WorldWideScience

Sample records for message passing libraries

  1. McMPI – a managed-code message passing interface library for high performance communication in C#

    Holmes, Daniel John

    2012-01-01

    This work endeavours to achieve technology transfer between established best-practice in academic high-performance computing and current techniques in commercial high-productivity computing. It shows that a credible high-performance message-passing communication library, with semantics and syntax following the Message-Passing Interface (MPI) Standard, can be built in pure C# (one of the .Net suite of computer languages). Message-passing has been the dominant paradigm in high-pe...

  2. The specification of Stampi, a message passing library for distributed parallel computing

    Imamura, Toshiyuki; Takemiya, Hiroshi; Koide, Hiroshi

    2000-03-01

    At CCSE, Center for Promotion of Computational Science and Engineering, a new message passing library for heterogeneous and distributed parallel computing has been developed, and it is called as Stampi. Stampi enables us to communicate between any combination of parallel computers as well as workstations. Currently, a Stampi system is constructed from Stampi library and Stampi/Java. It provides functions to connect a Stampi application with not only those on COMPACS, COMplex Parallel Computer System, but also applets which work on WWW browsers. This report summarizes the specifications of Stampi and details the development of its system. (author)

  3. Stampi: a message passing library for distributed parallel computing. User's guide

    Imamura, Toshiyuki; Koide, Hiroshi; Takemiya, Hiroshi

    1998-11-01

    A new message passing library, Stampi, has been developed to realize a computation with different kind of parallel computers arbitrarily and making MPI (Message Passing Interface) as an unique interface for communication. Stampi is based on MPI2 specification. It realizes dynamic process creation to different machines and communication between spawned one within the scope of MPI semantics. Vender implemented MPI as a closed system in one parallel machine and did not support both functions; process creation and communication to external machines. Stampi supports both functions and enables us distributed parallel computing. Currently Stampi has been implemented on COMPACS (COMplex PArallel Computer System) introduced in CCSE, five parallel computers and one graphic workstation, and any communication on them can be processed on. (author)

  4. Stampi: a message passing library for distributed parallel computing. User's guide, second edition

    Imamura, Toshiyuki; Koide, Hiroshi; Takemiya, Hiroshi

    2000-02-01

    A new message passing library, Stampi, has been developed to realize a computation with different kind of parallel computers arbitrarily and making MPI (Message Passing Interface) as an unique interface for communication. Stampi is based on the MPI2 specification, and it realizes dynamic process creation to different machines and communication between spawned one within the scope of MPI semantics. Main features of Stampi are summarized as follows: (i) an automatic switch function between external- and internal communications, (ii) a message routing/relaying with a routing module, (iii) a dynamic process creation, (iv) a support of two types of connection, Master/Slave and Client/Server, (v) a support of a communication with Java applets. Indeed vendors implemented MPI libraries as a closed system in one parallel machine or their systems, and did not support both functions; process creation and communication to external machines. Stampi supports both functions and enables us distributed parallel computing. Currently Stampi has been implemented on COMPACS (COMplex PArallel Computer System) introduced in CCSE, five parallel computers and one graphic workstation, moreover on eight kinds of parallel machines, totally fourteen systems. Stampi provides us MPI communication functionality on them. This report describes mainly the usage of Stampi. (author)

  5. A real-time MPEG software decoder using a portable message-passing library

    Kwong, Man Kam; Tang, P.T. Peter; Lin, Biquan

    1995-12-31

    We present a real-time MPEG software decoder that uses message-passing libraries such as MPL, p4 and MPI. The parallel MPEG decoder currently runs on the IBM SP system but can be easil ported to other parallel machines. This paper discusses our parallel MPEG decoding algorithm as well as the parallel programming environment under which it uses. Several technical issues are discussed, including balancing of decoding speed, memory limitation, 1/0 capacities, and optimization of MPEG decoding components. This project shows that a real-time portable software MPEG decoder is feasible in a general-purpose parallel machine.

  6. Message passing for quantified Boolean formulas

    Zhang, Pan; Ramezanpour, Abolfazl; Zecchina, Riccardo; Zdeborová, Lenka

    2012-01-01

    We introduce two types of message passing algorithms for quantified Boolean formulas (QBF). The first type is a message passing based heuristics that can prove unsatisfiability of the QBF by assigning the universal variables in such a way that the remaining formula is unsatisfiable. In the second type, we use message passing to guide branching heuristics of a Davis–Putnam–Logemann–Loveland (DPLL) complete solver. Numerical experiments show that on random QBFs our branching heuristics give robust exponential efficiency gain with respect to state-of-the-art solvers. We also manage to solve some previously unsolved benchmarks from the QBFLIB library. Apart from this, our study sheds light on using message passing in small systems and as subroutines in complete solvers

  7. Message Passing Framework for Globally Interconnected Clusters

    Hafeez, M; Riaz, N; Asghar, S; Malik, U A; Rehman, A

    2011-01-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  8. Message passing with parallel queue traversal

    Underwood, Keith D [Albuquerque, NM; Brightwell, Ronald B [Albuquerque, NM; Hemmert, K Scott [Albuquerque, NM

    2012-05-01

    In message passing implementations, associative matching structures are used to permit list entries to be searched in parallel fashion, thereby avoiding the delay of linear list traversal. List management capabilities are provided to support list entry turnover semantics and priority ordering semantics.

  9. Blind sensor calibration using approximate message passing

    Schülke, Christophe; Caltagirone, Francesco; Zdeborová, Lenka

    2015-01-01

    The ubiquity of approximately sparse data has led a variety of communities to take great interest in compressed sensing algorithms. Although these are very successful and well understood for linear measurements with additive noise, applying them to real data can be problematic if imperfect sensing devices introduce deviations from this ideal signal acquisition process, caused by sensor decalibration or failure. We propose a message passing algorithm called calibration approximate message passing (Cal-AMP) that can treat a variety of such sensor-induced imperfections. In addition to deriving the general form of the algorithm, we numerically investigate two particular settings. In the first, a fraction of the sensors is faulty, giving readings unrelated to the signal. In the second, sensors are decalibrated and each one introduces a different multiplicative gain to the measurements. Cal-AMP shares the scalability of approximate message passing, allowing us to treat large sized instances of these problems, and experimentally exhibits a phase transition between domains of success and failure. (paper)

  10. High performance message passing for the ATLAS DAQ/EF-1 project

    Mornacchi, Giuseppe

    1999-01-01

    Summary form only. A message passing library has been developed in the context of the ATLAS DAQ/EF-1 project. It is used for time critical applications within the front-end part of the DAQ system, mainly to exchange data control messages between I/O processors. Key objectives of the design were low message overheads, efficient use of the data transfer buses, provision of broadcast functionality and a hardware and operating system independent implementation of the application interface. The design and implementation of the message passing library are presented. As required by the project, the implementation is based on commercial components, namely VMEbus, PCI, the Lynx-OS real-time operating system and an additional inter- processor link, PVIC. The latter offers broadcast functionality identified as being important to the overall performance of the message passing. In addition, performance benchmarks for all implementing buses are presented for both simple test programs and the full DAQ applications. (0 refs)...

  11. The serial message-passing schedule for LDPC decoding algorithms

    Liu, Mingshan; Liu, Shanshan; Zhou, Yuan; Jiang, Xue

    2015-12-01

    The conventional message-passing schedule for LDPC decoding algorithms is the so-called flooding schedule. It has the disadvantage that the updated messages cannot be used until next iteration, thus reducing the convergence speed . In this case, the Layered Decoding algorithm (LBP) based on serial message-passing schedule is proposed. In this paper the decoding principle of LBP algorithm is briefly introduced, and then proposed its two improved algorithms, the grouped serial decoding algorithm (Grouped LBP) and the semi-serial decoding algorithm .They can improve LBP algorithm's decoding speed while maintaining a good decoding performance.

  12. Future-based Static Analysis of Message Passing Programs

    Wytse Oortwijn

    2016-06-01

    Full Text Available Message passing is widely used in industry to develop programs consisting of several distributed communicating components. Developing functionally correct message passing software is very challenging due to the concurrent nature of message exchanges. Nonetheless, many safety-critical applications rely on the message passing paradigm, including air traffic control systems and emergency services, which makes proving their correctness crucial. We focus on the modular verification of MPI programs by statically verifying concrete Java code. We use separation logic to reason about local correctness and define abstractions of the communication protocol in the process algebra used by mCRL2. We call these abstractions futures as they predict how components will interact during program execution. We establish a provable link between futures and program code and analyse the abstract futures via model checking to prove global correctness. Finally, we verify a leader election protocol to demonstrate our approach.

  13. EXIT Chart Analysis of Binary Message-Passing Decoders

    Lechner, Gottfried; Pedersen, Troels; Kramer, Gerhard

    2007-01-01

    Binary message-passing decoders for LDPC codes are analyzed using EXIT charts. For the analysis, the variable node decoder performs all computations in the L-value domain. For the special case of a hard decision channel, this leads to the well know Gallager B algorithm, while the analysis can...... be extended to channels with larger output alphabets. By increasing the output alphabet from hard decisions to four symbols, a gain of more than 1.0 dB is achieved using optimized codes. For this code optimization, the mixing property of EXIT functions has to be modified to the case of binary message......-passing decoders....

  14. Protocol-Based Verification of Message-Passing Parallel Programs

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    We present ParTypes, a type-based methodology for the verification of Message Passing Interface (MPI) programs written in the C programming language. The aim is to statically verify programs against protocol specifications, enforcing properties such as fidelity and absence of deadlocks. We develo...

  15. Track-stitching using graphical models and message passing

    Van der Merwe, LJ

    2013-07-01

    Full Text Available In order to stitch tracks together, two tasks are required, namely tracking and track stitching. In this study track stitching is performed using a graphical model and message passing (belief propagation) approach. Tracks are modelled as nodes in a...

  16. A message passing algorithm for the evaluation of social influence

    Vassio, Luca; Fagnani, Fabio; Frasca, Paolo; Ozdaglar, Asuman

    2014-01-01

    In this paper, we define a new measure of node centrality in social networks, the Harmonic Influence Centrality, which emerges naturally in the study of social influence over networks. Next, we introduce a distributed message passing algorithm to compute the Harmonic Influence Centrality of each

  17. Statistics of Epidemics in Networks by Passing Messages

    Shrestha, Munik Kumar

    Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result

  18. Belief propagation decoding of quantum channels by passing quantum messages

    Renes, Joseph M

    2017-01-01

    The belief propagation (BP) algorithm is a powerful tool in a wide range of disciplines from statistical physics to machine learning to computational biology, and is ubiquitous in decoding classical error-correcting codes. The algorithm works by passing messages between nodes of the factor graph associated with the code and enables efficient decoding of the channel, in some cases even up to the Shannon capacity. Here we construct the first BP algorithm which passes quantum messages on the factor graph and is capable of decoding the classical–quantum channel with pure state outputs. This gives explicit decoding circuits whose number of gates is quadratic in the code length. We also show that this decoder can be modified to work with polar codes for the pure state channel and as part of a decoder for transmitting quantum information over the amplitude damping channel. These represent the first explicit capacity-achieving decoders for non-Pauli channels. (fast track communication)

  19. Belief propagation decoding of quantum channels by passing quantum messages

    Renes, Joseph M.

    2017-07-01

    The belief propagation (BP) algorithm is a powerful tool in a wide range of disciplines from statistical physics to machine learning to computational biology, and is ubiquitous in decoding classical error-correcting codes. The algorithm works by passing messages between nodes of the factor graph associated with the code and enables efficient decoding of the channel, in some cases even up to the Shannon capacity. Here we construct the first BP algorithm which passes quantum messages on the factor graph and is capable of decoding the classical-quantum channel with pure state outputs. This gives explicit decoding circuits whose number of gates is quadratic in the code length. We also show that this decoder can be modified to work with polar codes for the pure state channel and as part of a decoder for transmitting quantum information over the amplitude damping channel. These represent the first explicit capacity-achieving decoders for non-Pauli channels.

  20. Analysis and Design of Binary Message-Passing Decoders

    Lechner, Gottfried; Pedersen, Troels; Kramer, Gerhard

    2012-01-01

    Binary message-passing decoders for low-density parity-check (LDPC) codes are studied by using extrinsic information transfer (EXIT) charts. The channel delivers hard or soft decisions and the variable node decoder performs all computations in the L-value domain. A hard decision channel results...... message-passing decoders. Finally, it is shown that errors on cycles consisting only of degree two and three variable nodes cannot be corrected and a necessary and sufficient condition for the existence of a cycle-free subgraph is derived....... in the well-know Gallager B algorithm, and increasing the output alphabet from hard decisions to two bits yields a gain of more than 1.0 dB in the required signal to noise ratio when using optimized codes. The code optimization requires adapting the mixing property of EXIT functions to the case of binary...

  1. S-AMP: Approximate Message Passing for General Matrix Ensembles

    Cakmak, Burak; Winther, Ole; Fleury, Bernard H.

    2014-01-01

    the approximate message-passing (AMP) algorithm to general matrix ensembles with a well-defined large system size limit. The generalization is based on the S-transform (in free probability) of the spectrum of the measurement matrix. Furthermore, we show that the optimality of S-AMP follows directly from its......We propose a novel iterative estimation algorithm for linear observation models called S-AMP. The fixed points of S-AMP are the stationary points of the exact Gibbs free energy under a set of (first- and second-) moment consistency constraints in the large system limit. S-AMP extends...

  2. Fault-tolerant Agreement in Synchronous Message-passing Systems

    Raynal, Michel

    2010-01-01

    The present book focuses on the way to cope with the uncertainty created by process failures (crash, omission failures and Byzantine behavior) in synchronous message-passing systems (i.e., systems whose progress is governed by the passage of time). To that end, the book considers fundamental problems that distributed synchronous processes have to solve. These fundamental problems concern agreement among processes (if processes are unable to agree in one way or another in presence of failures, no non-trivial problem can be solved). They are consensus, interactive consistency, k-set agreement an

  3. Parallelization of a hydrological model using the message passing interface

    Wu, Yiping; Li, Tiejian; Sun, Liqun; Chen, Ji

    2013-01-01

    With the increasing knowledge about the natural processes, hydrological models such as the Soil and Water Assessment Tool (SWAT) are becoming larger and more complex with increasing computation time. Additionally, other procedures such as model calibration, which may require thousands of model iterations, can increase running time and thus further reduce rapid modeling and analysis. Using the widely-applied SWAT as an example, this study demonstrates how to parallelize a serial hydrological model in a Windows® environment using a parallel programing technology—Message Passing Interface (MPI). With a case study, we derived the optimal values for the two parameters (the number of processes and the corresponding percentage of work to be distributed to the master process) of the parallel SWAT (P-SWAT) on an ordinary personal computer and a work station. Our study indicates that model execution time can be reduced by 42%–70% (or a speedup of 1.74–3.36) using multiple processes (two to five) with a proper task-distribution scheme (between the master and slave processes). Although the computation time cost becomes lower with an increasing number of processes (from two to five), this enhancement becomes less due to the accompanied increase in demand for message passing procedures between the master and all slave processes. Our case study demonstrates that the P-SWAT with a five-process run may reach the maximum speedup, and the performance can be quite stable (fairly independent of a project size). Overall, the P-SWAT can help reduce the computation time substantially for an individual model run, manual and automatic calibration procedures, and optimization of best management practices. In particular, the parallelization method we used and the scheme for deriving the optimal parameters in this study can be valuable and easily applied to other hydrological or environmental models.

  4. Weighted community detection and data clustering using message passing

    Shi, Cheng; Liu, Yanchen; Zhang, Pan

    2018-03-01

    Grouping objects into clusters based on the similarities or weights between them is one of the most important problems in science and engineering. In this work, by extending message-passing algorithms and spectral algorithms proposed for an unweighted community detection problem, we develop a non-parametric method based on statistical physics, by mapping the problem to the Potts model at the critical temperature of spin-glass transition and applying belief propagation to solve the marginals corresponding to the Boltzmann distribution. Our algorithm is robust to over-fitting and gives a principled way to determine whether there are significant clusters in the data and how many clusters there are. We apply our method to different clustering tasks. In the community detection problem in weighted and directed networks, we show that our algorithm significantly outperforms existing algorithms. In the clustering problem, where the data were generated by mixture models in the sparse regime, we show that our method works all the way down to the theoretical limit of detectability and gives accuracy very close to that of the optimal Bayesian inference. In the semi-supervised clustering problem, our method only needs several labels to work perfectly in classic datasets. Finally, we further develop Thouless-Anderson-Palmer equations which heavily reduce the computation complexity in dense networks but give almost the same performance as belief propagation.

  5. Why pass on viral messages? Because they connect emotionally

    Dobele, A.; Lindgreen, A.; Beverland, M.; Vanhamme, J.; Wijk, van R.

    2007-01-01

    In this article, we identify that successful viral marketing campaigns trigger an emotional response in recipients. Working under this premise, we examine the effects of viral messages containing the six primary emotions (surprise, joy, sadness, anger, fear, and disgust) on recipients' emotional

  6. Theoretic derivation of directed acyclic subgraph algorithm and comparisons with message passing algorithm

    Ha, Jeongmok; Jeong, Hong

    2016-07-01

    This study investigates the directed acyclic subgraph (DAS) algorithm, which is used to solve discrete labeling problems much more rapidly than other Markov-random-field-based inference methods but at a competitive accuracy. However, the mechanism by which the DAS algorithm simultaneously achieves competitive accuracy and fast execution speed, has not been elucidated by a theoretical derivation. We analyze the DAS algorithm by comparing it with a message passing algorithm. Graphical models, inference methods, and energy-minimization frameworks are compared between DAS and message passing algorithms. Moreover, the performances of DAS and other message passing methods [sum-product belief propagation (BP), max-product BP, and tree-reweighted message passing] are experimentally compared.

  7. Communication strategies for angular domain decomposition of transport calculations on message passing multiprocessors

    Azmy, Y.Y.

    1997-01-01

    The effect of three communication schemes for solving Arbitrarily High Order Transport (AHOT) methods of the Nodal type on parallel performance is examined via direct measurements and performance models. The target architecture in this study is Oak Ridge National Laboratory's 128 node Paragon XP/S 5 computer and the parallelization is based on the Parallel Virtual Machine (PVM) library. However, the conclusions reached can be easily generalized to a large class of message passing platforms and communication software. The three schemes considered here are: (1) PVM's global operations (broadcast and reduce) which utilizes the Paragon's native corresponding operations based on a spanning tree routing; (2) the Bucket algorithm wherein the angular domain decomposition of the mesh sweep is complemented with a spatial domain decomposition of the accumulation process of the scalar flux from the angular flux and the convergence test; (3) a distributed memory version of the Bucket algorithm that pushes the spatial domain decomposition one step farther by actually distributing the fixed source and flux iterates over the memories of the participating processes. Their conclusion is that the Bucket algorithm is the most efficient of the three if all participating processes have sufficient memories to hold the entire problem arrays. Otherwise, the third scheme becomes necessary at an additional cost to speedup and parallel efficiency that is quantifiable via the parallel performance model

  8. An efficient communication scheme for solving Sn equations on message-passing multiprocessors

    Azmy, Y.Y.

    1993-01-01

    Early models of Intel's hypercube multiprocessors, e.g., the iPSC/1 and iPSC/2, were characterized by the high latency of message passing. This relatively weak dependence of the communication penalty on the size of messages, in contrast to its strong dependence on the number of messages, justified using the Fan-in Fan-out algorithm (which implements a minimum spanning tree path) to perform global operations, such as global sums, etc. Recent models of message-passing computers, such as the iPSC/860 and the Paragon, have been found to possess much smaller latency, thus forcing a reexamination of the issue of performance optimization with respect to communication schemes. Essentially, the Fan-in Fan-out scheme minimizes the number of nonsimultaneous messages sent but not the volume of data traffic across the network. Furthermore, if a global operation is performed in conjunction with the message passing, a large fraction of the attached nodes remains idle as the number of utilized processors is halved in each step of the process. On the other hand, the Recursive Halving scheme offers the smallest communication cost for global operations but has some drawbacks

  9. Message-Passing Receivers for Single Carrier Systems with Frequency-Domain Equalization

    Zhang, Chuanzong; Manchón, Carles Navarro; Wang, Zhongyong

    2015-01-01

    In this letter, we design iterative receiver algorithms for joint frequency-domain equalization and decoding in a single carrier system assuming perfect channel state information. Based on an approximate inference framework that combines belief propagation (BP) and the mean field (MF) approximation......, we propose two receiver algorithms with, respectively, parallel and sequential message-passing schedules in the MF part. A recently proposed receiver based on generalized approximate message passing (GAMP) is used as a benchmarking reference. The simulation results show that the BP-MF receiver...

  10. Neighbourhood-consensus message passing and its potentials in image processing applications

    Ružic, Tijana; Pižurica, Aleksandra; Philips, Wilfried

    2011-03-01

    In this paper, a novel algorithm for inference in Markov Random Fields (MRFs) is presented. Its goal is to find approximate maximum a posteriori estimates in a simple manner by combining neighbourhood influence of iterated conditional modes (ICM) and message passing of loopy belief propagation (LBP). We call the proposed method neighbourhood-consensus message passing because a single joint message is sent from the specified neighbourhood to the central node. The message, as a function of beliefs, represents the agreement of all nodes within the neighbourhood regarding the labels of the central node. This way we are able to overcome the disadvantages of reference algorithms, ICM and LBP. On one hand, more information is propagated in comparison with ICM, while on the other hand, the huge amount of pairwise interactions is avoided in comparison with LBP by working with neighbourhoods. The idea is related to the previously developed iterated conditional expectations algorithm. Here we revisit it and redefine it in a message passing framework in a more general form. The results on three different benchmarks demonstrate that the proposed technique can perform well both for binary and multi-label MRFs without any limitations on the model definition. Furthermore, it manifests improved performance over related techniques either in terms of quality and/or speed.

  11. Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis

    Wang, Yi-Min

    1993-01-01

    Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.

  12. A Message-Passing Hardware/Software Cosimulation Environment for Reconfigurable Computing Systems

    Manuel Saldaña

    2009-01-01

    Full Text Available High-performance reconfigurable computers (HPRCs provide a mix of standard processors and FPGAs to collectively accelerate applications. This introduces new design challenges, such as the need for portable programming models across HPRCs and system-level verification tools. To address the need for cosimulating a complete heterogeneous application using both software and hardware in an HPRC, we have created a tool called the Message-passing Simulation Framework (MSF. We have used it to simulate and develop an interface enabling an MPI-based approach to exchange data between X86 processors and hardware engines inside FPGAs. The MSF can also be used as an application development tool that enables multiple FPGAs in simulation to exchange messages amongst themselves and with X86 processors. As an example, we simulate a LINPACK benchmark hardware core using an Intel-FSB-Xilinx-FPGA platform to quickly prototype the hardware, to test the communications. and to verify the benchmark results.

  13. A Use of Space: The Unintended Messages of Academic Library Web Sites

    Kasperek, Sheila; Dorney, Erin; Williams, Beth; O'Brien, Michael

    2011-01-01

    Academic library home pages are not only access points to the resources and services of a library, they are virtual representations of the library itself. The content placed on the page, where it is placed, and the amount of space allotted are all choices that send a message about the character of the library, the resources a user should start…

  14. A message-passing approach to random constraint satisfaction problems with growing domains

    Zhao, Chunyan; Zheng, Zhiming; Zhou, Haijun; Xu, Ke

    2011-01-01

    Message-passing algorithms based on belief propagation (BP) are implemented on a random constraint satisfaction problem (CSP) referred to as model RB, which is a prototype of hard random CSPs with growing domain size. In model RB, the number of candidate discrete values (the domain size) of each variable increases polynomially with the variable number N of the problem formula. Although the satisfiability threshold of model RB is exactly known, finding solutions for a single problem formula is quite challenging and attempts have been limited to cases of N ∼ 10 2 . In this paper, we propose two different kinds of message-passing algorithms guided by BP for this problem. Numerical simulations demonstrate that these algorithms allow us to find a solution for random formulas of model RB with constraint tightness slightly less than p cr , the threshold value for the satisfiability phase transition. To evaluate the performance of these algorithms, we also provide a local search algorithm (random walk) as a comparison. Besides this, the simulated time dependence of the problem size N and the entropy of the variables for growing domain size are discussed

  15. Partition function expansion on region graphs and message-passing equations

    Zhou, Haijun; Wang, Chuang; Xiao, Jing-Qing; Bi, Zedong

    2011-01-01

    Disordered and frustrated graphical systems are ubiquitous in physics, biology, and information science. For models on complete graphs or random graphs, deep understanding has been achieved through the mean-field replica and cavity methods. But finite-dimensional 'real' systems remain very challenging because of the abundance of short loops and strong local correlations. A statistical mechanics theory is constructed in this paper for finite-dimensional models based on the mathematical framework of the partition function expansion and the concept of region graphs. Rigorous expressions for the free energy and grand free energy are derived. Message-passing equations on the region graph, such as belief propagation and survey propagation, are also derived rigorously. (letter)

  16. Distributed primal–dual interior-point methods for solving tree-structured coupled convex problems using message-passing

    Khoshfetrat Pakazad, Sina; Hansson, Anders; Andersen, Martin S.

    2017-01-01

    In this paper, we propose a distributed algorithm for solving coupled problems with chordal sparsity or an inherent tree structure which relies on primal–dual interior-point methods. We achieve this by distributing the computations at each iteration, using message-passing. In comparison to existi...

  17. Parallelization of MCNP Monte Carlo neutron and photon transport code in parallel virtual machine and message passing interface

    Deng Li; Xie Zhongsheng

    1999-01-01

    The coupled neutron and photon transport Monte Carlo code MCNP (version 3B) has been parallelized in parallel virtual machine (PVM) and message passing interface (MPI) by modifying a previous serial code. The new code has been verified by solving sample problems. The speedup increases linearly with the number of processors and the average efficiency is up to 99% for 12-processor. (author)

  18. Design of a Message Passing Model for Use in a Heterogeneous CPU-NFP Framework for Network Analytics

    Pennefather, S

    2017-09-01

    Full Text Available of applications written in the Go programming language to be executed on a Network Flow Processor (NFP) for enhanced performance. This paper explores the need and feasibility of implementing a message passing model for data transmission between the NFP and CPU...

  19. Approximate message passing for nonconvex sparse regularization with stability and asymptotic analysis

    Sakata, Ayaka; Xu, Yingying

    2018-03-01

    We analyse a linear regression problem with nonconvex regularization called smoothly clipped absolute deviation (SCAD) under an overcomplete Gaussian basis for Gaussian random data. We propose an approximate message passing (AMP) algorithm considering nonconvex regularization, namely SCAD-AMP, and analytically show that the stability condition corresponds to the de Almeida-Thouless condition in spin glass literature. Through asymptotic analysis, we show the correspondence between the density evolution of SCAD-AMP and the replica symmetric (RS) solution. Numerical experiments confirm that for a sufficiently large system size, SCAD-AMP achieves the optimal performance predicted by the replica method. Through replica analysis, a phase transition between replica symmetric and replica symmetry breaking (RSB) region is found in the parameter space of SCAD. The appearance of the RS region for a nonconvex penalty is a significant advantage that indicates the region of smooth landscape of the optimization problem. Furthermore, we analytically show that the statistical representation performance of the SCAD penalty is better than that of \

  20. Using Partial Reconfiguration and Message Passing to Enable FPGA-Based Generic Computing Platforms

    Manuel Saldaña

    2012-01-01

    Full Text Available Partial reconfiguration (PR is an FPGA feature that allows the modification of certain parts of an FPGA while the rest of the system continues to operate without disruption. This distinctive characteristic of FPGAs has many potential benefits but also challenges. The lack of good CAD tools and the deep hardware knowledge requirement result in a hard-to-use feature. In this paper, the new partition-based Xilinx PR flow is used to incorporate PR within our MPI-based message-passing framework to allow hardware designers to create template bitstreams, which are predesigned, prerouted, generic bitstreams that can be reused for multiple applications. As an example of the generality of this approach, four different applications that use the same template bitstream are run consecutively, with a PR operation performed at the beginning of each application to instantiate the desired application engine. We demonstrate a simplified, reusable, high-level, and portable PR interface for X86-FPGA hybrid machines. PR issues such as local resets of reconfigurable modules and context saving and restoring are addressed in this paper followed by some examples and preliminary PR overhead measurements.

  1. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  2. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  3. Message passing vs. shared address space on a cluster of SMPs

    Shan, Hongzhang; Singh, Jaswinder Pal; Oliker, Leonid; Biswas, Rupak

    2001-01-01

    The emergence of scalable computer architectures using clusters of PCs or PC-SMPs with commodity networking has made them attractive platforms for high-end scientific computing. Currently, message passing (MP) and shared address space (SAS) are the two leading programming paradigms for these systems. MP has been standardized with MPI, and is the most common and mature parallel programming approach. However, MP code development can be extremely difficult, especially for irregularly structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality and high protocol overhead. In this paper, they compare the performance of and programming effort required for six applications under both programming models on a 32-CPU PC-SMP cluster. Our application suite consists of codes that typically do not exhibit scalable performance under shared-memory programming due to their high communication-to-computation ratios and complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of the applications; however, on certain classes of problems, SAS performance is competitive with MPI

  4. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response.

    Jeannette Sutton

    Full Text Available Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials' Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events.

  5. Scalable High Performance Message Passing over InfiniBand for Open MPI

    Friedley, A; Hoefler, T; Leininger, M L; Lumsdaine, A

    2007-10-24

    InfiniBand (IB) is a popular network technology for modern high-performance computing systems. MPI implementations traditionally support IB using a reliable, connection-oriented (RC) transport. However, per-process resource usage that grows linearly with the number of processes, makes this approach prohibitive for large-scale systems. IB provides an alternative in the form of a connectionless unreliable datagram transport (UD), which allows for near-constant resource usage and initialization overhead as the process count increases. This paper describes a UD-based implementation for IB in Open MPI as a scalable alternative to existing RC-based schemes. We use the software reliability capabilities of Open MPI to provide the guaranteed delivery semantics required by MPI. Results show that UD not only requires fewer resources at scale, but also allows for shorter MPI startup times. A connectionless model also improves performance for applications that tend to send small messages to many different processes.

  6. A lightweight communication library for distributed computing

    Groen, D.; Rieder, S.; Grosso, P.; de Laat, C.; Portegies Zwart, S.

    2010-01-01

    We present MPWide, a platform-independent communication library for performing message passing between computers. Our library allows coupling of several local message passing interface (MPI) applications through a long-distance network and is specifically optimized for such communications. The

  7. The design of multi-core DSP parallel model based on message passing and multi-level pipeline

    Niu, Jingyu; Hu, Jian; He, Wenjing; Meng, Fanrong; Li, Chuanrong

    2017-10-01

    Currently, the design of embedded signal processing system is often based on a specific application, but this idea is not conducive to the rapid development of signal processing technology. In this paper, a parallel processing model architecture based on multi-core DSP platform is designed, and it is mainly suitable for the complex algorithms which are composed of different modules. This model combines the ideas of multi-level pipeline parallelism and message passing, and summarizes the advantages of the mainstream model of multi-core DSP (the Master-Slave model and the Data Flow model), so that it has better performance. This paper uses three-dimensional image generation algorithm to validate the efficiency of the proposed model by comparing with the effectiveness of the Master-Slave and the Data Flow model.

  8. A platform independent communication library for distributed computing

    Groen, D.; Rieder, S.; Grosso, P.; de Laat, C.; Portegies Zwart, S.

    2010-01-01

    We present MPWide, a platform independent communication library for performing message passing between supercomputers. Our library couples several local MPI applications through a long distance network using, for example, optical links. The implementation is deliberately kept light-weight, platform

  9. Statistical Physics, Optimization, Inference, and Message-Passing Algorithms : Lecture Notes of the Les Houches School of Physics : Special Issue, October 2013

    Ricci-Tersenghi, Federico; Zdeborova, Lenka; Zecchina, Riccardo; Tramel, Eric W; Cugliandolo, Leticia F

    2015-01-01

    This book contains a collection of the presentations that were given in October 2013 at the Les Houches Autumn School on statistical physics, optimization, inference, and message-passing algorithms. In the last decade, there has been increasing convergence of interest and methods between theoretical physics and fields as diverse as probability, machine learning, optimization, and inference problems. In particular, much theoretical and applied work in statistical physics and computer science has relied on the use of message-passing algorithms and their connection to the statistical physics of glasses and spin glasses. For example, both the replica and cavity methods have led to recent advances in compressed sensing, sparse estimation, and random constraint satisfaction, to name a few. This book’s detailed pedagogical lectures on statistical inference, computational complexity, the replica and cavity methods, and belief propagation are aimed particularly at PhD students, post-docs, and young researchers desir...

  10. Can rare SAT formulae be easily recognized? On the efficiency of message-passing algorithms for K-SAT at large clause-to-variable ratios

    Altarelli, Fabrizio; Monasson, Remi; Zamponi, Francesco

    2007-01-01

    For large clause-to-variable ratios, typical K-SAT instances drawn from the uniform distribution have no solution. We argue, based on statistical mechanics calculations using the replica and cavity methods, that rare satisfiable instances from the uniform distribution are very similar to typical instances drawn from the so-called planted distribution, where instances are chosen uniformly between the ones that admit a given solution. It then follows, from a recent article by Feige, Mossel and Vilenchik (2006 Complete convergence of message passing algorithms for some satisfiability problems Proc. Random 2006 pp 339-50), that these rare instances can be easily recognized (in O(log N) time and with probability close to 1) by a simple message-passing algorithm

  11. Portable and Transparent Message Compression in MPI Libraries to Improve the Performance and Scalability of Parallel Applications

    Albonesi, David; Burtscher, Martin

    2009-04-17

    The goal of this project has been to develop a lossless compression algorithm for message-passing libraries that can accelerate HPC systems by reducing the communication time. Because both compression and decompression have to be performed in software in real time, the algorithm has to be extremely fast while still delivering a good compression ratio. During the first half of this project, they designed a new compression algorithm called FPC for scientific double-precision data, made the source code available on the web, and published two papers describing its operation, the first in the proceedings of the Data Compression Conference and the second in the IEEE Transactions on Computers. At comparable average compression ratios, this algorithm compresses and decompresses 10 to 100 times faster than BZIP2, DFCM, FSD, GZIP, and PLMI on the three architectures tested. With prediction tables that fit into the CPU's L1 data acache, FPC delivers a guaranteed throughput of six gigabits per second on a 1.6 GHz Itanium 2 system. The C source code and documentation of FPC are posted on-line and have already been downloaded hundreds of times. To evaluate FPC, they gathered 13 real-world scientific datasets from around the globe, including satellite data, crash-simulation data, and messages from HPC systems. Based on the large number of requests they received, they also made these datasets available to the community (with permission of the original sources). While FPC represents a great step forward, it soon became clear that its throughput was too slow for the emerging 10 gigabits per second networks. Hence, no speedup can be gained by including this algorithm in an MPI library. They therefore changed the aim of the second half of the project. Instead of implementing FPC in an MPI library, they refocused their efforts to develop a parallel compression algorithm to further boost the throughput. After all, all modern high-end microprocessors contain multiple CPUs on a

  12. Analysis and lessons learned instituting an instant messaging reference service at an academic health sciences library: the first year.

    Kipnis, Daniel G; Kaplan, Gary E

    2008-01-01

    In February 2006, Thomas Jefferson University went live with a new instant messaging (IM) service. This paper reviews the first 102 transcripts to examine question types and usage patterns. In addition, the paper highlights lessons learned in instituting the service. IM reference represents a small proportion of reference questions, but based on user feedback and technological improvements, the library has decided to continue the service.

  13. Getting the Message? Native Reactive Electrophiles Pass Two Out of Three Thresholds to be Bona Fide Signaling Mediators.

    Poganik, Jesse R; Long, Marcus J C; Aye, Yimon

    2018-05-01

    Precision cell signaling activities of reactive electrophilic species (RES) are arguably among the most poorly-understood means to transmit biological messages. Latest research implicates native RES to be a chemically-distinct subset of endogenous redox signals that influence cell decision making through non-enzyme-assisted modifications of specific proteins. Yet, fundamental questions remain regarding the role of RES as bona fide second messengers. Here, we lay out three sets of criteria we feel need to be met for RES to be considered as true cellular signals that directly mediate information transfer by modifying "first-responding" sensor proteins. We critically assess the available evidence and define the extent to which each criterion has been fulfilled. Finally, we offer some ideas on the future trajectories of the electrophile signaling field taking inspiration from work that has been done to understand canonical signaling mediators. Also see the video abstract here: https://youtu.be/rG7o0clVP0c. © 2018 WILEY Periodicals, Inc.

  14. Message-passing-interface-based parallel FDTD investigation on the EM scattering from a 1-D rough sea surface using uniaxial perfectly matched layer absorbing boundary.

    Li, J; Guo, L-X; Zeng, H; Han, X-B

    2009-06-01

    A message-passing-interface (MPI)-based parallel finite-difference time-domain (FDTD) algorithm for the electromagnetic scattering from a 1-D randomly rough sea surface is presented. The uniaxial perfectly matched layer (UPML) medium is adopted for truncation of FDTD lattices, in which the finite-difference equations can be used for the total computation domain by properly choosing the uniaxial parameters. This makes the parallel FDTD algorithm easier to implement. The parallel performance with different processors is illustrated for one sea surface realization, and the computation time of the parallel FDTD algorithm is dramatically reduced compared to a single-process implementation. Finally, some numerical results are shown, including the backscattering characteristics of sea surface for different polarization and the bistatic scattering from a sea surface with large incident angle and large wind speed.

  15. Extending IM beyond the Reference Desk: A Case Study on the Integration of Chat Reference and Library-Wide Instant Messaging Network

    Ian Chan

    2012-09-01

    Full Text Available Openfire is an open source IM network and a single unified application that meets the needs of chat reference and internal communications. In Fall 2009, the California State University San Marcos (CSUSM Library began use of Openfire and other Jive software instant messaging technologies, to simultaneously improve our existing IM-integrated chat reference software and implement an internal IM network. This case study describes the chat reference and internal communications environment at the CSUSM Library and the selection, implementation, and evaluation of Openfire. In addition, the authors discuss the benefits of deploying an integrated instant messaging and chat reference network.

