particular annual events. The message broadcasting, generally fortnightly on Friday afternoons, was viewed as appropriate. Participants said the messages provided new information, a reminder of existing information and reduced apprehension about testing for sexually transmitted infections. Conclusions Mobile phones, in particular SMS, offer health promoters an exciting opportunity to engage personally with a huge number of individuals for low cost. The key elements emerging from this evaluation, such as message style, language and broadcast schedule are directly relevant to future studies using SMS for health promotion, as well as for future health promotion interventions in other mediums that require short formats, such

  17. A nomogram to predict the probability of passing the American Board of Internal Medicine examination

    Directory of Open Access Journals (Sweden)

    Andrei Brateanu

    2012-10-01

    Full Text Available Background : Although the American Board of Internal Medicine (ABIM certification is valued as a reflection of physicians’ experience, education, and expertise, limited methods exist to predict performance in the examination. Purpose : The objective of this study was to develop and validate a predictive tool based on variables common to all residency programs, regarding the probability of an internal medicine graduate passing the ABIM certification examination. Methods : The development cohort was obtained from the files of the Cleveland Clinic internal medicine residents who began training between 2004 and 2008. A multivariable logistic regression model was built to predict the ABIM passing rate. The model was represented as a nomogram, which was internally validated with bootstrap resamples. The external validation was done retrospectively on a cohort of residents who graduated from two other independent internal medicine residency programs between 2007 and 2011. Results : Of the 194 Cleveland Clinic graduates used for the nomogram development, 175 (90.2% successfully passed the ABIM certification examination. The final nomogram included four predictors: In-Training Examination (ITE scores in postgraduate year (PGY 1, 2, and 3, and the number of months of overnight calls in the last 6 months of residency. The nomogram achieved a concordance index (CI of 0.98 after correcting for over-fitting bias and allowed for the determination of an estimated probability of passing the ABIM exam. Of the 126 graduates from two other residency programs used for external validation, 116 (92.1% passed the ABIM examination. The nomogram CI in the external validation cohort was 0.94, suggesting outstanding discrimination. Conclusions : A simple user-friendly predictive tool, based on readily available data, was developed to predict the probability of passing the ABIM exam for internal medicine residents. This may guide program directors’ decision

  18. Setting and validating the pass/fail score for the NBDHE.

    Science.gov (United States)

    Tsai, Tsung-Hsun; Dixon, Barbara Leatherman

    2013-04-01

    This report describes the overall process used for setting the pass/fail score for the National Board Dental Hygiene Examination (NBDHE). The Objective Standard Setting (OSS) method was used for setting the pass/fail score for the NBDHE. The OSS method requires a panel of experts to determine the criterion items and proportion of these items that minimally competent candidates would answer correctly, the percentage of mastery and the confidence level of the error band. A panel of 11 experts was selected by the Joint Commission on National Dental Examinations (Joint Commission). Panel members represented geographic distribution across the U.S. and had the following characteristics: full-time dental hygiene practitioners with experience in areas of preventive, periodontal, geriatric and special needs care, and full-time dental hygiene educators with experience in areas of scientific basis for dental hygiene practice, provision of clinical dental hygiene services and community health/research principles. Utilizing the expert panel's judgments, the pass/fail score was set and then the score scale was established using the Rasch measurement model. Statistical and psychometric analysis shows the actual failure rate and the OSS failure rate are reasonably consistent (2.4% vs. 2.8%). The analysis also showed the lowest error of measurement, an index of the precision at the pass/fail score point and that the highest reliability (0.97) are achieved at the pass/fail score point. The pass/fail score is a valid guide for making decisions about candidates for dental hygiene licensure. This new standard was reviewed and approved by the Joint Commission and was implemented beginning in 2011.

  19. Chelyabinsk fireball and Dyatlov pass tragedy

    Science.gov (United States)

    Kochemasov, G. G.

    2013-09-01

    The Chelyabinsk bolide as well as the Kunashak meteorite in 1949 (Fig. 3, black square) hit ground in ectonically peculiar place in the Ural Mountains. The main explosion was followed by a series of weaker bangs. The long Uralian fold belt (Pz) separates two subsectors (1 & 2, Fig. 1) of the Eurasian sector (1+2) of the Eastern hemisphere sectoral structure (Fig. 1). At the Pamirs-Hindukush massif (the "Pamirs' cross") meet four tectonic sectors of this structure: two opposite differently uplifted (Africa-Mediterranean ++ and Asian +) and separating them two opposite differently subsided (Eurasian - and Indooceanic - -). Tectonic bisectors divide the sectors into two differently tectonically elevated subsectors. The Ural Mountains is one of these bisectors dividing the somewhat risen East-European subsector and the relatively fallen West-Siberian one. Even more important is the sharp tectonic boundary between subsided Eurasian sector and uplifted Asian one (between 2 and 3, Fig. 1). Fig. 3 shows distribution of electrophonic bolides over USSR [1]. Observations numbers are in circles. The total of 343 observations is distributed at relevant districts; accompanied meteorites were found only in 23-24 cases; in the chart are excluded background values of 1-2 observations per district. Two areas are obviously anomalous. These of the Urals, and the Eurasia-Asia sectoral contact (Novosibirsk - Yenisei R. - Tunguska). A location in the long Uralian belt is determined by its intersection with the Timan fold belt coming from the northwest (Fig. 3). The catastrophic Dyatlov pass where nine people mysteriously died at once occurs there (triangle in Fig. 3). Mancy aborigines know this place as deadly where killing white shining spheres appear. Moreover this belt intersection is well known among hunters for UFO as the Permian triangle (Fig. 2). They meet there to observe unusual atmospheric shining and other anomalous phenomena. In the Yenisei-Tunguska-Baikal region lightning

  20. Spanish validation of the Premorbid Adjustment Scale (PAS-S).

    Science.gov (United States)

    Barajas, Ana; Ochoa, Susana; Baños, Iris; Dolz, Montse; Villalta-Gil, Victoria; Vilaplana, Miriam; Autonell, Jaume; Sánchez, Bernardo; Cervilla, Jorge A; Foix, Alexandrina; Obiols, Jordi E; Haro, Josep Maria; Usall, Judith

    2013-02-01

    The Premorbid Adjustment Scale (PAS) has been the most widely used scale to quantify premorbid status in schizophrenia, coming to be regarded as the gold standard of retrospective assessment instruments. To examine the psychometric properties of the Spanish version of the PAS (PAS-S). Retrospective study of 140 individuals experiencing a first episode of psychosis (n=77) and individuals who have schizophrenia (n=63), both adult and adolescent patients. Data were collected through a socio-demographic questionnaire and a battery of instruments which includes the following scales: PAS-S, PANSS, LSP, GAF and DAS-sv. The Cronbach's alpha was performed to assess the internal consistency of PAS-S. Pearson's correlations were performed to assess the convergent and discriminant validity. The Cronbach's alpha of the PAS-S scale was 0.85. The correlation between social PAS-S and total PAS-S was 0.85 (p<0.001); while for academic PAS-S and total PAS-S it was 0.53 (p<0.001). Significant correlations were observed between all the scores of each age period evaluated across the PAS-S scale, with a significance value less than 0.001. There was a relationship between negative symptoms and social PAS-S (0.20, p<0.05) and total PAS-S (0.22, p<0.05), but not with academic PAS-S. However, there was a correlation between academic PAS-S and general subscale of the PANSS (0.19, p<0.05). Social PAS-S was related to disability measures (DAS-sv); and academic PAS-S showed discriminant validity with most of the variables of social functioning. PAS-S did not show association with the total LSP scale (discriminant validity). The Spanish version of the Premorbid Adjustment Scale showed appropriate psychometric properties in patients experiencing a first episode of psychosis and who have a chronic evolution of the illness. Moreover, each domain of the PAS-S (social and academic premorbid functioning) showed a differential relationship to other characteristics such as psychotic symptoms, disability

  1. Positive mood can increase or decrease message scrutiny: the hedonic contingency view of mood and message processing.

    Science.gov (United States)

    Wegener, D T; Petty, R E; Smith, S M

    1995-07-01

    Currently dominant explanations of mood effects on persuasive message processing (i.e., cognitive capacity and feelings as information) predict that happy moods lead to less message scrutiny than neutral or sad moods. The hedonic contingency view (D. T. Wegener & R. E. Petty, 1994) predicts that happy moods can sometimes be associated with greater message processing activity because people in a happy mood are more attentive than neutral or sad people to the hedonic consequences of their actions. Consistent with this view, Experiment 1 finds that a happy mood can lead to greater message scrutiny than a neutral mood when the message is not mood threatening. Experiment 2 finds that a happy mood leads to greater message scrutiny than a sad mood when an uplifting message is encountered, but to less message scrutiny when a depressing message is encountered.

  2. University Advertising and Universality in Messaging

    Science.gov (United States)

    Diel, Stan R.; Katsinas, Stephen

    2018-01-01

    University and college institutional advertisements, which typically are broadcast as public service announcements during the halftime of football games, were the subject of a quantitative analysis focused on commonality in messaging and employment of the semiotic theory of brand advertising. Findings indicate advertisements focus on students'…

  3. Message transfer in a communication network

    Indian Academy of Sciences (India)

    Examples of transport processes on networks include the traffic of informa- tion packets [1–4], transport processes on biological networks [5,6], and road traffic. ... for this system. In the case of single message transfer, we study the dependence of average travel times on the hub density, and find that travel times fall off as a.

  4. Message Integrity Model for Wireless Sensor Networks

    Science.gov (United States)

    Qleibo, Haider W.

    2009-01-01

    WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…

  5. Picture Book Soldiers: Men and Messages.

    Science.gov (United States)

    Desai, Christina M.

    2001-01-01

    Examines children's picture books about soldiers and war, including fiction, folktales, and historical fiction, analyzing their implicit and explicit messages about war and the military, and evaluating them for gender stereotyping. Finds that the soldiers conform almost uniformly to an exaggerated male stereotype. Shows different value judgments…

  6. An approach for message exchange using archetypes.

    Science.gov (United States)

    Moraes, João L C; Souza, Wanderley L; Cavalini, Luciana T; Pires, Luís F; Prado, Antonio F

    2013-01-01

    The application of ICT on the whole range of health sector activities, known as e-health, can simplify the access to health care services and will only be acceptable for realistic scenarios if it supports efficient information exchange amongst the caregivers and their patients. The aim of this paper is present an approach for message exchange to realistic scenarios.

  7. Graphical route information on variable message signs

    NARCIS (Netherlands)

    Alkim, T.P.; Mede, P.H.J. van der; Janssen, W.H.

    2002-01-01

    Reports on experiments in the Netherlands on the use of graphical route information panels (GRIP) as part of variable message systems (VMS) providing information to drivers. GRIP appear to be as safe as regular VMS. Digestion of the information presented is initially quicker for regular VMS, but

  8. Princess Picture Books: Content and Messages

    Science.gov (United States)

    Dale, Lourdes P.; Higgins, Brittany E.; Pinkerton, Nick; Couto, Michelle; Mansolillo, Victoria; Weisinger, Nica; Flores, Marci

    2016-01-01

    Because many girls develop their understanding of what it means to be a girl from books about princesses, the researchers coded the messages and content in 58 princess books (picture, fairy tales, and fractured fairy tales). Results indicate that gender stereotypes are present in the books--the princesses were more likely to be nurturing, in…

  9. An Interpersonal Approach to Writing Negative Messages.

    Science.gov (United States)

    Salerno, Douglas

    1988-01-01

    Asserts that textbook advice regarding buffers and negative messages is simplistic and frequently wrong, and analyses 22 job-refusal letters and their effectiveness. Claims that recent research on cognitive complexity and social perspective-taking suggests the need for more sophisticated audience analysis protocols for dealing with the negative…

  10. Interactive or interruptive? Instant messaging at work

    NARCIS (Netherlands)

    Ou, C.X.J.; Davison, R.M.

    2011-01-01

    The use of instant messaging (IM) technology at work is controversial, due to the interruptions it may cause and the difficulties associated with quantifying its benefits for individuals, teams and organizations. In this study, we investigate the use and impact of IM tools in the workplace. Based on

  11. Using Instant Messaging for Online Reference Service

    Science.gov (United States)

    Forster, Shirley

    2006-01-01

    Many libraries are using co-browsing chat products to provide reference services to their patrons, whilst their patrons are online and using the internet. The concept of such an online service is highly desirable, but many libraries are concerned that they will never be able to afford such a system. This may have changed: Instant Messaging (IM)…

  12. Calculation of trajectory parameters of long pass in basketball.

    Directory of Open Access Journals (Sweden)

    Charikova K.M.

    2011-08-01

    Full Text Available Values of a ball's flight trajectory parameters depending on a distance of long pass, a corner of a ball's start and height of a throwing point are submitted in article. Coordinates of reference points installation for training to long pass with an optimum trajectory of a ball's flight are designed. Requirements to simulators design are determined. Corners of ball's long pass performance in various game situations are recommended.

  13. Pass-Through to Import Prices: Evidence from Developing Countries

    OpenAIRE

    Miguel Fuentes

    2007-01-01

    In this paper I study the pass-through of nominal exchange rate changes to the price of imported goods in four developing countries. The results indicate that 75% of changes in the exchange rate are passed-through to the domestic currency price of imported goods within one quarter. Complete pass-through is attained within one year. There is no evidence that exchange rate pass-through to the price of imported goods has declined over time even in those countries that have managed to reduce infl...

  14. Effectiveness of safety and public service announcement messages on dynamic message signs.

    Science.gov (United States)

    2014-07-01

    The number of transportation agencies that use dynamic message signs (DMS) to provide traffic information to motorists has increased dramatically over the past four decades. This growing trend of DMS deployment is a reflection of the public interest ...

  15. Strong low-pass filtering effects on water vapour flux measurements with closed-path eddy correlation systems

    DEFF Research Database (Denmark)

    Ibrom, Andreas; Dellwik, Ebba; Flyvbjerg, Henrik K.

    2007-01-01

    datasets for this substantial measurement error. In contrast to earlier studies, a large number of spectra and raw data have been used in the analysis to define the low-pass filtering characteristic of the EC system. This revealed that the cut-off frequency of the closed-path EC system for water vapour......Turbulent water vapour fluxes measured with closed-path eddy correlation (EC) systems are unintentionally low-pass filtered by the system in a manner that varies with environmental conditions. Why and how is described here. So is the practical method that systematically corrects long-term flux...... concentration measurements decreases exponentially with increasing relative humidity. After correction for this unintended filtering, the fluxes are consistent with CO2 and H2O fluxes that were measured with an open-path sensor at the same time. The correction of water vapour flux measurements over a Beech...

  16. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  17. Investigating the impact of viral message appeal and message credibility on consumer attitude toward brand

    Directory of Open Access Journals (Sweden)

    Majid Esmaeilpour

    2016-12-01

    Full Text Available Background - Due to the rapid growth of the Internet and use of e-commerce in recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers' attitude with mediating role of intellectual involvement of consumers and their risk taking level. Purpose - The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. Design/methodology/approach – The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, data were analyzed through smart PLS software. Findings –The results show that the appeal and credibility of the message source have impact on consumer attitudes toward the brand. It was also found that intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brand. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role. Research limitations/implications – Data collection tool was questionnaire in this study, and questionnaire has some disadvantages that can affect the results. Additionally, this study was conducted in Bushehr city (Iran. Therefore, we should be cautious in generalizing the findings. Originality/value – In this study, the effect of message appeal and message source credibility on consumer attitude to brand was examined. The risk taking level of consumer and his involvement level were considered

  18. Investigating the impact of viral message appeal and message credibility on consumer attitude toward the brand

    Directory of Open Access Journals (Sweden)

    Esmaeilpour Majid

    2016-07-01

    Full Text Available Due to the rapid growth of the Internet and use of e-commerce in the recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers’ attitude with mediating role of intellectual involvement of consumers and their risk taking level. The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in the Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, we analysed the data through smart PLS software. The results show that the appeal and credibility of the message source impact the consumer attitudes toward the brand. We also found that the intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brands. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role.

  19. Preventing messaging queue deadlocks in a DMA environment

    Science.gov (United States)

    Blocksome, Michael A; Chen, Dong; Gooding, Thomas; Heidelberger, Philip; Parker, Jeff

    2014-01-14

    Embodiments of the invention may be used to manage message queues in a parallel computing environment to prevent message queue deadlock. A direct memory access controller of a compute node may determine when a messaging queue is full. In response, the DMA may generate and interrupt. An interrupt handler may stop the DMA and swap all descriptors from the full messaging queue into a larger queue (or enlarge the original queue). The interrupt handler then restarts the DMA. Alternatively, the interrupt handler stops the DMA, allocates a memory block to hold queue data, and then moves descriptors from the full messaging queue into the allocated memory block. The interrupt handler then restarts the DMA. During a normal messaging advance cycle, a messaging manager attempts to inject the descriptors in the memory block into other messaging queues until the descriptors have all been processed.

  20. Using Publish-Subscribe Messaging for System Status and Automation

    Science.gov (United States)

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  1. Outpatient blood pressure monitoring using bi-directional text messaging.

    Science.gov (United States)

    Anthony, Chris A; Polgreen, Linnea A; Chounramany, James; Foster, Eric D; Goerdt, Christopher J; Miller, Michelle L; Suneja, Manish; Segre, Alberto M; Carter, Barry L; Polgreen, Philip M

    2015-05-01

    To diagnose hypertension, multiple blood pressure (BP) measurements are recommended. We randomized patients into three groups: EMR-only (patients recorded BP measurements in an electronic medical record [EMR] web portal), EMR + reminders (patients were sent text message reminders to record their BP measurements in the EMR), and bi-directional text messaging (patients were sent a text message asking them to respond with their current BP). Subjects were asked to complete 14 measurements. Automated messages were sent to each patient in the bi-directional text messaging and EMR + reminder groups twice daily. Among 121 patients, those in the bi-directional text messaging group reported the full 14 measurements more often than both the EMR-only group (P text messaging is an effective way to gather patient BP data. Text-message-based reminders alone are an effective way to encourage patients to record BP measurements. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  2. Effects of Instant Messaging on School Performance in Adolescents.

    Science.gov (United States)

    Grover, Karan; Pecor, Keith; Malkowski, Michael; Kang, Lilia; Machado, Sasha; Lulla, Roshni; Heisey, David; Ming, Xue

    2016-06-01

    Instant messaging may compromise sleep quality and school performance in adolescents. We aimed to determine associations between nighttime messaging and daytime sleepiness, self-reported sleep parameters, and/or school performance. Students from 3 high schools in New Jersey completed anonymous questionnaires assessing sleep duration, daytime sleepiness, messaging habits, and academic performance. Of the 2,352 students sampled, 1,537 responses were contrasted among grades, sexes, and messaging duration, both before and after lights out. Students who reported longer duration of messaging after lights out were more likely to report a shorter sleep duration, higher rate of daytime sleepiness, and poorer academic performance. Messaging before lights out was not associated with higher rates of daytime sleepiness or poorer academic performance. Females reported more messaging, more daytime sleepiness, and better academic performance than males. There may be an association between text messaging and school performance in this cohort of students. © The Author(s) 2016.

