WorldWideScience

Sample records for identity-based motivation ibm

  1. Social class and identity-based motivation.

    Science.gov (United States)

    Fisher, Oliver; O'Donnell, S Casey; Oyserman, Daphna

    2017-12-01

    Attainments often fall short of aspirations to lead lives of meaning, health, happiness and success. Identity-based motivation theory highlights how social class and cultural contexts affect likelihood of shortfalls: Identities influence the strategies people are willing to use to attain their goals and the meaning people make of experienced ease and difficulty. Though sensitive to experienced ease and difficulty, people are not sensitive to the sources of these experiences. Instead, people make culturally-tuned inferences about what their experiences imply for who they are and could become and what to do about it. American culture highlights personal and shadows structural causes of ease and difficulty, success and failure. As a result, people infer that class-based outcomes are deserved reflections of character. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Identity-Based Motivation: Constraints and Opportunities in Consumer Research

    OpenAIRE

    Shavitt, Sharon; Torelli, Carlos J.; Wong, Jimmy

    2009-01-01

    This commentary underscores the integrative nature of the identity-based motivation model (Oyserman, 2009). We situate the model within existing literatures in psychology and consumer behavior, and illustrate its novel elements with research examples. Special attention is devoted to, 1) how product- and brand-based affordances constrain identity-based motivation processes and, 2) the mindsets and action tendencies that can be triggered by specific cultural identities in pursuit of consumer go...

  3. Identity-Based Motivation: Constraints and Opportunities in Consumer Research

    Science.gov (United States)

    Shavitt, Sharon; Torelli, Carlos J.; Wong, Jimmy

    2009-01-01

    This commentary underscores the integrative nature of the identity-based motivation model (Oyserman, 2009). We situate the model within existing literatures in psychology and consumer behavior, and illustrate its novel elements with research examples. Special attention is devoted to, 1) how product- and brand-based affordances constrain identity-based motivation processes and, 2) the mindsets and action tendencies that can be triggered by specific cultural identities in pursuit of consumer goals. Future opportunities are suggested for researching the antecedents of product meanings and relevant identities. PMID:20161045

  4. Identity-Based Motivation: Constraints and Opportunities in Consumer Research.

    Science.gov (United States)

    Shavitt, Sharon; Torelli, Carlos J; Wong, Jimmy

    2009-07-01

    This commentary underscores the integrative nature of the identity-based motivation model (Oyserman, 2009). We situate the model within existing literatures in psychology and consumer behavior, and illustrate its novel elements with research examples. Special attention is devoted to, 1) how product- and brand-based affordances constrain identity-based motivation processes and, 2) the mindsets and action tendencies that can be triggered by specific cultural identities in pursuit of consumer goals. Future opportunities are suggested for researching the antecedents of product meanings and relevant identities.

  5. The college journey and academic engagement: how metaphor use enhances identity-based motivation.

    Science.gov (United States)

    Landau, Mark J; Oyserman, Daphna; Keefer, Lucas A; Smith, George C

    2014-05-01

    People commonly talk about goals metaphorically as destinations on physical paths extending into the future or as contained in future periods. Does metaphor use have consequences for people's motivation to engage in goal-directed action? Three experiments examine the effect of metaphor use on students' engagement with their academic possible identity: their image of themselves as academically successful graduates. Students primed to frame their academic possible identity using the goal-as-journey metaphor reported stronger academic intention, and displayed increased effort on academic tasks, compared to students primed with a nonacademic possible identity, a different metaphoric framing (goal-as-contained-entity), and past academic achievements (Studies 1-2). This motivating effect persisted up to a week later as reflected in final exam performance (Study 3). Four experiments examine the cognitive processes underlying this effect. Conceptual metaphor theory posits that an accessible metaphor transfers knowledge between dissimilar concepts. As predicted in this paradigm, a journey-metaphoric framing of a possible academic identity transferred confidence in the procedure, or action sequence, required to attain that possible identity, which in turn led participants to perceive that possible identity as more connected to their current identity (Study 4). Drawing on identity-based motivation theory, we hypothesized that strengthened current/possible identity connection would mediate the journey framing's motivating effect. This mediational process predicted students' academic engagement (Study 5) and an online sample's engagement with possible identities in other domains (Study 6). Also as predicted, journey framing increased academic engagement particularly among students reporting a weak connection to their academic possible identity (Study 7).

  6. Understanding the Relationship between Parental Education and STEM Course Taking through Identity-Based and Expectancy-Value Theories of Motivation

    Science.gov (United States)

    Svoboda, Ryan C.; Rozek, Christopher S.; Hyde, Janet S.; Harackiewicz, Judith M.; Destin, Mesmin

    2016-01-01

    High school students from lower-socioeconomic status (SES) backgrounds are less likely to enroll in advanced mathematics and science courses compared to students from higher-SES backgrounds. The current longitudinal study draws on identity-based and expectancy-value theories of motivation to explain the SES and mathematics and science…

  7. Understanding the Relationship Between Parental Education and STEM Course Taking Through Identity-Based and Expectancy-Value Theories of Motivation

    Directory of Open Access Journals (Sweden)

    Ryan C. Svoboda

    2016-08-01

    Full Text Available High school students from lower–socioeconomic status (SES backgrounds are less likely to enroll in advanced mathematics and science courses compared to students from higher-SES backgrounds. The current longitudinal study draws on identity-based and expectancy-value theories of motivation to explain the SES and mathematics and science course-taking relationship. This was done by gathering reports from students and their parents about their expectations, values, and future identities for science, technology, engineering, and mathematics (STEM topics beginning in middle school through age 20. Results showed that parental education predicted mathematics and science course taking in high school and college, and this relationship was partially mediated by students’ and parents’ future identity and motivational beliefs concerning mathematics and science. These findings suggest that psychological interventions may be useful for reducing social class gaps in STEM course taking, which has critical implications for the types of opportunities and careers available to students.

  8. IBM 3705 Communications Controller

    CERN Multimedia

    1972-01-01

    The IBM 3705 Communications Controller is a simple computer which attaches to an IBM System/360 or System/370. Its purpose is to connect communication lines to the mainframe channel. It was a first communications controller of the popular IBM 37xx series.

  9. Online Help from IBM.

    Science.gov (United States)

    Moore, Jack

    1988-01-01

    The article describes the IBM/Special Needs Exchange which consists of: (1) electronic mail, conferencing, and a library of text and program files on the CompuServe Information Service; and (2) a dial-in database of special education software for IBM and compatible computers. (DB)

  10. IBM 5150 computer

    CERN Multimedia

    1981-01-01

    IBM’s first personal computer arrived nearly 10 years after others companies, but instantly legitimized the market. IBM introduced its PC in 1981. IBM equipped the model 5150 with a cassette port for connecting a cassette drive. The first IBM PC ran on a 4.77 MHz Intel 8088 microprocessor. The PC came equipped with 16 kilobytes of memory, expandable to 256k. The PC came with one or two 160k floppy disk drives and an optional color monitor. The price tag started at $1,565, which would be nearly $4,000 (about €3,400) today.

  11. IBM 3380 E

    CERN Multimedia

    1985-01-01

    In 1985 IBM announced a double density version. The Extended Capability Models of the 3380 (3380 E) having 5.04 gigabytes per chassis, that is, two 1.26 gigabyte actuators on two hard disk assemblies in one chassis.

  12. IBM model M keyboard

    CERN Multimedia

    1985-01-01

    In 1985, the IBM Model M keyboard was created. This timeless classic was a hit. IBM came out with several varients of the model M. They had the space saver 104 key which is the one most seen today and many international versions of that as well. The second type, and rarest is the 122 key model M which has 24 extra keys at the very top, dubbed the “programmers keyboard”. IBM manufactured these keyboards until 1991. The model M features “caps” over the actual keys that can be taken off separately one at a time for cleaning or to replace them with colored keys or keys of another language, that was a very cost effective way of shipping out internationally the keyboards.

  13. On IBM's Millennial Puzzle

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 5; Issue 10. On IBM's Millennial Puzzle. A Sarangarajan. Classroom Volume 5 Issue 10 October 2000 pp 81-89. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/005/10/0081-0089. Author Affiliations.

  14. IBM SPSS Modeler cookbook

    CERN Document Server

    McCormick, Keith

    2013-01-01

    This is a practical cookbook with intermediate-advanced recipes for SPSS Modeler data analysts. It is loaded with step-by-step examples explaining the process followed by the experts.If you have had some hands-on experience with IBM SPSS Modeler and now want to go deeper and take more control over your data mining process, this is the guide for you. It is ideal for practitioners who want to break into advanced analytics.

  15. IBM 3480 tape cartridge

    CERN Multimedia

    1984-01-01

    The 3480 tape format is a magnetic tape data storage format developed by IBM. The cartridge contains a single reel. IBM’s 3480 cartridge tape system sought to replace the traditional reels of magnetic tape in the computer center. Because of their speed, reliability, durability and low media cost, these tapes and tape drives are still in high demand. A hallmark of the genre is transferability. Tapes recorded with one tape drive are generally readable on another drive, even if the tape drives were built by different manufacturers.

  16. Summary inside IBM's historic turnaround

    CERN Document Server

    2014-01-01

    This work offers a summary of the book "WHO SAYS ELEPHANTS CAN'T DANCE? Inside IBM's Historic Turnaround" by Louis Gerstner.In nine years as the chairman and CEO of International Business Machine Corporation (IBM), Louis Gerstner brought about a dramatic change in the company's fortunes. When he took charge, IBM was on the verge of extinction as the victim of rapid changes in the computer industry. However, instead of breaking up IBM as most analysts were suggesting, Gerstner and his management team turned the company around and restored it to a position of power and influence within the indu

  17. IBM KELOMPOK USAHA SOUVENIR SABLON DIGITAL

    Directory of Open Access Journals (Sweden)

    Maria Krisnawati

    2015-02-01

    Full Text Available Targets to be achieved through IbM is on aspects of production and management. Aspects of the production which increased the production technology of making souvenirs, increasing capacity in the field of design through the program Corel Draw and Adobe Photoshop as well as consolidation of production procedures with due regard to health and safety work management. Management aspects namely on financial management, financial management hold good with regular bookkeeping, through marketing management produces forms of promotion through various media. Market network expansion and facilitate consumer access to order products.Through HR management can improve the training of human resources, the provision of entrepreneurial motivation and self empowerment. IbM implemented through phases 1 Preparation ; 2 Stage Assessment ; 3 The Plan or Program Activity; 4 Phase Action Plan ; 5 Implementation Phase or activity ; and 6 Evaluation Phase . It is expected to be implemented through the stages can help solve problems and realize the needs of partners.

  18. An IBM 370 assembly language program verifier

    Science.gov (United States)

    Maurer, W. D.

    1977-01-01

    The paper describes a program written in SNOBOL which verifies the correctness of programs written in assembly language for the IBM 360 and 370 series of computers. The motivation for using assembly language as a source language for a program verifier was the realization that many errors in programs are caused by misunderstanding or ignorance of the characteristics of specific computers. The proof of correctness of a program written in assembly language must take these characteristics into account. The program has been compiled and is currently running at the Center for Academic and Administrative Computing of The George Washington University.

  19. 8-inch IBM floppy disk

    CERN Multimedia

    1971-01-01

    The 8-inch floppy disk was a magnetic storage disk for the data introduced commercially by IBM in 1971. It was designed by an IBM team as an inexpensive way to load data into the IBM System / 370. Plus it was a read-only bare disk containing 80 KB of data. The first read-write version was introduced in 1972 by Memorex and could contain 175 KB on 50 tracks (with 8 sectors per track). Other improvements have led to various coatings and increased capacities. Finally, it was surpassed by the mini diskette of 5.25 inches introduced in 1976.

  20. Identity-Based Authentication for Cloud Computing

    Science.gov (United States)

    Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao

    Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.

  1. IBM SmartCloud essentials

    CERN Document Server

    Schouten, Edwin

    2013-01-01

    A practical, user-friendly guide that provides an introduction to cloud computing using IBM SmartCloud, along with a thorough understanding of resource management in a cloud environment.This book is great for anyone who wants to get a grasp of what cloud computing is and what IBM SmartCloud has to offer. If you are an IT specialist, IT architect, system administrator, or a developer who wants to thoroughly understand the cloud computing resource model, this book is ideal for you. No prior knowledge of cloud computing is expected.

  2. MOTIVATION

    Institute of Scientific and Technical Information of China (English)

    1994-01-01

    Introduction What is the difference between instrumental and integrative motivation? What kind of motivations do students have? How can our knowledge of motivation help the language learning process? Motivation can be very important in language teaching. Students can do very well when they are motivated. Teachers, with their knowledge of motivation, can make their classes more efficient and successful. Middle school teachers, in addition to learning about the English language itself, and about teaching methods, should also learn more about motivation and how this affects our students. "When we consider language teaching, motivation can be classified as either integrative or instrumental motivation" (Luxon)

  3. Making IBM's Computer, Watson, Human

    Science.gov (United States)

    Rachlin, Howard

    2012-01-01

    This essay uses the recent victory of an IBM computer (Watson) in the TV game, "Jeopardy," to speculate on the abilities Watson would need, in addition to those it has, to be human. The essay's basic premise is that to be human is to behave as humans behave and to function in society as humans function. Alternatives to this premise are considered…

  4. Data Discovery with IBM Watson

    Science.gov (United States)

    Fessler, J.

    2016-12-01

    BM Watson is a cognitive computing system that uses machine learning, statistical analysis, and natural language processing to find and understand the clues in questions posed to it. Watson was made famous when it bested two champions on TV's Jeopardy! show. Since then, Watson has evolved into a platform of cognitive services that can be trained on very granular fields up study. Watson is being used to support a number of subject domains, such as cancer research, public safety, engineering, and the intelligence community. IBM will be providing a presentation and demonstration on the Watson technology and will discuss its capabilities including Natural Language Processing, text analytics and enterprise search, as well as cognitive computing with deep Q&A. The team will also be giving examples of how IBM Watson technology is being used to support real-world problems across a number of public sector agencies

  5. Motivation.

    Science.gov (United States)

    Chambers, David W

    2007-01-01

    Motivation is short-term focused energy. The oldest theories of motivation explain motivated activity as effort to overcome primary deficiencies, such as hunger or boredom. Such theories are difficult to apply because individuals learn idiosyncratic secondary motives as alternative ways of responding to these needs. Three prominent needs theories are discussed: Herzberg's theory of hygiene and motivational factors; McClelland's needs for achievement, power, and affiliation; and Maslow's hierarchy and theory of self-actualization. A second approach to motivation holds that individuals may be thought of as engaging in rational processes to maximize their self-interests. The presented examples of this approach include Vroom's expectancy theory, Adam's theory of inequality, and the Porter-Lawler model that addresses the question of whether satisfaction leads to high performance or vice versa. Finally, several theories of motivation as life orientation are developed.

  6. Networking DEC and IBM computers

    Science.gov (United States)

    Mish, W. H.

    1983-01-01

    Local Area Networking of DEC and IBM computers within the structure of the ISO-OSI Seven Layer Reference Model at a raw signaling speed of 1 Mops or greater are discussed. After an introduction to the ISO-OSI Reference Model nd the IEEE-802 Draft Standard for Local Area Networks (LANs), there follows a detailed discussion and comparison of the products available from a variety of manufactures to perform this networking task. A summary of these products is presented in a table.

  7. IBM Sametime 852 Administration Guide

    CERN Document Server

    Davis, Gabriella; Duff, Thomas

    2011-01-01

    The IBM Lotus Sametime 8.5.2 Administration Guide uses a practical, no-nonsense approach to give you the essential information you need. Using realistic scenarios, you learn how to configure and maintain your environment to meet your needs and take advantage of the flexibility offered in Sametime 8.5.2. If you are responsible for installing and administering Sametime 8.5.2, then this book is for you. If you're completely new to Sametime administration, this book will serve as your roadmap. If you're making the jump from a prior version of Sametime, then you'll see how Sametime 8.5.2 differs an

  8. Jazz亮相IBM RSDC

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    6月2号,IBM在IBM Rational Software开发会议上宣布,今年年底前将有20款采用Jazz技术的产品出炉,而且最终是开放源代码的。Jazz并不是一个产品而是一项技术,这项技术主要能够加强企业在协同作业上的能力。Jazz的原意是爵士音乐,最早的爵士音乐融合了欧洲的古典音乐、军乐、流行音乐和舞曲。

  9. [IBM Work and Personal Life Balance Programs.

    Science.gov (United States)

    International Business Machines Corp., Armonk, NY.

    These five brochures describe the IBM Corporation's policies, programs, and initiatives designed to meet the needs of employees' child care and family responsibilities as they move through various stages of employment with IBM. The Work and Personal Life Balance Programs brochure outlines (1) policies for flexible work schedules, including…

  10. Users guide for the ANL IBM SPx

    Energy Technology Data Exchange (ETDEWEB)

    Gropp, W.; Lusk, E.

    1994-12-01

    This guide presents the features of the IBM SPx installed in the Mathematics and Computer Science Division at Argonne National Laboratory. The guide describes the available hardware and software, access policies, and hints for using the system productively.

  11. IBM eile, täna ja homme / Kalle Kose

    Index Scriptorium Estoniae

    Kose, Kalle

    2007-01-01

    Infotehnoloogiafirma IBM arengust. Lisatud joonised: PC tootjate turuosad (1984-2004); IBM-i käive segmentide lõikes (2000-2005); IBM-i käive kvartaalselt. Vt. ka lk.13: IBM püstitas patentide rekordi

  12. IBM PC enhances the world's future

    Science.gov (United States)

    Cox, Jozelle

    1988-01-01

    Although the purpose of this research is to illustrate the importance of computers to the public, particularly the IBM PC, present examinations will include computers developed before the IBM PC was brought into use. IBM, as well as other computing facilities, began serving the public years ago, and is continuing to find ways to enhance the existence of man. With new developments in supercomputers like the Cray-2, and the recent advances in artificial intelligence programming, the human race is gaining knowledge at a rapid pace. All have benefited from the development of computers in the world; not only have they brought new assets to life, but have made life more and more of a challenge everyday.

  13. The IBM i Programmer's Guide to PHP

    CERN Document Server

    Olen, Jeff

    2012-01-01

    This is the first book to comprehensively address PHP and how it can-and should-be deployed on the IBM i. With this IBM i-specific point of view, the authors examine how to transfer skills from a green screen environment to the Web, become intimately familiar with PHP's commonly used features, and help start down the road of highly interactive Web-based application development. For decades, the green screen has been the ubiquitous interface into an organization's data. But with the advent of HTML, the Internet, and the browser, combined with the end user's existing familiarity with the Web,

  14. Flexible input, dazzling output with IBM i

    CERN Document Server

    Victória-Pereira, Rafael

    2014-01-01

    Link your IBM i system to the modern business server world! This book presents easier and more flexible ways to get data into your IBM i system, along with rather surprising methods to export and present the vital business data it contains. You'll learn how to automate file transfers, seamlessly connect PC applications with your RPG programs, and much more. Input operations will become more flexible and user-proof, with self-correcting import processes and direct file transfers that require a minimum of user intervention. Also learn novel ways to present information: your DB2 data will look gr

  15. INIS information retrieval based on IBM's IRMS

    International Nuclear Information System (INIS)

    Gadjokov, V.; Schmid, H.; Del Bigio, G.

    1975-01-01

    An information retrieval system for the INIS data base is described. It allows for batch processing on an IBM/360 or /370 computer operated under OS or VS. The program package consists basically of IBM's IRMS system which was converted from DOS to OS and adapted for INIS requirements. Sections 1-9 present the system from the user's point of view, deliberately omitting all the programming details. Program descriptions with data set definitions and file formats are given in sections 10-12. (author)

  16. IBM Brazil: and environmental modern view

    Energy Technology Data Exchange (ETDEWEB)

    Cremonesi, Valter [IBM Brasil, Industria, Maquinas e Servicos Ltda., Rio de Janeiro, Rj (Brazil)

    1993-12-31

    Information of practical experiences on Environmental Affairs at IBM Brazil plant and branch offices is presented, with a modern view of the mission, resources, support, waste management, monitoring programs, recycling, energy conservation, partners programs, nature preservation 2rograms, recognitions and image. (author). 4 figs., 2 tabs.

  17. The IBM neutrino-mass experiment

    International Nuclear Information System (INIS)

    Clark, G.J.; Frisch, M.A.; Chaudhari, P.; Bregman, M.F.

    1985-01-01

    IBM is undertaking an experiment to measure the electron anti-neutrino mass. A high precision measurement of the tritium Β-decay spectrum near the end point is used to infer the neutrino mass. Electron energies are measured using a large spherical retarding grid analyzer. We are placing particular emphasis on understanding the complications introduced by solid state effects in the source

  18. The IBM neutrino-mass experiment

    International Nuclear Information System (INIS)

    Clark, G.J.; Frisch, M.A.; Chaudhari, P.; Bregman, M.F.

    1985-01-01

    IBM is undertaking an experiment to measure the electron anti-neutrino mass. A high precision measurement of the tritium β-decay spectrum near the end point is used to infer the neutrino mass. Electron energies are measured using a large spherical retarding grid analyzer. They are placing particular emphasis on understanding the complications introduced by solid state effects in the source

  19. IBM Brazil: and environmental modern view

    Energy Technology Data Exchange (ETDEWEB)

    Cremonesi, Valter [IBM Brasil, Industria, Maquinas e Servicos Ltda., Rio de Janeiro, Rj (Brazil)

    1994-12-31

    Information of practical experiences on Environmental Affairs at IBM Brazil plant and branch offices is presented, with a modern view of the mission, resources, support, waste management, monitoring programs, recycling, energy conservation, partners programs, nature preservation 2rograms, recognitions and image. (author). 4 figs., 2 tabs.

  20. Miks IBM müüb kroonijuveeli? / Valdo Randpere

    Index Scriptorium Estoniae

    Randpere, Valdo, 1958-

    2004-01-01

    Kuna konkurents on väga tihe, siis IBM loobub väikese marginaaliga personaalarvutite ärist ning keskendub serveritele ja keerukatele ärilahendustele. Lisa: IBM müüb personaalarvutite divisjoni hiinlastele

  1. IBM, Elsevier Science, and academic freedom.

    Science.gov (United States)

    Bailar, John C; Cicolella, Andre; Harrison, Robert; LaDou, Joseph; Levy, Barry S; Rohm, Timothy; Teitelbaum, Daniel T; Wang, Yung-Der; Watterson, Andrew; Yoshida, Fumikazu

    2007-01-01

    Elsevier Science refused to publish a study of IBM workers that IBM sought to keep from public view. Occupational and environmental health (OEH) suffers from the absence of a level playing field on which science can thrive. Industry pays for a substantial portion of OEH research. Studies done by private consulting firms or academic institutions may be published if the results suit the sponsoring companies, or they may be censored. OEH journals often reflect the dominance of industry influence on research in the papers they publish, sometimes withdrawing or modifying papers in line with industry and advertising agendas. Although such practices are widely recognized, no fundamental change is supported by government and industry or by professional organizations.

  2. The GF11 project at IBM

    International Nuclear Information System (INIS)

    Sexton, J.C.

    1990-01-01

    The GF11 project at IBM's T. J. Watson Research Center is entering full production for QCD numerical calculations. This paper describes the GF11 hardware and system software, and discusses the first production program which has been developed to run on GF11. This program is a variation of the Cabbibo Marinari pure gauge Monte Carlo program for SU(3) and is currently sustaining almost 6 gigaflops on 360 processors in GF11

  3. The GF11 project at IBM

    Science.gov (United States)

    Sexton, James C.

    1990-08-01

    The GF11 project at IBM's T. J. Watson Research Center is entering full production for QCD numerical calculations. This paper describes the GF11 hardware and system software, and discusses the first production program which has been developed to run on GF11. This program is a variation of the Cabbibo Marinari pure gauge Monte Carlo program for SU(3) and is currently sustaining almost 6 gigaflops on 360 processors in GF11.

  4. The Early Overseas Activities of IBM in Japan

    OpenAIRE

    吉沢, 正広; 田中, 雅章; Masahiro, YOSHIZAWA; Masaaki, TANAKA; 愛知学院大学; 鈴鹿短期大学; / SUZUKA JUNIOR COLLEGE

    1998-01-01

    The purpose of this paper is to examine how IBM entered into prewar Japan and ran its wholly-owned subsidiary thereafter. Before examining something noted above, this paper surveys the process of formation of IBM and then traces its early overseas activities. Turning to the initial contacts between Japan and IBM, at first IBM carried out its mere export trade to Japan through Morimura and then Kurosawa. IBM then established its wholly-owned subsidiary, Japan Watson,in Japan to expand the busi...

  5. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    Directory of Open Access Journals (Sweden)

    Ji-Jian Chin

    2014-01-01

    Full Text Available Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user’s secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  6. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    Science.gov (United States)

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  7. Bill Lang's contributions to acoustics at the International Business Machines Corp. (IBM) and to IBM in general

    Science.gov (United States)

    Nobile, Matthew A.; Chu, Richard C.

    2005-09-01

    Although Bill Lang's accomplishments and key roles in national and international standards and in the formation of INCE are widely recognized, sometimes it has to be remembered that for nearly 35 years he also had a ``day job'' at the IBM Corporation. His achievements at IBM were no less significant and enduring than those in external standards and professional societies. This paper will highlight some of the accomplishments and activities of Bill Lang as an IBM noise control engineer, the creator of the IBM Acoustics Lab in Poughkeepsie, the founder of the global Acoustics program at IBM, and his many other IBM leadership roles. Bill was also a long-serving IBM manager, with the full set of personnel issues to deal with, so his people-management skills were often called into play. Bill ended his long and fruitful IBM career at a high point. In 1988, he took an original idea of his to the top of IBM executive management, which led directly to the formation of the IBM Academy of Technology, today the preeminent body of IBM top technical leaders from around the world.

  8. The Partisan Brain: An Identity-Based Model of Political Belief.

    Science.gov (United States)

    Van Bavel, Jay J; Pereira, Andrea

    2018-03-01

    Democracies assume accurate knowledge by the populace, but the human attraction to fake and untrustworthy news poses a serious problem for healthy democratic functioning. We articulate why and how identification with political parties - known as partisanship - can bias information processing in the human brain. There is extensive evidence that people engage in motivated political reasoning, but recent research suggests that partisanship can alter memory, implicit evaluation, and even perceptual judgments. We propose an identity-based model of belief for understanding the influence of partisanship on these cognitive processes. This framework helps to explain why people place party loyalty over policy, and even over truth. Finally, we discuss strategies for de-biasing information processing to help to create a shared reality across partisan divides. Copyright © 2018 Elsevier Ltd. All rights reserved.

  9. IBM KELOMPOK USAHA SOUVENIR SABLON DIGITAL

    Directory of Open Access Journals (Sweden)

    Maria krisnawati

    2015-12-01

    Full Text Available Kegiatan IbM dilaksanakan pada kelompok souvenir sablon digital di Desa Sidodadi dan Karanglo Kecamatan Tawangnangu Kabupaten Karanganyar. Kegiatan ini bertujuan untuk: 1 meningkatkan motivasi wirausaha mitra; 2 meningkatkan pemahaman mitra tentang perencanaan bisnis dan manajemen usaha; 3 meningkatkan kemampuan SDM dalam teknik produksi dan pemasaran; serta 4 mengembangkan jejaring kewirausahaan pemuda untuk menopang pengembangan ekonomi kreatif. Target yang akan dicapai melalui IbM adalah pada aspek produksi dan manajemen. Aspek produksi, yaitu meningkatnya teknologi produksi pembuatan souvenir, meningkatnya kemampuan dalam bidang desain melalui program corel draw dan Adobe photoshop serta pemantapan prosedur produksi dengan memperhatikan kesehatan dan keselamatan kerja. Aspek manajemen, yaitu pada manajemen keuangan, mengadakan pengelolaaan keuangan yang baik dengan pembukuan yang teratur, melalui manajemen pemasaran menghasilkan bentuk-bentuk promosi melalui berbagai media, perluasan jaringan pasar dan mempermudah akses konsumen memesan produk. Melalui manajemen SDM dapat meningkatkan kemampuan SDM dengan pelatihan, pemberian motivasi wirausaha dan pemberdayaan diri.Kegiatan IbM dilaksanakan melalui tahapan 1 Tahap Persiapan; 2 Tahap Assesment; 3 Tahap Perencanaan Program atau Kegiatan; 4 Tahap Pemformulasian Rencana Aksi; 5 Tahap Pelaksanaan (Implementasi Program atau Kegiatan; serta 6 Tahap Evaluasi. Diharapkan melalui tahapan yang akan dilaksanakan dapat membantu menyelesaikan permasalahan dan memenuhi kebutuhan mitra.Kata kunci : IbM, pelatihan, pembinaan, pendampingan, souvenir, sablon digital.

  10. Performing data analysis using IBM SPSS

    CERN Document Server

    Meyers, Lawrence S; Guarino, A J

    2013-01-01

    This book is designed to be a user's guide for students and other interested readers to perform statistical data analysis with IBM SPSS, which is a major statistical software package used extensively in academic, government, and business settings. This book addresses the needs, level of sophistication, and interest in introductory statistical methodology on the part of undergraduate and graduate students in social and behavioral science, business, health-related, and education programs.  Each chapter covers a particular statistical procedure and has the following format: an example pr

  11. IBM SPSS statistics 19 made simple

    CERN Document Server

    Gray, Colin D

    2012-01-01

    This new edition of one of the most widely read textbooks in its field introduces the reader to data analysis with the most powerful and versatile statistical package on the market: IBM SPSS Statistics 19. Each new release of SPSS Statistics features new options and other improvements. There remains a core of fundamental operating principles and techniques which have continued to apply to all releases issued in recent years and have been proved to be worth communicating in a small volume. This practical and informal book combines simplicity and clarity of presentation with a comprehensive trea

  12. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  13. Implementation of NASTRAN on the IBM/370 CMS operating system

    Science.gov (United States)

    Britten, S. S.; Schumacker, B.

    1980-01-01

    The NASA Structural Analysis (NASTRAN) computer program is operational on the IBM 360/370 series computers. While execution of NASTRAN has been described and implemented under the virtual storage operating systems of the IBM 370 models, the IBM 370/168 computer can also operate in a time-sharing mode under the virtual machine operating system using the Conversational Monitor System (CMS) subset. The changes required to make NASTRAN operational under the CMS operating system are described.

  14. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  15. Securing the Global Airspace System Via Identity-Based Security

    Science.gov (United States)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  16. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  17. Materials accounting system for an IBM PC

    International Nuclear Information System (INIS)

    Bearse, R.C.; Thomas, R.J.; Henslee, S.P.; Jackson, B.G.; Tracy, D.B.; Pace, D.M.

    1986-01-01

    We have adapted the Los Alamos MASS accounting system for use on an IBM PC/AT at the Fuels Manufacturing Facility (FMF) at Argonne National Laboratory-West (ANL-WEST) in Idaho Falls, Idaho. Cost of hardware and proprietary software was less than $10,000 per station. The system consists of three stations between which accounting information is transferred using floppy disks accompanying special nuclear material shipments. The programs were implemented in dBASEIII and were compiled using the proprietary software CLIPPER. Modifications to the inventory can be posted in just a few minutes, and operator/computer interaction is nearly instantaneous. After the records are built by the user, it takes 4 to 5 seconds to post the results to the database files. A version of this system was specially adapted and is currently in use at the FMF facility at Argonne National Laboratory in Idaho Falls. Initial satisfaction is adequate and software and hardware problems are minimal

  18. Implementing Open Innovation: The Case of Natura, IBM and Siemens

    Directory of Open Access Journals (Sweden)

    Cely Ades

    2013-05-01

    Full Text Available This paper analyses three case firms whose innovation management processes have been consolidated. The companies Natura, IBM (Brazilian Subsidiary and Siemens (ChemTech/Brazil were studied with the purpose of analysing the implementation of OI, particularly in terms of: (a its alignment with existing corporate strategy; (b its requirements such as culture, skill and motivation; (c the strategy and the implementation process; (d the results achieved (e the present barriers and enablers. The research is qualitative in nature and employs a descriptive approach. The main results of this study, obtained using a method called ‘Collective Subject Speech’ , show that the implementation of OI, both structured and non-structured, is mainly challenged by cultural issues. It has been observed that the implementation of OI process is at its embryonic stage in all case firms and that this occurs along with investments in closed innovation, meaning that OI results cannot be explored at this stage of the implementation, as there is a long way to consolidate these practices in the case firms studied.

  19. Training in the Workplace: An IBM Case Study. Contractor Report.

    Science.gov (United States)

    Grubb, Ralph E.

    International Business Machines Corporation's (IBM) efforts to develop a corporate culture are associated with its founder, Thomas J. Watson, Sr. From the start of his association with the company in 1914, the importance of education was stressed. The expansion of the education and training organization paralleled IBM's 75-year growth. In January…

  20. Collective states of even Xe isotopes in IBM+MQRPA

    Directory of Open Access Journals (Sweden)

    Efimov A. D.

    2016-01-01

    Full Text Available A modification of the Quasiparticle Random Phase Approximation (QRPA with small ground state correlations is suggested. The lowest energy phonon is used as the image of d-boson of the Interacting Boson Model 1 (IBM1 and applied to microscopical calculations of the IBM1 parameters. Results are compared with experimental data for Xe isotopes.

  1. IBM announces global Grid computing solutions for banking, financial markets

    CERN Multimedia

    2003-01-01

    "IBM has announced a series of Grid projects around the world as part of its Grid computing program. They include IBM new Grid-based product offerings with business intelligence software provider SAS and other partners that address the computer-intensive needs of the banking and financial markets industry (1 page)."

  2. Isospin invariant forms of interacting boson model (IBM)

    International Nuclear Information System (INIS)

    Evans, A.

    1989-01-01

    In the original version of the interacting boson model, IBM1, there are only two quantum numbers with exact values: the angular momentum and the number of bosons. IBM2 distinguishes between two kinds of bosons. However, the IBM2 algebra does not include the operators T± and consequently the states in the model have no good isospin, generally. IBM3 includes the isospin in the algebra and therefore the construction of states with any number of bosons and good isospin presents no problem. In this work, IBM3 is compared with the shell model. IBFM3 is also studied, which describes an odd nucleus as a system of N bosons plus a single nucleon that is a neutron with some probability and a proton with the complementary probability. The spectra obtained in the shell model, IBFM3 and IBFM2 for 45 Ti and 45 Sc are compared. (Author) [es

  3. Security on Cloud Revocation Authority using Identity Based Encryption

    Science.gov (United States)

    Rajaprabha, M. N.

    2017-11-01

    As due to the era of cloud computing most of the people are saving there documents, files and other things on cloud spaces. Due to this security over the cloud is also important because all the confidential things are there on the cloud. So to overcome private key infrastructure (PKI) issues some revocable Identity Based Encryption (IBE) techniques are introduced which eliminates the demand of PKI. The technique introduced is key update cloud service provider which is having two issues in it and they are computation and communication cost is high and second one is scalability issue. So to overcome this problem we come along with the system in which the Cloud Revocation Authority (CRA) is there for the security which will only hold the secret key for each user. And the secret key was send with the help of advanced encryption standard security. The key is encrypted and send to the CRA for giving the authentication to the person who wants to share the data or files or for the communication purpose. Through that key only the other user will able to access that file and if the user apply some invalid key on the particular file than the information of that user and file is send to the administrator and administrator is having rights to block that person of black list that person to use the system services.

  4. Racial-ethnic self-schemas: Multi-dimensional identity-based motivation

    Science.gov (United States)

    Oyserman, Daphna

    2008-01-01

    Prior self-schema research focuses on benefits of being schematic vs. aschematic in stereotyped domains. The current studies build on this work, examining racial-ethnic self-schemas as multi-dimensional, containing multiple, conflicting, and non-integrated images. A multidimensional perspective captures complexity; examining net effects of dimensions predicts within-group differences in academic engagement and well-being. When racial-ethnicity self-schemas focus attention on membership in both in-group and broader society, engagement with school should increase since school is not seen as out-group defining. When racial-ethnicity self-schemas focus attention on inclusion (not obstacles to inclusion) in broader society, risk of depressive symptoms should decrease. Support for these hypotheses was found in two separate samples (8th graders, n = 213, 9th graders followed to 12th grade n = 141). PMID:19122837

  5. Lenovo acquires IBM's x86 low-end server business

    Directory of Open Access Journals (Sweden)

    Singh Pal Netra

    2015-01-01

    Full Text Available This paper presents an analysis of the key events, impacts and issues of Lenovo buying IBM's x86 low-end server business. The analysis include (i approval of the deal by regulatory bodies in the United States, Canada, India and China, (ii security concerns of US government departments, (iii pricing of the deals, (iv possible impact on IBM in future, and (v possibilities of Lenovo making it repeat of acquiring ThinkPad business of IBM. The paper presents analysis of qualitative and time series quantitative data. The qualitative data are mainly consists of different events before and after the acquisition of x86 server IBM business by Lenovo. The quantitative data are analyzed with respect to growth parameters of overall server business and Lenovo server business. Research paper also attempts to find out answer to specific 9 research questions with respect to impact on eco-systems of IBM and Lenovo. Based on analysis, it is inferred that IBM is not able to manage its traditional & well accepted products business in the face of fierce competition & low demand but Lenovo will manage. The deal was a financial necessity for IBM and strategic expansion in to new markets strategy for Lenovo.

  6. Uporaba orodja poslovne inteligence IBM Watson za predvidevanje prodaje

    OpenAIRE

    Stojić, Igor

    2016-01-01

    Diplomska naloga obravnava uporabo orodja IBM Watson in njegovo poslovno vrednost, ki jo ima v okviru oblikovanja napovedi prihodnje prodaje produktov. V teoretičnem delu podrobneje opredeljuje napovedovanje in smoter le-tega. V okviru empiričnega dela pa je bila izvedena primerjava uporabe ERP sistemov SAP in IBM Watson, pri čemer je bil dosledno prikazan postopek oblikovanja napovedi, tako s SAP kot tudi z IBM Watson, s slednjim pa tudi identificiran parameter, ki vpliva na prodajo nekateri...

  7. The Little Giant: The IBM Series/1 in Library Applications.

    Science.gov (United States)

    Hendricks, Donald D.; Manino, Glenn

    1987-01-01

    This description of the use of IBM Series/1 minicomputers to implement a library automation system includes discussion of current functions of the system, the system configuration, communications capabilities, software, and cost factors. (CLB)

  8. A performance evaluation of the IBM 370/XT personal computer

    Science.gov (United States)

    Dominick, Wayne D. (Editor); Triantafyllopoulos, Spiros

    1984-01-01

    An evaluation of the IBM 370/XT personal computer is given. This evaluation focuses primarily on the use of the 370/XT for scientific and technical applications and applications development. A measurement of the capabilities of the 370/XT was performed by means of test programs which are presented. Also included is a review of facilities provided by the operating system (VM/PC), along with comments on the IBM 370/XT hardware configuration.

  9. New Generation General Purpose Computer (GPC) compact IBM unit

    Science.gov (United States)

    1991-01-01

    New Generation General Purpose Computer (GPC) compact IBM unit replaces a two-unit earlier generation computer. The new IBM unit is documented in table top views alone (S91-26867, S91-26868), with the onboard equipment it supports including the flight deck CRT screen and keypad (S91-26866), and next to the two earlier versions it replaces (S91-26869).

  10. Training IBM Watson using Automatically Generated Question-Answer Pairs

    OpenAIRE

    Lee, Jangho; Kim, Gyuwan; Yoo, Jaeyoon; Jung, Changwoo; Kim, Minseok; Yoon, Sungroh

    2016-01-01

    IBM Watson is a cognitive computing system capable of question answering in natural languages. It is believed that IBM Watson can understand large corpora and answer relevant questions more effectively than any other question-answering system currently available. To unleash the full power of Watson, however, we need to train its instance with a large number of well-prepared question-answer pairs. Obviously, manually generating such pairs in a large quantity is prohibitively time consuming and...

  11. The web server of IBM's Bioinformatics and Pattern Discovery group.

    Science.gov (United States)

    Huynh, Tien; Rigoutsos, Isidore; Parida, Laxmi; Platt, Daniel; Shibuya, Tetsuo

    2003-07-01

    We herein present and discuss the services and content which are available on the web server of IBM's Bioinformatics and Pattern Discovery group. The server is operational around the clock and provides access to a variety of methods that have been published by the group's members and collaborators. The available tools correspond to applications ranging from the discovery of patterns in streams of events and the computation of multiple sequence alignments, to the discovery of genes in nucleic acid sequences and the interactive annotation of amino acid sequences. Additionally, annotations for more than 70 archaeal, bacterial, eukaryotic and viral genomes are available on-line and can be searched interactively. The tools and code bundles can be accessed beginning at http://cbcsrv.watson.ibm.com/Tspd.html whereas the genomics annotations are available at http://cbcsrv.watson.ibm.com/Annotations/.

  12. On Motivation and Motivation

    OpenAIRE

    Mircea UDRESCU

    2014-01-01

    Economic motivations were a big influence on consumer behavior motivation. In this context, it is considered that the general motives which give motivation to purchase content can be structured into rational and emotional motives, the motives innate and acquired motives, all gaining an individual or group event. The study of consumer behavior, with general motivations, attention increasingly larger granted special incentives, consisting of assertiveness feeling (emerging desire for a product)...

  13. IBM PC/IX operating system evaluation plan

    Science.gov (United States)

    Dominick, Wayne D. (Editor); Granier, Martin; Hall, Philip P.; Triantafyllopoulos, Spiros

    1984-01-01

    An evaluation plan for the IBM PC/IX Operating System designed for IBM PC/XT computers is discussed. The evaluation plan covers the areas of performance measurement and evaluation, software facilities available, man-machine interface considerations, networking, and the suitability of PC/IX as a development environment within the University of Southwestern Louisiana NASA PC Research and Development project. In order to compare and evaluate the PC/IX system, comparisons with other available UNIX-based systems are also included.

  14. Design of multichannel counting system for IBM PC and compatibles

    International Nuclear Information System (INIS)

    Majeed, B.; Ahmad, Z.; Osman, A.; Ysain, M.M.

    1995-07-01

    A Multichannel Counting System (MCCS), based on IBM-PC and compatible computer systems have been designed. The MCCS consists of a Multichannel Counting System plug-in interface card (MCCS-PC) for IBM PC and compatibles and a NIM-BIN module (MCCS-NB). The MCCS-PC provides simultaneous monitoring of upto seven independent SCA type inputs. An on board programmable timer provides elapsed time measurement. A menu-driven program for data acquisition and timer control has also been developed. (author) 8 figs

  15. Microscopic IBM-1 description of collective states in 128Ce

    Directory of Open Access Journals (Sweden)

    Mikhajlov V. M.

    2012-12-01

    Full Text Available Microscopical quasiparticle theory is developed to calculate the IBM-1 parameters entering the Hamiltonian and E2–operator. The theory takes into account the impact of noncollective phonons and predicts alterations of the superconducting properties along the excitation spectrum, whereas the most collective phonon (the image of the IBM d-boson is practically invariable. Calculations of the energy spectrum and probabilities of E2–transitions (without effective nucleon charges were performed for 128Ce. The results obtained are in satisfactory agreement with experimental data.

  16. IBM WebSphere Application Server 80 Administration Guide

    CERN Document Server

    Robinson, Steve

    2011-01-01

    IBM WebSphere Application Server 8.0 Administration Guide is a highly practical, example-driven tutorial. You will be introduced to WebSphere Application Server 8.0, and guided through configuration, deployment, and tuning for optimum performance. If you are an administrator who wants to get up and running with IBM WebSphere Application Server 8.0, then this book is not to be missed. Experience with WebSphere and Java would be an advantage, but is not essential.

  17. Generalized Information Architecture for Managing Requirements in IBM?s Rational DOORS(r) Application.

    Energy Technology Data Exchange (ETDEWEB)

    Aragon, Kathryn M.; Eaton, Shelley M.; McCornack, Marjorie Turner; Shannon, Sharon A.