  16. Application Portable Parallel Library

    Cole, Gary L.; Blech, Richard A.; Quealy, Angela; Townsend, Scott

    1995-01-01

    Application Portable Parallel Library (APPL) computer program is subroutine-based message-passing software library intended to provide consistent interface to variety of multiprocessor computers on market today. Minimizes effort needed to move application program from one computer to another. User develops application program once and then easily moves application program from parallel computer on which created to another parallel computer. ("Parallel computer" also include heterogeneous collection of networked computers). Written in C language with one FORTRAN 77 subroutine for UNIX-based computers and callable from application programs written in C language or FORTRAN 77.

  17. A lightweight communication library for distributed computing

    Groen, Derek; Rieder, Steven; Zwart, Simon Portegies; Grosso, Paola; Laat, Cees de

    2010-01-01

    We present MPWide, a platform-independent communication library for performing message passing between computers. Our library allows coupling of several local message passing interface (MPI) applications through a long-distance network and is specifically optimized for such communications. The implementation is deliberately kept lightweight and platform independent, and the library can be installed and used without administrative privileges. The only requirements are a C++ compiler and at least one open port to a wide-area network on each site. In this paper we present the library, describe the user interface, present performance tests and apply MPWide in a large-scale cosmological N-body simulation on a network of two computers, one in Amsterdam and the other in Tokyo.

  18. Development of an MPI benchmark program library

    Uehara, Hitoshi

    2001-03-01

    Distributed parallel simulation software with message passing interfaces has been developed to realize large-scale and high performance numerical simulations. The most popular API for message communication is an MPI. The MPI will be provided on the Earth Simulator. It is known that performance of message communication using the MPI libraries gives a significant influence on a whole performance of simulation programs. We developed an MPI benchmark program library named MBL in order to measure the performance of message communication precisely. The MBL measures the performance of major MPI functions such as point-to-point communications and collective communications and the performance of major communication patterns which are often found in application programs. In this report, the description of the MBL and the performance analysis of the MPI/SX measured on the SX-4 are presented. (author)

  19. DOLIB: Distributed Object Library

    D' Azevedo, E.F.

    1994-01-01

    This report describes the use and implementation of DOLIB (Distributed Object Library), a library of routines that emulates global or virtual shared memory on Intel multiprocessor systems. Access to a distributed global array is through explicit calls to gather and scatter. Advantages of using DOLIB include: dynamic allocation and freeing of huge (gigabyte) distributed arrays, both C and FORTRAN callable interfaces, and the ability to mix shared-memory and message-passing programming models for ease of use and optimal performance. DOLIB is independent of language and compiler extensions and requires no special operating system support. DOLIB also supports automatic caching of read-only data for high performance. The virtual shared memory support provided in DOLIB is well suited for implementing Lagrangian particle tracking techniques. We have also used DOLIB to create DONIO (Distributed Object Network I/O Library), which obtains over a 10-fold improvement in disk I/O performance on the Intel Paragon.

  20. DOLIB: Distributed Object Library

    D`Azevedo, E.F.; Romine, C.H.

    1994-10-01

    This report describes the use and implementation of DOLIB (Distributed Object Library), a library of routines that emulates global or virtual shared memory on Intel multiprocessor systems. Access to a distributed global array is through explicit calls to gather and scatter. Advantages of using DOLIB include: dynamic allocation and freeing of huge (gigabyte) distributed arrays, both C and FORTRAN callable interfaces, and the ability to mix shared-memory and message-passing programming models for ease of use and optimal performance. DOLIB is independent of language and compiler extensions and requires no special operating system support. DOLIB also supports automatic caching of read-only data for high performance. The virtual shared memory support provided in DOLIB is well suited for implementing Lagrangian particle tracking techniques. We have also used DOLIB to create DONIO (Distributed Object Network I/O Library), which obtains over a 10-fold improvement in disk I/O performance on the Intel Paragon.

  1. Library

    Dulaney, Ronald E. Jr.

    1997-01-01

    This study began with the desire to design a public town library of the future and became a search for an inkling of what is essential to Architecture. It is murky and full of contradictions. It asks more than it proposes, and the traces of its windings are better ordered through collage than logical synthesis. This study is neither a thesis nor a synthesis. When drawing out the measure of this study it may be beneficial to state what it attempts to place at the ...

  2. Portable Instrumented Communication Library

    Geist, G.A.; Heath, M.T.; Peyton, B.W.; Worley, P.H.

    2001-01-01

    1 - Description of program or function: PICL is a subroutine library that can be used to develop parallel programs that are portable across several distributed-memory multi-processors. PICL provides a portable syntax for key communication primitives and related system calls. It also provides portable routines to perform certain widely- used, high-level communication operations, such as global broadcast and global summation. PICL provides execution tracing that can be used to monitor performance or to aid in debugging. 2 - Restrictions on the complexity of the problem: PICL is a compatibility library built on top of the native multiprocessor operating system and message passing primitives. Thus, the portability of PICL programs is not guaranteed, being a function of idiosyncrasies of the different platforms. Predictable differences are captured with standard error trapping routines. PICL is a research tool, not a production software system

  3. Specification of Fenix MPI Fault Tolerance library version 1.0.1

    Gamble, Marc [Rutgers Univ., New Brunswick, NJ (United States); Van Der Wijngaart, Rob [Intel Corps., Mountain View, CA (United States); Teranishi, Keita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Parashar, Manish [Rutgers Univ., New Brunswick, NJ (United States)

    2016-10-01

    This document provides a specification of Fenix, a software library compatible with the Message Passing Interface (MPI) to support fault recovery without application shutdown. The library consists of two modules. The first, termed process recovery , restores an application to a consistent state after it has suffered a loss of one or more MPI processes (ranks). The second specifies functions the user can invoke to store application data in Fenix managed redundant storage, and to retrieve it from that storage after process recovery.

  4. Passing excellence

    Tsoupikova, Daria

    2007-02-01

    This paper describes the research and development of a virtual reality visualization project "Passing excellence" about the world famous architectural ensemble "Kizhi". The Kizhi Pogost is located on an island in Lake Onega in northern Karelia in Russia. It is an authentic museum of an ancient wood building tradition which presents a unique artistic achievement. This ensemble preserves a concentration of masterpieces of the Russian heritage and is included in the List of Most Endangered Sites of the World Monuments Watch protected by World Heritage List of UNESCO. The project strives to create a unique virtual observation of the dynamics of the architectural changes of the museum area beginning from the 15th Century up to the 21st Century. The visualization is being created to restore the original architecture of Kizhi island based on the detailed photographs, architectural and geometric measurements, textural data, video surveys and resources from the Kizhi State Open-Air Museum archives. The project is being developed using Electro, an application development environment for the tiled display high-resolution graphics visualization system and can be shown on the virtual reality systems such as the GeoWall TM and the C-Wall.

  5. Design considerations for parallel graphics libraries

    Crockett, Thomas W.

    1994-01-01

    Applications which run on parallel supercomputers are often characterized by massive datasets. Converting these vast collections of numbers to visual form has proven to be a powerful aid to comprehension. For a variety of reasons, it may be desirable to provide this visual feedback at runtime. One way to accomplish this is to exploit the available parallelism to perform graphics operations in place. In order to do this, we need appropriate parallel rendering algorithms and library interfaces. This paper provides a tutorial introduction to some of the issues which arise in designing parallel graphics libraries and their underlying rendering algorithms. The focus is on polygon rendering for distributed memory message-passing systems. We illustrate our discussion with examples from PGL, a parallel graphics library which has been developed on the Intel family of parallel systems.

  6. The Prodiguer Messaging Platform

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  7. Subtle Messages.

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  8. Using Instant Messaging for Online Reference Service

    Forster, Shirley

    2006-01-01

    Many libraries are using co-browsing chat products to provide reference services to their patrons, whilst their patrons are online and using the internet. The concept of such an online service is highly desirable, but many libraries are concerned that they will never be able to afford such a system. This may have changed: Instant Messaging (IM)…

  9. ARL Profiles: Research Libraries 2010

    Potter, William Gray; Cook, Colleen; Kyrillidou, Martha

    2011-01-01

    The current ARL report summarizes a multi-year effort that captures evidence in the form of narrative profiles as it delivers the message of the value and contributions of research libraries during transformative times. When ARL library directors were interviewed in 2005 and asked to describe a research library in the 21st century, there was…

  10. Advanced Messaging Concept Development Basic Safety Message

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  11. DMS message design workshops.

    2009-03-01

    This report summarizes the training conducted statewide regarding the design and display of messages on : dynamic message signs. The training is based on the Dynamic Message Sign Message Design and Display : Manual (0-4023-P3). Researchers developed ...

  12. CMLOG: A common message logging system

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  13. Algorithms for parallel flow solvers on message passing architectures

    Vanderwijngaart, Rob F.

    1995-01-01

    The purpose of this project has been to identify and test suitable technologies for implementation of fluid flow solvers -- possibly coupled with structures and heat equation solvers -- on MIMD parallel computers. In the course of this investigation much attention has been paid to efficient domain decomposition strategies for ADI-type algorithms. Multi-partitioning derives its efficiency from the assignment of several blocks of grid points to each processor in the parallel computer. A coarse-grain parallelism is obtained, and a near-perfect load balance results. In uni-partitioning every processor receives responsibility for exactly one block of grid points instead of several. This necessitates fine-grain pipelined program execution in order to obtain a reasonable load balance. Although fine-grain parallelism is less desirable on many systems, especially high-latency networks of workstations, uni-partition methods are still in wide use in production codes for flow problems. Consequently, it remains important to achieve good efficiency with this technique that has essentially been superseded by multi-partitioning for parallel ADI-type algorithms. Another reason for the concentration on improving the performance of pipeline methods is their applicability in other types of flow solver kernels with stronger implied data dependence. Analytical expressions can be derived for the size of the dynamic load imbalance incurred in traditional pipelines. From these it can be determined what is the optimal first-processor retardation that leads to the shortest total completion time for the pipeline process. Theoretical predictions of pipeline performance with and without optimization match experimental observations on the iPSC/860 very well. Analysis of pipeline performance also highlights the effect of uncareful grid partitioning in flow solvers that employ pipeline algorithms. If grid blocks at boundaries are not at least as large in the wall-normal direction as those immediately adjacent to them, then the first processor in the pipeline will receive a computational load that is less than that of subsequent processors, magnifying the pipeline slowdown effect. Extra compensation is needed for grid boundary effects, even if all grid blocks are equally sized.

  14. Optimizing spread dynamics on graphs by message passing

    Altarelli, F; Braunstein, A; Dall’Asta, L; Zecchina, R

    2013-01-01

    Cascade processes are responsible for many important phenomena in natural and social sciences. Simple models of irreversible dynamics on graphs, in which nodes activate depending on the state of their neighbors, have been successfully applied to describe cascades in a large variety of contexts. Over the past decades, much effort has been devoted to understanding the typical behavior of the cascades arising from initial conditions extracted at random from some given ensemble. However, the problem of optimizing the trajectory of the system, i.e. of identifying appropriate initial conditions to maximize (or minimize) the final number of active nodes, is still considered to be practically intractable, with the only exception being models that satisfy a sort of diminishing returns property called submodularity. Submodular models can be approximately solved by means of greedy strategies, but by definition they lack cooperative characteristics which are fundamental in many real systems. Here we introduce an efficient algorithm based on statistical physics for the optimization of trajectories in cascade processes on graphs. We show that for a wide class of irreversible dynamics, even in the absence of submodularity, the spread optimization problem can be solved efficiently on large networks. Analytic and algorithmic results on random graphs are complemented by the solution of the spread maximization problem on a real-world network (the Epinions consumer reviews network). (paper)

  15. Discrete geometric analysis of message passing algorithm on graphs

    Watanabe, Yusuke

    2010-04-01

    We often encounter probability distributions given as unnormalized products of non-negative functions. The factorization structures are represented by hypergraphs called factor graphs. Such distributions appear in various fields, including statistics, artificial intelligence, statistical physics, error correcting codes, etc. Given such a distribution, computations of marginal distributions and the normalization constant are often required. However, they are computationally intractable because of their computational costs. One successful approximation method is Loopy Belief Propagation (LBP) algorithm. The focus of this thesis is an analysis of the LBP algorithm. If the factor graph is a tree, i.e. having no cycle, the algorithm gives the exact quantities. If the factor graph has cycles, however, the LBP algorithm does not give exact results and possibly exhibits oscillatory and non-convergent behaviors. The thematic question of this thesis is "How the behaviors of the LBP algorithm are affected by the discrete geometry of the factor graph?" The primary contribution of this thesis is the discovery of a formula that establishes the relation between the LBP, the Bethe free energy and the graph zeta function. This formula provides new techniques for analysis of the LBP algorithm, connecting properties of the graph and of the LBP and the Bethe free energy. We demonstrate applications of the techniques to several problems including (non) convexity of the Bethe free energy, the uniqueness and stability of the LBP fixed point. We also discuss the loop series initiated by Chertkov and Chernyak. The loop series is a subgraph expansion of the normalization constant, or partition function, and reflects the graph geometry. We investigate theoretical natures of the series. Moreover, we show a partial connection between the loop series and the graph zeta function.

  16. Optimizing spread dynamics on graphs by message passing

    Altarelli, F.; Braunstein, A.; Dall'Asta, L.; Zecchina, R.

    2013-09-01

    Cascade processes are responsible for many important phenomena in natural and social sciences. Simple models of irreversible dynamics on graphs, in which nodes activate depending on the state of their neighbors, have been successfully applied to describe cascades in a large variety of contexts. Over the past decades, much effort has been devoted to understanding the typical behavior of the cascades arising from initial conditions extracted at random from some given ensemble. However, the problem of optimizing the trajectory of the system, i.e. of identifying appropriate initial conditions to maximize (or minimize) the final number of active nodes, is still considered to be practically intractable, with the only exception being models that satisfy a sort of diminishing returns property called submodularity. Submodular models can be approximately solved by means of greedy strategies, but by definition they lack cooperative characteristics which are fundamental in many real systems. Here we introduce an efficient algorithm based on statistical physics for the optimization of trajectories in cascade processes on graphs. We show that for a wide class of irreversible dynamics, even in the absence of submodularity, the spread optimization problem can be solved efficiently on large networks. Analytic and algorithmic results on random graphs are complemented by the solution of the spread maximization problem on a real-world network (the Epinions consumer reviews network).

  17. Mixed messages

    Chen, Christopher B.; Hall, Kevin; Tsuyuki, Ross T.

    2014-01-01

    Background: More than 5 years ago, the Blueprint for Pharmacy developed a plan for transitioning pharmacy practice toward more patient-centred care. Much of the strategy for change involves communicating the new vision. Objective: To evaluate the communication of the Vision for Pharmacy by the organizations and corporations that signed the Blueprint for Pharmacy’s Commitment to Act. Methods: The list of 88 signatories of the Commitment to Act was obtained from the Blueprint for Pharmacy document. The website of each of these signatories was searched for all references to the Blueprint for Pharmacy or Vision for Pharmacy. Each of the identified references was then analyzed using summative content analysis. Results: A total of 934 references were identified from the webpages of the 88 signatories. Of these references, 549 were merely links to the Blueprint for Pharmacy’s website, 350 of the references provided some detailed information about the Blueprint for Pharmacy and only 35 references provided any specific plans to transition pharmacy practice. Conclusion: Widespread proliferation of the Vision for Pharmacy has not been achieved. One possible explanation for this is that communication of the vision by the signatories has been incomplete. To ensure the success of future communications, change leaders must develop strategies that consider how individual pharmacists and pharmacies understand the message. PMID:24660012

  18. TPG bus passes

    Staff Association

    2013-01-01

    The CERN Staff Association will stop selling TPG bus passes. All active and retired members of the CERN personnel will be able to purchase Unireso bus passes from the CERN Hostel - Building 39 (Meyrin site) from 1st February 2013. For more information: https://cds.cern.ch/journal/CERNBulletin/2013/04/Announcements/1505279?ln=en

  19. GOOF: OCTOPUS error messages, ORDER, ORDERLIB, FLOE, CHAT, and LOD

    Whitten, G.

    1977-07-10

    This is a compilation of the error messages returned by five parts of the Livermore timesharing system: the ORDER batch-processor, the ORDERLIB subroutine library, the FLOE operating system, the CHAT compiler, and the LOD loader.

  20. Passing and Catching in Rugby.

    Namudu, Mike M.

    This booklet contains the fundamentals for rugby at the primary school level. It deals primarily with passing and catching the ball. It contains instructions on (1) holding the ball for passing, (2) passing the ball to the left--standing, (3) passing the ball to the left--running, (4) making a switch pass, (5) the scrum half's normal pass, (6) the…

  1. eMarketing for Libraries

    Fernández-Marcial, Viviana

    2013-01-01

    These days advertorials, microsites, social networks, blogging and viral videos are just some manifestations of promoting libraries. E-marketing brings opportunities for libraries to connect whith their target groups. Different publications show how library users are esenciatially digital citizens and with e-marketing it is possible to connect with the users in their own natural habitat. It is also allows spreading a message with a lower cost than other strategies.

  2. EMI Messaging Guidelines

    Cons, L.

    2011-01-01

    Guidelines for potential users of messaging within EMI. The goal is to provide enough practical information so that EMI product teams can start investigating whether using messaging in their products can be beneficial or not.

  3. Featured Library: Parrish Library

    Kirkwood, Hal P, Jr

    2015-01-01

    The Roland G. Parrish Library of Management & Economics is located within the Krannert School of Management at Purdue University. Between 2005 - 2007 work was completed on a white paper that focused on a student-centered vision for the Management & Economics Library. The next step was a massive collection reduction and a re-envisioning of both the services and space of the library. Thus began a 3 phase renovation from a 2 floor standard, collection-focused library into a single floor, 18,000s...

  4. Succession Planning for Library Instruction

    Sobel, Karen; Drewry, Josiah

    2015-01-01

    Detailed succession planning helps libraries pass information from one employee to the next. This is crucial in preparing for hiring, turnover, retirements, training of graduate teaching assistants in academic libraries, and other common situations. The authors of this article discuss succession planning for instruction programs in academic…

  5. Public-channel cryptography based on mutual chaos pass filters.

    Klein, Einat; Gross, Noam; Kopelowitz, Evi; Rosenbluh, Michael; Khaykovich, Lev; Kinzel, Wolfgang; Kanter, Ido

    2006-10-01

    We study the mutual coupling of chaotic lasers and observe both experimentally and in numeric simulations that there exists a regime of parameters for which two mutually coupled chaotic lasers establish isochronal synchronization, while a third laser coupled unidirectionally to one of the pair does not synchronize. We then propose a cryptographic scheme, based on the advantage of mutual coupling over unidirectional coupling, where all the parameters of the system are public knowledge. We numerically demonstrate that in such a scheme the two communicating lasers can add a message signal (compressed binary message) to the transmitted coupling signal and recover the message in both directions with high fidelity by using a mutual chaos pass filter procedure. An attacker, however, fails to recover an errorless message even if he amplifies the coupling signal.

  6. The Message Logging System for NOνA Experiment

    Lu Qiming; Kowalkowski, J B; Biery, K A

    2011-01-01

    The message logging system provides the infrastructure for all of the distributed processes in the data acquisition (DAQ) to report status messages of various severities in a consistent manner to a central location, as well as providing the tools for displaying and archiving the messages. The message logging system has been developed over a decade, and has been run successfully on CDF and CMS experiments. The most recent work to the message logging system is to build it as a stand-alone package with the name MessageFacility which works for any generic framework or applications, with NOνA as the first driving user. System designs and architectures, as well as the efforts of making it a generic library will be discussed. We also present new features that have been added.

  7. Introduction: Mirrors of Passing

    Seebach, Sophie Hooge; Willerslev, Rane

    How is death, time, and materiality interconnected? How to approach an understanding of the world of the dead? In this introduction, we seek to understand how the experience of material decay, of the death of those around us, makes us aware of the passing of time. Through the literary lens of Neil...... Gaiman’s The Graveyard Book, we explore how the world of the dead and the world of the living can intersect; how time and materiality shifts and changes depending on who experiences it. These revelations, based on fiction, provide a mirror through which the reader can experience the varied chapters...

  8. Parent Involvement in Elementary School Libraries

    Copeland, Michele Rzewski

    2012-01-01

    In the 21st century, school libraries are under pressure to innovate. Library budgets are frequently slashed as districts struggle with limited fiscal resources, while library personnel are increasingly expected to provide students with resources they need to help them pass high stakes tests. In an effort to meet student needs with limited…

  9. Unified Internet Messaging

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  10. Passing the baton

    2011-01-01

    It was not only in South Korea that batons were being passed last week. While the cream of the world’s athletes were competing in the World Athletics Championships, the cream of the world’s accelerator scientists were on their way to San Sebastian in Spain for the International Particle Accelerator Conference.  One of them was carrying a rather special baton for a handover of a different kind.   When Fermilab’s Vladimir Shiltsev handed the high-energy frontier baton to CERN’s Mike Lamont on Tuesday, it marked the end of an era: a time to look back on the phenomenal contribution the Tevatron has made to particle physics over its 25-year operational lifetime, and the great contribution Fermilab has made over that period to global collaboration in particle physics. There’s always a lot of emotion involved in passing the baton. In athletics, it’s the triumph of wining or the heartbreak of losing. But for this special baton, the...

  11. TRT Barrel milestones passed

    Ogren, H

    2004-01-01

    The barrel TRT detector passed three significant milestones this spring. The Barrel Support Structure (BSS) was completed and moved to the SR-1 building on February 24th. On March 12th the first module passed the quality assurance testing in Building 154 and was transported to the assembly site in the SR-1 building for barrel assembly. Then on April 21st the final production module that had been scanned at Hampton University was shipped to CERN. TRT Barrel Module Production The production of the full complement of barrel modules (96 plus 9 total spares) is now complete. This has been a five-year effort by Duke University, Hampton University, and Indiana University. Actual construction of the modules in the United States was completed in the first part of 2004. The production crews at each of the sites in the United States have now completed their missions. They are shown in the following pictures. Duke University: Production crew with the final completed module. Indiana University: Module producti...

  12. Deuterium pass through target

    Alger, D.L.

    1975-01-01

    A neutron emitting target is described for use in neutron generating apparatus including a deuteron source and an accelerator vacuum chamber. The target consists of a tritium-containing target layer, a deuteron accumulation layer, and a target support containing passages providing communication between the accumulation layer and portions of the surface of the support exposed to the accelerator vacuum chamber. With this arrangement, deuterons passing through the target layer and implanting in and diffusing through the accumulation layer, diffuse into the communicating passages and are returned to the accelerator vacuum chamber. The invention allows the continuous removal of deuterons from the target in conventional water cooled neutron generating apparatus. Preferably, the target is provided with thin barrier layers to prevent undesirable tritium diffusion out of the target layer, as well as deuteron diffusion into the target layer

  13. Asynchronous Message Service Reference Implementation

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to

  14. Framing of health information messages.

    Akl, Elie A; Oxman, Andrew D; Herrin, Jeph; Vist, Gunn E; Terrenato, Irene; Sperati, Francesca; Costiniuk, Cecilia; Blank, Diana; Schünemann, Holger

    2011-12-07

    The same information about the evidence on health effects can be framed either in positive words or in negative words. Some research suggests that positive versus negative framing can lead to different decisions, a phenomenon described as the framing effect. Attribute framing is the positive versus negative description of a specific attribute of a single item or a state, for example, "the chance of survival with cancer is 2/3" versus "the chance of mortality with cancer is 1/3". Goal framing is the description of the consequences of performing or not performing an act as a gain versus a loss, for example, "if you undergo a screening test for cancer, your survival will be prolonged" versus "if you don't undergo screening test for cancer, your survival will be shortened". To evaluate the effects of attribute (positive versus negative) framing and of goal (gain versus loss) framing of the same health information, on understanding, perception of effectiveness, persuasiveness, and behavior of health professionals, policy makers, and consumers. We searched the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, issue 3 2007), MEDLINE (Ovid) (1966 to October 2007), EMBASE (Ovid) (1980 to October 2007), PsycINFO (Ovid) (1887 to October 2007). There were no language restrictions. We reviewed the reference lists of related systematic reviews, included studies and of excluded but closely related studies. We also contacted experts in the field. We included randomized controlled trials, quasi-randomised controlled trials, and cross-over studies with health professionals, policy makers, and consumers evaluating one of the two types of framing. Two review authors extracted data in duplicate and independently. We graded the quality of evidence for each outcome using the GRADE approach. We standardized the outcome effects using standardized mean difference (SMD). We stratified the analysis by the type of framing (attribute, goal) and conducted pre

  15. Auctioning Bulk Mobile Messages

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  16. Research Library

    Los Alamos National Laboratory Research Library Search Site submit Contact Us | Remote Access Standards Theses/Dissertations Research Help Subject Guides Library Training Video Tutorials Alerts Research Library: delivering essential knowledge services for national security sciences since 1947 Los

  17. Libraries' Place in Virtual Social Networks

    Mathews, Brian S.

    2007-01-01

    Do libraries belong in the virtual world of social networking? With more than 100 million users, this environment is impossible to ignore. A rising philosophy for libraries, particularly in blog-land, involves the concept of being where the users are. Simply using new media to deliver an old message is not progress. Instead, librarians should…

  18. Portable programming on parallel/networked computers using the Application Portable Parallel Library (APPL)

    Quealy, Angela; Cole, Gary L.; Blech, Richard A.

    1993-01-01

    The Application Portable Parallel Library (APPL) is a subroutine-based library of communication primitives that is callable from applications written in FORTRAN or C. APPL provides a consistent programmer interface to a variety of distributed and shared-memory multiprocessor MIMD machines. The objective of APPL is to minimize the effort required to move parallel applications from one machine to another, or to a network of homogeneous machines. APPL encompasses many of the message-passing primitives that are currently available on commercial multiprocessor systems. This paper describes APPL (version 2.3.1) and its usage, reports the status of the APPL project, and indicates possible directions for the future. Several applications using APPL are discussed, as well as performance and overhead results.

  19. Twitter for Libraries (and Librarians)

    Milstein, Sarah

    2009-01-01

    For many people, the word "twitter" brings to mind birds rather than humans. But information professionals know that Twitter (www.twitter.com) is a fast-growing, free messaging service for people, and it's one that libraries (and librarians) can make good use of--without spending much time or effort. This article discusses the many potential uses…

  20. Supervising simulations with the Prodiguer Messaging Platform

    Greenslade, Mark; Carenton, Nicolas; Denvil, Sebastien

    2015-04-01

    At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of High Performance Computing (HPC) environments spread throughout France. The IPSL's simulation execution runtime is called libIGCM (library for IPSL Global Climate Modeling group). libIGCM has recently been enhanced so as to support realtime operational use cases. Such use cases include simulation monitoring, data publication, environment metrics collection, automated simulation control … etc. At the core of this enhancement is the Prodiguer messaging platform. libIGCM now emits information, in the form of messages, for remote processing at IPSL servers in Paris. The remote message processing takes several forms, for example: 1. Persisting message content to database(s); 2. Notifying an operator of changes in a simulation's execution status; 3. Launching rollback jobs upon simulation failure; 4. Dynamically updating controlled vocabularies; 5. Notifying downstream applications such as the Prodiguer web portal; We will describe how the messaging platform has been implemented from a technical perspective and demonstrate the Prodiguer web portal receiving realtime notifications.

  1. Actors with Multi-Headed Message Receive Patterns

    Sulzmann, Martin; Lam, Edmund Soon Lee; Van Weert, Peter

    2008-01-01

    style actors with receive clauses containing multi-headed message patterns. Patterns may be non-linear and constrained by guards. We provide a number of examples to show the usefulness of the extension. We also explore the design space for multi-headed message matching semantics, for example first-match......The actor model provides high-level concurrency abstractions to coordinate simultaneous computations by message passing. Languages implementing the actor model such as Erlang commonly only support single-headed pattern matching over received messages. We propose and design an extension of Erlang...... and rule priority-match semantics. The various semantics are inspired by the multi-set constraint matching semantics found in Constraint Handling Rules. This provides us with a formal model to study actors with multi-headed message receive patterns. The system can be implemented efficiently and we have...

  2. Instant Messaging by SIP

    Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd

    2008-11-01

    SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.

  3. A System for Exchanging Control and Status Messages in the NOvA Data Acquisition

    Biery, K.A.; Cooper, R.G.; Foulkes, S.C.; Guglielmo, G.M.; Piccoli, L.P.; Votava, M.E.V.; Fermilab

    2007-01-01

    In preparation for NOvA, a future neutrino experiment at Fermilab, we are developing a system for passing control and status messages in the data acquisition system. The DAQ system will consist of applications running on approximately 450 nodes. The message passing system will use a publish-subscribe model and will provide support for sending messages and receiving the associated replies. Additional features of the system include a layered architecture with custom APIs tailored to the needs of a DAQ system, the use of an open source messaging system for handling the reliable delivery of messages, the ability to send broadcasts to groups of applications, and APIs in Java, C++, and Python. Our choice for the open source system to deliver messages is EPICS. We will discuss the architecture of the system, our experience with EPICS, and preliminary test results

  4. A System for Exchanging Control and Status Messages in the NOvA Data Acquisition

    Biery, K.A.; Cooper, R.G.; Foulkes, S.C.; Guglielmo, G.M.; Piccoli, L.P.; Votava, M.E.V.; /Fermilab

    2007-04-01

    In preparation for NOvA, a future neutrino experiment at Fermilab, we are developing a system for passing control and status messages in the data acquisition system. The DAQ system will consist of applications running on approximately 450 nodes. The message passing system will use a publish-subscribe model and will provide support for sending messages and receiving the associated replies. Additional features of the system include a layered architecture with custom APIs tailored to the needs of a DAQ system, the use of an open source messaging system for handling the reliable delivery of messages, the ability to send broadcasts to groups of applications, and APIs in Java, C++, and Python. Our choice for the open source system to deliver messages is EPICS. We will discuss the architecture of the system, our experience with EPICS, and preliminary test results.

  5. Increasing the Operational Value of Event Messages

    Li, Zhenping; Savkli, Cetin; Smith, Dan

    2003-01-01

    Assessing the health of a space mission has traditionally been performed using telemetry analysis tools. Parameter values are compared to known operational limits and are plotted over various time periods. This presentation begins with the notion that there is an incredible amount of untapped information contained within the mission s event message logs. Through creative advancements in message handling tools, the event message logs can be used to better assess spacecraft and ground system status and to highlight and report on conditions not readily apparent when messages are evaluated one-at-a-time during a real-time pass. Work in this area is being funded as part of a larger NASA effort at the Goddard Space Flight Center to create component-based, middleware-based, standards-based general purpose ground system architecture referred to as GMSEC - the GSFC Mission Services Evolution Center. The new capabilities and operational concepts for event display, event data analyses and data mining are being developed by Lockheed Martin and the new subsystem has been named GREAT - the GMSEC Reusable Event Analysis Toolkit. Planned for use on existing and future missions, GREAT has the potential to increase operational efficiency in areas of problem detection and analysis, general status reporting, and real-time situational awareness.

  6. Couriers in the Inca Empire: Getting Your Message Across. [Lesson Plan].

    2002

    This lesson shows how the Inca communicated across the vast stretches of their mountain realm, the largest empire of the pre-industrial world. The lesson explains how couriers carried messages along mountain-ridge roads, up and down stone steps, and over chasm-spanning footbridges. It states that couriers could pass a message from Quito (Ecuador)…

  7. The message is the message-maker.

    Chalkley, A B

    1977-03-01

    For those engaged in family planning or other demographic work of an active kind, serious errors can be made and much money and skill wasted unless there is a clear idea of available means of communication. Literacy and media-diffusion figures offer vague parameters, especially in Asia, and the role of spoken communication -- considered key in "illiterate" societies -- is even more difficult to assess. For mass media, the starting point is "diffusion rates" representing numbers of TV sets owned or newspapers sold per 1000 population and so on -- measures of quantity. This article surveys the population growth rates, urban-rural distribution, educational levels, literacy rates, numbers of newspapers bought, radios and TVs owned (per 1000 population) for 12 Asian countries, and discusses their meaning in terms of media use. Chief among the points made are that print media still have an enormous role to play in the developing countries -- newspaper diffusion rates are quite high, even in countries with low urban population (especially India). The quality of electronic media (too often considered the natural "wave of the future" everywhere) varies but is generally not high. Where they are fully developed their role is vital -- but it might be noted that it is the message makers themselves who are most vital. Choosing the right medium and the proper message for it is essential.

  8. From a Distance: Robust Reference Service via Instant Messaging

    Meulemans, Yvonne Nalani; Carr, Allison; Ly, Pearl

    2010-01-01

    Reference service via instant messaging (IM) has significant potential to benefit distance learners. There has been wide experimentation with IM to expand reference services in libraries across the US, with mixed results. Concern has been expressed that IM cannot provide the same reference experience as face-to-face interactions. One academic…

  9. An Examination of Adolescent Recall of Anti-Smoking Messages: Attitudes, Message Type, and Message Perceptions.

    Bigsby, Elisabeth; Monahan, Jennifer L; Ewoldsen, David R

    2017-04-01

    Delayed message recall may be influenced by currently held accessible attitudes, the nature of the message, and message perceptions (perception of bias and message elaboration). This study examined the potential of message perceptions to mediate the influence of valenced attitude accessibility and message type on unaided recall of anti-smoking Public Service Announcements (PSAs). In a field experiment, ninth grade students (N = 244) watched three PSAs and responded to items on laptop computers. Twelve weeks later, follow-up telephone surveys were conducted to assess unaided recall. Both valenced attitude accessibility and message type were associated with message perceptions. However, only perception of message bias partially mediated the relationship between message type and unaided recall.

  10. Popular Mobilization Messaging

    James Garrison

    2017-04-01

    Full Text Available This Research Paper examines the Iraqi Popular Mobilization Unit’s (PMU messaging on the organisation’s website and social media platforms through early January 2017 to develop a more nuanced understanding of the PMU’s outlook, both present and future. After providing an overview of the PMU’s media presence online, the paper discusses how the organisation promotes its core narrative: that it is a cross-confessional and patriotic force for the defence of all Iraqis against a brutal and evil IS. The paper then addresses the PMU’s use of messaging to refute the sectarian portrayal of the organisation in some quarters before turning to the way the PMU approaches regional and international states in its media. Finally, the paper summarises the PMU’s messaging strategy and discusses how this strategy implies a less threatening future for the organisation than is often anticipated.

  11. WebPASS Explorer (HR Personnel Management)

    US Agency for International Development — WebPass Explorer (WebPASS Framework): USAID is partnering with DoS in the implementation of their WebPass Post Personnel (PS) Module. WebPassPS does not replace...

  12. Multi-pass spectroscopic ellipsometry

    Stehle, Jean-Louis; Samartzis, Peter C.; Stamataki, Katerina; Piel, Jean-Philippe; Katsoprinakis, George E.; Papadakis, Vassilis; Schimowski, Xavier; Rakitzis, T. Peter; Loppinet, Benoit

    2014-01-01

    Spectroscopic ellipsometry is an established technique, particularly useful for thickness measurements of thin films. It measures polarization rotation after a single reflection of a beam of light on the measured substrate at a given incidence angle. In this paper, we report the development of multi-pass spectroscopic ellipsometry where the light beam reflects multiple times on the sample. We have investigated both theoretically and experimentally the effect of sample reflectivity, number of reflections (passes), angles of incidence and detector dynamic range on ellipsometric observables tanΨ and cosΔ. The multiple pass approach provides increased sensitivity to small changes in Ψ and Δ, opening the way for single measurement determination of optical thickness T, refractive index n and absorption coefficient k of thin films, a significant improvement over the existing techniques. Based on our results, we discuss the strengths, the weaknesses and possible applications of this technique. - Highlights: • We present multi-pass spectroscopic ellipsometry (MPSE), a multi-pass approach to ellipsometry. • Different detectors, samples, angles of incidence and number of passes were tested. • N passes improve polarization ratio sensitivity to the power of N. • N reflections improve phase shift sensitivity by a factor of N. • MPSE can significantly improve thickness measurements in thin films

  13. SMS Messaging Applications

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  14. Library Computing

    Library Computing, 1985

    1985-01-01

    Special supplement to "Library Journal" and "School Library Journal" covers topics of interest to school, public, academic, and special libraries planning for automation: microcomputer use, readings in automation, online searching, databases of microcomputer software, public access to microcomputers, circulation, creating a…

  15. Information literacy of the academic library users

    Sanda Hasenay

    2016-03-01

    Full Text Available Information literacy should be a foundation of any educational system, which would enable students and library users a more efficient way to perform academically and in everyday life. The research goal was to determine the level of information literacy among the students, users of the Library of Faculty of Food and Technology Osijek (PTFOS. A special survey – quiz was used to determine students’ knowledge of library collection and services. The sample of 115 students was surveyed between 16th and 27th of February 2015. The library users are aware of the conditions of using the library collections as well as library services, but they don't read messages on the library's bulletin board, desks and web site. The research results will be used as guidelines for improving information literacy and future research.

  16. Towards Implementing Library 2.0 Model in Nigerian University ...

    It presents the key features of library 2.0, such as user centered, multi-media ... blogs and wikis, instant messaging (IM), podcasts, social networking, streaming media, ... Recommendations were therefore proffered to include; the partnership of ...

  17. Are Instant Messages Speech?

    Baron, Naomi S.

    Instant messaging (IM) is commonly viewed as a “spoken” medium, in light of its reputation for informality, non-standard spelling and punctuation, and use of lexical shortenings and emoticons. However, the actual nature of IM is an empirical issue that bears linguistic analysis.

  18. Microprocessorized message multiplexer

    Ejzman, S.; Guglielmi, L.; Jaeger, J.J.

    1980-07-01

    The 'Microprocessorized Message Multiplexer' is an elementary development tool used to create and debug the software of a target microprocessor (User Module: UM). It connects together four devices: a terminal, a cassette recorder, the target microprocessor and a host computer where macro and editor for the M 6800 microprocessor are resident [fr

  19. Grounding in Instant Messaging

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  20. 3. Secure Messaging

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 1. Electronic Commerce - Secure Messaging. V Rajaraman. Series Article Volume 6 Issue 1 January 2001 pp 8-17. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/01/0008-0017 ...