  3. The Effectiveness of Campaign Messages on Turnout and Vote Choice

    OpenAIRE

    Friedel, Sylvia

    2013-01-01

    In this dissertation, I study campaign effects on turnout and vote choice. I analyze different campaign messages and the way they affect voters across various situations. First, through an online survey experiment, I study the impact of campaign messages and ideological cues on voters as they make inferences on candidates. Next, through a field experiment, I test whether microtargeted messages or general messages on the economy have any effect on turnout. Lastly, using online survey data, I e...

  4. Flow of emotional messages in artificial social networks

    OpenAIRE

    Chmiel, Anna; Holyst, Janusz A.

    2010-01-01

    Models of message flows in an artificial group of users communicating via the Internet are introduced and investigated using numerical simulations. We assumed that messages possess an emotional character with a positive valence and that the willingness to send the next affective message to a given person increases with the number of messages received from this person. As a result, the weights of links between group members evolve over time. Memory effects are introduced, taking into account t...

  5. Ripple FPN reduced algorithm based on temporal high-pass filter and hardware implementation

    Science.gov (United States)

    Li, Yiyang; Li, Shuo; Zhang, Zhipeng; Jin, Weiqi; Wu, Lei; Jin, Minglei

    2016-11-01

    Cooled infrared detector arrays always suffer from undesired Ripple Fixed-Pattern Noise (FPN) when observe the scene of sky. The Ripple Fixed-Pattern Noise seriously affect the imaging quality of thermal imager, especially for small target detection and tracking. It is hard to eliminate the FPN by the Calibration based techniques and the current scene-based nonuniformity algorithms. In this paper, we present a modified space low-pass and temporal high-pass nonuniformity correction algorithm using adaptive time domain threshold (THP&GM). The threshold is designed to significantly reduce ghosting artifacts. We test the algorithm on real infrared in comparison to several previously published methods. This algorithm not only can effectively correct common FPN such as Stripe, but also has obviously advantage compared with the current methods in terms of detail protection and convergence speed, especially for Ripple FPN correction. Furthermore, we display our architecture with a prototype built on a Xilinx Virtex-5 XC5VLX50T field-programmable gate array (FPGA). The hardware implementation of the algorithm based on FPGA has two advantages: (1) low resources consumption, and (2) small hardware delay (less than 20 lines). The hardware has been successfully applied in actual system.

  6. Teaching Students the Persuasive Message through Small Group Activity

    Science.gov (United States)

    Creelman, Valerie

    2008-01-01

    Teaching students to write persuasive messages is a critical feature of any undergraduate business communications course. For the persuasive writing module in the author's course, students write a persuasive message on the basis of the four-part indirect pattern often used for sales or fund-raising messages. The course text she uses identifies…

  7. The Message Reporting System of the ATLAS DAQ System

    CERN Document Server

    Caprini, M; Kolos, S; 10th ICATPP Conference on Astroparticle, Particle, Space Physics, Detectors and Medical Physics Applications

    2008-01-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process comm...

  8. Using Text-Messaging in the Secondary Classroom

    Science.gov (United States)

    Thomas, Kevin; Orthober, Corrie

    2011-01-01

    To examine the potential uses of and barriers to text-messaging in secondary schools, three classes (66 students) of high school students used their personal mobile phones to receive out of school, course-related text-messages from teachers. Forty-six students (70%) agreed to receive text-messages. Findings indicate that participants found…

  9. Driver memory for in-vehicle visual and auditory messages

    Science.gov (United States)

    1999-12-01

    Three experiments were conducted in a driving simulator to evaluate effects of in-vehicle message modality and message format on comprehension and memory for younger and older drivers. Visual icons and text messages were effective in terms of high co...

  10. Understanding health food messages on Twitter for health literacy promotion.

    Science.gov (United States)

    Zhou, J; Liu, F; Zhou, H

    2018-05-01

    With the popularity of social media, Twitter has become an important tool to promote health literacy. However, many health-related messages on Twitter are dead-ended and cannot reach many people. This is unhelpful for health literacy promotion. This article aims to examine the features of online health food messages that people like to retweet. We adopted rumour theory as our theoretical foundation and extracted seven characteristics (i.e. emotional valence, attractiveness, sender's authoritativeness, external evidence, argument length, hashtags, and direct messages). A total of 10,025 health-related messages on Twitter were collected, and 1496 messages were randomly selected for further analysis. Each message was treated as one unit and then coded. All the hypotheses were tested with logistic regression. Emotional valence, attractiveness, sender's authoritativeness, argument length, and direct messages in a Twitter message had positive effects on people's retweet behaviour. The effect of external evidence was negative. Hashtags had no significant effect after consideration of other variables. Online health food messages containing positive emotions, including pictures, containing direct messages, having an authoritative sender, having longer arguments, or not containing external URLs are more likely to be retweeted. However, a message only containing positive or negative emotions or including direct messages without any support information will not be retweeted.

  11. Lol: New Language and Spelling in Instant Messaging

    Science.gov (United States)

    Varnhagen, Connie K.; McFall, G. Peggy; Pugh, Nicole; Routledge, Lisa; Sumida-MacDonald, Heather; Kwong, Trudy E.

    2010-01-01

    Written communication in instant messaging, text messaging, chat, and other forms of electronic communication appears to have generated a "new language" of abbreviations, acronyms, word combinations, and punctuation. In this naturalistic study, adolescents collected their instant messaging conversations for a 1-week period and then completed a…

  12. 19 CFR 4.7d - Container status messages.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Container status messages. 4.7d Section 4.7d... TREASURY VESSELS IN FOREIGN AND DOMESTIC TRADES Arrival and Entry of Vessels § 4.7d Container status messages. (a) Container status messages required. In addition to the advance filing requirements pursuant...

  13. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Naik, K.; Shihada, Basem

    2013-01-01

    new message scheduling framework for epidemic and two-hop forwarding routing in DTNs, such that the forwarding/dropping decision can be made at a node during each contact for either optimal message delivery ratio or message delivery delay. Extensive

  14. MMS: An electronic message management system for emergency response

    DEFF Research Database (Denmark)

    Andersen, H.B.; Garde, H.; Andersen, V.

    1998-01-01

    among messages can be viewed in a graphic tree-like display. By employing the extensive filtration facilities offered by the MMS. users are able to monitor the current status of messages. And, in general, filtration provides users with means of surveying a possibly large number of responses to messages...... contingency plan and procedures to be applied during predefined stages of an emergency....

  15. Mouse myocardial first-pass perfusion MR imaging

    NARCIS (Netherlands)

    Coolen, Bram F.; Moonen, Rik P. M.; Paulis, Leonie E. M.; Geelen, Tessa; Nicolay, Klaas; Strijkers, Gustav J.

    2010-01-01

    A first-pass myocardial perfusion sequence for mouse cardiac MRI is presented. A segmented ECG-triggered acquisition combined with parallel imaging acceleration was used to capture the first pass of a Gd-DTPA bolus through the mouse heart with a temporal resolution of 300-400 msec. The method was

  16. Mouse myocardial first-pass perfusion MR imaging

    NARCIS (Netherlands)

    Coolen, B.F.; Moonen, R.P.M.; Paulis, L.E.M.; Geelen, T.; Nicolay, K.; Strijkers, G.J.

    2010-01-01

    A first-pass myocardial perfusion sequence for mouse cardiac MRI is presented. A segmented ECG-triggered acquisition combined with parallel imaging acceleration was used to capture the first pass of a Gd-DTPA bolus through the mouse heart with a temporal resolution of 300–400 msec. The method was

  17. Teaching Strategies for the Forearm Pass in Volleyball

    Science.gov (United States)

    Casebolt, Kevin; Zhang, Peng; Brett, Christine

    2014-01-01

    This article shares teaching strategies for the forearm pass in the game of volleyball and identifies how they will help students improve their performance and development of forearm passing skills. The article also provides an assessment rubric to facilitate student understanding of the skill.

  18. Safety analysis of passing maneuvers using extreme value theory

    Directory of Open Access Journals (Sweden)

    Haneen Farah

    2017-04-01

    The results indicate that this is a promising approach for safety evaluation. On-going work of the authors will attempt to generalize this method to other safety measures related to passing maneuvers, test it for the detailed analysis of the effect of demographic factors on passing maneuvers' crash probability and for its usefulness in a traffic simulation environment.

  19. 9 CFR 381.79 - Passing of carcasses and parts.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Passing of carcasses and parts. 381.79 Section 381.79 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE... Carcasses and Parts § 381.79 Passing of carcasses and parts. Each carcass and all organs and other parts of...

  20. 12 CFR 560.32 - Pass-through investments.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Pass-through investments. 560.32 Section 560.32 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY LENDING AND INVESTMENT Lending and Investment Powers for Federal Savings Associations § 560.32 Pass-through investments. (a) A...

  1. Politeness Strategies Used in Text Messaging

    Directory of Open Access Journals (Sweden)

    Shahrzad Eshghinejad

    2016-03-01

    Full Text Available One aspect of short message service (SMS communication through a cell phone is use of politeness strategies. As it is extensively argued that females are more polite language users, the present study sought to describe the strategies used by these two groups and to find out whether there is any significant difference between male and female English as a foreign language (EFL learners in the use of positive and negative politeness strategies in sending SMS to their professors, considering that there is an asymmetric power relation and social distance between them. To this end, a corpus of 300 L1 (Persian and L2 (English request messages was compiled. Results of qualitative and quantitative data analysis showed no significant difference between the two groups. Results of the study have implication in politeness research.

  2. Text Messaging for Addiction: A Review

    Science.gov (United States)

    Keoleian, Victoria; Polcin, Douglas; Galloway, Gantt P.

    2015-01-01

    Individuals seeking treatment for addiction often experience barriers due to cost, lack of local treatment resources, or either school or work schedule conflicts. Text messaging-based addiction treatment is inexpensive and has the potential to be widely accessible in real time. We conducted a comprehensive literature review identifying 11 published randomized controlled trials (RCTs) evaluating text messaging-based interventions for tobacco smoking, 4 studies for reducing alcohol consumption, 1 pilot study in former methamphetamine (MA) users, and 1 study based on qualitative interviews with cannabis users. Abstinence outcome results in RCTs of smokers willing to make a quit attempt have been positive overall in the short term and as far out as at 6 and 12 months. Studies aimed at reducing alcohol consumption have been promising. More data are needed to evaluate the feasibility, acceptability, and efficacy of this approach for other substance use problems. PMID:25950596

  3. Mobile text messaging solutions for obesity prevention

    Science.gov (United States)

    Akopian, David; Jayaram, Varun; Aaleswara, Lakshmipathi; Esfahanian, Moosa; Mojica, Cynthia; Parra-Medina, Deborah; Kaghyan, Sahak

    2011-02-01

    Cellular telephony has become a bright example of co-evolution of human society and information technology. This trend has also been reflected in health care and health promotion projects which included cell phones in data collection and communication chain. While many successful projects have been realized, the review of phone-based data collection techniques reveals that the existing technologies do not completely address health promotion research needs. The paper presents approaches which close this gap by extending existing versatile platforms. The messaging systems are designed for a health-promotion research to prevent obesity and obesity-related health disparities among low-income Latino adolescent girls. Messaging and polling mechanisms are used to communicate and automatically process response data for the target constituency. Preliminary survey data provide an insight on phone availability and technology perception for the study group.

  4. Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies.

    Science.gov (United States)

    Balador, Ali; Uhlemann, Elisabeth; Calafate, Carlos T; Cano, Juan-Carlos

    2018-03-23

    Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.

  5. Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies

    Directory of Open Access Journals (Sweden)

    Ali Balador

    2018-03-01

    Full Text Available Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.

  6. The perfect message at the perfect moment.

    Science.gov (United States)

    Kalyanam, Kirthi; Zweben, Monte

    2005-11-01

    Marketers planning promotional campaigns ask questions to boost the odds that the messages will be accepted: Who should receive each message? What should be its content? How should we deliver it? The one question they rarely ask is, when should we deliver it? That's too bad, because in marketing, timing is arguably the most important variable of all. Indeed, there are moments in a customer's relationship with a business when she wants to communicate with that business because something has changed. If the company contacts her with the right message in the right format at the right time, there's a good chance of a warm reception. The question of "when" can be answered by a new computer-based model called "dialogue marketing," which is, to date, the highest rung on an evolutionary ladder that ascends from database marketing to relationship marketing to one-to-one marketing. Its principle advantages over older approaches are that it is completely interactive, exploits many communication channels, and is "relationship aware": that is, it continuously tracks every nuance of the customer's interaction with the business. Thus, dialogue marketing responds to each transition in that relationship at the moment the customer requires attention. Turning a traditional marketing strategy into a dialogue-marketing program is a straightforward matter. Begin by identifying the batch communications you make with customers, then ask yourself what events could trigger those communications to make them more timely. Add a question or call to action to each message and prepare a different treatment or response for each possible answer. Finally, create a series of increasingly urgent calls to action that kick in if the question or call to action goes unanswered by the customer. As dialogue marketing proliferates, it may provide the solid new footing that Madison Avenue seeks.

  7. Evaluation of regional pulmonary blood flow in mitral valvular heart disease using single-pass radionuclide angiocardiography

    International Nuclear Information System (INIS)

    Chang-Soon Koh; Byung Tae Kim; Myung Chul Lee; Bo Yeon Cho

    1982-01-01

    Pulmonary hypertension in mitral valvular cardiac disease has been evaluated in 122 patients by a modified upper lung/lower count ratio using single-pass radionuclide angiocardiography. The mean upper lung/lower lung radio correlates well with pulmonary artery mean (r=0.483) and wedge pressure (r=0.804). After correction surgery of the cardiac valve, the ratio decreases and returns to normal range in patients judged clinically to have good surgical benifit. This modified method using single-pass technique provides additional simple, reproducible and nontraumatic results of regional pulmonary blood flow and appears to be correlated with the degree of pulmonary hypertension in mitral heart disease

  8. Mobile phone messaging for preventive health care.

    Science.gov (United States)

    Vodopivec-Jamsek, Vlasta; de Jongh, Thyra; Gurol-Urganci, Ipek; Atun, Rifat; Car, Josip

    2012-12-12

    Preventive health care promotes health and prevents disease or injuries by addressing factors that lead to the onset of a disease, and by detecting latent conditions to reduce or halt their progression. Many risk factors for costly and disabling conditions (such as cardiovascular diseases, cancer, diabetes, and chronic respiratory diseases) can be prevented, yet healthcare systems do not make the best use of their available resources to support this process. Mobile phone messaging applications, such as Short Message Service (SMS) and Multimedia Message Service (MMS), could offer a convenient and cost-effective way to support desirable health behaviours for preventive health care. To assess the effects of mobile phone messaging interventions as a mode of delivery for preventive health care, on health status and health behaviour outcomes. We searched: the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library 2009, Issue 2), MEDLINE (OvidSP) (January 1993 to June 2009), EMBASE (OvidSP) (January 1993 to June 2009), PsycINFO (OvidSP) (January 1993 to June 2009), CINAHL (EbscoHOST) (January 1993 to June 2009), LILACS (January 1993 to June 2009) and African Health Anthology (January 1993 to June 2009).We also reviewed grey literature (including trial registers) and reference lists of articles. We included randomised controlled trials (RCTs), quasi-randomised controlled trials (QRCTs), controlled before-after (CBA) studies, and interrupted time series (ITS) studies with at least three time points before and after the intervention. We included studies using SMS or MMS as a mode of delivery for any type of preventive health care. We only included studies in which it was possible to assess the effects of mobile phone messaging independent of other technologies or interventions. Two review authors independently assessed all studies against the inclusion criteria, with any disagreements resolved by a third review author. Study design features

  9. Encoding and decoding messages with chaotic lasers

    International Nuclear Information System (INIS)

    Alsing, P.M.; Gavrielides, A.; Kovanis, V.; Roy, R.; Thornburg, K.S. Jr.

    1997-01-01

    We investigate the structure of the strange attractor of a chaotic loss-modulated solid-state laser utilizing return maps based on a combination of intensity maxima and interspike intervals, as opposed to those utilizing Poincare sections defined by the intensity maxima of the laser (I=0,Ie<0) alone. We find both experimentally and numerically that a simple, intrinsic relationship exists between an intensity maximum and the pair of preceding and succeeding interspike intervals. In addition, we numerically investigate encoding messages on the output of a chaotic transmitter laser and its subsequent decoding by a similar receiver laser. By exploiting the relationship between the intensity maxima and the interspike intervals, we demonstrate that the method utilized to encode the message is vital to the system close-quote s ability to hide the signal from unwanted deciphering. In this work alternative methods are studied in order to encode messages by modulating the magnitude of pumping of the transmitter laser and also by driving its loss modulation with more than one frequency. copyright 1997 The American Physical Society

  10. ZeroMQ messaging for many applications

    CERN Document Server

    Hintjens, Pieter

    2013-01-01

    Dive into ØMQ (aka ZeroMQ), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. ØMQ maintainer Pieter Hintjens takes you on a tour of real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns. Learn how to use specific ØMQ programming techniques, build multithreaded applications, and create your own messaging architectures. You’ll discover how ØMQ works with several programming languages and most operating systems—with little or no cost. Learn ØMQ’s main patterns: request-reply, publish-subscribe, and pipeline Work with ØMQ sockets and patterns by building several small applications Explore advanced uses of ØMQ’s request-reply pattern through working examples Build reliable request...

  11. Antioxidant health messages in Canadian women's magazines.

    Science.gov (United States)

    Steinberg, Alissa; Paisley, Judy; Bandayrel, Kristofer

    2011-01-01

    Recently, antioxidants have taken centre stage in media and advertising messages. While 80% of Canadians think they are well-informed about nutrition, many are confused about the health effects of specific nutrients. Forty-six percent of Canadians seek information from newspapers and books, and 67% of women rely on magazines. We examined the content and accuracy of antioxidant health messages in Canadian women's magazines. The top three Canadian magazines targeted at women readers were selected. A screening tool was developed, pilot tested, and used to identify eligible articles. A coding scheme was created to define variables, which were coded and analyzed. Seventy-seven percent of 36 magazine issues contained articles that mentioned antioxidants (n=56). Seventy-one percent (n=40) of articles reported positive health effects related to antioxidant consumption, and 36% and 40% of those articles framed those effects as definite and potential, respectively (p<0.01). The articles sampled conveyed messages about positive antioxidant health effects that are not supported by current evidence. Improved standards of health reporting are needed. Nutrition professionals may need to address this inaccuracy when they develop communications on antioxidants and health risk.

  12. ZeroMQ: Messaging Made Simple

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Since its inception in 2007, ZeroMQ has defined a new product category of thin, fast, open source message transports. This little library has now grown into a large, vibrant community of projects tied together with standard protocols and APIs. Applications, written in any language, talk to each other over TCP, multicast, or inproc transports, using a single socket-based API, and a set of "patterns" (pub-sub, request-reply, dealer-router, pipeline). ZeroMQ handles message framing, batching, and I/O, but ignores aspects like serialization and persistence. By focussing on the essentials, and acting as a toolkit rather than a pre-packaged solution, ZeroMQ turns the complex problem of distributed computing into a relatively simple recipe. About the speaker Pieter Hintjens is a writer, programmer, and public speaker who has spent decades building large software systems, organizations, and businesses. He designed the Advanced Message Queuing Protocol (AMQP) in 2006 for JPMorganChase and left ...