    2014-12-01

    When a requirements engineering effort fails to meet expectations, often times the requirements management tool is blamed. Working with numerous project teams at Sandia National Laboratories over the last fifteen years has shown us that the tool is rarely the culprit; usually it is the lack of a viable information architecture with well- designed processes to support requirements engineering. This document illustrates design concepts with rationale, as well as a proven information architecture to structure and manage information in support of requirements engineering activities for any size or type of project. This generalized information architecture is specific to IBM's Rational DOORS (Dynamic Object Oriented Requirements System) software application, which is the requirements management tool in Sandia's CEE (Common Engineering Environment). This generalized information architecture can be used as presented or as a foundation for designing a tailored information architecture for project-specific needs. It may also be tailored for another software tool. Version 1.0 4 November 201

  18. IbM PENYUSUNAN PENILAIAN AUTENTIK BAGI GURU SEKOLAH DI PONPES DARUL FIKRI BAWEN

    Directory of Open Access Journals (Sweden)

    Joko Siswanto

    2015-09-01

    Full Text Available Abstract Low motivation of teachers in implementing authentic assessment becomes the basis for IbM team to carry out extension activities. Authentic assessment has actually been around a long time, but this issue arose when the curriculum was launched in 2013. During this time, most of the teachers at school in the field only make an assessment test course, not many people touched assessment tests that are written. Through activities of IbM Authentic Assessment Preparation Training for Teachers of Pesantren Darul Fikri Bawen, participants are expected to conduct a written assessment, performance assessment, product assessment projects, portfolio assessment, and manage the mark using computer-based process. Prior to socialization, teachers must first take pretest and post test. Pre test shows an average score of 89.65 while the average of post-test scores shows 97.6. During the activities, the participants felt helped and gave a positive response to organized similar activities. Keywords: Preparation, Assessment Authentic, Darul Fikri Boarding School Teacher

  19. Desk-top publishing using IBM-compatible computers.

    Science.gov (United States)

    Grencis, P W

    1991-01-01

    This paper sets out to describe one Medical Illustration Departments' experience of the introduction of computers for desk-top publishing. In this particular case, after careful consideration of all the options open, an IBM-compatible system was installed rather than the often popular choice of an Apple Macintosh.

  20. An Apple for Your IBM PC--The Quadlink Board.

    Science.gov (United States)

    Owen, G. Scott

    1984-01-01

    Describes nature and installation of the QUADLINK board which allows Apple software to be run on IBM PC microcomputers. Although programs tested ran without problems, users should test their own programs since there are some copy protection schemes that can baffle the board. (JN)

  1. Mathematics Programming on the Apple II and IBM PC.

    Science.gov (United States)

    Myers, Roy E.; Schneider, David I.

    1987-01-01

    Details the features of BASIC used in mathematics programming and provides the information needed to translate between the Apple II and IBM PC computers. Discusses inputing a user-defined function, setting scroll windows, displaying subscripts and exponents, variable names, mathematical characters and special symbols. (TW)

  2. Maintenance of Microcomputers. Manual and Apple II Session, IBM Session.

    Science.gov (United States)

    Coffey, Michael A.; And Others

    This guide describes maintenance procedures for IBM and Apple personal computers, provides information on detecting and diagnosing problems, and details diagnostic programs. Included are discussions of printers, terminals, disks, disk drives, keyboards, hardware, and software. The text is supplemented by various diagrams. (EW)

  3. Software Process Improvement Journey: IBM Australia Application Management Services

    Science.gov (United States)

    2005-03-01

    See Section 5.1.2) - Client Relationship Management ( CRM ) processes-specifically, Solution Design and Solution Delivery - Worldwide Project Management ...plex systems life-cycle management , rapid solutions development, custom development, package selection and implementation, maintenance, minor...CarnegieMellon ___ Software Engineering Institute Software Process Improvement Journey: IBM Australia Application Management Services Robyn Nichols

  4. Configuration control plan for the ports NCS IBM RS/6000

    International Nuclear Information System (INIS)

    Brown, A.S.

    1996-01-01

    This document describes the actions and responsibilities for maintaining the quality and integrity of the NS software resident on the IBM RS/6000 workstation managed by the Nuclear Criticality Safety group at the Portsmouth Gaseous Diffusion Plant. This document does not address the validation of NS software packages for the RS/6000

  5. Design of a 1-chip IBM-3270 protocol handler

    NARCIS (Netherlands)

    Spaanenburg, L.

    1989-01-01

    The single-chip design of a 20MHz IBM-3270 coax protocol handler in a conventional 3 μ CMOS process-technology is discussed. The harmonious combination of CMOS circuit tricks and high-level design disciplines allows the 50k transistor design to be compiled and optimized into a 35 mm**2 chip in 4

  6. Bus and Tag Terminators for IBM system/360

    CERN Multimedia

    Control units were connected to the channels with "Bus and Tag" cable pairs. The bus cables carried the address and data information and the tag cables identified what data was on the bus. There were three general types of bus-and-tag cables produced by IBM.

  7. IBM PC based automatic drive system for Bulat setup

    International Nuclear Information System (INIS)

    Luchaninov, A.A.; Tolok, V.T.

    1999-01-01

    Non-expensive computer drive system for Bulat setup is described. System's hardware consists of IBM PC and conjunction block, providing 12 output channels, Software includes the main program, utilities and technology processes database. System may be used at surface modification processes, especially multilayer multicomponent coatings deposition

  8. The algebraic manipulation program DIRAC on IBM personal computers

    International Nuclear Information System (INIS)

    Grozin, A.G.; Perlt, H.

    1989-01-01

    The version DIRAC (2.2) for IBM compatible personal computers is described. It is designed to manipulate algebraically with polynomials and tensors. After a short introduction concerning implementation and usage on personal computers an example program is given. It contains a detailed user's guide to DIRAC (2.2) and, additionally some useful applications. 4 refs

  9. BRT-1 code for IBM 370/135

    International Nuclear Information System (INIS)

    Preda, I.

    1976-01-01

    BRT-1 is a transport code to obtain the thermal neutrons spectrum, point dependent, in one reactor cell. The code BRT-1 described in this paper, is the code BRT-1, written in FORTRAN IV language for the computer UNIVAC 1108 with CSCX operating system, converted for the computer IBM 370/135 disk operating system. (author)

  10. Fabled IBM Tank nears launch without key features

    CERN Multimedia

    2003-01-01

    "IBM is preparing to roll out the TotalStorage SAN File System, the ballyhooed, renamed, much delayed Storage Tank the company's been working on for ages, although it now appears some of its key capabilities won't appear until next year in a later version" (1 page).

  11. An efficient and provable secure revocable identity-based encryption scheme.

    Directory of Open Access Journals (Sweden)

    Changji Wang

    Full Text Available Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.

  12. AGRIS: Categorization and information retrieval based on IBM's IRMS

    International Nuclear Information System (INIS)

    Schmid, H.; Leatherdale, D.

    1976-01-01

    The subject breakdown of the AGRIS data base by categories interlinked with object and geographical codes is described. The use of these categories and codes in a mechanized information retrieval system is then considered. The system is a modification of IBM's Information Retrieval and Management System (IRMS); it allows for batch processing on an IBM/360 or /370 computer operated under OS or VS. As IRMS was developed for use with a controlled vocabulary, the search possibilities on the AGRIS files are necessarily limited. An artificial vocabulary is presented, derived from the AGRIS subject categories, object codes, geographic codes, language codes, and bibliographic data: type of record, literary indicator, volume/issue number, and the country code of the submitting centre. The use of the IRMS system for AGRIS is described, with details of programming deliberately omitted. Program descriptions with data set definitions and file formats are presented separately

  13. Dynamics of Innovation at IBM, 1945-1953

    DEFF Research Database (Denmark)

    Heide, Lars

    The paper explores the use of sociotechnical network and sensemaking theory in early early innovation of computer technology at IBM to improve the understanding of the dynamics in innovation processes through the study of individuals’ contributions in a large company. It complements Actor Network...... Theory by Karl E. Weick’s sensemaking and studies innovation processes through narratives. This approach supplements the literature’s institutional focus and provides more focus on the technology’s use and limitations on innovations. In the mid-1940s, IBM was reluctant to engage in computer innovation......, because its sales organization and top-management saw little computer business. They subscribed to the established corporate innovation narrative of incremental improvements of the company’s many single punched-card machines, which contrasted the challenges of the revolutionary shift to computers. However...

  14. Radioimmunoassay data processing program for IBM PC computers

    International Nuclear Information System (INIS)

    1989-06-01

    The Medical Applications Section of the International Atomic Energy Agency (IAEA) has previously developed several programs for use on the Hewlett-Packard HP-41C programmable calculator to facilitate better quality control in radioimmunoassay through improved data processing. The program described in this document is designed for off-line analysis using an IBM PC (or compatible) for counting data from standards and unknown specimens (i.e. for analysis of counting data previously recorded by a counter), together with internal quality control (IQC) data both within and between batch. The greater computing power of the IBM PC has enabled the imprecision profile and IQC control curves which were unavailable on the HP-41C version. It is intended that the program would make available good data processing capability to laboratories having limited financial resources and serious problems of quality control. 3 refs

  15. EZVIDEO, DISSPLA Graphics Software Simulation on IBM PC

    International Nuclear Information System (INIS)

    1991-01-01

    1 - Description of program or function: EZVIDEO simulates a subset of the DISSPLA plotting package to make plots on the IBM PC screen. Screen dumps can also be made to an attached LaserJet or Epson printer to make hard copy without using terminal emulators. The forerunner of EZVIDEO was called EZPLOT. 2 - Method of solution: The subroutines in the EZVIDEO system are based on the Hewlett Packard HP 9000 simulation of DISSPLA. These routines manipulate the pen movements on the screen and are also capable of capturing these same movements so that a hardcopy can be made to dot matrix or laser printer. 3 - Restrictions on the complexity of the problem: For plotting on the IBM PC, the plotting emulator PCPLOT is needed

  16. International Border Management Systems (IBMS) Program : visions and strategies.

    Energy Technology Data Exchange (ETDEWEB)

    McDaniel, Michael; Mohagheghi, Amir Hossein

    2011-02-01

    Sandia National Laboratories (SNL), International Border Management Systems (IBMS) Program is working to establish a long-term border security strategy with United States Central Command (CENTCOM). Efforts are being made to synthesize border security capabilities and technologies maintained at the Laboratories, and coordinate with subject matter expertise from both the New Mexico and California offices. The vision for SNL is to provide science and technology support for international projects and engagements on border security.

  17. Using Networks For Changing Innovation Strategy: The Case of IBM

    OpenAIRE

    Dittrich, Koen; Duysters, Geert; Man, Ard-Pieter

    2004-01-01

    textabstractLarge-scale strategic change projects in companies may be supported by using alliance networks. This paper shows that IBM’s change from an exploitation strategy towards an exploration strategy required a radically different network strategy as well. By entering into more non-equity alliances, involving new partners in the network and loosening the ties with existing partners, IBM supported its transformation from a hardware manufacturing company to a global service provider and so...

  18. Multi drop bus controller for IBM PC/AT

    International Nuclear Information System (INIS)

    Bardik, Yu.I.; Kalistratov, E.N.; Matyushin, A.A.; Obukhov, G.A.; Trofimov, N.N.

    1993-01-01

    The module PC-AT-PBC gives a possibility to create a working place based on the computer IBM PC/AT for testing of hardware which is compatible with the multi drop bus. The KP1830BE31 micro program change turns the module into timing generator for power supply controllers of the UNK correction system. The structure of the module, functional parts, library functions and two application programs have been described. 4 refs., 9 figs

  19. A new Identity Based Encryption (IBE) scheme using extended Chebyshev polynomial over finite fields Zp

    International Nuclear Information System (INIS)

    Benasser Algehawi, Mohammed; Samsudin, Azman

    2010-01-01

    We present a method to extract key pairs needed for the Identity Based Encryption (IBE) scheme from extended Chebyshev polynomial over finite fields Z p . Our proposed scheme relies on the hard problem and the bilinear property of the extended Chebyshev polynomial over Z p . The proposed system is applicable, secure, and reliable.

  20. The Unique Context of Identity-Based Student Organizations in Developing Leadership.

    Science.gov (United States)

    Kodama, Corinne M; Laylo, Rhonda

    2017-09-01

    This chapter addresses the important role of identity-based student organizations in developing leadership, particularly for students who may feel marginalized because of their racial/ethnic, religious, or gender identities. Understanding the influence of these groups can help leadership educators develop a more inclusive and diverse perspective on student leadership development. © 2017 Wiley Periodicals, Inc., A Wiley Company.

  1. Weaknesses of a dynamic identity based authentication protocol for multi-server architecture

    OpenAIRE

    Han, Weiwei

    2012-01-01

    Recently, Li et al. proposed a dynamic identity based authentication protocol for multi-server architecture. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Li et al.'s protocol is vulnerable to the replay attack, the password guessing attack and the masquerade attack.

  2. CC-3 CAMAC crate controller for IBM PC

    International Nuclear Information System (INIS)

    Khare, A.N.; Ghodgaonkar, M.D.; Bairi, B.R.

    1991-01-01

    The specifications and implementation details of CAMAC Crate Controller CC-3 for IBM-PC compatible as a host computer, having capability to transfer high speed data with direct memory access (DMA) scheme and logic to execute CAMAC cycles directly from the crate controller, to implement the block algorithms specified in ANSI/IEEE Std. 683-1976 (Reaff-1981) are described. The maximum data transfer rate measured with 8 bit interface of PC-AT is 240K byte per second. This work is carried out under Seventh Five Year Plan Project on Modernisation of reactor Control Instrumentation and Development of CAMAC and Fastbus Instrumentation. (author). 9 refs., 5 figs., 4 appendixes

  3. Demonstration of entanglement assisted invariance on IBM's quantum experience.

    Science.gov (United States)

    Deffner, Sebastian

    2017-11-01

    Quantum entanglement is among the most fundamental, yet from classical intuition also most surprising properties of the fully quantum nature of physical reality. We report several experiments performed on IBM's Quantum Experience demonstrating envariance - entanglement assisted invariance. Envariance is a recently discovered symmetry of composite quantum systems, which is at the foundational origin of physics and a quantum phenomenon of pure states. These very easily reproducible and freely accessible experiments on Quantum Experience provide simple tools to study the properties of envariance, and we illustrate this for several cases with "quantum universes" consisting of up to five qubits.

  4. Driving the Power of AIX Performance Tuning on IBM Power

    CERN Document Server

    Milberg, Ken

    2009-01-01

    A concise reference for IT professionals, this book goes beyond the rules and contains the best practices and strategies for solid tuning methodology. Tips based on years of experience from an AIX tuning master show specific steps for monitoring and tuning CPU, virtual memory, disk I/O, and network components. Also offering techniques for tuning Oracle and Linux structures that run on an IBM power system-as well as for the new AIX 6.1-this manual discusses what tools are available, how to best use them to collect historical data, and when to analyze trends and results. The only comprehensive,

  5. Handbook of univariate and multivariate data analysis with IBM SPSS

    CERN Document Server

    Ho, Robert

    2013-01-01

    Using the same accessible, hands-on approach as its best-selling predecessor, the Handbook of Univariate and Multivariate Data Analysis with IBM SPSS, Second Edition explains how to apply statistical tests to experimental findings, identify the assumptions underlying the tests, and interpret the findings. This second edition now covers more topics and has been updated with the SPSS statistical package for Windows.New to the Second EditionThree new chapters on multiple discriminant analysis, logistic regression, and canonical correlationNew section on how to deal with missing dataCoverage of te

  6. Approximate Quantum Adders with Genetic Algorithms: An IBM Quantum Experience

    Directory of Open Access Journals (Sweden)

    Li Rui

    2017-07-01

    Full Text Available It has been proven that quantum adders are forbidden by the laws of quantum mechanics. We analyze theoretical proposals for the implementation of approximate quantum adders and optimize them by means of genetic algorithms, improving previous protocols in terms of efficiency and fidelity. Furthermore, we experimentally realize a suitable approximate quantum adder with the cloud quantum computing facilities provided by IBM Quantum Experience. The development of approximate quantum adders enhances the toolbox of quantum information protocols, paving the way for novel applications in quantum technologies.

  7. Differences in Study Motivation within and between Genders: An Examination by Gender Typicality among Early Adolescents

    Science.gov (United States)

    Vantieghem, Wendelien; Van Houtte, Mieke

    2018-01-01

    Despite boys' educational underachievement, gender differences in study motivation have received little research attention. Guided by self-determination theory and the identity-based motivation model, this study investigates differences in study motivation between boys and girls, as well as within each gender. To adequately consider these…

  8. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

    Science.gov (United States)

    Yan, Liang; Rong, Chunming; Zhao, Gansen

    More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

  9. IBE-Lite: a lightweight identity-based cryptography for body sensor networks.

    Science.gov (United States)

    Tan, Chiu C; Wang, Haodong; Zhong, Sheng; Li, Qun

    2009-11-01

    A body sensor network (BSN) is a network of sensors deployed on a person's body for health care monitoring. Since the sensors collect personal medical data, security and privacy are important components in a BSN. In this paper, we developed IBE-Lite, a lightweight identity-based encryption suitable for sensors in a BSN. We present protocols based on IBE-Lite that balance security and privacy with accessibility and perform evaluation using experiments conducted on commercially available sensors.

  10. Centro de cálculo IBM - Francfort (Alemania Federal

    Directory of Open Access Journals (Sweden)

    Apel, Beckert, Becker, Arquitectos

    1972-03-01

    Full Text Available This centre comprises a tall building, of approximately square cross section, and a 10 m high rectangular block. The first one houses the offices, and the second contains an IBM computer and accessories. The structure is of reinforced concrete for the vertical members, and ribbed flooring slabs for the horizontal ones. The external enclosing medium consists of precast concrete elements, and large glazed surfaces. The are features of ornamental significance, such as the indoor helicoidal stairs of unfaced concrete, and the slab covered square, with its garden and artificial lake areas. Parking space is provided in the basements.El complejo se compone de: — un rascacielos con planta sensiblemente cuadrada y 38 m de altura, y — un bloque rectangular, más bajo, de 9,90 m de alto. El primero alberga las oficinas, y el segundo se destina a cubrir todas las exigencias que se derivan del funcionamiento de un ordenador IBM. Su estructura, a base de núcleos verticales de hormigón armado, forjados nervados y cerramientos compuestos de piezas de hormigón, prefabricadas, con grandes zonas acristaladas. Hay motivos ornamentales, como la escalera helicoidal interior, de hormigón visto, y la plaza enlosada, con estanques y jardineras. Aparcamiento en el sótano.

  11. IBM-PC-based reactor neutronics analysis package

    International Nuclear Information System (INIS)

    Nigg, D.W.; Wessol, D.E.; Grimesey, R.A.; Parsons, D.K.; Wheeler, F.J.; Yoon, W.Y.; Lake, J.A.

    1985-01-01

    Technical advances over the past few years have led to a situation where a wide range of complex scientific computations can now be done on properly configured microcomputers such as the IBM-PC (personal computer). For a number of reasons, including security, economy, and user convenience, the development of a comprehensive system of reactor neutronics codes suitable for operation on the IBM-PC has been undertaken at the Idaho National Engineering Laboratory (INEL). It is anticipated that a PC-based code system could also have wide applicability in the nuclear engineering education community since conversion of software generated by national laboratories and others to college and university mainframe hardware has historically been a time-consuming process that has sometimes met with only limited success. This paper discusses the philosophy behind the INEL reactor neutronics PC code system and describes those parts of the system that are currently complete, those that are now under development, and those that are still in the planning stage

  12. International Business Machines (IBM) Corporation Interim Agreement EPA Case No. 08-0113-00

    Science.gov (United States)

    On March 27, 2008, the United States Environmental Protection Agency (EPA), suspended International Business Machines (IBM) from receiving Federal Contracts, approved subcontracts, assistance, loans and other benefits.

  13. Performance characteristics of the Mayo/IBM PACS

    Science.gov (United States)

    Persons, Kenneth R.; Gehring, Dale G.; Pavicic, Mark J.; Ding, Yingjai

    1991-07-01

    The Mayo Clinic and IBM (at Rochester, Minnesota) have jointly developed a picture archiving system for use with Mayo's MRI and Neuro CT imaging modalities. The communications backbone of the PACS is a portion of the Mayo institutional network: a series of 4-Mbps token rings interconnected by bridges and fiber optic extensions. The performance characteristics of this system are important to understand because they affect the response time a PACS user can expect, and the response time for non-PACS users competing for resources on the institutional network. The performance characteristics of each component and the average load levels of the network were measured for various load distributions. These data were used to quantify the response characteristics of the existing system and to tune a model developed by North Dakota State University Department of Computer Science for predicting response times of more complex topologies.

  14. Unloading at Cointrin Airport of the IBM 709 computer

    CERN Multimedia

    CERN PhotoLab

    1960-01-01

    CERN's first computer, a huge vacuum-tube Ferranti Mercury, was installed in building 2 in 1958. With its 60 microsecond clock cycle, it was a million times slower than today's big computers. The Mercury took 3 months to install and filled a huge room, even so, its computational ability didn't quite match that of a modern pocket calculator. "Mass" storage was provided by four magnetic drums each holding 32K x 20 bits - not enough to hold the data from a single proton-proton collision in the LHC. It was replaced in 1960 by the IBM 709 computer, seen here being unloaded at Cointrin airport. Although it was taken over so quickly by transistor equipped machines, a small part of the Ferranti Mercury remains. The computer's engineers installed a warning bell to signal computing errors - it can still be found mounted on the wall in a corridor of building 2.

  15. Multivariate methods and forecasting with IBM SPSS statistics

    CERN Document Server

    Aljandali, Abdulkader

    2017-01-01

    This is the second of a two-part guide to quantitative analysis using the IBM SPSS Statistics software package; this volume focuses on multivariate statistical methods and advanced forecasting techniques. More often than not, regression models involve more than one independent variable. For example, forecasting methods are commonly applied to aggregates such as inflation rates, unemployment, exchange rates, etc., that have complex relationships with determining variables. This book introduces multivariate regression models and provides examples to help understand theory underpinning the model. The book presents the fundamentals of multivariate regression and then moves on to examine several related techniques that have application in business-orientated fields such as logistic and multinomial regression. Forecasting tools such as the Box-Jenkins approach to time series modeling are introduced, as well as exponential smoothing and naïve techniques. This part also covers hot topics such as Factor Analysis, Dis...

  16. Homomorphic encryption experiments on IBM's cloud quantum computing platform

    Science.gov (United States)

    Huang, He-Liang; Zhao, You-Wei; Li, Tan; Li, Feng-Guang; Du, Yu-Tao; Fu, Xiang-Qun; Zhang, Shuo; Wang, Xiang; Bao, Wan-Su

    2017-02-01

    Quantum computing has undergone rapid development in recent years. Owing to limitations on scalability, personal quantum computers still seem slightly unrealistic in the near future. The first practical quantum computer for ordinary users is likely to be on the cloud. However, the adoption of cloud computing is possible only if security is ensured. Homomorphic encryption is a cryptographic protocol that allows computation to be performed on encrypted data without decrypting them, so it is well suited to cloud computing. Here, we first applied homomorphic encryption on IBM's cloud quantum computer platform. In our experiments, we successfully implemented a quantum algorithm for linear equations while protecting our privacy. This demonstration opens a feasible path to the next stage of development of cloud quantum information technology.

  17. Ibm BAGI GURU DAN SISWA SMU SETIA BUDI SEMARANG

    Directory of Open Access Journals (Sweden)

    Adhi Kusmantoro

    2016-06-01

    Full Text Available Dalam dunia industri ada beberapasistem yang digunakan dalam mengoperasikan sistem pengendalielektromagnetik, antara lain sistem pengoperasian secara manual, semi otomatisdan otomatis.Tujuan pengabdian masyarakat di SMU Setia Budi Semarang adalah untuk memberikan kemampuan penggunaan software EKTS dan menambah pengetahuan atau wawasan teknik pengendali listrik di industri yang sedang berkembang dan banyak dipakai. Metode pelaksanaan kegiatan program Iptek bagi Masyarakat (IbM yang digunakan adalah metode pelatihan yang dibagi dalam tiga tahap, yaitu pelatihan secara teori, pelatihan menggunakan softawre EKTS dan beberapa rancangan pengendali motor listrik, dan tahap evaluasi dalam kegiatan awal sampai dengan akhir. Dalam kegiatan pengabdian masyarakat di SMU Setia Budi Semarang telah dibuat pengendali start stop, pengendali motor berurutan, dan pengendali membalik putaran motor listrik. ?é?á Kata Kunci : EKTS, motor listrik, kontaktor magnet

  18. CLIPS - C LANGUAGE INTEGRATED PRODUCTION SYSTEM (IBM PC VERSION)

    Science.gov (United States)

    Riley, G.

    1994-01-01

    The C Language Integrated Production System, CLIPS, is a shell for developing expert systems. It is designed to allow artificial intelligence research, development, and delivery on conventional computers. The primary design goals for CLIPS are portability, efficiency, and functionality. For these reasons, the program is written in C. CLIPS meets or outperforms most micro- and minicomputer based artificial intelligence tools. CLIPS is a forward chaining rule-based language. The program contains an inference engine and a language syntax that provide a framework for the construction of an expert system. It also includes tools for debugging an application. CLIPS is based on the Rete algorithm, which enables very efficient pattern matching. The collection of conditions and actions to be taken if the conditions are met is constructed into a rule network. As facts are asserted either prior to or during a session, CLIPS pattern-matches the number of fields. Wildcards and variables are supported for both single and multiple fields. CLIPS syntax allows the inclusion of externally defined functions (outside functions which are written in a language other than CLIPS). CLIPS itself can be embedded in a program such that the expert system is available as a simple subroutine call. Advanced features found in CLIPS version 4.3 include an integrated microEMACS editor, the ability to generate C source code from a CLIPS rule base to produce a dedicated executable, binary load and save capabilities for CLIPS rule bases, and the utility program CRSV (Cross-Reference, Style, and Verification) designed to facilitate the development and maintenance of large rule bases. Five machine versions are available. Each machine version includes the source and the executable for that machine. The UNIX version includes the source and binaries for IBM RS/6000, Sun3 series, and Sun4 series computers. The UNIX, DEC VAX, and DEC RISC Workstation versions are line oriented. The PC version and the Macintosh

  19. The I.B.M. 7090 programmes PERSEUS, ARIADNE, CERBERUS

    International Nuclear Information System (INIS)

    Green, C.

    1964-08-01

    An account is given of the programmes PERSEUS, ARIADNE and CERBERUS, written in the Fortran II language for the I.B.M. 7090 computer. PERSEUS calculates multigroup fluxes in a multiregion lattice cell possessing cylindrical symmetry, and which is assumed infinite in the axial direction. Neutron transport is represented by means of first collision probabilities and, at the cell boundary, a 'white' boundary condition is imposed. ARIADNE is a modified version of PERSEUS and calculates multigroup average axial and radial diffusion coefficients in the lattice cell. CERBERUS is also based on PERSEUS and calculates fluxes in an infinite lattice composed of two types of cell arranged in a 'checkerboard' fashion. The two types of cell are assumed infinite axially, cylindrically symmetric and possessing the same maximum radial dimension, but may otherwise be differently constituted. All three programmes have input requirements similar to those of the Winfrith DSN programme. (author)

  20. A Conceptual Framework for the Electronic Performance Support Systems within IBM Lotus Notes 6 (LN6 Example

    Directory of Open Access Journals (Sweden)

    Servet BAYRAM

    2005-10-01

    Full Text Available A Conceptual Framework for the Electronic PerformanceSupport Systems within IBM Lotus Notes 6 (LN6 Example Assoc. Prof. Dr. Servet BAYRAM Computer Education & Instructional Technologies Marmara University, TURKEYsbayram@marmara.edu.tr ABSTRACT The concept of Electronic Performance Support Systems (EPSS is containing multimedia or computer based instruction components that improves human performance by providing process simplification, performance information and decision support system. EPSS has become a hot topic for organizational development, human resources, performance technology, training, and educational development professionals. A conceptual framework of EPSS is constructed under five interrelated and interdependent domains for educational implications. The domains of the framework are online collaboration, cost-effectiveness, motivation, service management, and performance empowering. IBM Lotus Notes 6 (LN6 is used as an example application tool to illustrate the power of this framework. The framework describes a set of relevant events based upon deductive analyses for improving our understanding of the EPSS and its implications on education and training. The article is also pointed out that there are some similarities between the EPSS’ and the LN6’s specific features within this conceptual framework. It can provide some guidelines and benefits to researchers, educators, and designers as well.

  1. IBM Watson Analytics: Automating Visualization, Descriptive, and Predictive Statistics.

    Science.gov (United States)

    Hoyt, Robert Eugene; Snider, Dallas; Thompson, Carla; Mantravadi, Sarita

    2016-10-11

    We live in an era of explosive data generation that will continue to grow and involve all industries. One of the results of this explosion is the need for newer and more efficient data analytics procedures. Traditionally, data analytics required a substantial background in statistics and computer science. In 2015, International Business Machines Corporation (IBM) released the IBM Watson Analytics (IBMWA) software that delivered advanced statistical procedures based on the Statistical Package for the Social Sciences (SPSS). The latest entry of Watson Analytics into the field of analytical software products provides users with enhanced functions that are not available in many existing programs. For example, Watson Analytics automatically analyzes datasets, examines data quality, and determines the optimal statistical approach. Users can request exploratory, predictive, and visual analytics. Using natural language processing (NLP), users are able to submit additional questions for analyses in a quick response format. This analytical package is available free to academic institutions (faculty and students) that plan to use the tools for noncommercial purposes. To report the features of IBMWA and discuss how this software subjectively and objectively compares to other data mining programs. The salient features of the IBMWA program were examined and compared with other common analytical platforms, using validated health datasets. Using a validated dataset, IBMWA delivered similar predictions compared with several commercial and open source data mining software applications. The visual analytics generated by IBMWA were similar to results from programs such as Microsoft Excel and Tableau Software. In addition, assistance with data preprocessing and data exploration was an inherent component of the IBMWA application. Sensitivity and specificity were not included in the IBMWA predictive analytics results, nor were odds ratios, confidence intervals, or a confusion matrix

  2. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  3. A Comparison of the Apple Macintosh and IBM PC in Laboratory Applications.

    Science.gov (United States)

    Williams, Ron

    1986-01-01

    Compares Apple Macintosh and IBM PC microcomputers in terms of their usefulness in the laboratory. No attempt is made to equalize the two computer systems since they represent opposite ends of the computer spectrum. Indicates that the IBM PC is the most useful general-purpose personal computer for laboratory applications. (JN)

  4. 75 FR 60141 - International Business Machines (IBM), Global Technology Services Delivery Division, Including On...

    Science.gov (United States)

    2010-09-29

    ... 25, 2010, applicable to workers of International Business Machines (IBM), Global Technology Services... hereby issued as follows: All workers of International Business Machines (IBM), Global Technology... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-74,164] International Business...

  5. IBM SPSS modeler essentials effective techniques for building powerful data mining and predictive analytics solutions

    CERN Document Server

    McCormick, Keith; Wei, Bowen

    2017-01-01

    IBM SPSS Modeler allows quick, efficient predictive analytics and insight building from your data, and is a popularly used data mining tool. This book will guide you through the data mining process, and presents relevant statistical methods which are used to build predictive models and conduct other analytic tasks using IBM SPSS Modeler. From ...

  6. 76 FR 32231 - International Business Machines (IBM), Sales and Distribution Business Unit, Global Sales...

    Science.gov (United States)

    2011-06-03

    ... for the workers and former workers of International Business Machines (IBM), Sales and Distribution... reconsideration alleges that IBM outsourced to India and China. During the reconsideration investigation, it was..., Armonk, New York. The subject worker group supply computer software development and maintenance services...

  7. 76 FR 174 - International Business Machines (IBM), Global Sales Operations Organization, Sales and...

    Science.gov (United States)

    2011-01-03

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-74,575; TA-W-74,575D] International Business Machines (IBM), Global Sales Operations Organization, Sales and Distribution Business Manager Roles; One Teleworker Located in Charleston, WV; International Business Machines (IBM), Global Sales Operations Organization, Sales and...

  8. A Self-identity Based Model of Electric Car Adoption Intention

    DEFF Research Database (Denmark)

    Barbarossa, Camilla; Beckmann, Suzanne C.; de Pelsmacker, Patrick

    2015-01-01

    This study proposes a self-identity based eco-friendly intention formation model to assess the effects of green self-identity, care for the environmental consequences of consumption, and green moral obligation, on the attitude toward and the intention to adopt electric cars. The model...... between the countries. Results show that the independent variables influence consumer attitude toward the adoption of electric cars, which, in turn, determines the intention to adopt them. Significant differences emerge concerning the influence of the antecedents of consumer attitude toward electric car...

  9. Security extension for the Canetti-Krawczyk model in identity-based systems

    Institute of Scientific and Technical Information of China (English)

    LI Xinghua; MA Jianfeng; SangJae Moon

    2005-01-01

    The Canetti-Krawczyk (CK) model is a formalism for the analysis of keyexchange protocols, which can guarantee many security properties for the protocols proved secure by this model. But we find this model lacks the ability to guarantee key generation center (KGC) forward secrecy, which is an important security property for key-agreement protocols based on Identity. The essential reason leading to this weakness is that it does not fully consider the attacker's capabilities. In this paper, the CK model is accordingly extended with a new additional attacker's capability of the KGC corruption in Identity-based systems, which enables it to support KGC forward secrecy.

  10. Investigation of triaxiality in 54122-128Xe isotopes in the framework of sdg-IBM

    Science.gov (United States)

    Jafarizadeh, M. A.; Ranjbar, Z.; Fouladi, N.; Ghapanvari, M.

    In this paper, a transitional interacting boson model (IBM) Hamiltonian in both sd-(IBM) and sdg-IBM versions based on affine SU(1, 1) Lie algebra is employed to describe deviations from the gamma-unstable nature of Hamiltonian along the chain of Xe isotopes. sdg-IBM Hamiltonian proposed a better interpretation of this deviation which cannot be explained in the sd-boson models. The nuclei studied have well-known γ bands close to the γ-unstable limit. The energy levels, B(E2) transition rates and signature splitting of the γ -vibrational band are calculated via the affine SU(1,1) Lie algebra. An acceptable degree of agreement was achieved based on this procedure. It is shown that in these isotopes the signature splitting is better reproduced by the inclusion of sdg-IBM. In none of them, any evidence for a stable, triaxial ground state shape is found.

  11. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.

    Science.gov (United States)

    Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang

    2018-05-22

    With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  12. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-05-01

    Full Text Available With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  13. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    Science.gov (United States)

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  14. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  15. Vector and parallel computing on the IBM ES/3090, a powerful approach to solving problems in the utility industry

    International Nuclear Information System (INIS)

    Bellucci, V.J.

    1990-01-01

    This paper describes IBM's approach to parallel computing using the IBM ES/3090 computer. Parallel processing concepts were discussed including its advantages, potential performance improvements and limitations. Particular applications and capabilities for the IBM ES/3090 were presented along with preliminary results from some utilities in the application of parallel processing to simulation of system reliability, air pollution models, and power network dynamics

  16. PREVAIL: IBM's e-beam technology for next generation lithography

    Science.gov (United States)

    Pfeiffer, Hans C.

    2000-07-01

    PREVAIL - Projection Reduction Exposure with Variable Axis Immersion Lenses represents the high throughput e-beam projection approach to NGL which IBM is pursuing in cooperation with Nikon Corporation as alliance partner. This paper discusses the challenges and accomplishments of the PREVAIL project. The supreme challenge facing all e-beam lithography approaches has been and still is throughput. Since the throughput of e-beam projection systems is severely limited by the available optical field size, the key to success is the ability to overcome this limitation. The PREVAIL technique overcomes field-limiting off-axis aberrations through the use of variable axis lenses, which electronically shift the optical axis simultaneously with the deflected beam so that the beam effectively remains on axis. The resist images obtained with the Proof-of-Concept (POC) system demonstrate that PREVAIL effectively eliminates off- axis aberrations affecting both resolution and placement accuracy of pixels. As part of the POC system a high emittance gun has been developed to provide uniform illumination of the patterned subfield and to fill the large numerical aperture projection optics designed to significantly reduce beam blur caused by Coulomb interaction.

  17. Impacts of the IBM Cell Processor to Support Climate Models

    Science.gov (United States)

    Zhou, Shujia; Duffy, Daniel; Clune, Tom; Suarez, Max; Williams, Samuel; Halem, Milt

    2008-01-01

    NASA is interested in the performance and cost benefits for adapting its applications to the IBM Cell processor. However, its 256KB local memory per SPE and the new communication mechanism, make it very challenging to port an application. We selected the solar radiation component of the NASA GEOS-5 climate model, which: (1) is representative of column physics (approximately 50% computational time), (2) has a high computational load relative to transferring data from and to main memory, (3) performs independent calculations across multiple columns. We converted the baseline code (single-precision, Fortran) to C and ported it with manually SIMDizing 4 independent columns and found that a Cell with 8 SPEs can process 2274 columns per second. Compared with the baseline results, the Cell is approximately 5.2X, approximately 8.2X, approximately 15.1X faster than a core on Intel Woodcrest, Dempsey, and Itanium2, respectively. We believe this dramatic performance improvement makes a hybrid cluster with Cell and traditional nodes competitive.

  18. Clinical aspects of the Mayo/IBM PACS project

    Science.gov (United States)

    Forbes, Glenn S.; Morin, Richard L.; Pavlicek, William

    1991-07-01

    A joint project between Mayo Clinic and IBM to develop a picture archival and communications system has been under development for three years. This project began as a potential solution to a pressing archival problem in magnetic resonance imaging. The project has grown to encompass a much larger sphere of activity including workstations, image retrieval, and report archival. This report focuses on the clinical aspects involved in the design, development, and implementation of such a system. In particular, emphasis is placed on the clinical impact of the system both inside and outside of the radiology department. The primary concerns have centered on fidelity of archival data, ease of use, and diagnostic efficacy. The project to date has been limited to neuroradiology practice. This group consists of nine staff radiologists and fellows. Administrative policy decisions regarding the accessibility and available of digital data in the clinical environment have been much more difficult and complex than originally conceived. Based on the observations thus far, the authors believe the system will become a useful and valuable adjunct to clinical practice of radiology.

  19. Efficient universal quantum channel simulation in IBM's cloud quantum computer

    Science.gov (United States)

    Wei, Shi-Jie; Xin, Tao; Long, Gui-Lu

    2018-07-01

    The study of quantum channels is an important field and promises a wide range of applications, because any physical process can be represented as a quantum channel that transforms an initial state into a final state. Inspired by the method of performing non-unitary operators by the linear combination of unitary operations, we proposed a quantum algorithm for the simulation of the universal single-qubit channel, described by a convex combination of "quasi-extreme" channels corresponding to four Kraus operators, and is scalable to arbitrary higher dimension. We demonstrated the whole algorithm experimentally using the universal IBM cloud-based quantum computer and studied the properties of different qubit quantum channels. We illustrated the quantum capacity of the general qubit quantum channels, which quantifies the amount of quantum information that can be protected. The behavior of quantum capacity in different channels revealed which types of noise processes can support information transmission, and which types are too destructive to protect information. There was a general agreement between the theoretical predictions and the experiments, which strongly supports our method. By realizing the arbitrary qubit channel, this work provides a universally- accepted way to explore various properties of quantum channels and novel prospect for quantum communication.

  20. AMDLIBF, IBM 360 Subroutine Library, Eigenvalues, Eigenvectors, Matrix Inversion

    International Nuclear Information System (INIS)

    Wang, Jesse Y.

    1980-01-01

    Description of problem or function: AMDLIBF is a subset of the IBM 360 Subroutine Library at the Applied Mathematics Division at Argonne. This subset includes library category F: Identification/Description: F152S F SYMINV: Invert sym. matrices, solve lin. systems; F154S A DOTP: Double plus precision accum. inner prod.; F156S F RAYCOR: Rayleigh corrections for eigenvalues; F161S F XTRADP: A fast extended precision inner product; F162S A XTRADP: Inner product of two DP real vectors; F202S F1 EIGEN: Eigen-system for real symmetric matrix; F203S F: Driver for F202S; F248S F RITZIT: Largest eigenvalue and vec. real sym. matrix; F261S F EIGINV: Inverse eigenvalue problem; F313S F CQZHES: Reduce cmplx matrices to upper Hess and tri; F314S F CQZVAL: Reduce complex matrix to upper Hess. form; F315S F CQZVEC: Eigenvectors of cmplx upper triang. syst.; F316S F CGG: Driver for complex general Eigen-problem; F402S F MATINV: Matrix inversion and sol. of linear eqns.; F403S F: Driver for F402S; F452S F CHOLLU,CHOLEQ: Sym. decomp. of pos. def. band matrices; F453S F MATINC: Inversion of complex matrices; F454S F CROUT: Solution of simultaneous linear equations; F455S F CROUTC: Sol. of simultaneous complex linear eqns.; F456S F1 DIAG: Integer preserving Gaussian elimination

  1. IN10 data processing on the Rutherford Laboratory IBM 360

    International Nuclear Information System (INIS)

    Howells, W.S.; Anderson, I.S.

    1978-09-01

    This report described modifications made to some of the IN10 spectrometer data analysis programs in use at the Institut Laue-Langevin, Grenoble in order that they may be used on the IBM 360 system at the Rutherford Laboratory. Fuller descriptions of the programs are contained in the original manual (Users' Guide to Processing IN10 Data by W S Howells, ILL Internal Report (1977). Programs discussed are: a) FAST. A program for fitting Lorentzians to raw data. This is a modification of the ILL programs FAST and HAST. b) SUPER. A convolution program for fitting quasielastic peaks to corrected data. This program is based on the ILL program SUPER. c) SAND. A convolution program for fitting an elastic and a Quasielastic peak to data. This is similar to the ILL version of SAND. d) SWIFT. A program similar to SUPER but faster. It is based on the ILL program CONTTY. Before using these programs users must consult the NBRU in order to obtain an account number and a user identifier. (U.K.)

  2. AMDLIBGZ, IBM 360 Subroutine Library for Data Processing, Graphics, Sorting

    International Nuclear Information System (INIS)

    Wang, Jesse Y.

    1980-01-01

    Description of problem or function: AMDLIBGZ is a subset of the IBM 360 Subroutine Library at the Applied Mathematics Division at Argonne National Laboratory. This subset includes library categories G-Z: Identification/Description: G552S F RANF: Random number generator; J952S F YOLYPLOT: CalComp plots; J955S P GRAF: Prints a graph of points on line printer; K250S A1: Core to core conversion; K251S A HEXINP: Hexadecimal input for PL/I programs; K252S A HEXOUT: Hexadecimal output conv. PL/I programs; M101S F SORT: Algebraic sort; M150S F CSORT: Algebraic sort; M151S P2 ANLKWIC: KWIC sort; M250S A SMALLIST: Squeezes assembler listing to 8 x 11; N251S A ABEND: Calls ABEND dump; Q052S A CLOCK: Time; Q053S A COPYAGO: Copy load module from tape to disk; Q054S A DATE: Current date in form MM/DD/YY; Q055S A TIME: Time (24 hour clock) in EBCDIC HH.MM.SS; Z013S F: Variable metric minimization; Z057S A LOCF: Locate machine addresses of variables; Z071S A ALLOC: Allocate LCS for FORTRAN programs; Z074S A ANLMNP: Exponent and mantissa manipulative functs.

  3. Interest in smart metering project surprises utility, IBM

    International Nuclear Information System (INIS)

    Horne, D.

    2006-01-01

    This article provided an outline of Hydro Ottawa and IBM's smart metering pilot project, which has resulted in high approval ratings from the public. The project features 375 participants broken down into 3 separate groups to look for potential consumption differences between customers charged according to standard time-of-use pricing; time-of-use with critical peak pricing; and time-of-use with critical peak rebates. The Ontario Smart Price Pilot project will be run for 5 months, and is expected to provide detailed energy information about usage. Past projects have indicated that customers respond quickly to smart metering, as they are able to monitor their energy usage and more effectively manage their energy consumption. Ontario plans to have all homes and small businesses using smart meters by 2010, as high seasonal demand has indicated that conservation and balanced resource use are now top priorities for many utility companies. At least 10 states in the United States have conducted smart metering pilot projects. The California Public Utilities Commissions has recently approved a $1.7 billion statewide plan to replace old meters with smart meters. In Ontario, customers have ordered 10,000 electricity monitors that Hydro One is giving away. It was concluded that research results from an earlier Hydro One demonstration project with 500 Ontario homeowners showed that real time electricity monitors can help homeowners reduce their consumption of electricity by up to 15 per cent. 4 figs

  4. Issues Identified During September 2016 IBM OpenMP 4.5 Hackathon

    Energy Technology Data Exchange (ETDEWEB)

    Richards, David F. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-03-15

    In September, 2016 IBM hosted an OpenMP 4.5 Hackathon at the TJ Watson Research Center. Teams from LLNL, ORNL, SNL, LANL, and LBNL attended the event. As with the 2015 hackathon, IBM produced an extremely useful and successful event with unmatched support from compiler team, applications staff, and facilities. Approximately 24 IBM staff supported 4-day hackathon and spent significant time 4-6 weeks out to prepare environment and become familiar with apps. This hackathon was also the first event to feature LLVM & XL C/C++ and Fortran compilers. This report records many of the issues encountered by the LLNL teams during the hackathon.

  5. A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Wang, Zhiheng; Huo, Zhanqiang; Shi, Wenbo

    2015-01-01

    With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients' privacy and medial data's security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic maps have been used in the design of authentication schemes for the telecare medicine information system. However, most of them cannot provide user's anonymity. Recently, Lin proposed a dynamic identity based authentication scheme using chaotic maps for the telecare medicine information system and claimed that their scheme was secure against existential active attacks. In this paper, we will demonstrate that their scheme cannot provide user anonymity and is vulnerable to the impersonation attack. Further, we propose an improved scheme to fix security flaws in Lin's scheme and demonstrate the proposed scheme could withstand various attacks.