  1. Librarians’ messages to publishers: turning research into practice

    Bernie Folan

    2017-11-01

    Full Text Available In early 2017 a piece of research was carried out via questionnaire asking librarians to share the messages they wanted to convey to publishers. There was the option of anonymous submission to encourage candour. This research aimed to supplement messages offered to publishers and other organizations via library advisory board meetings, conference talks and other channels. The hope is to facilitate understanding and to progress the library/publisher partnership that is essential for a healthy future for research communication. A lightning talk at the 2017 UKSG Annual Conference summarized the key findings. This article now shares the findings in more depth and delves into the detail of the most recurrent themes. It also features some organizational case studies which illustrate how the findings are being used practically and/or how these organizations ensure they understand the needs of the libraries they work with. These case studies may help other publishers with the implementation of listening programmes.

  2. Passing crisis and emergency risk communications: the effects of communication channel, information type, and repetition.

    Edworthy, Judy; Hellier, Elizabeth; Newbold, Lex; Titchener, Kirsteen

    2015-05-01

    Three experiments explore several factors which influence information transmission when warning messages are passed from person to person. In Experiment 1, messages were passed down chains of participants using five different modes of communication. Written communication channels resulted in more accurate message transmission than verbal. In addition, some elements of the message endured further down the chain than others. Experiment 2 largely replicated these effects and also demonstrated that simple repetition of a message eliminated differences between written and spoken communication. In a final field experiment, chains of participants passed information however they wanted to, with the proviso that half of the chains could not use telephones. Here, the lack of ability to use a telephone did not affect accuracy, but did slow down the speed of transmission from the recipient of the message to the last person in the chain. Implications of the findings for crisis and emergency risk communication are discussed. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  3. Development of special libraries in Slovenia

    Nada Češnovar

    2002-01-01

    Although Slovenia is a small European country with only 2 million inhabitants, Slovenian librarianship can be compared with any other bigger country. The staffing and information technology in special libraries have been accelerating for the last four decades.Seventeen years have passed since the first meeting of special libraries. When Slovenia attained independence, numerous changes occured in the field of special librarianship.Due to the economic crisis, several special libraries of enterp...

  4. Does the Screening Status of Message Characters Affect Message Effects?

    Alber, Julia M.; Glanz, Karen

    2018-01-01

    Public health messages can be used to increase awareness about colorectal cancer screenings. Free or inexpensive images for creating health messages are readily available, yet little is known about how a pictured individual's engagement in the behavior of interest affects message outcomes. Participants (N = 360), aged 50 to 75 years, completed an…

  5. 76 FR 25695 - Public Health Information Network (PHIN) Messaging Guide for Syndromic Surveillance

    2011-05-05

    .../library/2011/guides/Syndromic_Surveillance_Implementation_Guide_Release_1_4.pdf . Written comments... http://www.cdc.gov/phin/library/2011/guides/Syndromic_Surveillance_Implementation_Guide_Release_1_4.pdf...-2011-0004] Public Health Information Network (PHIN) Messaging Guide for Syndromic Surveillance AGENCY...

  6. Degree sequence in message transfer

    Yamuna, M.

    2017-11-01

    Message encryption is always an issue in current communication scenario. Methods are being devised using various domains. Graphs satisfy numerous unique properties which can be used for message transfer. In this paper, I propose a message encryption method based on degree sequence of graphs.

  7. Evolution and Use of School Library Resources in Nigeria | Akanwa ...

    Development of library resources in all library environments - schools, public, academic, etc. should not be static, but dynamic, so that they can handle the educational and recreational needs of their clientele as years pass on. This paper discussed the evolution and use of school library resources in Nigeria from 1960s to ...

  8. Message from Fermilab Director

    2009-01-01

    With this issue’s message, Fermilab Director Pier Oddone opens a new series of occasional exchanges between CERN and other laboratories world-wide. As part of this exchange, CERN Director-General Rolf Heuer, wrote a message in Tuesday’s edition of Fermilab TodayPerspectivesNothing is more important for our worldwide particle physics community than successfully turning on the LHC later this year. The promise for great discoveries is huge, and many of the plans for our future depend on LHC results. Those of us planning national programmes in anticipation of data from the LHC face formidable challenges to develop future facilities that are complementary to the LHC, whatever the physics discoveries may be. At Fermilab, this has led us to move forcefully with a programme at the intensity frontier, where experiments with neutrinos and rare decays open a complementary window into nature. Our ultimate goal for a unified picture of nat...

  9. ZeroMQ messaging for many applications

    Hintjens, Pieter

    2013-01-01

    Dive into ØMQ (aka ZeroMQ), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. ØMQ maintainer Pieter Hintjens takes you on a tour of real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns. Learn how to use specific ØMQ programming techniques, build multithreaded applications, and create your own messaging architectures. You’ll discover how ØMQ works with several programming languages and most operating systems—with little or no cost. Learn ØMQ’s main patterns: request-reply, publish-subscribe, and pipeline Work with ØMQ sockets and patterns by building several small applications Explore advanced uses of ØMQ’s request-reply pattern through working examples Build reliable request...

  10. ZeroMQ: Messaging Made Simple

    CERN. Geneva

    2013-01-01

    Since its inception in 2007, ZeroMQ has defined a new product category of thin, fast, open source message transports. This little library has now grown into a large, vibrant community of projects tied together with standard protocols and APIs. Applications, written in any language, talk to each other over TCP, multicast, or inproc transports, using a single socket-based API, and a set of "patterns" (pub-sub, request-reply, dealer-router, pipeline). ZeroMQ handles message framing, batching, and I/O, but ignores aspects like serialization and persistence. By focussing on the essentials, and acting as a toolkit rather than a pre-packaged solution, ZeroMQ turns the complex problem of distributed computing into a relatively simple recipe. About the speaker Pieter Hintjens is a writer, programmer, and public speaker who has spent decades building large software systems, organizations, and businesses. He designed the Advanced Message Queuing Protocol (AMQP) in 2006 for JPMorganChase and left ...

  11. Effects of argument quality, source credibility and self-reported diabetes knowledge on message attitudes: an experiment using diabetes related messages.

    Lin, Tung-Cheng; Hwang, Lih-Lian; Lai, Yung-Jye

    2017-05-17

    Previous studies have reported that credibility and content (argument quality) are the most critical factors affecting the quality of health information and its acceptance and use; however, this causal relationship merits further investigation in the context of health education. Moreover, message recipients' prior knowledge may moderate these relationships. This study used the elaboration likelihood model to determine the main effects of argument quality, source credibility and the moderating effect of self-reported diabetes knowledge on message attitudes. A between-subjects experimental design using an educational message concerning diabetes for manipulation was applied to validate the effects empirically. A total of 181 participants without diabetes were recruited from the Department of Health, Taipei City Government. Four group messages were manipulated in terms of argument quality (high and low) × source credibility (high and low). Argument quality and source credibility of health information significantly influenced the attitude of message recipients. The participants with high self-reported knowledge participants exhibited significant disapproval for messages with low argument quality. Effective health information should provide objective descriptions and cite reliable sources; in addition, it should provide accurate, customised messages for recipients who have high background knowledge level and ability to discern message quality. © 2017 Health Libraries Group Health Information & Libraries Journal.

  12. About the Library - Betty Petersen Memorial Library

    branch library of the NOAA Central Library. The library serves the NOAA Science Center in Camp Springs , Maryland. History and Mission: Betty Petersen Memorial Library began as a reading room in the NOAA Science Science Center staff and advises the library on all aspects of the library program. Library Newsletters

  13. Library Use

    Konzack, Lars

    2012-01-01

    A seminar paper about a survey of role-playing games in public libraries combined with three cases and a presentation of a model.......A seminar paper about a survey of role-playing games in public libraries combined with three cases and a presentation of a model....

  14. Addressing medication nonadherence by mobile phone: development and delivery of tailored messages.

    Gatwood, Justin; Balkrishnan, Rajesh; Erickson, Steven R; An, Lawrence C; Piette, John D; Farris, Karen B

    2014-01-01

    Medication nonadherence remains a significant public health problem, and efforts to improve adherence have shown only limited impact. The tailoring of messages has become a popular method of developing communication to influence specific health-related behaviors but the development and impact of tailored text messages on medication use is poorly understood. The aim of this paper is to describe an approach to developing theory-based tailored messages for delivery via mobile phone to improve medication adherence among patients with diabetes. Kreuter's five-step tailoring process was followed to create tailored messages for mobile phone delivery. Two focus group sessions, using input from 11 people, and expert review of message content were used to adapt the survey instrument on which the messages were tailored and edit the developed messages for the target population. Following established tailoring methods a library of 168 theory-driven and 128 medication-specific tailored messages were developed and formatted for automated delivery to mobile phones. Concepts from the Health Belief Model and Self-Determination Theory were used to craft the messages and an algorithm was applied to determine the order and timing of messages with the aim of progressively influencing disease and treatment-related beliefs driving adherence to diabetes medication. The process described may be applied to future investigations aiming to improve medication adherence in patients with diabetes and the effectiveness of the current messages will be tested in a planned analysis. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. North Texas Sediment Budget: Sabine Pass to San Luis Pass

    2006-09-01

    concrete units have been placed over sand-filled fabric tube . .......................................33 Figure 28. Sand-filled fabric tubes protecting...system UTM Zone 15, NAD 83 Longshore drift directions King (in preparation) Based on wave hindcast statistics and limited buoy data Rollover Pass...along with descriptions of the jetties and limited geographic coordinate data1 (Figure 18). The original velum or Mylar sheets from which the report

  16. Development of special libraries in Slovenia

    Nada Češnovar

    2002-01-01

    Full Text Available Although Slovenia is a small European country with only 2 million inhabitants, Slovenian librarianship can be compared with any other bigger country. The staffing and information technology in special libraries have been accelerating for the last four decades.Seventeen years have passed since the first meeting of special libraries. When Slovenia attained independence, numerous changes occured in the field of special librarianship.Due to the economic crisis, several special libraries of enterprises were abolished, while on the other hand, the number of special libraries in public institutions has increased. The article deals with the changes which have influenced the development of special librarianship in Slovenia.

  17. News from the Library: Your opinion matters!

    CERN Library

    2013-01-01

    The collection of ebooks offered by the CERN Library has dramatically increased over the last 3 years. To better assess their usage and to get feedback on the quality of the collection, we are launching a survey: click here.     We hope that you can find the time to answer our questions. The survey doesn't take more than 15 minutes. Your feedback would greatly help the CERN Library to improve its ebook services and collections. Please fill in the survey before 15 January. It is available here. Your feedback is welcome: send us a message to library.desk@cern.ch. Thank you for your cooperation,

  18. News from the Library: Your opinion matters!

    CERN Library

    2013-01-01

    The collection of e-books available from the CERN Library has dramatically increased over the last 3 years. To better assess their usage and to get feedback on the quality of the collection, we are launching a survey: click here.     We hope that you can find the time to answer our questions. The survey doesn't take more than 15 minutes to complete. Your feedback would greatly help the CERN Library to improve its ebook services and collections. Please fill in the survey before 15 January. It is available here. Your feedback is welcome: send us a message to library.desk@cern.ch. Thank you for your cooperation,

  19. Performance comparison analysis library communication cluster system using merge sort

    Wulandari, D. A. R.; Ramadhan, M. E.

    2018-04-01

    Begins by using a single processor, to increase the speed of computing time, the use of multi-processor was introduced. The second paradigm is known as parallel computing, example cluster. The cluster must have the communication potocol for processing, one of it is message passing Interface (MPI). MPI have many library, both of them OPENMPI and MPICH2. Performance of the cluster machine depend on suitable between performance characters of library communication and characters of the problem so this study aims to analyze the comparative performances libraries in handling parallel computing process. The case study in this research are MPICH2 and OpenMPI. This case research execute sorting’s problem to know the performance of cluster system. The sorting problem use mergesort method. The research method is by implementing OpenMPI and MPICH2 on a Linux-based cluster by using five computer virtual then analyze the performance of the system by different scenario tests and three parameters for to know the performance of MPICH2 and OpenMPI. These performances are execution time, speedup and efficiency. The results of this study showed that the addition of each data size makes OpenMPI and MPICH2 have an average speed-up and efficiency tend to increase but at a large data size decreases. increased data size doesn’t necessarily increased speed up and efficiency but only execution time example in 100000 data size. OpenMPI has a execution time greater than MPICH2 example in 1000 data size average execution time with MPICH2 is 0,009721 and OpenMPI is 0,003895 OpenMPI can customize communication needs.

  20. Validation of mobile phone text messages for nicotine and tobacco risk communication among college students: A content analysis

    Georges Elias Khalil; Karen S. Calabro; Brittani Crook; Tamara C Machado; Cheryl L. Perry; Alexander V. Prokhorov

    2018-01-01

    Introduction In the United States, young adults have the highest prevalence of tobacco use. The dissemination of mobile phone text messages is a growing strategy for tobacco risk communication among young adults. However, little has been done concerning the design and validation of such text messages. The Texas Tobacco Center of Regulatory Science (Texas-TCORS) has developed a library of messages based on framing (gain- or loss-framed), depth (simple or complex) and appea...

  1. Making it their idea: The Learning Cycle in library instruction

    Eric Frierson

    2010-03-01

    Full Text Available http://www.flickr.com/photos/penguinchris/ / CC BY-NC-ND 2.0 Librarians are always struggling to convince someone of something: convincing voters to say ‘yes’ to a library bond; persuading a library director to invest in a text-messaging reference tool; trying to get students to use library resources instead of Google. One of the most effective ways to be successful is [...

  2. Nigerian Libraries

    Bridging the digital divide: the potential role of the National Library of Nigeria · EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT. Juliana Obiageri Akidi, Joy Chituru Onyenachi, 11-19 ...

  3. Library Locations

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — Carnegie Library of Pittsburgh locations including address, coordinates, phone number, square footage, and standard operating hours. The map below does not display...

  4. academic libraries

    Information Impact: Journal of Information and Knowledge Management

    Information Impact: Journal of Information and Knowledge Management ... Key words: academic libraries, open access, research, researchers, technology ... European commission (2012) reports that affordable and easy access to the results ...

  5. A Messaging Infrastructure for WLCG

    Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin

    2011-01-01

    During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.

  6. Survey of Instant Messaging Applications Encryption Methods

    Kabakuş, Abdullah; Kara, Resul

    2015-01-01

    Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Reali...

  7. Design for manufacturability of a VDSM standard cell library

    Zhou Chong; Zeng Jianping; Chen Lan; Yin Minghui; Zhao Jie

    2012-01-01

    This paper presents a method of designing a 65 nm DFM standard cell library. By reducing the amount of the library largely, the process of optical proximity correction (OPC) becomes more efficient and the need for large storage is reduced. This library is more manufacture-friendly as each cell has been optimized according to the DFM rule and optical simulation. The area penalty is minor compared with traditional library, and the timing, as well as power has a good performance. Furthermore, this library has passed the test from the Technology Design Department of Foundry. The result shows this DFM standard cell library has advantages that improve the yield. (semiconductor integrated circuits)

  8. What motivates consumers to re-tweet brand content? The impact of information, emotion, and traceability on pass-along behavior

    Araujo, T.; Neijens, P.; Vliegenthart, R.

    2015-01-01

    How do certain cues influence pass-along behavior (re-Tweeting) of brand messages on Twitter? Analyzing 19,343 global brand messages over a three-year period, the authors of this article found that informational cues were predictors of higher levels of re-Tweeting, particularly product details and

  9. Getting Your Message Across: Mobile Phone Text Messaging

    Beecher, Constance C.; Hayungs, Lori

    2017-01-01

    Want to send a message that 99% of your audience will read? Many Extension professionals are familiar with using social media tools to enhance Extension programming. Extension professionals may be less familiar with the use of mobile phone text-based marketing tools. The purpose of this article is to introduce SMS (short message system) marketing…

  10. Chaos-pass filtering in injection-locked semiconductor lasers

    Murakami, Atsushi; Shore, K. Alan

    2005-01-01

    Chaos-pass filtering (CPF) of semiconductor lasers has been studied theoretically. CPF is a phenomenon which occurs in laser chaos synchronization by injection locking and is a fundamental technique for the extraction of messages at the receiver laser in chaotic communications systems. We employ a simple theory based on driven damped oscillators to clarify the physical background of CPF. The receiver laser is optically driven by injection from the transmitter laser. We have numerically investigated the response characteristics of the receiver when it is driven by periodic (message) and chaotic (carrier) signals. It is thereby revealed that the response of the receiver laser in the two cases is quite different. For the periodic drive, the receiver exhibits a response depending on the signal frequency, while the chaotic drive provides a frequency-independent synchronous response to the receiver laser. We verify that the periodic and chaotic drives occur independently in the CPF response, and, consequently, CPF can be clearly understood in the difference of the two drives. Message extraction using CPF is also examined, and the validity of our theoretical explanation for the physical mechanism underlying CPF is thus verified

  11. A Visualized Message Interface (VMI) for intelligent messaging services

    Endo, T.; Kasahara, H.; Nakagawa, T.

    1984-01-01

    In CCITT, Message Handling Systems (MHS) have been studied from the viewpoint of communications protocol standardization. In addition to MHS services, Message Processing (MP) services, such as image processing, filing and retrieving services, will come into increasing demand in office automation field. These messaging services, including MHS services, can be thought of as Intelligent Messaging (IM) services. IM services include many basic services, optional user facilities and service parameters. Accordingly, it is necessary to deal with these parameters and MP procedures in as systematic and user-friendly a manner as possible. As one step towards realizing a user-friendly IM services interface, the characteristics of IM service parameters are studied and a Visualized Message Interface (VMI) which resembles a conventional letter exchange format is presented. The concept of VMI formation is discussed using the generic document structure concept as well as a Screen Interface and Protocol Interface conversion package

  12. Connecticut church passes genetics resolution.

    Culliton, B J

    1984-11-09

    The Connecticut Conference of the United Church of Christ, which represents the largest Protestant denomination in the state, has passed a resolution affirming an ethical duty to do research on human gene therapy and is planning to form local church groups to study the scientific and ethical issues involved. The resolution is intended to counter an earlier one proposed by Jeremy Rifkin to ban all efforts at engineering specific traits into the human germline. The Rifkin proposal had been endorsed by a large number of religious leaders, including the head of the U.S. United Church of Christ, but was subsequently characterized by many of the church leaders as overly restrictive.

  13. The library of the Royal Society of Physicians in Budapest becomes today's Semmelweis Medical History Library.

    Kaproncszay, Katalin; Magyar, László András; Putnam, Constance E

    2011-01-01

    The 170-year history of the library of the Royal Society of Medicine in Budapest illustrates both that political and cultural context matter and that "medical" libraries, if they survive, in due course become primarily "medical history" libraries. Two of the authors are on the staff of the Semmelweis Medical History Library; the third is a US scholar who makes frequent use of the library. Together, they avail themselves of archival and published materials-and personal experience with the collection-to establish the context that produced the original library, trace its evolution, and describe its present-day incarnation. A tale of transformation emerges that reflects how collections are likely to change. The authors present events and individuals in the life of the Royal Society's library and paint a picture of the value of today's Semmelweis Medical History Library. Unique treasures in the collection are described. The story told here is of how a particular nineteenth-century library became a twenty-first-century institution. The authors establish its peculiarly Hungarian context and potential value to librarians and historians from outside Hungary. The overall message is that general medical libraries everywhere are perforce likely to become medical historical libraries over time.

  14. Practical application of standards in special libraries

    Nada Češnovar

    1998-01-01

    Full Text Available Special libraries in Slovenia represent an important part of information infrastructure.They operate in the spheres of economy, culture, politics, health, and others.Although they perform an important role in the process of professional training of the employees they are too often set aside.Our government is undoubtedly aware of the deficiency of normative regulation in these areas; however, passing of certain acts is often delayed because there is no direct damage to the state itself if they are not passed. New standards for special libraries regulating their operation have been prepared. Their practical application will be tested in practice. Several years of experience as a counsellor to special libraries enable the author an insight into the use of standards. Standards are certainly an indispensable "reading" for special libraries although they are certainly not perfect.

  15. The library

    1980-01-01

    A specialized library is essential for conducting the research work of the Uranium Institute. The need was recognized at the foundation of the Institute and a full-time librarian was employed in 1976 to establish the necessary systems and begin the task of building up the collection. A brief description is given of the services offered by the library which now contains books, periodicals, pamphlets and press cuttings, focussed on uranium and nuclear energy, but embracing economics, politics, trade, legislation, geology, mining and mineral processing, environmental protection and nuclear technology. (author)

  16. Libraries on the MOVE.

    Edgar, Jim; And Others

    1986-01-01

    Presents papers from Illinois State Library and Shawnee Library System's "Libraries on the MOVE" conference focusing on how libraries can impact economic/cultural climate of an area. Topics addressed included information services of rural libraries; marketing; rural library development; library law; information access; interagency…

  17. Personal Virtual Libraries

    Pappas, Marjorie L.

    2004-01-01

    Virtual libraries are becoming more and more common. Most states have a virtual library. A growing number of public libraries have a virtual presence on the Web. Virtual libraries are a growing addition to school library media collections. The next logical step would be personal virtual libraries. A personal virtual library (PVL) is a collection…

  18. America's Star Libraries

    Lyons, Ray; Lance, Keith Curry

    2009-01-01

    "Library Journal"'s new national rating of public libraries, the "LJ" Index of Public Library Service, identifies 256 "star" libraries. It rates 7,115 public libraries. The top libraries in each group get five, four, or three Michelin guide-like stars. All included libraries, stars or not, can use their scores to learn from their peers and improve…

  19. The Swedish Blood Pass project.

    Berglund, B; Ekblom, B; Ekblom, E; Berglund, L; Kallner, A; Reinebo, P; Lindeberg, S

    2007-06-01

    Manipulation of the blood's oxygen carrying capacity (CaO(2)) through reinfusion of red blood cells, injections of recombinant erythropoietin or by other means results in an increased maximal oxygen uptake and concomitantly enhanced endurance performance. Therefore, there is a need to establish a system--"A Blood Pass"--through which such illegal and unethical methods can be detected. Venous blood samples were taken under standardized conditions from 47 male and female Swedish national and international elite endurance athletes four times during the athletic year of the individual sport (beginning and end of the preparation period and at the beginning and during peak performance in the competition period). In these samples, different hematological values were determined. ON(hes) and OFF(hre) values were calculated according to the formula of Gore et al. A questionnaire regarding training at altitude, alcohol use and other important factors for hematological status was answered by the athletes. There were some individual variations comparing hematological values obtained at different times of the athletic year or at the same time in the athletic year but in different years. However, the median values of all individual hematological, ON(hes) and OFF(hre), values taken at the beginning and the end of the preparation or at the beginning and the end of the competition period, respectively, as well as median values for the preparation and competition periods in the respective sport, were all within the 95% confidence limit (CI) of each comparison. It must be mentioned that there was no gender difference in this respect. This study shows that even if there are some individual variations in different hematological values between different sampling times in the athletic year, median values of important hematological factors are stable over time. It must be emphasized that for each blood sample, the 95% CI in each athlete will be increasingly narrower. The conclusion is that

  20. The PASS project architectural model

    Day, C.T.; Loken, S.; Macfarlane, J.F.

    1994-01-01

    The PASS project has as its goal the implementation of solutions to the foreseen data access problems of the next generation of scientific experiments. The architectural model results from an evaluation of the operational and technical requirements and is described in terms of an abstract reference model, an implementation model and a discussion of some design aspects. The abstract reference model describes a system that matches the requirements in terms of its components and the mechanisms by which they communicate, but does not discuss policy or design issues that would be necessary to match the model to an actual implementation. Some of these issues are discussed, but more detailed design and simulation work will be necessary before choices can be made

  1. Library Automation.

    Husby, Ole

    1990-01-01

    The challenges and potential benefits of automating university libraries are reviewed, with special attention given to cooperative systems. Aspects discussed include database size, the role of the university computer center, storage modes, multi-institutional systems, resource sharing, cooperative system management, networking, and intelligent…

  2. The role of short messaging service in supporting the delivery of healthcare: An umbrella systematic review.

    Househ, Mowafa

    2016-06-01

    Short messaging service (SMS) messages may present a convenient and cost-effective method to support healthcare interventions. This work assesses the effects of short messaging service on various healthcare interventions found in systematic reviews. The search strategy was based on two key concepts: short messaging service and healthcare delivery. The initial search was conducted in December 2012 and was updated in June 2013. Of the 550 identified references, 13 systematic reviews met the inclusion criteria, of which 8 were published in peer-reviewed journals and 5 were retrieved from the Cochrane library. Data analysis shows that low to moderate research evidence exists on the benefits of short messaging service interventions for appointment reminders, promoting health in developing countries and preventive healthcare. In many interventions, however, there were a few studies that were of high quality, and most of the studies were rated from low to moderate quality or had no rating at all. Healthcare organizations, policy makers, or clinicians using short messaging service messages to support healthcare interventions should (1) implement interventions that have been found to work in healthcare settings, (2) continue evaluating short messaging service interventions that have not been adequately assessed, and (3) improve collaboration between various healthcare entities to develop studies targeted at specific populations to evaluate the long-term impact of short messaging service on healthcare outcomes. © The Author(s) 2014.

  3. WebPASS ICASS (HR Personnel Management)

    US Agency for International Development — WebPASS Joint Administrative Support Platforms Post Administrative Software Suite - U.S. Department of State Executive Officers application suite. Web.PASS is the...

  4. Education and training in radiation protection: a challenge in passing on a difficult and intricate message

    Sabol, Jozef; Hudzietzova, Jana; Rosina, Jozef, E-mail: j.sabol44@gmail.com, E-mail: hudzijan@fbmi.cvut.cz, E-mail: rosina@fbmi.cvut.cz [Faculty of Biomedical Engineering, Czech Technical University in Prague (Czech Republic)

    2013-07-01

    Current radiation protection is a very sophisticated and elaborate domain where, once the information about the exposure of persons is known in terms of the quantity of the effective dose, we can predict resulting radiological consequences related to the stochastic risk to the health of the exposed persons without a need for other details. In fact, the effective dose contains all pertinent information including the average organ dose distribution and relevant radiation and tissue weighting factors which take into account the specific effects of different types of radiation and selected tissue radiosensitivity. Since the effective dose cannot be measured directly, one has to rely on the monitoring of other appropriate measurable quantities and then do some conversions. The current structure of radiation protection quantities includes too many quantities, the definitions of some of which are not easy to understand and interpret. Moreover, there are numerous quantities based on the dose equivalent, such as the equivalent dose, effective dose, committed equivalent dose, committed effective dose, collective equivalent dose, collective effective dose, personal dose equivalent, ambient dose equivalent and directional dose equivalent, where the only unit of Sv is used.. There are a number of cases in open literature reflecting the difficulties and mistakes in the use of radiation protection quantities. Even more complicated situations are encountered in the field, where the staff responsible for personal and workplace monitoring is confused because of so many different quantities and where the staff may not be qualified and experienced enough to be able to make the relevant conversions and interpretations. The paper summarizes our experience in teaching students and lecturing in various training courses addressing radiation protection where the primary task was to ensure that all radiation protection personnel understood the quantities and units used in radiation protection in the correct way consistent with their latest definitions and ICRP recommendations. (author)

  5. A Survey of Rollback-Recovery Protocols in Message-Passing Systems

    1999-06-01

    and M.A. Castillo. "Checkpointing through garbage collection." Technical report. Departamento de Ciencia de la Computation, Escuela de Ingenieria ...between consecutive checkpoints. It can be implemented by using the dirty-bit of the memory protection hardware or by emulating a dirty-bit in software [4...compare the program’s state with the previous checkpoint in software , and writing the difference in a new checkpoint [46]. The required storage and

  6. Message-Passing Receiver for OFDM Systems over Highly Delay-Dispersive Channels

    Barbu, Oana-Elena; Manchón, Carles Navarro; Rom, Christian

    2017-01-01

    Propagation channels with maximum excess delay exceeding the duration of the cyclic prefix (CP) in OFDM systems cause intercarrier and intersymbol interference which, unless accounted for, degrade the receiver performance. Using tools from Bayesian inference and sparse signal reconstruction, we...... derive an iterative algorithm that estimates an approximate representation of the channel impulse response and the noise variance, estimates and cancels the intrinsic interference and decodes the data over a block of symbols. Simulation results show that the receiver employing our algorithm outperforms...

  7. A model based message passing approach for flexible and scalable home automation controllers

    Bienhaus, D. [INNIAS GmbH und Co. KG, Frankenberg (Germany); David, K.; Klein, N.; Kroll, D. [ComTec Kassel Univ., SE Kassel Univ. (Germany); Heerdegen, F.; Jubeh, R.; Zuendorf, A. [Kassel Univ. (Germany). FG Software Engineering; Hofmann, J. [BSC Computer GmbH, Allendorf (Germany)

    2012-07-01

    There is a large variety of home automation systems that are largely proprietary systems from different vendors. In addition, the configuration and administration of home automation systems is frequently a very complex task especially, if more complex functionality shall be achieved. Therefore, an open model for home automation was developed that is especially designed for easy integration of various home automation systems. This solution also provides a simple modeling approach that is inspired by typical home automation components like switches, timers, etc. In addition, a model based technology to achieve rich functionality and usability was implemented. (orig.)

  8. Shared memory and message passing revisited in the many-core era

    CERN. Geneva

    2016-01-01

    In the 70s, Edsgar Dijkstra, Per Brinch Hansen and C.A.R Hoare introduced the fundamental concepts for concurrent computing. It was clear that concrete communication mechanisms were required in order to achieve effective concurrency. Whether you're developing a multithreaded program running on a single node, or a distributed system spanning over hundreds of thousands cores, the choice of the communication mechanism for your system must be done intelligently because of the implicit programmability, performance and scalability trade-offs. With the emergence of many-core computing architectures many assumptions may not be true anymore. In this talk we will try to provide insight on the characteristics of these communication models by providing basic theoretical background and then focus on concrete practical examples based on indicative use case scenarios. The case studies of this presentation cover popular programming models, operating systems and concurrency frameworks in the context of many-core processors.

  9. On the adequacy of message-passing parallel supercomputers for solving neutron transport problems

    Azmy, Y.Y.

    1990-01-01

    A coarse-grained, static-scheduling parallelization of the standard iterative scheme used for solving the discrete-ordinates approximation of the neutron transport equation is described. The parallel algorithm is based on a decomposition of the angular domain along the discrete ordinates, thus naturally producing a set of completely uncoupled systems of equations in each iteration. Implementation of the parallel code on Intcl's iPSC/2 hypercube, and solutions to test problems are presented as evidence of the high speedup and efficiency of the parallel code. The performance of the parallel code on the iPSC/2 is analyzed, and a model for the CPU time as a function of the problem size (order of angular quadrature) and the number of participating processors is developed and validated against measured CPU times. The performance model is used to speculate on the potential of massively parallel computers for significantly speeding up real-life transport calculations at acceptable efficiencies. We conclude that parallel computers with a few hundred processors are capable of producing large speedups at very high efficiencies in very large three-dimensional problems. 10 refs., 8 figs

  10. Parallel multigrid methods: implementation on message-passing computers and applications to fluid dynamics. A draft

    Solchenbach, K.; Thole, C.A.; Trottenberg, U.

    1987-01-01

    For a wide class of problems in scientific computing, in particular for partial differential equations, the multigrid principle has proved to yield highly efficient numerical methods. However, the principle has to be applied carefully: if the multigrid components are not chosen adequately with respect to the given problem, the efficiency may be much smaller than possible. This has been demonstrated for many practical problems. Unfortunately, the general theories on multigrid convergence do not give much help in constructing really efficient multigrid algorithms. Although some progress has been made in bridging the gap between theory and practice during the last few years, there are still several theoretical approaches which are misleading rather than helpful with respect to the objective of real efficiency. The research in finding highly efficient algorithms for non-model applications therefore is still a sophisticated mixture of theoretical considerations, a transfer of experiences from model to real life problems and systematical experimental work. The emphasis of the practical research activity today lies - among others - in the following fields: - finding efficient multigrid components for really complex problems, - combining the multigrid approach with advanced discretizative techniques: - constructing highly parallel multigrid algorithms. In this paper, we want to deal mainly with the last topic

  11. Education and training in radiation protection: a challenge in passing on a difficult and intricate message

    Sabol, Jozef; Hudzietzova, Jana; Rosina, Jozef

    2013-01-01

    Current radiation protection is a very sophisticated and elaborate domain where, once the information about the exposure of persons is known in terms of the quantity of the effective dose, we can predict resulting radiological consequences related to the stochastic risk to the health of the exposed persons without a need for other details. In fact, the effective dose contains all pertinent information including the average organ dose distribution and relevant radiation and tissue weighting factors which take into account the specific effects of different types of radiation and selected tissue radiosensitivity. Since the effective dose cannot be measured directly, one has to rely on the monitoring of other appropriate measurable quantities and then do some conversions. The current structure of radiation protection quantities includes too many quantities, the definitions of some of which are not easy to understand and interpret. Moreover, there are numerous quantities based on the dose equivalent, such as the equivalent dose, effective dose, committed equivalent dose, committed effective dose, collective equivalent dose, collective effective dose, personal dose equivalent, ambient dose equivalent and directional dose equivalent, where the only unit of Sv is used.. There are a number of cases in open literature reflecting the difficulties and mistakes in the use of radiation protection quantities. Even more complicated situations are encountered in the field, where the staff responsible for personal and workplace monitoring is confused because of so many different quantities and where the staff may not be qualified and experienced enough to be able to make the relevant conversions and interpretations. The paper summarizes our experience in teaching students and lecturing in various training courses addressing radiation protection where the primary task was to ensure that all radiation protection personnel understood the quantities and units used in radiation protection in the correct way consistent with their latest definitions and ICRP recommendations. (author)

  12. Mobile phone messaging for preventive health care.

    Vodopivec-Jamsek, Vlasta; de Jongh, Thyra; Gurol-Urganci, Ipek; Atun, Rifat; Car, Josip

    2012-12-12

    Preventive health care promotes health and prevents disease or injuries by addressing factors that lead to the onset of a disease, and by detecting latent conditions to reduce or halt their progression. Many risk factors for costly and disabling conditions (such as cardiovascular diseases, cancer, diabetes, and chronic respiratory diseases) can be prevented, yet healthcare systems do not make the best use of their available resources to support this process. Mobile phone messaging applications, such as Short Message Service (SMS) and Multimedia Message Service (MMS), could offer a convenient and cost-effective way to support desirable health behaviours for preventive health care. To assess the effects of mobile phone messaging interventions as a mode of delivery for preventive health care, on health status and health behaviour outcomes. We searched: the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library 2009, Issue 2), MEDLINE (OvidSP) (January 1993 to June 2009), EMBASE (OvidSP) (January 1993 to June 2009), PsycINFO (OvidSP) (January 1993 to June 2009), CINAHL (EbscoHOST) (January 1993 to June 2009), LILACS (January 1993 to June 2009) and African Health Anthology (January 1993 to June 2009).We also reviewed grey literature (including trial registers) and reference lists of articles. We included randomised controlled trials (RCTs), quasi-randomised controlled trials (QRCTs), controlled before-after (CBA) studies, and interrupted time series (ITS) studies with at least three time points before and after the intervention. We included studies using SMS or MMS as a mode of delivery for any type of preventive health care. We only included studies in which it was possible to assess the effects of mobile phone messaging independent of other technologies or interventions. Two review authors independently assessed all studies against the inclusion criteria, with any disagreements resolved by a third review author. Study design features

  13. MARKETING LIBRARY SERVICES IN ACADEMIC LIBRARIES: A ...

    MARKETING LIBRARY SERVICES IN ACADEMIC LIBRARIES: A TOOL FOR SURVIVAL IN THE ... This article discusses the concept of marketing library and information services as an ... EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  14. Validation of mobile phone text messages for nicotine and tobacco risk communication among college students: A content analysis.

    Khalil, Georges E; Calabro, Karen S; Crook, Brittani; Machado, Tamara C; Perry, Cheryl L; Prokhorov, Alexander V

    2018-02-01

    In the United States, young adults have the highest prevalence of tobacco use. The dissemination of mobile phone text messages is a growing strategy for tobacco risk communication among young adults. However, little has been done concerning the design and validation of such text messages. The Texas Tobacco Center of Regulatory Science (Texas-TCORS) has developed a library of messages based on framing (gain- or loss-framed), depth (simple or complex) and appeal (emotional or rational). This study validated the library based on depth and appeal, identified text messages that may need improvement, and explored new themes. The library formed the study sample (N=976 messages). The Linguistic Inquiry and Word Count (LIWC) software of 2015 was used to code for word count, word length and frequency of emotional and cognitive words. Analyses of variance, logistic regression and scatter plots were conducted for validation. In all, 874 messages agreed with LIWC-coding. Several messages did not agree with LIWC. Ten messages designed to be complex indicated simplicity, while 51 messages designed to be rational exhibited no cognitive words. New relevant themes were identified, such as health (e.g. 'diagnosis', 'cancer'), death (e.g. 'dead', 'lethal') and social connotations (e.g. 'parents', 'friends'). Nicotine and tobacco researchers can safely use, for young adults, messages from the Texas-TCORS library to convey information in the intended style. Future work may expand upon the new themes. Findings will be utilized to develop new campaigns, so that risks of nicotine and tobacco products can be widely disseminated.

  15. Validation of mobile phone text messages for nicotine and tobacco risk communication among college students: A content analysis

    Khalil, Georges E.; Calabro, Karen S.; Crook, Brittani; Machado, Tamara C.; Perry, Cheryl L.; Prokhorov, Alexander V.