  13. The influence of message framing, intention to quit smoking, and nicotine dependence on the persuasiveness of smoking cessation messages

    NARCIS (Netherlands)

    Moorman, M.; van den Putte, B.

    2008-01-01

    This study explores the combined effect of message framing, intention to quit smoking, and nicotine dependence on the persuasiveness of smoking cessation messages. Pre- and post-message measures of quit intention, attitude toward smoking cessation, and perceived behavioral control were taken in two

  14. Does perceived risk influence the effects of message framing? Revisiting the link between prospect theory and message framing

    NARCIS (Netherlands)

    Riet, J.P. van 't; Cox, A.D.; Cox, D.; Zimet, G.D.; Bruijn, G.J. de; Putte, B. van den; Vries, H. de; Werrij, M.Q.; Ruiter, R.A.C.

    2016-01-01

    Health-promoting messages can be framed in terms of the beneficial consequences of healthy behaviour (gain-framed messages) or the detrimental consequences of unhealthy behaviour (loss-framed messages). An influential notion holds that the perceived risk associated with the recommended behaviour

  15. NWS Corrections to Observations

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Form B-14 is the National Weather Service form entitled 'Notice of Corrections to Weather Records.' The forms are used to make corrections to observations on forms...

  16. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... more surgeries depending on the extent of the repair needed. Click here to find out more. Corrective ... more surgeries depending on the extent of the repair needed. Click here to find out more. Corrective ...

  17. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... Jaw Surgery Download Download the ebook for further information Corrective jaw, or orthognathic surgery is performed by ... your treatment. Correction of Common Dentofacial Deformities ​ ​ The information provided here is not intended as a substitute ...

  18. STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE

    Directory of Open Access Journals (Sweden)

    Kobozeva A.

    2014-04-01

    Full Text Available One of the main requirements to steganografic algorithm to be developed is robustness against disturbing influences, that is, to attacks against the embedded message. It was shown that guaranteeing the stego algorithm robustness does not depend on whether the additional information is embedded into the spatial or transformation domain of the cover image. Given the existing advantages of the spatial domain of the cover image in organization of embedding and extracting processes, a sufficient condition for ensuring robustness of such stego transformation was obtained in this work. It was shown that the amount of brightness correction related to the pixels of the cover image block is similar to the amount of correction related to the maximum singular value of the corresponding matrix of the block in case of embedding additional data that ensures robustness against attacks on the embedded message. Recommendations were obtained for selecting the size of the cover image block used in stego transformation as one of the parameters determining the calculation error of stego message. Given the inversely correspondence between the stego capacity of the stego channel being organized and the size of the cover image block, l=8 value was recommended.

  19. The prototype message broadcast system for the Superconducting Super Collider

    International Nuclear Information System (INIS)

    Low, K.; Skegg, R.

    1990-11-01

    A prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider is presented. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system. A simple version of this system is to be used in the Accelerator Systems String Test (ASST) at the SSC site in 1991. 3 refs., 6 figs., 1 tab

  20. The prototype message broadcast system for the superconducting super collider

    International Nuclear Information System (INIS)

    Low, K.; Skegg, R.

    1991-01-01

    This paper presents a prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system

  1. Manipulative Use of Short Messaging Service (SMS Text Messages by Nigerian Telecommunications Companies

    Directory of Open Access Journals (Sweden)

    Ayoola, Kehinde A.

    2014-02-01

    Full Text Available This paper is an application of Relevance Theory for the interpretation of short messaging service (SMS text messages emanating from Nigerian telecommunications companies to their subscribers. The aim of the research was to identify and describe the manipulative strategies employed by Nigerian telecommunications companies to induce subscribers to part with their money through sales promotion lotteries. 100 SMS texts were purposively extracted from the cell phones of randomly selected residents of Lagos Nigeria who had received promotional SMS text messages from three major Nigerian telecommunications companies. Using Sperber and Wilson's Relevance Theory (1995 as its theoretical framework, the paper described the manipulative use of SMS by Nigerian telecommunications companies. The analysis revealed that SMS text messages were encoded to achieve maximization of relevance through explicature and implicature; contextual implication and strengthening; and the reduction of processing effort through violating the maxim of truthfulness and the creative use of graphology. The paper concludes that SMS text-messages were used manipulatively by Nigerian telecommunications companies to earn indirect income from sales promotion lottery.

  2. Source Similarity and Social Media Health Messages: Extending Construal Level Theory to Message Sources.

    Science.gov (United States)

    Young, Rachel

    2015-09-01

    Social media users post messages about health goals and behaviors to online social networks. Compared with more traditional sources of health communication such as physicians or health journalists, peer sources are likely to be perceived as more socially close or similar, which influences how messages are processed. This experimental study uses construal level theory of psychological distance to predict how mediated health messages from peers influence health-related cognition and behavioral intention. Participants were exposed to source cues that identified peer sources as being either highly attitudinally and demographically similar to or different from participants. As predicted by construal level theory, participants who perceived sources of social media health messages as highly similar listed a greater proportion of beliefs about the feasibility of health behaviors and a greater proportion of negative beliefs, while participants who perceived sources as more dissimilar listed a greater proportion of positive beliefs about the health behaviors. Results of the study could be useful in determining how health messages from peers could encourage individuals to set realistic health goals.

  3. Engineered cell-cell communication via DNA messaging

    Directory of Open Access Journals (Sweden)

    Ortiz Monica E

    2012-09-01

    Full Text Available Abstract Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia.

  4. TXT@WORK: pediatric hospitalists and text messaging.

    Science.gov (United States)

    Kuhlmann, Stephanie; Ahlers-Schmidt, Carolyn R; Steinberger, Erik

    2014-07-01

    Many studies assess provider-patient communication through text messaging; however, minimal research has addressed communication among physicians. The purpose of this study was to evaluate the use of text messaging by pediatric hospitalists. A brief, anonymous, electronic survey was distributed through the American Academy of Pediatrics Section on Hospital Medicine Listserv in February 2012. Survey questions assessed work-related text messaging. Of the 106 pediatric hospitalist respondents, 97 met inclusion criteria. Most were female (73%) and had been in practice text messages, some (12%) more than 10 times per shift. More than half (53%) received work-related text messages when not at work. When asked to identify all potential work recipients, most often sent work-related text messages to other pediatric hospitalists (64%), fellows or resident physicians (37%), and subspecialists/consulting physicians (28%). When asked their preferred mode for brief communication, respondents' preferences varied. Many (46%) respondents worried privacy laws can be violated by sending/receiving text messages, and some (30%) reported having received protected health information (PHI) through text messages. However, only 11% reported their institution offered encryption software for text messaging. Physicians were using text messaging as a means of brief, work-related communication. Concerns arose regarding transfer of PHI using unsecure systems and work-life balance. Future research should examine accuracy and effectiveness of text message communication in the hospital, as well as patient privacy issues.

  5. Crafting a Real-Time Information Aggregator for Mobile Messaging

    Directory of Open Access Journals (Sweden)

    Jenq-Shiou Leu

    2010-01-01

    Full Text Available Mobile messaging is evolving beyond SMS (Short Message Service text messaging with the introduction of MMS (Multimedia Messaging Service. In the past, such a scheme is used for peer-to-peer communication. Messages are generally displayed on a cellular phone with a limited-sized screen. However, such a visualizing process is not suitable to broadcast real-time SMS/MMS messages to people in public. To facilitate the instancy and publicity, we develop a real-time information aggregator—Visualizing SMS and MMS Messages System (VSMMS—to realize the concept by integrating SMS and MMS messaging over GSM/GPRS/UMTS onto a remote display device. The device exhibits messages on a larger display device in public. VSMMS features a revolutionized variation of mass media broadcasting. In this paper, we practically illustrate how to design and implement VSMMS and use a M/M/1 model to conduct a theoretical analysis about the message delay in the system queue. Meanwhile, we make an empirical performance evaluation about the message transmission time over different networks.

  6. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  7. System of message for gamma-radiation monitor

    International Nuclear Information System (INIS)

    Bolic, M.D.; Koturovic, A.M.

    2001-01-01

    Paper describes a system of voice messages for gamma-radiation monitor based on PC. The systems reproduces recorded messages that is simpler than the process of their synthesis. Message choice is based on combination of recorded digital results and/or received reference messages or warnings. The system of generation of voice messages applies the Windows based software. The total memory array required to create independent voice system is maximum 1.7 mbyte. The monitor may be used for continuous monitoring of radioactivity level with 5-8 s period of message repetition. Another option of the system operation is based on monitor application for the environment monitoring. Period of messages in this case is equal to 5-30 min [ru

  8. ICRF heating of passing ions in TMX-U

    International Nuclear Information System (INIS)

    Molvik, A.W.; Dimonte, G.; Barter, J.; Campbell, R.; Cummins, W.F.; Falabella, S.; Ferguson, S.W.; Poulsen, P.

    1986-04-01

    By placing ion-cyclotron resonant frequency (ICRF) antennas on both sides of a midplane gas-feed system in the central cell of the Tandem Mirror Experiment-Upgrade (TMX-U), our results have improved in the following areas: (a) The end losses out both ends show a factor of 3 to 4 increase in passing-ion temperatures and a factor of 2 to 3 decrease in passing-ion densities. (b) The passing-ion heating is consistent with Monte Carlo predictions. (c) The plasma density can be sustained by ICRF plus gas fueling as observed on other experiments

  9. Effect of passing vessels on a moored ship

    Energy Technology Data Exchange (ETDEWEB)

    Lean, G H; Price, W A

    1977-11-01

    The effect of passing vessels on a moored ship was investigated by a series of model tests carried out at the Hydraulics Research Station for the Esso Petroleum Co. Ltd., transportation department in connection with their oil jetty at Milford Haven. A main conclusion was that the forces appeared to be due to the pressure gradients associated with the pattern of flow that accompanies the passing ship rather than with the wave system. Slack lines are to be avoided, and some relief in maximum line loads can be achieved by increasing the pretension. The results included the effects of passing vessel speed and ship clearance and draft.

  10. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages

    Science.gov (United States)

    Cole, Galen E.; Keller, Punam A.; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-01-01

    The Centers for Disease Control and Prevention’s Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces. PMID:26877714

  11. When communications collide with recipients' actions: effects of post-message behavior on intentions to follow the message recommendation.

    Science.gov (United States)

    Albarracín, Dolores; Cohen, Joel B; Kumkale, G Tarcan

    2003-07-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance.

  12. When Communications Collide With Recipients’ Actions: Effects of Post-Message Behavior on Intentions to Follow the Message Recommendation

    Science.gov (United States)

    Albarracín, Dolores; Cohen, Joel B.; Kumkale, G. Tarcan

    2013-01-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance. PMID:15018672

  13. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages.

    Science.gov (United States)

    Cole, Galen E; Keller, Punam A; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-03-01

    The Centers for Disease Control and Prevention's Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces.

  14. The Single Pass RF Driver: Final beam compression

    Energy Technology Data Exchange (ETDEWEB)

    Burke, Robert, E-mail: rjburke@fusionpowercorporation.com

    2014-01-01

    The Single Pass RF Driver (SPRFD) compacts the beam from the linac without storage rings by manipulations that take advantage of the multiplicity of isotopes (16), the preserved µbunch structure, and increased total linac current. Magnetic switches on a first set of delay lines rearrange the internal structure of the various isotopic beams. A second set of delay lines sets the relative timing of the 16 isotopic beam sections so they will telescope at the pellet, in one of multiple fusion chambers, e.g. 10. Shortening each isotopic beam section uses preservation of the µbunch structure up to the final ∼2 km drift before final focus. Just before the final drift, differential acceleration of the µbunches in each isotopic beam section (128 total) launches an axial collapse, referred to as the “Slick”. The µbunches interpenetrate as their centers of mass move toward each other and individual µbunches lengthen due to their momentum spread. In longitudinal phase space they slide over one another as they lengthen in time and slim down in instantaneous energy spread. The permissible amount of µbunch lengthening is set by the design pulse shape at the pellet, which varies for different groups of isotopes. In narrow bands of ranges according to the role for each isotope group in the pellet, the ranges extend from 1 to 10 g/cm{sup 2} to drive the cylinder barrel and thin hemispherical end caps, to heat the ∼0.5 g/cm{sup 2}ρR fast ignition zone, and to improve the quasi-sphericity of the compression of the fast ignition zones at the pellet's ends. Because the µbunch–µbunch momentum differences are correlated, time-ramped beamline transport elements close after the differential accelerator are used to correct the associated shifts of focal point. Beam neutralization is needed after the differential acceleration until adjacent bunches begin to overlap. Concurrent collapse of each isotope and telescoping of the 16 isotopes cause the current in each beamline

  15. The Single Pass RF Driver: Final beam compression

    International Nuclear Information System (INIS)

    Burke, Robert

    2014-01-01

    The Single Pass RF Driver (SPRFD) compacts the beam from the linac without storage rings by manipulations that take advantage of the multiplicity of isotopes (16), the preserved µbunch structure, and increased total linac current. Magnetic switches on a first set of delay lines rearrange the internal structure of the various isotopic beams. A second set of delay lines sets the relative timing of the 16 isotopic beam sections so they will telescope at the pellet, in one of multiple fusion chambers, e.g. 10. Shortening each isotopic beam section uses preservation of the µbunch structure up to the final ∼2 km drift before final focus. Just before the final drift, differential acceleration of the µbunches in each isotopic beam section (128 total) launches an axial collapse, referred to as the “Slick”. The µbunches interpenetrate as their centers of mass move toward each other and individual µbunches lengthen due to their momentum spread. In longitudinal phase space they slide over one another as they lengthen in time and slim down in instantaneous energy spread. The permissible amount of µbunch lengthening is set by the design pulse shape at the pellet, which varies for different groups of isotopes. In narrow bands of ranges according to the role for each isotope group in the pellet, the ranges extend from 1 to 10 g/cm 2 to drive the cylinder barrel and thin hemispherical end caps, to heat the ∼0.5 g/cm 2 ρR fast ignition zone, and to improve the quasi-sphericity of the compression of the fast ignition zones at the pellet's ends. Because the µbunch–µbunch momentum differences are correlated, time-ramped beamline transport elements close after the differential accelerator are used to correct the associated shifts of focal point. Beam neutralization is needed after the differential acceleration until adjacent bunches begin to overlap. Concurrent collapse of each isotope and telescoping of the 16 isotopes cause the current in each beamline to rise

  16. A correctness proof of sorting by means of formal procedures

    NARCIS (Netherlands)

    Fokkinga, M.M.

    1987-01-01

    We consider a recursive sorting algorithm in which, in each invocation, a new variable and a new procedure (using the variable globally) are defined and the procedure is passed to recursive calls. This algorithm is proved correct with Hoare-style pre- and postassertions. We also discuss the same

  17. Plea to lower English test pass marks for EEA nurses.

    Science.gov (United States)

    Longhurst, Chris

    2017-08-09

    Nurses from a group campaigning for the rights of EU citizens in the UK after Brexit are meeting the Nursing and Midwifery Council (NMC) to press for the pass mark for English language tests to be lowered.

  18. The relationships between rugby ground pass accuracy and ...

    African Journals Online (AJOL)

    Kathryn van Boom

    2 Department of Physiotherapy, School of Therapeutic Sciences, Faculty of. Health Sciences ... upper body kinematics of the players, specifically the rotations of the torso and ..... relationships between the body movements and pass accuracy ...

  19. A distributed lumped active all-pass network configuration.

    Science.gov (United States)

    Huelsman, L. P.; Raghunath, S.

    1972-01-01

    In this correspondence a new and interesting distributed lumped active network configuration that realizes an all-pass network function is described. A design chart for determining the values of the network elements is included.

  20. Number of Migration Scenarios Passing through each HUC (future)

    Data.gov (United States)

    U.S. Environmental Protection Agency — Forest dwelling neotropical migratory birds require intact forested stopovers during migration. The number of paths that pass through a HUC highlight that huc's...

  1. Number of Migration Scenarios Passing through each HUC

    Data.gov (United States)

    U.S. Environmental Protection Agency — Forest dwelling neotropical migratory birds require intact forested stopovers during migration. The number of paths that pass through a HUC highlight that huc's...

  2. Axioms for behavioural congruence of single-pass instruction sequences

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2017-01-01

    In program algebra, an algebraic theory of single-pass instruction sequences, three congruences on instruction sequences are paid attention to: instruction sequence congruence, structural congruence, and behavioural congruence. Sound and complete axiom systems for the first two congruences were

  3. Applicability estimation of flowmeter logging for detecting hydraulic pass

    International Nuclear Information System (INIS)

    Miyakawa, Kimio; Tanaka, Yasuji; Tanaka, Kazuhiro

    1997-01-01

    Estimation of the hydraulic pass governing hydrogeological structure contributes significantly to the siting HLW repository. Flowmeter logging can detect hydraulic passes by measuring vertical flow velocity of groundwater in the borehole. We reviewed application of this logging in situ. The hydraulic pass was detected with combination of ambient flow logging, with pumping and/or injecting induced flow logging. This application showed that the flowmeter logging detected hydraulic passes conveniently and accurately compared with other hydraulic tests. Hydraulic conductivity by using flowmeter logging was assessed above 10 -6 m/sec and within one order from comparison with injection packer tests. We suggest that appropriate application of the flowmeter logging for the siting is conducted before hydraulic tests because test sections and monitoring sections are decided rationally for procurement of quantitative hydraulic data. (author)

  4. Upaya Meningkatkan Kemampuan Passing Bawah Bola Voli Pada

    OpenAIRE

    Irawan, Dedi

    2017-01-01

    This research uses research "Classroom Action Research" (Classroom Action Research) with variables: Improved Passing Down volleyball through media modified rubber ball. Subjects in this study were fifth grade students of State Elementary School 23 Palus Hulu subdistrict Belimbing Melawi totaling 28 students. This research technique using test and measurement, a test with a grating instrument measuring learning outcomes passing down the volleyball game. Analysis of data using percentages. Thes...

  5. Battle of Kasserine Pass: Defeat is a Matter of Scale

    Science.gov (United States)

    2016-05-26

    a ga inst Germany in World War II ; some historians even go so far as to anticipate defeat in the first battles of all major Ameri can wars. Martin ...the battle of Kasserine Pass prove the conventional wisdom that America is doomed to defeat in its first battles? Martin Blumenson, a prominent...Much study of the battle of Kasserine Pass has been done since Martin Blumenson wrote the original history in 1966. The ULTRA and MAGIC intercepts

  6. Terrorismihirm sunnib muretsema kalleid mikrokiibiga passe / Andrus Karnau

    Index Scriptorium Estoniae

    Karnau, Andrus

    2005-01-01

    Alates 1. septembrist 2006 peavad kõik EL-i liikmesriigid hakkama väljastama mikrokiibiga varustatud passe, mille hinnaks võib kujuneda kuni 1000 krooni ja kehtivus lüheneb viiele aastale. Mikrokiip sisaldab inimese biomeetrilisi andmeid - esialgu vaid näokujutist, alates 2008. aastast näpujälgi ning hiljem ka andmeid silmaiirise ja juuksevärvi kohta. Lisa: Biomeetriline pass peidab intiimseid isikuandmeid. Kommenteerib Kohtuekspertiisi ja Kriminalistika Keskuse infojuht Aivar Pau

  7. Transient analysis of the double pass photovoltaic thermal solar collector

    International Nuclear Information System (INIS)

    Alfegi, Ebrahim M.; Sopian, Kamaruzzaman; Abakr, Yousif A.