  6. Identity based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing

    DEFF Research Database (Denmark)

    Cheng, Hongbing; Rong, Chunming; Tan, Zheng-Hua

    2012-01-01

    Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data...... access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key...... distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing....

  7. Identity-based estimation of greenhouse gas emissions from crop production

    DEFF Research Database (Denmark)

    Bennetzen, Eskild Hohlmann; Smith, Pete; Soussana, Jean-Francois

    2012-01-01

    reduction of emissions i.e. reducing emissions per unit of agricultural product rather than the absolute emissions per se. Hence the system productivity must be included in the same analysis. This paper presents the Kaya- Porter identity, derived from the Kaya identity, as a new way to calculate GHG...... (ha). These separate elements in the identity can be targeted in emissions reduction and mitigation policies and are useful to analyse past and current trends in emissions and to explore future scenarios. Using the Kaya-Porter identity we have performed a case study on Danish crop production and find...... emissions to have been reduced by 12% from 1992 to 2008, whilst yields per unit area have remained constant. Both land-based emissions and energy-based emissions have decreased, mainly due to a 41% reduction in nitrogen fertilizer use. The initial identity based analysis for crop production presented here...

  8. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    Science.gov (United States)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  9. A Method for Transferring Photoelectric Photometry Data from Apple II+ to IBM PC

    Science.gov (United States)

    Powell, Harry D.; Miller, James R.; Stephenson, Kipp

    1989-06-01

    A method is presented for transferring photoelectric photometry data files from an Apple II computer to an IBM PC computer in a form which is compatible with the AAVSO Photoelectric Photometry data collection process.

  10. IBM Eesti loodab ELiga liitumisest tulu lõigata / Annika Matson

    Index Scriptorium Estoniae

    Matson, Annika, 1976-

    2003-01-01

    Maailma juhtiva infotehnoloogiafirma IBM Eesti tütarettevõte näeb Eesti liitumises Euroopa Liiduga endale uusi võimalusi Euroopa turul, eriti dokumendihalduse valdkonnas. Diagramm: IBMi aktsia viimased kolm aastat

  11. Measurement system microdensitometer Joyce-Loebl and computer IBM-PC for quantitative evaluation of autoradiograms

    International Nuclear Information System (INIS)

    Chajecki, T.

    1992-01-01

    The description of measurement system microdensitometer Joyce-Loebl, computer IBM-PC interface are given in the report. This system gives the possibility to save and processing of autoradiograms quantity data. (author). 2 refs, 14 figs, 2 tabs

  12. IbM Kelompok Usaha Produk Olahan Susu Segar Di Dusun Boyong Desa Hargobinangun, Sleman Yogyakarta

    OpenAIRE

    Rahayu, Ninik Sri; Indrawati, Sri

    2014-01-01

    Micro, IBM's partner program (science and technology to the Community) are SMEs Heroine Boyong I (stick milk) and Heroine Boyong II (milk candy). Both are micro-scale industry based on fresh dairy product businesses.IBM program on SME partners focused on the aspects of production and management. All activities in the production aspect functioned to improve the capacity and quality of production and increase dairy product variants. While aspects of management consists of: marketing, financial ...

  13. Performance of large-scale scientific applications on the IBM ASCI Blue-Pacific system

    International Nuclear Information System (INIS)

    Mirin, A.

    1998-01-01

    The IBM ASCI Blue-Pacific System is a scalable, distributed/shared memory architecture designed to reach multi-teraflop performance. The IBM SP pieces together a large number of nodes, each having a modest number of processors. The system is designed to accommodate a mixed programming model as well as a pure message-passing paradigm. We examine a number of applications on this architecture and evaluate their performance and scalability

  14. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  15. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  16. An Efficient Identity-Based Proxy Blind Signature for Semioffline Services

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-01-01

    Full Text Available Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online. For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, and bilinear pairings, cannot defeat quantum computers attack. Meanwhile, these schemes need to depend on complex public key infrastructure. Thus, we construct an identity-based proxy blind signature scheme based on number theorem research unit lattice, which can defeat quantum computers attack and does not need to depend on public key infrastructure. The security of the proposed scheme is dependent on Ring-Small Integer Solution problem over number theorem research unit lattice. The proposed scheme meets the properties of blind signature and proxy signature. Then we compare the proposed scheme with other existing proxy blind signature schemes; the result shows that the proposed scheme outperforms ZM scheme except in proxy signer’s signature size and can be more secure than TA scheme and MMHP scheme.

  17. A study on the integrity and authentication of weather observation data using Identity Based Encryption.

    Science.gov (United States)

    Seo, Jung Woo; Lee, Sang Jin

    2016-01-01

    Weather information provides a safe working environment by contributing to the economic activity of the nation, and plays role of the prevention of natural disasters, which can cause large scaled casualties and damage of property. Especially during times of war, weather information plays a more important role than strategy, tactics and information about trends of the enemy. Also, it plays an essential role for the taking off and landing of fighter jet and the sailing of warships. If weather information, which plays a major role in national security and economy, gets misused for cyber terrorism resulting false weather information, it could be a huge threat for national security and the economy. We propose a plan to safely transmit the measured value from meteorological sensors through a meteorological telecommunication network in order to guarantee the confidentiality and integrity of the data despite cyber-attacks. Also, such a plan allows one to produce reliable weather forecasts by performing mutual authentication through authentication devices. To make sure of this, one can apply an Identity Based Signature to ensure the integrity of measured data, and transmit the encrypted weather information with mutual authentication about the authentication devices. There are merits of this research: It is not necessary to manage authentication certificates unlike the Public Key Infrastructure methodology, and it provides a powerful security measure with the capability to be realized in a small scale computing environment, such as the meteorological observation system due to the low burden on managing keys.

  18. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  19. FASTRAN II - FATIGUE CRACK GROWTH STRUCTURAL ANALYSIS (IBM PC VERSION)

    Science.gov (United States)

    Newman, J. C.

    1994-01-01

    loads may be either tensile or compressive. Several standardized aircraft flight-load histories, such as TWIST, Mini-TWIST, FALSTAFF, Inverted FALSTAFF, Felix and Gaussian, are included as options. FASTRAN II also includes two other methods that will help the user input spectrum load histories. The two methods are: (1) a list of stress points, and (2) a flight-by-flight history of stress points. Examples are provided in the user manual. Developed as a research program, FASTRAN II has successfully predicted crack growth in many metallic materials under various aircraft spectrum loading. A computer program DKEFF which is a part of the FASTRAN II package was also developed to analyze crack growth rate data from laboratory specimens to obtain the effective stress-intensity factor against crack growth rate relations used in FASTRAN II. FASTRAN II is written in standard FORTRAN 77. It has been successfully compiled and implemented on Sun4 series computers running SunOS and on IBM PC compatibles running MS-DOS using the Lahey F77L FORTRAN compiler. Sample input and output data are included with the FASTRAN II package. The UNIX version requires 660K of RAM for execution. The standard distribution medium for the UNIX version (LAR-14865) is a .25 inch streaming magnetic tape cartridge in UNIX tar format. It is also available on a 3.5 inch diskette in UNIX tar format. The standard distribution medium for the MS-DOS version (LAR-14944) is a 5.25 inch 360K MS-DOS format diskette. The contents of the diskette are compressed using the PKWARE archiving tools. The utility to unarchive the files, PKUNZIP.EXE, is included. The program was developed in 1984 and revised in 1992. Sun4 and SunOS are trademarks of Sun Microsystems, Inc. IBM PC is a trademark of International Business Machines Corp. MS-DOS is a trademark of Microsoft, Inc. F77L is a trademark of the Lahey Computer Systems, Inc. UNIX is a registered trademark of AT&T Bell Laboratories. PKWARE and PKUNZIP are trademarks of PKWare

  20. Applications Performance Under MPL and MPI on NAS IBM SP2

    Science.gov (United States)

    Saini, Subhash; Simon, Horst D.; Lasinski, T. A. (Technical Monitor)

    1994-01-01

    On July 5, 1994, an IBM Scalable POWER parallel System (IBM SP2) with 64 nodes, was installed at the Numerical Aerodynamic Simulation (NAS) Facility Each node of NAS IBM SP2 is a "wide node" consisting of a RISC 6000/590 workstation module with a clock of 66.5 MHz which can perform four floating point operations per clock with a peak performance of 266 Mflop/s. By the end of 1994, 64 nodes of IBM SP2 will be upgraded to 160 nodes with a peak performance of 42.5 Gflop/s. An overview of the IBM SP2 hardware is presented. The basic understanding of architectural details of RS 6000/590 will help application scientists the porting, optimizing, and tuning of codes from other machines such as the CRAY C90 and the Paragon to the NAS SP2. Optimization techniques such as quad-word loading, effective utilization of two floating point units, and data cache optimization of RS 6000/590 is illustrated, with examples giving performance gains at each optimization step. The conversion of codes using Intel's message passing library NX to codes using native Message Passing Library (MPL) and the Message Passing Interface (NMI) library available on the IBM SP2 is illustrated. In particular, we will present the performance of Fast Fourier Transform (FFT) kernel from NAS Parallel Benchmarks (NPB) under MPL and MPI. We have also optimized some of Fortran BLAS 2 and BLAS 3 routines, e.g., the optimized Fortran DAXPY runs at 175 Mflop/s and optimized Fortran DGEMM runs at 230 Mflop/s per node. The performance of the NPB (Class B) on the IBM SP2 is compared with the CRAY C90, Intel Paragon, TMC CM-5E, and the CRAY T3D.

  1. AMDLIBAE, IBM 360 Subroutine Library, Special Function, Polynomials, Differential Equation

    International Nuclear Information System (INIS)

    Wang, Jesse Y.

    1980-01-01

    Description of problem or function: AMDLIBAE is a subset of the IBM 360 Subroutine Library at the Applied Mathematics Division at Argonne National Laboratory. This subset includes library categories A-E: Identification/Description: A152S A MPA: Mult. prec. floating point arith. package; B156S A ARSIN: Arcsine, arccosine; B158S A DSIN/DCOS: DP sine, cosine; B159S A DTAN/DCOT: DP tangent, cotangent; B252S A SINH/COSH: Hyperbolic sine, cosine; B353S A ALOG: SP logarithm; B354S A DEXP: DP exponential; B355S A DLOG: DP logarithm; B456S A DCUBRT: DP cube root; B457S A ARGPOWER: X Y ; B458S A ARGFDXPD: DP X Y ; C150S F DQD: Q. D. algorithm applied to a power series; C151S F DCONF1: Eval. cont. fract. Q. D. of power series; C250S F CUBIC: Roots of cubic polynomial equation; C251S F QUARTIC: Roots of quartic polynomial equation; C252S F RSSR: All roots of poly eqs. with real coef.; C253S F POLDRV: Driver for C254S; C254S F CPOLY: Roots arb. poly. Jenkins-Traub algorithm; C353S F1 CLEBSH: Ang. mom. coef. - Clebsch, Racah, Wigner; C365S A ALGAMA: Logarithm of the gamma function; C366S A DGAMMA/DLGAMA: DP gamma and log(gamma) functions; C368S F EONE: Exponential integral E1; C370S F BESJY: Bessel functions J and Y; C371S F BESIK: Bessel functions I and K; C372S F CHIPRB: Chi-square integral; C380S F DRZETA: Long precision zeta, zeta-1 functions; C382S F DCGAM: Long precision complex gamma; C383S A DERF/DERFC: DP error function; C384S F BFJ1: Bessel function J1; C385S F COULMB: Regular Coulomb wave functions; C386S F1 DSGMAL: Coulomb phase shift; C387S F BFJYR: Bessel functions J0,J1,Y0,Y1; C388S F IRCOUL: LP irregular Coulomb wave functions; C389S F GAMIN: Incomplete gamma function; C390S F LQ: Assoc. Legendre functions of 2. kind; C392S A DAERF: Inverse error function; C393S F CDEONE: Modified complex exponential integral; D153S F DROMB: Two-dimensional Romberg quadrature; D153S P DROMBP: Two-dimensional Romberg quadrature; D158S F ANC4: Adap. quad. using 4. order Newton

  2. Data Mining and Knowledge Discover - IBM Cognitive Alternatives for NASA KSC

    Science.gov (United States)

    Velez, Victor Hugo

    2016-01-01

    Skillful tools in cognitive computing to transform industries have been found favorable and profitable for different Directorates at NASA KSC. In this study is shown how cognitive computing systems can be useful for NASA when computers are trained in the same way as humans are to gain knowledge over time. Increasing knowledge through senses, learning and a summation of events is how the applications created by the firm IBM empower the artificial intelligence in a cognitive computing system. NASA has explored and applied for the last decades the artificial intelligence approach specifically with cognitive computing in few projects adopting similar models proposed by IBM Watson. However, the usage of semantic technologies by the dedicated business unit developed by IBM leads these cognitive computing applications to outperform the functionality of the inner tools and present outstanding analysis to facilitate the decision making for managers and leads in a management information system.

  3. Quantitative analysis and IBM SPSS statistics a guide for business and finance

    CERN Document Server

    Aljandali, Abdulkader

    2016-01-01

    This guide is for practicing statisticians and data scientists who use IBM SPSS for statistical analysis of big data in business and finance. This is the first of a two-part guide to SPSS for Windows, introducing data entry into SPSS, along with elementary statistical and graphical methods for summarizing and presenting data. Part I also covers the rudiments of hypothesis testing and business forecasting while Part II will present multivariate statistical methods, more advanced forecasting methods, and multivariate methods. IBM SPSS Statistics offers a powerful set of statistical and information analysis systems that run on a wide variety of personal computers. The software is built around routines that have been developed, tested, and widely used for more than 20 years. As such, IBM SPSS Statistics is extensively used in industry, commerce, banking, local and national governments, and education. Just a small subset of users of the package include the major clearing banks, the BBC, British Gas, British Airway...

  4. Data transfer from Beckman LS 5800 liquid scintillation counters to IBM personal computers.

    Science.gov (United States)

    Maan, A C

    1985-09-01

    This communication describes a short routine in BASICA for the IBM-PC, written to collect data from a Beckman liquid scintillation counter. In the form presented here the routine converts incoming bytes into separate lines and saves these lines in a file. There are many possible applications for further use of the data in these files. A few suggestions are given as to the format in which data can be stored and how to process these data automatically after all samples have been counted. The only hardware needed is an asynchronous communications adapter for the IBM-PC and an RS232 cable.

  5. Caso de estudio. IBM: ¿Más allá del conocimiento...?

    OpenAIRE

    Vernaza Pacheco, Pablo José; Velásquez Vásquez, Francisco Orlando

    2006-01-01

    El caso muestra cómo los presidentes Louis Gerstner y Samuel Palmesano lograron influir en un cambio positivo de las personas, sus valores y conocimientos, para que IBM recuperara el liderazgo en el mercado. IBM empieza a generar conocimiento y logra ser una de las empresas que más patentes ha registrado en los Estados Unidos durante la última década. El caso también plantea dilemas donde se cuestiona si la investigación y el conocimiento adquirido por las empresas ha servido o no para ...

  6. Transfer of numeric ASCII data files between Apple and IBM personal computers.

    Science.gov (United States)

    Allan, R W; Bermejo, R; Houben, D

    1986-01-01

    Listings for programs designed to transfer numeric ASCII data files between Apple and IBM personal computers are provided with accompanying descriptions of how the software operates. Details of the hardware used are also given. The programs may be easily adapted for transferring data between other microcomputers.

  7. High Resolution Displays In The Apple Macintosh And IBM PC Environments

    Science.gov (United States)

    Winegarden, Steven

    1989-07-01

    High resolution displays are one of the key elements that distinguish user oriented document finishing or publishing stations. A number of factors have been involved in bringing these to the desktop environment. At Sigma Designs we have concentrated on enhancing the capabilites of IBM PCs and compatibles and Apple Macintosh computer systems.

  8. An IBM-1620 code for calculaton of isotopic composition of irradiated uranium (ISOCOM-1)

    International Nuclear Information System (INIS)

    Soliman, R.H.; Karchava, G.; Hamouda, I.

    1974-01-01

    The present work gives a description of an IBM-1620 code to calculate the isotopic composition during the irradiation of a nuclear fuel, which initially consists of 235 U and 238 U. The numerical results of test calculations as well as the ET-RR-1 reactor calculations are presented. The code is in operation since 1968

  9. An IBM-1620 code for calculation of isotopic composition of irradiated thorium (ISOCOM-2)

    International Nuclear Information System (INIS)

    Soliman, R.H.; Karchava, G.; Hamouda, I.

    1978-01-01

    The present work gives a description of an IBM-1620 code to calculate the isotopic composition during the irradiation of a nuclear fuel, which initially contains 232 Th. The numerical results on test calculations are presented. The code has been in operation since 1968

  10. An IBM-3 hamiltonian from a multi-j-shell model

    International Nuclear Information System (INIS)

    Evans, J.A.; Elliott, J.P.; Lac, V.S.; Long, G.L.

    1995-01-01

    The number and isospin dependence of the hamiltonian in the isospin invariant form (IBM-3) of the boson model is deduced from a seniority mapping onto a shell-model system of several shells. The numerical results are compared with earlier work for a single j-shell. (orig.)

  11. IBM PC based real time photon correlator [Paper No.:D2

    International Nuclear Information System (INIS)

    Kumaravadivelu, C.; Nageswaran, A.; Weling, S. A.

    1993-01-01

    The design aspects and development of IBM PC based real time photon correlator is presented. This system computes 64 auto-correlation functions in real time. Sample data is 4-bit wide. Correlation functions are computed in hard wired logic using discrete components. A combination of parallel and pipelined architecture is adopted to compute the correlation in realtime. A high speed controller generates the required control signals for the computing hardware and also provides handshake signals to IBM PC to access the computed results. IBM PC bus is extended and interfaced to correlation computing hardware. IBM PC collects the experimental parameters through user friendly menu and initiates the correlation hardware and continues to collect the correlation build ups and displays them on the screen. Extensive test and maintenance features are incorporated into the system. This system is developed for Material Science Division in Indira Gandhi Centre for Atomic Research (IGCAR) to study static and dynamic properties of macro molecules and colloidal particles in dispersion using light scattering technique. It can also be used to study the flow characteristics of sodium in nuclear reactors. It can be used in dynamic neutron scattering experiments. (author). 3 figs., 2 tabs

  12. Letter from Hong Kong: A Report on Chinese Food, Fake Apples, and IBM's Asian Strategy.

    Science.gov (United States)

    Immel, A. Richard

    1984-01-01

    Notes that microcomputer use in Hong Kong's small business community does not reflect the growth of its high-tech electronics industry and discusses IBM's influence in Hong Kong and Asia, the counterfeiting of Apple microcomputers and software, and why Apple currently has no recourse. (MBR)

  13. Correspondence between phenomenological and IBM-1 models of even isotopes of Yb

    Science.gov (United States)

    A. Okhunov, A.; I. Sharrad, F.; Anwer, A. Al-Sammarraie; U. Khandaker, M.

    2015-08-01

    Energy levels and the reduced probability of E2- transitions for ytterbium isotopes with proton number Z = 70 and neutron numbers between 100 and 106 have been calculated through phenomenological (PhM) and interacting boson (IBM-1) models. The predicted low-lying levels (energies, spins and parities) and the reduced probability for E2- transitions results are reasonably consistent with the available experimental data. The predicted low-lying levels (gr-, β1- and γ1- band) produced in the PhM are in good agreement with the experimental data compared with those by IBM-1 for all nuclei of interest. In addition, the phenomenological model was successful in predicting the β2-, β3-, β4-, γ2- and 1+ - band while it was a failure with IBM-1. Also, the 3+- band is predicted by the IBM-1 model for 172Yb and 174Yb nuclei. All calculations are compared with the available experimental data. Supported by Fundamental Research Grant Scheme (FRGS) of Ministry of Higher Education of Malaysia (FRGS13-074-0315), Islamic Development Bank (IDB) (36/11201905/35/IRQ/D31, 37/IRQ/P30)

  14. Comparison of the AMDAHL 470V/6 and the IBM 370/195 using benchmarks

    Energy Technology Data Exchange (ETDEWEB)

    Snider, D.R.; Midlock, J.L.; Hinds, A.R.; Engert, D.E.

    1976-03-01

    Six groups of jobs were run on the IBM 370/195 at the Applied Mathematics Division (AMD) of Argonne National Laboratory using the current production versions of OS/MVT 21.7 and ASP 3.1. The same jobs were then run on an AMDAHL 470V/6 at the AMDAHL manufacturing facilities in Sunnyvale, California, using the identical operating systems. Performances of the two machines are compared. Differences in the configurations were minimized. The memory size on each machine was the same, all software which had an impact on run times was the same, and the I/O configurations were as similar as possible. This allowed the comparison to be based on the relative performance of the two CPU's. As part of the studies preliminary to the acquisition of the IBM 195 in 1972, two of the groups of jobs had been run on a CDC 7600 by CDC personnel in Arden Hills, Minnesota, on an IBM 360/195 by IBM personnel in Poughkeepsie, New York, and on the AMD 360/50/75 production system in June, 1971. 6 figures, 9 tables.

  15. Using IBMs to Investigate Spatially-dependent Processes in Landscape Genetics Theory

    Science.gov (United States)

    Much of landscape and conservation genetics theory has been derived using non-spatialmathematical models. Here, we use a mechanistic, spatially-explicit, eco-evolutionary IBM to examine the utility of this theoretical framework in landscapes with spatial structure. Our analysis...

  16. The IBM PC as an Online Search Machine. Part 5: Searching through Crosstalk.

    Science.gov (United States)

    Kolner, Stuart J.

    1985-01-01

    This last of a five-part series on using the IBM personal computer for online searching highlights a brief review, search process, making the connection, switching between screens and modes, online transaction, capture buffer controls, coping with options, function keys, script files, processing downloaded information, note to TELEX users, and…

  17. Note on some quasielastic neutron scattering analysis programs on the Rutherford Laboratory IBM 360/195

    International Nuclear Information System (INIS)

    Richardson, R.M.

    1979-12-01

    A suite of programs for analysing neutron scattering data from time-of-flight spectrometers has been implemented on the Rutherford Laboratory IBM 360/195 computer system. The programs are intended for near inelastic and quasielastic data and operate by convoluting the measured instrumental resolution function with a model scattering function before fitting to the measured sample scattering law. (author)

  18. Determination of Hamiltonian matrix for IBM4 and compare it is self value with shells model

    International Nuclear Information System (INIS)

    Slyman, S.; Hadad, S.; Souman, H.

    2004-01-01

    The Hamiltonian is determined using the procedure OAI and the mapping of (IBM4) states into the shell model, which is based on the seniority classification scheme. A boson sub-matrix of the shell model Hamiltonian for the (sd) 4 configuration is constructed, and is proved to produce the same eigenvalues as the shell model Hamiltonian for the corresponding fermion states. (authors)

  19. Multifunction input-output board for the IBM AT/XT (Lab-Master)

    Energy Technology Data Exchange (ETDEWEB)

    Pilyar, A V

    1996-12-31

    Multifunction input-output board for the IBM PC AT/XT is described. It consists of a CMOS analog input multiplexer, programmable amplifier, a fast 12-bit ADC, four 10-bit DAC and two 8-bit digital input-output registers. Specifications of analog input and output are given. 6 refs.

  20. Hazardous Waste Cleanup: IBM Corporation-TJ Watson Research Center in Yorktown Heights, New York

    Science.gov (United States)

    IBM Corporation -TJ Watson Research Center is located in southern Yorktown near the boundary separating the Town of Yorktown from the Town of New Castle. The site occupies an area of approximately 217 acres and adjoins land uses are predominantly residenti

  1. A FORTRAN program for an IBM PC compatible computer for calculating kinematical electron diffraction patterns

    International Nuclear Information System (INIS)

    Skjerpe, P.

    1989-01-01

    This report describes a computer program which is useful in transmission electron microscopy. The program is written in FORTRAN and calculates kinematical electron diffraction patterns in any zone axis from a given crystal structure. Quite large unit cells, containing up to 2250 atoms, can be handled by the program. The program runs on both the Helcules graphic card and the standard IBM CGA card

  2. IBM-i ja Lenovo juhid külastasid Eestit

    Index Scriptorium Estoniae

    2006-01-01

    8.-9. maini 2006. a. viibisid Tallinnas IBM-Lenovo Alliance'i viitsepresident Simon L. Porter ja Lenovo Soome regiooni juhataja Jukka Mäntylä, kes kohtusid kohaliku IT-pressiga ning esitlesid Tallinna Botaanikaaia Palmimaja seminarikeskuses mõlema firma uudiseid

  3. User's manual for levelized power generation cost using an IBM PC

    International Nuclear Information System (INIS)

    Fuller, L.C.

    1985-06-01

    Programs for the estimation of levelized electric power generation costs using the BASIC interpreter on an IBM PC are described. Procedures for light-water reactor plants and coal-fired plants include capital investment cost, operation and maintenance cost, fuel cycle cost, nuclear decommissioning cost, and levelized total generation cost

  4. User instructions for levelized power generation cost codes using an IBM-type PC

    International Nuclear Information System (INIS)

    Coen, J.J.; Delene, J.G.

    1989-01-01

    Programs for the calculation of levelized power generation costs using an IBM or compatible PC are described. Cost calculations for nuclear plants and coal-fired plants include capital investment cost, operation and maintenance cost, fuel cycle cost, decommissioning cost, and total levelized power generation cost. 7 refs., 36 figs., 4 tabs

  5. Inference in media space. The case of IBM Software Executive Briefing Center - Rome

    Directory of Open Access Journals (Sweden)

    Toni Marino

    2014-11-01

    Full Text Available In our paper we apply Peirce's model of Arguments (Statistical Deduction, Probabilistic Deduction, Induction and Abduction to a communication process where negotiating sense and meanings is emphasized. We selected a communication space where everything is planned as a medium of sense (video terminals, screens, lights, etc. namely the IBM Software Executive Briefing Center in Italy, a workplace used to exchange views, negotiate or transact. It is based in Rome in the same building as the International Development Laboratory of the IBM Software Group. The Software Center is the place where IBM welcomes its potential customers and has the opportunity to show them its technology and offer solutions. This paper focuses on "media space" in the Center which is structured by the seller according to his/her idea of the buyer's interpretive process. This paper analyzes the roles of visual codes in the allocation of functions. It also looks into the relation between the symbolism of the company with its marketing, past history and media space in order to define the buyer's typology of inference (deduction, induction or abduction in relation to the communication strategy of the media space design. The research is conducted directly in the field by interviewing the Manager of the IBM Center as well as asking people who use it to fill in an anonymous questionnaire, which analyses both the media space and the plan of the building.

  6. Integrating Closed-loop Supply Chains and Spare Parts Management at IBM

    NARCIS (Netherlands)

    M. Fleischmann (Moritz); J.A.E.E. van Nunen (Jo); B. Graeve

    2002-01-01

    textabstractEver more companies are recognizing the benefits of closed-loop supply chains that integrate product returns into business operations. IBM has been among the pioneers seeking to unlock the value dormant in these resources. We report on a project exploiting product returns as a source of

  7. Shape coexistence in the neutron-deficient Pt isotopes in the configuration-mixed IBM

    International Nuclear Information System (INIS)

    Vargas, Carlos E.; Campuzano, Cuauhtemoc; Morales, Irving O.; Frank, Alejandro; Van Isacker, Piet

    2008-01-01

    The matrix-coherent state approach in the IBM with configuration mixing is used to describe the geometry of neutron-deficient Pt isotopes. Employing a parameter set for all isotopes determined previously, it is found that the lowest minimum goes from spherical to oblate and finally acquires a prolate shape when approaching the mid-shell Pt isotopes

  8. 76 FR 21033 - International Business Machines (IBM), Sales and Distribution Business Unit, Global Sales...

    Science.gov (United States)

    2011-04-14

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-74,364] International Business Machines (IBM), Sales and Distribution Business Unit, Global Sales Solution Department, Off-Site Teleworker in Centerport, New York; Notice of Affirmative Determination Regarding Application for Reconsideration By application dated November 29, 2011,...

  9. 76 FR 5832 - International Business Machines (IBM), Software Group Business Unit, Optim Data Studio Tools QA...

    Science.gov (United States)

    2011-02-02

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-74,554] International Business Machines (IBM), Software Group Business Unit, Optim Data Studio Tools QA, San Jose, CA; Notice of Affirmative Determination Regarding Application for Reconsideration By application dated November 29, 2010, a worker and a state workforce official...

  10. 76 FR 54800 - International Business Machines (IBM), Software Group Business Unit, Quality Assurance Group, San...

    Science.gov (United States)

    2011-09-02

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-74,554] International Business Machines (IBM), Software Group Business Unit, Quality Assurance Group, San Jose, California; Notice of Negative Determination on Reconsideration On January 21, 2011, the Department of Labor (Department) issued an Affirmative Determination Regarding...

  11. The IBM PC as an Online Search Machine--Part 2: Physiology for Searchers.

    Science.gov (United States)

    Kolner, Stuart J.

    1985-01-01

    Enumerates "hardware problems" associated with use of the IBM personal computer as an online search machine: purchase of machinery, unpacking of parts, and assembly into a properly functioning computer. Components that allow transformations of computer into a search machine (combination boards, printer, modem) and diagnostics software…

  12. A framework for WRF to WRF-IBM grid nesting to enable multiscale simulations

    Energy Technology Data Exchange (ETDEWEB)

    Wiersema, David John [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Univ. of California, Berkeley, CA (United States); Lundquist, Katherine A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Chow, Fotini Katapodes [Univ. of California, Berkeley, CA (United States)

    2016-09-29

    With advances in computational power, mesoscale models, such as the Weather Research and Forecasting (WRF) model, are often pushed to higher resolutions. As the model’s horizontal resolution is refined, the maximum resolved terrain slope will increase. Because WRF uses a terrain-following coordinate, this increase in resolved terrain slopes introduces additional grid skewness. At high resolutions and over complex terrain, this grid skewness can introduce large numerical errors that require methods, such as the immersed boundary method, to keep the model accurate and stable. Our implementation of the immersed boundary method in the WRF model, WRF-IBM, has proven effective at microscale simulations over complex terrain. WRF-IBM uses a non-conforming grid that extends beneath the model’s terrain. Boundary conditions at the immersed boundary, the terrain, are enforced by introducing a body force term to the governing equations at points directly beneath the immersed boundary. Nesting between a WRF parent grid and a WRF-IBM child grid requires a new framework for initialization and forcing of the child WRF-IBM grid. This framework will enable concurrent multi-scale simulations within the WRF model, improving the accuracy of high-resolution simulations and enabling simulations across a wide range of scales.

  13. Motivated Explanation

    Directory of Open Access Journals (Sweden)

    Richard ePatterson

    2015-10-01

    Full Text Available Although motivation is a well-established field of study in its own right, and has been fruitfully studied in connection with attribution theory and belief formation under the heading of motivated thinking, its powerful and pervasive influence on explanatory processes is less well explored. Where one has a strong motivation to understand some event correctly, one is thereby motivated to adhere as best one can to normative or epistemic criteria for correct or accurate explanation, even if one does not consciously formulate or apply such criteria. By contrast, many of our motivations to explain introduce bias into the processes involved in generating, evaluating, or giving of explanations. Non-epistemic explanatory motivations, or (following Kunda’s usage, directional motivations, include self-justification, resolution of cognitive dissonance, deliberate deception, teaching, and many more. Some of these motivations lead to the relaxation or violation of epistemic norms, combined with an effort to preserve the appearance of accuracy; others enhance epistemic motivation, so that one engages in more careful and thorough generational and evaluative processes. In short, real life explanatory processes are often constrained by multiple goals, epistemic and directional, where these goals may mutually reinforce one another or may conflict, and where our explanations emerge as a matter of weighing and satisfying those goals. Our proposals are largely programmatic, although we do review a good deal of relevant behavioral and neurological evidence. Specifically, we recognize five generative processes, some of which cover further sub-processes, and six evaluative processes. All of these are potential points of entry for the influence of motivation. We then suggest in some detail how specific sorts of explanatory motivation interact with specific explanatory processes.

  14. Drinking motives

    NARCIS (Netherlands)

    Jacob Rosendahl; Lenka van Riemsdijk; Klaus Grunert; Johan van Berkel

    2013-01-01

    Chapter 8 in Comsumption Culture in Europe. This chapter presents an analysis of what consumer in Europe drink and why they drink what they drink. The concept of drinking motives is developed and defined, and analysis of data on drinking motives shows that these can be grouped into two major

  15. Drinking Motives

    DEFF Research Database (Denmark)

    Grunert, Klaus G; Rosendahl, Jacob; Andronikidis, Andreas I.

    2013-01-01

    . This distinction is universal and henceapplies across Europe. However, the importance of self-expressive as compared to functional motives, as well as the way in which these relate to different beverages, does differ across Europe. Both dimensions are relevant for the motives for drinking non-alcoholic drinks...

  16. Intrinsic Motivation.

    Science.gov (United States)

    Deci, Edward L.

    The paper draws together a wide variety of research which relates to the topic of intrinsic motivation; intrinsically motivated activities are defined as those which a person does for no apparent reward except the activity itself or the feelings which result from the activity. Most of this research was not originally reported within the framework…

  17. Gerontechnology motivation

    NARCIS (Netherlands)

    Bronswijk, van J.E.M.H.

    2006-01-01

    Gerontechnology’s framework has been formulated in a functional way, with little attention paid to motivation. Abraham H. Maslow’s theory of human motivation (1943) can fill this gap with his hierarchy of needs to be fulfilled in the following order: physiological, safety related, social, esteem and

  18. Research center Juelich to install Germany's most powerful supercomputer new IBM System for science and research will achieve 5.8 trillion computations per second

    CERN Multimedia

    2002-01-01

    "The Research Center Juelich, Germany, and IBM today announced that they have signed a contract for the delivery and installation of a new IBM supercomputer at the Central Institute for Applied Mathematics" (1/2 page).

  19. Motivational interviewing

    DEFF Research Database (Denmark)

    Karlsen, Kamilla; Humaidan, Peter; Sørensen, Lise H

    2013-01-01

    This is a retrospective study to investigate whether motivational interviewing increases weight loss among obese or overweight women prior to fertility treatment. Women with body mass index (BMI) > 30 kg/m(2) approaching the Fertility Clinic, Regional Hospital Skive, were given advice about diet...... and physical activity with the purpose of weight loss. In addition, they were asked if they wanted to receive motivational interviewing. Among other data, age, height and weight were obtained. Main outcomes were weight loss measured in kg and decrease in BMI. We studied 187 women: 110 received sessions...... of motivational interviewing (intervention group, n = 110), 64 received motivational support by phone or e-mail only and 13 women did not wish any motivational support (control group, n = 77). The mean weight loss and decrease in BMI was greater in the intervention group compared with the control group (9.3 kg...

  20. Motivating pharmacists.

    Science.gov (United States)

    Donehew, G R

    1979-01-01

    Although pharmacists are developing interest in many types of pharmacy practice, they are still spending the bulk of their time in the prescription dispensing process. Any effort to provide motivation must consider the prescription dispensing process. The pharmacy literature includes only a few studies that dealt with pharmacists as people. The studies usually showed that pharmacists basically were unhappy with their jobs. In developing a motivational climate for pharmacists, pharmacy supervisors have several concepts to consider: the hierarchy of needs by Maslow; the expectancy theory by Hampton; the gygiene-motivator theory by Herzberg; and the Theory Y management approach by McGregor. Because pharmacists must be induced to enter and remain in an organization, supervisors should be aware of the need to use any technique available in developing a motivational climate.

  1. Designing motivation

    DEFF Research Database (Denmark)

    How can products be designed to change our habits for the better? What is some of the leading research that designers can draw on to create new systems that motivate people towards healthier behaviour? Designing Motivation is an edited collection of ‘industrialist cheat sheets’: 22 single......-page summaries of research articles relating to technology design, motivation, and behaviour change. Ranging across the fields of economics, sociology, design research and behavioural science, each summary draws out the design implications of the research. It is intended as a resource for designers who...... are grappling with how to create motivating products, and as a primer for students who want a brief introduction to some of the relevant theories, findings and design interventions in these fields. The editor's introduction raises a number of issues encountered when we try to apply behavioural research...

  2. IBM Industry Practice: Challenges in Offshore Software Development from a Global Delivery Center

    Science.gov (United States)

    Musio, Ilario

    Offshore software development has greatly influenced competitiveness among IT companies in the last decade. Despite the fact that there are matured and developed offshoring methodologies, there is an ongoing tendency to look for new ways of improving them. Major IT corporations successfully rely on their offshore delivery centers for bridging the gap between communication and infrastructure boundaries. However, projects tend to fail, so problems have to be considered that arise between on- and offshore parts within the same corporation. Based on seven case studies from the industry, this paper describes experiences and challenges faced during the execution of offshore application development between IBM Switzerland and IBM India. Additionally, approaches on how they can be solved are proposed.

  3. 2-D fluid dynamics models for laser driven fusion on IBM 3090 vector multiprocessors

    International Nuclear Information System (INIS)

    Atzeni, S.

    1988-01-01

    Fluid-dynamics codes for laser fusion are complex research codes, consisting of many distinct modules and embodying a variety of numerical methods. They are therefore good candidates for testing general purpose advanced computer architectures and the related software. In this paper, after a brief outline of the basic concepts of laser fusion, the implementation of the 2-D laser fusion fluid code DUED on the IBM 3090 VF vector multiprocessors is discussed. Emphasis is put on parallelization, performed by means of IBM Parallel FORTRAN (PF). It is shown how different modules have been optimized by using different features of PF: i) modules based on depth-2 nested loops exploit automatic parallelization; ii) laser light ray tracing is partitioned by scheduling parallel ICCG algorithm (executed in parallel by appropiately synchronized parallel subroutines). Performance results are given for separate modules of the code, as well as for typical complete runs

  4. Design of multichannel counting system-2 for IBM PC and compatibles

    International Nuclear Information System (INIS)

    Ahmad, Z.; Qamer, R.; Mushtaq, N.

    2001-04-01

    A multichannel, Counting System 2 (MCCS-2) data acquisition plug-in card for the IBM ISA, MCA and EISA bus architecture has been designed and developed for acquisition of pulsed signal. The card features large dynamic range is achieved with the help of 16-bit pulse counters, fast signal acquisition and a self-testing capability in a single slot card. The MCCS-2 (designed by R and D group, CD) is an upgraded version of MCCS-1 [6]. The MCCS-2 consists of a plug-in interface card (MCCS-PC) for IBM PC and compatibles and a BNC terminal module (MCCS-BNC). The MCCS-PC is address selectable and can simultaneous monitoring ten independent SCA inputs. An on board programmable timer provides elapsed time measurement. A menu-driven software program is developed for data acquisition and timer control. (author)

  5. System of image package input and output for neutron radiography based on PC IBM XT/AT; Sistema paketnogo vvoda i vyvoda izobrazhenij dlya nejtronnoj radiografii na baze PEhVM IBM PC XCT/AT

    Energy Technology Data Exchange (ETDEWEB)

    Avarzad, O; Rikhvitskij, V S

    1996-12-31

    System of acquisition and analysis of both statistic and dynamic images of neutron radiography includes NM IBM PC XT/AT, super vidicon, telecamera based video detector, color monitor and interface board of image input-output. 2 refs.

  6. OpenZika: An IBM World Community Grid Project to Accelerate Zika Virus Drug Discovery.

    OpenAIRE

    Sean Ekins; Alexander L Perryman; Carolina Horta Andrade

    2016-01-01

    The Zika virus outbreak in the Americas has caused global concern. To help accelerate this fight against Zika, we launched the OpenZika project. OpenZika is an IBM World Community Grid Project that uses distributed computing on millions of computers and Android devices to run docking experiments, in order to dock tens of millions of drug-like compounds against crystal structures and homology models of Zika proteins (and other related flavivirus targets). This will enable the identification of...

  7. An Amphibious Ship-To-Shore Simulation for Use on an IBM PC (Personal Computer)

    Science.gov (United States)

    1984-09-01

    CA : «< <- j Special ■ *- amphibious ship- an IBM Personal ion of the phy- he logic used analysis, and a DD | JAM 11 1473 COITION...research, for instance, wiL1 be geared toward a technically oriented person who is familiar with computers, programming and the associated logic. A...problem, often vaguely stated by the decision aaker , into precise and operational terms [Ref. Hz p.51]. The analysis begins with specification of the

  8. The new ENSDF search system NESSY: IBM/PC nuclear spectroscopy database

    International Nuclear Information System (INIS)

    Boboshin, I.N.; Varlamov, V.V.

    1996-01-01

    The universal relational nuclear structure and decay database NESSY (New ENSDF Search SYstem) developed for the IBM/PC and compatible PCs, and based on the international file ENSDF (Evaluated Nuclear Structure Data File), is described. The NESSY provides the possibility of high efficiency processing (the search and retrieval of any kind of physical data) of the information from ENSDF. The principles of the database development are described and examples of applications are presented. (orig.)

  9. Authoritarian Decision-Making and Alternative Patterns of Power and Influence: The Mexican IBM Case

    Science.gov (United States)

    1988-05-01

    de Control de Cambios," pp. 1341-1345 and " Decreto Sobre Control de Camblos," pp. 1346-1354. Acceleration of the rate of devaluation was announced in...see " Decreto para la raclonalizaclon de [a industrla automotrlz," Diarlo OfIclal, 15 September 1983 as cited by Bennett and Sharpe, Transnational...v ’ i i I . . . . . . . ". . . . 170 the rules of foreign Investment in the area of computation where IBM wanted to expand Its operations. Programa

  10. IBM ThinkPad radiation testing and recovery during EUROMIR missions

    International Nuclear Information System (INIS)

    Martignano, M.; Harboe-Sorensen, R.

    1995-01-01

    This paper presents the results of an experiment, conducted on-board the Russian MIR Space Station during a joint Russian and European mission, EUROMIR '94. A commercially available IBM ThinkPad 750C was evaluated by running a software system which monitored the notebook's behavior and counted the number of single event upsets. The used software system and ground verification tests are also presented. Finally, another software system, able to ruggedize normal personal computers for usage in space, is described

  11. Shape coexistence in the neutron-deficient Pt isotopes in a configuration mixing IBM

    International Nuclear Information System (INIS)

    Morales, Irving O.; Vargas, Carlos E.; Frank, Alejandro

    2004-01-01

    The recently proposed matrix-coherent state approach for configuration mixing IBM is used to describe the evolving geometry of the neutron deficient Pt isotopes. It is found that the Potential Energy Surface (PES) of the Platinum isotopes evolves, when the number of neutrons decreases, from spherical to oblate and then to prolate shapes, in agreement with experimental measurements. Oblate-Prolate shape coexistence is observed in 194,192Pt isotopes

  12. George E. Pake Prize Lecture: Physical Sciences Research at IBM: Still at the Cutting Edge

    Science.gov (United States)

    Theis, Thomas

    2015-03-01

    The information technology revolution is in its ``build out'' phase. The foundational scientific insights and hardware inventions are now many decades old. The microelectronics industry is maturing. An increasing fraction of the total research investment is in software and services, as applications of information technology transform every business and every sector of the public and private economy. Yet IBM Research continues to make substantial investments in hardware technology and the underlying physical sciences. While some of this investment is aimed at extending the established transistor technology, an increasing fraction is aimed at longer-term and possibly disruptive research - new devices for computing, such as tunneling field-effect transistors and nanophotonic circuits, and new architectures, such as neurosynaptic systems and quantum computing. This research investment is a bet that the old foundations of information technology are ripe for reinvention. After all, today's information technology devices and systems operate far from any fundamental limits on speed and energy efficiency. But how can IBM make risky long-term research investments in an era of global competition, with financial markets focused on the short term? One important answer is partnerships. Since its early days, IBM Research has pursued innovation in information technology and innovation in the ways it conducts the business of research. By continuously evolving new models for research and development partnerships, it has extended its global reach, increased its impact on IBM's customers, and expanded the breadth and depth of its research project portfolio. Research in the physical sciences has often led the way. Currently on assignment to the Semiconductor Research Corporation.