    2018-01-01

    INTRODUCTION In the United States, young adults have the highest prevalence of tobacco use. The dissemination of mobile phone text messages is a growing strategy for tobacco risk communication among young adults. However, little has been done concerning the design and validation of such text messages. The Texas Tobacco Center of Regulatory Science (Texas-TCORS) has developed a library of messages based on framing (gain- or loss-framed), depth (simple or complex) and appeal (emotional or rational). This study validated the library based on depth and appeal, identified text messages that may need improvement, and explored new themes. METHODS The library formed the study sample (N=976 messages). The Linguistic Inquiry and Word Count (LIWC) software of 2015 was used to code for word count, word length and frequency of emotional and cognitive words. Analyses of variance, logistic regression and scatter plots were conducted for validation. RESULTS In all, 874 messages agreed with LIWC-coding. Several messages did not agree with LIWC. Ten messages designed to be complex indicated simplicity, while 51 messages designed to be rational exhibited no cognitive words. New relevant themes were identified, such as health (e.g. ‘diagnosis’, ‘cancer’), death (e.g. ‘dead’, ‘lethal’) and social connotations (e.g. ‘parents’, ‘friends’). CONCLUSIONS Nicotine and tobacco researchers can safely use, for young adults, messages from the Texas-TCORS library to convey information in the intended style. Future work may expand upon the new themes. Findings will be utilized to develop new campaigns, so that risks of nicotine and tobacco products can be widely disseminated.

  16. GPS Ephemeris Message Broadcast Simulation

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  17. Military Message Experiment. Volume II.

    1982-04-01

    elements of the Department of Defense. This resulted in a memorandum from the Director, Telecomunications and Comand and Control, OSD, in June 1975...1978 to April 1979 and provides a discussion of the telecomunications inter- face aspects of the experiment. This Final Report covers the period of...arise in the telecomunication system which require A retransmission of an outgoing message. A "service" message may be created within the

  18. News from the Library: Digital signage: what is it?

    2012-01-01

    As you might know, "digital signage" is a form of electronic display that shows information, advertising and other messages in both public and private environments.   If you visited the Library lately, you probably discovered that something has changed in the way we inform library users of how our collections and services are evolving. A screen has now replaced the traditional shelf or showcase where libraries usually display new book acquisitions. This new digital showcase dynamically displays new book and ebook acquisitions in the Library, new titles available in the Bookshop, and most downloaded ebooks. The same content will be soon displayed also on the CERN digital signage network.

  19. Triplets pass their pressure test

    2007-01-01

    All the LHC inner triplets have now been repaired and are in position. The first ones have passed their pressure tests with flying colours. The repaired inner triplet at LHC Point 1, right side (1R). Ranko Ostojic (on the right), who headed the team responsible for repairing the triplets, shows the magnet to Robert Zimmer, President of the University of Chicago and of Fermi Research Alliance, who visited CERN on 20th August.Three cheers for the triplets! All the LHC inner triplets have now been repaired and are in position in the tunnel. Thanks to the mobilisation of a multidisciplinary team from CERN and Fermilab, assisted by the KEK Laboratory and the Lawrence Berkeley National Laboratory (LBNL), a solution has been found, tested, validated and applied. At the end of March this year, one of the inner triplets at Point 5 failed to withstand a pressure test. A fault was identified in the supports of two out of the three quadruple magne...

  20. Development of a distributed control system for TOTEM experiment using ASIO Boost C++ libraries

    Cafagna, F.; Mercadante, A.; Minafra, N.; Quinto, M.; Radicioni, E.

    2014-06-01

    The main goals of the TOTEM Experiment at the LHC are the measurements of the elastic and total p-p cross sections and the studies of the diffractive dissociation processes. Those scientific objectives are achieved by using three tracking detectors symmetrically arranged around the interaction point called IP5. The control system is based on a C++ software that allows the user, by means of a graphical interface, direct access to hardware and handling of devices configuration. A first release of the software was designed as a monolithic block, with all functionalities being merged together. Such approach showed soon its limits, mainly poor reusability and maintainability of the source code, evident not only in phase of bug-fixing, but also when one wants to extend functionalities or apply some other modifications. This led to the decision of a radical redesign of the software, now based on the dialogue (message-passing) among separate building blocks. Thanks to the acquired extensibility, the software gained new features and now is a complete tool by which it is possible not only to configure different devices interfacing with a large subset of buses like I2C and VME, but also to do data acquisition both for calibration and physics runs. Furthermore, the software lets the user set up a series of operations to be executed sequentially to handle complex operations. To achieve maximum flexibility, the program units may be run either as a single process or as separate processes on different PCs which exchange messages over the network, thus allowing remote control of the system. Portability is ensured by the adoption of the ASIO (Asynchronous Input Output) library of Boost, a cross-platform suite of libraries which is candidate to become part of the C++ 11 standard. We present the state of the art of this project and outline the future perspectives. In particular, we describe the system architecture and the message-passing scheme. We also report on the results obtained

  1. Library news

    CERN Library

    2010-01-01

    The CERN Library has been providing electronic access to the "Techniques de l'Ingénieur" database for the past 8 months. As a reminder, this is a multidisciplinary database of over 4000 technical and scientific articles in French, covering a broad range of topics such as mechanical engineering, safety, electronics and the environment. In a few simple steps, you can create your own account, select the types of documents you are interested in and configure your settings so as to receive alerts when articles in your field of activity are published. You can now access this resource from outside CERN using the "remote access to electronic resources" service. Further information is available here. Direct access to the database. Remote access to electronic resources. If you have any questions or comments, don't hesitate to contact us at: library.desk@cern.ch.

  2. Two decades of change in Dutch university art libraries

    Versteeg, M.

    2009-01-01

    In 1987 Chris Smeenk wrote in this journal about the libraries of the Dutch art historical institutes. In the 22 years that have since passed many changes have occurred, perhaps most notably the merging of the many autonomous institute libraries into larger ones. Has this led to a more professional

  3. Library Benchmarking

    Wiji Suwarno

    2017-02-01

    Full Text Available The term benchmarking has been encountered in the implementation of total quality (TQM or in Indonesian termed holistic quality management because benchmarking is a tool to look for ideas or learn from the library. Benchmarking is a processof measuring and comparing for continuous business process of systematic and continuous measurement, the process of measuring and comparing for continuous business process of an organization to get information that can help these organization improve their performance efforts.

  4. A massively parallel algorithm for the collision probability calculations in the Apollo-II code using the PVM library

    Stankovski, Z.

    1995-01-01

    The collision probability method in neutron transport, as applied to 2D geometries, consume a great amount of computer time, for a typical 2D assembly calculation evaluations. Consequently RZ or 3D calculations became prohibitive. In this paper we present a simple but efficient parallel algorithm based on the message passing host/node programing model. Parallelization was applied to the energy group treatment. Such approach permits parallelization of the existing code, requiring only limited modifications. Sequential/parallel computer portability is preserved, witch is a necessary condition for a industrial code. Sequential performances are also preserved. The algorithm is implemented on a CRAY 90 coupled to a 128 processor T3D computer, a 16 processor IBM SP1 and a network of workstations, using the Public Domain PVM library. The tests were executed for a 2D geometry with the standard 99-group library. All results were very satisfactory, the best ones with IBM SP1. Because of heterogeneity of the workstation network, we did ask high performances for this architecture. The same source code was used for all computers. A more impressive advantage of this algorithm will appear in the calculations of the SAPHYR project (with the future fine multigroup library of about 8000 groups) with a massively parallel computer, using several hundreds of processors. (author). 5 refs., 6 figs., 2 tabs

  5. A massively parallel algorithm for the collision probability calculations in the Apollo-II code using the PVM library

    Stankovski, Z.

    1995-01-01

    The collision probability method in neutron transport, as applied to 2D geometries, consume a great amount of computer time, for a typical 2D assembly calculation about 90% of the computing time is consumed in the collision probability evaluations. Consequently RZ or 3D calculations became prohibitive. In this paper the author presents a simple but efficient parallel algorithm based on the message passing host/node programmation model. Parallelization was applied to the energy group treatment. Such approach permits parallelization of the existing code, requiring only limited modifications. Sequential/parallel computer portability is preserved, which is a necessary condition for a industrial code. Sequential performances are also preserved. The algorithm is implemented on a CRAY 90 coupled to a 128 processor T3D computer, a 16 processor IBM SPI and a network of workstations, using the Public Domain PVM library. The tests were executed for a 2D geometry with the standard 99-group library. All results were very satisfactory, the best ones with IBM SPI. Because of heterogeneity of the workstation network, the author did not ask high performances for this architecture. The same source code was used for all computers. A more impressive advantage of this algorithm will appear in the calculations of the SAPHYR project (with the future fine multigroup library of about 8000 groups) with a massively parallel computer, using several hundreds of processors

  6. MessageSpace: a messaging system for health research

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  7. Reactions to threatening health messages.

    Ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; Köhninger, Constanze; Kölgen, Lizan; Pelssers, Isabelle; Schütt, Toby; Thomas, Sophia; Ruiter, Robert A C; Kok, Gerjo

    2012-11-21

    Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93). Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72). Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  8. Libraries for users services in academic libraries

    Alvite, Luisa

    2010-01-01

    This book reviews the quality and evolution of academic library services. It revises service trends offered by academic libraries and the challenge of enhancing traditional ones such as: catalogues, repositories and digital collections, learning resources centres, virtual reference services, information literacy and 2.0 tools.studies the role of the university library in the new educational environment of higher educationrethinks libraries in academic contextredefines roles for academic libraries

  9. Oil price pass-through into inflation

    Chen, Shiu-Sheng

    2009-01-01

    This paper uses data from 19 industrialized countries to investigate oil price pass-through into inflation across countries and over time. A time-varying pass-through coefficient is estimated and the determinants of the recent declining effects of oil shocks on inflation are investigated. The appreciation of the domestic currency, a more active monetary policy in response to inflation, and a higher degree of trade openness are found to explain the decline in oil price pass-through. (author)

  10. Photoacoustic Soot Spectrometer (PASS) Instrument Handbook

    Dubey, M [Los Alamos National Laboratory; Springston, S [Brookhaven National Laboratory; Koontz, A [Pacific Northwest National Laboratory; Aiken, A [Los Alamos National Laboratory

    2013-01-17

    The photoacoustic soot spectrometer (PASS) measures light absorption by aerosol particles. As the particles pass through a laser beam, the absorbed energy heats the particles and in turn the surrounding air, which sets off a pressure wave that can be detected by a microphone. The PASS instruments deployed by ARM can also simultaneously measure the scattered laser light at three wavelengths and therefore provide a direct measure of the single-scattering albedo. The Operator Manual for the PASS-3100 is included here with the permission of Droplet Measurement Technologies, the instrument’s manufacturer.

  11. Possibilities of the fish pass restoration

    Čubanová, Lea

    2018-03-01

    According to the new elaborated methodology of the Ministry of Environment of the Slovak Republic: Identification of the appropriate fish pass types according to water body typology (2015) each barrier on the river must be passable. On the barriers or structures without fish passes new ones should be design and built and on some water structures with existed but nonfunctional fish passes must be realized reconstruction or restoration of such objects. Assessment should be done in terms of the existing migratory fish fauna and hydraulic conditions. Fish fauna requirements resulting from the ichthyological research of the river section with barrier. Hydraulic conditions must than fulfil these requirements inside the fish pass body.

  12. Extracting messages masked by chaos

    Perez, G.; Cerdeira, H.A.

    1995-01-01

    We show how to extract messages that are masked by a chaotic signal in a system of two Lorenz oscillators. This mask removal is done for two different modes of transmission, a digital one where a parameter of the sender is switched between two values, and an analog mode, where a small amplitude message is added to the carrier signal. We achieve this without using a second Lorenz oscillator as receiver, and without doing a full reconstruction of the dynamics. This method is robust with respect to transformations that impede the unmasking using a Lorenz receiver, and is not affected by the broad-band noise that is inherent to the synchronization process. We also discuss the limitations of this way of extraction for messages in high frequency bands. (author). 12 refs, 4 figs

  13. EDITORIAL: Message from the Editor

    Thomas, Paul

    2009-01-01

    The end of 2008 cannot pass without remarking that the economic news has repeatedly strengthened the case for nuclear fusion; not perhaps to solve the immediate crises but to offer long-term security of energy supply. Although temporary, the passage of the price of oil through 100 per barrel is a portent of things to come and should bolster our collective determination to develop nuclear fusion into a viable energy source. It is with great pride, therefore, that I can highlight the contributions that the Nuclear Fusion journal has made to the research programme and the consolidation of its position as the lead journal in the field. Of course, the journal would be nothing without its authors and referees and I would like to pass on my sincere thanks to them all for their work in 2008 and look forward to a continuing, successful collaboration in 2009. Refereeing The Nuclear Fusion Editorial Office understands how much effort is required of our referees. The Editorial Board decided that an expression of thanks to our most loyal referees is appropriate and so, since January 2005, we have been offering the top ten most loyal referees over the past year a personal subscription to Nuclear Fusion with electronic access for one year, free of charge. To select the top referees we have adopted the criterion that a researcher should have acted as a referee or adjudicator for at least two different manuscripts during the period from November 2007 to November 2008 and provided particularly detailed advice to the authors. We have excluded our Board members and those referees who were already listed in the last four years. According to our records the following people met this criterion. Congratulations and many, many thanks! T. Hino (Hokkaido University, Japan) M. Sugihara (ITER Cadarache, France) M. Dreval (Saskatchewan University, Canada) M. Fenstermacher (General Atomics, USA) V.S. Marchenko (Institute for Nuclear Research, Ukraine) G.V. Pereverzev (Max-Planck-Institut fuer

  14. Text Messaging Interventions on Cancer Screening Rates: A Systematic Review.

    Uy, Catherine; Lopez, Jennifer; Trinh-Shevrin, Chau; Kwon, Simona C; Sherman, Scott E; Liang, Peter S

    2017-08-24

    Despite high-quality evidence demonstrating that screening reduces mortality from breast, cervical, colorectal, and lung cancers, a substantial portion of the population remains inadequately screened. There is a critical need to identify interventions that increase the uptake and adoption of evidence-based screening guidelines for preventable cancers at the community practice level. Text messaging (short message service, SMS) has been effective in promoting behavioral change in various clinical settings, but the overall impact and reach of text messaging interventions on cancer screening are unknown. The objective of this systematic review was to assess the effect of text messaging interventions on screening for breast, cervical, colorectal, and lung cancers. We searched multiple databases for studies published between the years 2000 and 2017, including PubMed, EMBASE, and the Cochrane Library, to identify controlled trials that measured the effect of text messaging on screening for breast, cervical, colorectal, or lung cancers. Study quality was evaluated using the Cochrane risk of bias tool. Our search yielded 2238 citations, of which 31 underwent full review and 9 met inclusion criteria. Five studies examined screening for breast cancer, one for cervical cancer, and three for colorectal cancer. No studies were found for lung cancer screening. Absolute screening rates for individuals who received text message interventions were 0.6% to 15.0% higher than for controls. Unadjusted relative screening rates for text message recipients were 4% to 63% higher compared with controls. Text messaging interventions appear to moderately increase screening rates for breast and cervical cancer and may have a small effect on colorectal cancer screening. Benefit was observed in various countries, including resource-poor and non-English-speaking populations. Given the paucity of data, additional research is needed to better quantify the effectiveness of this promising intervention

  15. Marketing the Virtual Library

    Fagan, Jody Condit

    2009-01-01

    Far more people are familiar with their local public or college library facility than their library's website and online resources. In fact, according to a recent survey, 96% of Americans said they had visited a library in person, but less than one-third have visited their online library. Since everyone agrees that online library resources are…

  16. State Virtual Libraries

    Pappas, Marjorie L.

    2003-01-01

    Virtual library? Electronic library? Digital library? Online information network? These all apply to the growing number of Web-based resource collections managed by consortiums of state library entities. Some, like "INFOhio" and "KYVL" ("Kentucky Virtual Library"), have been available for a few years, but others are just starting. Searching for…

  17. Public Libraries in Bangladesh.

    Khan, M. H.

    1984-01-01

    Overview of library movement in Bangladesh highlights British (1851-1947) and Pakistan periods (1947-1971), separation of Bangladesh from Pakistan, libraries in development plans (1951-1970), three important public libraries, development of national library, book resources, a library network plan, legislation, finance, leadership, library…

  18. Radiating Messages: An International Perspective.

    Walker, Janet

    2003-01-01

    Negative messages about the detrimental impacts of divorce on children prompted urgent calls in the United Kingdom for a reinstatement of traditional family values. Suggests that although the effects of divorce are real, care should be taken to avoid exaggeration, thus moving the debate to one centered on providing better support, advice, and…

  19. Re: Design Changing the Message

    Wall, Miranda Wakeman

    2008-01-01

    The advertisements that flood everyone's visual culture are designed to create desire. From the author's experience, most high school students are not aware of the messages that they are bombarded with every day, and if they are, few care or think about them critically. The author's goals for this lesson were to increase students' awareness of the…

  20. Instant Apache Camel message routing

    Ibryam, Bilgin

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This short, instruction-based guide shows you how to perform application integration using the industry standard Enterprise Integration Patterns.This book is intended for Java developers who are new to Apache Camel and message- oriented applications.

  1. The Media and the Message.

    Cook, Glenn

    2001-01-01

    The experiences of Columbine and El Cajon high schools with media onslaughts following traumatic shooting incidents underscore the importance of getting the message across and sticking to known facts. In a crisis, speculation can hurt everyone. The most important elements in crisis communications are planning and media relations. (MLH)

  2. Spatial variation in messaging effects

    Warshaw, Christopher

    2018-05-01

    There is large geographic variation in the public's views about climate change in the United States. Research now shows that climate messages can influence public beliefs about the scientific consensus on climate change, particularly in the places that are initially more skeptical.

  3. Reactions to threatening health messages

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  4. Representing culture in interstellar messages

    Vakoch, Douglas A.

    2008-09-01

    As scholars involved with the Search for Extraterrestrial Intelligence (SETI) have contemplated how we might portray humankind in any messages sent to civilizations beyond Earth, one of the challenges they face is adequately representing the diversity of human cultures. For example, in a 2003 workshop in Paris sponsored by the SETI Institute, the International Academy of Astronautics (IAA) SETI Permanent Study Group, the International Society for the Arts, Sciences and Technology (ISAST), and the John Templeton Foundation, a varied group of artists, scientists, and scholars from the humanities considered how to encode notions of altruism in interstellar messages . Though the group represented 10 countries, most were from Europe and North America, leading to the group's recommendation that subsequent discussions on the topic should include more globally representative perspectives. As a result, the IAA Study Group on Interstellar Message Construction and the SETI Institute sponsored a follow-up workshop in Santa Fe, New Mexico, USA in February 2005. The Santa Fe workshop brought together scholars from a range of disciplines including anthropology, archaeology, chemistry, communication science, philosophy, and psychology. Participants included scholars familiar with interstellar message design as well as specialists in cross-cultural research who had participated in the Symposium on Altruism in Cross-cultural Perspective, held just prior to the workshop during the annual conference of the Society for Cross-cultural Research . The workshop included discussion of how cultural understandings of altruism can complement and critique the more biologically based models of altruism proposed for interstellar messages at the 2003 Paris workshop. This paper, written by the chair of both the Paris and Santa Fe workshops, will explore the challenges of communicating concepts of altruism that draw on both biological and cultural models.

  5. Mobile phone messaging reminders for attendance at healthcare appointments.

    Gurol-Urganci, Ipek; de Jongh, Thyra; Vodopivec-Jamsek, Vlasta; Atun, Rifat; Car, Josip

    2013-12-05

    This review is an update of the original Cochrane review published in July 2012. Missed appointments are a major cause of inefficiency in healthcare delivery with substantial monetary costs for the health system, leading to delays in diagnosis and appropriate treatment. Patients' forgetfulness is one of the main reasons for missed appointments. Patient reminders may help reduce missed appointments. Modes of communicating reminders for appointments to patients include face-to-face communication, postal messages, calls to landlines or mobile phones, and mobile phone messaging. Mobile phone messaging applications, such as Short Message Service (SMS) and Multimedia Message Service (MMS), could provide an important, inexpensive delivery medium for reminders for healthcare appointments. To update our review assessing the effects of mobile phone messaging reminders for attendance at healthcare appointments. Secondary objectives include assessment of costs; health outcomes; patients' and healthcare providers' evaluation of the intervention and perceptions of safety; and possible harms and adverse effects associated with the intervention. Original searches were run in June 2009. For this update, we searched the Cochrane Central Register of Controlled Trials (CENTRAL,The Cochrane Library 2012, Issue 8), MEDLINE (OvidSP) (January 1993 to August 2012), EMBASE (OvidSP) (January 1993 to August 2012), PsycINFO (OvidSP) (January 1993 to August 2012) and CINAHL (EbscoHOST) (January 1993 to August 2012). We also reviewed grey literature (including trial registers) and reference lists of articles. Randomised controlled trials (RCTs) assessing mobile phone messaging as reminders for healthcare appointments. We only included studies in which it was possible to assess effects of mobile phone messaging independent of other technologies or interventions.   Two review authors independently assessed all studies against the inclusion criteria, with any disagreements resolved by a third

  6. Choosing the Right Free IM Providers and Clients for Your Library

    Izenstark, Amanda K.

    2009-01-01

    With virtual library services increasing, public services librarians may find themselves with questions such as: What instant messaging services (IM) are available? Which IM service would best suit my patrons' needs? Which IM service best suits my library's technology profile? This column describes the features and functionality of major instant…

  7. Multigroup cross section library; WIMS library

    Kannan, Umasankari

    2000-01-01

    The WIMS library has been extensively used in thermal reactor calculations. This multigroup constants library was originally developed from the UKNDL in the late 60's and has been updated in 1986. This library has been distributed with the WIMS-D code by NEA data bank. The references to WIMS library in literature are the 'old' which is the original as developed by the AEA Winfrith and the 'new' which is the current 1986 WIMS library. IAEA has organised a CRP where a new and fully updated WIMS library will soon be available. This paper gives an overview of the definitions of the group constants that go into any basic nuclear data library used for reactor calculations. This paper also outlines the contents of the WIMS library and some of its shortcomings

  8. OMG do not say LOL: obese adolescents' perspectives on the content of text messages to enhance weight loss efforts.

    Woolford, Susan J; Barr, Kathryn L C; Derry, Holly A; Jepson, Christina M; Clark, Sarah J; Strecher, Victor J; Resnicow, Kenneth

    2011-12-01

    Adolescents participating in weight loss programs experience difficulty adhering to behavior change recommendations. Communications technology provides a low cost means to increase the frequency of contact with adolescents which can improve their engagement and also lead to behavior change. Within a larger project on the development of tailored text messages for adolescents enrolled in an existing multidisciplinary weight management program, this study explored participants' perspectives about message content. A library of messages was developed focused on topics central to weight management. Four focus groups were conducted with a total of 24 participants from the weight management program to gage their reactions to the messages. Detailed notes from the focus groups were analyzed to assess the acceptability of individual messages and to identify overriding themes. Results indicate that participants were very enthusiastic about receiving text messages. They preferred messages that provided recipe ideas, included successful weight loss strategies used by peers, and requested feedback regarding their progress. They preferred positive, encouraging, and direct messages. They were unanimous that messages should include encouraging symbols (e.g., exclamation points and "smiley faces") as often as possible. They emphasized that any mention of unhealthy foods or behaviors would trigger them to eat those foods or engage in those behaviors. Text messaging acronyms (e.g., LOL) were considered too informal for messages from healthcare providers. This study suggests that including text messages in obesity interventions is acceptable to obese adolescents as a means of supporting their weight loss efforts, and it highlights the need for such messages to be carefully constructed.

  9. OMG Do Not Say LOL: Obese Adolescents’ Perspectives on the Content of Text Messages to Enhance Weight Loss Efforts

    Woolford, Susan J.; Barr, Kathryn L.C.; Derry, Holly A.; Jepson, Christina M.; Clark, Sarah J.; Strecher, Victor J.; Resnicow, Kenneth

    2011-01-01

    Adolescents participating in weight loss programs experience difficulty adhering to behavior change recommendations. Communications technology provides a low cost means to increase the frequency of contact with adolescents which can improve their engagement and also lead to behavior change. Within a larger project on the development of tailored text messages for adolescents enrolled in an existing multidisciplinary weight management program, this study explored participants’ perspectives about message content. A library of messages was developed focused on topics central to weight management. Four focus groups were conducted with a total of 24 participants from the weight management program to gage their reactions to the messages. Detailed notes from the focus groups were analyzed to assess the acceptability of individual messages and to identify overriding themes. Results indicate that participants were very enthusiastic about receiving text messages. They preferred messages that provided recipe ideas, included successful weight loss strategies used by peers, and requested feedback regarding their progress. They preferred positive, encouraging, and direct messages. They were unanimous that messages should include encouraging symbols (e.g., exclamation points and “smiley faces”) as often as possible. They emphasized that any mention of unhealthy foods or behaviors would trigger them to eat those foods or engage in those behaviors. Text messaging acronyms (e.g., LOL) were considered too informal for messages from healthcare providers. This study suggests that including text messages in obesity interventions is acceptable to obese adolescents as a means of supporting their weight loss efforts, and it highlights the need for such messages to be carefully constructed. PMID:21869762

  10. Marketing/Planning Library and Information Services. Second Edition.

    Weingand, Darlene E.

    In the first edition of this book, the concepts of marketing and planning library and information services were presented as effective managerial strategies. Several paragraphs from the introduction to the first edition are reproduced, with author commentary, in this edition as an affirmation that the message is still true. In this second edition,…

  11. Toward Predicting Popularity of Social Marketing Messages

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  12. Solidify, An LLVM pass to compile LLVM IR into Solidity

    2017-07-12

    The software currently compiles LLVM IR into Solidity (Ethereum’s dominant programming language) using LLVM’s pass library. Specifically, his compiler allows us to convert an arbitrary DSL into Solidity. We focus specifically on converting Domain Specific Languages into Solidity due to their ease of use, and provable properties. By creating a toolchain to compile lightweight domain-specific languages into Ethereum's dominant language, Solidity, we allow non-specialists to effectively develop safe and useful smart contracts. For example lawyers from a certain firm can have a proprietary DSL that codifies basic laws safely converted to Solidity to be securely executed on the blockchain. In another example, a simple provenance tracking language can be compiled and securely executed on the blockchain.

  13. LIBRARY SKILL INSTRUCTION IN NIGERIAN ACADEMIC LIBRARIES

    DJFLEX

    www.globaljournalseries.com; Info@globaljournalseries.com. LIBRARY SKILL INSTRUCTION IN NIGERIAN ACADEMIC. LIBRARIES. P. C. AZIAGBA AND E. H. UZOEZI. (Received 10, September 2009; Revision Accepted 8, February 2010). ABSTRACT. This survey was undertaken to portray the level of library involvement ...

  14. Improving Type Error Messages in OCaml

    Charguéraud , Arthur

    2015-01-01

    International audience; Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise ...

  15. Content Analysis of Virtual Reference Data: Reshaping Library Website Design.

    Fan, Suhua Caroline; Welch, Jennifer M

    2016-01-01

    An academic health sciences library wanted to redesign its website to provide better access to health information in the community. Virtual reference data were used to provide information about user searching behavior. This study analyzed three years (2012-2014) of virtual reference data, including e-mail questions, text messaging, and live chat transcripts, to evaluate the library website for redesigning, especially in areas such as the home page, patrons' terminology, and issues prompting patrons to ask for help. A coding system based on information links in the current library website was created to analyze the data.

  16. 78 FR 52166 - Quantitative Messaging Research

    2013-08-22

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast-track OMB approval... message testing research (for which CFTC received fast-track OMB approval) and is necessary to identify...

  17. Effects of Text Messaging on Academic Performance

    Barks Amanda; Searight H. Russell; Ratwik Susan

    2011-01-01

    University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were ...

  18. Message exchange in the building industry

    Vries, de B.; Somers, L.J.A.M.

    1995-01-01

    A process model is described for exchanging information in the building industry. In this model participants send and receive messages. On receipt of a message an activity is executed if all required information is available. Otherwise a message will be sent to another participant to obtain the

  19. How to pass higher English colour

    Bridges, Ann

    2009-01-01

    How to Pass is the Number 1 revision series for Scottish qualifications across the three examination levels of Standard Grade, Intermediate and Higher! Second editions of the books present all of the material in full colour for the first time.

  20. Reactions to threatening health messages

    ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; K?hninger, Constanze; K?lgen, Lizan; Pelssers, Isabelle; Sch?tt, Toby; Thomas, Sophia; Ruiter, Robert AC; Kok, Gerjo

    2012-01-01

    Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence th...

  1. A message to school girls.

    Akinwande, A

    1993-06-01

    Information, education, and communication (IEC) programs need to be strengthened to appeal to adolescents, who are increasingly contributing to unwanted pregnancy and are using abortion as a means of birth control. Successful IEC programs have the following characteristics: 1) established communication theories that guide development of materials; 2) a multimedia and a mass media approach to information dissemination, and 3) emphasis on visual displays. The primary emphasis should be on presentation of a concise, clear message with the appropriate visual medium. Many communication specialists in developing countries, however, lack the training to design and use effective IEC software. Designing effective messages involves a process of integrating scientific ideas with artistic appeal. The aim is to stimulate the target audience to change its behavior of life style. The message must be convincing and contain practical and useful information. The IEC Software Design Cycle focuses on analysis and diagnosis, design production, pretesting and modification, and distribution and evaluation. Each of these processes are described. Necessary before any attempt is made is obtaining data on historical, sociocultural, and demographic characteristics, economic activities, health and social services, communication infrastructure, marriage and family life patterns, and decision making systems. Focus group discussions may be used to collect information about the target group. An example is given of the process of development, in a course through the Center or African Family Studies, of a poster about premarital sex directed to 11-16 year olds. On the basis of focus group discussions, it was decided that the message would be to encourage girls to talk with their mothers about family life and premarital sex. The poster was produced with 2 school girls talking in front of the school. The evaluation yielded modifications such as including a school building that resembled actual

  2. Instant Messaging in Dental Education.

    Khatoon, Binish; Hill, Kirsty B; Walmsley, A Damien

    2015-12-01

    Instant messaging (IM) is when users communicate instantly via their mobile devices, and it has become one of the most preferred choices of tools to communicate amongst health professions students. The aim of this study was to understand how dental students communicate via IM, faculty members' perspectives on using IM to communicate with students, and whether such tools are useful in the learning environment. After free-associating themes on online communication, two draft topic guides for structured interviews were designed that focussed on mobile device-related communication activities. A total of 20 students and six faculty members at the University of Birmingham School of Dentistry agreed to take part in the interviews. Students were selected from years 1-5 representing each year group. The most preferred communication tools were emails, social networking, and IM. Emails were used for more formal messages, and IM and social networking sites were used for shorter messages. WhatsApp was the most used IM app because of its popular features such as being able to check if recipients have read and received messages and group work. The students reported that changes were necessary to improve their communication with faculty members. The faculty members reported having mixed feelings toward the use of IM to communicate with students. The students wished to make such tools a permanent part of their learning environment, but only with the approval of faculty members. The faculty members were willing to accept IM as a communication tool only if it is monitored and maintained by the university and has a positive effect on learning.

  3. A Modular Instant Messaging System

    Mohamad Raad; Zouhair Bazzal; Majd Ghareeb; Hanan Farhat; Semar Bahmad

    2017-01-01

    Instant Messaging (IM) Android applications are a trend nowadays. These applications are categorized according to their features: usability, flexibility, privacy and security. However, IM applications tend to be inflexible in terms of functionality offered. The “Dble-U” system was developed as a solution to this inflexibility, with a focus on privacy as an example use case. “Dble-U” is a configurable modular system consisting of an Android chatting application, a privacy controller applicatio...

  4. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm

    Rachmawati, D.; Budiman, M. A.; Aulya, L.

    2018-02-01

    Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

  5. Nonblocking and orphan free message logging protocols

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  6. Distributed parallel messaging for multiprocessor systems

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  7. Entity-based Classification of Twitter Messages

    Yerva, Surender Reddy; Miklós, Zoltán; Aberer, Karl

    2012-01-01

    Twitter is a popular micro-blogging service on theWeb, where people can enter short messages, which then become visible to some other users of the service. While the topics of these messages varies, there are a lot of messages where the users express their opinions about some companies or their products. These messages are a rich source of information for companies for sentiment analysis or opinion mining. There is however a great obstacle for analyzing the messages directly: as the company n...

  8. Libraries and Learning

    Rainie, Lee

    2016-01-01

    The majority of Americans think local libraries serve the educational needs of their communities and families pretty well and library users often outpace others in learning activities. But many do not know about key education services libraries provide. This report provides statistics on library usage and presents key education services provided…

  9. Growing Competition for Libraries.

    Gibbons, Susan

    2001-01-01

    Describes the Questia subscription-based online academic digital books library. Highlights include weaknesses of the collection; what college students want from a library; importance of marketing; competition for traditional academic libraries that may help improve library services; and the ability of Questia to overcome barriers and…

  10. The library marketing toolkit

    Potter, Ned

    2012-01-01

    A guide that offers coverage of various elements of library marketing and branding for different sectors including archives and academic, public and special libraries. It is suitable for those who are involved in promoting their library or information service, whether at an academic, public or special library or in archives or records management.

  11. Automating the Small Library.

    Skapura, Robert

    1987-01-01

    Discusses the use of microcomputers for automating school libraries, both for entire systems and for specific library tasks. Highlights include available library management software, newsletters that evaluate software, constructing an evaluation matrix, steps to consider in library automation, and a brief discussion of computerized card catalogs.…

  12. Guidelines for designing messages in risk communication

    Takashita, Hirofumi; Horikoshi, Hidehiko

    2004-07-01

    Risk Communication Study Team (hereafter called RC team) has designed messages for risk communication based on the analysis of the local residents' opinions which were expressed in several questionnaire surveys. The messages are described in a side format (Power Point format) every single content. This report provides basic guidelines for making messages that are used for risk communication, and does not include concrete messages which RC team designed. The RC team has already published the report entitled 'Information materials for risk communication' (JNC TN8450 2003-008) separately, and it gives the concrete messages. This report shows general cautions and checklists in designing messages, comments on the messages from outside risk communication experts, and opinions from local residents. (author)

  13. Improving the effectiveness of fundraising messages: The impact of charity goal attainment, message framing, and evidence on persuasion

    Das, E.; Kerkhof, P.; Kuiper, J.

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a

  14. Practical application of standards in special libraries

    Nada Češnovar

    1998-01-01

    Special libraries in Slovenia represent an important part of information infrastructure.They operate in the spheres of economy, culture, politics, health, and others.Although they perform an important role in the process of professional training of the employees they are too often set aside.Our government is undoubtedly aware of the deficiency of normative regulation in these areas; however, passing of certain acts is often delayed because there is no direct damage to the state itself if they...

  15. America's Star Libraries, 2010: Top-Rated Libraries

    Lyons, Ray; Lance, Keith Curry

    2010-01-01

    The "LJ" Index of Public Library Service 2010, "Library Journal"'s national rating of public libraries, identifies 258 "star" libraries. Created by Ray Lyons and Keith Curry Lance, and based on 2008 data from the IMLS, it rates 7,407 public libraries. The top libraries in each group get five, four, or three stars. All included libraries, stars or…

  16. INVESTIGATION OF SINGLE-PASS/DOUBLE-PASS TECHNIQUES ON FRICTION STIR WELDING OF ALUMINIUM

    N.A.A. Sathari

    2014-12-01

    Full Text Available The aim of this research is to study the effects of single-pass/ double-pass techniques on friction stir welding of aluminium. Two pieces of AA1100 with a thickness of 6.0 mm were friction stir welded using a CNC milling machine at rotational speeds of 1400 rpm, 1600 rpm and 1800 rpm respectively for single-pass and double-pass. Microstructure observations of the welded area were studied using an optical microscope. The specimens were tested by using a tensile test and Vickers hardness test to evaluate their mechanical properties. The results indicated that, at low rotational speed, defects such as ‘surface lack of fill’ and tunnels in the welded area contributed to a decrease in mechanical properties. Welded specimens using double-pass techniques show increasing values of tensile strength and hardness. From this investigation it is found that the best parameters of FSW welded aluminium AA1100 plate were those using double-pass techniques that produce mechanically sound joints with a hardness of 56.38 HV and 108 MPa strength at 1800 rpm compared to the single-pass technique. Friction stir welding, single-pass/ double-pass techniques, AA1100, microstructure, mechanical properties.

  17. A Novel Single Pass Authenticated Encryption Stream Cipher for Software Defined Radios

    Khajuria, Samant

    2012-01-01

    to propose cryptographic services such as confidentiality, integrity and authentication. Therefore, integration of security services into SDR devices is essential. Authenticated Encryption schemes donate the class of cryptographic algorithms that are designed for protecting both message confidentiality....... This makes authenticated encryption very attractive for low-cost low-power hardware implementations, as it allows for the substantial decrease in the circuit area and power consumed compared to the traditional schemes. In this thesis, an authenticated encryption scheme is proposed with the focus of achieving...... high throughput and low overhead for SDRs. The thesis is divided into two research topics. One topic is the design of a 1-pass authenticated encryption scheme that can accomplish both message secrecy and authenticity in a single cryptographic primitive. The other topic is the implementation...

  18. Effects of Text Messaging on Academic Performance

    Barks Amanda

    2011-12-01

    Full Text Available University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were randomly assigned to one of two conditions: 1. a group that sent andreceived text messages during a lecture or, 2. a group that did not engage in text messagingduring the lecture. Participants who engaged in text messaging demonstrated significantlypoorer performance on a test covering lecture content compared with the group that did notsend and receive text messages. Participants exhibiting higher levels of text messaging skill hadsignificantly lower test scores than participants who were less proficient at text messaging. It ishypothesized that in terms of retention of lecture material, more frequent task shifting by thosewith greater text messaging proficiency contributed to poorer performance. Overall, the findingsdo not support the view, held by many university students, that this form of multitasking has littleeffect on the acquisition of lecture content. Results provide empirical support for teachers andprofessors who ban text messaging in the classroom.