    2006-01-01

    A mathematical model of a double pass photovoltaic thermal (PV/T) solar collector is reported in this work. It is composed of five couple unsteady nonlinear partial differential equations which are solved by using Gear implicit numerical scheme. That model was validated against experimental data and was found to accurately predict the temperature of the circulated air as well as the temperature distribution of every static elements in a two-pass PV/T solar collector.(Author)

  8. Getting your message out with social marketing.

    Science.gov (United States)

    Manoff, R K

    1997-09-01

    This article was based on a speech presented at a Plenary Session of the 1996 Annual Meeting of the American Society of Tropical Medicine and Hygiene. The address describes the nature of social marketing with examples and some lessons learned in developing countries. The earliest social marketers were Moses with the Ten Commandments of God and Indian religious authorities with fertility motifs inscribed on temple walls. Modern marketers of beer and snack food preempted the ancients and made social marketing more ingenious. The strategy shifted to supplying a product to satisfy a consumer want. Messages became a two-way process that minimized feedback shock. Focus groups were used to probe consumers' thoughts. Research must probe the total environment of the "problem." In Brazil, breast feeding promotions revealed that the perceived problem may not be the real problem, and there was no single magic solution. Most tropical disease prevention approaches do not rely on multistage strategies. The oral rehydration therapy (ORT) strategy became a world-wide model when strategists realized that the formula had to be easy to remember, diarrhea had to be recognized as a disease, and the function of ORT had to be clearly defined. The Bangladesh Social Marketing Campaign was successful in getting men to discuss family planning with their wives and establishing the family planning worker as a heroine. Effective messages must uncover points of resistance to the message. Public health advances in the 19th century were due to social policy to improve water supply, sanitation, and nutrition. The iodization of salt in Ecuador was possible with political will, public awareness, redirection of perception, and motivation of demand. Social marketing resources exist in all countries nowadays. Only medical and scientific professionals can promote concern about tropical diseases and raise the prevention priority on the public agenda.

  9. Electronic folklore among teenagers: SMS messages

    Directory of Open Access Journals (Sweden)

    Cvjetićanin Tijana

    2006-01-01

    Full Text Available The development of ICT media made way for a new form of folklore communication. Newly developed media, such as mobile phones, make it possible for their users to participate in electronically mediated communication, thus approaching the form of oral communication. The exchange of special type of SMS text messages represents a new way of transmitting contemporary folklore short forms. These messages use poetic language, they have standard style themes, patterns and formulas, and they form different genres and categories corresponding with already existing familiar folklore forms. The communication process that happens during the exchange of these messages also has folklore’s characteristics: it takes place within small groups, the communication is informal, the texts circulate in chain style, and undergo different transformation which generates the making of variants, etc. This form of electronic folklore is especially popular among teenagers, where it’s social functions and meanings are also most emphasized. Within this population, it adds to an older tradition of children’s written folklore poetry albums. Like poetry albums, SMS exchange influences the development of girls’ gender identity, providing also a socially defined channel for contacts between the sexes. It also functions as a mechanism of socialization and stratification within the group. At the same time, it creates a new field of meaning, which derives from the very media’s novelty and significance. In this sense, the exchange of SMS represents a symbolic act of acknowledging one’s belonging to the group of mobile telephone users. In this way, a new phenomenon is being symbolically processed through a new form of folklore.

  10. Real Time Assessment of Young Adults' Attitudes toward Tobacco Messages.

    Science.gov (United States)

    Hébert, Emily T; Vandewater, Elizabeth A; Businelle, Michael S; Harrell, Melissa B; Kelder, Steven H; Perry, Cheryl L

    2018-01-01

    We used ecological momentary assessment (EMA) to examine young adults' attitudes towards pro-tobacco messages encountered in real time and their association with intentions to use tobacco. Young adults (N = 92, ages 18-29) recorded sightings of marketing or social media related to tobacco in real time via mobile app for 28 days. Participants reported message characteristics, their attitudes towards the message, and intentions to use the depicted product for each submission. We used generalized linear mixed models to examine factors related to attitude towards message and intentions to use tobacco. Messages depicting e-cigarettes (p < .001) or hookah (p < .05) were associated with significantly more favorable attitudes compared with traditional cigarettes. Positive attitude towards the message was significantly associated with intention to use the depicted product (p < .001). Messages depicting e-cigarettes and hookah were significantly associated with higher intention to use. Message source was not significantly related to attitudes towards the message or product use intentions. Marketing featuring e-cigarettes and hookah is an important target for future regulation. Given that pro-tobacco and e-cigarette messages are prevalent online, future research should consider the Internet and social media as important venues for counter-marketing and intervention efforts.

  11. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

    KAUST Repository

    Elwhishi, Ahmed

    2013-05-01

    Multicopy routing strategies have been considered the most applicable approaches to achieve message delivery in Delay Tolerant Networks (DTNs). Epidemic routing and two-hop forwarding routing are two well-reported approaches for delay tolerant networks routing which allow multiple message replicas to be launched in order to increase message delivery ratio and/or reduce message delivery delay. This advantage, nonetheless, is at the expense of additional buffer space and bandwidth overhead. Thus, to achieve efficient utilization of network resources, it is important to come up with an effective message scheduling strategy to determine which messages should be forwarded and which should be dropped in case of buffer is full. This paper investigates a new message scheduling framework for epidemic and two-hop forwarding routing in DTNs, such that the forwarding/dropping decision can be made at a node during each contact for either optimal message delivery ratio or message delivery delay. Extensive simulation results show that the proposed message scheduling framework can achieve better performance than its counterparts.

  12. The religious message in action - a case study

    Directory of Open Access Journals (Sweden)

    René Gothóni

    1975-01-01

    Full Text Available We understand a religious message to be the product of a religious movement. In studying such a message, it is very much to the purpose to place it in the context in which it operates. The cultural and social context of a religious message is some religious movement. Hence, the message should be examined against that framework. Each message has a certain structure, and its detection is of prime importance. Messages are not only part of the tradition, but themselves unique in their respective communicative situations. Thus, in our view, structural analysis does not have analytical use-value unless the message's symbols are set into their communicative context. The aim of this paper is dual: On the one hand, we intend to analyze and clarify the structure of a religious message of the Laestadian movement, how the message operates, also how the members of that movement respond to the codes of the message, and what kind of functions it fulfills; on the other, to develop and test an analytical model which would combine structural and interactional analysis.

  13. Counselling young cannabis users by text message

    DEFF Research Database (Denmark)

    Laursen, Ditte

    2010-01-01

    This article presents the results of a study of two SMS services aimed at providing young people with information on cannabis and helping them to reduce their consumption of the drug. The attitude of the 12 participants in the study towards the SMS services is generally positive, but they prefer...... factual information to advice and counselling. The messages prompt reflection and awareness among the recipients, and their repetitive, serial nature plays a significant part in the process of change. This is especially true of the young people whose use of cannabis is recreational. For them, the SMS...

  14. Neuroscience and education: myths and messages.

    Science.gov (United States)

    Howard-Jones, Paul A

    2014-12-01

    For several decades, myths about the brain - neuromyths - have persisted in schools and colleges, often being used to justify ineffective approaches to teaching. Many of these myths are biased distortions of scientific fact. Cultural conditions, such as differences in terminology and language, have contributed to a 'gap' between neuroscience and education that has shielded these distortions from scrutiny. In recent years, scientific communications across this gap have increased, although the messages are often distorted by the same conditions and biases as those responsible for neuromyths. In the future, the establishment of a new field of inquiry that is dedicated to bridging neuroscience and education may help to inform and to improve these communications.

  15. Validation of the one pass measure for motivational interviewing competence.

    Science.gov (United States)

    McMaster, Fiona; Resnicow, Ken

    2015-04-01

    This paper examines the psychometric properties of the OnePass coding system: a new, user-friendly tool for evaluating practitioner competence in motivational interviewing (MI). We provide data on reliability and validity with the current gold-standard: Motivational Interviewing Treatment Integrity tool (MITI). We compared scores from 27 videotaped MI sessions performed by student counselors trained in MI and simulated patients using both OnePass and MITI, with three different raters for each tool. Reliability was estimated using intra-class coefficients (ICCs), and validity was assessed using Pearson's r. OnePass had high levels of inter-rater reliability with 19/23 items found from substantial to almost perfect agreement. Taking the pair of scores with the highest inter-rater reliability on the MITI, the concurrent validity between the two measures ranged from moderate to high. Validity was highest for evocation, autonomy, direction and empathy. OnePass appears to have good inter-rater reliability while capturing similar dimensions of MI as the MITI. Despite the moderate concurrent validity with the MITI, the OnePass shows promise in evaluating both traditional and novel interpretations of MI. OnePass may be a useful tool for developing and improving practitioner competence in MI where access to MITI coders is limited. Copyright © 2015. Published by Elsevier Ireland Ltd.

  16. Starting Off on the Best Foot: A Review of Message Framing and Message Tailoring, and Recommendations for the Comprehensive Messaging Strategy for Sustained Behavior Change.

    Science.gov (United States)

    Pope, J Paige; Pelletier, Luc; Guertin, Camille

    2018-09-01

    Health promotion programs represent a salient means through which physical activity promoters can cultivate positive health behavior change and maintenance. The messages communicated within these programs serve as an essential component as they are often used to convey valuable information, resources, or tools that facilitate health behavior initiation and sustained engagement. Identifying the most effective way to communicate health promotion information is, therefore, of considerable importance to ensuring that people not only attend to these messages, but also connect with and internalize the information conveyed within them. This paper was written to (1) summarize and evaluate the most prominent reviewed research approaches of message framing and tailoring to message design; and (2) offer a comprehensive messaging strategy to promote sustained health behavior change. A review of the literature demonstrated that a messaging strategy that has consistently led to healthy behavior change has yet to be identified. Furthermore, scholars have articulated that a multi-theoretical approach that places emphasis on facilitating motivation and healthy behavior change needs to be employed. Thus, this paper proposes and provides recommendations for employing the Comprehensive Messaging Strategy for Sustained Behavior Change (CMSSBC), which advocates tailoring messages to peoples' stage of change and framing them to focus on self-determined motives and intrinsic goals.

  17. Particle analysis on concentrated particle suspensions by transmission fluctuation spectrometry with band-pass filters: part 2. Experimental results

    International Nuclear Information System (INIS)

    Xu, Yamin; Shen, Jianqi; Cai, Xiaoshu; Riebel, Ulrich

    2010-01-01

    Transmission fluctuation spectrometry (TFS), as a new method of online and real-time particle analysis developed in recent years, can measure the particle size distribution and particle concentration simultaneously. In the preceding paper, high concentration effects on the TFS using band-pass filters were investigated by numerical simulation, and empirical expressions to correct the effects were obtained. This paper presents a study on the TFS measurements in which the particle concentration varies in a very wide dynamic range. Finally, reasonable results on both the particle size distribution and particle concentration are obtained by introducing empirical corrections into the inversion algorithm

  18. Corrections to primordial nucleosynthesis

    International Nuclear Information System (INIS)

    Dicus, D.A.; Kolb, E.W.; Gleeson, A.M.; Sudarshan, E.C.G.; Teplitz, V.L.; Turner, M.S.

    1982-01-01

    The changes in primordial nucleosynthesis resulting from small corrections to rates for weak processes that connect neutrons and protons are discussed. The weak rates are corrected by improved treatment of Coulomb and radiative corrections, and by inclusion of plasma effects. The calculations lead to a systematic decrease in the predicted 4 He abundance of about ΔY = 0.0025. The relative changes in other primoridal abundances are also 1 to 2%

  19. Persuasiveness of Anti-Smoking Messages: Self-Construal and Message Focus

    Science.gov (United States)

    Yang, Bo; Nan, Xiaoli; Zhao, Xinyan

    2017-01-01

    Purpose: The purpose of this paper is to examine the role of independent vs interdependent self-construal in non-smokers' responses to an anti-smoking message that focuses on either personal or relational consequences of smoking. Design/methodology/approach: Two web-based experimental studies were conducted among US college non-smokers. In the…

  20. (In-)Secure messaging with the Silent Circle instant messaging protocol

    NARCIS (Netherlands)

    Verschoor, S.R.; Lange, T.

    2016-01-01

    Silent Text, the instant messaging application by the company Silent Circle, provides its users with end-to-end encrypted communication on the Blackphone and other smartphones. The underlying protocol, SCimp, has received many extensions during the update to version 2, but has not been subjected to

  1. Language Implications for Advertising in International Markets: A Model for Message Content and Message Execution.

    Science.gov (United States)

    Beard, John; Yaprak, Attila

    A content analysis model for assessing advertising themes and messages generated primarily for United States markets to overcome barriers in the cultural environment of international markets was developed and tested. The model is based on three primary categories for generating, evaluating, and executing advertisements: rational, emotional, and…

  2. Comics: a medium for today's development messages.

    Science.gov (United States)

    Opilas, E A

    1978-03-01

    Filipino illustrated magazines, or the comics, may yet prove to be the most effective media, if not the most effective, for spreading the country's development messages. Long criticized by intellectuals and the social elite, the comics have been grossly underrated in their potential to inform, persuade, and even influence the life-style of the people. The government's Commission on Population (Popcom) has developed an information-education-communication program using the comics, among other media, to disseminate stories on family planning, responsible parenthood, and related topics. Its best quality is popular appeal, and for publishers and distribution outlets, the comics provide good business. A review of these materials shows that their themes reflect the following topics or issues: 1) population trends and consequences; 2) socioeconomic benefits of family planning; 3) customs which influence family planning; 4) family planning concepts; 5) family planning methods; 6) human sexuality and reproduction; 7) the husband-wife relationship; 8) guides for family planning motivation or communication; and 9) guides for teaching family planning. The materials were developed with 4 qualities in mind so as to attract audience or reader interest: simplicity, familiarity, realism, and attractiveness of materials. The consensus is that in the comics, population and development agencies may have found a "secret weapon" in getting these messages across, and that this new-found use for the illustrated magazines may be giving them a new respectability without in any way diminishing their popular appeal.

  3. Experimental effects of climate messages vary geographically

    Science.gov (United States)

    Zhang, Baobao; van der Linden, Sander; Mildenberger, Matto; Marlon, Jennifer R.; Howe, Peter D.; Leiserowitz, Anthony

    2018-05-01

    Social science scholars routinely evaluate the efficacy of diverse climate frames using local convenience or nationally representative samples1-5. For example, previous research has focused on communicating the scientific consensus on climate change, which has been identified as a `gateway' cognition to other key beliefs about the issue6-9. Importantly, although these efforts reveal average public responsiveness to particular climate frames, they do not describe variation in message effectiveness at the spatial and political scales relevant for climate policymaking. Here we use a small-area estimation method to map geographical variation in public responsiveness to information about the scientific consensus as part of a large-scale randomized national experiment (n = 6,301). Our survey experiment finds that, on average, public perception of the consensus increases by 16 percentage points after message exposure. However, substantial spatial variation exists across the United States at state and local scales. Crucially, responsiveness is highest in more conservative parts of the country, leading to national convergence in perceptions of the climate science consensus across diverse political geographies. These findings not only advance a geographical understanding of how the public engages with information about scientific agreement, but will also prove useful for policymakers, practitioners and scientists engaged in climate change mitigation and adaptation.

  4. The impact of cultural exposure and message framing on oral health behavior: Exploring the role of message memory

    Science.gov (United States)

    Brick, Cameron; McCully, Scout N.; Updegraff, John A.; Ehret, Phillip J.; Areguin, Maira A.; Sherman, David K.

    2015-01-01

    Background Health messages are more effective when framed to be congruent with recipient characteristics, and health practitioners can strategically decide on message features to promote adherence to recommended behaviors. We present exposure to United States (U.S.) culture as a moderator of the impact of gain- vs. loss-frame messages. Since U.S. culture emphasizes individualism and approach orientation, greater cultural exposure was expected to predict improved patient choices and memory for gain-framed messages, whereas individuals with less exposure to U.S. culture would show these advantages for loss-framed messages. Methods 223 participants viewed a written oral health message in one of three randomized conditions: gain-frame, loss-frame, or no-message control, and were given ten flosses. Cultural exposure was measured with the proportions of life spent and parents born in the U.S. At baseline and one week later, participants completed recall tests and reported recent flossing behavior. Results Message frame and cultural exposure interacted to predict improved patient decisions (increased flossing) and memory maintenance for the health message over one week. E.g., those with low cultural exposure who saw a loss-frame message flossed more. Incongruent messages led to the same flossing rates as no message. Memory retention did not explain the effect of message congruency on flossing. Limitations Flossing behavior was self-reported. Cultural exposure may only have practical application in either highly individualistic or collectivistic countries. Conclusions In healthcare settings where patients are urged to follow a behavior, asking basic demographic questions could allow medical practitioners to intentionally communicate in terms of gains or losses to improve patient decision making and treatment adherence. PMID:25654986

  5. Impact of Cultural Exposure and Message Framing on Oral Health Behavior: Exploring the Role of Message Memory.

    Science.gov (United States)

    Brick, Cameron; McCully, Scout N; Updegraff, John A; Ehret, Phillip J; Areguin, Maira A; Sherman, David K

    2016-10-01

    Health messages are more effective when framed to be congruent with recipient characteristics, and health practitioners can strategically choose message features to promote adherence to recommended behaviors. We present exposure to US culture as a moderator of the impact of gain-frame versus loss-frame messages. Since US culture emphasizes individualism and approach orientation, greater cultural exposure was expected to predict improved patient choices and memory for gain-framed messages, whereas individuals with less exposure to US culture would show these advantages for loss-framed messages. 223 participants viewed a written oral health message in 1 of 3 randomized conditions-gain-frame, loss-frame, or no-message control-and were given 10 flosses. Cultural exposure was measured with the proportions of life spent and parents born in the US. At baseline and 1 week later, participants completed recall tests and reported recent flossing behavior. Message frame and cultural exposure interacted to predict improved patient decisions (increased flossing) and memory maintenance for the health message over 1 week; for example, those with low cultural exposure who saw a loss-frame message flossed more. Incongruent messages led to the same flossing rates as no message. Memory retention did not explain the effect of message congruency on flossing. Flossing behavior was self-reported. Cultural exposure may only have practical application in either highly individualistic or collectivistic countries. In health care settings where patients are urged to follow a behavior, asking basic demographic questions could allow medical practitioners to intentionally communicate in terms of gains or losses to improve patient decision making and treatment adherence. © The Author(s) 2015.