  13. IBM parameters derived from realistic shell-model Hamiltonian via Hn-cooling method

    International Nuclear Information System (INIS)

    Nakada, Hitoshi

    1997-01-01

    There is a certain influence of non-collective degrees-of-freedom even in lowest-lying states of medium-heavy nuclei. This influence seems to be significant for some of the IBM parameters. In order to take it into account, several renormalization approaches have been applied. It has been shown in the previous studies that the influence of the G-pairs is important, but does not fully account for the fitted values. The influence of the non-collective components may be more serious when we take a realistic effective nucleonic interaction. To incorporate this influence into the IBM parameters, we employ the recently developed H n -cooling method. This method is applied to renormalize the wave functions of the states consisting of the SD-pairs, for the Cr-Fe nuclei. On this ground, the IBM Hamiltonian and transition operators are derived from corresponding realistic shell-model operators, for the Cr-Fe nuclei. Together with some features of the realistic interaction, the effects of the non-SD degrees-of-freedom are presented. (author)

  14. The web server of IBM's Bioinformatics and Pattern Discovery group: 2004 update.

    Science.gov (United States)

    Huynh, Tien; Rigoutsos, Isidore

    2004-07-01

    In this report, we provide an update on the services and content which are available on the web server of IBM's Bioinformatics and Pattern Discovery group. The server, which is operational around the clock, provides access to a large number of methods that have been developed and published by the group's members. There is an increasing number of problems that these tools can help tackle; these problems range from the discovery of patterns in streams of events and the computation of multiple sequence alignments, to the discovery of genes in nucleic acid sequences, the identification--directly from sequence--of structural deviations from alpha-helicity and the annotation of amino acid sequences for antimicrobial activity. Additionally, annotations for more than 130 archaeal, bacterial, eukaryotic and viral genomes are now available on-line and can be searched interactively. The tools and code bundles continue to be accessible from http://cbcsrv.watson.ibm.com/Tspd.html whereas the genomics annotations are available at http://cbcsrv.watson.ibm.com/Annotations/.

  15. PUBG; purex solvent extraction process model. [IBM3033; CDC CYBER175; FORTRAN IV

    Energy Technology Data Exchange (ETDEWEB)

    Geldard, J.F.; Beyerlein, A.L.

    PUBG is a chemical model of the Purex solvent extraction system, by which plutonium and uranium are recovered from spent nuclear fuel rods. The system comprises a number of mixer-settler banks. This discrete stage structure is the basis of the algorithms used in PUBG. The stages are connected to provide for countercurrent flow of the aqueous and organic phases. PUBG uses the common convention that has the aqueous phase enter at the lowest numbered stage and exit at the highest one; the organic phase flows oppositely. The volumes of the mixers are smaller than those of the settlers. The mixers generate a fine dispersion of one phase in the other. The high interfacial area is intended to provide for rapid mass transfer of the plutonium and uranium from one phase to the other. The separation of this dispersion back into the two phases occurs in the settlers. The species considered by PUBG are Hydrogen (1+), Plutonium (4+), Uranyl Oxide (2+), Plutonium (3+), Nitrate Anion, and reductant in the aqueous phase and Hydrogen (1+), Uranyl Oxide (2+), Plutonium (4+), and TBP (tri-n-butylphosphate) in the organic phase. The reductant used in the Purex process is either Uranium (4+) or HAN (hydroxylamine nitrate).IBM3033;CDC CYBER175; FORTRAN IV; OS/MVS or OS/MVT (IBM3033), NOS 1.3 (CDC CYBER175); The IBM3033 version requires 150K bytes of memory for execution; 62,000 (octal) words are required by the CDC CYBER175 version..

  16. Programming the Linpack Benchmark for the IBM PowerXCell 8i Processor

    Directory of Open Access Journals (Sweden)

    Michael Kistler

    2009-01-01

    Full Text Available In this paper we present the design and implementation of the Linpack benchmark for the IBM BladeCenter QS22, which incorporates two IBM PowerXCell 8i1 processors. The PowerXCell 8i is a new implementation of the Cell Broadband Engine™2 architecture and contains a set of special-purpose processing cores known as Synergistic Processing Elements (SPEs. The SPEs can be used as computational accelerators to augment the main PowerPC processor. The added computational capability of the SPEs results in a peak double precision floating point capability of 108.8 GFLOPS. We explain how we modified the standard open source implementation of Linpack to accelerate key computational kernels using the SPEs of the PowerXCell 8i processors. We describe in detail the implementation and performance of the computational kernels and also explain how we employed the SPEs for high-speed data movement and reformatting. The result of these modifications is a Linpack benchmark optimized for the IBM PowerXCell 8i processor that achieves 170.7 GFLOPS on a BladeCenter QS22 with 32 GB of DDR2 SDRAM memory. Our implementation of Linpack also supports clusters of QS22s, and was used to achieve a result of 11.1 TFLOPS on a cluster of 84 QS22 blades. We compare our results on a single BladeCenter QS22 with the base Linpack implementation without SPE acceleration to illustrate the benefits of our optimizations.

  17. The study of structure in 224–234 thorium nuclei within the framework IBM

    Directory of Open Access Journals (Sweden)

    Lee Su Youn

    2017-01-01

    Full Text Available An investigation has been made of the behaviour of nuclear structure as a function of an increase in neutron number from 224Th to 234Th. Thorium of mass number 234 is a typical rotor nucleus that can be explained by the SU(3 limit of the interacting boson model(IBM in the algebraic nuclear model. Furthermore, 224−232Th lie on the path of the symmetry-breaking phase transition. Moreover, the nuclear structure of 224Th can be explained using X(5 symmetry. However, as 226−230Th nuclei are not fully symmetrical nuclei, they can be represented by adding a perturbed term to express symmetry breaking. Through the following three calculation steps, we identified the tendency of change in nuclear structure. Firstly, the structure of 232Th is described using the matrix elements of the Hamiltonian and the electric quadrupole operator between basis states of the SU(3 limit in IBM. Secondly, the low-lying energy levels and E2 transition ratios corresponding to the observable physical values are calculated by adding a perturbed term with the first-order Casimir operator of the U(5 limit to the SU(3 Hamiltonian in IBM. We compared the results with experimental data of 224−234Th. Lastly, the potential of the Bohr Hamiltonian is represented by a harmonic oscillator, as a result of which the structure of 224−234Th could be expressed in closed form by an approximate separation of variables. The results of these theoretical predictions clarify nuclear structure changes in Thorium nuclei over mass numbers of practical significance.

  18. Programming portlets from JSR 168 to IBM WebSphere portal extensions

    CERN Document Server

    Bernal, Joey; Lynn, Ron; Marston, Cayce; Memon, Usman

    2012-01-01

    Portals have evolved from simple Web applications with multiple links to an enterprise application delivery platform that serves composite applications. In a world where organizations are gearing up with service-oriented architecture (SOA) strategies and re-working existing apps to fit the Web 2.0 programming model, portals are strategic infrastructure components on every CIO's radar. As companies move toward SOA, portlets become an even hotter topic. Portlets provide the user interface for these services. IBM's unwavering commitment to open standards such as Java Specification Request (JSR 16

  19. NAMMU (Release 6.1) for the IBM RS/6000: installation and running

    International Nuclear Information System (INIS)

    Cliffe, K.A.

    1993-12-01

    NAMMU is a software package for modelling groundwater flow and transport in porous media. The package can be used to model steady-state and time-dependent behaviour, including unsaturated flow and the transport of heat and mass. An option is available for modelling radioactive decay and transport of chains of radionuclides. The software is based on an efficient implementation of the finite-element method that provides many options for modelling complex geological strata. This report describes how to install and run Release 6.1 of NAMMU on an IBM RS/6000 using version 6.1.4 of the job submission script. (Author)

  20. The finite element structural analysis code SAP IV conversion from CDC to IBM

    International Nuclear Information System (INIS)

    Harrop, L.P.

    1977-02-01

    SAP IV is a general three dimensional, linear, static and dynamic finite element structural analysis program. The program which was obtained from the Earthquake Engineering Research Center, University of California, Berkeley, was written in FORTRAM for a CDC 6400. Its main use was anticipated to be the seismic analysis of reactor structures. SAP IV may also prove useful for fracture mechanics studies as well as the usual elastic stress analysis of structures. A brief description of SAP IV and a more detailed account of the FORTRAN conversion required to make SAP IV run successfully on the UKAEA Harwell IBM 370/168 are given. (author)

  1. Guide to data preparation for EQ3/6 (Wolery) modified for the IBM 3033

    International Nuclear Information System (INIS)

    Noy, D.J.

    1981-11-01

    The ability to predict mineral-fluid equilibria is an important aspect of geochemical research into radioactive waste disposal. The interaction of ground waters and waste leachates with the host rock of a disposal site, either at elevated or ambient temperatures, will influence the performance of the disposal system. The EQ3/6 package (Wolery, 1979) provides a technique for the prediction of such interactions using available thermodynamic data, and for extrapolating laboratory experimental data on rock-fluid equilibria. This report describes the modifications performed on this package to allow operation on an IBM machine, and is intended as a guide to data preparation for the programmes. (author)

  2. Benchmark Tests on the New IBM RISC System/6000 590 Workstation

    Directory of Open Access Journals (Sweden)

    Harvey J. Wasserman

    1995-01-01

    Full Text Available The results of benchmark tests on the superscalar IBM RISC System/6000 Model 590 are presented. A set of well-characterized Fortran benchmarks spanning a range of computational characteristics was used for the study. The data from the 590 system are compared with those from a single-processor CRAY C90 system as well as with other microprocessor-based systems, such as the Digital Equipment Corporation AXP 3000/500X and the Hewlett-Packard HP/735.

  3. MOLECULAR DESIGNER: an interactive program for the display of protein structure on the IBM-PC.

    Science.gov (United States)

    Hannon, G J; Jentoft, J E

    1985-09-01

    A BASIC interactive graphics program has been developed for the IBM-PC which utilizes the graphics capabilities of that computer to display and manipulate protein structure from coordinates. Structures may be generated from typed files, or from Brookhaven National Laboratories' Protein Data Bank data tapes. Once displayed, images may be rotated, translated and expanded to any desired size. Figures may be viewed as ball-and-stick or space-filling models. Calculated multiple-point perspective may also be added to the display. Docking manipulations are possible since more than a single figure may be displayed and manipulated simultaneously. Further, stereo images and red/blue three-dimensional images may be generated using the accompanying DESIPLOT program and an HP-7475A plotter. A version of the program is also currently available for the Apple Macintosh. Full implementation on the Macintosh requires 512 K and at least one disk drive. Otherwise this version is essentially identical to the IBM-PC version described herein.

  4. Low-cost general purpose spectral display unit using an IBM PC

    International Nuclear Information System (INIS)

    Robinson, S.L.

    1985-10-01

    Many physics experiments require acquisition and analysis of spectral data. commercial minicomputer-based multichannel analyzers collect detected counts at various energies, create a histogram of the counts in memory, and display the resultant spectra. They acquire data and provide the user-to-display interface. The system discussed separates functions into the three modular components of data acquisition, storage, and display. This decoupling of functions allows the experimenter to use any number of detectors for data collection before forwarding up to 64 spectra to the display unit, thereby increasing data throughput over that available with commercial systems. An IBM PC was chosen for the low-cost, general purpose display unit. Up to four spectra may be displayed simultaneously in different colors. The histogram saves 1024 channels per detector, 640 of which may be distinctly displayed per spectra. The IEEE-488 standard provides the data path between the IBM PC and the data collection unit. Data is sent to the PC under interrupt control, using direct memory access. Display manipulations available via keyboard are also discussed

  5. A low-cost general purpose spectral display unit using an IBM PC

    International Nuclear Information System (INIS)

    Robinson, S.L.

    1986-01-01

    Many physics experiments require acquisition and analysis of spectral data. Commercial minicomputer-based multichannel analyzers collect detected counts at various energies, create a histogram of the counts in memory, and display the resultant spectra. They acquire data and provide the user-to-display interface. The system discussed separates functions into the three modular components of data acquisition, storage, and display. This decoupling of functions allows the experimenter to use any number of detectors for data collection before forwarding up to 64 spectra to the display unit, thereby increasing data throughput over that available with commercial systems. An IBM PC was chosen for the low-cost, general purpose display unit. Up to four spectra may be displayed simultaneously in different colors. The histogram saves 1024 channels per detector, 640 of which may be distinctly displayed per spectra. The IEEE-488 standard provides the data path between the IBM PC and the data collection unit. Data is sent to the PC under interrupt control, using direct memory access. Display manipulations available via keyboard are also discussed

  6. LERC-SLAM - THE NASA LEWIS RESEARCH CENTER SATELLITE LINK ATTENUATION MODEL PROGRAM (IBM PC VERSION)

    Science.gov (United States)

    Manning, R. M.

    1994-01-01

    antenna required to establish a link with the satellite, the statistical parameters that characterize the rainrate process at the terminal site, the length of the propagation path within the potential rain region, and its projected length onto the local horizontal. The IBM PC version of LeRC-SLAM (LEW-14979) is written in Microsoft QuickBASIC for an IBM PC compatible computer with a monitor and printer capable of supporting an 80-column format. The IBM PC version is available on a 5.25 inch MS-DOS format diskette. The program requires about 30K RAM. The source code and executable are included. The Macintosh version of LeRC-SLAM (LEW-14977) is written in Microsoft Basic, Binary (b) v2.00 for Macintosh II series computers running MacOS. This version requires 400K RAM and is available on a 3.5 inch 800K Macintosh format diskette, which includes source code only. The Macintosh version was developed in 1987 and the IBM PC version was developed in 1989. IBM PC is a trademark of International Business Machines. MS-DOS is a registered trademark of Microsoft Corporation. Macintosh is a registered trademark of Apple Computer, Inc.

  7. Integrated Tiger Series of electron/photon Monte Carlo transport codes: a user's guide for use on IBM mainframes

    International Nuclear Information System (INIS)

    Kirk, B.L.

    1985-12-01

    The ITS (Integrated Tiger Series) Monte Carlo code package developed at Sandia National Laboratories and distributed as CCC-467/ITS by the Radiation Shielding Information Center (RSIC) at Oak Ridge National Laboratory (ORNL) consists of eight codes - the standard codes, TIGER, CYLTRAN, ACCEPT; the P-codes, TIGERP, CYLTRANP, ACCEPTP; and the M-codes ACCEPTM, CYLTRANM. The codes have been adapted to run on the IBM 3081, VAX 11/780, CDC-7600, and Cray 1 with the use of the update emulator UPEML. This manual should serve as a guide to a user running the codes on IBM computers having 370 architecture. The cases listed were tested on the IBM 3033, under the MVS operating system using the VS Fortran Level 1.3.1 compiler

  8. A tale of two arcs? Plate tectonics of the Izu-Bonin-Mariana (IBM) arc using subducted slab constraints

    Science.gov (United States)

    Wu, J. E.; Suppe, J.; Renqi, L.; Kanda, R. V. S.

    2014-12-01

    Published plate reconstructions typically show the Izu-Bonin Marianas arc (IBM) forming as a result of long-lived ~50 Ma Pacific subduction beneath the Philippine Sea. These reconstructions rely on the critical assumption that the Philippine Sea was continuously coupled to the Pacific during the lifetime of the IBM arc. Because of this assumption, significant (up to 1500 km) Pacific trench retreat is required to accommodate the 2000 km of Philippine Sea/IBM northward motion since the Eocene that is constrained by paleomagnetic data. In this study, we have mapped subducted slabs of mantle lithosphere from MITP08 global seismic tomography (Li et al., 2008) and restored them to a model Earth surface to constrain plate tectonic reconstructions. Here we present two subducted slab constraints that call into question current IBM arc reconstructions: 1) The northern and central Marianas slabs form a sub-vertical 'slab wall' down to maximum 1500 km depths in the lower mantle. This slab geometry is best explained by a near-stationary Marianas trench that has remained +/- 250 km E-W of its present-day position since ~45 Ma, and does not support any significant Pacific slab retreat. 2) A vanished ocean is revealed by an extensive swath of sub-horizontal slabs at 700 to 1000 km depths in the lower mantle below present-day Philippine Sea to Papua New Guinea. We call this vanished ocean the 'East Asian Sea'. When placed in an Eocene plate reconstruction, the East Asian Sea fits west of the reconstructed Marianas Pacific trench position and north of the Philippine Sea plate. This implies that the Philippine Sea and Pacific were not adjacent at IBM initiation, but were in fact separated by a lost ocean. Here we propose a new IBM arc reconstruction constrained by subducted slabs mapped under East Asia. At ~50 Ma, the present-day IBM arc initiated at equatorial latitudes from East Asian Sea subduction below the Philippine Sea. A separate arc was formed from Pacific subduction below

  9. IBM-PC based data acquisition system for a laser enhanced ionisation spectrometer using a low cost GPIB card

    International Nuclear Information System (INIS)

    Sampath Kumar, R.; Ravindranath, S.V.G.

    1992-01-01

    An IBM-PC based data acquisition system has been developed for the existing laser enhanced ionisation spectrometer in the Division. Here the boxcar averager (type SR 250) which integrates the spectrometer output is interfaced to an IBM-PC, converted into a GPIB controller with the help of a locally available GPIB card, (Dynalog Micro Systems make PCL 848) through the GPIB port of the computer interface module (SR 245). The menu driven software developed in BASIC, triggers the scan in the dye laser through its control port, collects data from the spectrometer, plots, displays and stores it on the hard disc for further use. (author). 6 refs., 18 figs., 2 appendixes

  10. Nuclear facilities maintenance in the core of management-advanced trend in IBM Maximo asset management applications

    International Nuclear Information System (INIS)

    Seino, Satoshi; Ujihara, Satoshi; Kikuyama, Kaoru

    2009-01-01

    European and US plant owners have attached importance to plant maintenance, such as prompt grasp of plant states, implementation of maintenance and planning of maintenance programs, as one of asset management. The US advanced trend was introduced in this feature article through the applications of IBM Maximo Asset Management for nuclear facilities maintenance. World trends of nuclear power and related problems, need of nuclear facilities management, key items for introduction of maintenance management systems, required systems for nuclear maintenance management and introduction of functions of the IBM strategic asset management solution-Maximo were described respectively. (T. Tanaka)

  11. PRAAGE-1988: An interactive IBM-PC code for aging analysis of NUREG-1150 systems

    International Nuclear Information System (INIS)

    Fullwood, R.R.; Shier, W.G.

    1988-01-01

    Probabilistic Risk Assessments (PRA) contain a great deal of information for estimating the risk of a nuclear power plant but do not consider aging. PRAAGE (PRA+AGE) is an interactive, IBM-PC code for processing PRA-developed system models using non-aged failure rate data in conjunction with user-supplied time-dependent nuclear plant experience component failure rate data to determine the effects of component aging on a system's reliability as well as providing the age-dependent importances of various generic components. This paper describes the structure, use and application of PRAAGE to the aging analysis of the Peach Bottom 2 RHR system in the LPCI and SDC modes of operation. 4 refs., 15 figs., 5 tabs

  12. Effect of system workload on operating system reliability - A study on IBM 3081

    Science.gov (United States)

    Iyer, R. K.; Rossetti, D. J.

    1985-01-01

    This paper presents an analysis of operating system failures on an IBM 3081 running VM/SP. Three broad categories of software failures are found: error handling, program control or logic, and hardware related; it is found that more than 25 percent of software failures occur in the hardware/software interface. Measurements show that results on software reliability cannot be considered representative unless the system workload is taken into account. The overall CPU execution rate, although measured to be close to 100 percent most of the time, is not found to correlate strongly with the occurrence of failures. Possible reasons for the observed workload failure dependency, based on detailed investigations of the failure data, are discussed.

  13. Portable regional cerebral blood flow system based on IBM PC/AT and microprocessor electronics

    International Nuclear Information System (INIS)

    Mun, S.K.; Mun, I.K.; Petite, J.; Cohan, S.L.; Fahey, F.H.

    1986-01-01

    A portable 16-channel reginal cerebral blood flow (rCBF) measuring system has been developed using an IBM PC/AT and new microelectronics to improve processing speed and portability. The detector electronics were developed by Scan Detectronics A/S of Denmark. The counter module contains 18 16-bit counters, each programmable in four different modes. The rate meter has three independent microprocessor controllers for rate meter functions, window controller, and channel controller. The detector electronics and detection parameters can be fully controlled by the host PC/AT. The menu-driven system (Better Basic) assists the operator at each step. The collected data from 16 channels can be processed automatically or postprocessed using more flexible and sophisticated techniques within 20 minutes. The headgear holding 16 sodium iodide detectors is fabricated by modifying a motorcycle helmet

  14. Performance of the IBM synchrotron X-ray source for lithography

    International Nuclear Information System (INIS)

    Archie, C.

    1993-01-01

    The compact superconducting synchrotron X-ray source at the IBM Advanced Lithography Facility in East Fishkill, New York has been in service to customers since the start of 1992. It availability during scheduled time is greater than 90%, with recent months frequently surpassing 95%. Data on the long-term behavior of the X-ray source properties and subsystem performance are now available. The full system continues to meet all specifications and even to surpass them in key areas. Measured electron beam properties such as beam size, short- and long-term positional stability, and beam life are presented. Lifetimes greater than 20 hours for typical stored beams have significantly simplified operations and increased availability compared to projections. This paper also describes some unique features of this X-ray source and goes beyond a discussion of downtime to describe the efforts behind the scenes to maintain and operate it

  15. Communication overhead on the Intel Paragon, IBM SP2 and Meiko CS-2

    Science.gov (United States)

    Bokhari, Shahid H.

    1995-01-01

    Interprocessor communication overhead is a crucial measure of the power of parallel computing systems-its impact can severely limit the performance of parallel programs. This report presents measurements of communication overhead on three contemporary commercial multicomputer systems: the Intel Paragon, the IBM SP2 and the Meiko CS-2. In each case the time to communicate between processors is presented as a function of message length. The time for global synchronization and memory access is discussed. The performance of these machines in emulating hypercubes and executing random pairwise exchanges is also investigated. It is shown that the interprocessor communication time depends heavily on the specific communication pattern required. These observations contradict the commonly held belief that communication overhead on contemporary machines is independent of the placement of tasks on processors. The information presented in this report permits the evaluation of the efficiency of parallel algorithm implementations against standard baselines.

  16. IBM PARENTING BAGI GURU DAN ORANG TUA PAUD DI KELURAHAN PUDAK PAYUNG SEMARANG

    Directory of Open Access Journals (Sweden)

    Retnaningdyastuti .

    2015-09-01

    Full Text Available Abstract Science and technology program for the community (IbM aims to provide teachers and parents knowledges and skills in educating early childhood, especially in the form of parenting and child counseling. The methods used in the implementation of community service activities on developing character of early childhood through modeling and and habituation in the form of counseling and mentoring, such as playing games involving both parents and children. The result shows that the implementation of early childhood education has good responses from the participants. Through habituation and modeling given by teachers/ educators and parents, the activities can convey moral messages to children. Hopefully the children can be developed to have intelligent and healthy personality, and virtuous character. Keywords: early childhood education, parenting, and child counseling

  17. Adaptation of the IBM ECR [electric cantilever robot] robot to plutonium processing applications

    International Nuclear Information System (INIS)

    Armantrout, G.A.; Pedrotti, L.R.; Halter, E.A.; Crossfield, M.

    1990-12-01

    The changing regulatory climate in the US is adding increasing incentive to reduce operator dose and TRU waste for DOE plutonium processing operations. To help achieve that goal the authors have begun adapting a small commercial overhead gantry robot, the IBM electric cantilever robot (ECR), to plutonium processing applications. Steps are being taken to harden this robot to withstand the dry, often abrasive, environment within a plutonium glove box and to protect the electronic components against alpha radiation. A mock-up processing system for the reduction of the oxide to a metal was prepared and successfully demonstrated. Design of a working prototype is now underway using the results of this mock-up study. 7 figs., 4 tabs

  18. Large boson number IBM calculations and their relationship to the Bohr model

    International Nuclear Information System (INIS)

    Thiamova, G.; Rowe, D.J.

    2009-01-01

    Recently, the SO(5) Clebsch-Gordan (CG) coefficients up to the seniority v max =40 were computed in floating point arithmetic (T.A. Welsh, unpublished (2008)); and, in exact arithmetic, as square roots of rational numbers (M.A. Caprio et al., to be published in Comput. Phys. Commun.). It is shown in this paper that extending the QQQ model calculations set up in the work by D.J. Rowe and G. Thiamova (Nucl. Phys. A 760, 59 (2005)) to N=v max =40 is sufficient to obtain the IBM results converged to its Bohr contraction limit. This will be done by comparing some important matrix elements in both models, by looking at the seniority decomposition of low-lying states and at the behavior of the energy and B(E2) transition strengths ratios with increasing seniority. (orig.)

  19. Implementation of a parallel algorithm for spherical SN calculations on the IBM 3090

    International Nuclear Information System (INIS)

    Haghighat, A.; Lawrence, R.D.

    1989-01-01

    Parallel S N algorithms based on domain decomposition in angle are straightforward to develop in Cartesian geometry because the computation of the angular fluxes for a specific discrete ordinate can be performed independently of all other angles. This is not the case for curvilinear geometries, where the angular redistribution component of the discretized streaming operator results in coupling between angular fluxes along adjacent discrete ordinates. Previously, the authors developed a parallel algorithm for S N calculations in spherical geometry and examined its iterative convergence for criticality and detector problems with differing scattering/absorption ratios. In this paper, the authors describe the implementation of the algorithm on an IBM 3090 Model 400 (four processors) and present computational results illustrating the efficiency of the algorithm relative to serial execution

  20. CLIPS - C LANGUAGE INTEGRATED PRODUCTION SYSTEM (IBM PC VERSION WITH CLIPSITS)

    Science.gov (United States)

    Riley, , .

    1994-01-01

    The C Language Integrated Production System, CLIPS, is a shell for developing expert systems. It is designed to allow artificial intelligence research, development, and delivery on conventional computers. The primary design goals for CLIPS are portability, efficiency, and functionality. For these reasons, the program is written in C. CLIPS meets or outperforms most micro- and minicomputer based artificial intelligence tools. CLIPS is a forward chaining rule-based language. The program contains an inference engine and a language syntax that provide a framework for the construction of an expert system. It also includes tools for debugging an application. CLIPS is based on the Rete algorithm, which enables very efficient pattern matching. The collection of conditions and actions to be taken if the conditions are met is constructed into a rule network. As facts are asserted either prior to or during a session, CLIPS pattern-matches the number of fields. Wildcards and variables are supported for both single and multiple fields. CLIPS syntax allows the inclusion of externally defined functions (outside functions which are written in a language other than CLIPS). CLIPS itself can be embedded in a program such that the expert system is available as a simple subroutine call. Advanced features found in CLIPS version 4.3 include an integrated microEMACS editor, the ability to generate C source code from a CLIPS rule base to produce a dedicated executable, binary load and save capabilities for CLIPS rule bases, and the utility program CRSV (Cross-Reference, Style, and Verification) designed to facilitate the development and maintenance of large rule bases. Five machine versions are available. Each machine version includes the source and the executable for that machine. The UNIX version includes the source and binaries for IBM RS/6000, Sun3 series, and Sun4 series computers. The UNIX, DEC VAX, and DEC RISC Workstation versions are line oriented. The PC version and the Macintosh

  1. IBM-PC based high voltage controller [Paper No.: L7

    International Nuclear Information System (INIS)

    Mondal, N.K.; Kalmani, S.D.

    1993-01-01

    A simple IBM-PC/XT based high voltage controller is designed for C.A.E.N. high voltage supply unit, which is being used for testing the prototype detector for future accelerator experiment. The high voltage output of the supply unit can be remotely programmed. The V-set Lemo connectors at the rear panel provides the remote control facility. Similarly V-mon and I-mon can be used for remotely monitoring the voltage set and the current drawn from the supply unit. The controller described here sets the high voltage through V-set and monitors the voltage set, through V-mon at a pre-determined time interval. The monitoring is a background job and is done as an interrupt service routine of IRQ3. A simple menu driven software package used is written in Q-Basic and MASM. (author). 1 fig

  2. Index of French nuclear literature: IBM 360 programmes for preparing the permuted index of French titles

    International Nuclear Information System (INIS)

    Chonez, Nicole

    1968-12-01

    This report contains the assembly list, the flow chart and some comments about each of the IBM 360 assembler language programmes used for preparing one of the subject indexes contained in the bibliographical bulletin entitled: 'Index de la Litterature nucleaire francaise'; this bulletin has been produced by the French C.E.A. since 1968. Only the processing phases from the magnetic tape file of the bibliographical references, assumed correct, to the printing out of the permuted index obtained with the French titles of the documents on the tape are considered here. This permuted index has the peculiarity of automatically regrouping synonyms and certain grammatical variations of the words. (author) [fr

  3. SFAP: Scan-Tron Forms Analysis Package for the IBM-PC. User's Guide, Version 2.0.

    Science.gov (United States)

    Harnisch, Delwyn L.; And Others

    The Scan-Tron Forms Analysis Package (SFAP) is a collection of integrated programs that allow an IBM-PC (or compatible) to collect data from a Scan-Tron 1200 forms reader. In addition to the basic data acquisition capability, the SFAP has additional capabilities related to the viewing and formatting of incoming data. When used in combination with…

  4. STAPRE and SCAT2. Statistical pre-equilibrium and optical nuclear model code for Personal Computer IBM/AT

    International Nuclear Information System (INIS)

    Goulo, V.G.

    1988-01-01

    This document describes the content of the diskettes with nuclear data production codes SCAT2 and STAPRE and the example data set for implementing and testing of these codes for personal computers IBM/AT. They are available on two diskettes, free fo charge, upon request from the NEA Data Bank, Saclay, France. (author). 4 refs, 1 fig

  5. Motivating the Knowledge Worker

    Science.gov (United States)

    2010-01-01

    Herzberg . The Two - factor Theory asserts that motivators and de-motivators are mutually exclusive sets of factors . This research supports...various theories of motivation and the data collected from this effort, the author developed a two -dimensional model of the factors that motivate... Theory X/ Theory Y Two - factor Theory Cognitive Evaluation Theory Operant Conditioning Protection Motivation Theory

  6. Motivation in Beyond Budgeting: A Motivational Paradox?

    DEFF Research Database (Denmark)

    Sandalgaard, Niels; Bukh, Per Nikolaj

    In this paper we discuss the role of motivation in relation to budgeting and we analyse how the Beyond Budgeting model functions compared with traditional budgeting. In the paper we focus on budget related motivation (and motivation in general) and conclude that the Beyond Budgeting model...

  7. CLIPS 6.0 - C LANGUAGE INTEGRATED PRODUCTION SYSTEM, VERSION 6.0 (IBM PC VERSION)

    Science.gov (United States)

    Donnell, B.

    1994-01-01

    COOL (that is, a rule can pattern match on objects created using COOL). CLIPS 6.0 provides the capability to define functions, overloaded functions, and global variables interactively. In addition, CLIPS can be embedded within procedural code, called as a subroutine, and integrated with languages such as C, FORTRAN and Ada. CLIPS can be easily extended by a user through the use of several well-defined protocols. CLIPS provides several delivery options for programs including the ability to generate stand alone executables or to load programs from text or binary files. CLIPS 6.0 provides support for the modular development and execution of knowledge bases with the defmodule construct. CLIPS modules allow a set of constructs to be grouped together such that explicit control can be maintained over restricting the access of the constructs by other modules. This type of control is similar to global and local scoping used in languages such as C or Ada. By restricting access to deftemplate and defclass constructs, modules can function as blackboards, permitting only certain facts and instances to be seen by other modules. Modules are also used by rules to provide execution control. The CRSV (Cross-Reference, Style, and Verification) utility included with previous version of CLIPS is no longer supported. The capabilities provided by this tool are now available directly within CLIPS 6.0 to aid in the development, debugging, and verification of large rule bases. COSMIC offers four distribution versions of CLIPS 6.0: UNIX (MSC-22433), VMS (MSC-22434), MACINTOSH (MSC-22429), and IBM PC (MSC-22430). Executable files, source code, utilities, documentation, and examples are included on the program media. All distribution versions include identical source code for the command line version of CLIPS 6.0. This source code should compile on any platform with an ANSI C compiler. Each distribution version of CLIPS 6.0, except that for the Macintosh platform, includes an executable for the

  8. Multiple uses for an old ibm-pc 486 in nuclear medicine using open source software

    International Nuclear Information System (INIS)

    Anselmi, C.E.; Anselmi, O.E.

    2002-01-01

    Multiple uses for an old ibm-pc 486 in nuclear medicine using open source software. Aim: To use a low budget platform to: 1 - send patient's images from processing workstation to the nuclear medicine information system; 2 - backup data files from acquisition in DICOM format in cd-rom; 3 - move data across different hospitals allowing remote processing and reading of studies. Both nuclear medicine systems in the two hospitals are Siemens Icon workstations. Material and methods: The computer used is an ibm-pc 486, which sells for about US dollar 70. The operating system installed is Red Hat Linux 6.2. The sending of the patient's images to the information system is performed through AppleTalk and Samba. The backup of acquisition files is performed by the communication from the workstation through DICOM to the Storage Class Provider (Office Dicom Toolkit) running in the 486, and the files are later burned on cd-rom. A similar configuration is present in another hospital, with minor differences in processor type. Data from any of the hospitals can be sent to the other one through the remote synchronization performed by Rsync. The connection between both Linux computers is encrypted through Secure Shell (open SSH). All software installed in the 486 was downloaded from the internet at no cost. No software was installed in the workstations. Results: The whole system is recognized transparently by the workstation's system as a local storage disk, such as the acquisition cameras or the other workstations. The transfer of images from the workstation to the information system or to a remote hospital is done the same way as copying data from the acquisition cameras in the vendor's software. When transferring large files across hospitals, the synchronization may take 1 to 3 minutes through broad band internet. The backup in DICOM format in cd-rom allows review of patient data in any computer equipped with a DICOM viewing software, as well as the re-processing of that

  9. Speakeasy-3 reference manual. Level MU. IBM OS/VS version

    International Nuclear Information System (INIS)

    Cohen, S.; Pieper, S.C.

    1977-08-01

    Speakeasy is a computer language designed to provide access to information stored in a computer. Ease of use, natural notation, and built-in capabilities for growth are important features of Speakeasy. The language is based on the concepts of arrays and matrices, and processes these as entities; the need for many of the loops necessary in other programing languages is thus eliminated. It has a large vocabulary (over 500 words) of functions and commands in the areas of array manipulation, matrix algebra including eigenanalysis, special mathematical functions, numerical integration and differentiation, statistics, graphics, and character processing. It can be used either in batch mode or interactively. This book is the primary reference manual for the Speakeasy language and presents a nearly complete description of its capabilities. The chapters deal with the use of Speakeasy as a ''super desk calculator,'' the construction and editing of Speakeasy programs, the ability to communicate with other programing languages, the construction of user-written additions to the language, and various other facets of Speakeasy. In addition, a complete listing of the Help Library, which contains brief descriptions of each of the Speakeasy functions or commands, is included. This edition applies to the Mu release of Speakeasy-3, and describes the IBM OS/VS version. 18 figures

  10. Analýza výkonnosti procesorů IBM POWER8

    OpenAIRE

    Jelen, Jakub

    2016-01-01

    Práce se zabývá systémem IBM Power8 v porovnání s dnes běžně používanými řešeními s procesory Intel Xeon. Výkonnost je vyhodnocována nejen na úrovni celého systému, ale také na úrovni jednotlivých vláken a jader a paměti. Různé metriky jsou demonstrovány na typických optimalizovaných algoritmech. Testovaný stroj Power8 disponuje extrémně rychlou pamětí poskytující rychlost až 145 GB/s mezi pamětí a procesorem, které se dnešní procesory Intel nevyrovnají. Výpočetní síla je pouze srovnatelná (N...

  11. Solar energy system performance evaluation: Seasonal report for IBM system 1A, Huntsville, Alabama

    Science.gov (United States)

    1980-01-01

    The operational and thermal performance of the solar energy system, Sims Prototype System 1A, is described. The system was designed by IBM to provide 50 to 60 percent of the space heating and domestic hot water preheating load to a 2,000 square foot floor space single family residence in the Huntsville area. The load design temperature inside the building was to be maintained at 70 degrees fahrenheit with auxiliary energy for heating supplied by an electric heat pump assisted by an electric resistance strip heater. In general the disappointing operation of this system is attributed to the manner in which it was used. The system was designed for residential application and used to satisfy the demands of an office environment. The differences were: (1) inside temperature was not maintained at 70 F as expected; and (2) hot water usage was much lower than expected. The conclusion is that the solar energy system must be designed for the type of application in which it is used. Misapplication usually will have an adverse affect on system performance.

  12. RELAP5/MOD2 implementation on various mainframes including the IBM and SX-2 supercomputer

    International Nuclear Information System (INIS)

    DeForest, D.L.; Hassan, Y.A.

    1987-01-01

    The RELAP5/MOD2 (cycle 36.04) code is a one-dimensional, two-fluid, nonequilibrium, nonhomogeneous transient analysis code designed to simulate operational and accident scenarios in pressurized water reactors (PWRs). System models are solved using a semi-implicit finite difference method. The code was developed at EG and G in Idaho Falls under sponsorship of the US Nuclear Regulatory Commission (NRC). The major enhancement from RELAP5/MOD1 is the use of a six-equation, two-fluid nonequilibrium and nonhomogeneous model. Other improvements include the addition of a noncondensible gas component and the revision and addition of drag formulation, wall friction, and wall heat transfer. Several test cases were run to benchmark the IBM and SX-2 installations against the CDC computer and the CRAY-2 and CRAY/XMP. These included the Edward's pipe blow-down and two separate reflood cases developed to simulate the FLECHT-SEASET reflood test 31504 and a postcritical heat flux (CHF) test performed at Lehigh University

  13. Determination of performance characteristics of scientific applications on IBM Blue Gene/Q

    Energy Technology Data Exchange (ETDEWEB)

    Evangelinos, C. [IBM Research Division, Cambridge, MA (United States); Walkup, R. E. [IBM, Yorktown Heights, NY (United States). Thomas J. Watson Research Center; Sachdeva, V. [IBM Research Division, Cambridge, MA (United States); Jordan, K. E. [IBM Research Division, Cambridge, MA (United States); Gahvari, H. [Univ. of Illinois, Urbana-Champaign, IL (United States). Computer Science Dept.; Chung, I. -H. [IBM, Yorktown Heights, NY (United States). Thomas J. Watson Research Center; Perrone, M. P. [IBM, Yorktown Heights, NY (United States). Thomas J. Watson Research Center; Lu, L. [IBM, Yorktown Heights, NY (United States). Thomas J. Watson Research Center; Liu, L. -K. [IBM, Yorktown Heights, NY (United States). Thomas J. Watson Research Center; Magerlein, K. [IBM, Yorktown Heights, NY (United States). Thomas J. Watson Research Center

    2013-02-13

    The IBM Blue Gene®/Q platform presents scientists and engineers with a rich set of hardware features such as 16 cores per chip sharing a Level 2 cache, a wide SIMD (single-instruction, multiple-data) unit, a five-dimensional torus network, and hardware support for collective operations. Especially important is the feature related to cores that have four “hardware threads,” which makes it possible to hide latencies and obtain a high fraction of the peak issue rate from each core. All of these hardware resources present unique performance-tuning opportunities on Blue Gene/Q. We provide an overview of several important applications and solvers and study them on Blue Gene/Q using performance counters and Message Passing Interface profiles. We also discuss how Blue Gene/Q tools help us understand the interaction of the application with the hardware and software layers and provide guidance for optimization. Furthermore, on the basis of our analysis, we discuss code improvement strategies targeting Blue Gene/Q. Information about how these algorithms map to the Blue Gene® architecture is expected to have an impact on future system design as we move to the exascale era.

  14. Modeling radiative transport in ICF plasmas on an IBM SP2 supercomputer

    International Nuclear Information System (INIS)

    Johansen, J.A.; MacFarlane, J.J.; Moses, G.A.

    1995-01-01

    At the University of Wisconsin-Madison the authors have integrated a collisional-radiative-equilibrium model into their CONRAD radiation-hydrodynamics code. This integrated package allows them to accurately simulate the transport processes involved in ICF plasmas; including the important effects of self-absorption of line-radiation. However, as they increase the amount of atomic structure utilized in their transport models, the computational demands increase nonlinearly. In an attempt to meet this increased computational demand, they have recently embarked on a mission to parallelize the CONRAD program. The parallel CONRAD development is being performed on an IBM SP2 supercomputer. The parallelism is based on a message passing paradigm, and is being implemented using PVM. At the present time they have determined that approximately 70% of the sequential program can be executed in parallel. Accordingly, they expect that the parallel version will yield a speedup on the order of three times that of the sequential version. This translates into only 10 hours of execution time for the parallel version, whereas the sequential version required 30 hours

  15. Solar energy system performance evaluation report for IBM System 4 at Clinton, Mississippi

    Science.gov (United States)

    1980-07-01

    The IBM System 4 Solar Energy System is described and evaluated. The system was designed to provide 35 percent of the space heating and 63 percent of the domestic hot water preheating for a single family residence located within the United States. The system consists of 259 square feet of flat plate air collectors, a rock thermal storage containing 5 1/2 ton of rock, heat exchangers, blowers, a 52 gallon preheat tank, controls, and associated plumbing. In general, the performance of the system did not meet design expectations, since the overall design solar fraction was 48 percent and the measured value was 32 percent. Although the measured space heating solar fraction at 32 percent did agree favorably with the design space heating solar fraction at 35 percent, the hot water measured solar fraction at 33 percent did not agree favorably with the design hot water solar fraction of 63 percent. In particular collector array air leakage, dust covered collectors, abnormal hot water demand, and the preheat tank by pass valve problem are main reasons for the lower performance.

  16. Intelligent Bioreactor Management Information System (IBM-IS) for Mitigation of Greenhouse Gas Emissions

    Energy Technology Data Exchange (ETDEWEB)

    Paul Imhoff; Ramin Yazdani; Don Augenstein; Harold Bentley; Pei Chiu

    2010-04-30

    Methane is an important contributor to global warming with a total climate forcing estimated to be close to 20% that of carbon dioxide (CO2) over the past two decades. The largest anthropogenic source of methane in the US is 'conventional' landfills, which account for over 30% of anthropogenic emissions. While controlling greenhouse gas emissions must necessarily focus on large CO2 sources, attention to reducing CH4 emissions from landfills can result in significant reductions in greenhouse gas emissions at low cost. For example, the use of 'controlled' or bioreactor landfilling has been estimated to reduce annual US greenhouse emissions by about 15-30 million tons of CO2 carbon (equivalent) at costs between $3-13/ton carbon. In this project we developed or advanced new management approaches, landfill designs, and landfill operating procedures for bioreactor landfills. These advances are needed to address lingering concerns about bioreactor landfills (e.g., efficient collection of increased CH4 generation) in the waste management industry, concerns that hamper bioreactor implementation and the consequent reductions in CH4 emissions. Collectively, the advances described in this report should result in better control of bioreactor landfills and reductions in CH4 emissions. Several advances are important components of an Intelligent Bioreactor Management Information System (IBM-IS).

  17. Study on ground state energy band of even 114-124Cd isotopes under the framework of interacting boson model (IBM-1)

    International Nuclear Information System (INIS)

    Hossain, I.; Abdullah, Hewa Y.; Ahmed, I.M.; Saeed, M.A.; Ahmad, S.T.

    2012-01-01

    In this research, the ground state gamma ray bands of even 114-124 Cd isotopes are calculated using interacting boson model (IBM-1). The theoretical energy levels for Z = 48, N = 66–76 up to spin-parity 8 + have been obtained by using PHINT computer program. The values of the parameters in the IBM-1 Hamiltonian yield the best fit to the experimental energy spectrum. The calculated results of the ground state energy band are compared to the previous experimental results and the obtained theoretical calculations in IBM-1 are in good agreement with the experimental energy level. (author)

  18. Comunicação Interna na Era da Colaboração: A IBM Brasil

    Directory of Open Access Journals (Sweden)

    Ademir Balbino Siqueira Filho

    2015-11-01

    Full Text Available A transformação em seu modelo de negócio, deixando de ser somente fábrica de computadores os desafios do mundo globalizado e o surgimento de novos valores socioculturais determinaram novos rumos à comunicação interna da International Business Machine (IBM Brasil, empresa subsidiária de uma das maiores empresas de Tecnologia da Informação do mundo – a IBM. Diante de novas estratégias de comunicação interna, meios tradicionais de comunicação dividem o espaço ou, então, dão espaço a novos meios, no qual os colaboradores interagem entre si e com a empresa de uma maneira mais direta, mais rápida e menos formal. 

  19. Cost-benefit study of consumer product take-back programs using IBM's WIT reverse logistics optimization tool

    Science.gov (United States)

    Veerakamolmal, Pitipong; Lee, Yung-Joon; Fasano, J. P.; Hale, Rhea; Jacques, Mary

    2002-02-01

    In recent years, there has been increased focus by regulators, manufacturers, and consumers on the issue of product end of life management for electronics. This paper presents an overview of a conceptual study designed to examine the costs and benefits of several different Product Take Back (PTB) scenarios for used electronics equipment. The study utilized a reverse logistics supply chain model to examine the effects of several different factors in PTB programs. The model was done using the IBM supply chain optimization tool known as WIT (Watson Implosion Technology). Using the WIT tool, we were able to determine a theoretical optimal cost scenario for PTB programs. The study was designed to assist IBM internally in determining theoretical optimal Product Take Back program models and determining potential incentives for increasing participation rates.