  19. Mobile phone messaging reminders for attendance at healthcare appointments.

    Car, Josip; Gurol-Urganci, Ipek; de Jongh, Thyra; Vodopivec-Jamsek, Vlasta; Atun, Rifat

    2012-07-11

    Missed appointments are a major cause of inefficiency in healthcare delivery, with substantial monetary costs for the health system, leading to delays in diagnosis and appropriate treatment. Patients' forgetfulness is one of the main reasons for missed appointments, and reminders may help alleviate this problem. Modes of communicating reminders for appointments to patients include face-to-face communication, postal messages, calls to landlines or mobile phones, and mobile phone messaging. Mobile phone messaging applications such as Short Message Service (SMS) and Multimedia Message Service (MMS) could provide an important, inexpensive delivery medium for reminders for healthcare appointments. To assess the effects of mobile phone messaging reminders for attendance at healthcare appointments. Secondary objectives include assessment of patients' and healthcare providers' evaluation of the intervention; costs; and possible risks and harms associated with the intervention. We searched the Cochrane Central Register of Controlled Trials (CENTRAL,The Cochrane Library 2009, Issue 2), MEDLINE (OvidSP) (January 1993 to June 2009), EMBASE (OvidSP) (January 1993 to June 2009), PsycINFO (OvidSP) (January 1993 to June 2009), CINAHL (EbscoHOST) (January 1993 to June 2009), LILACS (January 1993 to June 2009) and African Health Anthology (January 1993 to June 2009). We also reviewed grey literature (including trial registers) and reference lists of articles. We included randomised controlled trials (RCTs), quasi-randomised controlled trials (QRCTs), controlled before-after (CBA) studies, or interrupted time series (ITS) studies with at least three time points before and after the intervention. We included studies assessing mobile phone messaging as reminders for healthcare appointments. We only included studies in which it was possible to assess effects of mobile phone messaging independent of other technologies or interventions.   Two review authors independently assessed all

  20. Setting pass scores for clinical skills assessment.

    Liu, Min; Liu, Keh-Min

    2008-12-01

    In a clinical skills assessment, the decision to pass or fail an examinee should be based on the test content or on the examinees' performance. The process of deciding a pass score is known as setting a standard of the examination. This requires a properly selected panel of expert judges and a suitable standard setting method, which best fits the purpose of the examination. Six standard setting methods that are often used in clinical skills assessment are described to provide an overview of the standard setting process.

  1. Setting Pass Scores for Clinical Skills Assessment

    Min Liu

    2008-12-01

    Full Text Available In a clinical skills assessment, the decision to pass or fail an examinee should be based on the test content or on the examinees' performance. The process of deciding a pass score is known as setting a standard of the examination. This requires a properly selected panel of expert judges and a suitable standard setting method, which best fits the purpose of the examination. Six standard setting methods that are often used in clinical skills assessment are described to provide an overview of the standard setting process.

  2. Single beam pass migmacell method and apparatus

    Maglich, B.C.; Nering, J.E.; Mazarakis, M.G.; Miller, R.A.

    1976-01-01

    The invention provides improvements in migmacell apparatus and method by dispensing with the need for metastable confinement of injected molecular ions for multiple precession periods. Injected molecular ions undergo a 'single pass' through the reaction volume. By preconditioning the injected beam such that it contains a population distribution of molecules in higher vibrational states than in the case of a normal distribution, injected molecules in the single pass exper-ience collisionless dissociation in the migmacell under magnetic influence, i.e., so-called Lorentz dissociation. Dissociationions then form atomic migma

  3. Ultrastructural evaluation of multiple pass low energy versus single pass high energy radio-frequency treatment.

    Kist, David; Burns, A Jay; Sanner, Roth; Counters, Jeff; Zelickson, Brian

    2006-02-01

    The radio-frequency (RF) device is a system capable of volumetric heating of the mid to deep dermis and selective heating of the fibrous septa strands and fascia layer. Clinically, these effects promote dermal collagen production, and tightening of these deep subcutaneous structures. A new technique of using multiple low energy passes has been described which results in lower patient discomfort and fewer side effects. This technique has also been anecdotally described as giving more reproducible and reliable clinical results of tissue tightening and contouring. This study will compare ultrastructural changes in collagen between a single pass high energy versus up to five passes of a multiple pass lower energy treatment. Three subjects were consented and treated in the preauricular region with the RF device using single or multiple passes (three or five) in the same 1.5 cm(2) treatment area with a slight delay between passes to allow tissue cooling. Biopsies from each treatment region and a control biopsy were taken immediately, 24 hours or 6 months post treatment for electron microscopic examination of the 0-1 mm and 1-2 mm levels. Sections of tissue 1 mm x 1 mm x 80 nm were examined with an RCA EMU-4 Transmission Electron Microscope. Twenty sections from 6 blocks from each 1 mm depth were examined by 2 blinded observers. The morphology and degree of collagen change in relation to area examined was compared to the control tissue, and estimated using a quantitative scale. Ultrastructural examination of tissue showed that an increased amount of collagen fibril changes with increasing passes at energies of 97 J (three passes) and 122 J (five passes), respectively. The changes seen after five multiple passes were similar to those detected after much more painful single pass high-energy treatments. This ultrastructural study shows changes in collagen fibril morphology with an increased effect demonstrated at greater depths of the skin with multiple low-fluence passes

  4. The Physical Therapy and Society Summit (PASS) Meeting: observations and opportunities.

    Kigin, Colleen M; Rodgers, Mary M; Wolf, Steven L

    2010-11-01

    The construct of delivering high-quality and cost-effective health care is in flux, and the profession must strategically plan how to meet the needs of society. In 2006, the House of Delegates of the American Physical Therapy Association passed a motion to convene a summit on "how physical therapists can meet current, evolving, and future societal health care needs." The Physical Therapy and Society Summit (PASS) meeting on February 27-28, 2009, in Leesburg, Virginia, sent a clear message that for physical therapists to be effective and thrive in the health care environment of the future, a paradigm shift is required. During the PASS meeting, participants reframed our traditional focus on the physical therapist and the patient/client (consumer) to one in which physical therapists are an integral part of a collaborative, multidisciplinary health care team with the health care consumer as its focus. The PASS Steering Committee recognized that some of the opportunities that surfaced during the PASS meeting may be disruptive or may not be within the profession's present strategic or tactical plans. Thus, adopting a framework that helps to establish the need for change that is provocative and potentially disruptive to our present care delivery, yet prioritizes opportunities, is a critical and essential step. Each of us in the physical therapy profession must take on post-PASS roles and responsibilities to accomplish the systemic change that is so intimately intertwined with our destiny. This article offers a perspective of the dynamic dialogue and suggestions that emerged from the PASS event, providing further opportunities for discussion and action within our profession.

  5. Libraries and Accessibility: Istanbul Public Libraries Case

    Gül Yücel

    2016-12-01

    Full Text Available In the study; the assessment of accessibility has been conducted in Istanbul public libraries within the scope of public area. Public libraries commonly serve with its user of more than 20 million in total, spread to the general of Turkey, having more than one thousand branches in the centrums and having more than one million registered members. The building principles and standards covering the subjects such as the selection of place, historical and architectural specification of the region, distance to the centre of population and design in a way that the disabled people could benefit from the library services fully have been determined with regulations in the construction of new libraries. There are works for the existent libraries such as access for the disabled, fire safety precautions etc. within the scope of the related standards. Easy access by everyone is prioritized in the public libraries having a significant role in life-long learning. The purpose of the study is to develop solution suggestions for the accessibility problems in the public libraries. The study based on the eye inspection and assessments carried out within the scope of accessibility in the public libraries subsidiary to Istanbul Culture and Tourism Provincial Directorate Library and Publications Department within the provincial borders of Istanbul. The arrangements such as reading halls, study areas, book shelves etc. have been examined within the frame of accessible building standards. Building entrances, ramps and staircases, horizontal and vertical circulation of building etc. have been taken into consideration within the scope of accessible building standards. The subjects such as the reading and studying areas and book shelf arrangements for the library have been assessed within the scope of specific buildings. There are a total of 34 public libraries subsidiary to Istanbul Culture and Tourism Provincial Directorate on condition that 20 ea. of them are in the

  6. The WLCG Messaging Service and its Future

    Cons, Lionel; Paladin, Massimo

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures will support the growth of the WLCG messaging service.

  7. Hand hygiene posters: motivators or mixed messages?

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-07-01

    Poster campaigns regarding hand hygiene are commonly used by infection control teams to improve practice, yet little is known of the extent to which they are based on established theory or research. This study reports on the content analysis of hand hygiene posters (N=69) and their messages (N=75) using message-framing theory. The results showed that posters seldom drew on knowledge about effective ways to frame messages. Frequently, they simply conveyed information 'telling' rather than 'selling' and some of this was confusing. Most posters were not designed to motivate, and some conveyed mixed messages. Few used fear appeals. Hand hygiene posters could have a greater impact if principles of message framing were utilized in their design. Suggestions for gain-framed messages are offered, but these need to be tested empirically.

  8. Message Scheduling and Forwarding in Congested DTNs

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2012-01-01

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  9. Diabetes education via mobile text messaging.

    Wangberg, Silje C; Arsand, Eirik; Andersson, Niklas

    2006-01-01

    Living with diabetes makes great educational demands on a family. We have tested the feasibility of using the mobile phone short message service (SMS) for reaching people with diabetes information. We also assessed user satisfaction and perceived pros and cons of the medium through interviews. Eleven parents of children with type 1 diabetes received messages for 11 weeks. The parents were positive about the system and said that they would like to continue to use it. The pop-up reminding effect of SMS messages in busy everyday life was noted as positive. Some parents experienced the messages as somewhat intrusive, arriving too often and at inconvenient times. The parents also noted the potential of the messages to facilitate communication with their adolescent children. The inability to store all of the messages or to print them out were seen as major disadvantages. Overall, the SMS seems to hold promise as means of delivering diabetes information.

  10. Message Scheduling and Forwarding in Congested DTNs

    Elwhishi, Ahmed

    2012-08-19

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  11. Application of a Tsunami Warning Message Metric to refine NOAA NWS Tsunami Warning Messages

    Gregg, C. E.; Johnston, D.; Sorensen, J.; Whitmore, P.

    2013-12-01

    In 2010, the U.S. National Weather Service (NWS) funded a three year project to integrate social science into their Tsunami Program. One of three primary requirements of the grant was to make improvements to tsunami warning messages of the NWS' two Tsunami Warning Centers- the West Coast/Alaska Tsunami Warning Center (WCATWC) in Palmer, Alaska and the Pacific Tsunami Warning Center (PTWC) in Ewa Beach, Hawaii. We conducted focus group meetings with a purposive sample of local, state and Federal stakeholders and emergency managers in six states (AK, WA, OR, CA, HI and NC) and two US Territories (US Virgin Islands and American Samoa) to qualitatively asses information needs in tsunami warning messages using WCATWC tsunami messages for the March 2011 Tohoku earthquake and tsunami event. We also reviewed research literature on behavioral response to warnings to develop a tsunami warning message metric that could be used to guide revisions to tsunami warning messages of both warning centers. The message metric is divided into categories of Message Content, Style, Order and Formatting and Receiver Characteristics. A message is evaluated by cross-referencing the message with the operational definitions of metric factors. Findings are then used to guide revisions of the message until the characteristics of each factor are met. Using findings from this project and findings from a parallel NWS Warning Tiger Team study led by T. Nicolini, the WCATWC implemented the first of two phases of revisions to their warning messages in November 2012. A second phase of additional changes, which will fully implement the redesign of messages based on the metric, is in progress. The resulting messages will reflect current state-of-the-art knowledge on warning message effectiveness. Here we present the message metric; evidence-based rational for message factors; and examples of previous, existing and proposed messages.

  12. Generalizing Galileo's Passe-Dix Game

    Hombas, Vassilios

    2012-01-01

    This article shows a generalization of Galileo's "passe-dix" game. The game was born following one of Galileo's [G. Galileo, "Sopra le Scoperte dei Dadi" (Galileo, Opere, Firenze, Barbera, Vol. 8). Translated by E.H. Thorne, 1898, pp. 591-594] explanations on a paradox that occurred in the experiment of tossing three fair "six-sided" dice.…

  13. TREsPASS Book 3: Creative Engagements

    Coles-Kemp, Lizzie; Hall, Peter

    2016-01-01

    In this book we examine the role that creative security engagements have played in the TREsPASS project. These engagements are part of a wider creative securities approach that explores the contributions that social practices make to protection of data and information. Our most popular creative

  14. Passing the Bond Issue (with Related Video)

    Erickson, Paul W.

    2011-01-01

    When a bond referendum comes around for a school district, it often is the culmination of years of planning, strategizing and communicating to the public. Especially in these economic times, passing a building referendum is challenging. Complete transparency among the superintendent, school board and community is essential to communicate the…

  15. Message Received: Virtual Ethnography in Online Message Boards

    Kevin F. Steinmetz

    2012-02-01

    Full Text Available As the Internet begins to encapsulate more people within online communities, it is important that the social researcher have well-rounded ethnographic methodologies for observing these phenomena. This article seeks to contribute to methodology by detailing and providing insights into three specific facets of virtual ethnography that need attention: space and time, identity and authenticity, and ethics. Because the Internet is a globalized and instantaneous medium where space and time collapse, identity becomes more playful, and ethics become more tenuous; understanding these aspects is crucial to the study of online social groups. A second focus of this article is to apply these notions to the study of online message boards—a frequently used medium for online communication that is frequently overlooked by methodologists.

  16. Nonlinear unknown input sliding mode observer based chaotic system synchronization and message recovery scheme with uncertainty

    Sharma, Vivek; Sharma, B.B.; Nath, R.

    2017-01-01

    In the present manuscript, observer based synchronization and message recovery scheme is discussed for a system with uncertainties. LMI conditions are analytically derived solution of which gives the observer design matrices. Earlier approaches have used adaptive laws to address the uncertainties, however in present work, decoupling approach is used to make observer robust against uncertainties. The methodology requires upper bounds on nonlinearity and the message signal and estimates for these bounds are generated adaptively. Thus no information about the nature of nonlinearity and associated Lipschitz constant is needed in proposed approach. Message signal is recovered using equivalent output injection which is a low pass filtered equivalent of the discontinuous effort required to maintain the sliding motion. Finally, the efficacy of proposed Nonlinear Unknown Input Sliding Mode Observer (NUISMO) for chaotic communication is verified by conducting simulation studies on two chaotic systems i.e. third order Chua circuit and Rossler system.

  17. Modeling drivers' passing duration and distance in a virtual environment

    Haneen Farah

    2013-07-01

    The main contribution of this paper is in the empirical models developed for passing duration and distance which highlights the factors that affect drivers' passing behavior and can be used to enhance the passing models in simulation programs.

  18. Message framing in social networking sites.

    Kao, Danny Tengti; Chuang, Shih-Chieh; Wang, Sui-Min; Zhang, Lei

    2013-10-01

    Online social networking sites represent significant new opportunities for Internet advertisers. However, results based on the real world cannot be generalized to all virtual worlds. In this research, the moderating effects of need for cognition (NFC) and knowledge were applied to examine the impact of message framing on attitudes toward social networking sites. A total of 216 undergraduates participated in the study. Results reveal that for social networking sites, while high-NFC individuals form more favorable attitudes toward negatively framed messages than positively framed messages, low-NFC individuals form more favorable attitudes toward positively framed messages than negatively framed messages. In addition, low-knowledge individuals demonstrate more favorable attitudes toward negatively framed messages than positively framed messages; however, the framing effect does not differentially affect the attitudes of high-knowledge individuals. Furthermore, the framing effect does not differentially affect the attitudes of high-NFC individuals with high knowledge. In contrast, low-NFC individuals with low knowledge hold more favorable attitudes toward positively framed messages than negatively framed messages.

  19. Evaluation of Sexual Communication Message Strategies

    2011-01-01

    Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC) have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity. PMID:21599875

  20. Libraries serving dialogue

    Dupont, Odile

    2014-01-01

    This book based on experiences of libraries serving interreligious dialogue, presents themes like library tools serving dialogue between cultures, collections dialoguing, children and young adults dialoguing beyond borders, story telling as dialog, librarians serving interreligious dialogue.

  1. Israeli Special Libraries

    Foster, Barbara

    1974-01-01

    Israel is sprinkled with a noteworthy representation of special libraries which run the gamut from modest kibbutz efforts to highly technical scientific and humanities libraries. A few examples are discussed here. (Author/CH)

  2. Message Embedded Chaotic Masking Synchronization Scheme Based on the Generalized Lorenz System and Its Security Analysis

    Čelikovský, Sergej; Lynnyk, Volodymyr

    2016-01-01

    Roč. 26, č. 8 (2016), 1650140-1-1650140-15 ISSN 0218-1274 R&D Projects: GA ČR GA13-20433S Institutional support: RVO:67985556 Keywords : Chaotic masking * generalized Lorenz system * message embedded synchronization Subject RIV: BC - Control Systems Theory Impact factor: 1.329, year: 2016 http://library.utia.cas.cz/separaty/2016/TR/celikovsky-0461536.pdf

  3. Marketing library and information services in academic libraries in ...

    Marketing library and information services in academic libraries in Niger State, Nigeria. ... This study was designed to investigate the marketing of library services in academic libraries in Niger state, ... EMAIL FULL TEXT EMAIL FULL TEXT

  4. Webpages on copyright in Canadian academic libraries

    Tony G Horava

    2008-12-01

    Full Text Available Academic libraries value the web as being a vital channel for communicating information and policies to their user community. Designing a webpage on copyright is a challenging task that requires a consideration of the medium and the message. This article proposes a conceptual model and proactive approach for integrating policy objective and goals into the development of a copyright webpage, based on key elements of the library’s involvement in academia. To complement this theoretical approach, an analysis of Canadian academic library websites was conducted in order to gage the effectiveness of copyright webpages, in the Canadian legal context, according to the model as well as related design issues of visibility and access.

  5. The alternative library

    Collinson, Timothy; Williams, A.

    2004-01-01

    Much time and effort has been devoted to designing and developing library Web sites that are easy to navigate by both new students and experienced researchers. In a review of the Southampton Institute Library it was decided that in addition to updating the existing homepage an alternative would be offered. Drawing on theory relating to user interface design, learning styles and creative thinking, an Alternative Library navigation system was added to the more traditional library homepage. The ...

  6. FENDL multigroup libraries

    Ganesan, S.; Muir, D.W.

    1992-01-01

    Selected neutron reaction nuclear data libraries and photon-atomic interaction cross section libraries for elements of interest to the IAEA's program on Fusion Evaluated Nuclear Data Library (FENDL) have been processed into MATXSR format using the NJOY system on the VAX4000 computer of the IAEA. This document lists the resulting multigroup data libraries. All the multigroup data generated are available cost-free upon request from the IAEA Nuclear Data Section. (author). 9 refs

  7. Are public policies to school libraries necessary? Latin America situation

    Horacio Cárdenas Zardoni

    2012-08-01

    Full Text Available School libraries are one of te main resources to enhance learning in students in the educational system in any nation. Every country invests important amounts of money in library resources in schools, which have the quality of stay and increase, as time passes, the school library may have an important collection to offer to students. Despite its undeniable value as contributor to the education of millions of citizens studying in the latin american schools, its potencial and ability are far from being used to its maximum. The reason for this is the lack of public policies that incorporate it to the education process.

  8. Changing State Digital Libraries

    Pappas, Marjorie L.

    2006-01-01

    Research has shown that state virtual or digital libraries are evolving into websites that are loaded with free resources, subscription databases, and instructional tools. In this article, the author explores these evolving libraries based on the following questions: (1) How user-friendly are the state digital libraries?; (2) How do state digital…

  9. School Libraries and Innovation

    McGrath, Kevin G.

    2015-01-01

    School library programs have measured success by improved test scores. But how do next-generation school libraries demonstrate success as they strive to be centers of innovation and creativity? These libraries offer solutions for school leaders who struggle to restructure existing systems built around traditional silos of learning (subjects and…

  10. Reforming Prison Libraries.

    Coyle, William J.

    1989-01-01

    Discusses the current widespread acceptance of the public library model for prison libraries, in which preferences of the inmates are the chief consideration in programing and collection development. It is argued that this model results in recreational programs and collections that fail to fulfill the prison library's role in education and…

  11. LANL Research Library

    Los Alamos National Laboratory The LANL Research Library website has been moved to http ://www.lanl.gov/library/. Please update your bookmarks. If you are not redirected to the new location within 10 http:// | Last Modified: Send email to the Library

  12. Joint-Use Libraries

    Casstevens, Susan

    2017-01-01

    The joint-use library is a place where people of all ages, interests, and income levels can find items of interest at no personal cost. The mission of A. H. Meadows Public and High School Library in Midlothian, Texas, is to offer what other public libraries provide: educational and entertainment resources to a community. Yet, the staff also wants…

  13. Learning Boost C++ libraries

    Mukherjee, Arindam

    2015-01-01

    If you are a C++ programmer who has never used Boost libraries before, this book will get you up-to-speed with using them. Whether you are developing new C++ software or maintaining existing code written using Boost libraries, this hands-on introduction will help you decide on the right library and techniques to solve your practical programming problems.

  14. Technostress and Library Values.

    Gorman, Michael

    2001-01-01

    Discusses information overload and society's and libraries' responses to technology. Considers eight values that libraries should focus on and how they relate to technology in libraries: democracy, stewardship, service, intellectual freedom, privacy, rationalism, equity of access, and building harmony and balance. (LRW)

  15. Marketing and Library Management.

    Murphy, Kurt R.

    1991-01-01

    Examines the role of marketing in the management of libraries. The role of public relations (PR) in the total marketing concept is discussed, surveys that have explored PR efforts in academic and public libraries are described, and changes affecting libraries that marketing efforts could help to manage are discussed. (seven references) (LRW)

  16. Virtual Libraries: Service Realities.

    Novak, Jan

    2002-01-01

    Discussion of changes in society that have resulted from information and communication technologies focuses on changes in libraries and a new market for library services with new styles of clients. Highlights client service issues to be considered when transitioning to a virtual library situation. (Author/LRW)

  17. Merchandising Your Library.

    Sivulich, Kenneth G.

    1989-01-01

    Discusses library circulation figures as a reflection of the success of library services and describes merchandising techniques that have produced a 137 percent circulation increase at Queens Borough Public Library over the past seven years. Merchandising techniques such as minibranches, displays, signage, dumps, and modified shelving are…

  18. Editorial Library: User Survey.

    Surace, Cecily J.

    This report presents the findings of a survey conducted by the editorial library of the Los Angeles Times to measure usage and satisfaction with library service, provide background information on library user characteristics, collect information on patterns of use of the Times' clipping files, relate data on usage and satisfaction parameters to…

  19. Marketing Academic Libraries

    Mallon, Melissa, Ed.

    2013-01-01

    Ask any academic librarian if marketing their library and its services is an important task, and the answer will most likely be a resounding "yes!" Particularly in economically troubled times, librarians are increasingly called upon to promote their services and defend their library's worth. Since few academic libraries have in-house marketing…

  20. FY 2009 Public Libraries Survey

    Institute of Museum and Library Services — Dig into FY 2009 data on public library systems (referred to as administrative entities in the Public Libraries Survey) and main libraries, branches, and bookmobiles...

  1. FY 2010 Public Libraries Survey

    Institute of Museum and Library Services — Dig into FY 2010 data on public library systems (referred to as administrative entities in the Public Libraries Survey) and main libraries, branches, and bookmobiles...

  2. FY 2011 Public Libraries Survey

    Institute of Museum and Library Services — Dig into FY 2011 data on public library systems (referred to as administrative entities in the Public Libraries Survey) and main libraries, branches, and bookmobiles...

  3. FY 2008 Public Libraries Survey

    Institute of Museum and Library Services — Dig into FY 2008 data on public library systems (referred to as administrative entities in the Public Libraries Survey) and main libraries, branches, and bookmobiles...

  4. German Librarianship and Munich Libraries

    Osman Ümit Özen

    1994-06-01

    Full Text Available There are 27 municipal libraries including the Central Public Library in Munich. The other important libraries in the city are Bayern State National Library, Maximillian University Library, a technical highschool library and the "Deutsches Musuem" Library. All these libraries are financed locally. The author introduces these libraries briefly and compares German libraries with Turkish libraries. He concludes that although theoretically there are not distinctive differences, in practice, buildings and their layout are better in Germany where more variety of services are offered. In Turkey standardization has not been realized yet. Turkey needs to computerize and network to improve the services offered in an efficient way.

  5. Contact conditions in skin-pass rolling

    Kijima, Hideo; Bay, Niels

    2007-01-01

    The special contact conditions in skin-pass rolling of steel strip is analysed by studying plane strain upsetting of thin sheet with low reduction applying long narrow tools and dry friction conditions. An extended sticking region is estimated by an elasto-plastic FEM analysis of the plane strain...... upsetting. This sticking region causes a highly inhomogeneous elasto-plastic deformation with large influence of work-hardening and friction. A numerical analysis of skin-pass rolling shows the same contact conditions, i.e. an extended sticking region around the center of the contact zone. The calculated...... size of the sticking region with varying contact length and pressure/reduction is experimentally verified by plane strain upsetting tests measuring the local surface deformation of the work pieces after unloading....

  6. Two-pass greedy regular expression parsing

    Grathwohl, Niels Bjørn Bugge; Henglein, Fritz; Nielsen, Lasse

    2013-01-01

    We present new algorithms for producing greedy parses for regular expressions (REs) in a semi-streaming fashion. Our lean-log algorithm executes in time O(mn) for REs of size m and input strings of size n and outputs a compact bit-coded parse tree representation. It improves on previous algorithms...... by: operating in only 2 passes; using only O(m) words of random-access memory (independent of n); requiring only kn bits of sequentially written and read log storage, where k ... and not requiring it to be stored at all. Previous RE parsing algorithms do not scale linearly with input size, or require substantially more log storage and employ 3 passes where the first consists of reversing the input, or do not or are not known to produce a greedy parse. The performance of our unoptimized C...

  7. Expectancy Theory in Media and Message Selection.

    Van Leuven, Jim

    1981-01-01

    Argues for reversing emphasis on uses and gratifications research in favor of an expectancy model which holds that selection of a particular medium depends on (1) the expectation that the choice will be followed by a message of interest and (2) the importance of that message in satisfying user's values. (PD)

  8. Should We Ban Instant Messaging In School?

    Texley, Sharon; DeGennaro, Donna

    2005-01-01

    This article is a brief debate on the pros and cons of allowing students to use instant messaging (IM) in school. On one hand, teenagers' desire to socialize can overcome other priorities and schools may set policies to ban instant messaging. The contrary view is that schools should embrace the IM technology being popularized by youth and find…

  9. 78 FR 64202 - Quantitative Messaging Research

    2013-10-28

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast- track OMB approval... comments. Please submit your comments using only one method and identify that it is for the ``Quantitative...

  10. Undergraduates' Text Messaging Language and Literacy Skills

    Grace, Abbie; Kemp, Nenagh; Martin, Frances Heritage; Parrila, Rauno

    2014-01-01

    Research investigating whether people's literacy skill is being affected by the use of text messaging language has produced largely positive results for children, but mixed results for adults. We asked 150 undergraduate university students in Western Canada and 86 in South Eastern Australia to supply naturalistic text messages and to complete…

  11. Arbitrated quantum signature scheme with message recovery

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  12. Messages about Sexuality: An Ecological Perspective

    Boone, Tanya L.

    2015-01-01

    The goal of this two-part study was to identify the perceived influence of sexuality messages from parents, peers, school and the media--four microsystems within the Ecological Model--on emerging adult US college women's sexual attitudes. Findings suggest that parents were the most likely source of the message to "remain abstinent until…

  13. Suspecting Neurological Dysfunction From E Mail Messages ...

    A non medical person suspected and confirmed neurological dysfunction in an individual, based only on e mail messages sent by the individual. With email communication becoming rampant “peculiar” email messages may raise the suspicion of neurological dysfunction. Organic pathology explaining the abnormal email ...

  14. Single Pass Albumin Dialysis in Hepatorenal Syndrome

    Rahman Ebadur

    2008-01-01

    Full Text Available Hepatorenal syndrome (HRS is the most appalling complication of acute or chronic liver disease with 90% mortality rate. Single pass albumin dialysis (SPAD can be considered as a noble liver support technique in HRS. Here, we present a case of a young healthy patient who developed hyperacute fulminant liver failure that progressed to HRS. The patient was offered SPAD as a bridge to liver transplantation, however, it resulted in an excellent recovery.

  15. Library/vendor relationships

    Brooks, Sam

    2014-01-01

    A view of the mutual dependence between libraries and vendorsAs technology advances, libraries are forced to reach beyond their own resources to find effective ways to maintain accuracy and superior service levels. Vendors provide databases and integrated library systems that perform those functions for profit. Library/Vendor Relationships examines the increasing cooperation in which libraries find they must participate in, and vice versa, with the vendors that provide system infrastructure and software. Expert contributors provide insights from all sides of this unique collaboration, offering

  16. Teleporting the library?

    Heilesen, Simon

    2009-01-01

    In 2007, six Danish public libraries established a virtual library, Info Island DK, in Second Life. This article discusses the library project in terms of design. The design processes include the planning and implementation of the virtual library structure and its equipment, as well...... as the organizing and carrying out of activities in the virtual setting. It will be argued that, to a large extent, conventions have determined design and use of the virtual library, and also that design has had an impact on the attitudes and understanding of the participants....

  17. Too long a road towards the first Slovene law on libraries from 1961

    Aleš Gabrič

    2000-01-01

    Full Text Available Until the first Slovene Law on Libraries was passed, public libraries were, in general, parts of societies or committees of political organisations. These circumstances made it virtually impossible to engender a unified plan for the development of Slovenia's libraries. Although the first draft of a law which would bind the administrative agencies to provide libraries inside their districts with financial support, was drafted already in 1951, the revised law was passed as late as 1961. The adoption of the law was delayed, causing a prolonged crisis in the status and funding of libraries, despite the clearly defined solutions to the problem put forward by the librarians in the draft law. Due to the delays in the legal settlement of a number of open issues, the Society of Librarians of Slovenia used the proposed, modern regulations as guidelines in the de¬velopment of Slovenia's larger libraries, without waiting for the new law to be adopted.

  18. Double-pass quantum volume hologram

    Vasilyev, Denis V.; Sokolov, Ivan V.

    2011-01-01

    We propose a scheme for parallel, spatially multimode quantum memory for light. The scheme is based on the propagation in different directions of a quantum signal wave and strong classical reference wave, like in a classical volume hologram and the previously proposed quantum volume hologram [D. V. Vasilyev et al., Phys. Rev. A 81, 020302(R) (2010)]. The medium for the hologram consists of a spatially extended ensemble of cold spin-polarized atoms. In the absence of the collective spin rotation during the interaction, two passes of light for both storage and retrieval are required, and therefore the present scheme can be called a double-pass quantum volume hologram. The scheme is less sensitive to diffraction and therefore is capable of achieving a higher density of storage of spatial modes as compared to the previously proposed thin quantum hologram [D. V. Vasilyev et al., Phys. Rev. A 77, 020302(R) (2008)], which also requires two passes of light for both storage and retrieval. However, the present scheme allows one to achieve a good memory performance with a lower optical depth of the atomic sample as compared to the quantum volume hologram. A quantum hologram capable of storing entangled images can become an important ingredient in quantum information processing and quantum imaging.

  19. The WLCG Messaging Service and its Future

    Cons, Lionel

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures wil...

  20. AMS: Area Message Service for SLC

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-04-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require and application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI 'C' and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  1. Factors influencing message dissemination through social media

    Zheng, Zeyu; Yang, Huancheng; Fu, Yang; Fu, Dianzheng; Podobnik, Boris; Stanley, H. Eugene

    2018-06-01

    Online social networks strongly impact our daily lives. An internet user (a "Netizen") wants messages to be efficiently disseminated. The susceptible-infected-recovered (SIR) dissemination model is the traditional tool for exploring the spreading mechanism of information diffusion. We here test our SIR-based dissemination model on open and real-world data collected from Twitter. We locate and identify phase transitions in the message dissemination process. We find that message content is a stronger factor than the popularity of the sender. We also find that the probability that a message will be forwarded has a threshold that affects its ability to spread, and when the probability is above the threshold the message quickly achieves mass dissemination.

  2. Hand hygiene posters: selling the message.

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-02-01

    This literature review was undertaken to determine the established theory and research that might be utilized to inform the construction of persuasive messages on hand hygiene posters. It discusses the principles of message framing and the use of fear appeals. Current theory suggests that the most effective messages for health promotion behaviours should be framed in terms of gains rather than losses for the individual. However, as clinical hand hygiene is largely for the benefit of others (i.e. patients), messages should also invoke a sense of personal responsibility and appeal to altruistic behaviour. The use of repeated minimal fear appeals have their place. Posters that simply convey training messages are not effective persuaders.

  3. Library system of Italy

    Nataša Gerbec

    2003-01-01

    Full Text Available In the European extent, Italy is the cradle of libraries and library sciences. In the past, Italian national public libraries played an important role through their vast book treasury. But only during the last thirty years have public libraries been developed following the Anglo-American public library model. Italy does not have any uniform or general legislation concerning libraries. On the state level, this area is regulated by some separate acts, while on the regional level there is a collection of various acts and regulations. Libraries are not strictly divided into general categories. It is required that the professionals engaged in Italian libraries should have secondary or university education. The level of their professional tasks depends on the type of library and its capacity. The competency for the development in the field of librarianship is assigned to The Ministry of Cultural and Environment Heritage as well as to its subordinate institutions (Central Institute for the Union catalogue of Italian Libraries and for Bibliographic Information, Central Institute for Book Pathology, Observatory for International Libraries Programmes.

  4. Planning & Urban Affairs Library Manual.

    Knobbe, Mary L., Ed.; Lessel, Janice W., Ed.

    Written especially for persons without a library degree who are operating a small urban study or planning agency library on a part-time basis. Subjects covered are: (1) library function and staff function, duties and training; (2) physical layout and equipment of library; (3) establishing and maintaining the library; (4) library administration;…

  5. Special Libraries and Multitype Networks.

    Segal, JoAn S.

    1989-01-01

    Describes the history of multitype library networks; examines the reasons why special libraries and other network participants have resisted the inclusion of special libraries in these networks; and discusses the benefits to both special libraries and to other libraries in the network that would result from special library participation. (17…

  6. NOAA Miami Regional Library > Home

    Library Collections Open Access Resources Research Tools E-resources NOAA S. and NOAA N.E. Library Institutional Repository DIVE INTO About the Library | Collections | Research Tools | Library Services & NOAA Miami Regional Library @ AOML & NHC NOAA Miami Regional Library at National Hurricane

  7. Libraries in society

    Kristiansson, Michael; Skouvig, Laura Henriette Christine

    2008-01-01

    The purpose of the paper is to investigate the phenomenon of openness in relation to library development. The term openness is presented and related to library development from historical and theoretical perspectives. The paper elaborates on the differences over time on to how openness has been...... understood in a library setting. Historically, openness in form of the open shelves played a crucial role in developing the modern public library. The paper examines this openness-centred library policy as adopted by Danish public libraries in the beginning of the 20th century by applying the theories...... by Michel Foucault on discourse and power to the introduction of open shelves. Furthermore, the paper discusses current challenges facing the modern public library in coping with openness issues that follow from changes in society and advances in technology. These influences and developments are not least...

  8. The participatory public library

    Rasmussen, Casper Hvenegaard

    2016-01-01

    of theoretical approaches and practical examples to obtain a varied understanding of user participation in public libraries. Research fields outside library and information science have developed a wide range of theoretical approaches on user participation. Examples from cultural policy, museum studies......Purpose From collection to connection has been a buzzword in the library world for more than a decade. This catchy phrase indicates that users are seen not only as borrowers, but as active participants. The aim of this paper is to investigate and analyse three questions in relation to user...... participation in public libraries in a Nordic perspective. How can participation in public libraries be characterised? Why should libraries deal with user participation? What kinds of different user participation can be identified in public libraries? Design/methodology/approach The paper uses a selection...

  9. Messages about appearance, food, weight and exercise in "tween" television.

    Simpson, Courtney C; Kwitowski, Melissa; Boutte, Rachel; Gow, Rachel W; Mazzeo, Suzanne E

    2016-12-01

    Tweens (children ages ~8-14years) are a relatively recently defined age group, increasingly targeted by marketers. Individuals in this age group are particularly vulnerable to opinions and behaviors presented in media messages, given their level of cognitive and social development. However, little research has examined messages about appearance, food, weight, and exercise in television specifically targeting tweens, despite the popularity of this media type among this age group. This study used a content analytic approach to explore these messages in the five most popular television shows for tweens on the Disney Channel (as of 2015). Using a multiple-pass approach, relevant content in episodes from the most recently completed seasons of each show was coded. Appearance related incidents occurred in every episode; these most frequently mentioned attractiveness/beauty. Food related incidents were also present in every episode; typically, these situations were appearance and weight neutral. Exercise related incidents occurred in 53.3% of episodes; the majority expressed resistance to exercise. Weight related incidents occurred in 40.0% of the episodes; the majority praised the muscular ideal. Women were more likely to initiate appearance incidents, and men were more likely to initiate exercise incidents. These results suggest that programs specifically marketed to tweens reinforce appearance ideals, including stereotypes about female attractiveness and male athleticism, two constructs linked to eating pathology and body dissatisfaction. Given the developmental vulnerability of the target group, these findings are concerning, and highlight potential foci for prevention programming, including media literacy, for tweens. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Flight Software Math Library

    McComas, David

    2013-01-01

    The flight software (FSW) math library is a collection of reusable math components that provides typical math utilities required by spacecraft flight software. These utilities are intended to increase flight software quality reusability and maintainability by providing a set of consistent, well-documented, and tested math utilities. This library only has dependencies on ANSI C, so it is easily ported. Prior to this library, each mission typically created its own math utilities using ideas/code from previous missions. Part of the reason for this is that math libraries can be written with different strategies in areas like error handling, parameters orders, naming conventions, etc. Changing the utilities for each mission introduces risks and costs. The obvious risks and costs are that the utilities must be coded and revalidated. The hidden risks and costs arise in miscommunication between engineers. These utilities must be understood by both the flight software engineers and other subsystem engineers (primarily guidance navigation and control). The FSW math library is part of a larger goal to produce a library of reusable Guidance Navigation and Control (GN&C) FSW components. A GN&C FSW library cannot be created unless a standardized math basis is created. This library solves the standardization problem by defining a common feature set and establishing policies for the library s design. This allows the libraries to be maintained with the same strategy used in its initial development, which supports a library of reusable GN&C FSW components. The FSW math library is written for an embedded software environment in C. This places restrictions on the language features that can be used by the library. Another advantage of the FSW math library is that it can be used in the FSW as well as other environments like the GN&C analyst s simulators. This helps communication between the teams because they can use the same utilities with the same feature set and syntax.