  6. UDECON: deconvolution optimization software for restoring high-resolution records from pass-through paleomagnetic measurements

    Science.gov (United States)

    Xuan, Chuang; Oda, Hirokuni

    2015-11-01

    The rapid accumulation of continuous paleomagnetic and rock magnetic records acquired from pass-through measurements on superconducting rock magnetometers (SRM) has greatly contributed to our understanding of the paleomagnetic field and paleo-environment. Pass-through measurements are inevitably smoothed and altered by the convolution effect of SRM sensor response, and deconvolution is needed to restore high-resolution paleomagnetic and environmental signals. Although various deconvolution algorithms have been developed, the lack of easy-to-use software has hindered the practical application of deconvolution. Here, we present standalone graphical software UDECON as a convenient tool to perform optimized deconvolution for pass-through paleomagnetic measurements using the algorithm recently developed by Oda and Xuan (Geochem Geophys Geosyst 15:3907-3924, 2014). With the preparation of a format file, UDECON can directly read pass-through paleomagnetic measurement files collected at different laboratories. After the SRM sensor response is determined and loaded to the software, optimized deconvolution can be conducted using two different approaches (i.e., "Grid search" and "Simplex method") with adjustable initial values or ranges for smoothness, corrections of sample length, and shifts in measurement position. UDECON provides a suite of tools to view conveniently and check various types of original measurement and deconvolution data. Multiple steps of measurement and/or deconvolution data can be compared simultaneously to check the consistency and to guide further deconvolution optimization. Deconvolved data together with the loaded original measurement and SRM sensor response data can be saved and reloaded for further treatment in UDECON. Users can also export the optimized deconvolution data to a text file for analysis in other software.

  7. Countering Islamic State Messaging Through “Linkage-Based” Analysis

    Directory of Open Access Journals (Sweden)

    J.M. Berger

    2017-08-01

    Full Text Available The Islamic State’s recent losses on the battlefield, including significant casualties within its media and propaganda division, offer a unique opportunity to inject competing and alternative messages into the information space. This paper proposes that the content of such messages should be guided by a linkage-based analysis of existing Islamic State messaging. A linkage-based analysis of a top-level 2017 audio message by Islamic State spokesperson Abu Hasan al Muhajir offers several potential insights into crafting effective content for competing and alternative messages. A comparison of the 2017 work to earlier Islamic State messaging also reveals specific opportunities to undermine the credibility of the organisation’s broader propaganda programme by highlighting the organisation’s repeated failure to follow through on its extravagantly promised commitment to achieving its stated goals.

  8. The Message Logging System for NOνA Experiment

    International Nuclear Information System (INIS)

    Lu Qiming; Kowalkowski, J B; Biery, K A

    2011-01-01

    The message logging system provides the infrastructure for all of the distributed processes in the data acquisition (DAQ) to report status messages of various severities in a consistent manner to a central location, as well as providing the tools for displaying and archiving the messages. The message logging system has been developed over a decade, and has been run successfully on CDF and CMS experiments. The most recent work to the message logging system is to build it as a stand-alone package with the name MessageFacility which works for any generic framework or applications, with NOνA as the first driving user. System designs and architectures, as well as the efforts of making it a generic library will be discussed. We also present new features that have been added.

  9. VISUAL ART AND REGULATORY FIT MESSAGES ON CONSUMER EVALUATIONS

    Directory of Open Access Journals (Sweden)

    Danielle Mantovani

    2016-03-01

    Full Text Available In this study, we demonstrate that the art infusion effect, in which the presence of visual art causes a positive impact on consumers’ perceptions of products and advertising messages, might have a moderation effect on regulatory fit and non-fit messages. We investigate the impact of visual art on advertisement evaluations in regulatory (non- fit conditions. Regulatory focus theory suggests that consumers rely on their motivational focus (prevention vs. promotion for their evaluations and decisions. Usually, consumers prefer products that fit with their personal motivational focus. In the present study, the results of three experiments indicate that using visual art with a promotion or prevention fit message is recommended, while non-art images increase message persuasiveness when non-fit messages are presented. Therefore, not all information compatible with the consumer’s motivational focus are best evaluated. When non-art images are presented, non-fit messages might be more persuasive.

  10. RSA Key Development Using Fingerprint Image on Text Message

    Science.gov (United States)

    Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti

    2017-12-01

    Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.

  11. A Weld Position Recognition Method Based on Directional and Structured Light Information Fusion in Multi-Layer/Multi-Pass Welding

    Directory of Open Access Journals (Sweden)

    Jinle Zeng

    2018-01-01

    Full Text Available Multi-layer/multi-pass welding (MLMPW technology is widely used in the energy industry to join thick components. During automatic welding using robots or other actuators, it is very important to recognize the actual weld pass position using visual methods, which can then be used not only to perform reasonable path planning for actuators, but also to correct any deviations between the welding torch and the weld pass position in real time. However, due to the small geometrical differences between adjacent weld passes, existing weld position recognition technologies such as structured light methods are not suitable for weld position detection in MLMPW. This paper proposes a novel method for weld position detection, which fuses various kinds of information in MLMPW. First, a synchronous acquisition method is developed to obtain various kinds of visual information when directional light and structured light sources are on, respectively. Then, interferences are eliminated by fusing adjacent images. Finally, the information from directional and structured light images is fused to obtain the 3D positions of the weld passes. Experiment results show that each process can be done in 30 ms and the deviation is less than 0.6 mm. The proposed method can be used for automatic path planning and seam tracking in the robotic MLMPW process as well as electron beam freeform fabrication process.

  12. A Weld Position Recognition Method Based on Directional and Structured Light Information Fusion in Multi-Layer/Multi-Pass Welding.

    Science.gov (United States)

    Zeng, Jinle; Chang, Baohua; Du, Dong; Wang, Li; Chang, Shuhe; Peng, Guodong; Wang, Wenzhu

    2018-01-05

    Multi-layer/multi-pass welding (MLMPW) technology is widely used in the energy industry to join thick components. During automatic welding using robots or other actuators, it is very important to recognize the actual weld pass position using visual methods, which can then be used not only to perform reasonable path planning for actuators, but also to correct any deviations between the welding torch and the weld pass position in real time. However, due to the small geometrical differences between adjacent weld passes, existing weld position recognition technologies such as structured light methods are not suitable for weld position detection in MLMPW. This paper proposes a novel method for weld position detection, which fuses various kinds of information in MLMPW. First, a synchronous acquisition method is developed to obtain various kinds of visual information when directional light and structured light sources are on, respectively. Then, interferences are eliminated by fusing adjacent images. Finally, the information from directional and structured light images is fused to obtain the 3D positions of the weld passes. Experiment results show that each process can be done in 30 ms and the deviation is less than 0.6 mm. The proposed method can be used for automatic path planning and seam tracking in the robotic MLMPW process as well as electron beam freeform fabrication process.

  13. High-precision GNSS ocean positioning with BeiDou short-message communication

    Science.gov (United States)

    Li, Bofeng; Zhang, Zhiteng; Zang, Nan; Wang, Siyao

    2018-04-01

    The current popular GNSS RTK technique would be not applicable on ocean due to the limited communication access for transmitting differential corrections. A new technique is proposed for high-precision ocean RTK, referred to as ORTK, where the corrections are transmitted by employing the function of BeiDou satellite short-message communication (SMC). To overcome the limitation of narrow bandwidth of BeiDou SMC, a new strategy of simplifying and encoding corrections is proposed instead of standard differential corrections, which reduces the single-epoch corrections from more than 1000 to less than 300 bytes. To solve the problems of correction delays, cycle slips, blunders and abnormal epochs over ultra-long baseline ORTK, a series of powerful algorithms were designed at the user-end software for achieving the stable and precise kinematic solutions on far ocean applications. The results from two long baselines of 240 and 420 km and real ocean experiments reveal that the kinematic solutions with horizontal accuracy of 5 cm and vertical accuracy of better than 15 cm are achievable by convergence time of 3-10 min. Compared to commercial ocean PPP with satellite telecommunication, ORTK is of much cheaper expense, higher accuracy and shorter convergence. It will be very prospective in many location-based ocean services.

  14. STRUCTURAL BREAKS AND BILATERAL EXCHANGE RATE PASS-THROUGH: AN EMPIRICAL CASE OF INDONESIA–UNITED STATES

    Directory of Open Access Journals (Sweden)

    Arintoko Arintoko

    2011-06-01

    Full Text Available This study estimates the exchange rate pass-through into domestic prices in Indonesia in the two-stage approach. The study focuses on first step pass-through, i.e. ERPT into import prices and second step pass-through, i.e. into consumer prices, using cointegration and error-correction mechanism (ECM model. This research uses a Zivot-Andrews technique to test for structural breaks and Gregory-Hansen models to tests. The results show that the long run ERPT to import prices with structural breaks is relatively low compared to the results without them. The absolut error correction term values resulted from cointegration are decreased and the error-correction models need period lagged longer than one-period if the estimation included the estimated structural breaks. The main finding is that allowing for possible breaks around the crises in Indonesia, and a shift of the exchange rate management from managed to free floating in 1997 helps to restore a long run cointegration relationship estimation.

  15. Tendency to Message Delivery in Internet Viral Marketing

    OpenAIRE

    Mostafa Ghazizadeh; Ahmad Sardari; Seyyed Reza Shojaee; Mehdi Samizadeh

    2011-01-01

    Abstract The main goal of this research is to review and determine the factors associated with tendency to forward the marketing messages in viral marketing plans of Fast-food industries. In other words, in this study, the effects of three critical determinants, i.e. commercial intention, attractiveness, and media richness have been examined on receivers' intention to forward marketing message in Tehran, Isfahan and Shiraz. Findings imply that receivers’ attitude toward the message has pos...

  16. Error message recording and reporting in the SLC control system

    International Nuclear Information System (INIS)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-01-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed

  17. Error message recording and reporting in the SLC control system

    International Nuclear Information System (INIS)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-04-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed

  18. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  19. Attitudinal Factors Affecting Viral Advertising Pass-On Behaviour of Online Consumers in Food Industry

    Science.gov (United States)

    Mohd Salleh, Nurhidayah; Ariff, Mohd Shoki Md; Zakuan, Norhayati; Sulaiman, Zuraidah; Zameri Mat Saman, Muhamad

    2016-05-01

    The increase number of active users of social media, especially Facebook, stimulates viral advertising behaviour among them, thus attracting e-marketers to focus on viral advertising in promoting their products. In global market, use of Facebook platform indicated that food services/restaurant of food industry is ranked number 11 with 18.8% users’ response rate within the platform. This development calls for e-marketers in Malaysia to use Facebook as their viral advertising channel. Attitudinal factors affecting the viral advertising pass-on behaviour (VAPB) especially among members of social media is of interest to many researchers. The typical attitudinal factors used were attitude toward social media (ATSM), attitude toward advertising in social media (AASM) and attitude toward advertising in general (AAIG). Attitude toward advertised brand (ATAB) is important in fast food industry because users of social media tend to share their experience about tastes and features of the food. However, ATAB is less emphasized in the conceptual model between attitudinal factors and VAPB. These four factors of consumer attitude served as independent variables in the conceptual model of this study and their effect on viral advertising pass-on behaviour among members of Domino's Pizza Malaysia Facebook page was examined. Online survey using a set of questionnaire which was sent to the members of this group via private message was employed. A total of 254 sets of usable questionnaires were collected from the respondents. All the attitudinal factors, except for AASM, were found to have positive and significant effect on VAPB. AAIG exerted the strongest effect on VAPB. Therefore, e-marketers should emphasize on developing a favourable attitude toward advertising in general among members of a social media to get them involve in viral advertising. In addition, instilling a favourable attitude towards advertised brand is also vital as it influences the members to viral the brand

  20. Subjective knowledge and fear appeal effectiveness: implications for message design.

    Science.gov (United States)

    Nabi, Robin L; Roskos-Ewoldsen, David; Carpentier, Francesca Dillman

    2008-01-01

    This research investigates the role of perceived health knowledge on the effectiveness of fear-based persuasive appeals. Undergraduates (N = 263) read a strong fear, weak fear, or efficacy-only message encouraging breast or testicular self-examination. As expected, results indicated that men high in subjective knowledge were less reactant and more persuaded by the efficacy-only message whereas those low in subjective knowledge did not evidence this pattern. Contrary to expectation, women high in subjective knowledge had comparable reactions to each of the 3 messages. Implications for fear appeal theory and message design are discussed.

  1. Motivating Smoking Cessation Text Messages: Perspectives from Pregnant Smokers.

    Science.gov (United States)

    Schindler-Ruwisch, Jennifer M; Leavitt, Leah E; Macherelli, Laura E; Turner, Monique M; Abroms, Lorien C

    2018-06-01

    The purpose of this research is to analyze cessation text-messages written by pregnant smokers to elucidate the target population's preferred content and message attributes. To achieve this goal, the objectives of this study are three-fold; to qualitatively code messages written by pregnant smokers for frame, type of appeal, and intended target. Study participants were recruited as part of a larger trial of pregnant smokers who were enrolled in a text-messaging program or control group and surveyed 1 month post-enrollment. Each participant was asked to write a brief message to another pregnant smoker and two independent coders qualitatively analyzed responses. User generated messages (N = 51) were equally loss and gain framed, and the most common appeals were: fear, guilt, cognitive, hope and empathy, in order of most to least frequent. The target of the majority of the messages was the baby. Allowing pregnant smokers to write cessation text-messages for other pregnant women can provide relevant insight into intervention content. Specifically, pregnant smokers appear to equally promote gain and loss frames, but may prefer messages that include components of fear and guilt related to the impact of smoking on their baby. Additional research is needed to systematically uncover perspectives of pregnant smokers to ensure interventions are optimally effective.

  2. Creating Effective Media Messaging for Rural Smoke-free Policy.

    Science.gov (United States)

    Riker, Carol A; Butler, Karen M; Ricks, JaNelle M; Record, Rachael A; Begley, Kathy; Anderson, Debra Gay; Hahn, Ellen J

    2015-01-01

    Objectives were to (1) explore perceived effectiveness of existing smoke-free print advertisements in rural communities and (2) generate message content, characteristics, and media delivery channels that resonate with residents. Qualitative methods design. Thirty-nine rural adults recruited by community partners. Content analysis of findings from individuals in four focus groups who participated in general discussion and reviewed eight print ads related to secondhand smoke (SHS) and smoke-free policy. Six content themes were identified: smoking/SHS dangers, worker health, analogies, economic impact, rights, and nostalgia. Seven message characteristics were recognized: short/to the point, large enough to read, graphic images, poignant stories, statistics/charts/graphs, message sender, and messages targeting different groups. Four media delivery channels were considered most effective: local media, technology, billboard messages, and print materials. Seeking input from key informants is essential to reaching rural residents. Use of analogies in media messaging is a distinct contribution to the literature on effective smoke-free campaigns. Other findings support previous studies of effective messaging and delivery channels. Further research is needed to examine effectiveness of themes related to message content in smoke-free ads and delivery strategies. Effective media messaging can lead to policy change in rural communities to reduce exposure to SHS. © 2015 Wiley Periodicals, Inc.

  3. Bidirectional Text Messaging to Improve Adherence to Recommended Lipid Testing.

    Science.gov (United States)

    Baldwin, Laura-Mae; Morrison, Caitlin; Griffin, Jonathan; Anderson, Nick; Edwards, Kelly; Green, Jeff; Waldren, Cleary; Reiter, William

    2017-01-01

    Synergies between technology and health care in the United States are accelerating, increasing opportunities to leverage these technologies to improve patient care. This study was a collaboration between an academic study team, a rural primary care clinic, and a local nonprofit informatics company developing tools to improve patient care through population management. Our team created a text messaging management tool, then developed methods for and tested the feasibility of bidirectional text messaging to remind eligible patients about the need for lipid testing. We measured patient response to the text messages, then interviewed 8 patients to explore their text messaging experience. Of the 129 patients the clinic was able to contact by phone, 29.4% had no cell phone or text-messaging capabilities. An additional 20% refused to participate. Two thirds of the 28 patients who participated in the text messaging intervention (67.9%) responded to at least 1 of the up to 3 messages. Seven of 8 interviewed patients had a positive text-messaging experience. Bidirectional text messaging is a feasible and largely acceptable form of communication for test reminders that has the potential to reach large numbers of patients in clinical care. © Copyright 2017 by the American Board of Family Medicine.

  4. Mental health message appeals and audience engagement: Evidence from Australia.

    Science.gov (United States)

    Yap, Jo En; Zubcevic-Basic, Nives; Johnson, Lester W; Lodewyckx, Michaela A

    2017-09-07

    Social media platforms are increasingly used to disseminate social marketing messages about mental health and wellbeing. This study presents a range of message appeals used in social media enabled mental health promotion and stigma reduction messages. Furthermore, it examines the relationship between the type of message appeals and audience engagement. A content analysis of 65 organisation-generated YouTube videos about depression and anxiety and stigma reduction was conducted. The most utilised message appeal was Sorrow, followed by Affiliation, Ease/Convenience, Hope, Humour, Guilt/Shame, Heroic/Successful, and Fear. Multiple regression analysis was used to examine the relationship between the type of message appeals and audience engagement in terms of the number of likes, comments, and shares. The analysis revealed that Sorrow is the most useful message appeal for generating audience comments. However, Sorrow is negatively associated with the number of likes and shares. The results suggest that mental health promotion messages may engage a larger audience through Affiliation and Hope as they have a positive impact on the number of shares. This could, in effect, turn audiences into vocal advocates for mental health promotion and stigma reduction messages. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. Security analysis and improvements to the PsychoPass method.

    Science.gov (United States)

    Brumen, Bostjan; Heričko, Marjan; Rozman, Ivan; Hölbl, Marko

    2013-08-13

    In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength.

  6. A prototype for the PASS Permanent All Sky Survey

    Science.gov (United States)

    Deeg, H. J.; Alonso, R.; Belmonte, J. A.; Horne, K.; Alsubai, K.; Collier Cameron, A.; Doyle, L. R.

    2004-10-01

    A prototype system for the Permanent All Sky Survey (PASS) project is presented. PASS is a continuous photometric survey of the entire celestial sphere with a high temporal resolution. Its major objectives are the detection of all giant-planet transits (with periods up to some weeks) across stars up to mag 10.5, and to deliver continuously photometry that is useful for the study of any variable stars. The prototype is based on CCD cameras with short focal length optics on a fixed mount. A small dome to house it at Teide Observatory, Tenerife, is currently being constructed. A placement at the antarctic Dome C is also being considered. The prototype will be used for a feasibility study of PASS, to define the best observing strategies, and to perform a detailed characterization of the capabilities and scope of the survey. Afterwards, a first partial sky surveying will be started with it. That first survey may be able to detect transiting planets during its first few hundred hours of operation. It will also deliver a data set around which software modules dealing with the various scientific objectives of PASS will be developed. The PASS project is still in its early phase and teams interested in specific scientific objectives, in providing technical expertise, or in participating with own observations are invited to collaborate.

  7. Regenerative beam breakup in multi-pass electron accelerators

    International Nuclear Information System (INIS)

    Vetter, A.M. Jr.

    1980-01-01

    Important electron coincidence experiments in the 1 to 2 GeV range require electron beams of high intensity and high duty factor. To provide such beams, multi-pass electron accelerator systems are being developed at many laboratories. The beam current in multi-pass electron machines is limited by bean breakup which arises from interaction of the electron beam with deflection modes of the accelerator structure. Achieving high beam intensity (50 to 100 μA) will require detailed understanding and careful control of beam breakup phenomena, and is the subject of this thesis. The TM 11 -like traveling wave theory is applied to obtain a physical understanding of beam-mode interactions and the principles of focussing in simple two-pass systems, and is used as a basis for general studies of the dependence of starting current on accelerator parameters in systems of many passes. The concepts developed are applied in analyzing beam breakup in the superconducting recyclotron at Stanford. Measurements of beam interactions with selected breakup modes are incorporated in a simple model in order to estimate relative strengths of breakup modes and to predict starting currents in five-pass operation. The improvement over these predicted currents required in order to obtain 50 to 100 μA beams is shown to be achievable with a combination of increased breakup mode loading and improved beam optics

  8. Publisher Correction: Predicting unpredictability

    Science.gov (United States)

    Davis, Steven J.