  20. A BASIC program for an IBM PC compatible computer for drawing the weak phase object contrast transfer function

    International Nuclear Information System (INIS)

    Olsen, A.; Skjerpe, P.

    1989-01-01

    This report describes a computer program which is useful in high resolution microscopy. The program is written in EBASIC and calculates the weak phase object contrast transfer function as function of instrumental and imaging parameters. The function is plotted on the PC graphics screen, and by a Print Screen command the function can be copied to the printer. The program runs on both the Hercules graphic card and the IBM CGA card. 2 figs

  1. Case study: IBM Watson Analytics cloud platform as Analytics-as-a-Service system for heart failure early detection

    OpenAIRE

    Guidi, Gabriele; Miniati, Roberto; Mazzola, Matteo; Iadanza, Ernesto

    2016-01-01

    In the recent years the progress in technology and the increasing availability of fast connections have produced a migration of functionalities in Information Technologies services, from static servers to distributed technologies. This article describes the main tools available on the market to perform Analytics as a Service (AaaS) using a cloud platform. It is also described a use case of IBM Watson Analytics, a cloud system for data analytics, applied to the following research scope: detect...

  2. Enhancing organization and maintenance of big data with Apache Solr in IBM WebSphere Commerce deployments

    OpenAIRE

    Grigel, Rudolf

    2015-01-01

    The main objective of this thesis was to enhance the organization and maintenance of big data with Apache Solr in IBM WebSphere Commerce deployments. This objective can be split into several subtasks: reorganization of data, fast and optimised exporting and importing, efficient update and cleanup operations. E-Commerce is a fast growing and frequently changing environment. There is a constant flow of data that is rapidly growing larger and larger every day which is becoming an ...

  3. A microscopic derivation of the dependence of the IBM3 hamiltonian on the boson number and isospin

    International Nuclear Information System (INIS)

    Evans, J.A.; Long, G.L.P.; Elliott, J.P.

    1993-01-01

    The number and isospin dependence of the hamiltonian in the isospin invariant form (IBM3) of the boson model has been deduced from a seniority mapping into a single j-shell, making use of shell-model formulae recently obtained from vector coherent state theory. Numerical results are given for a specific shell-model example and the qualitative behaviour of the different parameters in the hamiltonian is discussed. (orig.)

  4. GOSPEG-1 a program for routine analysis of γ-ray spectra by an in line IBM S/7 computer

    International Nuclear Information System (INIS)

    Godio, G.P.; Gozzellino, F.

    1977-01-01

    In this paper a program for routine analysis of γ-ray spectra of samples coming from irradiated nuclear fuel reprocessing plant is described. An IBM S/7 computer (SK words of memory) which is installed at the CNEN-EUREX reprocessing plant and which is in-line connected with a multichannel analyzer and Ge(Li) detector, has been utilized for this work. The program has been written in Assembler S/7 language

  5. A full automatic system controlled with IBM-PC/XT micro-computer for neutron activation analysis

    International Nuclear Information System (INIS)

    Song Quanxun

    1992-01-01

    A full automatic system controlled with micro-computers for NAA is described. All processes are automatically completed with an IBM-PC/XT micro-computer. The device is stable, reliable, flexible and convenient for use and has many functions and applications in automatical analysis of long, middle and short lived nuclides. Due to a high working efficiency of the instrument and micro-computers, both time and power can be saved. This method can be applied in other nuclear analysis techniques

  6. A CAMAC crate controller KK009 for the Pravetz-16 and IBM PC/XT personal computers

    International Nuclear Information System (INIS)

    Georgiev, A.; Churin, I.N.

    1988-01-01

    A CAMAC crate controller and a computer bus adapter for the Pravetz 16 and IBM PC/XT personal computers are described. The following features are included in the controller: operation under program control; access to CAMAC registers treated as memory locations corresponding to given N, A, F; hardware for fast LAM processing and execution of multi-crate commands; device up to 7 crates in one CAMAC system; built-in hardware for controller and crate dataway test

  7. PC-Link historical data base system MODCOMP/IBM at link for neutral particle beam operation

    International Nuclear Information System (INIS)

    Thurgood, P.

    1989-01-01

    PC-Link is a combination of hardware and software that connects an IBM PC/AT to a MODCOMP minicomputer. It is designed as an aid to the Neutral Beam operations coordinator during injection into the DIII-D tokamak project. An IBM PC/AT is linked to 4 MODCOMP realtime acquisition systems, each of which controls 2 neutral particle beam sources. At various points in the shot sequence, data is sent to the IBM PC/AT. This data can then be integrated with the data from the other sources into tables or graphics displays for use by the Beam Coordinator. In this way, the coordinator gets realtime feedback on the relative settings and performance of the sources and can observe trends within a particular source at one location. The PC-Link is used for observing relative timing information and for post shot historical archiving. The concept of the PC-Link was originally proposed several years ago. In April 1988, in-house implementation of the link software was begun. The PC-Link receives approximately 2 Kbytes of data per source per shot. This data is converted from MODCOMP format to IBM PC format and archived to disk. The last 280 shots per source are stored to disk to observe trends. The data can be displayed in a number of formats depending upon the situation. For example, prior to a shot, the beam MODCOMPs are sent timing information from the DIII-D tokamak control system. This data is echoed on the PC in a graphical representation displaying all 8 sources. At the end of the shot, the actual running times are displayed along with the requested settings. Any subset of the Historical data may be displayed either graphically or in tables for realtime comparisons between sources. 4 figs

  8. Motivation programmes of organizations

    OpenAIRE

    Pízová, Tereza

    2008-01-01

    The Bachelor Thesis "'Motivation Programmes of Organizations" focuses on an extremely important area within personnel management. Employee motivation is crucial to the effective operation of businesses. Motivation programmes assist in increasing and maintaining employee motivation and demonstrate an organization's interest in its employees. This piece is on one hand concerned with theoretical foundations of motivation, describing theories and concepts important to the area of human behaviour ...

  9. Evidence-Based Identification of Key Beliefs Explaining Infant Male Circumcision Motivation Among Expectant Parents in Zimbabwe: Targets for Behavior Change Messaging.

    Science.gov (United States)

    Montaño, Daniel E; Tshimanga, Mufuta; Hamilton, Deven T; Gorn, Gerald; Kasprzyk, Danuta

    2018-02-01

    Slow adult male circumcision uptake is one factor leading some to recommend increased priority for infant male circumcision (IMC) in sub-Saharan African countries. This research, guided by the integrated behavioral model (IBM), was carried out to identify key beliefs that best explain Zimbabwean parents' motivation to have their infant sons circumcised. A quantitative survey, designed from qualitative elicitation study results, was administered to independent representative samples of 800 expectant mothers and 795 expectant fathers in two urban and two rural areas in Zimbabwe. Multiple regression analyses found IMC motivation among fathers was explained by instrumental attitude, descriptive norm and self-efficacy; while motivation among mothers was explained by instrumental attitude, injunctive norm, descriptive norm, self-efficacy, and perceived control. Regression analyses of beliefs underlying IBM constructs found some overlap but many differences in key beliefs explaining IMC motivation among mothers and fathers. We found differences in key beliefs among urban and rural parents. Urban fathers' IMC motivation was explained best by behavioral beliefs, while rural fathers' motivation was explained by both behavioral and efficacy beliefs. Urban mothers' IMC motivation was explained primarily by behavioral and normative beliefs, while rural mothers' motivation was explained mostly by behavioral beliefs. The key beliefs we identified should serve as targets for developing messages to improve demand and maximize parent uptake as IMC programs are rolled out. These targets need to be different among urban and rural expectant mothers and fathers.

  10. IODP Expedition 351 Lithostratigraphy: Volcaniclastic Record of Izu-Bonin-Mariana (IBM) Arc Initiation

    Science.gov (United States)

    Barth, A. P.; Brandl, P. A.; Li, H.; Hickey-Vargas, R.; Jiang, F.; Kanayama, K.; Kusano, Y.; Marsaglia, K. M.; McCarthy, A.; Meffre, S.; Savov, I. P.; Tepley, F. J., III; Yogodzinski, G. M.

    2014-12-01

    The destruction of lithospheric plates by subduction is a fundamentally important process leading to arc magmatism and the creation of continental crust, yet subduction initiation and early magmatic arc evolution remain poorly understood. For many arc systems, onset of arc volcanism and early evolution are obscured by metamorphism or the record is deeply buried; however, initial products of arc systems may be preserved in forearc and backarc sedimentary records. IODP Expedition 351 recovered this history from the dispersed ash and pyroclast record in the proximal rear-arc of the northern IBM system west of the Kyushu-Palau Ridge. Drilling at Site U1438 in the Amami Sankaku Basin recovered a thick volcaniclastic record of subduction initiation and the early evolution of the Izu-Bonin Arc. A 160-m thick section of Neogene sediment overlies 1.3 kilometers of Paleogene volcaniclastic rocks with andesitic average composition; this volcaniclastic section was deposited on mafic volcanic basement rocks. The thin upper sediment layer is primarily terrigenous, biogenic and volcaniclastic mud and ooze with interspersed ash layers. The underlying Eocene to Oligocene volcaniclastic rocks are 33% tuffaceous mudstone, 61% tuffaceous sandstone, and 6% conglomerate with volcanic and rare sedimentary clasts commonly up to pebble and rarely to cobble size. The clastic section is characterized by repetitive conglomerate and sandstone-dominated intervals with intervening mudstone-dominated intervals, reflecting waxing and waning of coarse arc-derived sediment inputs through time. Volcanic lithic clasts in sandstones and conglomerates range from basalt to rhyolite in composition and include well-preserved pumice, reflecting a lithologically diverse and compositionally variable arc volcanic source.

  11. Integrating Biodiversity into Biosphere-Atmosphere Interactions Using Individual-Based Models (IBM)

    Science.gov (United States)

    Wang, B.; Shugart, H. H., Jr.; Lerdau, M.

    2017-12-01

    A key component regulating complex, nonlinear, and dynamic biosphere-atmosphere interactions is the inherent diversity of biological systems. The model frameworks currently widely used, i.e., Plant Functional Type models) do not even begin to capture the metabolic and taxonomic diversity found in many terrestrial systems. We propose that a transition from PFT-based to individual-based modeling approaches (hereafter referred to as IBM) is essential for integrating biodiversity into research on biosphere-atmosphere interactions. The proposal emerges from our studying the interactions of forests with atmospheric processes in the context of climate change using an individual-based forest volatile organic compounds model, UVAFME-VOC. This individual-based model can explicitly simulate VOC emissions based on an explicit modelling of forest dynamics by computing the growth, death, and regeneration of each individual tree of different species and their competition for light, moisture, and nutrient, from which system-level VOC emissions are simulated by explicitly computing and summing up each individual's emissions. We found that elevated O3 significantly altered the forest dynamics by favoring species that are O3-resistant, which, meanwhile, are producers of isoprene. Such compositional changes, on the one hand, resulted in unsuppressed forest productivity and carbon stock because of the compensation by O3-resistant species. On the other hand, with more isoprene produced arising from increased producers, a possible positive feedback loop between tropospheric O3 and forest thereby emerged. We also found that climate warming will not always stimulate isoprene emissions because warming simultaneously reduces isoprene emissions by causing a decline in the abundance of isoprene-emitting species. These results suggest that species diversity is of great significance and that individual-based modelling strategies should be applied in studying biosphere-atmosphere interactions.

  12. Command and motivation

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher; Hvidtved, Johan; Andersen, Lotte Bøgh

    2014-01-01

    Motivated employees are crucial to organizations, but external interventions such as command systems and financial incentives may decrease motivation. If these external interventions are perceived to be controlling, they are expected to crowd out intrinsic motivation, and this may also apply...... to other types of autonomous motivation such as public service motivation. The perception of external interventions is thus expected to be vital. This article investigates how the perception of a specific command system (obligatory student plans) is associated with intrinsic motivation and public service...... motivation. Using a dataset with 3,230 school teachers in Denmark, a structural equation model shows that the perception of obligatory student plans as controlling is negatively associated with all of the investigated types of employee motivation, supporting that motivation crowding can occur....

  13. A Managerial Perspective on Common Identity-based and Common Bond-based Groups in Non-governmental Organizations. Patterns of Interaction, Attachment and Social Network Configuration

    Directory of Open Access Journals (Sweden)

    Elena - Mădălina VĂTĂMĂNESCU

    2014-10-01

    Full Text Available The paper approaches the common identity and common bond theories in analyzing the group patterns of interaction, their causes, processes and outcomes from a managerial perspective. The distinction between identity and bond referred to people’s different reasons for being in a group, stressing out whether they like the group as a whole — identity-based attachment, or they like individuals in the group — bond-based attachment.  While members of the common identity groups reported feeling more attached to their group as a whole than to their fellow group members and tended to perceive others in the group as interchangeable, in bond-based attachment, people felt connected to each other and less to the group as a whole, loyalty or attraction to the group stemming from their attraction primarily to certain members in the group. At this level, the main question concerned with the particularities of common identity-based or common bond-based groups regarding social interaction, the participatory architecture of the group, the levels of personal and work engagement in acting like a cohesive group. In order to address pertinently this issue, the current work was focused on a qualitative research which comprised in-depth (semi-structured interviews with several project coordinators from non-governmental organizations (NGOs. Also, to make the investigation more complex and clear, the research relied on the social network analysis which was indicative of the group dynamics and configuration, highlighting the differences between common identity-based and common bond-based groups.

  14. Pengembangan Sistem Informasi Geografis Berbasis Node.JS untuk Pemetaan Mesin dan Tracking Engineer dengan Pemanfaatan Geolocation pada PT IBM Indonesia

    OpenAIRE

    Fajrin, Rachmat

    2017-01-01

    PT IBM memiliki banyak klien di Indonesia, ini membuat persebaran produk (dalam hal ini mesin atm) yang semakin meluas di wilayah Indonesia. Hal ini memicu PT IBM untuk menempatkan engineer dibanyak wilayah untuk memenuhi kebutuhan services dan maintenance. Untuk itu dalam penelitian ini dikembangkan sebuah sistem informasi geografis untuk pemetaan mesin dan tracking engineer dengan pemanfaatan geolocation yang bertujuan untuk menampilkan peta digital beserta lokasi mesin dan engineer di selu...

  15. Understanding Employee Motivation.

    Science.gov (United States)

    Lindner, James R.

    1998-01-01

    Extension employees (n=23) ranked the following as the most important motivational factors: interesting work, good wages, appreciation, job security, and good working conditions. The findings were related to theories of motivation formulated by Herzberg, Adams, and Vroom. (SK)

  16. Motivation in medical education.

    Science.gov (United States)

    Pelaccia, Thierry; Viau, Rolland

    2017-02-01

    Motivation is a concept which has fascinated researchers for many decades. The field of medical education has become interested in motivation recently, having always assumed that medical students must be motivated because of their commitment to highly specific training, leading to a very specific profession. However, motivation is a major determinant of the quality of learning and success, the lack of which may well explain why teachers sometimes observe medical students who are discouraged, have lost interest or abandon their studies, with a feeling of powerlessness or resignation. After describing the importance of motivation for learning in medicine, this Guide will define the concept of motivation, setting it within the context of a social cognitive approach. In the second part of this Guide, recommendations are made, based upon the so-called "motivational dynamic model", which provides a multitude of various strategies with positive effects on students' motivation to learn.

  17. Motivating pharmacy employees.

    Science.gov (United States)

    White, S J; Generali, J A

    1984-07-01

    Concepts from theories of motivation are used to suggest methods for improving the motivational environment of hospital pharmacy departments. Motivation--the state of being stimulated to take action to achieve a goal or to satisfy a need--comes from within individuals, but hospital pharmacy managers can facilitate motivation by structuring the work environment so that it satisfies employees' needs. Concepts from several theories of motivation are discussed, including McGregor's theory X and theory Y assumptions, Maslow's hierarchy of needs theory, Herzberg's motivation hygiene theory, and Massey's value system theory. Concepts from the Japanese style of management that can be used to facilitate motivation, such as quality circles, also are described. The autocratic, participative, and laissez faire styles of leadership are discussed in the context of the motivation theories, and suggested applications of theoretical concepts to practice are presented.

  18. Strong intrinsic motivation

    OpenAIRE

    Dessi, Roberta; Rustichini, Aldo

    2015-01-01

    A large literature in psychology, and more recently in economics, has argued that monetary rewards can reduce intrinsic motivation. We investigate whether the negative impact persists when intrinsic motivation is strong, and test this hypothesis experimentally focusing on the motivation to undertake interesting and challenging tasks, informative about individual ability. We find that this type of task can generate strong intrinsic motivation, that is impervious to the effect of monetary incen...

  19. Motivation in medical students

    OpenAIRE

    Kusurkar, R.A.

    2012-01-01

    Introduction The importance of motivation in learning behaviour and education is well-researched and proven in general education, but much less in medical education. There is sometimes focus on increasing the quantity of motivation, but the how and why need more evidence. The aims of this thesis were to gather insights and investigate medical students’ motivation, particularly the importance of quality of motivation, factors influencing and outcomes and to explore how these can be applied to ...

  20. Motivation and career development

    OpenAIRE

    Flemr, Marcel

    2009-01-01

    The main objective of this diploma thesis is to outline various theories of work motivation, career growth and their practical application in sales team management within a sales organization. In the theoretical part the paper deals with the definition of essential terms including but not limited to motivation, work motivation, career and work career. Moreover, it focuses on selected motivational theories, basic criteria and current principles of managing the work career, career growth and de...

  1. Motivering van spoorbaaninstandhoudingstoesighouers

    OpenAIRE

    2015-01-01

    M.Com. (Business Management) Personnel motivation is one of management's most important tasks, but due to a lack of understanding of the nature of motivation, it is also frequently neglected resulting in losses to the organisation. The purpose of this document was to perform a motivation study on the supervisory staff of a railway maintenance depot. With the results of this study the cause of the low level of motivation was determined, followed by recommendations to management in order to ...

  2. Unges motivation i udskolingen

    DEFF Research Database (Denmark)

    Pless, Mette; Katznelson, Noemi; Hjort-Madsen, Peder

    Om hvordan de unge i udskolingen skaber lyst og motivation for læring. Med afsnit om hvad motivation er, hvordan den fremmes hos unge og kombineres med et liv udenfor skolen......Om hvordan de unge i udskolingen skaber lyst og motivation for læring. Med afsnit om hvad motivation er, hvordan den fremmes hos unge og kombineres med et liv udenfor skolen...

  3. Learner Motivation and Interest

    OpenAIRE

    Daskalovska, Nina; Gudeva, Liljana Koleva; Ivanovska, Biljana

    2012-01-01

    There are a lot of factors which influence success in learning. However, one of the most important factors is the learner’s motivation to reach the desired goals. Research and experience show that learners with strong motivation can achieve a lot regardless of circumstances. Studies of motivation in second language learning have led to several distinctions, one of which is the distinction between integrative and instrumental motivation. According to this distinction, some learners are motivat...

  4. Understanding Student Motivation

    Science.gov (United States)

    Seifert, Timothy

    2004-01-01

    Contemporary theories of academic motivation seek to explain students' behaviours in academic settings. While each theory seems to possess its own constructs and unique explanations, these theories are actually closely tied together. In this theoretical study of motivation, several theories of motivation were described and an underlying theme of…

  5. Theme: Motivating Students.

    Science.gov (United States)

    Gartin, Stacy A.; And Others

    1993-01-01

    Includes "How Do I Turn Your Crank to Get You Going?" (Gartin); "How Do You Say 'I Don't Know' and Not Feel Guilty?" (Dickson); "Basics of Motivation" (Rankin); "Challenge to Lead Motivates Students" (D'Haem, Krueger); "Don't Just Tell Me, Teach Me!" (Custer, Leugers); "The 'I' in Motivation" (Woody); and "Student Self Discipline Scale" (Coffman).…

  6. Motivation, Management, and Performance.

    Science.gov (United States)

    Olmstead, Joseph A.

    There is an increasing interest today in the ways in which human motivation contributes to the productivity and performance of personnel. This early study of motivation management emphasizes that the organizational environment is a principal determinant of the quality of employee motivation. Concrete considerations in the management of motivation…

  7. Explorations in achievement motivation

    Science.gov (United States)

    Helmreich, Robert L.

    1982-01-01

    Recent research on the nature of achievement motivation is reviewed. A three-factor model of intrinsic motives is presented and related to various criteria of performance, job satisfaction and leisure activities. The relationships between intrinsic and extrinsic motives are discussed. Needed areas for future research are described.

  8. Personlighed og motivation

    DEFF Research Database (Denmark)

    Olsen, Jan Brødslev

    2017-01-01

    ses som forskelle i deres personlighed og i deres motivation. Kapitlet er opbygget således, at ganske kort præciseres først de to begreber, personlighed og motivation, hvorefter udvalgte teoretiske perspektiver på personlighed og motivation tages op. Til sammen vil disse bidrage til at besvare...

  9. Researching Student Motivation

    Science.gov (United States)

    Alkaabi, Sultan Ali R.; Alkaabi, Warda; Vyver, Glen

    2017-01-01

    Motivation has been studied by different scientists in different fields of knowledge such as biology, psychology, and education for a long period, which has cultivated a wealth of knowledge in these disciplines. The richness in motivation theories poses complexity in motivation research. Due to these complexities, many researchers focus on using a…

  10. Motivator-manager.

    Science.gov (United States)

    McDonald, Angelic P

    2009-01-01

    The radiologic career field has undergone radical changes in technology, regulatory compliance, and customer expectation.These changes often require dramatic alterations to processes,which can break down communication, create stress, and have a negative effect on department productivity. Motivation itself is a frequently analyzed and reported topic in professional publications. For this purpose, this literature review specifically researches motivation as identified by radiology administrators through Radiology Management. Three key elements surfaced as those with the most impact: (1) motivation is an intrinsic factor which can be influenced but not created, (2) clear attainable goals are an essential component of motivation,and (3) motivation begins with identification of employee needs.

  11. IBM Software Defined Storage and ownCloud Enterprise Editon - a perfect match for hyperscale Enterprise File Sync and Share

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    IBM Software Defined Storage, in particular the technology offering codenamed Elastic Storage (based on GPFS technology) has proven to be an ideal match for Enterprise File Sync and Share (EFSS) solutions that need highly scalable storage. The presentation will provide insight into the integration of Elastic Storage with the ownCloud Enterprise Edition (based on Open Source technology) software that showed impressive scalability and performance metrics during a proof-of-concept phase of an installation that is supposed to serve 300000 users when fully deployed.

  12. IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective

    CERN Document Server

    Dattani, Dinesh D

    2013-01-01

    Rather than rehashing basic information-such as command syntax-already available in other publications, this book focuses on important security and audit issues, business best practices, and compliance, discussing the important issues in IBM mainframe security. Mainframes are the backbone of most large IT organizations; security cannot be left to chance. With very little training available to the younger crowd, and older, more experienced personnel retiring or close to retiring, there is a need in mainframe security skills at the senior level. Based on real-life experiences, issues, and soluti

  13. Preparation of development plan for the gas-condensate pool with the use of a high speed computer (IBM-1620)

    Energy Technology Data Exchange (ETDEWEB)

    Shirkovsky, A I; Kumar, S

    1968-01-01

    The computation of all the technical, technological, and economic figures for a gas supply system by using the High Speed Computer IBM-1620 is presented. The gas supply system consists of a gas-condensate pool (source) and main gas pipeline from the pool to the consumer. All necessary analytical equations for correlating geological, technological, and economic variables have been used. Results of calculations and recommendations for the most profitable variant are given. Effects of geological, technological, and technical factors upon the economic figures are also shown.

  14. FROM THE LEWIS AND CLARK EXPEDITION TO IBM, DELL, AND SOUTHWEST AIRLINES: TEACHING HISTORY AND LEADERSHIP TO BUSINESS STUDENTS

    Directory of Open Access Journals (Sweden)

    Jeffrey J. Matthews

    2006-01-01

    Full Text Available History is not a tomb of dead facts but a resource that can inform and improve everyday decision making. Experience as an analytical tool is invaluable for solving problems in changing and competitive environments. “From the Lewis and Clark Expedition,” which coincides with the National Lewis & Clark Bicentennial Commemoration (2003—2006, demonstrates how contemporary business concepts of visionary leadership, systematic planning, and organizational climate were instrumental to the success of Thomas Jefferson's “Corps of Discovery” and shows how a mastery of these concepts contributed to the successes of the pioneering US corporations IBM, Southwest Airlines, and Dell.

  15. GPIB interface of IBM-PC compatible microcomputer and multimeter HP3457A for the automatization of temperature measurements

    International Nuclear Information System (INIS)

    Migliano, A.C.C.; Sircilli Neto, F.; Passaro, A.

    1990-01-01

    The measurement of temperature distribution of the beam transport devices, utilized in the IEAv linac, takes several hours to be completed. At the beam transport laboratory, these experiments are controlled with the help of a MS-quick BASIC code denominated TERMOJ. This code uses the software of STD-8410 plate to promote the communication between an IBM-PC compatible microcomputer and the programmable multimeter HP3457A via GPIB interface. This work presents information for the automation of experiments using thermocouples to obtain temperature distributions with the TERMOJ code. Also, suggestions of how modify the algorithm of the program for the specific situations are indicated. (author)

  16. PC-Link historical data base system MODCOMP/IBM at link for neutral particle beam operation

    International Nuclear Information System (INIS)

    Thurgood, P.

    1989-12-01

    ''PC-Link'' is a combination of hardware and software that connects an IBM PC/AT to a MODCOMP minicomputer. It is designed as an aid to the Neutral Beam operations coordinator during injection into the DIII-D tokamak project. An IBM PC/AT is linked to 4 MODCOMP ''realtime'' acquisition systems, each of which controls 2 neutral particle beam sources. At various points in the shot sequence, data is sent to the IBM PC/AT. This data can then be integrated with the data from the other sources into tables or graphics displays for use by the Beam Coordinator. In this way, the coordinator gets realtime feedback on the relative settings and performance of the sources and can observe trends within a particular source at one location. The PC- Link is used for observing relative timing information and for post shot historical archiving. The concept of the PC-Link was originally proposed several years ago. In April 1988, in-house implementation of the link software was begun. The PC-Link receives approximately 2 Kbytes of data per source per shot. This data is converted from MODCOMP format to IBM PC format and archived to disk. The last 280 shots per source are stored to disk to observe trends. The data can be displayed in a number of formats depending upon the situation. For example, prior to a shot, the beam MODCOMPs are sent timing information from the DIII-D tokamak control system. This data is echoed on the PC in a graphical representation displaying all 8 sources. At the end of the shot, the actual running times are displayed along with the requested settings. Any subset of the Historical data may be displayed either graphically or in tables for realtime comparisons between sources. This system is designed for realtime use, not for complete archiving purposes. This same data is also sent to a VAX computer for full integration into the archive database. This system is easily upgradable and extremely versatile. 4 figs

  17. BULGARIAN TEACHERS’ CAREER MOTIVATORS

    Directory of Open Access Journals (Sweden)

    Stanislava Stoyanova

    2016-12-01

    Full Text Available A review of several studies of teachers’ career motivation since Bulgarian Renaissance till nowadays is presented in this paper. 203 Bulgarian teachers in public schools were studied by means of a questionnaire created by Slavchov & Stoyanova (2007 measuring career motivational types, according to Moses’ typology (2003. The career motivational type of Authenticity seekers was the most preferred by the studied Bulgarian teachers, followed by Personal developers and Stability seekers. Career builders as a career motivational type was minor career motivator, the least preferred one by Bulgarian teachers. A lot of significant positive correlations existed between teachers’ career motivational types. Some social-demographic factors (such as gender, specialty, work experience, and age differentiated teachers’ career motivators. The type of Autonomy seekers was more preferred career motivator by male teachers than by female teachers in correspondence to the traditional stereotypes for men. Longer teachers’ work experience and teachers’ advance in age were related to more frequency of Stability seekers, but less frequency of Novelty seekers career motivator. Preschool and elementary school teachers preferred more strongly Authenticity seekers as a career motivator than teachers in natural sciences and mathematics. Establishing major career motivators for teachers may be related to opportunities for improvement of performance and work satisfaction.

  18. Motivation from control.

    Science.gov (United States)

    Eitam, Baruch; Kennedy, Patrick M; Tory Higgins, E

    2013-09-01

    Human motivation is sensitive to value-to the outcomes of actions. People invest mental and physical resources for obtaining desired results or for stopping and reversing undesired ones. Accordingly, people's motivation is sensitive to information about their standing in relation to outcome attainment ('outcome feedback'). In this paper, we argue and present the first evidence for the existence of another motivational sensitivity in humans-a sensitivity to our degree of control on the environment and hence to information about that control ('control feedback'). We show that when actions have even trivial and constant perceptual effects, participants' motivation to perform is enhanced. We then show that increased motivation is not because more information about task performance is available and that motivation is increased only in conditions in which control over the effects can be firmly established by the mind. We speculate on the implications for understanding motivation, and potentially, physical and mental health.

  19. Public Service Motivation

    Directory of Open Access Journals (Sweden)

    Raluca-Marilena Mihalcioiu

    2011-05-01

    Full Text Available Public Service Motivation concept was developed in North America and focuses on specific motivations of public servants, such as employee satisfaction, organizational commitment, reward preferences, organizational and individual performance. Other types of motivation, as financial consideration, are relevant but have less important influences with regard to this kind of work outcomes. This strengthen the assertion for a diversified motivational strategy, which affect various types of motivation, while not losing sight of the public value that one organization shows and therefore valuing public service motivation as a specific contribution to work outcomes. The concept has been increasingly applied in European public administration. This paper presents Status Quo of international Public Service Motivation research and locates in them empirical evidences from contries that are already working with this concept, like Austria. It also analyses implications for central questions of public management. The main focus of this article is general appropriateness and possible applications for Romanian public management research.

  20. Occupational safety motivation

    DEFF Research Database (Denmark)

    Pedersen, Louise; Kines, Pete

    2010-01-01

    Background: Motivation is one of the most important factors for safety behaviour and for implementing change in general. However, theoretical and psychometric studies of safety performance have traditionally treated safety motivation, safety compliance and safety participation unidimensionally....... At the same time many motivation questionnaire items are seldom founded on theory and/or do not account for the theories’ ontological and epistemological differences, e.g. of how knowledge, attitude and action are related. Present questionnaire items tap into occupational safety motivation in asking whether...... or not respondents ‘are’ motivated and whether they feel that safety is important or worthwhile. Another important aspect is ‘what’ motivates workers to comply to and participate in safety. The aim of this article is to introduce a new theory-based occupational safety motivation scale which is validated...

  1. (Mis)managing employee motivation?

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher; Hvidtved, Johan; Andersen, Lotte Bøgh

    Motivated employees are crucial to all organizations, but some management initiatives may actually decrease motivation. Motivation crowding theory thus expects that command and incentives – if they are perceived as controlling - crowd out intrinsic motivation. The perception is thus expected...

  2. [Motivation of Men to Participate in Physical Activity Programs for Health Promotion].

    Science.gov (United States)

    Wollesen, Bettina; Lorf, Sarah; Bischoff, Laura Luise; Menzel, Josefine

    2017-10-25

    Study aim The rate of men participating in health promotion programs is lower than that of women. The reasons and barriers for the different motivation of men as well as wishes and perception for prevention are not yet sufficiently analyzed. This quantitative survey examines motives and barriers of men for participation in primary prevention. Thus, the sample was subdivided into 2 groups, namely motivated vs. non-motivated regarding being active for health promotion. Differences between the 2 groups concerning current health status, health beliefs and health behavior were analyzed to plan more suitable programs in the future. Methods A sample of N=243 men (motivated n=147, non-motivated n=96) participated in the standardized online-survey. The quantitative data analysis integrated the BMZI, KKG, SF-12, TICS and the MGV-39. The examination of the differences between the sub-groups was done with Chi²-Tests and analysis of variance (one-way ANOVA) with IBM SPSS 22 (Armonk, NY: IBM Corp). Results The group of motivated men reported worse health status, especially in psychological well being compared to the non-motivated group (SF-12: F=6.3, p=0.013, eta²=0.025). Both groups named refusal to use harmful substances (e.g. drugs, alcohol), good nutrition and active life-style as important factors for health. Non-motivated men showed a higher score for the fatalistic externality of health (KKG: F=7.609, p=0.006, eta²=0.031) and rated health promotion as paternalism (Chi²=17.693, p≤0.001, C=0.261). Conclusion The men of this study who were motivated to join health promotion programs had a worse health status that might explain their compliance. For the non-motivated men, there was a discrepancy between their own beliefs in health behavior and their real daily activities (e.g. physical activity). In order to reach this target group of men before their health status worsens, prevention programs should integrate incentive systems that integrate features for overcoming

  3. How to Motivate Employees?

    Directory of Open Access Journals (Sweden)

    Andreja Kušar

    2014-02-01

    Full Text Available Research Question (RQ: How to motivate employees and keep them motivated? Purpose: The purpose of this study is to find out what motivates employees and what motivates employees for work. Method: The results of the questionnaire are graphically presented and described. Random sampling was utilized that included participants from various professional areas and demographic characteristics. The results showed a relationship between individual motivational factors related to education, age and type of employment. All of the questions were closed - type questions except for the last question, which was an open question, in which the respondents answered in their own words. Questions were analyzed using frequency analysis of individual responses. Pearson's Chi - squared test, Spearman's rank correlation and Fisher’s Exact test was made using R Commander. Results: The research findings showed which motivational factors motivate employees the most. These are especially non - material motivational factors, such as good relationships, jobs with challenges, advancement opportunities, clear instructions, good work conditions, company reputation, etc. Organization: The study will help managers understand their role in motivating employees as well as the types of motivational factors. Society: The research shows how individuals are motivated. Originality: Certain motivators in the study are ranked differently than was found in previous literature. Most probably the reason is that the respondents in this study favored intangible motivators (good relations with leadership and their colleagues, good working conditions, etc.. Limitations/Future Research: The limitation of this study was that the sample included employees of different ages, gender and years of service in various organizations. To enhance the study and to find similar results as in previous literature, more questions should have been asked as well as increasing the sample size.

  4. Hospital nurses' work motivation.

    Science.gov (United States)

    Toode, Kristi; Routasalo, Pirkko; Helminen, Mika; Suominen, Tarja

    2015-06-01

    The knowledge surrounding nurses' work motivation is currently insufficient, and previous studies have rarely taken into account the role of many influential background factors. This study investigates the motivation of Estonian nurses in hospitals, and how individual and organisational background factors influence their motivation to work. The study is quantitative and cross-sectional. An electronically self-reported questionnaire was used for data collection. The sample comprised of 201 Registered Nurses working in various hospital settings in Estonia. Data were analysed using descriptive statistics, two-sample Wilcoxon rank-sum (Mann-Whitney) test, Kruskal-Wallis equality-of-populations rank test and Spearman's correlation. Both extrinsic and intrinsic motivations were noted among hospital nurses. Nurses were moderately externally motivated (M = 3.63, SD = 0.89) and intrinsically strongly motivated (M = 4.98, SD = 1.03). A nurses' age and the duration of service were positively correlated with one particular area of extrinsic work motivation, namely introjected regulation (p extrinsic motivation (p = 0.016) and intrinsic work motivation (p = 0.004). The findings expand current knowledge of nurses' work motivation by describing the amount and orientation of work motivation among hospital nurses and highlighting background factors which should be taken into account in order to sustain and increase their intrinsic work motivation. The instrument used in the study can be an effective tool for nurse managers to determine a nurse's reasons to work and to choose a proper motivational strategy. Further research and testing of the instrument in different countries and in different contexts of nursing is however required. © 2014 Nordic College of Caring Science.

  5. IbM PENGEMBANGAN POTENSI LOKAL POSDAYA DURIAN JAYA MENUJU DESA WISATA DI KELURAHAN BUBAKAN, KEC. MIJEN, KOTA SEMARANG

    Directory of Open Access Journals (Sweden)

    Rasiman .

    2015-09-01

    Full Text Available Abstract ?é?á Based on the data analysis of monograph in Bubakan Village, whichhas various kinds of?é?á potential local resources (e.q:fruits, plants vegetable and cattle, Posdaya Durian Jayaas a partner of IbM, has some potential activities that can be developed?é?á as pioneer of potential local tourist resort intheareaofBubakanvillage. The present activities of the Posdaya are divided into several fields:a.Education;b.Health;c.Entrepreneurship; andd.Environment Care. Those localpotentialresources were still needed serious managerial development in accordance todesign a new local tourist resort. The IbM activities in RW02 Bubakan aimed at 1 making cat fish abon and various food from flourmocaf, 2 conducting a seminar with village officials, community leaders, and the group Posdaya to design a?é?á tourist village. 3 socializing about?é?á nutrients forchildren in Posyandu ?óÔé¼?ôMawar Dua?óÔé¼?Ø. Keyword: local potential resources, Posdaya Durian Jaya, local tourist resort

  6. Evidence-based identification of key beliefs explaining adult male circumcision motivation in Zimbabwe: targets for behavior change messaging.

    Science.gov (United States)

    Montaño, Daniel E; Kasprzyk, Danuta; Hamilton, Deven T; Tshimanga, Mufuta; Gorn, Gerald

    2014-05-01

    Male circumcision (MC) reduces HIV acquisition among men, leading WHO/UNAIDS to recommend a goal to circumcise 80 % of men in high HIV prevalence countries. Significant investment to increase MC capacity in priority countries was made, yet only 5 % of the goal has been achieved in Zimbabwe. The integrated behavioral model (IBM) was used as a framework to investigate the factors affecting MC motivation among men in Zimbabwe. A survey instrument was designed based on elicitation study results, and administered to a representative household-based sample of 1,201 men aged 18-30 from two urban and two rural areas in Zimbabwe. Multiple regression analysis found all five IBM constructs significantly explained MC Intention. Nearly all beliefs underlying the IBM constructs were significantly correlated with MC Intention. Stepwise regression analysis of beliefs underlying each construct respectively found that 13 behavioral beliefs, 5 normative beliefs, 4 descriptive norm beliefs, 6 efficacy beliefs, and 10 control beliefs were significant in explaining MC Intention. A final stepwise regression of the five sets of significant IBM construct beliefs identified 14 key beliefs that best explain Intention. Similar analyses were carried out with subgroups of men by urban-rural and age. Different sets of behavioral, normative, efficacy, and control beliefs were significant for each sub-group, suggesting communication messages need to be targeted to be most effective for sub-groups. Implications for the design of effective MC demand creation messages are discussed. This study demonstrates the application of theory-driven research to identify evidence-based targets for intervention messages to increase men's motivation to get circumcised and thereby improve demand for male circumcision.

  7. Identification of Key Beliefs Explaining Male Circumcision Motivation Among Adolescent Boys in Zimbabwe: Targets for Behavior Change Communication.

    Science.gov (United States)

    Kasprzyk, Danuta; Tshimanga, Mufuta; Hamilton, Deven T; Gorn, Gerald J; Montaño, Daniel E

    2018-02-01

    Male circumcision (MC) significantly reduces HIV acquisition among men, leading WHO/UNAIDS to recommend high HIV and low MC prevalence countries circumcise 80% of adolescents and men age 15-49. Despite significant investment to increase MC capacity only 27% of the goal has been achieved in Zimbabwe. To increase adoption, research to create evidence-based messages is greatly needed. The Integrated Behavioral Model (IBM) was used to investigate factors affecting MC motivation among adolescents. Based on qualitative elicitation study results a survey was designed and administered to a representative sample of 802 adolescent boys aged 13-17 in two urban and two rural areas in Zimbabwe. Multiple regression analysis found all six IBM constructs (2 attitude, 2 social influence, 2 personal agency) significantly explained MC intention (R 2  = 0.55). Stepwise regression analysis of beliefs underlying each IBM belief-based construct found 9 behavioral, 6 injunctive norm, 2 descriptive norm, 5 efficacy, and 8 control beliefs significantly explained MC intention. A final stepwise regression of all the significant IBM construct beliefs identified 12 key beliefs best explaining intention. Similar analyses were carried out with subgroups of adolescents by urban-rural and age. Different sets of behavioral, normative, efficacy, and control beliefs were significant for each sub-group. This study demonstrates the application of theory-driven research to identify evidence-based targets for the design of effective MC messages for interventions to increase adolescents' motivation. Incorporating these findings into communication campaigns is likely to improve demand for MC.

  8. [Psychological theories of motivation].

    Science.gov (United States)

    Quoniam, Nolwenn; Bungener, Catherine

    2004-03-01

    The comprehension of the principles guiding the human actions has always been an important aspect of philosophy. The development of experimental psychology first completely rejected all mental explanations such as will, intentions or motives. Behavior should then only be understood as determined by conditioning and learning. However, different theories denied that human behavior could be considered as purely reactive to the environment and stressed the active role of the organism on the environment. Theories from the humanist psychology and the social psychology described two kinds of motivation. The extrinsic motivation results from external stimuli and the intrinsic motivation from the organism himself. Our behavior is therefore determined by an interaction between our beliefs, expectations, needs and the environment. Actually, the concept of motivation is not well specified. It refers either to a global dynamic structure responsible for action either to a specific tendency toward some specific actions. Anyway, motivation is a concept infered from behavior. Therefore, its evaluation could only be secondary.

  9. Second Language Learning Motivation

    Directory of Open Access Journals (Sweden)

    Alvyda Liuolienė

    2011-04-01

    Full Text Available The paper deals with the peculiarities of ESP learning motivation. The meaning of motivation and three main approaches to motivational psychology: expectancy-value theory, goal-directed theory and the self-determination theory are presented, two distinct orientations for learning a language: integrative and instrumental are described in the paper. The importance of needs analysis to ESP learning is stressed and the main conditions (interest in the topic and activity; relevance to the students’ lives; expectancy of success and feelings of being in control and satisfaction in the outcome for motivation are described. The skills that ESP learners need to develop are specified. The description of approaches to motivational psychology is proposed, as motivation is of great significance in foreign language learning.

  10. Motivation and remuneration

    OpenAIRE

    SOUKUP, Miloslav

    2012-01-01

    The aim of this bachelor work is analysis of remuneration and motivation in travel agencies and companies, where is established performance pay system for self-employed. Work consists of literature review and practical part. Literature review contains information about motivation and remuneration. Practical part includes information about analyzed companies, analysis remuneration and motivation, evaluation analyzed companies and conceiving performance pay system, in which are participants sel...

  11. Motivation in Experiential Education

    OpenAIRE

    Porada, Petr

    2007-01-01

    This project is dedicated to study of motivation in experiential courses. More exactly it tries to describe motivation means suitable for teenage trainees to make them cooperate willingly and actively on course asset. And not just that. It also describes factors which have influence on quality and quantity of aplicated effort, manners how to enforce trainees to carry on working when some problem appears and also how the motivation is affected by the instructor's and peers' admittance. The pro...

  12. Employee motivation and benefits

    OpenAIRE

    Březíková, Tereza

    2009-01-01

    The topic of my bachelor's thesis is the employee motivation and benefits. The thesis is divided in two parts, a theoretical one and a practical one. The theoretical part deals with the theory of motivation and individual employee benefits. The practical part describes employee benefits in ČSOB, where I did my research by questionnaires that were filled in by employees from different departments of ČSOB. These employees answered questions about their work motivation and benefits. The resultts...

  13. Jack Michael's Motivation

    OpenAIRE

    Miguel, Caio F.

    2013-01-01

    Among many of Jack Michael's contributions to the field of behavior analysis is his behavioral account of motivation. This paper focuses on the concept of motivating operation (MO) by outlining its development from Skinner's (1938) notion of drive. Conceptually, Michael's term helped us change our focus on how to study motivation by shifting its origins from the organism to the environment. Michael's account also served to stimulate applied research and to better understand behavioral functio...

  14. Adaptive Motivation Theory.

    Science.gov (United States)

    1982-02-01

    concept of motivation at all. Nuttin (1973) placed -5- Landy: ONR Annual Report certain hedonistic overtones on White’s principle of effectance motivation...deficiencies of motivation theories become particularly apparent in dealing with the issue of boredom . Tn terms of objective reality, it would seem...with expcsure to a c nstant stimulus set, we might justifiably conclude that there is a regular sequence which characterizes the appearance of boredom

  15. Managing Joint Production Motivation

    DEFF Research Database (Denmark)

    Lindenberg, Siegwart; Foss, Nicolai Juul

    2011-01-01

    We contribute to the microfoundations of organizational performance by proffering the construct of joint production motivation. Under such motivational conditions individuals see themselves as part of a joint endeavor, each with his or her own roles and responsibilities; generate shared...... representations of actions and tasks; cognitively coordinate cooperation; and choose their own behaviors in terms of joint goals. Using goal-framing theory, we explain how motivation for joint production can be managed by cognitive/symbolic management and organizational design....