  11. Designing Anti-Binge Drinking Prevention Messages: Message Framing vs. Evidence Type.

    Kang, Hannah; Lee, Moon J

    2017-09-27

    We investigated whether presenting anti-binge drinking health campaign messages in different message framing and evidence types influences college students' intention to avoid binge drinking, based on prospect theory (PT) and exemplification theory. A 2 (message framing: loss-framed message/gain-framed message) X 2 (evidence type: statistical/narrative) between-subjects factorial design with a control group was conducted with 156 college students. College students who were exposed to the loss-framed message condition exhibited a higher level of intention to avoid binge drinking in the near future than those who did not see any messages (the control group). This finding was mainly among non-binge drinkers. Regardless of evidence type, those who were exposed to the messages exhibited a higher level of intention to avoid binge drinking than those in the control group. This is also mainly among non-binge drinkers. We also found the main effects of message framing and evidence type on attitude toward the message and the main effect of message framing on attitude toward drinking.

  12. "Which pass is better?" Novel approaches to assess passing effectiveness in elite soccer.

    Rein, Robert; Raabe, Dominik; Memmert, Daniel

    2017-10-01

    Passing behaviour is a key property of successful performance in team sports. Previous investigations however have mainly focused on notational measurements like total passing frequencies which provide little information about what actually constitutes successful passing behaviour. Consequently, this has hampered the transfer of research findings into applied settings. Here we present two novel approaches to assess passing effectiveness in elite soccer by evaluating their effects on majority situations and space control in front of the goal. Majority situations are assessed by calculating the number of defenders between the ball carrier and the goal. Control of space is estimated using Voronoi-diagrams based on the player's positions on the pitch. Both methods were applied to position data from 103 German First division games from the 2011/2012, 2012/2013 and 2014/2015 seasons using a big data approach. The results show that both measures are significantly related to successful game play with respect to the number of goals scored and to the probability of winning a game. The results further show that on average passes from the mid-field into the attacking area are most effective. The presented passing efficiency measures thereby offer new opportunities for future applications in soccer and other sports disciplines whilst maintaining practical relevance with respect to tactical training regimes or game performances analysis. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. How to Provide Live Library Information via SMS Using Twilio

    Mike Beccaria

    2011-07-01

    Full Text Available Paul Smith’s College provides library hours and workstation availability using SMS Text Messages. The service was implemented using an easy and affordable web-based API for SMS sending and receiving, from twilio.com. A new class of ‘cloud-based‘ SMS vendors make simple SMS-based services efficient and cost-effective to implement, and have many possible applications in the library environment. A simple PHP example is provided which supplies workstation availability over SMS based on a database of computer availability from a previous Code4Lib Journal Article.

  14. Improving the Effectiveness of Fundraising Messages: The Impact of Charity Goal Attainment, Message Framing, and Evidence on Persuasion

    Das, Enny; Kerkhof, Peter; Kuiper, Joyce

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a positive message frame. In addition, building on…

  15. Mobile phone messaging for illicit drug and alcohol dependence: A systematic review of the literature.

    Tofighi, Babak; Nicholson, Joseph M; McNeely, Jennifer; Muench, Frederick; Lee, Joshua D

    2017-07-01

    Mobile phone use has increased dramatically and concurrent with rapid developments in mobile phone-based health interventions. The integration of text messaging interventions promises to optimise the delivery of care for persons with substance dependence with minimal disruption to clinical workflows. We conducted a systematic review to assess the acceptability, feasibility and clinical impact of text messaging interventions for persons with illicit drug and alcohol dependence. Studies were required to evaluate the use of text messaging as an intervention for persons who met Diagnostic and Statistical Manual of Mental Disorders, 4th edition criterion for a diagnosis of illicit drug and/or alcohol dependence. Authors searched for articles published to date in MEDLINE (pubmed.gov), the Cochrane Library, EMBASE, CINAHL, Google Scholar and PsychINFO. Eleven articles met the search criteria for this review and support the acceptability and feasibility of text messaging interventions for addressing illicit drug and alcohol dependence. Most studies demonstrated improved clinical outcomes, medication adherence and engagement with peer support groups. Text messaging interventions also intervened on multiple therapeutic targets such as appointment attendance, motivation, self-efficacy, relapse prevention and social support. Suggestions for future research are described, including intervention design features, clinician contact, privacy measures and integration of behaviour change theories. Text messaging interventions offer a feasible platform to address a range of substances (i.e. alcohol, methamphetamine, heroin and alcohol), and there is increasing evidence supporting further larger-scale studies. [Tofighi B, Nicholson JM, McNeely J, Muench F, Lee JD. Mobile phone messaging for illicit drug and alcohol dependence: A systematic review of the literature. Drug Alcohol Rev 2017;36:477-491]. © 2017 Australasian Professional Society on Alcohol and other Drugs.

  16. Assessing Library Automation and Virtual Library Development in Four Academic Libraries in Oyo, Oyo State, Nigeria

    Gbadamosi, Belau Olatunde

    2011-01-01

    The paper examines the level of library automation and virtual library development in four academic libraries. A validated questionnaire was used to capture the responses from academic librarians of the libraries under study. The paper discovers that none of the four academic libraries is fully automated. The libraries make use of librarians with…

  17. Text messages as a learning tool for midwives | Woods | South ...

    The use of cell phone text messaging to improve access to continuing ... with 50 of the message recipients, demonstrated that the text messages were well received by ... services, such as the management of HIV-infected children and adults.

  18. Wikis in Libraries

    Matthew Bejune

    2007-09-01

    Full Text Available Wikis have recently been adopted to support a variety of collaborative activities within libraries. This article and its companion wiki, LibraryWikis (http://librarywikis.pbwiki.com/, seek to document the phenomenon of wikis in libraries. This subject is considered within the framework of computer-supported cooperative work (CSCW. The author identified thirty-three library wikis and developed a classification schema with four categories: (1 collaboration among libraries (45.7 percent; (2 collaboration among library staff (31.4 percent; (3 collaboration among library staff and patrons (14.3 percent; and (4 collaboration among patrons (8.6 percent. Examples of library wikis are presented within the article, as is a discussion for why wikis are primarily utilized within categories I and II and not within categories III and IV. It is clear that wikis have great utility within libraries, and the author urges further application of wikis in libraries.

  19. News from the Library

    CERN Library

    2010-01-01

    The LHC Library to be merged with the Central Library. Not everyone knows that CERN Scientific Information Service currently counts three physical libraries on site. The Central Library is located in Building 52 and there are two satellite libraries located respectively in building 30 (the LHC Library) and in building 864 on Prévessin site (the SPS Library). Moreover, the Legal Service Library is located in Building 60. In the past, there have been at CERN up to 6 satellite libraries; they were essential at a time when information was only in paper form and having multiple copies of documents located in several places at CERN was useful to facilitate scientific research. Today, this need is less critical as most of our resources are online. That is why, following a SIPB (Scientific Information Policy Board) decision, the collections of the LHC Library will be merged this summer with the Central collection. This reorganization and centralization of resources will improve loan services. The SP...

  20. A Message Without a Code?

    Tom Conley

    1981-01-01

    Full Text Available The photographic paradox is said to be that of a message without a code, a communication lacking a relay or gap essential to the process of communication. Tracing the recurrence of Barthes's definition in the essays included in Image/Music/Text and in La Chambre claire , this paper argues that Barthes's definition is platonic in its will to dematerialize the troubling — graphic — immediacy of the photograph. He writes of the image in order to flee its signature. As a function of media, his categories are written in order to be insufficient and inadequate; to maintain an ineluctable difference between language heard and letters seen; to protect an idiom of loss which the photograph disallows. The article studies the strategies of his definition in «The Photographic Paradox» as instrument of abstraction, opposes the notion of code, in an aural sense, to audio-visual markers of closed relay in advertising, and critiques the layout and order of La Chambre claire in respect to Barthes's ideology of absence.

  1. News from the Library: Learning a profession at the CERN Library

    CERN Library

    2012-01-01

    As you all know, training is very important at CERN, and each year the Organization welcomes thousands of students in various areas. However, did you know that it is also possible to learn the profession of Library Assistant (Agent en Information Documentaire - AID)?   For more than 10 years the CERN Library has been providing apprenticeship posts in information science. This apprenticeship lasts three years, during which apprentices share their time between school and work at CERN. The apprenticeship is governed by the laws, regulations and contracts in force in the Canton of Geneva. If they pass the final examinations, apprentices get the Certificat fédéral de capacité suisse (CFC). The library has trained some fifteen apprentices - who have then gone on to work in different institutions in Geneva or elsewhere in Europe - and it is continuing its momentum with a new apprenticeship post, available from September 2012. For more information on apprenticeships...

  2. Improved Message Authentication and Confidentiality Checking

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  3. Electronic publishing: implications for health sciences libraries and librarians.

    Schulman, J L

    1986-01-01

    Increasingly we hear of "electronic publishing" in the form of books and journals made available as databases, either through traditional online services or through electronic message services. This paper explores its potential impact on the medical library community and on the relationship between end user and librarian. The librarian's new roles as intermediary, facilitator, and advocate for end users are examined. The question of developing expertise for evaluating information as well as f...

  4. Management and Archiving e-mail Messages in Governmental Organization

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  5. Pass-transistor asynchronous sequential circuits

    Whitaker, Sterling R.; Maki, Gary K.

    1989-01-01

    Design methods for asynchronous sequential pass-transistor circuits, which result in circuits that are hazard- and critical-race-free and which have added degrees of freedom for the input signals, are discussed. The design procedures are straightforward and easy to implement. Two single-transition-time state assignment methods are presented, and hardware bounds for each are established. A surprising result is that the hardware realizations for each next state variable and output variable is identical for a given flow table. Thus, a state machine with N states and M outputs can be constructed using a single layout replicated N + M times.

  6. Evaluation of Sexual Communication Message Strategies

    Khan Munziba

    2011-05-01

    Full Text Available Abstract Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  7. The Handheld Library: Developments at the Rector Gabriel Ferraté Library, UPC

    Beatriz Benítez Juan

    2011-10-01

    Full Text Available The purpose of this paper is to highlight the mobile services developed by the Rector Gabriel Ferraté Library (BRGF of the Universitat Politècnica de Catalunya (UPC-Barcelona Tech in Barcelona, Spain. We hope this paper will be of use to other libraries exploring new technologies for communicating and delivering their services to users at a time when mobile services are an emerging topic in librarianship and information science literature. By setting out the successive steps involved in the as yet unfinished process of building our mobile services portfolio, we aim to offer a detailed picture of the mobile services and features offered by a university library from a case study perspective. The main topics to be discussed include: The BRGF’s mobile website, including the information available, its interactive capabilities and the services it provides to its users. The mobile-friendly version of UP Commons(the UPC Library Service’s institutional repositories. The UPC Library Service’s mobile OPAC. The mobile version of u-win(BRGF’s videogame service. The use of QR codes to deliver information to mobile devices. Text message notifications. Additional topics for discussion include: The library’s organisation and the organisational concepts that underpin and make possible its technological developments (including mobile. BRGF’s concern regarding the reduction of investment in the development of mobile services. The criteria and tools used to guide the library’s decisions regarding the design and orientation of current and future mobile services. How mobile services can help to improve the image of the library as a leading technology site. Selected mobile features that BRGF plans to offer in the near future. Ultimately, this paper aims to delineate the effectiveness and potential of delivering library services by the preferred means of communication of a new generation of students and teachers.

  8. Mobile phone messaging for communicating results of medical investigations.

    Gurol-Urganci, Ipek; de Jongh, Thyra; Vodopivec-Jamsek, Vlasta; Car, Josip; Atun, Rifat

    2012-06-13

    Mobile phone messaging, such as Short Message Service (SMS) and Multimedia Message Service (MMS), has rapidly grown into a mode of communication with a wide range of applications, including communicating the results from medical investigations to patients. Alternative modes of communication of results include face-to-face communication, postal messages, calls to landlines or mobile phones, through web-based health records and email. Possible advantages of mobile phone messaging include convenience to both patients and healthcare providers, reduced waiting times for health services and healthcare costs. To assess the effects of mobile phone messaging for communicating results of medical investigations, on people's healthcare-seeking behaviour and health outcomes. Secondary objectives include assessment of participants' evaluation of the intervention, direct and indirect healthcare costs and possible risks and harms associated with the intervention. We searched the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library 2009, Issue 2), MEDLINE (OvidSP) (January 1993 to June 2009), EMBASE (OvidSP) (January 1993 to June 2009), PsycINFO (OvidSP) (January 1993 to June 2009), CINAHL (EbscoHOST) (January 1993 to June 2009), LILACS (January 1993 to June 2009) and African Health Anthology (January 1993 to June 2009). We also reviewed grey literature (including trial registers) and reference lists of articles. We included randomised controlled trials (RCTs), quasi-randomised controlled trials (QRCTs), controlled before-after (CBA) studies, or interrupted time series (ITS) studies with at least three time points before and after the intervention. We included studies assessing mobile phone messaging for communicating results of medical tests, between a healthcare provider or 'treatment buddy' and patient. We only included studies in which it was possible to assess the effects of mobile phone messaging independent of other technologies or interventions.

  9. When message-frame fits salient cultural-frame, messages feel more persuasive.

    Uskul, Ayse K; Oyserman, Daphna

    2010-03-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a message about health risks of caffeine consumption among individuals prescreened to be regular caffeine consumers. After being primed for individualism, European Americans who read a health message that focused on the personal self were more likely to accept the message-they found it more persuasive, believed they were more at risk and engaged in more message-congruent behaviour. These effects were also found among Asian Americans who were primed for collectivism and who read a health message that focused on relational obligations. The findings point to the importance of investigating the role of situational cues in persuasive effects of health messages and suggest that matching content to primed frame consistent with the chronic frame may be a way to know what to match messages to.

  10. Comment ameliorer la selection et le traitement des messages verbaux? (How to Improve the Selection and Processing of Verbal Messages)

    Rivenez, Marie; Darwin, Chris; Guillaume, Anne

    2005-01-01

    L'objectif de cette recherche est d'ameliorer la selection des messages verbaux. Nous cherchons a determiner les facteurs influencant le traitement d'un message verbal lorsque l'attention est portee sur un autre message...

  11. The Library International Partnerweek 2011

    Presentation at the Library International Partnerweek, held at Copenhagen Technical Library at the Copenhagen University College of Engineering. Participant: Ms. Carmen Priesto Estravid from Madrid Technical University, E.U.I.T. Obras Públicas, Library. Spain Ms.Tuulikki Hattunen from TUAS Library....... Finland Ms. Anitta Ôrm from Kemi-Tornio UAS Library. Finland Mr. Manfred Walter from HTW-Berlin. Germany Mr. Peter Hald from Copenhagen Technical Library. Denmark Mr. Ole Micahelsen from Copenhagen Technical Library. Denmark...

  12. Fabrication of seamless calandria tubes by cold pilgering route using 3-pass and 2-pass schedules

    Saibaba, N.

    2008-12-01

    Calandria tube is a large diameter, extremely thin walled zirconium alloy tube which has diameter to wall thickness ratio as high as 90-95. Such tubes are conventionally produced by the 'welded route', which involves extrusion of slabs followed by a series of hot and cold rolling passes, intermediate anneals, press forming of sheets into circular shape and closing the gap by TIG welding. Though pilgering is a well established process for the fabrication of seamless tubes, production of extremely thin walled tubes offers several challenges during pilgering. Nuclear fuel complex (NFC), Hyderabad, has successfully developed a process for the production of Zircaloy-4 calandria tubes by adopting the 'seamless route' which involves hot extrusion of mother blanks followed by three-pass pilgering or two-pass pilgering schedules. This paper deals with standardization of the seamless route processes for fabrication of calandria tubes, comparison between the tubes produced by 2-pass and 3-pass pilgering schedules, role of ultrasonic test charts for control of process parameters, development of new testing methods for burst testing and other properties.

  13. Fabrication of seamless calandria tubes by cold pilgering route using 3-pass and 2-pass schedules

    Saibaba, N.

    2008-01-01

    Calandria tube is a large diameter, extremely thin walled zirconium alloy tube which has diameter to wall thickness ratio as high as 90-95. Such tubes are conventionally produced by the 'welded route', which involves extrusion of slabs followed by a series of hot and cold rolling passes, intermediate anneals, press forming of sheets into circular shape and closing the gap by TIG welding. Though pilgering is a well established process for the fabrication of seamless tubes, production of extremely thin walled tubes offers several challenges during pilgering. Nuclear fuel complex (NFC), Hyderabad, has successfully developed a process for the production of Zircaloy-4 calandria tubes by adopting the 'seamless route' which involves hot extrusion of mother blanks followed by three-pass pilgering or two-pass pilgering schedules. This paper deals with standardization of the seamless route processes for fabrication of calandria tubes, comparison between the tubes produced by 2-pass and 3-pass pilgering schedules, role of ultrasonic test charts for control of process parameters, development of new testing methods for burst testing and other properties

  14. KAERI photonuclear library

    Chang, Jong Hwa; Lee, Young Ouk; Han, Yin Iu

    2000-03-01

    This report contains summary information and figures depicting the KAERI photonuclear data library that extends up to 140 MeV of incident photon. The library consists of 143 isotopes from C-12 to Bi-209, providing the photoabsorption cross section and the emission spectra for neutron, proton, deuteron, triton, alpha particles, and all residual nuclides in ENDF6 format. The contents of this report and ENDF-6 format data library are available at http://atom.kaeri.re.kr/.

  15. The CERN Library

    Hester, Alec G

    1968-01-01

    Any advanced research centre needs a good Library. It can be regarded as a piece of equipment as vital as any machine. At the present time, the CERN Library is undergoing a number of modifications to adjust it to the changing scale of CERN's activities and to the ever increasing flood of information. This article, by A.G. Hester, former Editor of CERN COURIER who now works in the Scientific Information Service, describes the purposes, methods and future of the CERN Library.

  16. Common pass decentered annular ring resonator

    Holmes, D. A.; Waite, T. R.

    1985-04-30

    An optical resonator having an annular cylindrical gain region for use in a chemical laser or the like in which two ring-shaped mirrors having substantially conical reflecting surfaces are spaced apart along a common axis of revolution of the respective conical surfaces. A central conical mirror reflects incident light directed along said axis radially outwardly to the reflecting surface of a first one of the ring-shaped mirrors. The radial light rays are reflected by the first ring mirror to the second ring mirror within an annular cylindrical volume concentric with said common axis and forming a gain region. Light rays impinging on the second ring mirror are reflected to diametrically opposite points on the same conical mirror surfaces and back to the first ring mirror through the same annular cylindrical volume. The return rays are then reflected by the conical mirror surface of the first ring mirror back to the central conical mirror. The mirror surfaces are angled such that the return rays are reflected back along the common axis by the central mirror in a concentric annular cylindrical volume. A scraper mirror having a central opening centered on said axis and an offset opening reflects all but the rays passing through the two openings in an output beam. The rays passing through the second opening are reflected back through the first opening to provide feedback.

  17. Comparison of cryogenic low-pass filters

    Thalmann, M.; Pernau, H.-F.; Strunk, C.; Scheer, E.; Pietsch, T.

    2017-11-01

    Low-temperature electronic transport measurements with high energy resolution require both effective low-pass filtering of high-frequency input noise and an optimized thermalization of the electronic system of the experiment. In recent years, elaborate filter designs have been developed for cryogenic low-level measurements, driven by the growing interest in fundamental quantum-physical phenomena at energy scales corresponding to temperatures in the few millikelvin regime. However, a single filter concept is often insufficient to thermalize the electronic system to the cryogenic bath and eliminate spurious high frequency noise. Moreover, the available concepts often provide inadequate filtering to operate at temperatures below 10 mK, which are routinely available now in dilution cryogenic systems. Herein we provide a comprehensive analysis of commonly used filter types, introduce a novel compact filter type based on ferrite compounds optimized for the frequency range above 20 GHz, and develop an improved filtering scheme providing adaptable broad-band low-pass characteristic for cryogenic low-level and quantum measurement applications at temperatures down to few millikelvin.

  18. Comparison of cryogenic low-pass filters.

    Thalmann, M; Pernau, H-F; Strunk, C; Scheer, E; Pietsch, T

    2017-11-01

    Low-temperature electronic transport measurements with high energy resolution require both effective low-pass filtering of high-frequency input noise and an optimized thermalization of the electronic system of the experiment. In recent years, elaborate filter designs have been developed for cryogenic low-level measurements, driven by the growing interest in fundamental quantum-physical phenomena at energy scales corresponding to temperatures in the few millikelvin regime. However, a single filter concept is often insufficient to thermalize the electronic system to the cryogenic bath and eliminate spurious high frequency noise. Moreover, the available concepts often provide inadequate filtering to operate at temperatures below 10 mK, which are routinely available now in dilution cryogenic systems. Herein we provide a comprehensive analysis of commonly used filter types, introduce a novel compact filter type based on ferrite compounds optimized for the frequency range above 20 GHz, and develop an improved filtering scheme providing adaptable broad-band low-pass characteristic for cryogenic low-level and quantum measurement applications at temperatures down to few millikelvin.

  19. An experimental evaluation of multi-pass solar air heaters

    Satcunanathan, S.; Persad, P.

    1980-12-01

    Three collectors of identical dimensions but operating in the single-pass, two-pass and three-pass modes were tested simultaneously under ambient conditions. It was found that the two-pass air heater was consistently better than the single-pass air heater over the day for the range of mass flow rates considered. It was also found that at a mass flow rate of 0.0095 kg s/sup -1/ m/sup -2/, the thermal performances of the two-pass and three-pass collectors were identical, but at higher flow rates the two-pass collector was superior to the three-pass collector, the superiority decreasing with increasing mass flow rate.

  20. The Personal Virtual Library

    Le Meur, Jean-Yves

    1998-01-01

    Looking for "library" in the usual search engines of the World Wide Web gives: "Infoseek found 3,593,126 pages containing the word library" and it nicely proposes: "Search only within these 3,59 3,126 pages ?" "Yahoo! Found 1299 categories and 8669 sites for library" "LycOs: 1-10 von 512354 relevanten Ergebnissen" "AltaVista: About 14830527 documents match your query" and at the botto m: "Word count: library: 15466897" ! Excite: Top 10 matches and it does not say how many can be browsed... "Library" on the World Wide Web is really popular. At least fiveteen million pages ar e supposed to contain this word. Half of them may have disappeared by now but one more hit will be added once the search robots will have indexed this document ! The notion of Personal Library i s a modest attempt, in a small environment like a library, to give poor users lost in cyber-libraries the opportunity to keep their own private little shelves - virtually. In this paper, we will l ook at the usual functionalities of library systems...

  1. Integrated circuit cell library

    Whitaker, Sterling R. (Inventor); Miles, Lowell H. (Inventor)

    2005-01-01

    According to the invention, an ASIC cell library for use in creation of custom integrated circuits is disclosed. The ASIC cell library includes some first cells and some second cells. Each of the second cells includes two or more kernel cells. The ASIC cell library is at least 5% comprised of second cells. In various embodiments, the ASIC cell library could be 10% or more, 20% or more, 30% or more, 40% or more, 50% or more, 60% or more, 70% or more, 80% or more, 90% or more, or 95% or more comprised of second cells.

  2. NEIC Library Services

    The National Enforcement Investigation Center (NEIC) Environmental Forensic Library partners with NEIC's forensic scientists to retrieve, validate and deliver information to develop methods, defensible regulations, and environmental measurements.

  3. Library and Education

    Gheorghe Buluţă

    2011-01-01

    Full Text Available The psycho-social phenomena generated by mass-media and the new information and communication technologies at the level of the young generations have led to new communication practices that bypass libraries and revolutionized the intellectual labor practices, with texts being rather used than read. In this context, our article examines the need to increase the library's role in developing the quality of education and research and brings to attention a few possible solutions which include a partnership between various types of libraries and between librarians' associations and NGOs to facilitate education through library and safeguard reading.

  4. Libraries and licensing

    Maja Žumer

    2001-01-01

    Full Text Available In the mid 90s, the abundance of various electronic publications exposed libraries to the problems of licensing electronic content. Various licensing principles have been prepared recently to help libraries in the process; it can be said that in general, the knowledge of licensing issues has improved in libraries of all types. Libraries form consortia in order to gain stronger negotiating positions and obtain better conditions.In the article, new licensing principles are presented in more detail, as well as some domestic and foreign experiences with consortia forming.

  5. International Youth Library

    Osman Ümit Özen

    1994-03-01

    Full Text Available International Youth Library, the biggest youth library in the world, was founded in 1948 in Munich, Germany, by Jella Lepman. She aimed to unite all the children of the world through books by establishing this library. IYL is still trying to achieve this end supporting scholarship programmes in children’s literature research, participating in or organizing meetings on children’s literature, and working with other national and international organizations deeding with children’s literature. Unfortunately the library is facing some problems recently which have risen from economic difficulties which also inhibits promotional activities.

  6. Anxiety, Construct Differentiation, and Message Production.

    Shepherd, Gregory J.; Condra, Mollie B.

    1989-01-01

    Examines the nature of the construct differentiation/anxiety relationship in light of messages produced. Considers recent and complex conceptualizations of social-cognitive development and anxiety. Finds no significant relationship between state anxiety and construct differentiation. (MM)

  7. MORPHOLOGICAL STRATEGIES IN TEXT MESSAGING AMONG ...

    Text messaging is the application of abridged morphological forms in order ... the emergence of the Global System for Mobile Communication (GSM) in the world. ... Our thesis statement is that these morphological patterns as used in SMS are ...

  8. Safety message broadcast in vehicular networks

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  9. Photometric requirements for portable changeable message signs.

    2001-09-01

    This project reviewed the performance of pchangeable message signs (PCMSs) and developed photometric standards to establish performance requirements. In addition, researchers developed photometric test methods and recommended them for use in evaluati...

  10. Wyoming CV Pilot Traveler Information Message Sample

    Department of Transportation — This dataset contains a sample of the sanitized Traveler Information Messages (TIM) being generated by the Wyoming Connected Vehicle (CV) Pilot. The full set of TIMs...

  11. Getting the message across: age differences in the positive and negative framing of health care messages.

    Shamaskin, Andrea M; Mikels, Joseph A; Reed, Andrew E

    2010-09-01

    Although valenced health care messages influence impressions, memory, and behavior (Levin, Schneider, & Gaeth, 1998) and the processing of valenced information changes with age (Carstensen & Mikels, 2005), these 2 lines of research have thus far been disconnected. This study examined impressions of, and memory for, positively and negatively framed health care messages that were presented in pamphlets to 25 older adults and 24 younger adults. Older adults relative to younger adults rated positive pamphlets more informative than negative pamphlets and remembered a higher proportion of positive to negative messages. However, older adults misremembered negative messages to be positive. These findings demonstrate the age-related positivity effect in health care messages with promise as to the persuasive nature and lingering effects of positive messages. (c) 2010 APA, all rights reserved.

  12. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  13. Message-driven factors influencing opening and forwarding of mobile advertising messages

    Sanz Blas, Silvia; Ruiz Mafé, Carla; Martí Parreño, José

    2015-01-01

    This work aims to analyse the influence of message-driven factors -informativeness, ubiquity, frequency and personalization- on consumer attitude and behaviour -opening and forwarding- towards mobile advertising messages. A theoretical model was developed and empirically tested using a sample of 355 Spanish teenager mobile users. Findings show that frequency is the dimension accounting the most -and significantly- of the four message-driven factors analysed on attitude toward mobile advertisi...

  14. When message-frame fits salient cultural-frame, messages feel more persuasive

    Uskul, Ayse K.; Oyserman, Daphna

    2010-01-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a me...

  15. Persuasive messages. Development of persuasive messages may help increase mothers' compliance of their children's immunization schedule.

    Gore, P; Madhavan, S; Curry, D; McClurg, G; Castiglia, M; Rosenbluth, S A; Smego, R A

    1998-01-01

    Effective immunization campaigns can be designed by determining which persuasion strategy is most effective in attracting the attention of mothers of preschoolers. The authors assess the impact of three persuasional strategies: fear-arousal, motherhood-arousal, and rational messages, on mothers of preschoolers who are late for their immunizations. The fear-arousal message was found to be most effective, followed by the motherhood-arousal, and then the rational message, in attracting mothers' attention to their child's immunization status.

  16. Improving Type Error Messages in OCaml

    Arthur Charguéraud

    2015-12-01

    Full Text Available Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise and systematically useful to the programmer, but also to handle a full-blown programming language and to cope with large-sized programs efficiently. In this work, we present a modification to the traditional ML type inference algorithm implemented in OCaml that, by significantly reducing the left-to-right bias, allows us to report error messages that are more helpful to the programmer. Our algorithm remains fully predictable and continues to produce fairly concise error messages that always help making some progress towards fixing the code. We implemented our approach as a patch to the OCaml compiler in just a few hundred lines of code. We believe that this patch should benefit not just to beginners, but also to experienced programs developing large-scale OCaml programs.

  17. Recent computer attacks via Instant Messaging

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  18. Gender messages in contemporary popular Malay songs

    Collin Jerome

    2013-07-01

    Full Text Available Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992 method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. The results showed that the messages revolve mainly around socially constructed gender roles and expectations in romantic relationships. Gender stereotypes are also used in the songs to reinforce men’s and women’s roles in romantic relationships. The results also showed that, while listeners acknowledge the songs’ messages about gender, their own perceptions of gender and what it means to be a gendered being in today’s world are neither represented nor discussed fully in the songs analysed. It is hoped the findings from this, particularly the mismatch between projected and perceived notions of gender, contribute to the field of popular Malay music studies in particular, and popular music studies in general where gender messages in popular songs and their influence on listeners’ perceptions of their own gender is concerned.

  19. Quantum signature scheme for known quantum messages

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  20. Public Relations in Special Libraries.

    Rutkowski, Hollace Ann; And Others

    1991-01-01

    This theme issue includes 11 articles on public relations (PR) in special libraries. Highlights include PR at the Special Libraries Association (SLA); sources for marketing research for libraries; developing a library image; sample PR releases; brand strategies for libraries; case studies; publicizing a consortium; and a bibliography of pertinent…

  1. Music Libraries: Centralization versus Decentralization.

    Kuyper-Rushing, Lois

    2002-01-01

    Considers the decision that branch libraries, music libraries in particular, have struggled with concerning a centralized location in the main library versus a decentralized collection. Reports on a study of the Association of Research Libraries that investigated the location of music libraries, motivation for the location, degrees offered,…

  2. An Approach to Ad-hoc Messaging Networks Using Time Shifted Propagation

    Christoph Fuchß

    2007-10-01

    Full Text Available Many communication devices, like mobile phones and PDAs, are enabled for near field communication by using Bluetooth. Many approaches dealt so far with the attempt to transfer mobile ad-hoc networks (MANET to the mechanism of the “fixed internet” to mobile networks. In order to achieve liability and robustness of common TCP connections routing algorithm in near field communication based networks become more sophisticated and complex. These mechanisms often do not reflect on the application’s particularities.Our approach of an ad-hoc messaging network (AMNET uses simple store-and-forward message passing to spread data asynchronously. We do not aim at the reliability of common internet networks but focus on application specific needs that can be covered by simple message passing mechanism. In this paper we will portray a powerful network by using simple devices and communication protocols on the basis of AMNETs. Simulation results of our AMNET approach provide insights towards speeding up the network setup process and to enable the use of AMNETs even with few participants by introducing a hybrid structure of infrastructure and mobile nodes.

  3. The Pension Fund passes important milestones

    2012-01-01

    In this column, the Chairman of the Pension Fund Governing Board (PFGB) presents the Board's latest main decisions, initiatives and accomplishments to the Fund's members and beneficiaries.   Since my last report in October, the PFGB has passed several milestones in actuarial, technical and investment matters. The PFGB has completed an analysis of a request by the European Organisation for Astronomical Research in the Southern Hemisphere (ESO) to reduce the increased cost of pension insurance for new ESO recruits that has been caused by the increased CHF/€ exchange ratio. Currently the staff of ESO are admitted to the CERN Pension Fund, pursuant to a co-operation agreement between CERN and ESO dating back to 1968. This analysis assessed the actuarial, financial, administrative and legal implications, and is scheduled to be presented to the CERN Council and the Finance Committee in December. After an open tendering process the PFGB has selected Buck Consultants Limited...

  4. The baton passes to the LHC

    CERN Bulletin

    2011-01-01

    Held in the picturesque mountain setting of La Thuile in the Italian Alps, the international conference “Rencontres de Moriond” showed how the baton of discovery in the field of high-energy physics is definitely passing to the LHC experiments. In the well-known spirit of Moriond, the conference was an important platform for young students to present their latest results. The Higgs boson might well be within reach this year and the jet-quenching phenomenon might reveal new things soon…   New physics discussed over the Italian Alps during the "Les rencontres de Moriond" conference.  (Photographer: Paul Gerritsen. Adapted by Katarina Anthony) Known by physicists as one of the most important winter conferences, “Les rencontres de Moriond” are actually a series of conferences spread over two weeks covering the main themes of electroweak interactions, QCD and high-energy interactions, cosmology, gravitation, astropar...

  5. Library Systems: FY 2013 Public Libraries Survey (Administrative Entity)

    Institute of Museum and Library Services — Find key information on library systems around the United States.These data include imputed values for libraries that did not submit information in the FY 2013 data...

  6. Library Systems: FY 2012 Public Libraries Survey (Administrative Entity)

    Institute of Museum and Library Services — Find key information on library systems around the United States.These data include imputed values for libraries that did not submit information in the FY 2012 data...

  7. Library Systems: FY 2014 Public Libraries Survey (Administrative Entity Data)

    Institute of Museum and Library Services — Find key information on library systems around the United States.These data include imputed values for libraries that did not submit information in the FY 2014 data...

  8. Special Libraries in Singapore.

    Leong, Alice

    1979-01-01

    Distinguishes five main categories of special libraries in Singapore: those of private organizations, foreign governments, government departments, statutory boards, and regional organizations. Statistical data are provided for library holdings, professional staff employment, and subject profiles, and suggestions for improving various aspects of…

  9. Iranian Library Update.

    Harvey, John F.

    1979-01-01

    Discusses the state of Iranian libraries since the revolution: the printing industry flourishes because of obsolete copyright laws, and the government is attempting to dewesternize media and education. Also considered are budget cuts, the revolution's cost to libraries, and its effect on individual librarians. (SW)

  10. The Memory Library

    Olesen-Bagneux, Ole

    2014-01-01

    of classification and retrieval processes is presented. The key element is to understand the library both as a physical structure and as a structure in the memory of the Alexandrian scholars. In this article, these structures are put together so to propose a new interpretation of the library....

  11. Privacy and Library Records

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  12. Hospital Library Administration.

    Cramer, Anne

    The objectives of a hospital are to improve patient care, while the objectives of a hospital library are to improve services to the staff which will support their efforts. This handbook dealing with hospital administration is designed to aid the librarian in either implementing a hospital library, or improving services in an existing medical…

  13. Munitions Classification Library

    2016-04-04

    members of the community to make their own additions to any, or all, of the classification libraries . The next phase entailed data collection over less......Include area code) 04/04/2016 Final Report August 2014 - August 2015 MUNITIONS CLASSIFICATION LIBRARY Mr. Craig Murray, Parsons Dr. Thomas H. Bell, Leidos

  14. TRAC Searchable Research Library

    2016-05-01

    Relational Data Modeling (VRDM) computational paradigm. VRDM has the key attributes of being cloud available, using domain semantics for configured...Figure 1. Methodology for TRAC Searchable Research Library Development. ........................... 5 Figure 2. The conceptual model for the cloud ...TRAC Searchable Research Library project was initiated by TRAC- HQ to address a current capability gap in the TRAC organization. Currently TRAC does not

  15. XML in Libraries.

    Tennant, Roy, Ed.

    This book presents examples of how libraries are using XML (eXtensible Markup Language) to solve problems, expand services, and improve systems. Part I contains papers on using XML in library catalog records: "Updating MARC Records with XMLMARC" (Kevin S. Clarke, Stanford University) and "Searching and Retrieving XML Records via the…

  16. Merchandising Techniques and Libraries.

    Green, Sylvie A.

    1981-01-01

    Proposes that libraries employ modern booksellers' merchandising techniques to improve circulation of library materials. Using displays in various ways, the methods and reasons for weeding out books, replacing worn book jackets, and selecting new books are discussed. Suggestions for learning how to market and 11 references are provided. (RBF)

  17. Library Consortia in Hungary

    Csajbok, Edit; Szluka, Peter; Vasas, Livia

    2012-01-01

    During the last two decades many Hungarian libraries have developed considerably, beyond what was considered possible prior to 1989 and the beginning of events signaling the end of Communism in the country. Some of the modernization of library services has been realized through participation in cooperative agreements. Many smaller and larger…

  18. The academic library network

    Jacek Wojciechowski

    2012-01-01

    Full Text Available The efficiency of libraries, academic libraries in particular, necessitates organizational changes facilitating or even imposing co-operation. Any structure of any university has to have an integrated network of libraries, with an appropriate division of work, and one that is consolidated as much as it is possible into medium-size or large libraries. Within thus created network, a chance arises to centralize the main library processes based on appropriate procedures in the main library, highly specialized, more effective and therefore cheaper in operation, including a co-ordination of all more important endeavours and tasks. Hierarchically subordinated libraries can be thus more focused on performing their routine service, more and more frequently providing for the whole of the university, and being able to adjust to changeable requirements and demands of patrons and of new tasks resulting from the new model of the university operation. Another necessary change seems to be a universal implementation of an ov rall programme framework that would include all services in the university’s library networks.