    2018-06-01

    In this News & Views article originally published, the wrong graph was used for panel b of Fig. 1, and the numbers on the y axes of panels a and c were incorrect; the original and corrected Fig. 1 is shown below. This has now been corrected in all versions of the News & Views.

  9. Methods of orbit correction system optimization

    International Nuclear Information System (INIS)

    Chao, Yu-Chiu.

    1997-01-01

    Extracting optimal performance out of an orbit correction system is an important component of accelerator design and evaluation. The question of effectiveness vs. economy, however, is not always easily tractable. This is especially true in cases where betatron function magnitude and phase advance do not have smooth or periodic dependencies on the physical distance. In this report a program is presented using linear algebraic techniques to address this problem. A systematic recipe is given, supported with quantitative criteria, for arriving at an orbit correction system design with the optimal balance between performance and economy. The orbit referred to in this context can be generalized to include angle, path length, orbit effects on the optical transfer matrix, and simultaneous effects on multiple pass orbits

  10. PENINGKATAN HASIL BELAJAR PASSING SEPAK BOLA MELALUI PERMAINAN PEMBURU BINATANG

    Directory of Open Access Journals (Sweden)

    Agung Setiawan

    2015-10-01

    Full Text Available The purpose of this study was to determine the learning outcome approach passing through playing soccer Beast Hunter on fourth grade students of SD Negeri Batuagung 1 Balapulang District of Tegal 2014. This study was conducted in PTK SD Negeri Batuagung 1 Balapulang District of Tegal, the samples in this study were fourth graders, amounting to 24 students. This research method is Classroom Action Research. This study uses 2 cycles. The results showed that the learning outcomes passing football played by using the approach of animals hunters have a positive impact as seen on mastery learning outcomes of students who exceed the predetermined KKM 75 has increased the mastery learning in the first cycle reaches 70.83%, while the second cycle mastery learning reaches 95.83%. It is concluded that learning football passing play tracker approach has a positive impact, which can improve learning outcomes, interest and motivation to learn.

  11. A one-way text messaging intervention for obesity.

    Science.gov (United States)

    Ahn, Ahleum; Choi, Jaekyung

    2016-04-01

    Worldwide, there has been a startling increase in the number of people who are obese or overweight. Obesity increases the risk of cardiovascular disease and overall mortality. Mobile phone messaging is an important means of human communication globally. Because the mobile phone can be used anywhere at any time, mobile phone messaging has the potential to manage obesity. We investigated the effectiveness of a one-way text messaging intervention for obesity. Participants' body mass index and waist circumference were measured at the beginning of the programme and again after 12 weeks. The text message group received text messages about exercise, dietary intake, and general information about obesity three times a week, while the control group did not receive any text messages from the study. Of the 80 participants, 25 subjects in the text message group and 29 participants in the control group completed the study. After adjusting for baseline body mass index, the body mass index was significantly lower in the text message group than in the control group (27.9 vs. 28.3; p = 0.02). After adjusting for the baseline waist circumference, the difference of waist circumference between the text message group and control group was not significant (93.4 vs. 94.6; p = 0.13). The one-way text messaging intervention was a simple and effective way to manage obesity. The one-way text messaging intervention may be a useful method for lifestyle modification in obese subjects. © The Author(s) 2015.

  12. A practical procedure to improve the accuracy of radiochromic film dosimetry. A integration with a correction method of uniformity correction and a red/blue correction method

    International Nuclear Information System (INIS)

    Uehara, Ryuzo; Tachibana, Hidenobu; Ito, Yasushi; Yoshino, Shinichi; Matsubayashi, Fumiyasu; Sato, Tomoharu

    2013-01-01

    It has been reported that the light scattering could worsen the accuracy of dose distribution measurement using a radiochromic film. The purpose of this study was to investigate the accuracy of two different films, EDR2 and EBT2, as film dosimetry tools. The effectiveness of a correction method for the non-uniformity caused from EBT2 film and the light scattering was also evaluated. In addition the efficacy of this correction method integrated with the red/blue correction method was assessed. EDR2 and EBT2 films were read using a flatbed charge-coupled device scanner (EPSON 10000 G). Dose differences on the axis perpendicular to the scanner lamp movement axis were within 1% with EDR2, but exceeded 3% (Maximum: +8%) with EBT2. The non-uniformity correction method, after a single film exposure, was applied to the readout of the films. A corrected dose distribution data was subsequently created. The correction method showed more than 10%-better pass ratios in dose difference evaluation than when the correction method was not applied. The red/blue correction method resulted in 5%-improvement compared with the standard procedure that employed red color only. The correction method with EBT2 proved to be able to rapidly correct non-uniformity, and has potential for routine clinical intensity modulated radiation therapy (IMRT) dose verification if the accuracy of EBT2 is required to be similar to that of EDR2. The use of red/blue correction method may improve the accuracy, but we recommend we should use the red/blue correction method carefully and understand the characteristics of EBT2 for red color only and the red/blue correction method. (author)

  13. [A practical procedure to improve the accuracy of radiochromic film dosimetry: a integration with a correction method of uniformity correction and a red/blue correction method].

    Science.gov (United States)

    Uehara, Ryuzo; Tachibana, Hidenobu; Ito, Yasushi; Yoshino, Shinichi; Matsubayashi, Fumiyasu; Sato, Tomoharu

    2013-06-01

    It has been reported that the light scattering could worsen the accuracy of dose distribution measurement using a radiochromic film. The purpose of this study was to investigate the accuracy of two different films, EDR2 and EBT2, as film dosimetry tools. The effectiveness of a correction method for the non-uniformity caused from EBT2 film and the light scattering was also evaluated. In addition the efficacy of this correction method integrated with the red/blue correction method was assessed. EDR2 and EBT2 films were read using a flatbed charge-coupled device scanner (EPSON 10000G). Dose differences on the axis perpendicular to the scanner lamp movement axis were within 1% with EDR2, but exceeded 3% (Maximum: +8%) with EBT2. The non-uniformity correction method, after a single film exposure, was applied to the readout of the films. A corrected dose distribution data was subsequently created. The correction method showed more than 10%-better pass ratios in dose difference evaluation than when the correction method was not applied. The red/blue correction method resulted in 5%-improvement compared with the standard procedure that employed red color only. The correction method with EBT2 proved to be able to rapidly correct non-uniformity, and has potential for routine clinical IMRT dose verification if the accuracy of EBT2 is required to be similar to that of EDR2. The use of red/blue correction method may improve the accuracy, but we recommend we should use the red/blue correction method carefully and understand the characteristics of EBT2 for red color only and the red/blue correction method.

  14. Delay Bound: Fractal Traffic Passes through Network Servers

    Directory of Open Access Journals (Sweden)

    Ming Li

    2013-01-01

    Full Text Available Delay analysis plays a role in real-time systems in computer communication networks. This paper gives our results in the aspect of delay analysis of fractal traffic passing through servers. There are three contributions presented in this paper. First, we will explain the reasons why conventional theory of queuing systems ceases in the general sense when arrival traffic is fractal. Then, we will propose a concise method of delay computation for hard real-time systems as shown in this paper. Finally, the delay computation of fractal traffic passing through severs is presented.

  15. A double-pass interferometer for measurement of dimensional changes

    International Nuclear Information System (INIS)

    Ren, Dongmei; Lawton, K M; Miller, J A

    2008-01-01

    A double-pass interferometer was developed for measuring dimensional changes of materials in a nanoscale absolute interferometric dilatometer. This interferometer realized the double-ended measurement of a sample using a single-detection double-pass interference system. The nearly balanced design, in which the measurement beam and the reference beam have equal optical path lengths except for the path difference caused by the sample itself, makes this interferometer have high stability, which is verified by the measurement of a quasi-zero-length sample. The preliminary experiments and uncertainty analysis show that this interferometer should be able to measure dimensional changes with characteristic uncertainty at the nanometer level

  16. Loss of European silver eel passing a hydropower station

    DEFF Research Database (Denmark)

    Pedersen, Michael Ingemann; Jepsen, Niels; Aarestrup, Kim

    2012-01-01

    The aim of this study was to assess escapement success of silver eels, Anguilla anguilla (L.), in a lowland river while passing a reservoir and a hydropower station. It was hypothesized that passage success would be lowest at the hydropower station and that survival and migration speed would...... that within the study period, only 23% of the tagged eels reached the tidal limit, mainly due to difficulties in passing the hydropower dam. With such high loss-rates, the escapement goals set in the management plan cannot be achieved...

  17. Individual differences in drivers' cognitive processing of road safety messages.

    Science.gov (United States)

    Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M

    2013-01-01

    Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message

  18. Refusals and Rejections: Designing Messages to Serve Multiple Goals.

    Science.gov (United States)

    Saeki, Mimako; O'Keefe, Barbara J.

    1994-01-01

    Tests a rational model of the elaboration of themes found in rejection messages, using Japanese and American participants. Finds partial support for the initial rational model but notes two key revisions: identifies two new themes in rejection messages and suggests substantial differences in the way Americans and Japanese elaborate themes to serve…

  19. Identifying spam e-mail messages using an intelligence algorithm

    Directory of Open Access Journals (Sweden)

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  20. Tracing How Normative Messages May Influence Physical Activity Intention.

    Science.gov (United States)

    van Bavel, René; Esposito, Gabriele; Baranowski, Tom; Duch-Brown, Néstor

    2017-04-01

    Normative messages have been shown to increase intention to do physical activity. We traced how "positive" and "negative" normative messages influenced physical activity intention by comparing constructs of the model of goal-directed behavior with descriptive norms (MGDB + DNs) across control and treatment groups in an experiment. For this purpose, 16-24-year-old respondents (n = 1,200) in Bulgaria, Croatia, and Romania were asked about their age, sex, and levels of physical activity before being exposed to positive and negative normative messages and completing a questionnaire with MGDB + DNs scales. Different MGDB + DNs constructs were influenced by the normative messages: compared with the control, the negative message group showed stronger attitudes (p = .003) and the positive message group showed higher positive anticipated emotions (p = .005). The positive message's effect is consistent with the literature on conformity to social norms. The negative message's effect lends itself to interpretations based on social identity and deviance regulation theories.

  1. Advertising Message Customisation/Standardisation And Corporate And Consumer Culture

    Directory of Open Access Journals (Sweden)

    Cristea Sanda Ligia

    2015-11-01

    Full Text Available Advertising translators should be familiarised with the cultural conventions in the target market so that they can re-create the message conveyed in ads. However, advertising message adaptation depends not only on the customer profile but also on corporate culture. The paper focuses on the correlation between these elements and the linguistic choices made by some copywriters.

  2. Preferred breast cancer message sources and frames amongst ...

    African Journals Online (AJOL)

    This descriptive study set out to verify the Kenyan women's knowledge of the various risk factors associated with breast cancer, their preferred framing of the breast cancer messages and their preferred channels for receiving those messages. Three hundred and ninety-three (393) women aged 20-64 years from the Kisumu ...

  3. Children's Text Messaging: Abbreviations, Input Methods and Links with Literacy

    Science.gov (United States)

    Kemp, N.; Bushnell, C.

    2011-01-01

    This study investigated the effects of mobile phone text-messaging method (predictive and multi-press) and experience (in texters and non-texters) on children's textism use and understanding. It also examined popular claims that the use of text-message abbreviations, or "textese" spelling, is associated with poor literacy skills. A sample of 86…

  4. College Students' Text Messaging, Use of Textese and Literacy Skills

    Science.gov (United States)

    Drouin, M. A.

    2011-01-01

    In this study, I examined reported frequency of text messaging, use of textese and literacy skills (reading accuracy, spelling and reading fluency) in a sample of American college students. Participants reported using text messaging, social networking sites and textese more often than was reported in previous (2009) research, and their frequency…

  5. The Message Is the Massage: Orality and Literacy Once More.

    Science.gov (United States)

    Brandt, Deborah

    1989-01-01

    Reappraises conventional distinctions between oral-like and literate-like discourse, particularly Tannen's distinction between involvement focus and message focus. Treats message as an embodiment of involvement, and cohesion as an aspect of a developing writer-reader relationship. Offers speculations for rethinking "literate…

  6. Emotional Responses to Environmental Messages and Future Behavioral Intentions

    Science.gov (United States)

    Perrin, Jeffrey L.

    2011-01-01

    The present research investigated effects of message framing (losses-framed or gains-framed), message modality (video with text or text-only) and emotional arousal on environmentally responsible behavioral intentions. The sample consisted of 161 college students. The present research did not find a significant difference in behavioral intentions…

  7. Instant messaging at the hospital: supporting articulation work?

    Science.gov (United States)

    Iversen, Tobias Buschmann; Melby, Line; Toussaint, Pieter

    2013-09-01

    Clinical work is increasingly fragmented and requires extensive articulation and coordination. Computer systems may support such work. In this study, we investigate how instant messaging functions as a tool for supporting articulation work at the hospital. This paper aims to describe the characteristics of instant messaging communication in terms of number and length of messages, distribution over time, and the number of participants included in conversations. We also aim to determine what kind of articulation work is supported by analysing message content. Analysis of one month's worth of instant messages sent through the perioperative coordination and communication system at a Danish hospital. Instant messaging was found to be used extensively for articulation work, mostly through short, simple conversational exchanges. It is used particularly often for communication concerning the patient, specifically, the coordination and logistics of patient care. Instant messaging is used by all actors involved in the perioperative domain. Articulation work and clinical work are hard to separate in a real clinical setting. Predefined messages and strict workflow design do not suffice when supporting communication in the context of collaborative clinical work. Flexibility is of vital importance, and this needs to be reflected in the design of supportive communication systems. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  8. Persuasion with Unintelligible Messages: A Cognitive Response Analysis.

    Science.gov (United States)

    Padgett, Vernon R.; Brock, Timothy C.

    Theories of persuasion have long assumed a process which includes comprehension of the message by the recipient. Several hundred undergraduates at Ohio State University and Marshall University (Ohio) participated in six experiments examining persuasion and the use of unintelligible messages. Subjects in individual cubicles of a university language…

  9. Moving from gamma passing rates to patient DVH-based QA metrics in pretreatment dose QA

    Energy Technology Data Exchange (ETDEWEB)

    Zhen, Heming; Nelms, Benjamin E.; Tome, Wolfgang A. [Department of Medical Physics, University of Wisconsin, Madison, Wisconsin 53705 (United States); Department of Human Oncology, University of Wisconsin, Madison, Wisconsin 53792 and Canis Lupus LLC, Merrimac, Wisconsin 53561 (United States); Department of Medical Physics, University of Wisconsin, Madison, Wisconsin 53705 and Department of Human Oncology, University of Wisconsin, Madison, Wisconsin 53792 (United States)

    2011-10-15

    Purpose: The purpose of this work is to explore the usefulness of the gamma passing rate metric for per-patient, pretreatment dose QA and to validate a novel patient-dose/DVH-based method and its accuracy and correlation. Specifically, correlations between: (1) gamma passing rates for three 3D dosimeter detector geometries vs clinically relevant patient DVH-based metrics; (2) Gamma passing rates of whole patient dose grids vs DVH-based metrics, (3) gamma passing rates filtered by region of interest (ROI) vs DVH-based metrics, and (4) the capability of a novel software algorithm that estimates corrected patient Dose-DVH based on conventional phan-tom QA data are analyzed. Methods: Ninety six unique ''imperfect'' step-and-shoot IMRT plans were generated by applying four different types of errors on 24 clinical Head/Neck patients. The 3D patient doses as well as the dose to a cylindrical QA phantom were then recalculated using an error-free beam model to serve as a simulated measurement for comparison. Resulting deviations to the planned vs simulated measured DVH-based metrics were generated, as were gamma passing rates for a variety of difference/distance criteria covering: dose-in-phantom comparisons and dose-in-patient comparisons, with the in-patient results calculated both over the whole grid and per-ROI volume. Finally, patient dose and DVH were predicted using the conventional per-beam planar data as input into a commercial ''planned dose perturbation'' (PDP) algorithm, and the results of these predicted DVH-based metrics were compared to the known values. Results: A range of weak to moderate correlations were found between clinically relevant patient DVH metrics (CTV-D95, parotid D{sub mean}, spinal cord D1cc, and larynx D{sub mean}) and both 3D detector and 3D patient gamma passing rate (3%/3 mm, 2%/2 mm) for dose-in-phantom along with dose-in-patient for both whole patient volume and filtered per-ROI. There was

  10. Short message service or disService: issues with text messaging in a complex medical environment.

    Science.gov (United States)

    Wu, Robert; Appel, Lora; Morra, Dante; Lo, Vivian; Kitto, Simon; Quan, Sherman

    2014-04-01

    Hospitals today are experiencing major changes in their clinical communication workflows as conventional numeric paging and face-to-face verbal conversations are being replaced by computer mediated communication systems. In this paper, we highlight the importance of understanding this transition and discuss some of the impacts that may emerge when verbal clinical conversations are replaced by short text messages. In-depth interviews (n=108) and non-participatory observation sessions (n=260h) were conducted on the General Internal Medicine wards at five academic teaching hospitals in Toronto, Canada. From our analysis of the qualitative data, we identified two major themes. De-contextualization of complex issues led to an increase in misinterpretation and an increase in back and forth messaging for clarification. Depersonalization of communication was due to less verbal conversations and face-to-face interactions and led to a negative impact on work relationships. Text-based communication in hospital settings led to the oversimplification of messages and the depersonalization of communication. It is important to recognize and understand these unintended consequences of new technology to avoid the negative impacts to patient care and work relationships. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  11. Designing Skin Cancer Prevention Messages: Should We Emphasize Gains or Losses? Message Framing, Risk Type, and Prior Experience.

    Science.gov (United States)

    Lee, Moon J; Kang, Hannah

    2018-05-01

    To test whether message framing (ie, gain vs. loss) and risk type (ie, health vs appearance risk) in skin cancer prevention messages interact with one's prior experience. Two experiments with a 2 (message framing: gain vs loss) × 2 (risk type: health vs appearance risk) factorial design were conducted. The participants were given a URL to the experiment website via e-mail. On the first page of the website, the participants were told that they would be asked to evaluate a skin cancer print public service announcement (PSA): Online experiments. A total of 397 individuals participated (236 for experiment 1 and 161 for experiment 2). Apparatus: Four versions of the skin cancer print PSAs were developed. Four PSAs were identical except for the 2 manipulated components: message framing and risk type. Measures were adopted from Cho and Boster (message framing), Jones and Leary and Kiene et al. (risk type), De Vries, Mesters, van't Riet, Willems, and Reubsaet and Knight, Kirincich, Farmer, and Hood (prior experience), and Hammond, Fong, Zanna, Thrasher, and Borland and Hoffner and Ye (behavioral intent). General linear models were used to test hypotheses. Three-way interactions among message framing, risk type, and prior experience were found: When the intent of the message was to encourage sunscreen use, the effects of message framing and risk type were shown to be the exact opposite directions from when the intent was to discourage indoor/outdoor tanning. To discourage tanning among those with prior experience, messages emphasizing losses in terms of one's health will work better. For those with no prior experience, messages emphasizing potential appearance losses will work better for discouraging tanning while messages emphasizing gains like improving appearance will do a better job in encouraging sunscreen use.