  16. The Motivated Project Team

    Science.gov (United States)

    2009-12-01

    Financial incentives that match level of achievement • Regular, constructive feedback. Hierarchy of Needs ( Abraham H. Maslow ) Team members can be...Much has been written regarding motivational Defense AT&L: November-December 2009 58 theory . To further complicate mat- ters, some motivational... theories clearly contradict others, and a manager’s ability to motivate is, to no small degree, related to his or her leadership approach and inter

  17. Description of the Rigid Triaxial Deformation at Low Energy in 76Ge with the Proton-Neutron Interacting Model IBM2

    International Nuclear Information System (INIS)

    Zhang Da-Li; Ding Bin-Gang

    2013-01-01

    We investigate properties of the low-lying energy states for 76 Ge within the framework of the proton-neutron interacting model IBM2, considering the validity of the Z = 38 subshell closure 88 Sr 50 as a doubly magic core. By introducing the quadrupole interactions among like bosons to the IBM2 Hamiltonian, the energy levels for both the ground state and γ bands are reproduced well. Particularly, the doublet structure of the γ band and the energy staggering signature fit the experimental data correctly. The ratios of B(E2) transition strengths for some states of the γ band, and the g factors of the 2 1 + , 2 2 + states are very close to the experimental data. The calculation result indicates that the nucleus exhibiting rigid triaxial deformation in the low-lying states can be described rather well by the IBM2

  18. The Upper- to Middle-Crustal Section of the Alisitos Oceanic Arc, (Baja, Mexico): an Analog of the Izu-Bonin-Marianas (IBM) Arc

    Science.gov (United States)

    Medynski, S.; Busby, C.; DeBari, S. M.; Morris, R.; Andrews, G. D.; Brown, S. R.; Schmitt, A. K.

    2016-12-01

    The Rosario segment of the Cretaceous Alisitos arc in Baja California is an outstanding field analog for the Izu-Bonin-Mariana (IBM) arc, because it is structurally intact, unmetamorphosed, and has superior three-dimensional exposures of an upper- to middle-crustal section through an extensional oceanic arc. Previous work1, done in the pre-digital era, used geologic mapping to define two phases of arc evolution, with normal faulting in both phases: (1) extensional oceanic arc, with silicic calderas, and (2) oceanic arc rifting, with widespread diking and dominantly mafic effusions. Our new geochemical data match the extensional zone immediately behind the Izu arc front, and is different from the arc front and rear arc, consistent with geologic relations. Our study is developing a 3D oceanic arc crustal model, with geologic maps draped on Google Earth images, and GPS-located outcrop information linked to new geochemical, geochronological and petrographic data, with the goal of detailing the relationships between plutonic, hypabyssal, and volcanic rocks. This model will be used by scientists as a reference model for past (IBM-1, 2, 3) and proposed IBM (IBM-4) drilling activities. New single-crystal zircon analysis by TIMS supports the interpretation, based on batch SIMS analysis of chemically-abraded zircon1, that the entire upper-middle crustal section accumulated in about 1.5 Myr. Like the IBM, volcanic zircons are very sparse, but zircon chemistry on the plutonic rocks shows trace element compositions that overlap to those measured in IBM volcanic zircons by A. Schmitt (unpublished data). Zircons have U-Pb ages up to 20 Myr older than the eruptive age, suggesting remelting of older parts of the arc, similar to that proposed for IBM (using different evidence). Like IBM, some very old zircons are also present, indicating the presence of old crustal fragments, or sediments derived from them, in the basement. However, our geochemical data show that the magmas are

  19. Operational experience with open communication in the field of building automation at the IBM center Ehningen; GA-Betriebserfahrung - mit offener Kommunikation im Informatikzentrum Ehningen

    Energy Technology Data Exchange (ETDEWEB)

    Damnig, A [IBM Deutschland Informationssysteme GmbH, Ehningen bei Boeblingen (Germany)

    1995-12-31

    In chapter 21 of the anthology about building control the operational experience with open communication in the field of building automation is discussed. The following aspects are discussed: building automation at IBM in Ehningen, the FACN experience, what has been achieved? Energy and operation optimisation. (BWI) [Deutsch] Kapitel 21 des Sammelbandes ueber Building Control ist dem Thema der Betriebserfahrung mit Gebaeudeautomationen mit offener Kommunikation gewidmet. In diesem Zusammenhang werden folgende Themenbereiche angesprochen: Gebaeudeautomation bei IBM in Ehningen, das FACN-Protokoll; Betriebserfahrungen; Was wurde erreicht?; Energie- und Betriebsoptimierungen. (BWI)

  20. Children's Theories of Motivation

    Science.gov (United States)

    Gurland, Suzanne T.; Glowacky, Victoria C.

    2011-01-01

    To investigate children's theories of motivation, we asked 166 children (8-12 years of age) to rate the effect of various motivational strategies on task interest, over the short and long terms, in activities described as appealing or unappealing. Children viewed the rewards strategy as resulting in greatest interest except when implemented over…

  1. Guided Reading and Motivation

    Science.gov (United States)

    Hauptman, Allyson L.

    2012-01-01

    The purpose of this study was to determine the relationship between Guided Reading and student motivation to read across fourth, fifth, and sixth grades. The study defined literacy motivation as: (a) task value; (b) self-perceived competence; (c) students' perceptions of the Guided Reading format. Factor analysis and repeated measures ANOVAs were…

  2. Motives for Social Comparison.

    Science.gov (United States)

    Helgeson, Vicki S.; Mickelson, Kristin D.

    1995-01-01

    A set of motive statements for social comparison was elicited from one group of subjects and then rated in terms of usefulness by a second group of subjects. Analysis of these statements revealed six motives in response to two different hypothetical scenarios: self-evaluation, common bond, self-improvement, self-enhancement, altruism, and…

  3. Motivating University Researchers

    NARCIS (Netherlands)

    Hendriks, P.H.J.; Alves de Sousa, C.A.

    2008-01-01

    This paper presents an empirical investigation into how universities approach the need and means for motivating university researchers through their management practices. The role of work motivation for this group deserves attention because pressures from outside and within the universities are said

  4. Motivating Tomorrow's Biologists

    Science.gov (United States)

    Musante, Susan

    2012-01-01

    The story of biology is far more complex and fascinating than straightforward facts or neatly labeled diagrams of structures and systems. Although exams can motivate students, the key to using these extrinsic motivators to increase student understanding lies in the way the assessments are designed and what they measure. Those involved in…

  5. What is this Motivation?

    Science.gov (United States)

    Waters, T. R.

    1971-01-01

    Maslow's Hierarchial Theory, Mcgregor's X & Y Theory, and Hertsberg's Hygiene Theory all based on motivation, are examined as to their effectiveness to increase worker production. The author feels management should not concentrate on motivation and offers his own theory, Spiral Web Theory, to help increase employee productiveness. (RB)

  6. Emotion, Motivation, and Learning.

    Science.gov (United States)

    Boekaerts, Monique, Ed.

    1988-01-01

    Nine papers on the interrelationship between emotion, motivation, and learning are presented. Articles focusing on motivation were presented at the Second Conference of the European Association of Learning and Instruction in Tubingin, West Germany. Three other papers focus on anxiety, optimism-pessimism, stress, coping, and social support. (TJH)

  7. Motivation techniques for supervision

    Science.gov (United States)

    Gray, N. D.

    1974-01-01

    Guide has been published which deals with various aspects of employee motivation. Training methods are designed to improve communication between supervisors and subordinates, to create feeling of achievement and recognition for every employee, and to retain personnel confidence in spite of some negative motivators. End result of training is reduction or prevention of errors.

  8. From motivation to acceptability

    DEFF Research Database (Denmark)

    Nordfalk, Francisca; Olejaz, Maria; Jensen, Anja M. B.

    2016-01-01

    Background: Over the past three decades, public attitudes to organ donation have been a subject of numerous studies focusing on donor motivation. Here, we present a fresh approach. We suggest focusing on public acceptability instead of motivation. The point is to understand public attitudes well...

  9. Motivation in medical students

    NARCIS (Netherlands)

    Kusurkar, R.A.

    2012-01-01

    Introduction The importance of motivation in learning behaviour and education is well-researched and proven in general education, but much less in medical education. There is sometimes focus on increasing the quantity of motivation, but the how and why need more evidence. The aims of this thesis

  10. Mange unge mangler motivation

    DEFF Research Database (Denmark)

    Hutters, Camilla; Katznelson, Noemi

    2012-01-01

    Motivation er altafgørende for unges uddannelseschancer. Nyt forskningsprojekt skal gøre os klogere på, hvad der fremmer unges lyst til læring.......Motivation er altafgørende for unges uddannelseschancer. Nyt forskningsprojekt skal gøre os klogere på, hvad der fremmer unges lyst til læring....

  11. Motives for SMS Use

    NARCIS (Netherlands)

    Peters, O.; Almekinders, Johan; van Buren, Ruud; Snippers, Roy; Wessels, Jacqueline

    This study was designed to identify, from a uses-and-gratifications point of view, the motives that young people in the age of 12 to 25 have for using SMS. The study also aimed to assess whether these SMS motives are related to age, gender, current education, mobile phone experience, SMS experience

  12. Measuring Adolescent Science Motivation

    Science.gov (United States)

    Schumm, Maximiliane F.; Bogner, Franz X.

    2016-01-01

    To monitor science motivation, 232 tenth graders of the college preparatory level ("Gymnasium") completed the Science Motivation Questionnaire II (SMQ-II). Additionally, personality data were collected using a 10-item version of the Big Five Inventory. A subsequent exploratory factor analysis based on the eigenvalue-greater-than-one…

  13. Students' Motivation in Class.

    Science.gov (United States)

    Cretu, Daniela

    2003-01-01

    Presents an approach that teachers can use to promote and investigate students' motivation to learn in the classroom. Notes that the strategies used are from Reading and Writing for Critical Thinking courses. Explains the following motivational devices: dual-entry diary; clusters; know/want to know/learned; think/pair/share; discussion web;…

  14. Periods and Nori motives

    CERN Document Server

    Huber, Annette

    2017-01-01

    This book casts the theory of periods of algebraic varieties in the natural setting of Madhav Nori’s abelian category of mixed motives. It develops Nori’s approach to mixed motives from scratch, thereby filling an important gap in the literature, and then explains the connection of mixed motives to periods, including a detailed account of the theory of period numbers in the sense of Kontsevich-Zagier and their structural properties. Period numbers are central to number theory and algebraic geometry, and also play an important role in other fields such as mathematical physics. There are long-standing conjectures about their transcendence properties, best understood in the language of cohomology of algebraic varieties or, more generally, motives. Readers of this book will discover that Nori’s unconditional construction of an abelian category of motives (over fields embeddable into the complex numbers) is particularly well suited for this purpose. Notably, Kontsevich's formal period algebra represents a to...

  15. Motivational Goal Bracketing

    DEFF Research Database (Denmark)

    Nafziger, Julia; Koch, Alexander

    It is a puzzle why people often evaluate consequences of choices separately (narrow bracketing) rather than jointly (broad bracketing). We study the hypothesis that a present-biased individual, who faces two tasks, may bracket his goals narrowly for motivational reasons. Goals motivate because th...... of the tasks. Narrow goals have a stronger motivational force and thus can be optimal. In particular, if one task outcome becomes known before working on the second task, narrow bracketing is always optimal.......It is a puzzle why people often evaluate consequences of choices separately (narrow bracketing) rather than jointly (broad bracketing). We study the hypothesis that a present-biased individual, who faces two tasks, may bracket his goals narrowly for motivational reasons. Goals motivate because...

  16. A program to operate the TSI electrical aerosol analyser using an IBM-PC microcomputer - technical background

    International Nuclear Information System (INIS)

    Horton, K.D.; Mitchell, J.P.; Snelling, K.W.

    1988-02-01

    A program has been written to enable the TSI Electrical Aerosol Analyser (EAA model 3030) to be operated using an IBM-PC microcomputer. Although much of the program is based on the software supplied by TSI Inc to collect and process data from the EAA, it incorporates numerous improvements including the option to operate the EAA automatically via a TSI Differential Mobility Particle Sizer interface. When compiled, the program enables the data reduction which takes into account the significant cross-channel sensitivity of the EAA, to be performed in about 30 seconds making it possible to use the EAA to monitor rapid changes in the behaviour of sub-micron aerosol particles. (author)

  17. First experimental results from IBM/TENN/TULANE/LLNL/LBL undulator beamline at the advanced light source

    International Nuclear Information System (INIS)

    Jia, J.J.; Callcott, T.A.; Yurkas, J.; Ellis, A.W.; Himpsel, F.J.; Samant, M.G.; Stoehr, J.; Ederer, D.L.; Carlisle, J.A.; Hudson, E.A.; Terminello, L.J.; Shuh, D.K.; Perera, R.C.C.

    1995-01-01

    The IBM/TENN/TULANE/LLNL/LBL Beamline 8.0 at the advanced light source combining a 5.0 cm, 89 period undulator with a high-throughput, high-resolution spherical grating monochromator, provides a powerful excitation source over a spectral range of 70--1200 eV for surface physics and material science research. The beamline progress and the first experimental results obtained with a fluorescence end station on graphite and titanium oxides are presented here. The dispersive features in K emission spectra of graphite excited near threshold, and found a clear relationship between them and graphite band structure are observed. The monochromator is operated at a resolving power of roughly 2000, while the spectrometer has a resolving power of 400 for these fluorescence experiments

  18. Case Study: IBM Watson Analytics Cloud Platform as Analytics-as-a-Service System for Heart Failure Early Detection

    Directory of Open Access Journals (Sweden)

    Gabriele Guidi

    2016-07-01

    Full Text Available In the recent years the progress in technology and the increasing availability of fast connections have produced a migration of functionalities in Information Technologies services, from static servers to distributed technologies. This article describes the main tools available on the market to perform Analytics as a Service (AaaS using a cloud platform. It is also described a use case of IBM Watson Analytics, a cloud system for data analytics, applied to the following research scope: detecting the presence or absence of Heart Failure disease using nothing more than the electrocardiographic signal, in particular through the analysis of Heart Rate Variability. The obtained results are comparable with those coming from the literature, in terms of accuracy and predictive power. Advantages and drawbacks of cloud versus static approaches are discussed in the last sections.

  19. Simulation of the Mitra 15 micro-machine on IBM 360/91. Microprogramming of the fast Fourier transform

    International Nuclear Information System (INIS)

    Augustides, Jean

    1973-01-01

    As computing time did not allow working in real time, and as different methods had been proposed to reduce the computing time (the Cooley-Tuckey method, the use of specific FFT processors), this thesis proposes an intermediate solution, between the entirely programmed solution and the entirely cabled solution. After some generalities on micro-programming (definition, history, benefits and drawbacks, perspectives), the author reports the micro-programming of the Mitra 15 micro-machine: description of the machine, memory, command memory and associated circuits, interruptions and suspensions, descriptions of micro-statements, execution of a micro-statement. Programs and subroutines developed for the modelling of Mitra 15 micro-machine on IBM 360/91 are presented. Then, the author reports the micro-programming of the fast Fourier transform: theory, program description, and test

  20. SPOOL-FIRE: an IBM 370/195 code for the analysis of combined spray and pool burning of sodium

    International Nuclear Information System (INIS)

    Charak, I.; Person, L.W.

    1976-01-01

    A code for the computation of the pressure and temperatures within a containment building as a result of a sodium fire is described. The fire is assumed to occur in two distinct phases: a spray and a pool. The spray fire is conservatively assumed to occur instantaneously. The pool fire model used is the SOFIRE-II model developed by Atomics International. The code calculates all important temperatures, accounting for heat loss from the building to the environment, as well as leakage of the containment atmosphere under conditions of internal overpressure. The IBM CSMP methodology is used to solve the set of ordinary differential equations which model the system. The use of CSMP allows the user considerable flexibility in modifying the models employed

  1. Automated IBM PC/XT/AT based measurement and control system for the DRON-3M X-ray diffractometer

    International Nuclear Information System (INIS)

    Tulaev, A.B.

    1989-01-01

    An automated IBM PC/XT/AT based measurement and control system for the DRON-3M X-ray diffractometer is decribed. The system permits carrying out of real time diffractometer control automatic X-spectra measurement and data acquisition, as well as experimental information computing and representation. The electronic of the system consists of a CAMAC crate with analog and power modules, and a control and measurement organization module, performed as a single bord in the standard of PC electronics. The system provides X-spectra acquisition with volume up to 4K in the angle range from 100 to 160 degrees with a resolution of 0.01 degree, a dead time less than 1mks and an exposition time from tenths of a second to dozens of minutes. 3 refs.; 5 figs

  2. Measurement stand for diagnosis of semiconductor detectors based on IBM PC/XT computer (4-way spectrometric analysis of pulses)

    International Nuclear Information System (INIS)

    Gruszecki, M.

    1990-01-01

    The technical assumptions and partial realization of our technological stand for quality inspection of semiconductor detectors for ionizing radiation manufactured in the INP in Cracow are described. To increase the efficiency of the measurements simultaneous checking of 4 semiconductor chips or finished products is suggested. In order to justify this measurement technique a review of possible variants of the measurement apparatus is presented for the systems consisting of home made units. Comparative parameters for the component modules and for complete measuring systems are given. The construction and operation of data acquisition system based on IBM PC/XT are described. The system ensures simultaneous registration of pulses obtained from 4 detectors with maximal rate of up to 500 x 10 3 pulses/s. 42 refs., 6 figs., 3 tabs. (author)

  3. A Monte Carlo program for calculating high energy spectra in cylindrical geometry on the IBM 709 computer

    Energy Technology Data Exchange (ETDEWEB)

    Francescon, S [Computer Branch, Technical Assessments and Services Division, Atomic Energy Establishment, Winfrith, Dorchester, Dorset (United Kingdom)

    1960-10-15

    The report describes an I.B.M. 709 program written at the request of the Reactor Division, Harwell, to obtain high energy spectra in a system containing a number of fissile and non-fissile materials, arranged as concentric cylinders of infinite length surrounded by an outer material with a square or rectangular boundary. At the cell boundary neutrons can be lost by leakage or reflected back into the system. A specified number of fission neutrons born in the fissile materials, together with any descendants they may have, are tracked one by one through the system until they are absorbed, lost by leakage through the lattice boundary, or their energies have fallen below a specifiable cut-off energy. The neutrons may be started from anywhere in the system and all neutron-nucleus reactions that occur in the nuclides supplied with the program are allowed. A descriptions is given of the use of the program, the current version of which is available as a self-loading binary tape which contains, in addition to the program, all the nuclear data at present available. Binary card decks are also available and nuclear data for other nuclides can be added. A feature of the program is the flexibility with which the core storage available for input and output data can be allocated according to the requirements of the problem. The output of the program is in the form of a Binary Coded Decimal tape (B.C.D.) which can be used on the normal I.B.M. off-line equipment to print out the results. An example is given of the results obtained for use in radiation damage calculations of the spatial distribution of neutrons in a simple uranium-D{sub 2}O system.

  4. Motivation and learning physics

    Science.gov (United States)

    Fischer, Hans Ernst; Horstendahl, Michaela

    1997-09-01

    Being involved in science education we cannot avoid confronting the problem of students' waning interest in physics. Therefore, we want to focus on arguments developed by new theoretical work in the field of motivation. Especially, we are attracted by the theory of motivation featured by Deci and Ryan, because it is related to an assumptions of human development similar to our own approach. Beneath elements of cognitive development, motivation is seen as a basic concept to describe students' learning in a physics classroom. German students at lower and upper secondary level regard physics as very difficult to learn, very abstract and dominated by male students. As a result physics at school continuously loses importance and acceptance although a lot of work has been done to modernise and develop the related physics courses. We assume that knowing about the influence of motivation on learning physics may lead to new insights in the design of classroom settings. Referring to Deci and Ryan, we use a model of motivation to describe the influence of two different teaching strategies (teacher and discourse oriented) on learning. Electrostatics was taught in year 8. The outcomes of a questionnaire which is able to evaluate defined, motivational states are compared with the interpretation of the same student's interaction in the related situation of the physics classroom. The scales of the questionnaire and the categories of analysis of the video-recording are derived from the same model of motivation.

  5. Motivation and will

    Directory of Open Access Journals (Sweden)

    Stella Maris Vásquez

    2009-12-01

    Full Text Available The paper analyzes the relationship between motivation and volitional processes as described by current motivation theories. The root of the separation between both moments of behavioris traced back to Tetens and Kant’s threefold view of the mind. Sensory perception is reduced to feeling and the will to energy without a proper object. The history of this conception isoutlined. Nuttin’s motivation theory is presented as an alternative to the limitations of other contemporary theories. Some educational consequences are sketched out.

  6. Simulating motivated cognition

    Science.gov (United States)

    Gevarter, William B.

    1991-01-01

    A research effort to develop a sophisticated computer model of human behavior is described. A computer framework of motivated cognition was developed. Motivated cognition focuses on the motivations or affects that provide the context and drive in human cognition and decision making. A conceptual architecture of the human decision-making approach from the perspective of information processing in the human brain is developed in diagrammatic form. A preliminary version of such a diagram is presented. This architecture is then used as a vehicle for successfully constructing a computer program simulation Dweck and Leggett's findings that relate how an individual's implicit theories orient them toward particular goals, with resultant cognitions, affects, and behavior.

  7. Delegation and Motivation

    DEFF Research Database (Denmark)

    Borowiecki, Karol Jan; Angst, Lukas

    2014-01-01

    In this article we study the determinants of decision rights transfer and its effects on the motivation of an agent. The study is based on a laboratory experiment conducted on 130 subjects playing an innovative principal-agent game. Interestingly, the results show that agents do not favour...... a delegation and a decision is considered rather burdensome. Although the experiment could not give support for the behavioural hypothesis of higher effort provided by participants who receive choice subsequently, the survey illuminates the interaction between delegation motives, effort motivators, goals...

  8. Studies at IBM on anisotropy in single crystals of the high-temperature oxide superconductor Y1Ba2Cu3O7/sub -//sub x/ (invited)

    International Nuclear Information System (INIS)

    Gallagher, W.J.

    1988-01-01

    A series of studies carried out at IBM on the magnetic, transport, and optical properties of single crystal Y 1 Ba 2 Cu 3 O/sub 7-//sub x/ demonstrate the overriding importance of anisotropy in its superconducting and normal-state properties

  9. Bill Lang's contributions to acoustics at International Business Machines Corporation (IBM), signal processing, international standards, and professionalism in noise control engineering

    Science.gov (United States)

    Maling, George C.

    2005-09-01

    Bill Lang joined IBM in the late 1950s with a mandate from Thomas Watson Jr. himself to establish an acoustics program at IBM. Bill created the facilities in Poughkeepsie, developed the local program, and was the leader in having other IBM locations with development and manufacturing responsibilities construct facilities and hire staff under the Interdivisional Liaison Program. He also directed IBMs acoustics technology program. In the mid-1960s, he led an IEEE standards group in Audio and Electroacoustics, and, with the help of James Cooley, Peter Welch, and others, introduced the fast Fourier transform to the acoustics community. He was the convenor of ISO TC 43 SC1 WG6 that began writing the 3740 series of standards in the 1970s. It was his suggestion to promote professionalism in noise control engineering, and, through meetings with Leo Beranek and others, led the founding of INCE/USA in 1971. He was also a leader of the team that founded International INCE in 1974, and he served as president from 1988 until 1999.

  10. Pengembangan Sistem Informasi Geografis Berbasis Node.JS untuk Pemetaan Mesin dan Tracking Engineer dengan Pemanfaatan Geolocation pada PT IBM Indonesia

    Directory of Open Access Journals (Sweden)

    RACHMAT FAJRIN

    2017-09-01

    Full Text Available PT IBM memiliki banyak klien di Indonesia, ini membuat persebaran produk (dalam hal ini mesin atm yang semakin meluas di wilayah Indonesia. Hal ini memicu PT IBM untuk menempatkan engineer dibanyak wilayah untuk memenuhi kebutuhan services dan maintenance. Untuk itu dalam penelitian ini dikembangkan sebuah sistem informasi geografis untuk pemetaan mesin dan tracking engineer dengan pemanfaatan geolocation yang bertujuan untuk menampilkan peta digital beserta lokasi mesin dan engineer di seluruh Indonesia, yang akan memudahkan PT IBM dalam pemberian tugas kepada engineer untuk services dan maintenance ke lokasi mesin terdekat. Sistem ini dibangun menggunakan beberapa software open source yaitu, Node.JS dan Express.JS yang merupakan server-side javascript web platform, Handlebars untuk template engine, MySQL sebagai database storage, Postman yang berfungsi sebagai API (Application Program Interface testing, Google Maps API untuk implementasi peta digital dan juga Firebase Cloud Messaging (FCM untuk platform mengirim notifikasi dari web ke device engineer.Pengembangan Sistem Informasi Geografis Berbasis Node.JS untuk Pemetaan Mesin dan Tracking Engineer dengan Pemanfaatan Geolocation pada PT IBM Indonesia

  11. Motivating crowding theory - opening the black box of intrinsic motivation

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher

    2010-01-01

    Public employees work for many other reasons than because they are paid for it. In other words, intrinsic motivation is an important determinant for their performance. Nonetheless, public sector organizations increasingly rely on extrinsic motivation factors such as monetary incentives to motivate...... employees. Motivation crowding theory claims that this may be at the expense of intrinsic motivation, if the extrinsic motivation factor is perceived to be controlling. On the other hand, intrinsic motivation will be enhanced (crowded in), if the extrinsic motivation factor is perceived to be supportive......, monetary incentives are found to cause different crowding effects for these different types of intrinsic motivation. The results call for more theoretical work on the drivers of motivation crowding effects and for practitioners to pay more attention to what type of intrinsic motivation is at stake, when...

  12. Present status and future directions of the Mayo/IBM PACS project

    Science.gov (United States)

    Morin, Richard L.; Forbes, Glenn S.; Gehring, Dale G.; Salutz, James R.; Pavlicek, William

    1991-07-01

    This joint project began in 1988 and was motivated by the need to develop an alternative to the archival process in place at that time (magnetic tape) for magnetic resonance imaging and neurological computed tomography. In addition, this project was felt to be an important step in gaining the necessary clinical experience for the future implementation of various aspects of electronic imaging. The initial phase of the project was conceived and developed to prove the concept, test the fundamental components, and produce performance measurements for future work. The key functions of this phase centered on attachment of imaging equipment (GE Signa) and archival processes using a non-dedicated (institutionally supplied) local area network (LAN). Attachment of imaging equipment to the LAN was performed using commercially available devices (Ethernet, PS/2, Token Ring). Image data were converted to ACR/NEMA format with retention of the vendor specific header information. Performance measurements were encouraging and led to the design of following projects. The second phase has recently been concluded. The major features of this phase have been to greatly expand the network, put the network into clinical use, establish an efficient and useful viewing station, include diagnostic reports in the archive data, provide wide area network (WAN) capability via ISDN, and establish two-way real-time video between remote sites. This phase has heightened both departmental and institutional thought regarding various issues raised by electronic imaging. Much discussion regarding both present as well as future archival processes has occurred. The use of institutional LAN resources has proven to be adequate for the archival function examined thus far. Experiments to date have shown that use of dedicated resources will be necessary for retrieval activities at even a basic level. This report presents an overview of the background present status and future directions of the project.

  13. Children's theories of motivation.

    Science.gov (United States)

    Gurland, Suzanne T; Glowacky, Victoria C

    2011-09-01

    To investigate children's theories of motivation, we asked 166 children (8-12 years of age) to rate the effect of various motivational strategies on task interest, over the short and long terms, in activities described as appealing or unappealing. Children viewed the rewards strategy as resulting in greatest interest except when implemented over the long term for appealing activities. Individual difference analyses revealed that some children held operant theories of motivation, in which rewards were central, and others held hybrid theories, in which rewards were key, but some allowance was made for interest to be self-sustaining in the absence of inducements. Children's theories predicted their academic self-regulation. Their theories are discussed relative to an expert theory of motivation. Copyright © 2011 Elsevier Inc. All rights reserved.

  14. Emotion, Motivation und Volition

    OpenAIRE

    Ulich, Dieter

    1996-01-01

    Emotion, Motivation und Volition / D. Ulich ; V. Brandstätter ; P. M. Gollwitzer. - In: Psychologie / hrsg. von Dietrich Dörner ... - 2., überarb. und erw. Aufl. - Stuttgart u.a. : Kohlhammer, 1996. - S. 115-135

  15. Measuring adolescent science motivation

    Science.gov (United States)

    Schumm, Maximiliane F.; Bogner, Franz X.

    2016-02-01

    To monitor science motivation, 232 tenth graders of the college preparatory level ('Gymnasium') completed the Science Motivation Questionnaire II (SMQ-II). Additionally, personality data were collected using a 10-item version of the Big Five Inventory. A subsequent exploratory factor analysis based on the eigenvalue-greater-than-one criterion, extracted a loading pattern, which in principle, followed the SMQ-II frame. Two items were dropped due to inappropriate loadings. The remaining SMQ-II seems to provide a consistent scale matching the findings in literature. Nevertheless, also possible shortcomings of the scale are discussed. Data showed a higher perceived self-determination in girls which seems compensated by their lower self-efficacy beliefs leading to equality of females and males in overall science motivation scores. Additionally, the Big Five personality traits and science motivation components show little relationship.

  16. INTEREST AND READING MOTIVATION

    Directory of Open Access Journals (Sweden)

    Alhamdu Alhamdu

    2016-05-01

    Full Text Available The purpose of this study is to examine the relationship between interest and reading motivation based on literature review. The concept of the interest portrayed as a psychological state that occurs during interaction between individual and specific topic, object or activity including process of willingness, increased attention, concentration and positive feeling to the topic, object or activity. Meanwhile reading motivation emphasized to mental readiness, willingness and refers to beliefs and perception of individual to engage in reading activity. Some researchers were identified factors that influenced reading motivation such as intrinsic and extrinsic factors, self-concept and value of reading, and interest. In general, the literature review described that have positive relationship between interest and reading motivation.

  17. Management styles and motivation.

    Science.gov (United States)

    Shearer, Dana Ann

    2012-01-01

    According to a review of the current literature, common managerial styles are transformational, transactional, and laissez-faire. When managers expand their leadership skills to improve the staff's morale, they must use a combination of transformational leadership behaviors and transactional contingent rewards to maximize their effectiveness on employees. A motivation theory such as Herzberg and Maslow enhances employees' motivation, morale, and satisfaction. Being able to motivate, empower, and influence staff improves satisfaction and retention levels among the team. A manager's leadership style influences motivation, morale, and retention in staff. Leaders are influenced by their educational development and the organizational culture. Organizational culture has an impact on a manager's style, which is forwarded to their followers.

  18. Motivation in Distance Leaming

    Directory of Open Access Journals (Sweden)

    Daniela Brečko

    1996-12-01

    Full Text Available It is estimated that motivation is one of the most important psychological functions making it possible for people to leam even in conditions that do not meet their needs. In distance learning, a form of autonomous learning, motivation is of outmost importance. When adopting this method in learning an individual has to stimulate himself and take learning decisions on his or her own. These specific characteristics of distance learning should be taken into account. This all different factors maintaining the motivation of partici­pants in distance learning are to be included. Moreover, motivation in distance learning can be stimulated with specific learning materials, clear instructions and guide-lines, an efficient feed back, personal contact between tutors and parti­cipants, stimulating learning letters, telephone calls, encouraging letters and through maintaining a positive relationship between tutor and participant.

  19. Automated Motivic Analysis

    DEFF Research Database (Denmark)

    Lartillot, Olivier

    2016-01-01

    Motivic analysis provides very detailed understanding of musical composi- tions, but is also particularly difficult to formalize and systematize. A computational automation of the discovery of motivic patterns cannot be reduced to a mere extraction of all possible sequences of descriptions...... for lossless compression. The structural complexity resulting from successive repetitions of patterns can be controlled through a simple modelling of cycles. Generally, motivic patterns cannot always be defined solely as sequences of descriptions in a fixed set of dimensions: throughout the descriptions...... of the successive notes and intervals, various sets of musical parameters may be invoked. In this chapter, a method is presented that allows for these heterogeneous patterns to be discovered. Motivic repetition with local ornamentation is detected by reconstructing, on top of “surface-level” monodic voices, longer...

  20. Motivation and reward systems

    NARCIS (Netherlands)

    van Eerde, W.; Vodosek, M.; den Hartog, D.N.; McNett, J.M.

    2014-01-01

    Reward systems are identified as one of the human resource management (HRM) practices that may impact motivation. Reward systems may consist of several components, including financial and nonfinancial rewards, in fixed and variable amounts. Reinforcement, expectancy, and equity principles are

  1. Motivation and Adult Education.

    Science.gov (United States)

    Taylor, J. Rodney

    1982-01-01

    The author reviews theories of human motivation: Lewin's force field analysis, Skinner's operant reinforcement theory, and Maslow's hierarchy of needs. He then extracts the implications of these theories for adult learning. SK)

  2. Motivation and library management

    Directory of Open Access Journals (Sweden)

    Tatjana Likar

    2000-01-01

    Full Text Available The present article deals with motivation, its relation to management and its role and use in librarianship in our country and abroad. The countries where librarianship is well developed started to deal with library management and questions of motivation of library workers decades ago, whereas elsewhere the subject is at its start. The prerequisite for modern policy making is attention to the elements of modern library management. Librarians, library managers and directors of libraries should create a work environment providing long term satisfaction with work by means of certain knowledge and tools. The level of motivation of the staff is influenced by the so called higher factors deriving from the work process itself and related to work contents: achieve¬ment, recognition, trust and work itself. Extrinsic factors (income, interpersonal relations, technology of administration, company policy, working conditions, work con¬trol, personal security, job security and position... should exercise lesser impact on the level of motivation.

  3. IBM Demonstrates a General-Purpose, High-Performance, High-Availability Cloud-Hosted Data Distribution System With Live GOES-16 Weather Satellite Data

    Science.gov (United States)

    Snyder, P. L.; Brown, V. W.

    2017-12-01

    IBM has created a general purpose, data-agnostic solution that provides high performance, low data latency, high availability, scalability, and persistent access to the captured data, regardless of source or type. This capability is hosted on commercially available cloud environments and uses much faster, more efficient, reliable, and secure data transfer protocols than the more typically used FTP. The design incorporates completely redundant data paths at every level, including at the cloud data center level, in order to provide the highest assurance of data availability to the data consumers. IBM has been successful in building and testing a Proof of Concept instance on our IBM Cloud platform to receive and disseminate actual GOES-16 data as it is being downlinked. This solution leverages the inherent benefits of a cloud infrastructure configured and tuned for continuous, stable, high-speed data dissemination to data consumers worldwide at the downlink rate. It also is designed to ingest data from multiple simultaneous sources and disseminate data to multiple consumers. Nearly linear scalability is achieved by adding servers and storage.The IBM Proof of Concept system has been tested with our partners to achieve in excess of 5 Gigabits/second over public internet infrastructure. In tests with live GOES-16 data, the system routinely achieved 2.5 Gigabits/second pass-through to The Weather Company from the University of Wisconsin-Madison SSEC. Simulated data was also transferred from the Cooperative Institute for Climate and Satellites — North Carolina to The Weather Company, as well. The storage node allocated to our Proof of Concept system as tested was sized at 480 Terabytes of RAID protected disk as a worst case sizing to accommodate the data from four GOES-16 class satellites for 30 days in a circular buffer. This shows that an abundance of performance and capacity headroom exists in the IBM design that can be applied to additional missions.

  4. Learning Motivation and Achievements

    Institute of Scientific and Technical Information of China (English)

    冯泽野

    2016-01-01

    It is known to all that motivation is one of the most important elements in EFL learning.This study analyzes the type of English learning motivations and learning achievements within non-English majors’ students (Bilingual program in Highway School and Architecture) in Chang’an University, who has been considered English as the foreign language. This thesis intends to put forward certain strategies in promoting foreign language teaching.

  5. Environmental Morale and Motivation

    OpenAIRE

    Frey, Bruno S; Stutzer, Alois

    2006-01-01

    This chapter discusses the role of environmental morale and environmental motivation in individual behavior from the point of view of economics and psychology. It deals with the fundamental public good problem, and presents empirical (laboratory and field) evidence on how the cooperation problem can be overcome. Four different theoretical approaches are distinguished according to how individuals� underlying environmental motivation is modeled. Specifically, we look at the interaction betwee...

  6. Feedback og motivation

    DEFF Research Database (Denmark)

    Bjerresgaard, Helle

    2016-01-01

    sættes læring i forbindelse med begrebet motivation. I blandt andet Banduras teori, understreges vigtigheden af en tæt forbindelse mellem elevens mestring og lærerens passende målsætning. Med afsæt i (fx) Vygotsky’s ’Zonen for nærmeste udvikling’ belyser artiklen hvordan elevernes motivation kan blive...

  7. The Effect of Motivational Practices on Volunteer Motivation to ...

    African Journals Online (AJOL)

    The study assesses whether organizations' motivational practices affect volunteer motivation and levels of performance. This study was guided by the following two research questions: first, what motivation practices exist in Volunteer Involving Organizations and whether such affect volunteers' motivation to volunteer again?

  8. Measuring motivation in schizophrenia: Is a general state of motivation necessary for task-specific motivation?

    Science.gov (United States)

    Choi, Jimmy; Choi, Kee-Hong; Reddy, Felice; Fiszdon, Joanna M.

    2014-01-01

    Despite the important role of motivation in rehabilitation and functional outcomes in schizophrenia, to date, there has been little emphasis on how motivation is assessed. This is important, since different measures may tap potentially discrete motivational constructs, which in turn may have very different associations to important outcomes. In the current study, we used baseline data from 71 schizophrenia spectrum outpatients enrolled in a rehabilitation program to examine the relationship between task-specific motivation, as measured by the Intrinsic Motivation Inventory (IMI), and a more general state of volition/initiation, as measured by the three item Quality of Life (QLS) motivation index. We also examined the relationship of these motivation measures to demographic, clinical and functional variables relevant to rehabilitation outcomes. The two motivation measures were not correlated, and participants with low general state motivation exhibited a full range of task-specific motivation. Only the QLS motivation index correlated with variables relevant to rehabilitation outcomes. The lack of associations between QLS motivation index and IMI subscales suggests that constructs tapped by these measures may be divergent in schizophrenia, and specifically that task-specific intrinsic motivation is not contingent on a general state of motivation. That is, even in individuals with a general low motivational state (i.e. amotivation), interventions aimed at increasing task-specific motivation may still be effective. Moreover, the pattern of interrelationships between the QLS motivation index and variables relevant to psychosocial rehabilitation supports its use in treatment outcome studies. PMID:24529609

  9. (Re)Defining Salesperson Motivation

    DEFF Research Database (Denmark)

    Khusainova, Rushana; de Jong, Ad; Lee, Nick

    2018-01-01

    The construct of motivation is one of the central themes in selling and sales management research. Yet, to-date no review article exists that surveys the construct (both from an extrinsic and intrinsic motivation context), critically evaluates its current status, examines various key challenges...... apparent from the extant research, and suggests new research opportunities based on a thorough review of past work. The authors explore how motivation is defined, major theories underpinning motivation, how motivation has historically been measured, and key methodologies used over time. In addition......, attention is given to principal drivers and outcomes of salesperson motivation. A summarizing appendix of key articles in salesperson motivation is provided....

  10. Employees' motivation and emloyees' benefits

    OpenAIRE

    Nedzelská, Eva

    2014-01-01

    The subject of this bachelor thesis is analysing methods how to stimulate and motivate employees. The theoretical part of the thesis deals with the concept of motivation, concepts close to motivation and selected existing theories of motivation. It also deals with employee benefits, function, division and benefits which are frequently offered to employees. The practical part of the thesis, mainly based on written and online questionnaires, concentrates on motivation of employees at Nedcon Boh...

  11. Neuroscientific Model of Motivational Process

    OpenAIRE

    Kim, Sung-il

    2013-01-01

    Considering the neuroscientific findings on reward, learning, value, decision-making, and cognitive control, motivation can be parsed into three sub processes, a process of generating motivation, a process of maintaining motivation, and a process of regulating motivation. I propose a tentative neuroscientific model of motivational processes which consists of three distinct but continuous sub processes, namely reward-driven approach, value-based decision-making, and goal-directed control. Rewa...

  12. Motivation: Kept Alive Through Unschooling

    Directory of Open Access Journals (Sweden)

    Magda LEVIN-GUTIERREZ

    2015-07-01

    Full Text Available Motivation is a process, which can be fostered or killed in the name of education. In this paper, the author explores two theories of motivation-Expectancy-Value and Three Elements of Intrinsic Motivation-within the context of unschooling and within a school system. Based on the concepts presented through these theories, the author concludes that unschoolers hold on to their intrinsic motivation while schooled childrens motivation may be killed by attending school.

  13. Public Service Motivation and Monetary Incentives: Substitutes or Motivation Crowding?

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher

    2011-01-01

    Motivation is probably one of the most important determinants for organizational performance, because it stimulates effort and effective behaviors among people in the organization. But what type of motivation should public managers rely on? The PSM literature has argued that public service...... motivation is the most important type of motivation in the delivery of public service, because it substitutes for egoistic motivation. Organizations whose members have high levels of PSM are therefore expected to be less dependent on utilitarian motivators such as monetary incentives. Motivation crowding...... theory, on the other hand, argues that the relationship is opposite, so it is the degree of incentives that affects motivation. Both arguments lead to expectations of an association between public service motivation and monetary incentives, but so far this complex relationship has not been entangled...

  14. Optimizing The Performance of Streaming Numerical Kernels On The IBM Blue Gene/P PowerPC 450

    KAUST Repository

    Malas, Tareq

    2011-07-01

    Several emerging petascale architectures use energy-efficient processors with vectorized computational units and in-order thread processing. On these architectures the sustained performance of streaming numerical kernels, ubiquitous in the solution of partial differential equations, represents a formidable challenge despite the regularity of memory access. Sophisticated optimization techniques beyond the capabilities of modern compilers are required to fully utilize the Central Processing Unit (CPU). The aim of the work presented here is to improve the performance of streaming numerical kernels on high performance architectures by developing efficient algorithms to utilize the vectorized floating point units. The importance of the development time demands the creation of tools to enable simple yet direct development in assembly to utilize the power-efficient cores featuring in-order execution and multiple-issue units. We implement several stencil kernels for a variety of cached memory scenarios using our Python instruction simulation and generation tool. Our technique simplifies the development of efficient assembly code for the IBM Blue Gene/P supercomputer\\'s PowerPC 450. This enables us to perform high-level design, construction, verification, and simulation on a subset of the CPU\\'s instruction set. Our framework has the capability to implement streaming numerical kernels on current and future high performance architectures. Finally, we present several automatically generated implementations, including a 27-point stencil achieving a 1.7x speedup over the best previously published results.

  15. Motivation for risk sports

    OpenAIRE

    Hlava, Daniel

    2015-01-01

    Title: Motivation for risk sports Objectives: The aim of our thesis is to find out primary and secondary motives of athletes for the operation of high-risk sports and coming back to it. We also want to find out what is the starter for doing risk sports. Other questions are why athletes keep doing it and how perceive the potential risk. Methods: In our study, we chose qualitative investigation method and semistructured interview with eight respondents. For the interview, we drew up a list of q...

  16. Motive Criminal Procedure Evidence

    Directory of Open Access Journals (Sweden)

    В. В. Вапнярчук

    2015-03-01

    Full Text Available In the article the need for such a level of mental regulation of behavior of proving motivation. The latter refers to internal motivation conscious entity Criminal Procedure proof, due to specific needs, interests and goals that cause a person to act rishymist. Detailed attention is given to the first two determinants, namely the nature of needs and interests. In particular, analyzes highlighted in the literature variety of needs (physiological, ekzistentsionalni, social, prestige, cognitive, aesthetic and spiritual and the manifestation of some of them in the criminal procedural proof.

  17. Music and Combat Motivation

    Science.gov (United States)

    2015-04-01

    and hence, motivating them more strongly to continue. Thoughts of protecting their home, lives and local ideals were subconsciously aroused by the...perspective. There was a clear bias , but they aimed not to broadcast lies. The BBC broadcast in 45 languages with 107 news transmissions daily

  18. Motivational Orientations in Work

    Science.gov (United States)

    Murtonen, Mari; Olkinuora, Erkki; Palonen, Tuire; Hakkarainen, Kai; Lehtinen, Erno

    2008-01-01

    The rapid development in working life during recent decades has changed the structures of work organisations and expectations of employees' work. Differing forms of professional employment and different types of organisational environments likely promote different types of motivational patterns in workers. The aim of this study was to apply a…

  19. Assessment of Teacher Motivation

    Science.gov (United States)

    Gokce, Feyyat

    2010-01-01

    The aim of this study is to contribute to the achievement of educational goals by determining teachers' levels of motivation. With this aim in mind, the opinions of 386 teachers employed in primary schools in Tokat province were sought. According to the findings of the study, the teachers stated that their needs were not fulfilled according to…

  20. Hunters' motivations and values:

    DEFF Research Database (Denmark)

    Radder, Laetitia; Bech-Larsen, Tino

    2008-01-01

    This article examines the values and motivations of South African biltong hunters. A hierarchical value map of associations between attributes, consequences and values resulted from laddering interviews with 34 hunters. The Means-End Chain approach proved useful in identifying: (a) personal value...