  19. Increasing Library Effectiveness

    Klement, Susan

    1977-01-01

    Libraries could benefit from the businesslike approach of an entrepreneur. Characteristics of entrepreneurial behavior of value to libraries include: moderate risk-taking as a function of skill, not chance; energetic instrumental activity; insistence upon individual responsibility; knowledge of results of decisions; anticipation of future…

  20. Library Classification 2020

    Harris, Christopher

    2013-01-01

    In this article the author explores how a new library classification system might be designed using some aspects of the Dewey Decimal Classification (DDC) and ideas from other systems to create something that works for school libraries in the year 2020. By examining what works well with the Dewey Decimal System, what features should be carried…

  1. An Online Library Catalogue.

    Alloro, Giovanna; Ugolini, Donatella

    1992-01-01

    Describes the implementation of an online catalog in the library of the National Institute for Cancer Research and the Clinical and Experimental Oncology Institute of the University of Genoa. Topics addressed include automation of various library functions, software features, database management, training, and user response. (10 references) (MES)

  2. Libraries and Lenin.

    Lynn, Karen

    This instructional unit combines a study of the Soviet leader V. I. Lenin with a study of libraries. Lenin was selected as the focus because of his support of books and libraries and because he oversaw a revolution that altered the political and social structure of Russia and the balance of power throughout the world. Included are lesson plan…

  3. Chief Information Officer > Library

    DCIO R&A DCIO CS In the News Library Contact us Library Policies CIO Charter DoD CIO Charter that many laws, and DoD policies and procedures apply to or include the use of IbC, even when such use Service Site Registry Policies Education and Training Terms of Service Agreements Site Registry Policies

  4. Marketing and health libraries.

    Wakeham, Maurice

    2004-12-01

    To present an overview of the concepts of marketing and to examine ways in which they can be applied to health libraries. A review was carried out of literature relating to health libraries using LISA, CINAHL, BNI and Google. Marketing is seen as a strategic management activity aimed at developing customer relationships. Concepts such as the 'four Ps' (product, price, place and promotion), marketing plans, the marketing mix, segmentation, promotion and evaluation are identified and discussed in relation to health libraries. In increasingly complex health service and information environments, the marketing and promotion of library services is becoming more important if those services are to justify the resources given to them. Marketing techniques are equally applicable to physical and digital library services.

  5. Motivation and library management

    Tatjana Likar

    2000-01-01

    Full Text Available The present article deals with motivation, its relation to management and its role and use in librarianship in our country and abroad. The countries where librarianship is well developed started to deal with library management and questions of motivation of library workers decades ago, whereas elsewhere the subject is at its start. The prerequisite for modern policy making is attention to the elements of modern library management. Librarians, library managers and directors of libraries should create a work environment providing long term satisfaction with work by means of certain knowledge and tools. The level of motivation of the staff is influenced by the so called higher factors deriving from the work process itself and related to work contents: achieve¬ment, recognition, trust and work itself. Extrinsic factors (income, interpersonal relations, technology of administration, company policy, working conditions, work con¬trol, personal security, job security and position... should exercise lesser impact on the level of motivation.

  6. Public libraries in the library regions in the year 2009

    Milena Bon

    2011-01-01

    Full Text Available Purpose: Regional public libraries were initiated in 2003 to connect professional activities of libraries within regional networks and to ensure coordinated library development in a region in cooperation with the Library System Development Centre at the National and University Library performing a coordinating role. The article analyses the performance of public libraries and their integration in regional library networks in order to find out the level of development of conditions of performance of public libraries.Methodology/approach: Statistical data for the year 2009 were the basis for the overview of library activities of ten library regions with regard to applicable legislation and library standards. The level of regional library activities is compared to the socio-economic situation of statistical regions thus representing a new approach to the presentation of Slovenian’s public libraries’ development.Results: Absolute values indicate better development of nine libraries in the central Slovenia region while relative values offer a totally different picture. Four libraries in the region of Nova Gorica prove the highest level of development.Research limitation: Research is limited to the year 2009 and basic statistical analysis.Originality/practical implications: Findings of the analysis are useful for public libraries to plan their development strategy within a region and for financial bodies to provide for adequate financing for library activities in a specific region. The basic condition for successful public library performance is the even and harmonized development of conditions of performance as recommended by library standards.

  7. Retail Bank Interest Rate Pass-Through; Is Chile Atypical?

    Alessandro Rebucci; Marco A Espinosa-Vega

    2003-01-01

    This paper investigates empirically the pass-through of money market interest rates to retail banking interest rates in Chile, the United States, Canada, Australia, New Zealand, and five European countries. Overall, Chile's pass-through does not appear atypical. Based on a standard error-correction model, we find that, as in most countries considered, Chile's measured pass-through is incomplete. But Chile's pass-through is also faster than in many other countries considered and is comparable ...

  8. Comparing tailored and untailored text messages for smoking cessation

    Skov-Ettrup, L S; Ringgaard, L W; Dalum, P

    2014-01-01

    The aim was to compare the effectiveness of untailored text messages for smoking cessation to tailored text messages delivered at a higher frequency. From February 2007 to August 2009, 2030 users of an internet-based smoking cessation program with optional text message support aged 15-25 years were...... of text messages increases quit rates among young smokers....

  9. EPA Library Network Communication Strategies

    To establish Agency-wide procedures for the EPA National Library Network libraries to communicate, using a range of established mechanisms, with other EPA libraries, EPA staff, organizations and the public.

  10. Art messaging to engage homeless young adults.

    Nyamathi, Adeline; Slagle, Alexandra; Thomas, Alexandra; Hudson, Angela; Kahilifard, Farinaz; Avila, Glenna; Orser, Julie; Cuchilla, Manuel

    2011-01-01

    Art has been shown to be an empowering and engaging entity with numerous benefits to vulnerable populations, including the homeless persons and young adults. However, little is known how homeless young adults perceive the use of art as messages that can communicate the danger of initiating or continuing drug and alcohol use. The purpose of this study was to solicit perspectives of homeless, drug-using young adults as to how art can be used to design messages for their peers about the danger of initiating or continuing drug and alcohol use. Qualitative methodology via focus group discussions was utilized to engage 24 homeless young adults enrolled from a drop-in site in Santa Monica, California. The findings revealed support for a myriad of delivery styles, including in-person communication, flyers, music, documentary film, and creative writing. The young adults also provided insight into the importance of the thematic framework of messages. Such themes ranged from empowering and hopeful messages to those designed to scare young homeless adults into not experimenting with drugs. The findings indicate that in addition to messages communicating the need to prevent or reduce drug and alcohol use, homeless young adults respond to messages that remind them of goals and dreams they once had for their future, and to content that is personal, real, and truthful. Our research indicates that messages that reinforce protective factors such as hope for the future and self-esteem may be as important to homeless young adults as information about the risks and consequences of drug use.

  11. 36 CFR 13.918 - Sable Pass Wildlife Viewing Area.

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Sable Pass Wildlife Viewing... Preserve General Provisions § 13.918 Sable Pass Wildlife Viewing Area. (a) Entry into the Sable Pass Wildlife Viewing Area is prohibited from May 1 to September 30 unless authorized by the Superintendent. (b...

  12. PASS Student Leader and Mentor Roles: A Tertiary Leadership Pathway

    Skalicky, Jane; Caney, Annaliese

    2010-01-01

    In relation to developing leadership skills during tertiary studies, this paper considers the leadership pathway afforded by a Peer Assisted Study Sessions (PASS) program which includes the traditional PASS Leader role and a more senior PASS Mentor role. Data was collected using a structured survey with open-ended questions designed to capture the…

  13. The use of GSM (cell-phone) in the library by surdents of Abubakar ...

    Results showed that students used the cell-phone mainly for communication purposes, to check time, send text messages, browsing internet, among other things. Cell-phone use in the library caused distraction and made concentration difficult. Recommendations were offered towards reducing use of cell-phone in the ...

  14. Examining the Presidential Libraries: Students Find Biases and Recommend a Multicultural Perspective

    Baptiste, H. Prentice; Townsend, Katie

    2008-01-01

    The primary focus of research that the authors have undertaken at New Mexico State University for the past several years can be summed up with the question--are Presidential Libraries educational institutions or are they simply political monuments and messages? The authors have conducted extensive investigations involving visitations to ten…

  15. Lemon : An MPI parallel I/O library for data encapsulation using LIME

    Deuzeman, Albert; Reker, Siebren; Urbach, Carsten

    We introduce Lemon, an MPI parallel I/O library that provides efficient parallel I/O of both binary and metadata on massively parallel architectures. Motivated by the demands of the lattice Quantum Chromodynamics community, the data is stored in the SciDAC Lattice QCD Interchange Message

  16. Astor Pass Seismic Surveys Preliminary Report

    Louie, John [UNR; Pullammanappallil, Satish [Optim; Faulds, James; Eisses, Amy; Kell, Annie; Frary, Roxanna; Kent, Graham

    2011-08-05

    In collaboration with the Pyramid Lake Paiute Tribe (PLPT), the University of Nevada, Reno (UNR) and Optim re-processed, or collected and processed, over 24 miles of 2d seismic-reflection data near the northwest corner of Pyramid Lake, Nevada. The network of 2d land surveys achieved a near-3d density at the Astor Pass geothermal prospect that the PLPT drilled during Nov. 2010 to Feb. 2011. The Bureau of Indian Affairs funded additional seismic work around the Lake, and an extensive, detailed single-channel marine survey producing more than 300 miles of section, imaging more than 120 ft below the Lake bottom. Optim’s land data collection utilized multiple heavy vibrators and recorded over 200 channels live, providing a state-of-the-art reflection-refraction data set. After advanced seismic analysis including first-arrival velocity optimization and prestack depth migration, the 2d sections show clear fault-plane reflections, in some areas as deep as 4000 ft, tying to distinct terminations of the mostly volcanic stratigraphy. Some lines achieved velocity control to 3000 ft depth; all lines show reflections and terminations to 5000 ft depth. Three separate sets of normal faults appear in an initial interpretation of fault reflections and stratigraphic terminations, after loading the data into the OpendTect 3d seismic visualization system. Each preliminary fault set includes a continuous trace more than 3000 ft long, and a swarm of short fault strands. The three preliminary normal-fault sets strike northerly with westward dip, northwesterly with northeast dip, and easterly with north dip. An intersection of all three fault systems documented in the seismic sections at the end of Phase I helped to locate the APS-2 and APS-3 slimholes. The seismic sections do not show the faults connected to the Astor Pass tufa spire, suggesting that we have imaged mostly Tertiary-aged faults. We hypothesize that the Recent, active faults that produced the tufa through hotspring

  17. Applying a message oriented middleware architecture to the TJ-II remote participation system

    Sanchez, E.; Portas, A.; Pereira, A.; Vega, J.

    2006-01-01

    A message oriented middleware (MOM) has been introduced into the TJ-II data acquisition system to on-line distribute information. Java message service (JMS) has been chosen as the messaging application program interface (API) in order to ensure multiplatform portability. A library of C++ classes providing interface for JMS Java classes has been developed. This allows C++ programs to inter-communicate through JMS. In addition, a set of C wrapper functions has also been developed to provide basic messaging functionalities for C or FORTRAN programs. These functions are used in TJ-II LabView data acquisition applications. Several software applications that take advantage of the MOM architecture have been developed. Firstly, a general-user application allows monitoring of the data acquisition systems. Secondly, a simple application permits the visualization of TJ-II monitor signals with on-line data refreshing. These applications are written in the Java language, thereby ensuring its portability. These software tools provide new functionalities to the TJ-II remote participation system and are equally used in the local environment

  18. Applying a message oriented middleware architecture to the TJ-II remote participation system

    Sanchez, E. [Asociacion EURATOM/CIEMAT para Fusion, Avda Complutense 22, 28040 Madrid (Spain)]. E-mail: edi.sanchez@ciemat.es; Portas, A. [Asociacion EURATOM/CIEMAT para Fusion, Avda Complutense 22, 28040 Madrid (Spain); Pereira, A. [Asociacion EURATOM/CIEMAT para Fusion, Avda Complutense 22, 28040 Madrid (Spain); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Avda Complutense 22, 28040 Madrid (Spain)

    2006-07-15

    A message oriented middleware (MOM) has been introduced into the TJ-II data acquisition system to on-line distribute information. Java message service (JMS) has been chosen as the messaging application program interface (API) in order to ensure multiplatform portability. A library of C++ classes providing interface for JMS Java classes has been developed. This allows C++ programs to inter-communicate through JMS. In addition, a set of C wrapper functions has also been developed to provide basic messaging functionalities for C or FORTRAN programs. These functions are used in TJ-II LabView data acquisition applications. Several software applications that take advantage of the MOM architecture have been developed. Firstly, a general-user application allows monitoring of the data acquisition systems. Secondly, a simple application permits the visualization of TJ-II monitor signals with on-line data refreshing. These applications are written in the Java language, thereby ensuring its portability. These software tools provide new functionalities to the TJ-II remote participation system and are equally used in the local environment.

  19. Libraries Today, Libraries Tomorrow: Contemporary Library Practices and the Role of Library Space in the L

    Ana Vogrinčič Čepič

    2013-09-01

    Full Text Available ABSTRACTPurpose: The article uses sociological concepts in order to rethink the changes in library practices. Contemporary trends are discussed with regard to the changing nature of working habits, referring mostly to the new technology, and the (emergence of the third space phenomenon. The author does not regard libraries only as concrete public service institutions, but rather as complex cultural forms, taking in consideration wider social context with a stress on users’ practices in relation to space.Methodology/approach: The article is based on the (self- observation of the public library use, and on the (discourse analysis of internal library documents (i.e. annual reports and plans and secondary sociological literature. As such, the cultural form approach represents a classic method of sociology of culture.Results: The study of relevant material in combination with direct personal experiences reveals socio-structural causes for the change of users’ needs and habits, and points at the difficulty of spatial redefinition of libraries as well as at the power of the discourse.Research limitations: The article is limited to an observation of users’ practices in some of the public libraries in Ljubljana and examines only a small number of annual reports – the discoveries are then further debated from the sociological perspective.Originality/practical implications: The article offers sociological insight in the current issues of the library science and tries to suggest a wider explanation that could answer some of the challenges of the contemporary librarianship.

  20. Emotional flow in persuasive health messages.

    Nabi, Robin L

    2015-01-01

    Overwhelmingly, the literature on the persuasive influence of emotions has focused on individual emotions, fear in particular, though some recent attention has been given to mixed emotions in persuasive appeals. Building on this newer wave of research, this article argues that instead of focusing on singular emotional states or collections of emotions evoked by a message, it might prove valuable to explore the flow, or evolution, of emotional experience over the course of exposure to a health message. The article offers a brief introduction to the concept of emotion, followed by a review of the state of the literature on the use of emotion in health messages. The concept of emotional flow is then introduced along with a consideration of how it has been tacitly incorporated into the study of emotional health messages. Finally, the utility of the concept of emotional flow is elaborated by articulating the ways in which it might be harnessed to facilitate the creation of more effective health messages, individually as well as across campaigns. The article concludes with an agenda for future research.

  1. Effects of Electronic Word - of - Mouth Messages

    Choong Hoon Lim

    2012-01-01

    Full Text Available With the increased usage of online technologies, there has been an escalation of Electronic Word - of –Mouth (eWOM messages related to sport products and services offered and consumed. Therefore, in this original investigation by applying eWOM to the sport industry, this study examined how the combination of the quality of the eWOM message and the provider of the eWOM message affects purchaseintentions depending on the expertise level of the consumer. This study – which involved the collection of data from 134 students at a large university situated in the Midwest of the United States – utilized repeated measures of Analysis of Variance (ANOVA with tripartite groups of expertise and experimental conditions as independent variables. Purchase intention was the dependent variables. The results indicated that the quality of the eWOM message moderated the effect of the provider of the eWOM message. The subject’s level of expertise also had a moderating role on purchase intention.

  2. AMS: Area Message Service for SLC

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-01-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require an application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI open-quote C close-quote and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  3. Positive messaging promotes walking in older adults.

    Notthoff, Nanna; Carstensen, Laura L

    2014-06-01

    Walking is among the most cost-effective and accessible means of exercise. Mounting evidence suggests that walking may help to maintain physical and cognitive independence in old age by preventing a variety of health problems. However, older Americans fall far short of meeting the daily recommendations for walking. In 2 studies, we examined whether considering older adults' preferential attention to positive information may effectively enhance interventions aimed at promoting walking. In Study 1, we compared the effectiveness of positive, negative, and neutral messages to encourage walking (as measured with pedometers). Older adults who were informed about the benefits of walking walked more than those who were informed about the negative consequences of failing to walk, whereas younger adults were unaffected by framing valence. In Study 2, we examined within-person change in walking in older adults in response to positively- or negatively-framed messages over a 28-day period. Once again, positively-framed messages more effectively promoted walking than negatively-framed messages, and the effect was sustained across the intervention period. Together, these studies suggest that consideration of age-related changes in preferences for positive and negative information may inform the design of effective interventions to promote healthy lifestyles. Future research is needed to examine the mechanisms underlying the greater effectiveness of positively- as opposed to negatively-framed messages and the generalizability of findings to other intervention targets and other subpopulations of older adults. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  4. The message development tool: a case for effective operationalization of messaging in social marketing practice.

    Mattson, Marifran; Basu, Ambar

    2010-07-01

    That messages are essential, if not the most critical component of any communicative process, seems like an obvious claim. More so when the communication is about health--one of the most vital and elemental of human experiences (Babrow & Mattson, 2003). Any communication campaign that aims to change a target audience's health behaviors needs to centralize messages. Even though messaging strategies are an essential component of social marketing and are a widely used campaign model, health campaigns based on this framework have not always been able to effectively operationalize this key component, leading to cases where initiating and sustaining prescribed health behavior has been difficult (MacStravic, 2000). Based on an examination of the VERB campaign and an Australian breastfeeding promotion campaign, we propose a message development tool within the ambit of the social marketing framework that aims to extend the framework and ensure that the messaging component of the model is contextualized at the core of planning, implementation, and evaluation efforts.

  5. Analysis of Biomechanical Structure and Passing Techniques in Basketball

    Ricardo E. Izzo; Luca Russo

    2011-01-01

    The basketball is a complex sport, which these days has become increasingly linked to its’ psychophysical aspects rather than to the technical ones. Therefore, it is important to make a through study of the passing techniques from the point of view of the type of the pass and its’ biomechanics. From the point of view of the type of the used passes, the most used is the two-handed chest pass with a frequency of 39.9%. This is followed, in terms of frequency, by one-handed passes – the baseball...

  6. Nanomechanical characterization by double-pass force-distance mapping

    Dagdas, Yavuz S; Tekinay, Ayse B; Guler, Mustafa O; Dana, Aykutlu [UNAM Institute of Materials Science and Nanotechnology, Bilkent University, 06800 Ankara (Turkey); Necip Aslan, M, E-mail: aykutlu@unam.bilkent.edu.tr [Department of Physics, Istanbul Technical University, Istanbul (Turkey)

    2011-07-22

    We demonstrate high speed force-distance mapping using a double-pass scheme. The topography is measured in tapping mode in the first pass and this information is used in the second pass to move the tip over the sample. In the second pass, the cantilever dither signal is turned off and the sample is vibrated. Rapid (few kHz frequency) force-distance curves can be recorded with small peak interaction force, and can be processed into an image. Such a double-pass measurement eliminates the need for feedback during force-distance measurements. The method is demonstrated on self-assembled peptidic nanofibers.

  7. Nanomechanical characterization by double-pass force-distance mapping

    Dagdas, Yavuz S; Tekinay, Ayse B; Guler, Mustafa O; Dana, Aykutlu; Necip Aslan, M

    2011-01-01

    We demonstrate high speed force-distance mapping using a double-pass scheme. The topography is measured in tapping mode in the first pass and this information is used in the second pass to move the tip over the sample. In the second pass, the cantilever dither signal is turned off and the sample is vibrated. Rapid (few kHz frequency) force-distance curves can be recorded with small peak interaction force, and can be processed into an image. Such a double-pass measurement eliminates the need for feedback during force-distance measurements. The method is demonstrated on self-assembled peptidic nanofibers.

  8. Anon-Pass: Practical Anonymous Subscriptions.

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  9. Distributed Programming via Safe Closure Passing

    Philipp Haller

    2016-02-01

    Full Text Available Programming systems incorporating aspects of functional programming, e.g., higher-order functions, are becoming increasingly popular for large-scale distributed programming. New frameworks such as Apache Spark leverage functional techniques to provide high-level, declarative APIs for in-memory data analytics, often outperforming traditional "big data" frameworks like Hadoop MapReduce. However, widely-used programming models remain rather ad-hoc; aspects such as implementation trade-offs, static typing, and semantics are not yet well-understood. We present a new asynchronous programming model that has at its core several principles facilitating functional processing of distributed data. The emphasis of our model is on simplicity, performance, and expressiveness. The primary means of communication is by passing functions (closures to distributed, immutable data. To ensure safe and efficient distribution of closures, our model leverages both syntactic and type-based restrictions. We report on a prototype implementation in Scala. Finally, we present preliminary experimental results evaluating the performance impact of a static, type-based optimization of serialization.

  10. How My Program Passed the Turing Test

    Humphrys, Mark

    In 1989, the author put an ELIZA-like chatbot on the Internet. The conversations this program had can be seen - depending on how one defines the rules (and how seriously one takes the idea of the test itself) - as a passing of the Turing Test. This is the first time this event has been properly written. This chatbot succeeded due to profanity, relentless aggression, prurient queries about the user, and implying that they were a liar when they responded. The element of surprise was also crucial. Most chatbots exist in an environment where people expectto find some bots among the humans. Not this one. What was also novel was the onlineelement. This was certainly one of the first AI programs online. It seems to have been the first (a) AI real-time chat program, which (b) had the element of surprise, and (c) was on the Internet. We conclude with some speculation that the future of all of AI is on the Internet, and a description of the "World- Wide-Mind" project that aims to bring this about.

  11. Gender, Technology, and Libraries

    Melissa Lamont

    2009-09-01

    Full Text Available Information technology (IT is vitally important to many organizations, including libraries. Yet a review of employment statistics and a citation analysis show that men make up the majority of the IT workforce, in libraries and in the broader workforce. Research from sociology, psychology, and women’s studies highlights the organizational and social issues that inhibit women. Understanding why women are less evident in library IT positions will help inform measures to remedy the gender disparity.

  12. CRNL library serials list

    Alburger, T.P.

    1982-04-01

    A list of 1900 serial publications (periodicals, society transactions and proceedings, annuals and directories, indexes, newspapers, etc.) is presented with volumes and years held by the Main Library. This library is the largest in AECL as well as one of the largest scientific and technical libraries in North America, and functions as a Canadian resource for nuclear information. A main alphabetical list is followed by broad subject field lists representing research interests, and lists of abstract and index serials, general bibliographic serials, conference indexes, press releases, English translations, and original language journals

  13. FRDS.Broker Library

    2018-01-01

    The FRDS.Broker library is a teaching oriented implementation of the Broker architectural pattern for distributed remote method invocation. It defines the central roles of the pattern and provides implementations of those roles that are not domain/use case specific. It provides a JSON based (GSon...... library) Requestor implementation, and implementations of the ClientRequestHandler and ServerRequestHandler roles in both a Java socket based and a Http/URI tunneling based variants. The latter us based upon the UniRest and Spark-Java libraries. The Broker pattern and the source code is explained...

  14. Notes on basis band-pass circuits; Notes sur les circuits de base passe-bande

    Ailloud, J [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1959-07-01

    Resistor load amplifier stages, basic band-pass RC networks, conventional single-tuned circuits, have the same transfer function. Common properties and differences because diverse magnitude of parameters with proposed problems are exposed. Next the case of several cascaded stages (or networks) is examined when there is no reaction ones to another. (author) [French] Les etages amplificateurs a resistances, les circuits passe-bande RC elementaires, le circuit resonnant classique possedent la meme fonction de transfert. On fait ressortir les proprietes communes et les differences de comportement dues aux ordres de grandeur qu'il est possible de donner aux parametres en fonction des problemes a resoudre. On examine ensuite le cas de plusieurs etages (ou de plusieurs circuits) en cascade lorsqu'ils ne reagissent pas les uns sur les autres. (auteur)

  15. SCHOOL COMMUNITY PERCEPTION OF LIBRARY APPS AGAINTS LIBRARY EMPOWERMENT

    Achmad Riyadi Alberto

    2017-07-01

    Full Text Available Abstract. This research is motivated by the development of information and communication technology (ICT in the library world so rapidly that allows libraries in the present to develop its services into digital-based services. This study aims to find out the school community’s perception of library apps developed by Riche Cynthia Johan, Hana Silvana, and Holin Sulistyo and its influence on library empowerment at the library of SD Laboratorium Percontohan UPI Bandung. Library apps in this research belong to the context of m-libraries, which is a library that meets the needs of its users by using mobile platforms such as smartphones,computers, and other mobile devices. Empowerment of library is the utilization of all aspects of the implementation of libraries to the best in order to achieve the expected goals. An analysis of the schoolcommunity’s perception of library apps using the Technology Acceptance Model (TAM includes: ease of use, usefulness, usability, usage trends, and real-use conditions. While the empowerment of the library includes aspects: information empowerment, empowerment of learning resources, empowerment of human resources, empowerment of library facilities, and library promotion. The research method used in this research is descriptive method with quantitative approach. Population and sample in this research is school community at SD Laboratorium Percontohan UPI Bandung. Determination of sample criteria by using disproportionate stratified random sampling with the number of samples of 83 respondents. Data analysis using simple linear regression to measure the influence of school community perception about library apps to library empowerment. The result of data analysis shows that there is influence between school community perception about library apps to library empowerment at library of SD Laboratorium Percontohan UPI Bandung which is proved by library acceptance level and library empowerment improvement.

  16. Broadcasting a message in a parallel computer

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  17. The USF Libraries Virtual Library Project: A Blueprint for Development.

    Metz-Wiseman, Monica; Silver, Susan; Hanson, Ardis; Johnston, Judy; Grohs, Kim; Neville, Tina; Sanchez, Ed; Gray, Carolyn

    This report of the Virtual Library Planning Committee (VLPC) is intending to serve as a blueprint for the University of South Florida (USF) Libraries as it shifts from print to digital formats in its evolution into a "Virtual Library". A comprehensive planning process is essential for the USF Libraries to make optimum use of technology,…

  18. Croatian library leaders’ views on (their library quality

    Kornelija Petr Balog

    2014-04-01

    Full Text Available The purpose of this paper is to determine and describe the library culture in Croatian public libraries. Semi-structured interviews with 14 library directors (ten public and four academic were conducted. The tentative discussion topics were: definition of quality, responsibility for quality, satisfaction with library services, familiarization with user perspective of library and librarians, monitoring of user expectations and opinions. These interviews incorporate some of the findings of the project Evaluation of library and information services: public and academic libraries. The project investigates library culture in Croatian public and academic libraries and their preparedness for activities of performance measurement. The interviews reveal that library culture has changed positively in the past few years and that library leaders have positive attitude towards quality and evaluation activities. Library culture in Croatian libraries is a relatively new concept and as such was not actively developed and/or created. This article looks into the library culture of Croatian libraries, but at the same time investigates whether there is any trace of culture of assessment in them. Also, this article brings the latest update on views, opinions and atmosphere in Croatian public and academic libraries.

  19. National Libraries Section. General Research Libraries Division. Papers.

    International Federation of Library Associations, The Hague (Netherlands).

    Papers on national library services and activities, which were presented at the 1983 International Federation of Library Associations (IFLA) conference, include: (1) "The National Library of China in its Gradual Application of Modern Technology," a discussion by Zhu Nan and Zhu Yan (China) of microform usage and library automation; (2)…

  20. Library Science Education: A New Role for Academic Libraries

    Wesley, Threasa L.

    2018-01-01

    Many individuals working in library and information organizations do not hold a master of library science (MLS) degree or other specialized library science credential. Recognizing that this professional gap could be addressed by diversified educational opportunities, the W. Frank Steely Library at Northern Kentucky University in Highland Heights…

  1. Controlling hospital library theft.

    Cuddy, Theresa M; Marchok, Catherine

    2003-04-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal.

  2. Working in the Library

    Maximilien Brice

    2009-01-01

    Head Librarian Jens Vigen seeking information on the first discussions concerning the construction of the Large Hadron Collider in the LEP Tunnel (1984), here assisted by two of the library apprentices, Barbara Veyre and Dina-Elisabeth Bimbu (seated).

  3. Marketing the Library.

    Dragon, Andrea C.

    1979-01-01

    Describes the positive action using marketing strategies that libraries must take to capture their share of the post-Proposition 13 tax dollar. Strategies discussed relate to price, product, promotion, and place. (JD)

  4. LIBRARY MANAGEMNT INFORMATION SYSTEM

    Magnolia Tilca

    2013-06-01

    Full Text Available The focus of any educational institution is the content and services of the university library. The mission of the library is to obtain, organize, preserve and update the information with the greatest possible accuracy, minimum effort and time. This requires automation of the library’s operations. This paper presents a software application for managing the activity of the territorial "Vasile Goldiş" West University library. The application is developed using Visual Basic for Application programming language and using the database management system Microsoft Access 2010. The goal of this application is to optimize the inner workings of local library and to meet the requests of the institution and of the readers.

  5. Mainstreaming the New Library.

    Keeler, Elizabeth

    1982-01-01

    This discussion of methods of integrating the corporate library into the mainstream of affairs highlights three major elements of the process: marketing, production, and advertising. Professionalism and the information seeking behavior of clients are noted. Five references are provided. (EJS)

  6. Research in the Library

    2004-01-01

    ... devoted to a similar purpose. Over the past 100 years, the Library has been growing and developing to support the unique educational and research programs of the College, and its collections are, therefore, strong in the areas...

  7. Presidential Electronic Records Library

    National Archives and Records Administration — PERL (Presidential Electronic Records Library) used to ingest and provide internal access to the Presidential electronic Records of the Reagan, Bush, and Clinton...

  8. Iowa DNR - NRGIS Library

    Iowa State University GIS Support and Research Facility — The Natural Resources Geographic Information System (NRGIS) Library is a Geographic Information System (GIS) repository developed and maintained by the GIS Section...

  9. The library assessment cookbook

    Dobbs, Aaron W

    2017-01-01

    The Library Assessment Cookbook features 80 practical, easy-to-implement recipes divided into nine sections. This Cookbook will help librarians of all levels of experience measure and demonstrate their institutional value.

  10. Unified accelerator libraries

    Malitsky, Nikolay; Talman, Richard

    1997-01-01

    A 'Universal Accelerator Libraries' (UAL) environment is described. Its purpose is to facilitate program modularity and inter-program and inter-process communication among heterogeneous programs. The goal ultimately is to facilitate model-based control of accelerators

  11. Archives Library Information Center

    National Archives and Records Administration — ALIC is an online library catalog of books, periodicals, and other materials contained in Archives I and II and book collections located in other facilities.

  12. Foreign Data Library

    National Oceanic and Atmospheric Administration, Department of Commerce — The Foreign Data Library consists of meteorological data from nations other than the United States. The data are on original observational forms, in publications,...

  13. Web design for libraries

    Rubenstein, Charles

    2014-01-01

    Having a clear, attractive, and easy-to-navigate website that allows users to quickly find what they want is essential for any organization-including a library. This workbook makes website creation easy-no HTML required.

  14. Nigerian School Library Journal

    The Nigerian School Library Journal is a scholarly publication of the Nigerian ... media resources management, reading development, e-learning/m-learning, and other ... Team management in the 21 century: A human relations theory angle ...

  15. Medical Library Association

    ... Next Generation Data Sciences Challenges in Health and Biomedicine Fri November 3, 2017 The Medical Library Association ... Next Generation Data Science Challenges in Health and Biomedicine. MLA's comments and recommendations will help formulate strategic ...

  16. The Library as Publisher.

    Field, Roy

    1979-01-01

    Presents a guide to for-profit library publishing of reprints, original manuscripts, and smaller items. Discussed are creation of a publications panel to manage finances and preparation, determining prices of items, and drawing up author contracts. (SW)

  17. EDITORIAL: Message from the Editor Message from the Editor

    Thomas, Paul

    2010-02-01

    passing away of the following former members of the Board of Editors: Ravindra Sudan (1975 to 1984), Joe Di Marco (1984 to 1991) and Roy Bickerton (1975 to 1986). The Nuclear Fusion Office and IOP Publishing Just as the journal depends on the authors and referees, so its success is also due to the tireless and largely unsung efforts of the Nuclear Fusion Office in Vienna and IOP Publishing in Bristol. I would like to express my personal thanks to Maria Bergamini-Roedler, Katja Haslinger, Sophy Le Masurier, Yasmin McGlashan, Caroline Wilkinson, Sarah Ryder, Rachael Kriefman and Katie Gerrard for the support that they have given to me, the authors and the referees. Season's Greetings The January special edition delayed this editorial for a month. Nevertheless, I would like belatedly to wish our readers, authors, referees and Board of Editors the season's greetings and thank them for their contributions to Nuclear Fusion in 2009.

  18. Marketing and health libraries

    Wakeham, Maurice

    2004-01-01

    AIM: To present an overview of the concepts of marketing and to examine ways in which they can be applied to health libraries.\\ud METHODS: A review was carried out of literature relating to health libraries using LISA, CINAHL, BNI and Google.\\ud RESULTS: Marketing is seen as a strategic management activity aimed at developing customer relationships. Concepts such as the 'four Ps' (product, price, place and promotion), marketing plans, the marketing mix, segmentation, promotion and evaluation ...

  19. The LAW library

    Green, N.M.; Parks, C.V.; Arwood, J.W.

    1989-01-01

    The 238 group LAW library is a new multigroup library based on ENDF/B-V data. It contains data for 302 materials and will be distributed by the Radiation Shielding Information Center, located at Oak Ridge National Laboratory. It was generated for use in neutronics calculations required in radioactive waste analyses, though it has equal utility in any study requiring multigroup neutron cross sections

  20. Digital library usability studies

    Eden, Bradford Lee

    2005-01-01

    Each summer, circulation staff in my library inventories a section of the stacks andbrings collection issues to the attention of appropriate bibliographers. Since I amresponsible for the economics collection, I see an array of government documents thathave managed to elude the cataloging process. Many of these titles are decades old,having squatted in the library undisturbed and uncirculated since our online catalogwas implemented in 1990.

  1. Outsourcing in libraries

    Matjaž Žaucer

    1999-01-01

    Full Text Available Like other organisations more flexible libraries tend to conform to the changing environment as this is the only way to be successful and effective. They are expected to offer "more for less" and they are reorganising and searching the ways to reduce the costs. Outsourcing is one of possible solutions. The article deals with the possibilities of outsourcing in libraries, higher quality of their work eoneentrated on principal activities and gives some experienees in this field.

  2. Portsmouth Atmospheric Science School (PASS) Project

    Coleman, Clarence D.; Hathaway, Roger (Technical Monitor)

    2002-01-01

    The Portsmouth Atmospheric Science School Project (PASS) Project was granted a one-year no cost extension for 2001-2002. In year three of the project, objectives and strategies were modified based on the previous year-end evaluation. The recommendations were incorporated and the program was replicated within most of the remaining elementary schools in Portsmouth, Virginia and continued in the four middle schools. The Portsmouth Atmospheric Science School Project is a partnership, which includes Norfolk State University, Cooperating Hampton Roads Organizations for Minorities in Engineering (CHROME), NASA Langley Research Center, and the City of Portsmouth, Virginia Public Schools. The project seeks to strengthen the knowledge of Portsmouth Public Schools students in the field of atmospheric sciences and enhance teacher awareness of hands on activities in the atmospheric sciences. The project specifically seeks to: 1) increase the interest and participation of elementary and middle school students in science and mathematics; 2) strengthen existing science programs; and 3) facilitate greater achievement in core subjects, which are necessary for math, science, and technical careers. Emphasis was placed on providing training activities, materials and resources for elementary students (grades 3 - 5) and middle school students (grades 6 - 8), and teachers through a CHROME club structure. The first year of the project focused on introducing elementary students to concepts and activities in atmospheric science. Year two of the project built on the first year's activities and utilizes advanced topics and activities appropriate for middle school students. During the third year of the project, in addition to the approaches used in years one and two, emphasis was placed on activities that enhanced the Virginia Standards of Learning (SOL).

  3. Hashtag (# as Message Identity in Virtual Community

    Urip Mulyadi

    2018-02-01

    Full Text Available Computer Mediated Communication or CMC is able to present a virtual community, where the people inside have the same interest to share information related to events, activities, competitions, entertainment, history, event and others in Semarang City for publication. This research attempted to describe that hashtags can be utilized as the identity of a message in a communications network on Facebook Group MIK Semar. The results of this study are hashtags have changed how we build a virtual community, as the use of hashtags in Facebook Group MIK SEMAR as message identity to build better relationship and support communication among its members.

  4. Nuclear fuel cycle modelling using MESSAGE

    Guiying Zhang; Dongsheng Niu; Guoliang Xu; Hui Zhang; Jue Li; Lei Cao; Zeqin Guo; Zhichao Wang; Yutong Qiu; Yanming Shi; Gaoliang Li

    2017-01-01

    In order to demonstrate the possibilities of application of MESSAGE tool for the modelling of a Nuclear Energy System at the national level, one of the possible open nuclear fuel cycle options based on thermal reactors has been modelled using MESSAGE. The steps of the front-end and back-end of nuclear fuel cycle and nuclear reactor operation are described. The optimal structure for Nuclear Power Development and optimal schedule for introducing various reactor technologies and fuel cycle options; infrastructure facilities, nuclear material flows and waste, investments and other costs are demonstrated. (author)

  5. Upon a Message-Oriented Trading API

    Claudiu VINTE

    2010-01-01

    Full Text Available In this paper, we introduce the premises for a trading system application-programming interface (API based on a message-oriented middleware (MOM, and present the results of our research regarding the design and the implementation of a simulation-trading system employing a service-oriented architecture (SOA and messaging. Our research has been conducted with the aim of creating a simulation-trading platform, within the academic environment, that will provide both the foundation for future experiments with trading systems architectures, components, APIs, and the framework for research on trading strategies, trading algorithm design, and equity markets analysis tools. Mathematics Subject Classification: 68M14 (distributed systems.