  12. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    Science.gov (United States)

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  13. Pilot study of psychotherapeutic text messaging for depression.

    Science.gov (United States)

    Pfeiffer, Paul N; Henry, Jennifer; Ganoczy, Dara; Piette, John D

    2017-08-01

    Background Text messaging services could increase access to psychotherapeutic content for individuals with depression by avoiding barriers to in-person psychotherapy such as cost, transportation, and therapist availability. Determining whether text messages reflecting different psychotherapeutic techniques exhibit differences in acceptability or effectiveness may help guide service development. Objectives We aimed to determine: (1) the feasibility of delivering a psychotherapy-based text messaging service to people with depression identified via the internet, (2) whether there is variation in satisfaction with messages according to the type of psychotherapeutic technique they represent, and (3) whether symptoms of depression vary according to receipt of each message type and participants' satisfaction with the messages they received. Methods For this study 190 US adults who screened positive for a major depressive episode (Patient Health Questionnaire (PHQ-9) score ≥10) were recruited from online advertisements. Participants received a daily psychotherapy-based text message 6 days per week for 12 weeks. Text messages were developed by a team of psychiatrists, psychologists, and social workers to reflect three psychotherapeutic approaches: acceptance and commitment therapy (ACT), behavioural activation, and cognitive restructuring. Each week the message type for the week was randomly assigned from one of the three types, allowing for repeats. Participants were asked daily to rate each message. On the 7th day of each week, participants completed a two-item depression screener (PHQ-2). Web-based surveys at baseline, 6, and 12 weeks were used as the primary measure of depressive symptoms (PHQ-9). Results Of the 190 participants enrolled, 85 (45%) completed the 6-week web survey and 67 (35%) completed the 12-week survey. The mean baseline PHQ-9 score was 19.4 (SD 4.2) and there was a statistically significant mean improvement in PHQ-9 scores of -2.9 (SD 6.0; p

  14. Optical performance of multifocal soft contact lenses via a single-pass method.

    Science.gov (United States)

    Bakaraju, Ravi C; Ehrmann, Klaus; Falk, Darrin; Ho, Arthur; Papas, Eric

    2012-08-01

    A physical model eye capable of carrying soft contact lenses (CLs) was used as a platform to evaluate optical performance of several commercial multifocals (MFCLs) with high- and low-add powers and a single-vision control. Optical performance was evaluated at three pupil sizes, six target vergences, and five CL-correcting positions using a spatially filtered monochromatic (632.8 nm) light source. The various target vergences were achieved by using negative trial lenses. A photosensor in the retinal plane recorded the image point-spread that enabled the computation of visual Strehl ratios. The centration of CLs was monitored by an additional integrated en face camera. Hydration of the correcting lens was maintained using a humidity chamber and repeated instillations of rewetting saline drops. All the MFCLs reduced performance for distance but considerably improved performance along the range of distance to near target vergences, relative to the single-vision CL. Performance was dependent on add power, design, pupil, and centration of the correcting CLs. Proclear (D) design produced good performance for intermediate vision, whereas Proclear (N) design performed well at near vision (p 4 mm in diameter. Acuvue Oasys bifocal produced performance comparable with single-vision CL for most vergences. Direct measurement of single-pass images at the retinal plane of a physical model eye used in conjunction with various MFCLs is demonstrated. This method may have utility in evaluating the relative effectiveness of commercial and prototype designs.

  15. Effects of message, source, and context on evaluations of employee voice behavior.

    Science.gov (United States)

    Whiting, Steven W; Maynes, Timothy D; Podsakoff, Nathan P; Podsakoff, Philip M

    2012-01-01

    The article contained a production-related error. In Table 5, the four values in the rows for Study 1 Prosocial motives and Study 1 Constructive voice should have been shifted one column to the right, to the Direct and Total Performance evaluations columns. All versions of this article have been corrected.] Although employee voice behavior is expected to have important organizational benefits, research indicates that employees voicing their recommendations for organizational change may be evaluated either positively or negatively by observers. A review of the literature suggests that the perceived efficacy of voice behaviors may be a function of characteristics associated with the (a) source, (b) message, and (c) context of the voice event. In this study, we manipulated variables from each of these categories based on a model designed to predict when voice will positively or negatively impact raters' evaluations of an employee's performance. To test our model, we conducted 3 laboratory studies in which we manipulated 2 source factors (voicer expertise and trustworthiness), 2 message factors (recommending a solution and positively vs. negatively framing the message), and 2 context factors (timing of the voice event and organizational norms for speaking up vs. keeping quiet). We also examined the mediating effects of liking, prosocial motives, and perceptions that the voice behavior was constructive on the relationships between the source, message, and context factors and performance evaluations. Generally speaking, we found that at least one of the variables from each category had an effect on performance evaluations for the voicer and that most of these effects were indirect, operating through one or more of the mediators. Implications for theory and future research are discussed.

  16. Correction of Neonatal Hypovolemia

    Directory of Open Access Journals (Sweden)

    V. V. Moskalev

    2007-01-01

    Full Text Available Objective: to evaluate the efficiency of hydroxyethyl starch solution (6% refortane, Berlin-Chemie versus fresh frozen plasma used to correct neonatal hypovolemia.Materials and methods. In 12 neonatal infants with hypoco-agulation, hypovolemia was corrected with fresh frozen plasma (10 ml/kg body weight. In 13 neonates, it was corrected with 6% refortane infusion in a dose of 10 ml/kg. Doppler echocardiography was used to study central hemodynamic parameters and Doppler study was employed to examine regional blood flow in the anterior cerebral and renal arteries.Results. Infusion of 6% refortane and fresh frozen plasma at a rate of 10 ml/hour during an hour was found to normalize the parameters of central hemodynamics and regional blood flow.Conclusion. Comparative analysis of the findings suggests that 6% refortane is the drug of choice in correcting neonatal hypovolemia. Fresh frozen plasma should be infused in hemostatic disorders. 

  17. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... surgery. It is important to understand that your treatment, which will probably include orthodontics before and after ... to realistically estimate the time required for your treatment. Correction of Common Dentofacial Deformities ​ ​ The information provided ...

  18. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... misalignment of jaws and teeth. Surgery can improve chewing, speaking and breathing. While the patient's appearance may ... indicate the need for corrective jaw surgery: Difficulty chewing, or biting food Difficulty swallowing Chronic jaw or ...

  19. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... It can also invite bacteria that lead to gum disease. Click here to find out more. Who We ... It can also invite bacteria that lead to gum disease. Click here to find out more. Corrective Jaw ...

  20. Corrective Jaw Surgery

    Medline Plus

    Full Text Available ... is performed by an oral and maxillofacial surgeon (OMS) to correct a wide range of minor and ... when sleeping, including snoring) Your dentist, orthodontist and OMS will work together to determine whether you are ...

  1. Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage

    Directory of Open Access Journals (Sweden)

    Juha Partala

    2017-01-01

    Full Text Available A distributed storage system (DSS is a fundamental building block in many distributed applications. It applies linear network coding to achieve an optimal tradeoff between storage and repair bandwidth when node failures occur. Additively homomorphic encryption is compatible with linear network coding. The homomorphic property ensures that a linear combination of ciphertext messages decrypts to the same linear combination of the corresponding plaintext messages. In this paper, we construct a linearly homomorphic symmetric encryption scheme that is designed for a DSS. Our proposal provides simultaneous encryption and error correction by applying linear error correcting codes. We show its IND-CPA security for a limited number of messages based on binary Goppa codes and the following assumption: when dividing a scrambled generator matrix G^ into two parts G1^ and G2^, it is infeasible to distinguish G2^ from random and to find a statistical connection between G1^ and G2^. Our infeasibility assumptions are closely related to those underlying the McEliece public key cryptosystem but are considerably weaker. We believe that the proposed problem has independent cryptographic interest.

  2. Alternative Data Storage Solution for Mobile Messaging Services

    Directory of Open Access Journals (Sweden)

    David C. C. Ong

    2007-01-01

    Full Text Available In recent years, mobile devices have become relatively more powerful with additional features which have the capability to provide multimedia streaming. Better, faster and more reliable data storage solutions in the mobile messaging platform have become more essential with these additional improvements. The existing mobile messaging infrastructure, in particular the data storage platform has become less proficient in coping with the increased demand for its services. This demand especially in the mobile messaging area (i.e. SMS – Short Messaging Service, MMS – Multimedia Messaging Service, which may well exceeded 250,000 requests per second, means that the need to evaluate competing data management systems has become not only necessary but essential. This paper presents an evaluation of SMS and MMS platforms using different database management systems – DBMS and recommends the best data management strategies for these platforms.

  3. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  4. Impact of nutrition messages on children's food choice: pilot study.

    Science.gov (United States)

    Bannon, Katie; Schwartz, Marlene B

    2006-03-01

    This pilot study tested the influence of nutrition message framing on snack choice among kindergarteners. Three classrooms were randomly assigned to watch one of the following 60s videos: (a) a gain-framed nutrition message (i.e. the positive benefits of eating apples) (n=14); (b) a loss-framed message (i.e. the negative consequences of not eating apples) (n=18); or (c) a control scene (children playing a game) (n=18). Following this, the children were offered a choice between animal crackers and an apple for their snack. Among the children who saw one of the nutrition message videos, 56% chose apples rather than animal crackers; in the control condition only 33% chose apples. This difference was statistically significant (chi2=7.56, p<0.01). These results suggest that videos containing nutritional messages may have a positive influence on children's short-term food choices.

  5. A one-mode-for-all predictor for text messaging

    Directory of Open Access Journals (Sweden)

    Vimala Balakrishnan

    2011-08-01

    Full Text Available This paper discusses the enhancements made on the current mobile phone messaging software, namely the predictive text entry. In addition, the application also has a facility to abbreviate any unabbreviated words that exist in the dictionary, so that the message length can be reduced. The application was tested in a computer-simulated mobile environment and the results of the tests are presented here. These additional features will potentially enable users to send messages at a reduced length and thus reduce the cost of sending messages. Moreover, users who are not adept in using the abbreviations can now do so with features made available on their mobile phones. It is believed that these additional features will also encourage more users to use the predictive software as well as further improve users’ messaging satisfaction.

  6. Flow of Emotional Messages in Artificial Social Networks

    Science.gov (United States)

    Chmiel, Anna; Hołyst, Janusz A.

    Models of message flows in an artificial group of users communicating via the Internet are introduced and investigated using numerical simulations. We assumed that messages possess an emotional character with a positive valence and that the willingness to send the next affective message to a given person increases with the number of messages received from this person. As a result, the weights of links between group members evolve over time. Memory effects are introduced, taking into account that the preferential selection of message receivers depends on the communication intensity during the recent period only. We also model the phenomenon of secondary social sharing when the reception of an emotional e-mail triggers the distribution of several emotional e-mails to other people.

  7. Framing Effects in Narrative and Non-Narrative Risk Messages.

    Science.gov (United States)

    Steinhardt, Joseph; Shapiro, Michael A

    2015-08-01

    Narrative messages are increasingly popular in health and risk campaigns, yet gain/loss framing effects have never been tested with such messages. Three experiments examined framing in narrative messages. Experiment 1 found that only the character's decision, not framing, influenced judgments about characters in a narrative derived from a prospect theory context. Experiment 2 found that a framing effect that occurred when presented in a decision format did not occur when the same situation was presented as a narrative. Using a different story/decision context, Experiment 3 found no significant difference in preference for surgery over radiation therapy in a narrative presentation compared to a non-narrative presentation. The results suggest that health and risk campaigns cannot assume that framing effects will be the same in narrative messages and non-narrative messages. Potential reasons for these differences and suggestions for future research are discussed. © 2015 Society for Risk Analysis.

  8. Creating buzz: the neural correlates of effective message propagation.

    Science.gov (United States)

    Falk, Emily B; Morelli, Sylvia A; Welborn, B Locke; Dambacher, Karl; Lieberman, Matthew D

    2013-07-01

    Social interaction promotes the spread of values, attitudes, and behaviors. Here, we report on neural responses to ideas that are destined to spread. We scanned message communicators using functional MRI during their initial exposure to the to-be-communicated ideas. These message communicators then had the opportunity to spread the messages and their corresponding subjective evaluations to message recipients outside the scanner. Successful ideas were associated with neural responses in the communicators' mentalizing systems and reward systems when they first heard the messages, prior to spreading them. Similarly, individuals more able to spread their own views to others produced greater mentalizing-system activity during initial encoding. Unlike prior social-influence studies that focused on the individuals being influenced, this investigation focused on the brains of influencers. Successful social influence is reliably associated with an influencer-to-be's state of mind when first encoding ideas.

  9. Continuum Mechanical Modelling of Skin-pass Rolling

    DEFF Research Database (Denmark)

    Kijima, Hideo; Bay, Niels

    2007-01-01

    The special contact conditions in skin-pass rolling of steel strip is analyzed by studying plane strain upsetting of thin sheet with low reduction applying long narrow tools and dry friction conditions. An extended sticking region is estimated by an elasto-plastic FEM analysis of the plane strain...

  10. Academic performance and pass rates: Comparison of three first ...

    African Journals Online (AJOL)

    First year students' academic performance in three Life Science courses (Botany, Zoology and Bioscience) was compared. Pass rates, as well as the means and distributions of final marks were analysed. Of the three components (coursework, practical and theory examinations) contributing to the final mark of each course, ...

  11. Parallel imaging for first-pass myocardial perfusion

    NARCIS (Netherlands)

    Irwan, Roy; Lubbers, Daniel D.; van der Vleuten, Pieter A.; Kappert, Peter; Gotte, Marco J. W.; Sijens, Paul E.

    Two parallel imaging methods used for first-pass myocardial perfusion imaging were compared in terms of signal-to-noise ratio (SNR), contrast-to-noise ratio (CNR) and image artifacts. One used adaptive Time-adaptive SENSitivity Encoding (TSENSE) and the other used GeneRalized Autocalibrating

  12. Variation of rolling noise during train pass-bys

    NARCIS (Netherlands)

    Dittrich, M.G.

    2013-01-01

    Railway pass-by noise measurements on different types of tracks sometimes display a significant difference between the rise and decrease in rolling noise at the front and the back of the train. This can potentially have different causes. Whilst this may not necessarily be relevant for the total

  13. exchange rate pass-through to import and consumer prices

    African Journals Online (AJOL)

    Eyerusalem

    degree of pass-through is estimated by the means of impulse response functions. ..... through from exchange rate fluctuations to each stage of the distribution chain ..... exclusion test (which is asymptotically chi-square distributed) and the results ...... Endogenous variables: DLWCPI YGap DLNEER DLMPI DLCPI DLM2. Root.

  14. Standardized Testing Practices: Effect on Graduation and NCLEX® Pass Rates.

    Science.gov (United States)

    Randolph, Pamela K

    The use standardized testing in pre-licensure nursing programs has been accompanied by conflicting reports of effective practices. The purpose of this project was to describe standardized testing practices in one states' nursing programs and discover if the use of a cut score or oversight of remediation had any effect on (a) first time NCLEX® pass rates, (b) on-time graduation (OTG) or (c) the combination of (a) and (b). Administrators of 38 nursing programs in one Southwest state were sent surveys; surveys were returned by 34 programs (89%). Survey responses were compared to each program's NCLEX pass rate and on-time graduation rate; t-tests were conducted for significant differences associated with a required minimum score (cut score) and oversight of remediation. There were no significant differences in NCLEX pass or on-time graduation rates related to establishment of a cut score. There was a significant difference when the NCLEX pass rate and on-time graduation rate were combined (Outcome Index "OI") with significantly higher program outcomes (P=.02.) for programs without cut-scores. There were no differences associated with faculty oversight of remediation. The results of this study do not support establishment of a cut-score when implementing a standardized testing. Copyright © 2016. Published by Elsevier Inc.

  15. 78 FR 18479 - Drawbridge Operation Regulations; Pass Manchac, LA

    Science.gov (United States)

    2013-03-27

    ... governing the operation of the Canadian National (CN) Railroad automated bascule span drawbridge across Pass....gov . Type the docket number in the ``SEARCH'' box and click ``SEARCH.'' Click on Open Docket Folder... Operations, telephone 202-366-9826. SUPPLEMENTARY INFORMATION: The CN Railroad has requested a temporary...

  16. Plants profile of Malakand Pass Hills, District Malakand, Pakistan

    African Journals Online (AJOL)

    use

    2011-11-21

    Nov 21, 2011 ... famous Malakand fort guards the road on both sides of the pass. Malakand is a ... Underneath Malakand Hills, the waters of the River Swat ... southern sloping faces of the hills. They speak ...... Pinus roxburghii Sarg. Antidote ...

  17. Notational analysis on tactical passing skills used by collegiate ...

    African Journals Online (AJOL)

    Notational analysis on tactical passing skills used by collegiate players in an indoor hockey masum tournament. K.N. Hasnor, H Hizan, M.I. Shahril, N.A. Kosni, M.R. Abdullah, A.B.H.M. Maliki, S.M. Mat-Rasid ...

  18. A New One-Pass Transformation into Monadic Normal Form

    DEFF Research Database (Denmark)

    Danvy, Olivier

    2003-01-01

    We present a translation from the call-by-value λ-calculus to monadic normal forms that includes short-cut boolean evaluation. The translation is higher-order, operates in one pass, duplicates no code, generates no chains of thunks, and is properly tail recursive. It makes a crucial use of symbolic...

  19. Vehicle dynamic effects in the course of passing over turnouts

    Directory of Open Access Journals (Sweden)

    Zelenka J.

    2007-11-01

    Full Text Available For the quantification of vehicle dynamic effects at passing over turnouts at a higher speed there was developed a methodology for evaluating of acceleration measured on vehicle axle boxes in the year 2003. The methodology is based on statistical evaluation of lateral and vertical acceleration measured values at passing over both critical parts of a turnout (tongue, frog. The created methodology was used for investigation of vehicle dynamic effects by running at speed up to 230 km/h in the year 2004 in terms of high speed tests of tilting-body unit class 680 CD. There was found relatively high values of dynamic effects already at a speed 160 km/h. In terms of tilting-body unit class 680 tests at a higher speed in curves of chosen track lines of 1st and 2nd corridor of Czech Railways there was carried out also verification of curved turnouts state according to methodology mentioned above with a view to possibility of speed increasing at curved throats of chosen stations. Lateral vehicle dynamic effects at passing over a curved turnout frog area were evaluated. There were carried out simulation calculations of vehicle passing over a turnout based on measured geometric parameters of wheelset as well as chosen turnouts. Results of the calculations were compared with measurements. The increased vehicle dynamic effects found in pulsed beats character influence negatively the turnouts part (not only wheel contacting parts as well as operating life all unsuspended parts of vehicles.

  20. 20 CFR 416.2096 - Basic pass-along rules.

    Science.gov (United States)

    2010-04-01

    ... residents of Medicaid facilities where Medicaid pays more than 50 percent of the cost of their care (see..., unless the State furnishes us satisfactory evidence to the contrary. (b) Meeting the pass-along... was in compliance for such preceding 12-month period. The combined Federal/State payment level for...