  1. Moral motivation within groups

    NARCIS (Netherlands)

    Lee, Romy van der

    2013-01-01

    Morality is of particular importance to people: People want to be considered moral and want to belong to moral groups. Consequently, morality judgments have the potential to motivate individuals to behave in ways that are considered to be ‘good’. In the current dissertation, I examined the impact of

  2. Developing a Motivational Strategy.

    Science.gov (United States)

    Janson, Robert

    1979-01-01

    Describes the use of job enrichment techniques as tools for increased productivity and organizational change. The author's motivational work design model changes not only the job design but also structural elements such as physical layout, workflow, and organizational relationships. Behavior change is more important than job enrichment. (MF)

  3. Predicting Intrinsic Motivation

    Science.gov (United States)

    Martens, Rob; Kirschner, Paul A.

    2004-01-01

    Intrinsic motivation can be predicted from participants' perceptions of the social environment and the task environment (Ryan & Deci, 2000)in terms of control, relatedness and competence. To determine the degree of independence of these factors 251 students in higher vocational education (physiotherapy and hotel management) indicated the…

  4. Impulsive action and motivation

    NARCIS (Netherlands)

    Frijda, N.H.

    2010-01-01

    This paper explores the way in which emotions are causal determinants of action. It argues that emotional events, as appraised by the individual, elicit changes in motive states (called states of action readiness), which in turn may (or may not) cause action. Actions can be elicited automatically,

  5. Keeping Plateaued Performers Motivated.

    Science.gov (United States)

    DeLon, Barbara A.

    1993-01-01

    Discusses the problem of keeping library staff motivated when promotions are not available. Topics addressed include the importance of management training that emphasizes communication skills; alternative ways to help employees grow, including staff development programs, lateral transfers, job rotation, and short-term projects; and helpful…

  6. Gamification and Student Motivation

    Science.gov (United States)

    Buckley, Patrick; Doyle, Elaine

    2016-01-01

    The literature suggests that gamified learning interventions may increase student engagement and enhance learning. We empirically investigate this by exploring the impact of intrinsic and extrinsic motivation on the participation and performance of over 100 undergraduate students in an online gamified learning intervention. The paper makes a…

  7. Motivation og handlingskapacitet

    DEFF Research Database (Denmark)

    Andersen, Lotte Bøgh; Kristensen, Nicolai; Pedersen, Lene Holm

    2012-01-01

    Der har i flere år være en interesse for at undersøge motivationen hos producenterne af offentlige ydelser, mens der i mindre grad findes empiriske analyser af brugernes handlingskapacitet. Artiklen råder bod på dette ved at analysere forskelle i motivation og handlingskapacitet på fire serviceom......Der har i flere år være en interesse for at undersøge motivationen hos producenterne af offentlige ydelser, mens der i mindre grad findes empiriske analyser af brugernes handlingskapacitet. Artiklen råder bod på dette ved at analysere forskelle i motivation og handlingskapacitet på fire...... serviceområder (skoler, dagpasning, hospitaler og videregående uddannelser). Der anvendes henholdsvis et veletableret mål for public service motivation (n=377 producenter) og et nyudviklet mål for handlingskapacitet (n=1056 brugere). Resultaterne viser, at der er relativt højest handlingskapacitet og public...... service motivation på daginstitutionsområdet efterfulgt af skoleområdet, mens de videregående uddannelser placerer sig relativt lavest på begge variable. Hospitalsbrugerne har næsten lige så lav handlingskapacitet som brugerne af de videregående uddannelser, mens de hospitalsansattes public service...

  8. Entrepreneurship and Student Motivation

    Science.gov (United States)

    Vorholt, Julie; Harris, Erica

    2014-01-01

    This article describes a three-week project-based unit on entrepreneurship conducted with students in communications classes in an Academic English context. A detailed road map of the project is given, starting with an introduction and ending with final presentations and poster sessions. Students were motivated by their own interests in business…

  9. Maintenance Manual for AUDIT. A System for Analyzing SESCOMP Software. Volume 4: Appendix D. Listings of the AUDIT Software for the IBM 360.

    Science.gov (United States)

    1977-08-01

    The AUDIT documentation provides the maintenance programmer personnel with the information to effectively maintain and use the AUDIT software. The ...SESCOMPSPEC’s) and produces reports detailing the deviations from those standards. The AUDIT software also examines a program unit to detect and report...changes in word length on the output of computer programs. This report contains the listings of the AUDIT software for the IBM 360. (Author)

  10. Artificial intelligence in neurodegenerative disease research: use of IBM Watson to identify additional RNA-binding proteins altered in amyotrophic lateral sclerosis.

    Science.gov (United States)

    Bakkar, Nadine; Kovalik, Tina; Lorenzini, Ileana; Spangler, Scott; Lacoste, Alix; Sponaugle, Kyle; Ferrante, Philip; Argentinis, Elenee; Sattler, Rita; Bowser, Robert

    2018-02-01

    Amyotrophic lateral sclerosis (ALS) is a devastating neurodegenerative disease with no effective treatments. Numerous RNA-binding proteins (RBPs) have been shown to be altered in ALS, with mutations in 11 RBPs causing familial forms of the disease, and 6 more RBPs showing abnormal expression/distribution in ALS albeit without any known mutations. RBP dysregulation is widely accepted as a contributing factor in ALS pathobiology. There are at least 1542 RBPs in the human genome; therefore, other unidentified RBPs may also be linked to the pathogenesis of ALS. We used IBM Watson ® to sieve through all RBPs in the genome and identify new RBPs linked to ALS (ALS-RBPs). IBM Watson extracted features from published literature to create semantic similarities and identify new connections between entities of interest. IBM Watson analyzed all published abstracts of previously known ALS-RBPs, and applied that text-based knowledge to all RBPs in the genome, ranking them by semantic similarity to the known set. We then validated the Watson top-ten-ranked RBPs at the protein and RNA levels in tissues from ALS and non-neurological disease controls, as well as in patient-derived induced pluripotent stem cells. 5 RBPs previously unlinked to ALS, hnRNPU, Syncrip, RBMS3, Caprin-1 and NUPL2, showed significant alterations in ALS compared to controls. Overall, we successfully used IBM Watson to help identify additional RBPs altered in ALS, highlighting the use of artificial intelligence tools to accelerate scientific discovery in ALS and possibly other complex neurological disorders.

  11. Implementation of GENSEC section from HYDRA 3.40 system on IBM 370/135 (DOS/VS 34.0)

    International Nuclear Information System (INIS)

    Ponta, T.

    1984-07-01

    In High Energy Physics, processing and interpretation of experimental data, supplied by track-particle detectors, are made by means of HYDRA system. We present here the implementation on IBM 370/135 (DOS/VS 34.0) (belonqing to Central Institute of Physics) of General Section (GENSEC) from HYDRA system, paying a special attention to the description of the 176 routines of this section, in order to facilitate their use on the computer. (author)

  12. MOTIVATION AND MOTIVES - DRIVER AND REASON OF CONSUMER'S BUYING BEHAVIOR

    OpenAIRE

    TICHINDELEAN Mihai; VINEREAN Simona

    2013-01-01

    The purpose of the paper is to understand and measure consumer's motives as part of the complex mental structure which has as result a certain buying behavior. To achieve this goal, the authors structured the paper in two parts: the first part contains a literature review regarding the concepts of motivation and motives, while the second part tries to measure and explain several dimensions of buying motives by using a statistical analysis tool - exploratory factor analysis.

  13. Intrinsic motivation factors based on the self-determinant theory for regular breast cancer screening.

    Science.gov (United States)

    Jung, Su Mi; Jo, Heui-Sug

    2014-01-01

    The purpose of this study was to identify factors of intrinsic motivation that affect regular breast cancer screening and contribute to development of a program for strategies to improve effective breast cancer screening. Subjects were residing in South Korea Gangwon-Province and were female over 40 and under 69 years of age. For the investigation, the Intrinsic Motivation Inventory (IMI) was modified to the situation of cancer screening and was used to survey 905 inhabitants. Multinominal logistic regression analyses were conducted for regular breast cancer screening (RS), one-time breast cancer screening (OS) and non-breast cancer screening (NS). For statistical analysis, IBM SPSS 20.0 was utilized. The determinant factors between RS and NS were "perceived effort and choice" and "stress and strain" - internal motivations related to regular breast cancer screening. Also, determinant factors between RS and OS are "age" and "perceived effort and choice" for internal motivation related to cancer screening. To increase regular screening, strategies that address individual perceived effort and choice are recommended.

  14. Reading Motivation: 10 Elements for Success. Motivational Strategies That Work!

    Science.gov (United States)

    Gerbig, Kori M.

    2009-01-01

    Motivational processes are the foundation for coordinating cognitive goals and strategies in reading. Becoming an excellent, active reader involves attunement of motivational processes with cognitive and language processes in reading. This article presents K-12 strategies for motivating reading success. It describes 10 instructional elements that…

  15. Motivation and Ways to Motivate Students of Middle School

    Institute of Scientific and Technical Information of China (English)

    朱洪琼

    2012-01-01

    Motivation is critical in English learning of middle school,thus,how to effectively motivate students in English learning is an important problem.This study intends to find ways to motivate students of middle school.Self-report data were collected from 45 students in The Experiment Middle School Attached to Yunnan Normal University by using a close-ended questionnaire.

  16. Using Managerial Role Motivation Training to Overcome Motivational Deficiencies.

    Science.gov (United States)

    Miner, John B.

    Research on motivation to manage can be summarized in five points: (1) motivation to manage is a major factor for success; (2) motivation to manage declined in students from the 1960's to the 1970's; (3) this decline is evident in the relevant age groups; (4) differences between United States students and foreign students place the United States…

  17. Scalability of Parallel Spatial Direct Numerical Simulations on Intel Hypercube and IBM SP1 and SP2

    Science.gov (United States)

    Joslin, Ronald D.; Hanebutte, Ulf R.; Zubair, Mohammad

    1995-01-01

    The implementation and performance of a parallel spatial direct numerical simulation (PSDNS) approach on the Intel iPSC/860 hypercube and IBM SP1 and SP2 parallel computers is documented. Spatially evolving disturbances associated with the laminar-to-turbulent transition in boundary-layer flows are computed with the PSDNS code. The feasibility of using the PSDNS to perform transition studies on these computers is examined. The results indicate that PSDNS approach can effectively be parallelized on a distributed-memory parallel machine by remapping the distributed data structure during the course of the calculation. Scalability information is provided to estimate computational costs to match the actual costs relative to changes in the number of grid points. By increasing the number of processors, slower than linear speedups are achieved with optimized (machine-dependent library) routines. This slower than linear speedup results because the computational cost is dominated by FFT routine, which yields less than ideal speedups. By using appropriate compile options and optimized library routines on the SP1, the serial code achieves 52-56 M ops on a single node of the SP1 (45 percent of theoretical peak performance). The actual performance of the PSDNS code on the SP1 is evaluated with a "real world" simulation that consists of 1.7 million grid points. One time step of this simulation is calculated on eight nodes of the SP1 in the same time as required by a Cray Y/MP supercomputer. For the same simulation, 32-nodes of the SP1 and SP2 are required to reach the performance of a Cray C-90. A 32 node SP1 (SP2) configuration is 2.9 (4.6) times faster than a Cray Y/MP for this simulation, while the hypercube is roughly 2 times slower than the Y/MP for this application. KEY WORDS: Spatial direct numerical simulations; incompressible viscous flows; spectral methods; finite differences; parallel computing.

  18. Motivation and evaluation of empolyees

    OpenAIRE

    Sinkulová, Anna

    2015-01-01

    My bachelor thesis is focused on motivation and assessment of employees in the company. The aim of this thesis is to investigate the influence of team building and benefits on employees' motivation. Literature based theoretical part of my thesis describes and investigates the real meaning and purpose of motivation and basic motivational concepts. Furthermore, I outlined the basics behind employee benefits, team building and also stated the current given trends in these areas. The practical pa...

  19. ASSESSMENT OF MOTIVATION BY ENTROPY

    OpenAIRE

    Tadeusz G³owacki

    2014-01-01

    Motivation is inseparable from human work. It is also one of the five most important elements of the management process. The ability to determine the level of motivation would therefore be very useful in the work of every manager. This paper is an attempt to quantify motivation and evaluate its size, using the concept of entropy. The main reason to try defining a method of measuring the amount of motivation is to improve the management techniques of companies.

  20. Motives of terrorist acts

    Directory of Open Access Journals (Sweden)

    Krstić Marko

    2015-01-01

    Full Text Available Terrorism is a relatively new phenomenon, and data on terrorist motivations and psychological profiles of terrorists are fairly scarce and limited. In theory, there is a large number of quantitative analyses of collective violence, murder, and crime, however, none of these can be identified with terrorism. Most current studies do not consider a great heterogeneity of terrorists, and numerous practical, conceptual, and psychological barriers slow down the science of learning about terrorism. Psychology, as a science of behavior, certainly makes a great contribution to the study of terrorism as a very complex phenomenon. The aim of this paper is to analyze and synthesize social and psychological determinants which contribute to the development of terrorist motives, and to elaborate on those facts which have been discussed in scientific and professional literature so far.

  1. Motivations Behind Sustainable Purchasing

    OpenAIRE

    Vörösmarty, Gyöngyi; Dobos, Imre; Tátrai, Tünde

    2011-01-01

    Sustainability issues in purchasing are receiving greater attention. Literature is rapidly growing, with several research programs being initiated to investigate the topic. This study presents the results of a research project which aims to reveal and structure the motivating forces leading companies to make efforts in sustainability purchasing and the means used to attain achievements in some fields of sustainability. Results presented in the literature are scattered in terms of ...

  2. Veganism: Motivations and Difficulties

    OpenAIRE

    Beck, Mathilde Therese Claudine; Harvey, John Carr; Trauth, Christina

    2017-01-01

    An increasing number of people are adopting a vegan lifestyle, which means to stop consuming products, that are made from or based on animals, like meat, dairy or eggs. However, the number of research concerning veganism is limited. As the existing research is mainly concentrating on the process of adopting a vegan lifestyle and the view of vegans, these findings shall be examined further with the question, What are the motivation and difficulties about adopting a plant based vegan diet in We...

  3. Clustering Teachers' Motivations for Teaching

    Science.gov (United States)

    Visser-Wijnveen, Gerda J.; Stes, Ann; Van Petegem, Peter

    2014-01-01

    The motivation to teach is a powerful, yet neglected, force in teaching at institutes of higher education. A better understanding of academics' motivations for teaching is necessary. The aim of this mixed-method study was to identify groups with distinctively different motivations for teaching. Six clusters were identified: expertise, duty,…

  4. Motivating Staff, Parents, and Children.

    Science.gov (United States)

    Jones, Cynthia Cavenaugh

    Two motivational theories considered particularly useful in administering early childhood programs are discussed, and guidelines for motivating staff, parents, and children are provided. First, the two-factor theory of motivation within organizations, as outlined by Herzberg (1959), is described. Offered in this section are a list of motivators…

  5. Work Motivation: Theory and Practice.

    Science.gov (United States)

    Katzell, Raymond A.; Thompson, Donna E.

    1990-01-01

    Presents theories of motivation classified as those dealing either with exogenous causes or with endogenous processes. The following strategies for improving work motivation are discussed: (1) personal motives; (2) incentives and rewards; (3) reinforcement; (4) goal-setting techniques; (5) personal and material resources; (6) social and group…

  6. Motives for corporate social responsibility

    NARCIS (Netherlands)

    Graafland, J.J.; Mazereeuw V/d Duijn Schouten, C.

    2012-01-01

    In this article we analyze the motives of executives to take responsibility for the labor, environmental and social aspects of their business. We distinguish three motives: one extrinsic (financial) and two intrinsic (ethical and altruistic) motives and empirically investigate the influences of

  7. Motivated reasoning during recruitment.

    Science.gov (United States)

    Kappes, Heather Barry; Balcetis, Emily; De Cremer, David

    2018-03-01

    This research shows how job postings can lead job candidates to see themselves as particularly deserving of hiring and high salary. We propose that these entitlement beliefs entail both personal motivations to see oneself as deserving and the ability to justify those motivated judgments. Accordingly, we predict that people feel more deserving when qualifications for a job are vague and thus amenable to motivated reasoning, whereby people use information selectively to reach a desired conclusion. We tested this hypothesis with a 2-phase experiment (N = 892) using materials drawn from real online job postings. In the first phase of the experiment, participants believed themselves to be more deserving of hiring and deserving of higher pay after reading postings composed of vaguer types of qualifications. In the second phase, yoked observers believed that participants were less entitled overall, but did not selectively discount endorsement of vaguer qualifications, suggesting they were unaware of this effect. A follow-up preregistered experiment (N = 905) using postings with mixed qualification types replicated the effect of including more vague qualifications on participants' entitlement beliefs. Entitlement beliefs are widely seen as problematic for recruitment and retention, and these results suggest that reducing the inclusion of vague qualifications in job postings would dampen the emergence of these beliefs in applicants, albeit at the cost of decreasing application rates and lowering applicants' confidence. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  8. The Effectiveness of Motivation Training for Increasing Students’ Motivation

    Directory of Open Access Journals (Sweden)

    Fatwa Tentama

    2014-09-01

    Full Text Available Students’ low level of motivation becomes a matter of concern to be addressed immediately. Students' motivation needs to be improved as it is a factor that will affect their lives in the future. This study aims to observe or examine the effectiveness of motivation training in increasing students' motivation.The research method used was the pre-experiment with one group pre-test post-test design. The subjects of this study were 15 boy and girl students of Grade X of SMK who had a low level of motivation. The measuring instruments were the motivation scales given during the pre-test and post-test. The quantitative data were statistically analyzed using the Wilcoxon test with non-parametric measurements to determine the significance of difference in the motivation level before and after the training. The data were tested using SPSS 17.0 for Windows.The result of Wilcoxon analysis to test the hypothesis whether there is a difference between the pre-test and post-test of students' motivation showed that the p = 0.025 (p < 0.05. This means that there was a significant difference between the motivation before the treatment (pre-test and after the treatment (post-test, which indicated that the students' motivation increased after a treatment in the form of motivation training.

  9. Motivational Profiles and Motivation for Lifelong Learning of Medical Specialists.

    Science.gov (United States)

    van der Burgt, Stéphanie M E; Kusurkar, Rashmi A; Wilschut, Janneke A; Tjin A Tsoi, Sharon L N M; Croiset, Gerda; Peerdeman, Saskia M

    2018-05-22

    Medical specialists face the challenge of maintaining their knowledge and skills and continuing professional development, that is, lifelong learning. Motivation may play an integral role in many of the challenges facing the physician workforce today including maintenance of a high performance. The aim of this study was to determine whether medical specialists show different motivational profiles and if these profiles predict differences in motivation for lifelong learning. An online questionnaire was sent to every medical specialist working in five hospitals in the Netherlands. The questionnaire included the validated Multidimensional Work Motivation Scale and the Jefferson Scale of Physician Lifelong Learning together with background questions like age, gender, and type of hospital. Respondents were grouped into different motivational profiles by using a two-step clustering approach. Four motivational profiles were identified: (1) HAMC profile (for High Autonomous and Moderate Controlled motivation), (2) MAMC profile (for Moderate Autonomous and Moderate Controlled motivation), (3) MALC profile (for Moderate Autonomous and Low Controlled motivation), and (4) HALC profile (for High Autonomous and Low Controlled motivation). Most of the female specialists that work in an academic hospital and specialists with a surgical specialty were represented in the HALC profile. Four motivational profiles were found among medical specialists, differing in gender, experience and type of specialization. The profiles are based on the combination of autonomous motivation (AM) and controlled motivation (CM) in the specialists. The profiles that have a high score on autonomous motivation have a positive association with lifelong learning.This is an open-access article distributed under the terms of the Creative Commons Attribution-Non Commercial-No Derivatives License 4.0 (CCBY-NC-ND), where it is permissible to download and share the work provided it is properly cited. The work

  10. A Preliminary Study of Classroom Motivators and De-Motivators from a Motivation-Hygiene Perspective

    Science.gov (United States)

    Katt, James A.; Condly, Steven J.

    2009-01-01

    This study seeks to begin answering two simple questions: "What motivates our students?" and its corollary, "What prevents our students from being motivated?" The motivation-hygiene theory (F. Herzberg, "Work and the nature of man," World Publishing, Cleveland, OH, 1966), a well-tested theory from organizational…

  11. Multiple motives and persuasive communication : Creative elaboration as a result of impression motivation and accuracy motivation

    NARCIS (Netherlands)

    Nienhuis, AE; Manstead, ASR; Spears, R

    The authors examined the influence of impression motivation (Experiments 1 and 2) and the combined effects of accuracy motivation and impression motivation (Experiment 3) on the elaboration of persuasive messages as reflected in attitude change and cognitive responses. Intermediate levels of

  12. Automatic Determination of the Need for Intravenous Contrast in Musculoskeletal MRI Examinations Using IBM Watson's Natural Language Processing Algorithm.

    Science.gov (United States)

    Trivedi, Hari; Mesterhazy, Joseph; Laguna, Benjamin; Vu, Thienkhai; Sohn, Jae Ho

    2018-04-01

    Magnetic resonance imaging (MRI) protocoling can be time- and resource-intensive, and protocols can often be suboptimal dependent upon the expertise or preferences of the protocoling radiologist. Providing a best-practice recommendation for an MRI protocol has the potential to improve efficiency and decrease the likelihood of a suboptimal or erroneous study. The goal of this study was to develop and validate a machine learning-based natural language classifier that can automatically assign the use of intravenous contrast for musculoskeletal MRI protocols based upon the free-text clinical indication of the study, thereby improving efficiency of the protocoling radiologist and potentially decreasing errors. We utilized a deep learning-based natural language classification system from IBM Watson, a question-answering supercomputer that gained fame after challenging the best human players on Jeopardy! in 2011. We compared this solution to a series of traditional machine learning-based natural language processing techniques that utilize a term-document frequency matrix. Each classifier was trained with 1240 MRI protocols plus their respective clinical indications and validated with a test set of 280. Ground truth of contrast assignment was obtained from the clinical record. For evaluation of inter-reader agreement, a blinded second reader radiologist analyzed all cases and determined contrast assignment based on only the free-text clinical indication. In the test set, Watson demonstrated overall accuracy of 83.2% when compared to the original protocol. This was similar to the overall accuracy of 80.2% achieved by an ensemble of eight traditional machine learning algorithms based on a term-document matrix. When compared to the second reader's contrast assignment, Watson achieved 88.6% agreement. When evaluating only the subset of cases where the original protocol and second reader were concordant (n = 251), agreement climbed further to 90.0%. The classifier was

  13. G.M.S.I. - A generalised multigroup system of calculations using the IBM 7030 (stretch) computer

    International Nuclear Information System (INIS)

    Gratton, C.P.; Smith, P.E.

    1965-02-01

    G.M.S. is a generalised system of reactor physics calculations written in the FORTRAN programming language for the IBM 7030 (STRETCH) computer. The programme will perform cell, supercell and overall reactor physics problems within the limits of one dimension using either slab or cylindrical geometry. The Winfrith DSN(1) programme has been incorporated as a subroutine and all flux distribution calculations are performed using Transport Theory. A facility for the study of fuel burn-up has been included with boundary conditions for either cell irradiations or the burn-up characteristics of the overall reactor. Particular attention has been paid to the simplicity of the input to the programme to allow a wide range of potential users and extensive edit facilities have been incorporated to allow the better understanding of the multigroup output. A graphical output option is available using the STROMBERG-CARLSON equipment and, by a series of commands, graphs of power peaking and burn-up rates are produced for the designer or, alternatively, neutron spectra and activations for comparison with experiment, The logic of the programme is written in terms of 40 neutron energy groups, the group boundaries of which may be selected by the user. Clearly the use of the system for fast reactor calculations requires that greater emphasis be given to the representation of neutron events at high energy than would be necessary for thermal reactor studies. It is envisaged therefore that eventually two library files will be made available to cover the extreme cases of fast and thermal systems and that the group boundaries of these will be selected to enable adequate treatment of intermediate spectrum reactors. At the present time the thermal reactor library file only has been prepared; the content of this library is discussed in Section 2. The group structure is comprised of twelve groups in the fast and intermediate energy region, ten groups in and around the plutonium 240 resonance at 1

  14. The Role of Motivation in Language Learning

    OpenAIRE

    Rahman, Anwar

    2011-01-01

    The mastery of English learning is influenced by some variables, one of them is motivation. Motivation in learning second language is classified as integrative motivation and instrumental motivation. Some experts of language teaching also categorized motivation into two types namely intrinsic motivation and extrinsic motivation. This paper discusses about kinds of motivation and how it takes a role in influencing students mastery in learning language. It was literature study that focused to f...

  15. Motivations of parametric studies

    International Nuclear Information System (INIS)

    Birac, C.

    1988-01-01

    The paper concerns the motivations of parametric studies in connection with the Programme for the Inspection of Steel Components PISC II. The objective of the PISC II exercise is to evaluate the effectiveness of current and advanced NDT techniques for inspection of reactor pressure vessel components. The parametric studies were initiated to determine the influence of some parameters on defect detection and dimensioning, and to increase the technical bases of the Round Robin Tests. A description is given of the content of the parametric studies including:- the effect of the defects' characteristics, the effect of equipment characteristics, the effect of cladding, and possible use of electromagnetic techniques. (U.K.)

  16. Motives for barter

    DEFF Research Database (Denmark)

    Sudzina, Frantisek

    2011-01-01

    Barter is not something that was present only before invention of money. Even Fortune 500 companies are involved in barter. The most common bartered goods and services are media and travel. As the amount of barter increases even in the U.S., it is worth investigating the reasons why organizations...... use barter. The paper provides a literature review of barter motives digested from academic journal articles covered in the Web of Science and EBSCO databases. The review includes also drivers that are specific for developing countries....

  17. Successful innovation by motivation

    Directory of Open Access Journals (Sweden)

    Petra Koudelková

    2015-10-01

    Full Text Available Innovation is one of the most important factors for business growth. Human capital plays a significant role in the successful process of innovation. This article deals with employee motivation in the innovation process and the main scientific aim of this study is to present results of research that was undertaken in the Czech Republic at the beginning of 2013. Questionnaires were used for the survey and statistical analyses such as Chi square test or Hierarchical cluster analysis were used for data processing. This study also provides a theoretical and practical overview of business innovation in the Czech Republic.

  18. Personal Development is Motivating

    DEFF Research Database (Denmark)

    Hjort, Katrin

    2018-01-01

    The education system is increasingly being managed with the help of competence goals that are so clear-cut that we are hindering the students from making decisions and working things out for themselves. Therefore, they are not adequately prepared for the society of the future. Although we do...... not know what the future will bring, we do know that they must continue to learn and be creative. Professor Katrin Hjort, therefore, is fighting for an education system that stimulates students’ personal development, which is also crucial for their motivation....

  19. Integrative Perspectives of Academic Motivation

    Science.gov (United States)

    Chittum, Jessica Rebecca

    My overall objective in this dissertation was to develop more integrative perspectives of several aspects of academic motivation. Rarely have researchers and theorists examined a more comprehensive model of academic motivation that pools multiple constructs that interact in a complex and dynamic fashion (Kaplan, Katz, & Flum, 2012; Turner, Christensen, Kackar-Cam, Trucano, & Fulmer, 2014). The more common trend in motivation research and theory has been to identify and explain only a few motivation constructs and their linear relationships rather than examine complex relationships involving "continuously emerging systems of dynamically interrelated components" (Kaplan et al., 2014, para. 4). In this dissertation, my co-author and I focused on a more integrative perspective of academic motivation by first reviewing varying characterizations of one motivation construct (Manuscript 1) and then empirically testing dynamic interactions among multiple motivation constructs using a person-centered methodological approach (Manuscript 2). Within the first manuscript (Chapter 2), a theoretical review paper, we summarized multiple perspectives of the need for autonomy and similar constructs in academic motivation, primarily autonomy in self-determination theory, autonomy supports, and choice. We provided an integrative review and extrapolated practical teaching implications. We concluded with recommendations for researchers and instructors, including a call for more integrated perspectives of academic motivation and autonomy that focus on complex and dynamic patterns in individuals' motivational beliefs. Within the second manuscript (Chapter 3), we empirically investigated students' motivation in science class as a complex, dynamic, and context-bound phenomenon that incorporates multiple motivation constructs. Following a person-centered approach, we completed cluster analyses of students' perceptions of 5 well-known motivation constructs (autonomy, utility value, expectancy

  20. A Brief Analysis of L2 Motivation

    Institute of Scientific and Technical Information of China (English)

    武曼

    2017-01-01

    Learning motivation is the motility to urge the student to be engaged in the studies activity. This thesis has introduced types of L2 learning motivation. Through the contrast and analysis about the positive motivation and negative motivation in prac?tical applications, this paper has indicated the unique of positive motivation and the defects of negative motivation, and make rea?sonable suggestions.

  1. The motivation to express prejudice

    Science.gov (United States)

    Forscher, Patrick S.; Cox, William T. L.; Graetz, Nicholas; Devine, Patricia G.

    2015-01-01

    Contemporary prejudice research focuses primarily on people who are motivated to respond without prejudice and the ways in which unintentional bias can cause these people to act inconsistent with this motivation. However, some real-world phenomena (e.g., hate speech, hate crimes) and experimental findings (e.g., Plant & Devine, 2001; 2009) suggest that some expressions of prejudice are intentional. These phenomena and findings are difficult to explain solely from the motivations to respond without prejudice. We argue that some people are motivated to express prejudice, and we develop the motivation to express prejudice (MP) scale to measure this motivation. In seven studies involving more than 6,000 participants, we demonstrate that, across scale versions targeted at Black people and gay men, the MP scale has good reliability and convergent, discriminant, and predictive validity. In normative climates that prohibit prejudice, the internal and external motivations to express prejudice are functionally non-independent, but they become more independent when normative climates permit more prejudice toward a target group. People high in the motivation to express prejudice are relatively likely to resist pressure to support programs promoting intergroup contact and vote for political candidates who support oppressive policies. The motivation to express prejudice predicted these outcomes even when controlling for attitudes and the motivations to respond without prejudice. This work encourages contemporary prejudice researchers to broaden the range of samples, target groups, and phenomena that they study, and more generally to consider the intentional aspects of negative intergroup behavior. PMID:26479365

  2. Neuroscientific Model of Motivational Process

    Science.gov (United States)

    Kim, Sung-il

    2013-01-01

    Considering the neuroscientific findings on reward, learning, value, decision-making, and cognitive control, motivation can be parsed into three sub processes, a process of generating motivation, a process of maintaining motivation, and a process of regulating motivation. I propose a tentative neuroscientific model of motivational processes which consists of three distinct but continuous sub processes, namely reward-driven approach, value-based decision-making, and goal-directed control. Reward-driven approach is the process in which motivation is generated by reward anticipation and selective approach behaviors toward reward. This process recruits the ventral striatum (reward area) in which basic stimulus-action association is formed, and is classified as an automatic motivation to which relatively less attention is assigned. By contrast, value-based decision-making is the process of evaluating various outcomes of actions, learning through positive prediction error, and calculating the value continuously. The striatum and the orbitofrontal cortex (valuation area) play crucial roles in sustaining motivation. Lastly, the goal-directed control is the process of regulating motivation through cognitive control to achieve goals. This consciously controlled motivation is associated with higher-level cognitive functions such as planning, retaining the goal, monitoring the performance, and regulating action. The anterior cingulate cortex (attention area) and the dorsolateral prefrontal cortex (cognitive control area) are the main neural circuits related to regulation of motivation. These three sub processes interact with each other by sending reward prediction error signals through dopaminergic pathway from the striatum and to the prefrontal cortex. The neuroscientific model of motivational process suggests several educational implications with regard to the generation, maintenance, and regulation of motivation to learn in the learning environment. PMID:23459598

  3. Neuroscientific model of motivational process.

    Science.gov (United States)

    Kim, Sung-Il

    2013-01-01

    Considering the neuroscientific findings on reward, learning, value, decision-making, and cognitive control, motivation can be parsed into three sub processes, a process of generating motivation, a process of maintaining motivation, and a process of regulating motivation. I propose a tentative neuroscientific model of motivational processes which consists of three distinct but continuous sub processes, namely reward-driven approach, value-based decision-making, and goal-directed control. Reward-driven approach is the process in which motivation is generated by reward anticipation and selective approach behaviors toward reward. This process recruits the ventral striatum (reward area) in which basic stimulus-action association is formed, and is classified as an automatic motivation to which relatively less attention is assigned. By contrast, value-based decision-making is the process of evaluating various outcomes of actions, learning through positive prediction error, and calculating the value continuously. The striatum and the orbitofrontal cortex (valuation area) play crucial roles in sustaining motivation. Lastly, the goal-directed control is the process of regulating motivation through cognitive control to achieve goals. This consciously controlled motivation is associated with higher-level cognitive functions such as planning, retaining the goal, monitoring the performance, and regulating action. The anterior cingulate cortex (attention area) and the dorsolateral prefrontal cortex (cognitive control area) are the main neural circuits related to regulation of motivation. These three sub processes interact with each other by sending reward prediction error signals through dopaminergic pathway from the striatum and to the prefrontal cortex. The neuroscientific model of motivational process suggests several educational implications with regard to the generation, maintenance, and regulation of motivation to learn in the learning environment.

  4. Neuroscientific Model of Motivational Process

    Directory of Open Access Journals (Sweden)

    Sung-Il eKim

    2013-03-01

    Full Text Available Considering the neuroscientific findings on reward, learning, value, decision-making, and cognitive control, motivation can be parsed into three subprocesses, a process of generating motivation, a process of maintaining motivation, and a process of regulating motivation. I propose a tentative neuroscientific model of motivational processes which consists of three distinct but continuous subprocesses, namely reward-driven approach, value-based decision making, and goal-directed control. Reward-driven approach is the process in which motivation is generated by reward anticipation and selective approach behaviors toward reward. This process recruits the ventral striatum (reward area in which basic stimulus-action association is formed, and is classified as an automatic motivation to which relatively less attention is assigned. By contrast, value-based decision making is the process of evaluating various outcomes of actions, learning through positive prediction error, and calculating the value continuously. The striatum and the orbitofrontal cortex (valuation area play crucial roles in sustaining motivation. Lastly, the goal-directed control is the process of regulating motivation through cognitive control to achieve goals. This consciously controlled motivation is associated with higher-level cognitive functions such as planning, retaining the goal, monitoring the performance, and regulating action. The anterior cingulate cortex (attention area and the dorsolateral prefrontal cortex (cognitive control area are the main neural circuits related to regulation of motivation. These three subprocesses interact with each other by sending reward prediction error signals through dopaminergic pathway from the striatum and to the prefrontal cortex. The neuroscientific model of motivational process suggests several educational implications with regard to the generation, maintenance, and regulation of motivation to learn in the learning environment.

  5. The Motivational Climate and Intrinsic Motivation in the Rehabilitation Setting.

    Science.gov (United States)

    Brinkman-Majewski, Rachel E; Weiss, Windee M

    2018-02-06

    The motivational climate created by the athletic trainer in rehabilitation may be critical in influencing athletes' intrinsic motivation and other psychosocial outcomes in the rehabilitation and the recovery process. The purpose of this study was to examine intercollegiate athletes' perceptions of the motivational climate in the rehabilitation setting. Specifically, examining if perceptions of the motivational climate can predict athletes' levels of intrinsic motivation with rehabilitation as well as the relationship between perceptions of the motivational climate and athlete demographics (gender, starter status, athletic trainer gender, etc). Cross-sectional, descriptive research. College sport team and athletic training center. NCAA Division II intercollegiate athletes from one institution (n = 187; 125 male, 62 female). Paper-based survey measuring: mastery and performance perceptions of the motivational climate in rehabilitation, athletes' goal orientation in sport, athletes' levels of motivation in rehabilitation. Perceptions of a performance climate was positively related to intrinsic motivation effort-improvement (effect size=25.34%). Perceptions of a mastery climate were positively related to interest-enjoyment and perceived competence and negatively related to tension-pressure (effect size=39.03%). In general, female athletes, as well as athletes with a female athletic trainer, had significantly higher perceptions of mastery motivational climate effort-improvement compared to male athletes and athletes with male athletic trainers. While male athletes and athletes with male athletic trainers had higher perceptions of intra-team member rivalry in rehabilitation. The athlete's gender and goal orientation, as well as the gender of the athletic trainer creating the motivational climate, can influence whether the environment is perceived as more mastery or performance. The recovering athletes' perceptions of the climate in rehabilitation can, in turn, affect

  6. Directed Motivational Currents: Using vision to create effective motivational pathways

    OpenAIRE

    Christine Muir; Zoltán Dörnyei

    2013-01-01

    Vision, that is, the mental representation of the sensory experience of a future goal state (involving imagination and imagery), is currently at the forefront of motivational innovation, and in recent years it has been seen increasingly more often in the motivational tool kit of practicing language teachers. Theories such as Dörnyei’s L2 motivational self system have explored the power that creating effective visions can harness (see, e.g., Dörnyei & Kubanyiova, 2014) and when viewed in conju...

  7. YOUNG ATHLETES' MOTIVATIONAL PROFILES

    Directory of Open Access Journals (Sweden)

    Juan Antonio Moreno Murcia

    2007-06-01

    Full Text Available The aim of this study was to examine the relationship between motivational characteristics and dispositional flow. In order to accomplish this goal, motivational profiles emerging from key constructs within Achievement Goal Theory and Self-Determination Theory were related to the dispositional flow measures. A sample of 413 young athletes (Age range 12 to 16 years completed the PMCSQ-2, POSQ, SMS and DFS measures. Cluster analysis results revealed three profiles: a "self-determined profile" characterised by higher scores on the task-involving climate perception and on the task orientation; a "non-self-determined profile", characterised by higher scores on ego-involving climate perception and ego orientation; and a "low self-determined and low non-self-determined profile" which had the lowest dispositional flow. No meaningful differences were found between the "self-determined profile" and the "non-self-determined profile" in dispositional flow. The "self-determined profile" was more commonly associated with females, athletes practising individual sports and those training more than three days a week. The "non-self-determined profile" was more customary of males and athletes practising team sports as well as those training just two or three days a week

  8. Evaluating arguments during instigations of defence motivation and accuracy motivation.

    Science.gov (United States)

    Liu, Cheng-Hong

    2017-05-01

    When people evaluate the strength of an argument, their motivations are likely to influence the evaluation. However, few studies have specifically investigated the influences of motivational factors on argument evaluation. This study examined the effects of defence and accuracy motivations on argument evaluation. According to the compatibility between the advocated positions of arguments and participants' prior beliefs and the objective strength of arguments, participants evaluated four types of arguments: compatible-strong, compatible-weak, incompatible-strong, and incompatible-weak arguments. Experiment 1 revealed that participants possessing a high defence motivation rated compatible-weak arguments as stronger and incompatible-strong ones as weaker than participants possessing a low defence motivation. However, the strength ratings between the high and low defence groups regarding both compatible-strong and incompatible-weak arguments were similar. Experiment 2 revealed that when participants possessed a high accuracy motivation, they rated compatible-weak arguments as weaker and incompatible-strong ones as stronger than when they possessed a low accuracy motivation. However, participants' ratings on both compatible-strong and incompatible-weak arguments were similar when comparing high and low accuracy conditions. The results suggest that defence and accuracy motivations are two major motives influencing argument evaluation. However, they primarily influence the evaluation results for compatible-weak and incompatible-strong arguments, but not for compatible-strong and incompatible-weak arguments. © 2016 The British Psychological Society.

  9. Directed Motivational Currents: Using vision to create effective motivational pathways

    Directory of Open Access Journals (Sweden)

    Christine Muir

    2013-10-01

    Full Text Available Vision, that is, the mental representation of the sensory experience of a future goal state (involving imagination and imagery, is currently at the forefront of motivational innovation, and in recent years it has been seen increasingly more often in the motivational tool kit of practicing language teachers. Theories such as Dörnyei’s L2 motivational self system have explored the power that creating effective visions can harness (see, e.g., Dörnyei & Kubanyiova, 2014 and when viewed in conjunction with other current research avenues, such as future time perspective and dynamic systems theory, vision offers exciting potential. A Directed Motivational Current is a new motivational construct that we suggest is capable of integrating many current theoretical strands with vision: It can be described as a motivational drive which energises long-term, sustained behaviour (such as language learning, and through placing vision and goals as critical central components within this construct, it offers real and practical motivational potential. In this conceptual paper, we first discuss current understandings of vision and of Directed Motivational Currents, and then analyse how they may be optimally integrated and employed to create effective motivational pathways in language learning environments.

  10. Classic Multi-Configuration-Dirac-Fock and Hartree-Fock-Relativistic methods integrated into a program package for the RAL-IBM mainframe with automatic comparative output

    International Nuclear Information System (INIS)

    Cowan, R.D.; Grant, I.P.; Fawcett, B.C.; Rose, S.J.

    1985-11-01

    A Multi-Configuration-Dirac-Fock (MCDF) computer program is adapted to interface with the Hartree-Fock-Relativistic (HFR) program for the RAL IBM mainframe computer. The two codes are integrated into a package which includes the Zeeman Laboratory Slater parameter optimisation routines as well as new RAL routines to further process the HFR and MCDF output. A description of the adaptions to MCDF and new output extensions is included in this report, and details are given regarding HFR FORTRAN subroutines, and lists of Job Control Language (JCL) files for the complete package. (author)

  11. Numerical analysis of resonances induced by s wave neutrons in transmission time-of-flight experiments with a computer IBM 7094 II

    International Nuclear Information System (INIS)

    Corge, Ch.

    1969-01-01

    Numerical analysis of transmission resonances induced by s wave neutrons in time-of-flight experiments can be achieved in a fairly automatic way on an IBM 7094/II computer. The involved computations are carried out following a four step scheme: 1 - experimental raw data are processed to obtain the resonant transmissions, 2 - values of experimental quantities for each resonance are derived from the above transmissions, 3 - resonance parameters are determined using a least square method to solve the over determined system obtained by equalling theoretical functions to the correspondent experimental values. Four analysis methods are gathered in the same code, 4 - graphical control of the results is performed. (author) [fr

  12. January: IBM 7094 programme for the resolution of cell problems in planar, spherical and cylindrical geometry using the double Pn approximation

    International Nuclear Information System (INIS)

    Amouyal, A.; Tariel, H.

    1966-01-01

    Code name: January 1 st SCEA 011S. 2) Computer: IBM 7094; Programme system: Fortran II, 2 nd version. 3) Nature of the problem: resolution of cell problems with one space variable (planar, spherical and cylindrical geometries) and with one energy group, with isotropic sources in the double P n approximation (DP 1 and DP 3 approximation in planar and spherical geometries, DP 1 and DP 2 in cylindrical geometry). 4) Method used: the differential equations with limiting conditions are transformed into differential system with initial conditions which are integrated by a separate-step method. 5) Restrictions: number of physical media [fr

  13. [Development and Evaluation of a Motivational Interviewing Program for Exercise Improvement in Persons with Physical Disabilities].

    Science.gov (United States)

    Jeong, Jeong Hee; Jeong, Ihn Sook

    2017-06-01

    The aims of this study were to develop a motivational interviewing program for exercise improvement in persons with physical disabilities and to examine the effect of this motivational interviewing intervention. The study employed a nonequivalent control group pretest and posttest design. A total of 62 persons with physical disabilities (30 in the experimental group, 32 in the control group) were recruited from 2 community rehabilitation centers. The experimental group received 8 sessions of a group motivational interviewing program, scheduled once a week, with each session lasting 60 minutes. Test measures were completed before the intervention, immediately after the end of the intervention, 2 weeks later, and 6 weeks after the end of the intervention. Measures included self-efficacy for exercise, decisional balance for exercise, stage of change for exercise, regularity of exercise, exercise maintenance, and independent living ability. Data were analyzed using the χ²-test, Fisher's exact test, Independent samples t-test, and repeated measures ANOVA, conducted using IBM SPSS Statistics version 18. The experimental group showed a significant increase in self-efficacy for exercise (F=50.98, pmotivational interviewing program has the potential to improve exercise levels in persons with physical disabilities. © 2017 Korean Society of Nursing Science

  14. Motivational beliefs, values, and goals.

    Science.gov (United States)

    Eccles, Jacquelynne S; Wigfield, Allan

    2002-01-01

    This chapter reviews the recent research on motivation, beliefs, values, and goals, focusing on developmental and educational psychology. The authors divide the chapter into four major sections: theories focused on expectancies for success (self-efficacy theory and control theory), theories focused on task value (theories focused on intrinsic motivation, self-determination, flow, interest, and goals), theories that integrate expectancies and values (attribution theory, the expectancy-value models of Eccles et al., Feather, and Heckhausen, and self-worth theory), and theories integrating motivation and cognition (social cognitive theories of self-regulation and motivation, the work by Winne & Marx, Borkowski et al., Pintrich et al., and theories of motivation and volition). The authors end the chapter with a discussion of how to integrate theories of self-regulation and expectancy-value models of motivation and suggest new directions for future research.