  6. NSUF Irradiated Materials Library

    Cole, James Irvin [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-09-01

    The Nuclear Science User Facilities has been in the process of establishing an innovative Irradiated Materials Library concept for maximizing the value of previous and on-going materials and nuclear fuels irradiation test campaigns, including utilization of real-world components retrieved from current and decommissioned reactors. When the ATR national scientific user facility was established in 2007 one of the goals of the program was to establish a library of irradiated samples for users to access and conduct research through competitively reviewed proposal process. As part of the initial effort, staff at the user facility identified legacy materials from previous programs that are still being stored in laboratories and hot-cell facilities at the INL. In addition other materials of interest were identified that are being stored outside the INL that the current owners have volunteered to enter into the library. Finally, over the course of the last several years, the ATR NSUF has irradiated more than 3500 specimens as part of NSUF competitively awarded research projects. The Logistics of managing this large inventory of highly radioactive poses unique challenges. This document will describe materials in the library, outline the policy for accessing these materials and put forth a strategy for making new additions to the library as well as establishing guidelines for minimum pedigree needed to be included in the library to limit the amount of material stored indefinitely without identified value.

  7. Library Services Funding Assessment

    Lorig, Jonathan A.

    2004-01-01

    The Glenn Technical Library is a science and engineering library that primarily supports research activities at the Glenn Research Center, and provides selected services to researchers at all of the NASA research centers. Resources available in the library include books, journals, CD-ROMs, and access to various online sources, as well as live reference and inter-library loan services. The collection contains over 77,000 books, 800,000 research reports, and print or online access to over 1,400 journals. Currently the library operates within the Logistics and Technical Information Division, and is funded as an open-access resource within the GRC. Some of the research units at the GRC have recently requested that the library convert to a "pay-for-services" model, in which individual research units could fund only those journal subscriptions for which they have a specific need. Under this model, the library would always maintain a certain minimum level of pooled-expense services, including the ready reference and book collections, and inter-library loan services. Theoretically the "pay-for-services" model would encourage efficient financial allocation, and minimize the extent to which paid journal subscriptions go unused. However, this model also could potentially negate the benefits of group purchases for journal subscriptions and access. All of the major journal publishers offer package subscriptions that compare favorably in cost with the sum of individual subscription costs for a similar selection of titles. Furthermore, some of these subscription packages are "consortium" purchases that are funded collectively by the libraries at multiple NASA research centers; such consortia1 memberships would be difficult for the library to pay, if enough GRC research units were to withdraw their pooled contributions. cost of collectively-funded journal access with the cost of individual subscriptions. My primary task this summer is to create the cost dataset framework, and

  8. Developing effective messages about potable recycled water: The importance of message structure and content

    Price, J.; Fielding, K. S.; Gardner, J.; Leviston, Z.; Green, M.

    2015-04-01

    Community opposition is a barrier to potable recycled water schemes. Effective communication strategies about such schemes are needed. Drawing on social psychological literature, two experimental studies are presented, which explore messages that improve public perceptions of potable recycled water. The Elaboration-Likelihood Model of information processing and attitude change is tested and supported. Study 1 (N = 415) premeasured support for recycled water, and trust in government information at Time 1. Messages varied in complexity and sidedness were presented at Time 2 (3 weeks later), and support and trust were remeasured. Support increased after receiving information, provided that participants received complex rather than simple information. Trust in government was also higher after receiving information. There was tentative evidence of this in response to two-sided messages rather than one-sided messages. Initial attitudes to recycled water moderated responses to information. Those initially neutral or ambivalent responded differently to simple and one-sided messages, compared to participants with positive or negative attitudes. Study 2 (N = 957) tested the effectiveness of information about the low relative risks, and/or benefits of potable recycled water, compared to control groups. Messages about the low risks resulted in higher support when the issue of recycled water was relevant. Messages about benefits resulted in higher perceived issue relevance, but did not translate into greater support. The results highlight the importance of understanding people's motivation to process information, and need to tailor communication to match attitudes and stage of recycled water schemes' development.

  9. Libraries from the Inside Out.

    Cohen, Elaine; And Others

    1989-01-01

    This annual report on library facilities and furnishings includes articles on: (1) designing libraries that are both handsome and functional; (2) functional use of color and light in library interior design; (3) creating user-friendly libraries; and (4) the seven deadly sins of architects. An eight-page section of photographs is included. (MES)

  10. Tomorrow's Library: The American View.

    Dempsey, Mary A.

    1998-01-01

    Explores the continuing role of the public library in society, discussing the mission of the library (highlights the Chicago Public Library's new mission statement), funding collections and buildings, technology, capital improvements, challenges to intellectual freedom, librarian education, library outreach, and private-sector partnerships. (PEN)

  11. Interior Design Trends in Libraries.

    Sager, Don, Ed.

    2000-01-01

    Four contributing authors discuss perspectives on current trends in library interior design. Articles include: "Trends in Library Furnishings: A Manufacturer's Perspective" (Andrea Johnson); "Libraries, Architecture, and Light: The Architect's Perspective" (Rick McCarthy); "The Library Administrator's Perspective" (Chadwick Raymond); and "The…

  12. A Constitution for Danish Libraries.

    Nielsen, O. Perch

    This overview of the history of legislation governing the Danish library system from 1920 to the present: describes the various kinds of libraries in Denmark, explores the current controversies surrounding the roles of several supervisory library bodies, and details recent recommendations of the Danish Library Commission. (FM)

  13. Hispanic College Students Library Experience

    Lumley, Risa; Newman, Eric; Brown, Haakon T.

    2015-01-01

    This study looks at undergraduate Hispanic students' interpretations and current perceptions of the academic library's purpose, usefulness and value. What are the reasons to use the library? What are the barriers to use? This study will examine academic libraries' move toward electronic library materials and what it means for Hispanic students.…

  14. Library Anxiety of Teacher Trainees

    Sharma, Savita; Attri, Poonam

    2018-01-01

    This study investigates the library anxiety in Teacher Trainees and found it to be a prevalent phenomenon in students. The five dimensions of library anxiety, namely, barriers with staff, affective barriers, comfort with the library, knowledge of the library, and mechanical barriers have been identified. The sample of the study constituted 58…

  15. Mixed Messages: Measuring Conformance and Non-Interference in TypeScript (Artifact)

    Williams, Jack; Morris, J. Garrett; Wadler, Philip; Zalewski, Jakub

    2017-01-01

    In the paper Mixed Messages: Measuring Conformance and Non-Interference in TypeScript we present our experiences of evaluating gradual typing using our tool TypeScript TPD. The tool, based on the polymorphic blame calculus, monitors JavaScript libraries and TypeScript clients against the corresponding TypeScript definition. Our experiments yield two conclusions. First, TypeScript definitions are prone to error. Second, there are serious technical concerns with the use of the JavaScript proxy ...

  16. What's in a message? Delivering sexual health promotion to young people in Australia via text messaging

    Hellard Margaret E

    2010-12-01

    Full Text Available Abstract Background Advances in communication technologies have dramatically changed how individuals access information and communicate. Recent studies have found that mobile phone text messages (SMS can be used successfully for short-term behaviour change. However there is no published information examining the acceptability, utility and efficacy of different characteristics of health promotion SMS. This paper presents the results of evaluation focus groups among participants who received twelve sexual health related SMS as part of a study examining the impact of text messaging for sexual health promotion to on young people in Victoria, Australia. Methods Eight gender-segregated focus groups were held with 21 males and 22 females in August 2008. Transcripts of audio recordings were analysed using thematic analysis. Data were coded under one or more themes. Results Text messages were viewed as an acceptable and 'personal' means of health promotion, with participants particularly valuing the informal language. There was a preference for messages that were positive, relevant and short and for messages to cover a variety of topics. Participants were more likely to remember and share messages that were funny, rhymed and/or tied into particular annual events. The message broadcasting, generally fortnightly on Friday afternoons, was viewed as appropriate. Participants said the messages provided new information, a reminder of existing information and reduced apprehension about testing for sexually transmitted infections. Conclusions Mobile phones, in particular SMS, offer health promoters an exciting opportunity to engage personally with a huge number of individuals for low cost. The key elements emerging from this evaluation, such as message style, language and broadcast schedule are directly relevant to future studies using SMS for health promotion, as well as for future health promotion interventions in other mediums that require short formats, such

  17. Service Innovation In Academic Libraries

    Scupola, Ada; Nicolajsen, Hanne Westh

    2010-01-01

    Purpose – The purpose of this article is to investigate whether management and employees in academic libraries involve users in library service innovations and what these user roles are. Design/methodology/approach – The article first reviews the literature focusing on innovation, new product...... development, new service development and library science with specific focus on users and management. Subsequently the research uses a case study approach to investigate management and customer involvement in a Danish academic library. Findings – Results from the case study show that academic libraries...... in academic library service innovations on the basis of an in-depth case study of a Danish academic library....

  18. Chelyabinsk fireball and Dyatlov pass tragedy

    Kochemasov, G. G.

    2013-09-01

    The Chelyabinsk bolide as well as the Kunashak meteorite in 1949 (Fig. 3, black square) hit ground in ectonically peculiar place in the Ural Mountains. The main explosion was followed by a series of weaker bangs. The long Uralian fold belt (Pz) separates two subsectors (1 & 2, Fig. 1) of the Eurasian sector (1+2) of the Eastern hemisphere sectoral structure (Fig. 1). At the Pamirs-Hindukush massif (the "Pamirs' cross") meet four tectonic sectors of this structure: two opposite differently uplifted (Africa-Mediterranean ++ and Asian +) and separating them two opposite differently subsided (Eurasian - and Indooceanic - -). Tectonic bisectors divide the sectors into two differently tectonically elevated subsectors. The Ural Mountains is one of these bisectors dividing the somewhat risen East-European subsector and the relatively fallen West-Siberian one. Even more important is the sharp tectonic boundary between subsided Eurasian sector and uplifted Asian one (between 2 and 3, Fig. 1). Fig. 3 shows distribution of electrophonic bolides over USSR [1]. Observations numbers are in circles. The total of 343 observations is distributed at relevant districts; accompanied meteorites were found only in 23-24 cases; in the chart are excluded background values of 1-2 observations per district. Two areas are obviously anomalous. These of the Urals, and the Eurasia-Asia sectoral contact (Novosibirsk - Yenisei R. - Tunguska). A location in the long Uralian belt is determined by its intersection with the Timan fold belt coming from the northwest (Fig. 3). The catastrophic Dyatlov pass where nine people mysteriously died at once occurs there (triangle in Fig. 3). Mancy aborigines know this place as deadly where killing white shining spheres appear. Moreover this belt intersection is well known among hunters for UFO as the Permian triangle (Fig. 2). They meet there to observe unusual atmospheric shining and other anomalous phenomena. In the Yenisei-Tunguska-Baikal region lightning

  19. Spanish validation of the Premorbid Adjustment Scale (PAS-S).

    Barajas, Ana; Ochoa, Susana; Baños, Iris; Dolz, Montse; Villalta-Gil, Victoria; Vilaplana, Miriam; Autonell, Jaume; Sánchez, Bernardo; Cervilla, Jorge A; Foix, Alexandrina; Obiols, Jordi E; Haro, Josep Maria; Usall, Judith

    2013-02-01

    The Premorbid Adjustment Scale (PAS) has been the most widely used scale to quantify premorbid status in schizophrenia, coming to be regarded as the gold standard of retrospective assessment instruments. To examine the psychometric properties of the Spanish version of the PAS (PAS-S). Retrospective study of 140 individuals experiencing a first episode of psychosis (n=77) and individuals who have schizophrenia (n=63), both adult and adolescent patients. Data were collected through a socio-demographic questionnaire and a battery of instruments which includes the following scales: PAS-S, PANSS, LSP, GAF and DAS-sv. The Cronbach's alpha was performed to assess the internal consistency of PAS-S. Pearson's correlations were performed to assess the convergent and discriminant validity. The Cronbach's alpha of the PAS-S scale was 0.85. The correlation between social PAS-S and total PAS-S was 0.85 (p<0.001); while for academic PAS-S and total PAS-S it was 0.53 (p<0.001). Significant correlations were observed between all the scores of each age period evaluated across the PAS-S scale, with a significance value less than 0.001. There was a relationship between negative symptoms and social PAS-S (0.20, p<0.05) and total PAS-S (0.22, p<0.05), but not with academic PAS-S. However, there was a correlation between academic PAS-S and general subscale of the PANSS (0.19, p<0.05). Social PAS-S was related to disability measures (DAS-sv); and academic PAS-S showed discriminant validity with most of the variables of social functioning. PAS-S did not show association with the total LSP scale (discriminant validity). The Spanish version of the Premorbid Adjustment Scale showed appropriate psychometric properties in patients experiencing a first episode of psychosis and who have a chronic evolution of the illness. Moreover, each domain of the PAS-S (social and academic premorbid functioning) showed a differential relationship to other characteristics such as psychotic symptoms, disability

  20. Positive mood can increase or decrease message scrutiny: the hedonic contingency view of mood and message processing.

    Wegener, D T; Petty, R E; Smith, S M

    1995-07-01

    Currently dominant explanations of mood effects on persuasive message processing (i.e., cognitive capacity and feelings as information) predict that happy moods lead to less message scrutiny than neutral or sad moods. The hedonic contingency view (D. T. Wegener & R. E. Petty, 1994) predicts that happy moods can sometimes be associated with greater message processing activity because people in a happy mood are more attentive than neutral or sad people to the hedonic consequences of their actions. Consistent with this view, Experiment 1 finds that a happy mood can lead to greater message scrutiny than a neutral mood when the message is not mood threatening. Experiment 2 finds that a happy mood leads to greater message scrutiny than a sad mood when an uplifting message is encountered, but to less message scrutiny when a depressing message is encountered.

  1. THE TERMINOLOGY OF LIBRARY SCIENCE

    Љиљана Матић

    2014-01-01

    The master’s thesis entitled The Terminology of Library Science presents the general state of the terminology of library science in the Serbian language and analyses the terminological system which was formed in the last couple of decades in relation to library and information science. The terminology of library science is seen as a characteristic of professional language. The research is conducted on a corpus which excludes sources relating extremely to either library science or information ...

  2. University Advertising and Universality in Messaging

    Diel, Stan R.; Katsinas, Stephen

    2018-01-01

    University and college institutional advertisements, which typically are broadcast as public service announcements during the halftime of football games, were the subject of a quantitative analysis focused on commonality in messaging and employment of the semiotic theory of brand advertising. Findings indicate advertisements focus on students'…

  3. Message transfer in a communication network

    Examples of transport processes on networks include the traffic of informa- tion packets [1–4], transport processes on biological networks [5,6], and road traffic. ... for this system. In the case of single message transfer, we study the dependence of average travel times on the hub density, and find that travel times fall off as a.

  4. Message Integrity Model for Wireless Sensor Networks

    Qleibo, Haider W.

    2009-01-01

    WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…

  5. Picture Book Soldiers: Men and Messages.

    Desai, Christina M.

    2001-01-01

    Examines children's picture books about soldiers and war, including fiction, folktales, and historical fiction, analyzing their implicit and explicit messages about war and the military, and evaluating them for gender stereotyping. Finds that the soldiers conform almost uniformly to an exaggerated male stereotype. Shows different value judgments…

  6. An approach for message exchange using archetypes.

    Moraes, João L C; Souza, Wanderley L; Cavalini, Luciana T; Pires, Luís F; Prado, Antonio F

    2013-01-01

    The application of ICT on the whole range of health sector activities, known as e-health, can simplify the access to health care services and will only be acceptable for realistic scenarios if it supports efficient information exchange amongst the caregivers and their patients. The aim of this paper is present an approach for message exchange to realistic scenarios.

  7. Graphical route information on variable message signs

    Alkim, T.P.; Mede, P.H.J. van der; Janssen, W.H.

    2002-01-01

    Reports on experiments in the Netherlands on the use of graphical route information panels (GRIP) as part of variable message systems (VMS) providing information to drivers. GRIP appear to be as safe as regular VMS. Digestion of the information presented is initially quicker for regular VMS, but

  8. Princess Picture Books: Content and Messages

    Dale, Lourdes P.; Higgins, Brittany E.; Pinkerton, Nick; Couto, Michelle; Mansolillo, Victoria; Weisinger, Nica; Flores, Marci

    2016-01-01

    Because many girls develop their understanding of what it means to be a girl from books about princesses, the researchers coded the messages and content in 58 princess books (picture, fairy tales, and fractured fairy tales). Results indicate that gender stereotypes are present in the books--the princesses were more likely to be nurturing, in…

  9. An Interpersonal Approach to Writing Negative Messages.

    Salerno, Douglas

    1988-01-01

    Asserts that textbook advice regarding buffers and negative messages is simplistic and frequently wrong, and analyses 22 job-refusal letters and their effectiveness. Claims that recent research on cognitive complexity and social perspective-taking suggests the need for more sophisticated audience analysis protocols for dealing with the negative…

  10. Interactive or interruptive? Instant messaging at work

    Ou, C.X.J.; Davison, R.M.

    2011-01-01

    The use of instant messaging (IM) technology at work is controversial, due to the interruptions it may cause and the difficulties associated with quantifying its benefits for individuals, teams and organizations. In this study, we investigate the use and impact of IM tools in the workplace. Based on

  11. Calculation of trajectory parameters of long pass in basketball.

    Charikova K.M.

    2011-08-01

    Full Text Available Values of a ball's flight trajectory parameters depending on a distance of long pass, a corner of a ball's start and height of a throwing point are submitted in article. Coordinates of reference points installation for training to long pass with an optimum trajectory of a ball's flight are designed. Requirements to simulators design are determined. Corners of ball's long pass performance in various game situations are recommended.

  12. Library 3.0 intelligent libraries and apomediation

    Kwanya, Tom; Underwood, Peter

    2015-01-01

    The emerging generation of research and academic library users expect the delivery of user-centered information services. 'Apomediation' refers to the supporting role librarians can give users by stepping in when users need help. Library 3.0 explores the ongoing debates on the "point oh” phenomenon and its impact on service delivery in libraries. This title analyses Library 3.0 and its potential in creating intelligent libraries capable of meeting contemporary needs, and the growing role of librarians as apomediators. Library 3.0 is divided into four chapters. The first chapter introduces and places the topic in context. The second chapter considers "point oh” libraries. The third chapter covers library 3.0 librarianship, while the final chapter explores ways libraries can move towards '3.0'.

  13. Pass-Through to Import Prices: Evidence from Developing Countries

    Miguel Fuentes

    2007-01-01

    In this paper I study the pass-through of nominal exchange rate changes to the price of imported goods in four developing countries. The results indicate that 75% of changes in the exchange rate are passed-through to the domestic currency price of imported goods within one quarter. Complete pass-through is attained within one year. There is no evidence that exchange rate pass-through to the price of imported goods has declined over time even in those countries that have managed to reduce infl...

  14. A borderless Library

    CERN Library

    2010-01-01

    The CERN Library has a large collection of documents in online or printed format in all disciplines needed by physicists, engineers and technicians. However,  users sometimes need to read documents not available at CERN. But don’t worry! Thanks to its Interlibrary loan and document delivery service, the CERN Library can still help you. Just fill in the online form or email us. We will then locate the document in other institutions and order it for you free of charge. The CERN Library cooperates with the largest libraries in Europe, such as ETH (Eidgenössische Technische Hochschule) in Zurich, TIB (Technische Informationsbibliothek) in Hanover and the British Library in London. Thanks to our network and our expertise in document search, most requests are satisfied in record time: articles are usually served in .pdf version a few hours after the order, and books or other printed materials are delivered within a few days. It is possible to ask for all types of documents suc...

  15. Effectiveness of safety and public service announcement messages on dynamic message signs.

    2014-07-01

    The number of transportation agencies that use dynamic message signs (DMS) to provide traffic information to motorists has increased dramatically over the past four decades. This growing trend of DMS deployment is a reflection of the public interest ...

  16. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  17. Investigating the impact of viral message appeal and message credibility on consumer attitude toward brand

    Majid Esmaeilpour

    2016-12-01

    Full Text Available Background - Due to the rapid growth of the Internet and use of e-commerce in recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers' attitude with mediating role of intellectual involvement of consumers and their risk taking level. Purpose - The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. Design/methodology/approach – The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, data were analyzed through smart PLS software. Findings –The results show that the appeal and credibility of the message source have impact on consumer attitudes toward the brand. It was also found that intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brand. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role. Research limitations/implications – Data collection tool was questionnaire in this study, and questionnaire has some disadvantages that can affect the results. Additionally, this study was conducted in Bushehr city (Iran. Therefore, we should be cautious in generalizing the findings. Originality/value – In this study, the effect of message appeal and message source credibility on consumer attitude to brand was examined. The risk taking level of consumer and his involvement level were considered

  18. Investigating the impact of viral message appeal and message credibility on consumer attitude toward the brand

    Esmaeilpour Majid

    2016-07-01

    Full Text Available Due to the rapid growth of the Internet and use of e-commerce in the recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers’ attitude with mediating role of intellectual involvement of consumers and their risk taking level. The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in the Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, we analysed the data through smart PLS software. The results show that the appeal and credibility of the message source impact the consumer attitudes toward the brand. We also found that the intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brands. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role.

  19. Preventing messaging queue deadlocks in a DMA environment

    Blocksome, Michael A; Chen, Dong; Gooding, Thomas; Heidelberger, Philip; Parker, Jeff

    2014-01-14

    Embodiments of the invention may be used to manage message queues in a parallel computing environment to prevent message queue deadlock. A direct memory access controller of a compute node may determine when a messaging queue is full. In response, the DMA may generate and interrupt. An interrupt handler may stop the DMA and swap all descriptors from the full messaging queue into a larger queue (or enlarge the original queue). The interrupt handler then restarts the DMA. Alternatively, the interrupt handler stops the DMA, allocates a memory block to hold queue data, and then moves descriptors from the full messaging queue into the allocated memory block. The interrupt handler then restarts the DMA. During a normal messaging advance cycle, a messaging manager attempts to inject the descriptors in the memory block into other messaging queues until the descriptors have all been processed.

  20. Using Publish-Subscribe Messaging for System Status and Automation

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  1. Outpatient blood pressure monitoring using bi-directional text messaging.

    Anthony, Chris A; Polgreen, Linnea A; Chounramany, James; Foster, Eric D; Goerdt, Christopher J; Miller, Michelle L; Suneja, Manish; Segre, Alberto M; Carter, Barry L; Polgreen, Philip M

    2015-05-01

    To diagnose hypertension, multiple blood pressure (BP) measurements are recommended. We randomized patients into three groups: EMR-only (patients recorded BP measurements in an electronic medical record [EMR] web portal), EMR + reminders (patients were sent text message reminders to record their BP measurements in the EMR), and bi-directional text messaging (patients were sent a text message asking them to respond with their current BP). Subjects were asked to complete 14 measurements. Automated messages were sent to each patient in the bi-directional text messaging and EMR + reminder groups twice daily. Among 121 patients, those in the bi-directional text messaging group reported the full 14 measurements more often than both the EMR-only group (P text messaging is an effective way to gather patient BP data. Text-message-based reminders alone are an effective way to encourage patients to record BP measurements. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  2. Effects of Instant Messaging on School Performance in Adolescents.

    Grover, Karan; Pecor, Keith; Malkowski, Michael; Kang, Lilia; Machado, Sasha; Lulla, Roshni; Heisey, David; Ming, Xue

    2016-06-01

    Instant messaging may compromise sleep quality and school performance in adolescents. We aimed to determine associations between nighttime messaging and daytime sleepiness, self-reported sleep parameters, and/or school performance. Students from 3 high schools in New Jersey completed anonymous questionnaires assessing sleep duration, daytime sleepiness, messaging habits, and academic performance. Of the 2,352 students sampled, 1,537 responses were contrasted among grades, sexes, and messaging duration, both before and after lights out. Students who reported longer duration of messaging after lights out were more likely to report a shorter sleep duration, higher rate of daytime sleepiness, and poorer academic performance. Messaging before lights out was not associated with higher rates of daytime sleepiness or poorer academic performance. Females reported more messaging, more daytime sleepiness, and better academic performance than males. There may be an association between text messaging and school performance in this cohort of students. © The Author(s) 2016.

  3. Scenario planning: a tool for academic health sciences libraries.

    Ludwig, Logan; Giesecke, Joan; Walton, Linda

    2010-03-01

    Review the International Campaign to Revitalise Academic Medicine (ICRAM) Future Scenarios as a potential starting point for developing scenarios to envisage plausible futures for health sciences libraries. At an educational workshop, 15 groups, each composed of four to seven Association of Academic Health Sciences Libraries (AAHSL) directors and AAHSL/NLM Fellows, created plausible stories using the five ICRAM scenarios. Participants created 15 plausible stories regarding roles played by health sciences librarians, how libraries are used and their physical properties in response to technology, scholarly communication, learning environments and health care economic changes. Libraries are affected by many forces, including economic pressures, curriculum and changes in technology, health care delivery and scholarly communications business models. The future is likely to contain ICRAM scenario elements, although not all, and each, if they come to pass, will impact health sciences libraries. The AAHSL groups identified common features in their scenarios to learn lessons for now. The hope is that other groups find the scenarios useful in thinking about academic health science library futures.

  4. The CASTOR shower library

    Mundim Filho, Luiz Martins; Carvalho, Wagner de Paula

    2012-01-01

    Full text: CASTOR (Centaur And Strange Object Research) is an electromagnetic (EM) and hadronic (HAD) calorimeter, based on tungsten and quartz plates, operating in the CMS Detector (Compact Muon Solenoid) at LHC. The calorimeter detects Cerenkov radiation and is positioned around the beam pipe in the very forward region of CMS (at 14.38 m from the interaction point), covering the pseudo-rapidity range between -6.6 ≤ η≤-5.1 . It is longitudinally segmented into 14 sections, 2 for the EM and 12 for the HAD parts and is 16-fold azimuthally symmetric around the beam pipe. A Shower Library is needed for CASTOR Monte Carlo simulation, as the full simulation of showers takes a long time and the high multiplicity of particles in the forward region makes this simulation very time consuming. The Shower Library is used as a look-up table in the form of a ROOT file, so that when a simulated particle enters the detector with a certain energy and direction, characterized by the azimuthal angle φ and the pseudo-rapidity η, instead of making the full simulation of the shower in CASTOR, it is substituted by one already stored in the Shower Library. Showers corresponding to two types of particles are included in the Shower Library: electrons (or photons) and charged pions. The software implemented to make the Shower Library is described, as well as the validation of this library and timing studies. This package has been developed in the context of the official software of the CMS Collaboration, CMSSW. (author)

  5. Use of mobile phone text message reminders in health care services: a narrative literature review.

    Kannisto, Kati Anneli; Koivunen, Marita Hannele; Välimäki, Maritta Anneli

    2014-10-17

    Mobile text messages are a widely recognized communication method in societies, as the global penetration of the technology approaches 100% worldwide. Systematic knowledge is still lacking on how the mobile telephone text messaging (short message service, SMS) has been used in health care services. This study aims to review the literature on the use of mobile phone text message reminders in health care. We conducted a systematic literature review of studies on mobile telephone text message reminders. The data sources used were PubMed (MEDLINE), CINAHL, Proquest Databases/ PsycINFO, EMBASE, Cochrane Library, Scopus, and hand searching since 2003. Studies reporting the use of SMS intended to remind patients in health services were included. Given the heterogeneity in the studies, descriptive characteristics, purpose of the study, response rates, description of the intervention, dose and timing, instruments, outcome measures, and outcome data from the studies were synthesized using a narrative approach. From 911 initial citations, 60 studies were included in the review. The studies reported a variety of use for SMS. Mobile telephone text message reminders were used as the only intervention in 73% (44/60) of the studies, and in 27% (16/60) of the remaining studies, SMS was connected to another comprehensive health intervention system. SMS reminders were sent to different patient groups: patients with HIV/AIDS (15%, 9/60) and diabetes (13%, 8/60) being the most common groups. The response rates of the studies varied from 22-100%. Typically, the text message reminders were sent daily. The time before the specific intervention to be rendered varied from 10 minutes (eg, medication taken) to 2 weeks (eg, scheduled appointment). A wide range of different evaluation methods and outcomes were used to assess the impact of SMS varying from existing databases (eg, attendance rate based on medical records), questionnaires, and physiological measures. About three quarters of the

  6. WIMS Library updating

    Ravnik, M.; Trkov, A.; Holubar, A.

    1992-01-01

    At the end of 1990 the WIMS Library Update Project (WLUP) has been initiated at the International Atomic Energy Agency. The project was organized as an international research project, coordinated at the J. Stefan Institute. Up to now, 22 laboratories from 19 countries joined the project. Phase 1 of the project, which included WIMS input optimization for five experimental benchmark lattices, has been completed. The work presented in this paper describes also the results of Phase 2 of the Project, in which the cross sections based on ENDF/B-IV evaluated nuclear data library have been processed. (author) [sl

  7. Astrophysical opacity library

    Huebner, W.F.; Merts, A.L.; Magee, N.H. Jr.; Argo, M.F.

    1977-08-01

    The astrophysical elements opacity library includes equation of state data, various mean opacities, and 2000 values of the frequency-dependent extinction coefficients in equally spaced intervals u identical with hν/kT from 0 to 20 for 41 degeneracy parameters eta from -28 (nondegenerate) to 500 and 46 temperatures kT from 1 eV to 100 keV. Among available auxiliary quantities are the free electron density, mass density, and plasma cutoff frequency. A library-associated program can produce opacities for mixtures with up to 20 astrophysically abundant constituent elements at 4 levels of utility for the user

  8. Reference neutron activation library

    NONE

    2002-04-01

    Many scientific endeavors require accurate nuclear data. Examples include studies of environmental protection connected with the running of a nuclear installation, the conceptual designs of fusion energy producing devices, astrophysics and the production of medical isotopes. In response to this need, many national and international data libraries have evolved over the years. Initially nuclear data work concentrated on materials relevant to the commercial power industry which is based on the fission of actinides, but recently the topic of activation has become of increasing importance. Activation of materials occurs in fission devices, but is generally overshadowed by the primary fission process. In fusion devices, high energy (14 MeV) neutrons produced in the D-T fusion reaction cause activation of the structure, and (with the exception of the tritium fuel) is the dominant source of activity. Astrophysics requires cross-sections (generally describing neutron capture) or its studies of nucleosynthesis. Many analytical techniques require activation analysis. For example, borehole logging uses the detection of gamma rays from irradiated materials to determine the various components of rocks. To provide data for these applications, various specialized data libraries have been produced. The most comprehensive of these have been developed for fusion studies, since it has been appreciated that impurities are of the greatest importance in determining the overall activity, and thus data on all elements are required. These libraries contain information on a wide range of reactions: (n,{gamma}), (n,2n), (n,{alpha}), (n,p), (n,d), (n,t), (n,{sup 3}He)and (n,n')over the energy range from 10{sup -5} eV to 15 or 20 MeV. It should be noted that the production of various isomeric states have to be treated in detail in these libraries,and that the range of targets must include long-lived radioactive nuclides in addition to stable nuclides. These comprehensive libraries thus contain

  9. Reference neutron activation library

    2002-04-01

    Many scientific endeavors require accurate nuclear data. Examples include studies of environmental protection connected with the running of a nuclear installation, the conceptual designs of fusion energy producing devices, astrophysics and the production of medical isotopes. In response to this need, many national and international data libraries have evolved over the years. Initially nuclear data work concentrated on materials relevant to the commercial power industry which is based on the fission of actinides, but recently the topic of activation has become of increasing importance. Activation of materials occurs in fission devices, but is generally overshadowed by the primary fission process. In fusion devices, high energy (14 MeV) neutrons produced in the D-T fusion reaction cause activation of the structure, and (with the exception of the tritium fuel) is the dominant source of activity. Astrophysics requires cross-sections (generally describing neutron capture) or its studies of nucleosynthesis. Many analytical techniques require activation analysis. For example, borehole logging uses the detection of gamma rays from irradiated materials to determine the various components of rocks. To provide data for these applications, various specialized data libraries have been produced. The most comprehensive of these have been developed for fusion studies, since it has been appreciated that impurities are of the greatest importance in determining the overall activity, and thus data on all elements are required. These libraries contain information on a wide range of reactions: (n,γ), (n,2n), (n,α), (n,p), (n,d), (n,t), (n, 3 He)and (n,n')over the energy range from 10 -5 eV to 15 or 20 MeV. It should be noted that the production of various isomeric states have to be treated in detail in these libraries,and that the range of targets must include long-lived radioactive nuclides in addition to stable nuclides. These comprehensive libraries thus contain almost all the

  10. Future of research libraries

    Naryandas, Narakesari; Kindström, Daniel

    2014-01-01

    Research libraries have been an integral part of the scholarly communication system since that system emerged in its present form. They now face a period of unprecedentedly drastic and rapid change. This is caused, first and foremost, by the migration of much scholarly material to digital formats, raising the question of the future purpose of the 'library space'. Together with this come transfigurational changes to the communication change of recorded information, with the roles of authors , publishers, database producers and librarians and archivists all in a state of flux. Finally, new forms

  11. Wordpress for libraries

    Haefele, Chad

    2015-01-01

    WordPress is not only the most popular blogging software in the world, but it is also a powerful content management system that runs more than 23 percent of all websites. The current version alone has been downloaded almost 20 million times, and the WordPress community has built more than 38,000 plugins to extend and enhance the system. Libraries are using this technology to create community-oriented websites, blogs, subject guides, digital archives, and more. This hands-on, practical book walks readers through the entire process of setting up a WordPress website for their library,

  12. Enterprise Reference Library

    Bickham, Grandin; Saile, Lynn; Havelka, Jacque; Fitts, Mary

    2011-01-01

    Introduction: Johnson Space Center (JSC) offers two extensive libraries that contain journals, research literature and electronic resources. Searching capabilities are available to those individuals residing onsite or through a librarian s search. Many individuals have rich collections of references, but no mechanisms to share reference libraries across researchers, projects, or directorates exist. Likewise, information regarding which references are provided to which individuals is not available, resulting in duplicate requests, redundant labor costs and associated copying fees. In addition, this tends to limit collaboration between colleagues and promotes the establishment of individual, unshared silos of information The Integrated Medical Model (IMM) team has utilized a centralized reference management tool during the development, test, and operational phases of this project. The Enterprise Reference Library project expands the capabilities developed for IMM to address the above issues and enhance collaboration across JSC. Method: After significant market analysis for a multi-user reference management tool, no available commercial tool was found to meet this need, so a software program was built around a commercial tool, Reference Manager 12 by The Thomson Corporation. A use case approach guided the requirements development phase. The premise of the design is that individuals use their own reference management software and export to SharePoint when their library is incorporated into the Enterprise Reference Library. This results in a searchable user-specific library application. An accompanying share folder will warehouse the electronic full-text articles, which allows the global user community to access full -text articles. Discussion: An enterprise reference library solution can provide a multidisciplinary collection of full text articles. This approach improves efficiency in obtaining and storing reference material while greatly reducing labor, purchasing and

  13. Knowledge management for libraries

    Forrestal, Valerie

    2015-01-01

    Libraries are creating dynamic knowledge bases to capture both tacit and explicit knowledge and subject expertise for use within and beyond their organizations. In this book, readers will learn to move policies and procedures manuals online using a wiki, get the most out of Microsoft SharePoint with custom portals and Web Parts, and build an FAQ knowledge base from reference management applications such as LibAnswers. Knowledge Management for Libraries guides readers through the process of planning, developing, and launching th

  14. The Effectiveness of Campaign Messages on Turnout and Vote Choice

    Friedel, Sylvia

    2013-01-01

    In this dissertation, I study campaign effects on turnout and vote choice. I analyze different campaign messages and the way they affect voters across various situations. First, through an online survey experiment, I study the impact of campaign messages and ideological cues on voters as they make inferences on candidates. Next, through a field experiment, I test whether microtargeted messages or general messages on the economy have any effect on turnout. Lastly, using online survey data, I e...

  15. Flow of emotional messages in artificial social networks

    Chmiel, Anna; Holyst, Janusz A.

    2010-01-01

    Models of message flows in an artificial group of users communicating via the Internet are introduced and investigated using numerical simulations. We assumed that messages possess an emotional character with a positive valence and that the willingness to send the next affective message to a given person increases with the number of messages received from this person. As a result, the weights of links between group members evolve over time. Memory effects are introduced, taking into account t...

  16. Library resources on the Internet

    Buchanan, Nancy L.

    1995-07-01

    Library resources are prevalent on the Internet. Library catalogs, electronic books, electronic periodicals, periodical indexes, reference sources, and U.S. Government documents are available by telnet, Gopher, World Wide Web, and FTP. Comparatively few copyrighted library resources are available freely on the Internet. Internet implementations of library resources can add useful features, such as full-text searching. There are discussion lists, Gophers, and World Wide Web pages to help users keep up with new resources and changes to existing ones. The future will bring more library resources, more types of library resources, and more integrated implementations of such resources to the Internet.

  17. Teaching Students the Persuasive Message through Small Group Activity

    Creelman, Valerie

    2008-01-01

    Teaching students to write persuasive messages is a critical feature of any undergraduate business communications course. For the persuasive writing module in the author's course, students write a persuasive message on the basis of the four-part indirect pattern often used for sales or fund-raising messages. The course text she uses identifies…

  18. The Message Reporting System of the ATLAS DAQ System

    Caprini, M; Kolos, S; 10th ICATPP Conference on Astroparticle, Particle, Space Physics, Detectors and Medical Physics Applications

    2008-01-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process comm...

  19. Using Text-Messaging in the Secondary Classroom

    Thomas, Kevin; Orthober, Corrie

    2011-01-01

    To examine the potential uses of and barriers to text-messaging in secondary schools, three classes (66 students) of high school students used their personal mobile phones to receive out of school, course-related text-messages from teachers. Forty-six students (70%) agreed to receive text-messages. Findings indicate that participants found…

  20. Driver memory for in-vehicle visual and auditory messages

    1999-12-01

    Three experiments were conducted in a driving simulator to evaluate effects of in-vehicle message modality and message format on comprehension and memory for younger and older drivers. Visual icons and text messages were effective in terms of high co...