  1. Stream capture to form Red Pass, northern Soda Mountains, California

    Science.gov (United States)

    Miller, David; Mahan, Shannon

    2014-01-01

    Red Pass, a narrow cut through the Soda Mountains important for prehistoric and early historic travelers, is quite young geologically. Its history of downcutting to capture streams west of the Soda Mountains, thereby draining much of eastern Fort Irwin, is told by the contrast in alluvial fan sediments on either side of the pass. Old alluvial fan deposits (>500 ka) were shed westward off an intact ridge of the Soda Mountains but by middle Pleistocene time, intermediate-age alluvial fan deposits (~100 ka) were laid down by streams flowing east through the pass into Silurian Valley. The pass was probably formed by stream capture driven by high levels of groundwater on the west side. This is evidenced by widespread wetland deposits west of the Soda Mountains. Sapping and spring discharge into Silurian Valley over millennia formed a low divide in the mountains that eventually was overtopped and incised by a stream. Lessons include the importance of groundwater levels for stream capture and the relatively youthful appearance of this ~100-200 ka feature in the slowly changing Mojave Desert landscape.

  2. Buffels (Wes), Elsies, Sir Lowry's pass, Steenbras and Buffels (Oos)

    CSIR Research Space (South Africa)

    Heinecken, TJE

    1982-06-01

    Full Text Available This report is a synthesis of all available information on five of the smaller rivers discharging in to False bay combined as a single volume. The rivers dealt with are the Buffels (Wes), Elsies, Sir Lowry' Pass, Steenbras and Buffels (Oos). False...

  3. 48 CFR 652.237-71 - Identification/Building Pass.

    Science.gov (United States)

    2010-10-01

    ..., Information Security Programs Division, Industrial Security Branch (DS/ISP/INB) on its cleared employees..., Information Security Programs Division, Industrial Security Branch (DS/ISP/INB): (i) SF-85P, Questionnaire for... Pass (APR 2004) (a) Contractors working in domestic facilities who already possess a security clearance...

  4. 20 CFR 416.2099 - Compliance with pass-along.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Compliance with pass-along. 416.2099 Section 416.2099 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED State Supplementation Provisions; Agreement; Payments § 416.2099 Compliance with...

  5. Note Passing and Gendered Discipline in Vietnamese Schools

    Science.gov (United States)

    Horton, Paul

    2015-01-01

    While researchers agree that note passing is predominantly an activity engaged in by girls, there has been relatively little consideration of why this is the case. In this article, I argue that gendered expectations about the appropriate characters of boys and girls in Vietnam are incorporated into the disciplinary framework of schools, and that…

  6. STRUCTURE OF ECAP ALUMINIUM AFTER DIFFERENT NUMBER OF PASSES

    Directory of Open Access Journals (Sweden)

    Lucia Ilucová

    2011-05-01

    Full Text Available The structure of high purity (99.99% aluminium processed by equal channel angular pressing in the as pressed state after different number of passes was examined using various stereological methods. An extreme inhomogeneity and complicated anisotropy was observed along the body of rod-like specimens.

  7. Single Pass Collider Memo: Gradient Perturbations of the SLC arc

    Energy Technology Data Exchange (ETDEWEB)

    Weng, W.T.; Sands, M.; /SLAC

    2016-12-16

    As the beam passes through the arcs, the gradient it encounters at each magnet differs from the design value. This deviation may be in part random and in part systematic. In this note we make estimates of the effects to be expected from both kinds of errors.

  8. Quantum mean-field decoding algorithm for error-correcting codes

    International Nuclear Information System (INIS)

    Inoue, Jun-ichi; Saika, Yohei; Okada, Masato

    2009-01-01

    We numerically examine a quantum version of TAP (Thouless-Anderson-Palmer)-like mean-field algorithm for the problem of error-correcting codes. For a class of the so-called Sourlas error-correcting codes, we check the usefulness to retrieve the original bit-sequence (message) with a finite length. The decoding dynamics is derived explicitly and we evaluate the average-case performance through the bit-error rate (BER).

  9. PENGATURAN PASSING OFF DALAM PENGGUNAAN DOMAIN NAME TERKAIT DENGAN MEREK

    Directory of Open Access Journals (Sweden)

    Herti Yunita Putri

    2016-09-01

    Full Text Available In cyber world we often hear about domain name’s term. Domain name is a unique name to identify the server computer’s name like a web server or email server on a computer network or Internet. Passing off also make causes confusion in using merk from a famous brand or merk on the goods and services. Selected domain name in the internet media often creates the similar domain name with the other parties. This similar domain name are often used by people who are not responsible to take advantages of the domain name for themself. This can be caused by the presence of competition from Internet media business. This things called passing off. This research is a normative juridical research with a qualitative analysis. The legal materials include primary legal, secondary law and tertiary legal materials. Collection technique applied is literary study. Legal materials were analyzed to see the argument implementation of the definition of merk, the definition of domain name, definition of passing off, passing off in use related by merk and domain name and the rules of law in Indonesia related by merk, domain name and passing off. Big wishes in the future it can assist as a basic reference and legal considerations which are useful in Indonesian law practice. There are two passing off related to the merk and domain name, called Crybersquatting and Tiposquatting. Domain name rules are not regulated clearly in merk regulation named Act No. 15 of 2001. It regulated in PP 24 Year 1993 about The Class List of Goods or Services In Merk, Telecommunications are included in the goods or services in merk. Domain name are regulated in UDRP (Uniform Dispute Resolution Policy with competent institutions called ICANN (Internet Corporation for Assigned Names and Numbers. Dalam dunia maya (cyber world, kita sering mendengar istilah domain name. Domain name adalah nama unik yang diberikan untuk mengidentifikasi nama server komputer seperti web server atau email server di

  10. ICT: isotope correction toolbox.

    Science.gov (United States)

    Jungreuthmayer, Christian; Neubauer, Stefan; Mairinger, Teresa; Zanghellini, Jürgen; Hann, Stephan

    2016-01-01

    Isotope tracer experiments are an invaluable technique to analyze and study the metabolism of biological systems. However, isotope labeling experiments are often affected by naturally abundant isotopes especially in cases where mass spectrometric methods make use of derivatization. The correction of these additive interferences--in particular for complex isotopic systems--is numerically challenging and still an emerging field of research. When positional information is generated via collision-induced dissociation, even more complex calculations for isotopic interference correction are necessary. So far, no freely available tools can handle tandem mass spectrometry data. We present isotope correction toolbox, a program that corrects tandem mass isotopomer data from tandem mass spectrometry experiments. Isotope correction toolbox is written in the multi-platform programming language Perl and, therefore, can be used on all commonly available computer platforms. Source code and documentation can be freely obtained under the Artistic License or the GNU General Public License from: https://github.com/jungreuc/isotope_correction_toolbox/ {christian.jungreuthmayer@boku.ac.at,juergen.zanghellini@boku.ac.at} Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  11. Text messaging-based smoking cessation intervention: a narrative review.

    Science.gov (United States)

    Kong, Grace; Ells, Daniel M; Camenga, Deepa R; Krishnan-Sarin, Suchitra

    2014-05-01

    Smoking cessation interventions delivered via text messaging on mobile phones may enhance motivations to quit smoking. The goal of this narrative review is to describe the text messaging interventions' theoretical contents, frequency and duration, treatment outcome, and sample characteristics such as age and motivation to quit, to better inform the future development of this mode of intervention. Studies were included if text messaging was primarily used to deliver smoking cessation intervention and published in English in a peer-reviewed journal. All articles were coded by two independent raters to determine eligibility and to extract data. Twenty-two studies described 15 text messaging interventions. About half of the interventions recruited adults (ages 30-40) and the other half targeted young adults (ages 18-29). Fourteen interventions sent text messages during the quit phase, 10 had a preparation phase and eight had a maintenance phase. The number of text messages and the duration of the intervention varied. All used motivational messages grounded in social cognitive behavioral theories, 11 used behavioral change techniques, and 14 used individually tailored messages. Eleven interventions also offered other smoking cessation tools. Three interventions yielded smoking cessation outcomes greater than the control condition. The proliferation of text messaging in recent years suggests that text messaging interventions may have the potential to improve smoking cessation rates. Detailed summary of the interventions suggests areas for future research and clinical application. More rigorous studies are needed to identify components of the interventions that can enhance their acceptability, feasibility and efficacy. Copyright © 2013. Published by Elsevier Ltd.

  12. Short Message Service (SMS) Texting Symbols: A Functional Analysis of 10,000 Cellular Phone Text Messages

    Science.gov (United States)

    Beasley, Robert E.

    2009-01-01

    The purpose of this study was to investigate the use of symbolic expressions (e.g., "BTW," "LOL," "UR") in an SMS text messaging corpus consisting of over 10,000 text messages. More specifically, the purpose was to determine, not only how frequently these symbolic expressions are used, but how they are utilized in terms of the language functions…

  13. Empowerment in the process of health messaging for rural low-income mothers: an exploratory message design project.

    Science.gov (United States)

    Aldoory, Linda; Braun, Bonnie; Maring, Elisabeth Fost; Duggal, Mili; Briones, Rowena Lynn

    2015-01-01

    Rural, low-income mothers face challenges to their health equal to or greater than those of low-income mothers from urban areas. This study put health message design into the hands of low-income rural mothers. The current study filled a research gap by analyzing a participatory process used to design health messages tailored to the everyday lives of rural low-income mothers. A total of forty-three mothers participated in nine focus groups, which were held from 2012 to 2013, in eight states. The mothers were from different racial and ethnic backgrounds. Participants discussed food security, physical activity, and oral health information. They created messages by considering several elements: visuals, length of message, voice/perspective, self-efficacy and personal control, emotional appeals, positive and negative reinforcements, and steps to health behavior change. This study was innovative in its focus on empowerment as a key process to health message design.

  14. Influence of welding passes on grain orientation – The example of a multi-pass V-weld

    International Nuclear Information System (INIS)

    Ye, Jing; Moysan, Joseph; Song, Sung-Jin; Kim, Hak-Joon; Chassignole, Bertrand; Gueudré, Cécile; Dupond, Olivier

    2012-01-01

    The accurate modelling of grain orientations in a weld is important, when accurate ultrasonic test predictions of a welded assembly are needed. To achieve this objective, Electricité de France (EDF) and the Laboratoire de Caractérisation Non Destructive (LCND) have developed a dedicated code, which makes use of information recorded in the welding procedure. Among the welding parameters recorded, although the order in which the welding passes are made is of primary importance in the welding process, this information is not always well known or accurately described. In the present paper we analyse in greater detail the influence of the order of welding passes, using data obtained from the Centre for Advanced Non Destructive Evaluation (CANDE), derived from a dissimilar metal weld (DMW) with buttering. Comparisons are made using grain orientation measurements on a macrograph. - Highlights: ► Influence of welding process on grain structure is studied using the MINA model. ► For the first time the importance of a slight slope of the layers is evaluated. ► Two orders of passes are compared for the modelling approach. ► A major effect is observed due to a change in the order of passes.

  15. Geological Corrections in Gravimetry

    Science.gov (United States)

    Mikuška, J.; Marušiak, I.

    2015-12-01

    Applying corrections for the known geology to gravity data can be traced back into the first quarter of the 20th century. Later on, mostly in areas with sedimentary cover, at local and regional scales, the correction known as gravity stripping has been in use since the mid 1960s, provided that there was enough geological information. Stripping at regional to global scales became possible after releasing the CRUST 2.0 and later CRUST 1.0 models in the years 2000 and 2013, respectively. Especially the later model provides quite a new view on the relevant geometries and on the topographic and crustal densities as well as on the crust/mantle density contrast. Thus, the isostatic corrections, which have been often used in the past, can now be replaced by procedures working with an independent information interpreted primarily from seismic studies. We have developed software for performing geological corrections in space domain, based on a-priori geometry and density grids which can be of either rectangular or spherical/ellipsoidal types with cells of the shapes of rectangles, tesseroids or triangles. It enables us to calculate the required gravitational effects not only in the form of surface maps or profiles but, for instance, also along vertical lines, which can shed some additional light on the nature of the geological correction. The software can work at a variety of scales and considers the input information to an optional distance from the calculation point up to the antipodes. Our main objective is to treat geological correction as an alternative to accounting for the topography with varying densities since the bottoms of the topographic masses, namely the geoid or ellipsoid, generally do not represent geological boundaries. As well we would like to call attention to the possible distortions of the corrected gravity anomalies. This work was supported by the Slovak Research and Development Agency under the contract APVV-0827-12.

  16. Systematic and heuristic processing of majority and minority-endorsed messages: the effects of varying outcome relevance and levels of orientation on attitude and message processing.

    Science.gov (United States)

    Martin, Robin; Hewstone, Miles; Martin, Pearl Y

    2007-01-01

    Two experiments investigated the conditions under which majority and minority sources instigate systematic processing of their messages. Both experiments crossed source status (majority vs. minority) with message quality (strong vs. weak arguments). In each experiment, message elaboration was manipulated by varying either motivational (outcome relevance, Experiment 1) or cognitive (orientating tasks, Experiment 2) factors. The results showed that when either motivational or cognitive factors encouraged low message elaboration, there was heuristic acceptance of the majority position without detailed message processing. When the level of message elaboration was intermediate, there was message processing only for the minority source. Finally, when message elaboration was high, there was message processing for both source conditions. These results show that majority and minority influence is sensitive to motivational and cognitive factors that constrain or enhance message elaboration and that both sources can lead to systematic processing under specific circumstances.

  17. Comparison of first-pass and second-bolus dynamic susceptibility perfusion MRI in brain tumors

    International Nuclear Information System (INIS)

    Spampinato, M.V.; Besenski, Nada; Rumboldt, Zoran; Wooten, Caroline; Dorlon, Margaret

    2006-01-01

    Our goal was to evaluate whether the T1 shortening effect caused by contrast leakage into brain tumors, a well-known confounding effect in the quantification of relative cerebral blood volume (rCBV) measurements, may be corrected by the administration of a predose of gadolinium-DTPA. As part of their presurgical imaging protocol, 25 patients with primary brain tumors underwent two consecutive dynamic susceptibility-weighted contrast-enhanced (DSC) perfusion MR studies. Intratumoral rCBV measurements and normalized rCBV values obtained during the first-pass and second-bolus studies were compared (Wilcoxon signed-ranks test). The frequency of relatively increased rCBV ratios on the second-bolus study was compared between enhancing and non-enhancing neoplasms (Fisher's exact test). Postprocessing perfusion studies were evaluated for image quality on a scale of 0-3 (Wilcoxon signed-ranks test). Four studies were excluded due to unacceptable image quality. Mean normalized rCBVs were 9.04 (SD 4.64) for the first-pass and 7.99 (SD 3.84) for the second-bolus study. There was no statistically significant difference between the two perfusion studies in either intratumoral rCBV (P=0.237) or rCBV ratio (P=0.181). Five enhancing and four non-enhancing tumors showed a relative increase in rCBV ratio on the second-bolus study, without a significant difference between the groups. Image quality was not significantly different between perfusion studies. Our results did not demonstrate a significant difference between first-pass and second-bolus rCBV measurements in DSC perfusion MR imaging. The administration of a predose of gadolinium-DTPA does not appear to be an efficient way of compensating for the underestimation of intratumoral rCBV values due to the T1 shortening effect. (orig.)

  18. Tomographic ventricular reconstruction using multiple view first-pass radionuclide angiography

    International Nuclear Information System (INIS)

    Lacy, J.L.; Ball, M.E.; Verani, M.S.; Wiles, H.; Roberts, R.

    1985-01-01

    In first-pass radionuclide angiography (FPRA) images of both left and right ventricles are uncontaminated by adjacent structures. Thus, the problem of tomographic reconstruction is vastly simplified compared to equilibrium blood pool imaging in which all structures are imaged simultaneously. Tomographic reconstruction from a limited number of views may thus be possible. A simple filtered interpolative back-projection reconstruction technique was employed. In this technique interpolation was used between sectional distributions at successive angles. Interpolations yielding 9 and 13 back projection angles of 22.5 0 and 15 0 were evaluated. Ventricular borders were obtained in each back-projected tomographic slice by location of the intensity level which provided correct total ventricular volume. Cast cross sections were quantitatively well represented by these borders. This ventricular border definition algorithm forms the basis for applications of the technique in animals and humans

  19. Evaluation of left ventricular ejection fraction by first pass radionuclide cardioangiography

    Energy Technology Data Exchange (ETDEWEB)

    Nishimura, T; Imai, Y; Kagawa, M; Hayashi, M; Kozuka, T [National Cardiovascular Center, Suita, Osaka (Japan)

    1980-02-01

    The left ventricular ejection fraction can be assessed by recording the passage of peripherally administered radioactive bolus through the heart which is first pass method. In this study, the accuracy and validity of first pass method were examined in the patients with cardiac catheterization. After sup(99m)Tc-HSA as a bolus was injected intravenouslly, the time-activity curve was recorded with a scintillation camera and online minicomputer system. The ejection fraction was calculated by the average of three cardiac cycles which corresponded to the left ventricular volume changes during each cardiac cycles. The results correlated well with those obtained by biplane cineangiography in the twenty patients without arrythmias (r = 0.89) and moreover, this technique was applied to the fifteen patients with atrial fibrillation such as mitral valvular diseases, congestive cardiomyopathy, Good correlation of the ejection fraction (r = 0.84) was obtained. The findings, however, demonstrated that the time-activity curve must be generated from the region of interest which fits the left ventricular blood pool precisely and must be corrected for the contribution arizing from noncardiac background structures (two matrix method). In conclusion, this noninvasive method appears particularly useful for serial evaluation of the patients with cardiac dysfunctions and would be available for the routine examination of ventricular functions.

  20. Effect of burn and first-pass splanchnic leucine extraction on protein kinetics in rats

    International Nuclear Information System (INIS)

    Karlstad, M.D.; DeMichele, S.J.; Istfan, N.; Blackburn, G.L.; Bistrian, B.R.

    1988-01-01

    The effects of burn and first-pass splanchnic leucine extraction (FPE) on protein kinetics and energy expenditure were assessed by measuring O 2 consumption, CO 2 production, nitrogen balance, leucine kinetics, and tissue fractional protein synthetic rates (FSR-%/day) in enterally fed rats. Anesthetized male rats (200 g) were scalded on their dorsum with boiling water (25-30% body surface area) and enterally fed isovolemic diets that provided 60 kcal/day and 2.4 g of amino acids/day for 3 days. Controls were not burned. An intravenous or intragastric infusion of L-[1- 14 C]leucine was used to assess protein kinetics on day 3. FPE was taken as the ratio of intragastric to intravenous plasma leucine specific activity. There was a 69% reduction in cumulative nitrogen balance (P less than 0.001) and a 17-19% increase in leucine oxidation (P less than 0.05) and total energy expenditure (P less than 0.01) in burned rats. A 15% decrease in plasma leucine clearance (P less than 0.05) was accompanied by a 20% increase in plasma [leucine] (P less than 0.01) in burned rats. Burn decreased rectus muscle FSR from 5.0 +/- 0.4 to 3.5 +/- 0.5 (P less than 0.05) and increased liver FSR from 19.0 +/- 0.5 to 39.2 +/- 3.4 (P less than 0.01). First pass extraction of dietary leucine by the splanchnic bed was 8% in controls and 26% in burned rats. Leucine kinetics corrected for FPE showed increased protein degradation with burn that was not evident without FPE correction. This hypermetabolic burn model can be useful in the design of enteral diets that optimize rates of protein synthesis and degradation