  15. Motivation of medical students: selection by motivation or motivation by selection.

    Science.gov (United States)

    Wouters, Anouk; Croiset, Gerda; Galindo-Garre, Francisca; Kusurkar, Rashmi A

    2016-01-29

    Medical schools try to implement selection procedures that will allow them to select the most motivated students for their programs. Though there is a general feeling that selection stimulates student motivation, conclusive evidence for this is lacking. The current study aims to use the perspective of Self-determination Theory (SDT) of motivation as a lens to examine how medical students' motivation differs in relation to different selection procedures. The hypotheses were that 1) selected students report higher strength and autonomous motivation than non-selected students, and 2) recently selected students report higher strength and autonomous motivation than non-selected students and students who were selected longer ago. First- (Y1) and fourth-year (Y4) medical students in the six-year regular programme and first-year students in the four-year graduate entry programme (GE) completed questionnaires measuring motivation strength and type (autonomous-AM, controlled-CM). Scores were compared between students admitted based on selection, lottery or top pre-university GPA (top GPA) using ANCOVAs. Selected students' answers on open-ended questions were analysed using inductive thematic analysis to identify reasons for changes in motivation. The response rate was 61.4 % (n = 357). Selected students (Y1, Y4 and GE) reported a significantly higher strength of motivation than non-selected students (Y1 and Y4 lottery and top GPA) (p motivation as they felt autonomous, competent and that they belonged to a special group. These reported reasons are in alignment with the basic psychological needs described by Self-Determination Theory as important in enhancing autonomous motivation. A comprehensive selection procedure, compared to less demanding admission procedures, does not seem to yield a student population which stands out in terms of autonomous motivation. The current findings indicate that selection might temporarily enhance students' motivation. The mechanism

  16. Computing Educator Attitudes about Motivation

    OpenAIRE

    Settle, Amber; Sedlak, Brian

    2016-01-01

    While motivation is of great interest to computing educators, relatively little work has been done on understanding faculty attitudes toward student motivation. Two previous qualitative studies of instructor attitudes found results identical to those from other disciplines, but neither study considered whether instructors perceive student motivation to be more important in certain computing classes. In this work we present quantitative results about the perceived importance of student motivat...

  17. Employee motivation and employee benefits

    OpenAIRE

    Limburská, Martina

    2009-01-01

    The goal of this thesis is to get acquainted with the issue of employee motivation from a theoretical perspective, and then analyze the incentive system in a selected company - Sellier & Bellot. In conclusion, I would like to evaluate the lessons learned and propose some changes and recommendations for improving motivation in the analyzed company. The work is divided into four parts. The first three are rather theoretical. The first part deals with the explanation of the concept of motivation...

  18. The employee motivation and benefits

    OpenAIRE

    Fuhrmannová, Petra

    2013-01-01

    The aim of this bachelor's study is to describe and analyze the employee motivation and benefits in the payroll system and human recources field. Theoretical part attends to general terms as the employee motivation, the theory of the motivation,the types of the employee benefits, the influence of benefits to the employee's working performance. The practial part focuses on Elanor company, includes introduction of the company, it's history and the present, the offer of the employee benefits. Ne...

  19. Biopsychosocial correlates of work motivation

    OpenAIRE

    Liesienė, Justina; Endriulaitienė, Auksė

    2008-01-01

    Work motivation is a potential predictor of employee turnover, job satisfaction, commitment, job performance and psychological wellbeing. Researchers argue that motivated employees work more effectively. The purpose of the current study was to identify biological (gender, age and health), psychological (personality traits) and social (marital status, children, work sector and position) factors related to employees’ work motivation. It was also predicted that subjectively perceived job effecti...

  20. Employee Motivation at IKEA Espoo

    OpenAIRE

    Thapa, Kumar; Adhikari, Devendra

    2013-01-01

    How to motivate employees and the factors affecting motivation have been subjects of concern for many researchers and practitioners for decades. Until recently employees were primarily regarded as a factor of production (i.e. labor), and not, as in the current view, as an integral part of all businesses. Therefore, motivating employees has become essential in order to achieve the strategic goals of any company. However, due to the current state of competition in the job markets it has increas...

  1. Impulsive action and motivation.

    Science.gov (United States)

    Frijda, Nico H

    2010-07-01

    This paper explores the way in which emotions are causal determinants of action. It argues that emotional events, as appraised by the individual, elicit changes in motive states (called states of action readiness), which in turn may (or may not) cause action. Actions can be elicited automatically, without prior intention (called impulsive actions), or intentionally. Impulsive actions reflect the simplest and biologically most general form in which emotions can cause action, since they require no reflection, no foresight, and no planning. Impulsive actions are determined conjointly by the nature of action readiness, the affordances perceived in the eliciting event as appraised, and the individual's action repertoire. Those actions from one's repertoire are performed that both match the perceived affordances and the aim of the state of action readiness. Copyright © 2010 Elsevier B.V. All rights reserved.

  2. What Motivates the Motivators? An Examination of Sports Coaches

    Science.gov (United States)

    McLean, Kristy N.; Mallett, Clifford J.

    2012-01-01

    Background: Motivation is central to successful performance. In the case of sports coaches, drive is a prerequisite to sustained successful engagement in a complex, dynamic, and turbulent work environment. What fuels these coaches' drive to pursue this vocational activity? Coach motivation has been underrepresented in previous research which has…

  3. Motivation and Creativity: Effects of Motivational Orientation on Creative Writers.

    Science.gov (United States)

    Amabile, Teresa M.

    This study directly tested the hypothesis that intrinsic motivation is conducive to creativity and extrinsic motivation is detrimental. Chosen because they identified themselves as actively involved in creative writing, 72 young adults participated in individual laboratory sessions where they were asked to write two brief poems. Before writing the…

  4. Motivational systems or motivational states : Behavioural and physiological evidence

    NARCIS (Netherlands)

    Koolhaas, J.M.; de Boer, S.F.; Bohus, B.G J

    This paper will critically discuss the available behavioural and neurobiological evidence for the existence of motivational systems and motivational states on the basis of our studies on aggressive behaviour in male rats and mice. Three types of evidence will be discussed. First, some behavioural

  5. Directed Motivational Currents: Using Vision to Create Effective Motivational Pathways

    Science.gov (United States)

    Muir, Christine; Dörnyei, Zoltán

    2013-01-01

    Vision, that is, the mental representation of the sensory experience of a future goal state (involving imagination and imagery), is currently at the forefront of motivational innovation, and in recent years it has been seen increasingly more often in the motivational tool kit of practicing language teachers. Theories such as Dörnyei's L2…

  6. Client Motivation for Therapy Scale: a measure of intrinsic motivation, extrinsic motivation, and amotivation for therapy.

    Science.gov (United States)

    Pelletier, L G; Tuson, K M; Haddad, N K

    1997-04-01

    The purpose of this study was to examine the psychometric properties of a new measure of client motivation for therapy, the Client Motivation for Therapy Scale. This scale is designed to measure client's Intrinsic Motivation, four forms of regulation for Extrinsic Motivation (integrated, identified, introjected, and external regulation), and Amotivation for therapy. These subscales correspond to different forms of motivation identified by Deci and Ryan (1985) and fall along a self-determination continuum. An experimental version of the scale, along with related scales, was distributed to a total sample of 138 clients involved in therapy. The results supported the factor structure of the scale and revealed a satisfactory level of internal consistency. Correlations among the subscales revealed a simplex pattern that, in general, provides support for the self-determination continuum and the construct validity of the scale. Implications for research on client motivation for therapy are discussed.

  7. [Team motivation and motivational strategies adopted by nurses].

    Science.gov (United States)

    Bezerra, Felipa Daiana; Andrade, Marta Francisca da Conceição; Andrade, Joseilze Santos de; Vieira, Maria Jésia; Pimentel, Deborah

    2010-01-01

    Qualitative study held in an emergency hospital in Aracaju-SE, which aimed to know the perception of nurses about what is a motivated nursing team, to identify possible motivational policies used by them and if they are consistent with the policies proposed by Frederick Herzberg in his theory. Of the 20 nurses participants, the most understood the motivation as a set of techniques possible to shape the behavior of the individual at work, linking it to extrinsic factors and 60% did not consider his team motivated. The types of motivational policies that usually apply realized that these correspond to intrinsic factors aimed at self recovery and self realization of individuals in the tasks running.

  8. Motivating Students to Do Homework

    Science.gov (United States)

    Kontur, Frederick J.; Terry, Nathan B.

    2014-01-01

    How do you motivate students to do their homework? Some instructors make students' homework scores a significant percentage of the final course grade. In that case, how much course credit is required? Some instructors do not grade homework at all, instead relying on students' intrinsic motivation to learn the course material. Will this actually…

  9. In reality, I motivate myself!

    DEFF Research Database (Denmark)

    Mariager-Anderson, Kristina; Cort, Pia; Thomsen, Rie

    2016-01-01

    lifelong learners constituting the latter as a ‘problem’. The EU call is to make people active, with an underlying assumption of people not being motivated. This article explores how one such ‘inactive’ group, low-skilled workers, narrates motivation for learning, work and other activities through a work...

  10. Innovation Motivation and Artistic Creativity

    Science.gov (United States)

    Joy, Stephen P.

    2005-01-01

    Innovation motivation is a social learning model of originality comprising two variables: the need to be different and innovation expectancy. This study examined their contribution to artistic creativity in a sample of undergraduates. Participants completed measures of both innovation motivation variables as well as intelligence, adjustment, and…

  11. Intrinsic Motivation in Physical Education

    Science.gov (United States)

    Davies, Benjamin; Nambiar, Nathan; Hemphill, Caroline; Devietti, Elizabeth; Massengale, Alexandra; McCredie, Patrick

    2015-01-01

    This article describes ways in which educators can use Harter's perceived competence motivation theory, the achievement goal theory, and self-determination theory to develop students' intrinsic motivation to maintain physical fitness, as demonstrated by the Sound Body Sound Mind curriculum and proven effective by the 2013 University of…

  12. Motivation in Collaborative Knowledge Creation

    NARCIS (Netherlands)

    Hendriks, P.H.J.; Sousa, C.A.A.; Schwartz, D.; Te'eni, D.

    2011-01-01

    The importance of motivation in knowledge management (KM) debates is now generally acknowledged. Motivation affects the overall quality of knowledge used and produced in the work situation, the willingness to contribute to KM systems, the willing engagement in knowledge sharing and many other

  13. Motivational Issues in Knowledge Work

    Directory of Open Access Journals (Sweden)

    Anca BOGDAN

    2008-01-01

    Full Text Available The paper discusses the place of emotions in modern theories of motivation, and the influence of the knowledge-oriented paradigm on redefining motivation and rethinking ways of rendering work, knowledge work, in particular, more efficient, in a society in which human participation and deployment of intellectual capital become key factors of success, replacing traditional, tangible-focused, factors of production.

  14. Gender Differences in Moral Motivation

    Science.gov (United States)

    Nunner-Winkler, Gertrud; Meyer-Nikele, Marion; Wohlrab, Doris

    2007-01-01

    Moral gender differences have been discussed in terms of Kohlbergian stages and content of orientations and taken to correspond to universal stable male and female features. The present study instead focuses on moral motivation and explains differences in terms of role expectations. We assessed moral motivation in 203 adolescents by a newly…

  15. Home Education: The Social Motivation

    Science.gov (United States)

    Beck, Christian W.

    2010-01-01

    Data from a Norwegian survey show correlation between a student's socially related problems at school and the parent's social motivation for home education. I argue that more time spent at school by a student could result in more socially related problems at school, which can explain an increase in social motivation for home education.

  16. Motivation and Second Language Learning

    Institute of Scientific and Technical Information of China (English)

    郭建业

    2007-01-01

    Motivation, which is one of the individual differences, contributes a lot to the success and failure in second language learning. This essay focus on the discussion of the definition, types, effect and implications of motivation in second language learning with the aim of promoting learners' learning proficiency.

  17. Logistical Factors in Teachers' Motivation

    Science.gov (United States)

    Daniels, Erika

    2016-01-01

    Research in education and psychology contributes to an understanding of how educators create contexts for learning that encourage intrinsic motivation and increase academic achievement. In this article, the researcher investigated how teachers themselves define effectiveness and identified what factors influence their motivation, both positively…

  18. How decision reversibility affects motivation

    NARCIS (Netherlands)

    Bullens, L.; van Harreveld, F.; Förster, J.; Higgins, T.E.

    2014-01-01

    The present research examined how decision reversibility can affect motivation. On the basis of extant findings, it was suggested that 1 way it could affect motivation would be to strengthen different regulatory foci, with reversible decision making, compared to irreversible decision making,

  19. How decision reversibility affects motivation.

    Science.gov (United States)

    Bullens, Lottie; van Harreveld, Frenk; Förster, Jens; Higgins, Tory E

    2014-04-01

    The present research examined how decision reversibility can affect motivation. On the basis of extant findings, it was suggested that 1 way it could affect motivation would be to strengthen different regulatory foci, with reversible decision making, compared to irreversible decision making, strengthening prevention-related motivation relatively more than promotion-related motivation. If so, then decision reversibility should have effects associated with the relative differences between prevention and promotion motivation. In 5 studies, we manipulated the reversibility of a decision and used different indicators of regulatory focus motivation to test these predictions. Specifically, Study 1 tested for differences in participants' preference for approach versus avoidance strategies toward a desired end state. In Study 2, we used speed and accuracy performance as indicators of participants' regulatory motivation, and in Study 3, we measured global versus local reaction time performance. In Study 4, we approached the research question in a different way, making use of the value-from-fit hypothesis (Higgins, 2000, 2002). We tested whether a fit between chronic regulatory focus and focus induced by the reversibility of the decision increased participants' subjective positive feelings about the decision outcome. Finally, in Study 5, we tested whether regulatory motivation, induced by decision reversibility, also influenced participants' preference in specific product features. The results generally support our hypothesis showing that, compared to irreversible decisions, reversible decisions strengthen a prevention focus more than a promotion focus. Implications for research on decision making are discussed.

  20. Philanthropic behaviour and motives

    Directory of Open Access Journals (Sweden)

    Vladimír Hyánek

    2013-01-01

    Full Text Available Even though philanthropy tends to be considered a sociological theme rather than an economic one, it poses a number of questions that challenge economists as well. We chose to address the following: How can economists contribute to the theories related to philanthropy? We examine some terms that are used in public economics theory and use them to explore the issues of philanthropy like Samaritan’s Dilemma, the Prisoner’s Dilemma, and the Free-Rider Problem, which we consider to be interesting and inspiring (Stone, 2008. We have to find and identify the social values of donors and volunteers rather than their economic values, because economists are not fully able to explain empathy, altruism, and helpful behaviour using traditional economic principles (Rutherford, 2008. The theoretical frame is supported by relevant empirical data. Before starting a large-scale survey, we decided to conduct smaller pre-research probes into people’s attitudes towards altruism, philanthropy, and giving. Even though our sample was not fully representative, the responses that we collected generated interesting findings about people’s views and attitudes. The first wave of data was collected between February and April 2009; the second wave between February and April 2010.Because of this pilot research mission and because of the budget restriction too, the non-representative sample of 823 respondents has been used; students of our Public Economics study programme were used as interviewers. They have also obtained a proper training of the professional sociologist. Students utilized the face to face interviewing method; non-standardized questions were immediately recorded into the reply form. Questions were divided into three groups with typical characteristics. The first one focuses on personal (individual motives for financial donating (only financial gifts for non-profit organizations. Second part examines the attitudes of individual towards the non

  1. The motivation to express prejudice.

    Science.gov (United States)

    Forscher, Patrick S; Cox, William T L; Graetz, Nicholas; Devine, Patricia G

    2015-11-01

    Contemporary prejudice research focuses primarily on people who are motivated to respond without prejudice and the ways in which unintentional bias can cause these people to act in a manner inconsistent with this motivation. However, some real-world phenomena (e.g., hate speech, hate crimes) and experimental findings (e.g., Plant & Devine, 2001, 2009) suggest that some prejudice is intentional. These phenomena and findings are difficult to explain solely from the motivations to respond without prejudice. We argue that some people are motivated to express prejudice, and we develop the Motivation to Express Prejudice Scale (MP) to measure this motivation. In 7 studies involving more than 6,000 participants, we demonstrate that, across scale versions targeted at Black people and gay men, the MP has good reliability and convergent, discriminant, and predictive validity. In normative climates that prohibit prejudice, the internal and external motivations to express prejudice are functionally nonindependent, but they become more independent when normative climates permit more prejudice toward a target group. People high in the motivation to express prejudice are relatively likely to resist pressure to support programs promoting intergroup contact and to vote for political candidates who support oppressive policies. The motivation to express prejudice predicted these outcomes even when controlling for attitudes and the motivations to respond without prejudice. This work encourages contemporary prejudice researchers to give greater consideration to the intentional aspects of negative intergroup behavior and to broaden the range of phenomena, target groups, and samples that they study. (c) 2015 APA, all rights reserved).

  2. Understanding Teenagers' motivation in Participatory Design

    DEFF Research Database (Denmark)

    Iversen, Ole Sejer; Dindler, Christian; Hansen, Elin

    2014-01-01

    -established PD tools and techniques, a deeper understanding of teenagers’ motivation and motives is essential to understand how tools and techniques can made to support teenagers motivation. We outline a Cultural Historical Activity Theoretical approach to teenagers’ motives and motivation as a frame...

  3. Motivations for Extradyadic Infidelity Revisited.

    Science.gov (United States)

    Selterman, Dylan; Garcia, Justin R; Tsapelas, Irene

    2017-12-15

    Relationship infidelities are motivated by many distinct factors, with previous research indicating motivations of dissatisfaction, neglect, anger, and sexual desire (Barta & Kiene, 2005). We expand on this by demonstrating additional, empirically distinct motivations for infidelity. Using an Internet-based questionnaire, participants (N = 495), most of whom were young adults, self-reported their infidelities. In addition to evidence for previously studied motivations, our data demonstrate additional factors, including lack of love ("I had 'fallen out of love with' my primary partner"), low commitment ("I was not very committed to my primary partner"), esteem ("I wanted to enhance my popularity"), gaining sexual variety ("I wanted a greater variety of sexual partners"), and situational factors ("I was drunk and not thinking clearly"). Our results also show personality correlates with infidelity motivations. Consistent with predictions, attachment insecurity was associated with motivations of anger, lack of love, neglect, low commitment, and esteem, while unrestricted sociosexual orientation was associated with sexual variety. Implicit beliefs (e.g., growth, destiny, romanticism) were differentially associated with sexual desire, low commitment, lack of love, and neglect. These findings highlight multifaceted motivations underlying infidelity, moving beyond relationship deficit models of infidelity, with implications for research and psychotherapy involving people's romantic and sexual relationships.

  4. Harnessing motivation to alleviate neglect

    Directory of Open Access Journals (Sweden)

    Charlotte eRussell

    2013-06-01

    Full Text Available The syndrome of spatial neglect results from the combination of a number of deficits in attention, with patients demonstrating both spatially lateralised and non-lateralised impairments. Previous reports have hinted that there may be a motivational component to neglect and that modulating this might alleviate some of the debilitating symptoms. Additionally, recent work on the effects of reward on attention in healthy participants has revealed improvements across a number of paradigms. As the primary deficit in neglect has been associated with attention, this evidence for reward’s effects is potentially important. However, until very recently there have been few empirical studies addressing this potential therapeutic avenue. Here we review the growing body of evidence that attentional impairments in neglect can be reduced by motivation, for example in the form of preferred music or anticipated monetary reward, and discuss the implications of this for treatments for these patients. Crucially these effects of positive motivation are not observed in all patients with neglect, suggesting that the consequences of motivation may relate to individual lesion anatomy. Given the key role of dopaminergic systems in motivational processes, we suggest that motivational stimulation might act as a surrogate for dopaminergic stimulation. In addition, we consider the relationship between clinical post stroke apathy and lack of response to motivation.

  5. [Health behavior change: motivational interviewing].

    Science.gov (United States)

    Pócs, Dávid; Hamvai, Csaba; Kelemen, Oguz

    2017-08-01

    Public health data show that early mortality in Hungary could be prevented by smoking cessation, reduced alcohol consumption, regular exercise, healthy diet and increased adherence. Doctor-patient encounters often highlight these aspects of health behavior. There is evidence that health behavior change is driven by internal motivation rather than external influence. This finding has led to the concept of motivational interview, which is a person-centered, goal-oriented approach to counselling. The doctor asks targeted questions to elicit the patient's motivations, strengths, internal resources, and to focus the interview around these. The quality and quantity of the patient's change talk is related to better outcomes. In addition, the interview allows the patient to express ambivalent feelings and doubts about the change. The doctor should use various communication strategies to resolve this ambivalence. Furthermore, establishing a good doctor-patient relationship is the cornerstone of the motivational interview. An optimal relationship can evoke change talk and reduce the patient's resistance, which can also result in a better outcome. The goal of the motivational interview is to focus on the 'why' to change health behavior rather than the 'how', and to utilize internal motivation instead of persuasion. This is the reason why motivational interview has become a widely-accepted evidence based approach. Orv Hetil. 2017; 158(34): 1331-1337.

  6. From Electrons Paired to Electric Power Delivered- A Personal Journey in Research and Applications of Superconductivity at IBM, EPRI, and Beyond

    Science.gov (United States)

    Grant, Paul

    2014-03-01

    This talk will reprise a personal journey by the speaker in industrial and applied physics, commencing with his employment by IBM at age 17 in the early 1950s, and continuing through his corporate sponsored undergraduate and graduate years at Clarkson and Harvard Universities, resulting in 1965 in a doctorate in applied physics from the latter. He was subsequently assigned by IBM to its research division in San Jose (now Almaden), where he initially carried out both pure and applied theoretical and experimental investigations encompassing a broad range of company-related product technologies...storage, display, printer and data acquisition hardware and software. In 1973, he undertook performing DFT and quantum Monte Carlo calculations in support of group research in the then emerging field of organic and polymer superconductors, a very esoteric pursuit at the time. Following upon several corporate staff assignments involving various product development and sales strategies, in 1982 he was appointed manager of the cooperative phenomena group in the Almaden Research Center, which beginning in early 1987, made significant contributions to both the basic science and applications of high temperature superconductivity (HTSC). In 1993, after a 40-year career, he retired from IBM to accept a Science Fellow position at the Electric Power Research Institute (EPRI) where he funded power application development of superconductivity. In 2004, he retired from his EPRI career to undertake ``due diligence'' consulting services in support of the venture capital community in Silicon Valley. As a ``hobby,'' he currently pursues and publishes DFT studies in hope of discovering the pairing mechanism of HTSC. In summary, the speaker's career in industrial and applied physics demonstrates one can combine publishing a record three PRLs in one month with crawling around underground in substations with utility lineman helping install superconducting cables, along the way publishing 10

  7. Students’ Motivation in Speaking English

    Directory of Open Access Journals (Sweden)

    Mas Darul Ihsan

    2016-05-01

    Full Text Available As the English teacher in the classroom, there will be some problems or conditions need to be accomplished. Teacher will see some of the students are very motivated, motivated or even feeling ignored in studying English. The learners who have contacted with English will find that some features are quite easy and extremely difficult. One of the more complicated problems of second or foreign languages learning and  teaching has been to define and apply the construct of motivation in the classroom. Motivation is a concept without physical reality, we cannot see motivation; we see effort, interest, attitude and desire. For speaking, it is important first to give competence and then performance. Competence is more likely to the extent a communicator is motivated to be so. Motivation is the extent to which a communicator is drawn towards or pushed away from communicating competently in a given context then performed. This is a descriptive  quantitative research. The data obtained from the questionnaire distributed and analyzed to get the result.  The date taken from the students of Muhammadiyah 1 Senior High School Gresik in Easy-Speaking course. The researcher wanted to know the students’ motivation in practicing speaking English in Easy-Speaking course. The results show that 1 the learners effort in practicing speaking English is 56.1 %. 2 The learners’ interest in practicing speaking English is 49.7 %. 3 The learners’ attitude towards practicing speaking English is 59.9 %. 4 The learners’ desire in practicing speaking English is 71.43 %. Then, some suggestions are made: 1 Using media is very important both to increase the learners’ motivation and to give a big opportunity to learners to explore their idea. 2 Giving more variations techniques in teaching and learning process in order do not monotonous. 3 Giving prizes, encouraging and giving extra points for learners who can express their idea by speaking English well. 4 Creating

  8. The Effect of Motivational Practices on Volunteer Motivation

    African Journals Online (AJOL)

    snyambegera

    Kreitner and Kinicki (2007) have defined motivation as those ... It has been argued that volunteers are the most important group of customers for a voluntary ... Fisher (2003) asserts that the search for the links between job satisfaction and job.

  9. Modeling motive activation in the Operant Motives Test

    DEFF Research Database (Denmark)

    Runge, J. Malte; Lang, Jonas W. B.; Engeser, Stefan

    2016-01-01

    The Operant Motive Test (OMT) is a picture-based procedure that asks respondents to generate imaginative verbal behavior that is later coded for the presence of affiliation, power, and achievement-related motive content by trained coders. The OMT uses a larger number of pictures and asks...... on the dynamic model were .52, .62, and .73 for the affiliation, achievement, and power motive in the OMT, respectively. The second contribution of this article is a tutorial and R code that allows researchers to directly apply the dynamic Thurstonian IRT model to their data. The future use of the OMT...... respondents to provide more brief answers than earlier and more traditional picture-based implicit motive measures and has therefore become a frequently used measurement instrument in both research and practice. This article focuses on the psychometric response mechanism in the OMT and builds on recent...

  10. How Do We Motivate Reading Comprehension?

    Science.gov (United States)

    Shanahan, Timothy

    1982-01-01

    Considers the nature of motivation and its place in the development of reading comprehension. Uses A. Maslow's hierarchy of motivation as a heuristic for examining the motivational quality of several teaching methods commonly proposed for comprehension instruction. (FL)

  11. Measuring Academic Motivation of Matriculating College Freshmen.

    Science.gov (United States)

    Baker, Robert W.; Siryk, Bohdan

    1984-01-01

    Administered the Academic Motivation Scale to three successive classes of college freshmen (N=944). Results indicated the Academic Motivation Scale's reliability was more than adequate for research use and significantly related to validity criteria reflecting motivation for academic work. (JAC)

  12. Consumer motivations for sustainable consumption:

    DEFF Research Database (Denmark)

    Rezvani, Zeinab; Jansson, Johan; Bengtsson, Maria

    2018-01-01

    Recent conceptual studies identify gain, normative and hedonic factors as three categories of motivations of consumer proenvironmental behavior. However, empirical understanding of how these motivations interact and affect proenvironmental behavior is limited. This study is based on a survey of car...... owners in Sweden (N = 573) and uses structural equation modeling to analyze the data. The empirical findings point to the importance of all three motivations (gain, normative and hedonic) in consumer electric vehicle adoption intentions. Furthermore, for consumers who perceive high social norms regarding...

  13. Motivation for pilgrimage: using theory to explore motivations

    OpenAIRE

    Ruth Blackwell

    2010-01-01

    This article is a discussion of the motivations for pilgrimage and it will draw upon theories of motivation to explore the continuing attraction of pilgrimage in contemporary times. This discussion is located within the field of Event Management. Event Management is a fast growing discipline which focuses on the design, production and management of planned events, such as festivals, celebrations, conferences, fund-raisers and so on. Clearly pilgrimages, as planned events, fit into this defini...

  14. Motivation for pilgrimage: using theory to explore motivations

    Directory of Open Access Journals (Sweden)

    Ruth Blackwell

    2010-01-01

    Full Text Available This article is a discussion of the motivations for pilgrimage and it will draw upon theories of motivation to explore the continuing attraction of pilgrimage in contemporary times. This discussion is located within the field of Event Management. Event Management is a fast growing discipline which focuses on the design, production and management of planned events, such as festivals, celebrations, conferences, fund-raisers and so on. Clearly pilgrimages, as planned events, fit into this definition. In this context, it is essential to recognise the importance of understanding the motives and needs of event customers so that we can plan to help our customers satisfy their motives. Whilst it might seem abhorrent and commercial to talk of pilgrims as customers, pilgrimages and religious sites have become more and more commodified and increasingly are deemed to need professional management. Key theories of motivation will be compared in order to identify the prime motivating factors underpinning people’s decisions to make pilgrimages.

  15. Employee motivation improvement at "Drogas" shop

    OpenAIRE

    Konno, Viktorija

    2012-01-01

    Work : Employee motivation improvement at “Drogas” shop for getting baccalaureate in science management. This work includes four parts. In the first section author explained the definition of motivation, there was reviewed motivation's role in enterprise. Author reviewed total motivation's model, which models exist for a long while and how they were changing in process of time. The second part contains wide information about motivation's theories and description of motivation's t...

  16. Volunteers and Their Motivation for Canistherapy

    OpenAIRE

    Saláková, Klára

    2014-01-01

    The bachelor thesis on the topic: "Volunteers and their motivation for canistherapy" is divided into the theoretical and practical part. The aim is to find out what motives lead people to do voluntary work in canistherapy. The theoretical part defines the basic concepts of motivation, volunteering and canistherapy, because these concepts are related with the name and with the aim of my work. First, there is defined motivation, basic concepts of motivation in relation to personality, motives a...

  17. The implementation of the CDC version of RELAP5/MOD1/019 on an IBM compatible computer system (AMDAHL 470/V8)

    International Nuclear Information System (INIS)

    Kolar, W.; Brewka, W.

    1984-01-01

    RELAP5/MOD1 is an advanced one-dimensional best estimate system code, which is used for safety analysis studies of nuclear pressurized water reactor systems and related integral and separate effect test facilities. The program predicts the system response for large break, small break LOCA and special transients. To a large extent RELAP5/MOD1 is written in Fortran, only a small part of the program is coded in CDC assembler. RELAP5/MOD1 was developed on the CDC CYBER 176 at INEL*. The code development team made use of CDC system programs like the CDC UPDATE facility and incorporated in the program special purpose software packages. The report describes the problems which have been encountered when implementing the CDC version of RELAP5/MOD1 on an IBM compatible computer systems (AMDAHL 470/V8)

  18. What on earth is a mainframe ? an introduction to IBM zSeries mainframes and z/OS operating systems for total beginners

    CERN Document Server

    Stephens, David

    2008-01-01

    Looking for a "Mainframes for Beginners" book? Need to learn about z/OS fast? Then this is the book you need. This is the perfect introduction to IBM System z Mainframes and z/OS. Avoiding technical jargon, it gives you the basic facts in clear, light-hearted, entertaining English. You'll quickly learn what Mainframes are, what they do, what runs on them, and terms and terminology you need to speak Mainframe-ese. But it's not all technical. There's also invaluable information about the people that work on Mainframes, Mainframe management issues, new Mainframe trends, and other facts that don't seem to be written down anywhere else. What On Earth is a Mainframe is the closest you'll get to a "Mainframes for Dummies" book. Programmers, managers, recruitment consultants, and industry commentators will all find this book their new best friend when trying to understand the Mainframe world.

  19. RL5SORT/RL5PLOT. A graphite package for the JRC-Ispra IBM version of RELAP5/MOD1

    International Nuclear Information System (INIS)

    Kolar, W.; Brewka, W.

    1984-01-01

    The present report describes the programs RL5SORT and RL5PLOT, their implementation and ''how to use''. Both programs base on the IBM version of RELAP5 as developed at JRC-ISPRA. RL5SORT creates from the output file (restart plot file) of a RELAP5 calculation data files, which serve as input data base for the program RL5PLOT. RL5PLOT retrieves the previous stored data records (minor edit quantities of RELAP5), allows arithmetic operations with the retrieved data and enables a print or graphic output on the terminal screen of a TEKTRONIX graphic terminal. A set of commands, incorporated in the program RL5PLOT, facilitates the user's work. Program RL5SORT has been developed as a batch program, while RL5PLOT has been conceived for interactive working mode

  20. Survivability enhancement study for C/sup 3/I/BM (communications, command, control and intelligence/battle management) ground segments: Final report

    Energy Technology Data Exchange (ETDEWEB)

    1986-10-30

    This study involves a concept developed by the Fairchild Space Company which is directly applicable to the Strategic Defense Initiative (SDI) Program as well as other national security programs requiring reliable, secure and survivable telecommunications systems. The overall objective of this study program was to determine the feasibility of combining and integrating long-lived, compact, autonomous isotope power sources with fiber optic and other types of ground segments of the SDI communications, command, control and intelligence/battle management (C/sup 3/I/BM) system in order to significantly enhance the survivability of those critical systems, especially against the potential threats of electromagnetic pulse(s) (EMP) resulting from high altitude nuclear weapon explosion(s). 28 figs., 2 tabs.

  1. Fitness: Tips for Staying Motivated

    Science.gov (United States)

    Healthy Lifestyle Fitness Fitness is for life. Motivate yourself with these practical tips. By Mayo Clinic Staff Have ... 27, 2015 Original article: http://www.mayoclinic.org/healthy-lifestyle/fitness/in-depth/fitness/art-20047624 . Mayo Clinic ...

  2. Tensor structure for Nori motives

    OpenAIRE

    Barbieri-Viale, Luca; Huber, Annette; Prest, Mike

    2018-01-01

    We construct a tensor product on Freyd's universal abelian category attached to an additive tensor category or a tensor quiver and establish a universal property. This is used to give an alternative construction for the tensor product on Nori motives.

  3. Priming motivation through unattended speech.

    Science.gov (United States)

    Radel, Rémi; Sarrazin, Philippe; Jehu, Marie; Pelletier, Luc

    2013-12-01

    This study examines whether motivation can be primed through unattended speech. Study 1 used a dichotic-listening paradigm and repeated strength measures. In comparison to the baseline condition, in which the unattended channel was only composed by neutral words, the presence of words related to high (low) intensity of motivation led participants to exert more (less) strength when squeezing a hand dynamometer. In a second study, a barely audible conversation was played while participants' attention was mobilized on a demanding task. Participants who were exposed to a conversation depicting intrinsic motivation performed better and persevered longer in a subsequent word-fragment completion task than those exposed to the same conversation made unintelligible. These findings suggest that motivation can be primed without attention. © 2013 The British Psychological Society.

  4. Sustaining motivation for continuous improvement

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Kofoed, Lise Busk

    2007-01-01

    The objective of this article is to explore possibilities for improving motivation for participation in Continuous Improvement (CI). Due to a number of issues, for example, challenges with measuring outcomes of CI activities on performance, the inherent slower, incremental rather than big bang...... activities is an important issue for managers. The paper begins with a short description of CI, with an emphasis on barriers to successful implementation cited in the literature. Thereafter, a number of widely-acknowledged-albeit perhaps somewhat dated-theories of motivation are explored in relation...... to the elements of CI in practice. Based on their own experiences with CI implementation in numerous action-research based studies, the authors propose a scenario for motivating CI participation through emphasis on factors common to the presented motivational theories. The paper ends with insights into future...

  5. Motivational Interviewing by School Nurses

    DEFF Research Database (Denmark)

    Bonde, Ane; Bentsen, Peter; Hindhede, Anette Lykke

    Title: Motivational Interviewing by School Nurses: Spirit, Techniques, and Dilemmas in the Prevention of Child Obesity Introduction : School nurses play a central role in school-based, preventive health services in Denmark (National Board of Health, 2011), and they may play an important role...... a prevention strategy targeting children with a high risk of obesity with an intervention conducted by school nurses using motivational interviewing.Motivational interviewing is a counselling method to bring about behavioural change (Miller and Rollnick 1995). Effect has been documented for a range of problem...... behaviours related to lifestyle diseases in adults (Rubak et al. 2005; Söderlund et al. 2011). The use of motivational interviewing by school nurses for the prevention of child obesity in a family intervention is still new, and evidence on the potentials and problems is scarce (Resnicow, Davis and Rollnick...

  6. Geochemistry of Volcanic Rocks from International Ocean Discovery Program (IODP) Site 1438, Amami Sankaku Basin: Implications for Izu-Bonin-Mariana (IBM) Arc Initiation

    Science.gov (United States)

    Hickey-Vargas, R.; Ishizuka, O.; Yogodzinski, G. M.; Bizimis, M.; Savov, I. P.; McCarthy, A. J.; Arculus, R. J.; Bogus, K.

    2015-12-01

    IODP Expedition 351 drilled 150 m of volcanic basement overlain by 1461 m of sedimentary material at Site 1438 in the Amami Sankaku basin, just west of the Kyushu Palau Ridge, the locus of IBM arc initiation. Age interpretations based on biostratigraphy (Arculus et al., Nat. Geosci., in-press) determined that the age of the basement section is between 64 and 51 Ma, encompassing the age of the earliest volcanic products of the IBM arc. The Site 1438 volcanic basement consists of multiple flows of aphyric microcrystalline to finely crystalline basalts containing plagioclase and clinopyroxene with rare olivine pseudomorphs. New XRF major and ICPMS trace element data confirm findings of shipboard analysis that the basalts are moderately differentiated (6-14 % MgO; Mg# = 51-83; 73-490 ppm Cr and 58-350 ppm Ni) with downcore variations related to flow units. Ti/V and Ti/Sc ratios are 16-27 and 75-152, respectively, with lowest values at the base of the core. One prominent characteristic of the basalts is their depletion of immobile highly incompatible elements compared with MORB. Basalts have MORB-normalized La/Nd of 0.5 to 0.9, and most have Th/La 3 and primitive mantle normalized La/Yb > 1. Our results suggest that mantle melting at the onset of subduction involved exceptionally depleted sources. Enrichment over time may be related to increasing subduction inputs and/or other processes, such as entrainment of fertile asthenosphere during extension of the overriding plate.

  7. Motivational Rehabilitation using Serious Games

    OpenAIRE

    Antoni Jaume i Capó; Javier Varona Gómez; Gabriel Moyà; Francisco Perales

    2013-01-01

    Research studies show that serious games help to motivate users in rehabilitation processes, and rehabilitation results are better when users are motivated. In long term rehabilitation for maintaining capacities, the demotivation of chronic patients is common. In this work, we have implemented balance rehabilitation video game for cerebral palsy patients. The video game was developed using the prototype development paradigm and following desirable features for rehabilitation serious games pre...

  8. Assessing school performance and motivation

    OpenAIRE

    Pavelková, Isabella; Kubíková, Katerina

    2016-01-01

    We verify the theoretical hypothesis that individual reference norm helps the development of positive achievement motivation and lowers the performance fear of pupils. The research was carried out with pupils aged 9 to 12 years. The article presents the results of the research in using reference norms with 61 teachers in connection with achievement motivation of their 1144 pupils. The research also mapped the real school situations for the teachers involved, based partly on observation during...

  9. Motivators of teacher job satisfaction

    OpenAIRE

    Juozaitienė, Agnė; Simonaitienė, Berita

    2011-01-01

    Article is seeking to answer these questions: what factors function as motivators and enhance teacher job satisfaction and which of the motivators are manifested at school? These questions are significant from a theoretical as well as practical point of view. The research problem addressed in the article encompasses three fields and is revealed in three parts of the article. The first part analyzes the notion of teacher job satisfaction and influencing factors. The second part is dedicated to...

  10. Hedonic Motivations for Online Shopping

    OpenAIRE

    Pui-Lai To; E-Ping Sung

    2014-01-01

    The purpose of this study is to investigate hedonic online shopping motivations. A qualitative analysis was conducted to explore the factors influencing online hedonic shopping motivations. The results of the study indicate that traditional hedonic values, consisting of social, role, self-gratification, learning trends, pleasure of bargaining, stimulation, diversion, status, and adventure, and dimensions of flow theory, consisting of control, curiosity, enjoyment, and telepresence, exist in t...

  11. Handbook of motivation at school

    CERN Document Server

    Miele, David B

    2016-01-01

    The second edition of the Handbook of Motivation at School presents an integrated compilation of theory and research in the field. With chapters by leading experts, this book covers the major theoretical perspectives in the field as well as their application to instruction, learning, and social adjustment at school. Section I focuses on theoretical perspectives and major constructs, Section II on contextual and social influences on motivation, and Section III on new directions in the field.

  12. Motivation for the teaching profession

    OpenAIRE

    Křížová, Kateřina

    2012-01-01

    Anotace: The thesis "The motivation for the teaching profession" dealt with fundamental problems of motivation to the teaching profession. In the theoretical part, we have focused on general characteristics of terms that pertain to the teaching profession, particularly the theory of the teaching profession, the choice of the teaching profession, the phase of the teaching profession, teacher typology, the role of teacher training and professionalization of teachers, but also washed into the te...

  13. The self-regulation of motivation: Motivational strategies as mediator between motivational beliefs and engagement for learning.

    NARCIS (Netherlands)

    Smit, Karin; De Brabander, Cornelis; Boekaerts, Monique; Martens, Rob

    2017-01-01

    In this research we studied students´ motivational self-regulation as mediator between motivational beliefs and motivational outcomes. Dutch students in pre-vocational secondary education (N=3602, mean age 14) completed a questionnaire on five motivational strategies (Environmental Control,

  14. What motivates money donation? A study on external motivators

    Directory of Open Access Journals (Sweden)

    Nivea Coelho Degasperi

    Full Text Available Abstract The objective of this study is to identify external motivating factors that favor individual money donation. Methodologically, we adopted a descriptive and quantitative cross-sectional study. In order to collect data, we prepared a questionnaire containing 49 statements based on external motivating variables of regular individual money donation found in the literature on the subject. After testing the questionnaire, we applied it to 1073 Brazilians, regular money donors and we performed an exploratory factor analysis. Conclusively, we identified 8 external factors that motivate individual money donation: Trust, Reward, Leadership influences, Characteristics of the organization, Environmental influences, Personal benefits, Characteristics of beneficiaries and Future Interests. We expect that these 8 factors combined, could become a useful tool to improve the management of charitable organizations, especially in defining campaigns or other marketing strategies to attract new donors and raise funds on occasions that are favorable to individual money donation.

  15. The Measurement of Motivation with Science Students

    Science.gov (United States)

    Mubeen, Sarwat; Reid, Norman

    2014-01-01

    Motivation is an inner force that activates and provides direction to our thought, feelings and actions. Two main characteristics of motivation are goal directed behavior and persistence. Motivated people persistently work for the goal until it is achieved. This paper explores the nature of motivation in the context of learning and seeks to relate…

  16. Motivational Strategies in Medical English Classroom

    Institute of Scientific and Technical Information of China (English)

    TIAN Jun-ying

    2014-01-01

    Objective:To explore strategies to motivate students in the classroom of Medical English. Methods:The motivational strategies applied in medical English classroom including defining course goals early in the semester, appropriate teacher behavior, creating real context and giving helpful and frequent Feedback were recommended. Results & Conclusion: The motivational strategies make a positive impact on students’motivation in medical English classroom.

  17. A General Overview of Motivation in Linguistics

    Institute of Scientific and Technical Information of China (English)

    王航

    2014-01-01

    In recent years, the term of motivation in linguistics study has aroused the interests of scholars. Different studies of mo -tivation have been produced by different scholars. In this paper, the writer organizes the recent studies on motivation in linguistics. the paper is divided into three parts, the introduction of the term motivation, different types of motivation, and theories of moti -vation.

  18. Academic Motivation: Concepts, Strategies, and Counseling Approaches

    Science.gov (United States)

    Rowell, Lonnie; Hong, Eunsook

    2013-01-01

    Motivation is an important foundation of academic development in students. This article discusses academic motivation; its various component concepts in areas such as beliefs, goals, and values; and intrinsic and extrinsic motivation. It also presents major, widely studied theoretical perspectives of academic motivation and briefly illustrates…

  19. Corporate social responsibility motivations in Zambian SMEs

    NARCIS (Netherlands)

    Choongo, P.; van Burg, J.C.; Paas, L.J.; Masurel, Enno; Lungu, John

    2017-01-01

    This paper examines the motivations of different forms of corporate social responsibility (CSR) by small and medium-sized enterprises (SMEs) in an under-researched Sub-Saharan African country, Zambia. The results show that internal motivations (financial motivation and moral and ethical motivation)

  20. Work motivation of employees in MLM companies

    OpenAIRE

    Bittnerová, Martina

    2015-01-01

    The work is primarily concerned with problems of motivation in a multi-level marketing a sspecific method of management. The key concepts of word processing are, motivation work performance, motivation theories,Multilevel Marketing, Structural Company. The aim of this work is to analyze the motivational principles of professional performance in a multilevel marketing.